U.S. NAVY CYBERSECURITY NEEDS IMPROVEMENT FOR THE 21ST CENTURY BATTLEFIELD
Loading...
Authors
Jones, Isaiah J.
Subjects
cyber
signals intelligence
SIGINT
electromagnetic signatures control
EMCON
commercial wireless control
COMICON
Navy and Cyber Awareness Challenge
signals intelligence
SIGINT
electromagnetic signatures control
EMCON
commercial wireless control
COMICON
Navy and Cyber Awareness Challenge
Advisors
Huntley, Wade L.
Shives, Timothy, Fleet Cyber Command/US 10th Fleet
Date of Issue
2025-03
Date
Publisher
Monterey, CA; Naval Postgraduate School
Language
Abstract
U.S. Navy professionals’ growing reliance on personal wireless devices introduces huge risks for cyber-attacks and signals intelligence (SIGINT) vulnerability exposure. Even though these devices provide better connectivity and improve user morale, they also present substantial operational security risks because they can expose sensitive data to enemy forces. This thesis explores personal device security threats on naval vessels by evaluating cyber exploitation dangers, electromagnetic signatures control (EMCON) exposure, and insufficient gaps in current cybersecurity training methods. This research uses the USS Sampson vessel alongside commercial wireless control (COMICON) policy deployment to analyze both successful and unsuccessful aspects of current security protocols. It reviews real-case incidents such as the Makiivka strike from the Russia-Ukraine conflict to identify comparable threats affecting U.S. Navy operations. Research into U.S. Navy cybersecurity training reveals that the Cyber Awareness Challenge 2025 and other existing programs lack sufficient capability to deal with personal gadget vulnerabilities. This paper proposes the implementation of a hybrid policy framework for risk reduction by expanding cyber security education programs and strengthening EMCON-compatible device rules, advance monitoring systems, and a cultural awareness campaign for personnel while balancing morale concerns to protect operational integrity against emerging cyber threats.
Type
Thesis
Description
Series/Report No
Department
Organization
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Distribution Statement
Distribution Statement A. Approved for public release: Distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
