Sample Paper on Maryland Navy Cyberspace Strategies

Maryland Navy Cyberspace

Maryland Navy base is the headquarters of all the Navy divisions in the United States. The navy plays an important role in ensuring that the US is protected from all sides of the seas and oceans. Fleet Cyber Command is the division that has been established to spearhead cyberspace security under the US navy. However, Fleet Cyber Command directly works under the US Cyber Command Unit, an umbrella body of all divisions established for cyber protection in the country. In order to achieve the ultimate protection that is required, cyberspace plays a major role in ensuring that all aspects of the nation’ wellbeing is safe. The increased popularity of the internet has opened doors for better performance in business all over the world. However, cyber-attacks have increased in the recent times, with many large companies falling victims. Cyber-crime continues to grow in sophistication, just as technological advances come up. Therefore, the navy is responsible for adequate protection on all sectors of cyberspace. Unlike in the past when protecting the nation only entailed deployment of heavy weapons and troops, the increased use of the internet has made it easy for enemies to use cyberspace to lounge targeted attacks. For instance, an attack on a system may lead to the disruption and lack of essential services to the public. Hackers may attack public utilities like electricity and banking systems, leading to heavy losses, in terms of billions of dollars.

Therefore, Maryland Army Command base has is place cyberspace measures that seeks to ensure that enemies do not interfere with the normal functioning of the US cyberspace. Key competencies are evident on the kind of infrastructural establishment that the US Government has committed to the same course, with OMB allocating large percentage of the national budget towards ensuring that cyberattacks are limited as much as possible. According to Josten (2006), Fleet Cyber Command is the entity with the capacity to ensure that cyberspace is secured and free from attackers. Cyberwar is another present reality that the navy has to deal with. Many of the enemies of the United States are unable to amass and establish military strength as hers; therefore, they have planned to commit their resources towards ensuring they infringe into the cyberspace of the public and private entities. Security of the nation and other components can easily be compromised when no adequate measures are in place to identify and block such threats. Fleet Cyber Command has the capability to achieve this because they have been conducting their exercises by the use of cyberspace surveillance (Josten, 2006). On the same note, the US can only win any war by establishing a strong cyberspace capability that can easily penetrate and disrupt opponents’ cyberspace. Absolute freedom in all operations within cyberspace makes the work by Fleet Cyber Command very essential. It also gives this Command a heavy task because both private and public entities need protection from cybercriminals and terrorists.

Fleet Cyber Command Oversight Process

Fleet Cyber Command has a specific structure that works to help identify report and eliminate any threats from hackers. This division of US cyber command works as the central control of all the networks in operation within the country. They have the ability to conduct intelligence on the signals in operation; signals that move in or out of the country, with a view of identifying potential threats to the integrity of the networks and signals. Most importantly, Fleet Cyber Command has the responsibility of supporting all US navy commands in different parts of the world, providing them with information for efficient operations. For efficiency, the Fleet Cyber Command is further divided into task force and task groups who ensure that surveillance is done (Josten, 2006). Cyber experts do most of the work at hand because of the intellect and the knowledge they possess. Some of the qualities possessed by the cyber experts at Fleet Cyber Command include the ability to conduct an analysis of malware, quick response to the hacking incidents, their ability to identify and neutralize cyberattacks, among others.

In case cyber experts come across one or more of these incidents, they are required to act as quickly as possible in order to thwart and potential dangers. They are also required to work with other task groups and task forces in the same order in terms of analyzing the problem at hand. The information about an incident from the Fleet Cyber Command should be communicated to the central US Cyber Command for an appropriate action to be taken. It is important to appreciate the fact that the government has acknowledged in the recent past the need to establish strong strategies towards protecting the country’s cyberspace. Cyberattacks poses the biggest challenge security and the integrity of the nation. On the same note, taskforces have been established to come up with comprehensive strategies that can help protect the cyberspace.

Total elimination of cyberattacks is not possible; however, the aim should be to limit these threats as much as possible. Presently, the navy may not instantly establish the security capabilities of a given program; it would take days to do that. There is need to establish vulnerably awareness of different programs because it helps in determining various measures that can be employed in order to ensure protection. For instance, Iranian hackers had sometime earlier interfered with the Navy Marine Corps Intranet, an incident that raised questions on the vulnerabilities of the program used in the internal networking system. This was an indication of the weakness on the ability to assess the cybersecurity strength.

In the current command oversight process within Fleet Cyber Command, there is need for the government to employ and train permanent employees that will dedicate their work to the surveillance of the cyberspace, as well as coming up with ways of winning the cyberwar. Presently, most of the services within the command are outsourced. The government hires cybersecurity experts who undertake to ensure that proper infrastructures are established for surveillance and protection. However, the failure lies on the need to establish a form of standardization among all the contractors in order to get the value for money. There is need to employ federal employees who are talented and proactive in order to build systems that will last. Doing this will also help the government use the available resources in a prudent way while building a system that easily adapts to the changes and new threats within cyberspace. The main impediment towards attracting young, vibrant, and talented experts into the navy cyberspace comes from the compensation and the slow hiring processes within the federal government.

Cyberspace Governance Assessment

Fleet Cyber Command operations are still under development, with most of the processes still in need of changes in order to have the required capabilities. The cyberspace governance within Fleet Cyber Command is designed in a way that the information collected during the surveillance can be used in order to enhance naval operations. On the same note, this information is also relayed to the US Cyber Command to help in understanding security in other private or public sectors. In this system, Fleet Cyber Commander remains the head who directly reports to the National Security Agency (NSA) and has the responsibility of staffing, training, and equipping consolidated cryptologic workforce within the Fleet Cyber Command. All operations have been realigned in order to ensure that control of all administrative capabilities is streamlined. According to Heniff, Lynch & Tollestrup, (2012), the realignment is the best method that can make the navy a force in terms of cyberspace dominion.

The integrated cyber information produced in the process helps in meeting objectives of attaining cyberspace freedom in order to also gain military objectives. The need to strengthen the process of collecting cyberspace information on a common front is important, something that can only be obtained by establishing strategies that seek to deliver integrated information. As much as governance process is important, the need to establish effective programs and resilience in surveillance should not be overstepped because they determine the success of the surveillance. The information of national importance comes from Fleet Cyber Command to National Cyberspace Security Response Team that ensures proper management of the crisis and threats identified on particular information system. This team also sees to it that proper coordination is undertaken in conjunction with other federal agencies in order to come up with appropriate warnings and protective measures to be adopted by the public and private entities (Josten, 2006).

On the same note, it is proper to say that the same hierarchical method of making decision applies to the implementation of the cyberspace security. Major decisions concerning database the top leadership, something that requires a change in order to allow for the outcome of the surveillance to immediately direct quick actions, makes security at the Fleet Cyber Command. For instance, the cyber risk can occur at any level of online operation, thus, requiring an urgent method of communication for quick decision-making. Cyberspace governance model at Fleet Cyber Command is complicated by the fact that this command works and directs other divisions, operating in many countries in the world. Moreover, business cooperation with other players in terms of supply and distribution is high, something that requires adequate governance system in order to monitor any area of cybercrime.

User Liberties/Rights Assessment

Presently, people grow up in a world without boundaries, as seen in the present technological innovations. Employees value their interaction and communication with the outside world; that has become a global village. Fleet Cyber Command has the responsibility to monitor cyberspace for the sake of military objectives as well as civilian objectives. Outcome from cyberspace surveillance has led to the policies that ensure that the US cyberspace remains secure against attackers. One of the policies is the limited usage by the employees, especially during working hours. Many company’s cyberspace infrastructures are meant for official business only, and any personal use is prohibited (International Strategy for Cyberspace, 2011, May). On the same note, use of portable devices in order to carry or transfer files is prohibited in an attempt in order to avoid intentionally or unintentionally sharing sensitive information with wrong persons.

Fleet Cyber Command has also procured some of the most expensive and sophisticated software that is meant to protect the information. It is no doubt that the unit’s intention is to protect the sensitive information that may lead to harm when leaked out. On the same note, the use of ICT in the present is the best method of doing business as it adds efficiency to the operations, leading to higher revenue. However, there exists a problem in terms of individual rights and the use of social media (Department of Defense, 2011). As noted above, man remains a social being who needs to make interactions with others in order to be effective. This company monitors some of the personal devices handed over to its employees, thus infringing to their privacy. Within a day, you may never to find a person who shares with you a joke or an idea on the online platform. The Constitution guarantees freedom of communication and privacy. This means that monitoring of the usage of the internet infrastructure by the employees is an infringement into their rights given by the constitution.

Awareness through employee training by an expert would be the first thing in an attempt to institute policies that seek to protect the company’s security while still striking a balance with the fundamental human rights. Lack of understanding of the risks involved when cyberspace infrastructure may lead to fatal ignorance on the side of employees. Therefore, training of every personnel would important, indicating the probable losses that may arise from the misusing company’s infrastructure. On the same note, it would be appropriate to ensure that employees are told what can be done not. Laws of the United States are also clear on the cyber-related crimes. This awareness would work towards warning of the dire consequences in case of conspiracy towards cyber-crime. There could be a high probability of unauthorized access to the system by the employees with necessary passwords, thus exposing it to hackers and other criminals. The policy should address the penalty that law stipulates for such an offender.

Prioritized Recommendations

The need to establish a strong cybersecurity system can never be underrated, calling for the need to empower this command unit to be effective in undertaking various duties. The information from the surveillance helps in meeting military, business, civilian as well as national objectives. The best way towards coming up with proper strategy is to fully establish an integrated navy cyberspace operations with a view of achieving joint force operations in the military. The first step towards achieving this will be to identify and codify some of the relevant information necessary by the commanders for daily operations on and off the field. Decision-making requires certain information that enhances tactics and organizations. Identifying these components is the initial stage towards establishing a workable strategy towards effective cyberspace security and usage. On the same note, the current doctrines need to be changed in order to reflect the current challenges posed by cybercrime. For instance, military warfare has matured to very high levels of operation and command (Knahl, 2009). The same maturity is required in the cyberspace in order to understand how to apply different concepts towards achieving specific goals.

Generally, a successful cyberspace security system requires that it be designed to entail all aspects of processes within the organization. This means that the information security team (audit committee) should compose of IT personnel charged with the day-to-day operation of the security system, marketing staff that constantly monitors online information and products on any possible cyber-attack, purchasing personnel who have the responsibility of monitoring and vetting suppliers on the online platform and other risk managers from different departments. Such a team will ensure that constant monitoring is done and necessary measures taken before the financial aspect of the company is not compromised. This team forms the core unit that coordinates all issues that concern cyberspace security. Others may also work alongside to help monitor and gather all relevant information. In order to achieve information security, there will be a need to redefine some of the competencies. Most of the organizations in the current global market have concentrated their focus on training their personnel and developing their cyberspace skills on security data analytics, risk consultancy and cyber risk intelligence (Department of Defense, 2011).

Optimization of navy cyber workforce is another recommendation for proper implementation of the cyberspace strategies. There is needed to come up with cyber workforce that can easily and readily adopt to the rising changes within the cyberspace. The changes should entail recruitment processes and the ability to retain them by motivational concepts like better remuneration. This will require a change from the traditional strict recruitment guidelines that do not attract experts. On the same note, changing the structure to give commanders the ability to look for highly adaptable persons through competitive offers should be in place.


It is common knowledge that cyber security is an increasingly high demand area that requires recruitment of fresh talents. Therefore, the management should look into ways of finding out talented personnel, train and retain them into the company in preparation for the future. Otherwise, I foresee a problem of lack of enough talents to help deal with such cases. Appointment should be done with an open mind while targeting the future prospects of the company. Time is coming when the most valuable assets will be these technological experts. The policies within the organization should balance between the need to protect company’s privacy and the personal rights enshrined in the constitution (International Strategy for Cyberspace, 2011, May). For instance, it is against the US laws to search a private property without permission; therefore, logging into personal documents or files may seem to infringe into private property. In conclusion, cybercrime is a serious threat that must be dealt with every day because it affects large and small businesses alike, and individuals are not spared either (Knahl, 2009).

In order to do this, security team of experts will have to be established in order to focus their attention on any potential threat that could harm the company’s information system. This team should be composed of members from different divisions, who are also charged with the responsibility of overseeing cyberspace in those divisions. Such a team will create a common approach towards dealing with cyber threats, before reporting the findings and recommendations to the board or executive committee for further action. Most importantly, appropriate policies will be required in order to establish a working environment that considers the need for care against exposure to attacks.  Proper training and cybercrime awareness on the potential dangers must be done in order to create a culture of responsibility in terms of the internet infrastructure.




Department of Defense. (2011). DoD Strategy for Operating in Cyberspace. Washington DC:

U.S. Government.

Heniff, B., Lynch, M., Tollestrup, J. (2012). Office of Management and Budget Circular (OMB).

A-11, Part 1. Retrieved April 10, 2015 from from

International Strategy for Cyberspace. (2011, May). Prosperity, Security, and Openness in a

Networked World. Washington: The White House.

Josten, R. (Summer, 2006). Strategic communication: a key enabler for elements of national

power. Iosphere. pp. 16-19. Retrieved April 10, 2015 from

Knahl, M. (2009). Internet Governance based on Multiple-Stakeholders: Opportunities, Issues

and Developments. World Academy of Science, Engineering and Technology 25