Enhancing maritime cybersecurity with technology and policy

Feb 26, 2026 | AI

From the modest Balkan nation of Montenegro, Strahinja (Strajo) Janjusevic has found his life’s trajectory to be a source of profound gratitude, marked by unforeseen turns. His journey began after high school when he was chosen to represent his country abroad, embarking on a path that led him to study cyber operations and computer science at the prestigious U.S. Naval Academy in Annapolis, Maryland.

This foundational experience in cybersecurity has paved the way for his continued academic pursuits. Currently, Janjusevic is a second-year master’s student within the Technology and Policy Program (TPP), an initiative managed by the MIT Institute for Data, Systems, and Society (IDSS).

His current research is a dual effort, involving both the MIT Laboratory for Information and Decision Systems (LIDS) and the MIT Maritime Consortium team. The focus of this work is to bolster the cybersecurity defenses of vital maritime infrastructure. Janjusevic is exploring the application of artificial intelligence, meticulously evaluating proposed solutions through the lens of both technological feasibility and robust policy frameworks.

Here are a few paraphrased options, each with a slightly different emphasis:

**Option 1 (Focus on the “why”):**

> Janjusevic is currently exploring how artificial intelligence can be harnessed to combat cybersecurity threats, with a particular emphasis on the policy ramifications of these evolving technologies, especially within the maritime sector. “My experiences engaging with both academia and industry at a national level have provided me with an unparalleled insight into the complexities of cybersecurity,” Janjusevic stated.

**Option 2 (More active and direct):**

> At the forefront of cybersecurity innovation, Janjusevic’s research centers on deploying AI solutions to address critical security challenges and analyzing the associated policy landscapes. This work is especially relevant to maritime cybersecurity. “Having the opportunity to represent my nation on significant educational and industrial platforms has uniquely shaped my understanding of these pressing cybersecurity issues,” Janjusevic explained.

**Option 3 (Concise and impactful):**

> Janjusevic’s research investigates the application of AI in cybersecurity, scrutinizing the policy implications of these advancements, particularly for maritime security. “My involvement at the highest echelons of my country’s education and industry sectors has afforded me a distinctive viewpoint on the multifaceted nature of cybersecurity challenges,” Janjusevic remarked.

**Option 4 (Emphasizing the unique perspective):**

> With a focus on leveraging artificial intelligence to solve cybersecurity problems, Janjusevic’s current research also delves into the policy implications of these technological leaps, with a special interest in maritime cybersecurity. Janjusevic highlighted, “My role in representing my country at the pinnacle of educational and industrial arenas has equipped me with an exceptional vantage point on the intricacies of cybersecurity.”

A unique U.S. Naval Academy program, designed to foster international partnerships, paved the way for Janjusevic’s journey from Montenegro to Maryland. This initiative selects promising students from allied nations, offering them a prestigious U.S. education.

Janjusevic emerged from the academy with a dual bachelor’s degree, specializing in both Cyber Operations and Computer Science. His academic career was marked by invaluable collaborations with key U.S. institutions, including the military and the National Security Agency. These experiences provided him with a firsthand look at advanced cybersecurity operations, igniting a passion for confronting intricate challenges in the field.

Further broadening his practical expertise, Janjusevic completed internships at two renowned organizations. At Microsoft, he contributed to the development of tools essential for cloud incident response. His time at NASA involved creating visualizations of solar data, supporting critical research applications.

Upon completing his degree, he recognized a persistent need to deepen his expertise, specifically within the fields of artificial intelligence and cybersecurity. The TPP program immediately resonated with him, offering a compelling blend of cutting-edge engineering innovation and the crucial policy considerations for its successful implementation. Janjusevic’s tenure at TPP has marked a significant departure from his experiences at the U.S. Naval Academy, presenting a distinct rhythm and atmosphere. He has particularly valued the opportunity to expand his comprehension across diverse research areas, applying the rigor and knowledge honed during his academy years.

According to Janjusevic, their participation in the TPP program has been an incredibly positive experience. They highlighted the program’s intimate cohort size, which fosters a strong sense of community akin to family, and emphasized that participants are tackling a wide array of significant and impactful challenges.

Here are a few options for paraphrasing “Mitigating the risks of emerging technologies,” each with a slightly different nuance, while maintaining a clear, journalistic tone:

**Option 1 (Focus on Proactive Action):**

> **Navigating the Perils of Tomorrow’s Innovations**

> As cutting-edge technologies rapidly evolve, a critical imperative emerges: actively addressing and minimizing the inherent dangers they present.

**Option 2 (Focus on Foresight and Strategy):**

> **Foreseeing and Managing the Challenges of New Technologies**

> The advancement of emerging technologies necessitates a strategic approach to anticipate and counteract the potential pitfalls and unintended consequences.

**Option 3 (More Direct and Action-Oriented):**

> **Tackling the Risks Associated with Emerging Technological Frontiers**

> Effectively managing the dangers posed by groundbreaking technologies is paramount for their responsible development and integration.

**Option 4 (Emphasizing the “Why”):**

> **Ensuring Safe Passage Through the Landscape of Emerging Tech**

> To harness the full potential of revolutionary technologies, a concerted effort must be made to identify and neutralize the risks they carry.

**Option 5 (Concise and Punchy):**

> **Addressing the Dangers of Tomorrow’s Technology Today**

> Proactive risk management is essential as we confront the evolving challenges of emerging technological advancements.

**Key changes and why they work:**

* **Stronger Verbs:** “Mitigating” is good, but “Navigating,” “Foreseeing,” “Managing,” “Tackling,” and “Ensuring Safe Passage” are more active and engaging.
* **More Descriptive Nouns/Adjectives:** “Emerging technologies” becomes “tomorrow’s innovations,” “new technologies,” “technological frontiers,” “revolutionary technologies,” or “emerging technological advancements.”
* **Adding Context:** Phrases like “inherent dangers,” “potential pitfalls and unintended consequences,” “dangers they present,” and “risks they carry” add depth and explain *why* mitigation is important.
* **Journalistic Tone:** The language is professional, direct, and avoids overly technical jargon. It sounds like a headline or an introductory sentence from a news report.

Choose the option that best fits the specific context and desired emphasis of your writing.

Here are a few paraphrased options, each with a slightly different emphasis, while maintaining a journalistic tone:

**Option 1 (Focus on the interdisciplinary approach):**

> In a significant academic undertaking, Janjusevic’s research uniquely bridges the fields of cybersecurity, artificial intelligence (AI) and deep learning, and control theory alongside physics. The central aim is to fortify the cyber-physical systems inherent in maritime operations, with a particular emphasis on safeguarding older, large vessels. The potential ramifications of compromising these ship networks are severe, posing substantial threats to national security and inflicting considerable economic damage.

**Option 2 (Focus on the threat and solution):**

> A critical vulnerability lies within the cyber-physical systems of maritime vessels, especially large, established ships, according to Janjusevic’s thesis. By integrating expertise in cybersecurity, AI and deep learning, and control theory and physics, Janjusevic proposes new defenses. The imperative to secure these networks is underscored by the severe national security risks and significant economic repercussions that could arise from successful cyberattacks.

**Option 3 (More concise and direct):**

> Janjusevic’s thesis tackles the crucial challenge of securing maritime cyber-physical systems, particularly large, legacy ships, by merging insights from cybersecurity, AI, deep learning, control theory, and physics. The potential for cyber intrusions into these vessels presents a dual threat: jeopardizing national security and causing significant economic disruption.

**Option 4 (Emphasizing the “why”):**

> Understanding the profound implications of cyber threats to maritime infrastructure, Janjusevic’s work synthesizes disciplines including cybersecurity, AI and deep learning, and control theory and physics. The research specifically targets the protection of cyber-physical systems on large, established ships, recognizing that their compromise could lead to severe damage to national security and far-reaching economic consequences.

Each of these options aims to rephrase the original text using different sentence structures and vocabulary while preserving the essential information about Janjusevic’s thesis, its interdisciplinary nature, its focus on maritime cyber-physical systems (specifically legacy ships), and the significant risks associated with their security.

Here are a few paraphrased options, each with a slightly different emphasis:

**Option 1 (Focus on innovation and impact):**

> “Strajo’s innovative approach is poised to revolutionize the fight against maritime GPS spoofing,” states Saurabh Amin, the Edmund K. Turner Professor in Civil Engineering. He highlights the growing threat, noting that these attacks have already led vessels astray in sensitive maritime zones. Strajo’s strategy, which integrates physics-based trajectory modeling with deep learning, offers a powerful, multi-layered defense, capable of identifying threats that would evade any single detection method. Professor Amin further emphasizes that Strajo’s contributions have been instrumental in propelling their ongoing research into threat modeling and attack detection.

**Option 2 (More direct and problem-solution oriented):**

> Maritime GPS spoofing, a growing concern that has already led to vessels being diverted in contested waters, is being challenged by Strajo’s work, according to Edmund K. Turner Professor in Civil Engineering, Saurabh Amin. Professor Amin explains that Strajo’s unique methodology combines physics-based trajectory models with deep learning, creating a robust system that can detect threats missed by individual techniques. This expertise, he adds, has significantly advanced their efforts in developing effective threat modeling and attack detection capabilities.

**Option 3 (Concise and action-oriented):**

> “Strajo is developing a sophisticated defense against maritime GPS spoofing,” reports Saurabh Amin, the Edmund K. Turner Professor in Civil Engineering. He points to recent incidents where vessels have been intentionally misled in disputed waters due to such attacks. Strajo’s solution is particularly effective, he explains, by fusing physics-based trajectory models with deep learning to catch threats that elude standalone methods. Professor Amin concludes that Strajo’s expertise is a vital asset to their ongoing progress in threat modeling and attack detection.

Here are a few paraphrased options, each with a slightly different emphasis, maintaining a journalistic tone:

**Option 1 (Focus on the “How”):**

> Cutting-edge research is leveraging sophisticated threat modeling and an in-depth understanding of vessel behavior to develop artificial intelligence capable of identifying deceptive navigation signals. The core of this innovative framework lies in a dual-pronged approach: an internal LSTM autoencoder meticulously scrutinizes signal integrity, while a physics-based forecaster projects the vessel’s anticipated trajectory by factoring in environmental influences such as wind and sea conditions. By juxtaposing these predictions with actual reported GPS coordinates, the system can reliably differentiate between benign sensor fluctuations and deliberate spoofing attacks. This hybrid technology is engineered to augment, rather than supplant, human expertise, equipping watchstanders with validated navigation data to discern between mere technical malfunctions and calculated cyber intrusions.

**Option 2 (Focus on the “What” and “Why”):**

> A novel AI system is being trained to detect fraudulent navigation signals by integrating advanced threat modeling with realistic vessel movement simulations. This new framework operates by simultaneously analyzing signal quality using an LSTM autoencoder and forecasting a vessel’s path based on real-world physics, including wind and sea state. The critical distinction between normal sensor noise and malicious GPS spoofing is achieved by comparing these AI-generated predictions against the vessel’s reported location. Ultimately, this hybrid system aims to bolster maritime security by providing human operators with reliable navigation data, enabling them to confidently distinguish between minor technical issues and sophisticated cyber threats.

**Option 3 (More Concise and Action-Oriented):**

> Researchers are deploying advanced threat modeling and vessel dynamics to train AI systems for detecting GPS spoofing. The system employs a unique hybrid framework: an LSTM autoencoder assesses signal health, while a physics-based forecaster predicts vessel movements using environmental data like wind and sea conditions. By cross-referencing these predictions with reported GPS positions, the AI can reliably identify malicious attacks versus natural sensor noise. This technology is designed to enhance, not replace, human oversight, offering validated navigation intelligence to help watchstanders differentiate technical glitches from deliberate cyberattacks.

**Key changes made across these options:**

* **Varied Vocabulary:** Replaced words like “utilizes,” “distinguish,” “involves building,” “simultaneously,” “predict,” “comparing,” “effectively,” “empower,” and “replace” with synonyms and more active phrasing.
* **Sentence Structure:** Reorganized sentence beginnings and combined/split clauses for better flow and impact.
* **Emphasis:** Shifted the focus slightly in each option to highlight different aspects of the research (how it works, what it does, its practical application).
* **Journalistic Tone:** Maintained objectivity, clarity, and a focus on the facts and implications of the research.
* **Engaging Language:** Used phrases like “cutting-edge research,” “innovative framework,” “dual-pronged approach,” “meticulously scrutinizes,” and “calculated cyber intrusions” to make the text more compelling.

Here are a few paraphrased options, each with a slightly different emphasis, while maintaining a journalistic tone:

**Option 1 (Focus on direct impact):**

> Janjusevic’s academic pursuits have been significantly bolstered by practical industry exposure. During a summer 2025 internship with Vectra AI, a prominent AI cybersecurity firm, he joined the Network Detection team. His work there centered on probing the security vulnerabilities introduced by emerging technologies, specifically focusing on AI agents and the Model Context Protocol (MCP), the evolving standard for AI agent communication. Janjusevic’s findings revealed how these advancements could be co-opted for autonomous hacking and sophisticated command-and-control operations. This exploration into the security implications of agentic AI has been documented in the recent preprint, “Hiding in the AI Traffic: Abusing MCP for LLM-Powered Agentic Red Teaming.”

**Option 2 (More concise, highlighting the research findings):**

> Bridging academia and industry, Janjusevic has leveraged real-world experience to enrich his research. His summer 2025 internship with Vectra AI’s Network Detection team provided a unique vantage point to investigate the security risks of new technologies, particularly AI agents and the emerging Model Context Protocol (MCP). Janjusevic’s research uncovered the potential for these technologies to be repurposed for autonomous cyberattacks and advanced command and control. The ramifications of these security risks associated with agentic AI were recently detailed in the preprint titled, “Hiding in the AI Traffic: Abusing MCP for LLM-Powered Agentic Red Teaming.”

**Option 3 (Emphasizing the novelty of the threat):**

> Janjusevic is enhancing his academic research by drawing on substantial industry experience. In summer 2025, he contributed to the Network Detection team at AI cybersecurity leader Vectra AI. During his tenure, he delved into the potential threats posed by novel technologies, with a specific focus on AI agents and the burgeoning Model Context Protocol (MCP) for AI agent communication. His investigations demonstrated how this technology could be exploited to conduct autonomous hacking operations and facilitate advanced command and control. The implications of these security risks stemming from agentic AI were recently outlined in the preprint, “Hiding in the AI Traffic: Abusing MCP for LLM-Powered Agentic Red Teaming.”

**Key changes made in these paraphrases:**

* **Synonym substitution:** “enhance” becomes “bolstered,” “enriched,” “drawing on.” “Interned with” becomes “joined,” “contributed to.” “Investigated” becomes “probing,” “delved into,” “uncovered.” “Repurposed” becomes “co-opted,” “exploited.”
* **Sentence structure variation:** Sentences are reordered and combined or split for better flow.
* **Active voice preference:** Where natural, active voice is used.
* **Journalistic language:** Words like “prominent,” “leader,” “vantage point,” “ramifications,” and “implications” add a professional and informative tone.
* **Clearer connection:** Explicitly stating how industry experience *bolsters* academic research.

Janjusevic shared how their industry experience provided invaluable practical knowledge and hands-on exposure to AI model applications for network anomaly detection. This direct engagement with real-world challenges significantly shaped the anomaly detection models developed in their research.

From a global standpoint, the realm of international policy encompasses the strategies and decisions governments undertake to interact with and influence other nations. This involves a complex interplay of diplomacy, economics, security, and cultural exchange, all aimed at navigating the intricate landscape of global affairs. The ultimate objective is often to advance national interests while contributing to broader international cooperation and stability.

Here are a few paraphrased options, each with a slightly different emphasis, maintaining a journalistic tone:

**Option 1 (Focus on Strajo’s impact):**

> According to Fotini Christia, director of the Institute for Data, Systems, and Society (IDSS) and a key figure in the MIT Maritime Consortium, Strajo’s contributions to the cyber-physical security of merchant vessels are exceptionally valuable. Christia, who is also the Ford International Professor of the Social Sciences, highlighted that Strajo combines sharp intellect and drive with an instinctive understanding honed by his Navy experience, which significantly bolsters the research and translates it into practical policy recommendations.

**Option 2 (More direct, highlighting dual strengths):**

> Fotini Christia, a leader within the MIT Maritime Consortium and director of the Institute for Data, Systems, and Society (IDSS), praised Strajo’s work on the cyber-physical security of merchant vessels. Christia, also the Ford International Professor of the Social Sciences, noted that Strajo’s Navy background provides a crucial instinct that complements his intelligence and energy, grounding the research in real-world, actionable policy.

**Option 3 (Emphasizing the grounding in practical application):**

> The research into cyber-physical security for merchant vessels is significantly advanced by Strajo’s contributions, according to Fotini Christia, director of the Institute for Data, Systems, and Society (IDSS) and a leader of the MIT Maritime Consortium. Christia, the Ford International Professor of the Social Sciences, explained that Strajo’s high level of intelligence and energy, coupled with a powerful instinct developed through his Navy training, ensures the research remains grounded and leads to tangible policy solutions.

**Option 4 (Concise and impactful):**

> Strajo’s work on cyber-physical security for merchant vessels is distinguished by his sharp intellect, high energy, and a deep-seated instinct cultivated during his Navy service, states Fotini Christia, director of IDSS and a leader of the MIT Maritime Consortium. Christia, the Ford International Professor of the Social Sciences, emphasized that this combination makes Strajo’s research particularly effective in informing actionable policy.

Here are a few paraphrased options, each with a slightly different emphasis, while maintaining a professional, journalistic tone:

**Option 1 (Focus on collaboration and impact):**

> As part of the Maritime Consortium, Janjusevic is actively contributing to crucial cybersecurity initiatives. This collaborative body, uniting academia, industry, and regulatory bodies, is dedicated to forging advanced technological solutions, establishing industry-wide standards, and shaping essential policies. The consortium’s reach extends internationally, with notable partnerships including entities from Singapore and South Korea.

**Option 2 (More direct and action-oriented):**

> Janjusevic is involved in the cybersecurity endeavors of the Maritime Consortium, a multi-stakeholder alliance comprising academic institutions, commercial enterprises, and government regulators. Their collective mission is to engineer technological advancements, define industry benchmarks, and create effective policy frameworks. This consortium also engages in international cooperation, notably with members from Singapore and South Korea.

**Option 3 (Highlighting the comprehensive nature of the work):**

> Within the Maritime Consortium’s cybersecurity operations, Janjusevic plays a key role. This collaborative platform brings together experts from academic, industrial, and regulatory sectors to pioneer technological innovations, set robust industry standards, and develop forward-thinking policies. The consortium’s collaborative network includes international partners, such as those based in Singapore and South Korea.

**Option 4 (Concise and emphasizes the consortium’s scope):**

> Janjusevic is a participant in the cybersecurity efforts of the Maritime Consortium, an organization that bridges academia, industry, and regulatory agencies. Together, they are working to develop technological solutions, industry standards, and policies. The consortium also boasts international collaboration, with members from countries like Singapore and South Korea.

Choose the option that best fits the specific context and desired tone of your writing.

The rapidly evolving landscape of AI cybersecurity, coupled with the potentially severe repercussions of breaches, underscores the critical need for robust policy development, according to Janjusevic. He emphasizes that significant work remains to be done in shaping the regulatory framework for this dynamic field.

Here are a few paraphrased options, maintaining a journalistic tone and emphasizing different aspects:

**Option 1 (Focus on Scope and Impact):**

> Janjusevic is actively involved in orchestrating two significant upcoming events: the Harvard European Conference in February, poised to gather international officials and diplomats, and the Technology and National Security Conference in April. This latter event, a joint initiative between Harvard and MIT, will unite leading figures from government, industry, and academia to address pressing national security concerns.

**Option 2 (More Concise and Action-Oriented):**

> Currently, Janjusevic is instrumental in organizing two prominent conferences. In February, the Harvard European Conference will convene global officials and diplomats. Following this, in April, the Technology and National Security Conference—a collaborative effort between Harvard and MIT—will convene top government, industry, and academic leaders to confront critical national security issues.

**Option 3 (Highlighting Collaboration and Expertise):**

> Janjusevic’s current responsibilities include the organization of two key conferences. The Harvard European Conference, scheduled for February, will serve as a global forum for officials and diplomats. Additionally, he is involved with the Technology and National Security Conference in April, a collaborative venture between Harvard and MIT that will gather preeminent leaders from government, industry, and academia to confront complex national security challenges.

**Option 4 (Emphasizing the “Tackling Challenges” Aspect):**

> Two major conferences are currently being shaped by Janjusevic’s organizational efforts. The Harvard European Conference in February is set to be a global gathering of officials and diplomats. Subsequently, in April, the Technology and National Security Conference, a joint Harvard-MIT initiative, will bring together distinguished leaders from government, industry, and academia to confront and resolve critical national security challenges.

Here are a few options for paraphrasing the provided text, each with a slightly different journalistic emphasis:

**Option 1 (Focus on Ambition and Impact):**

> Janjusevic articulates a clear vision for their career: to leverage artificial intelligence to drive progress within the cybersecurity sector. Simultaneously, they aim to foster collaborative innovation between the United States and Montenegro. “My objective is to serve as a vital link between Europe and the U.S. in the critical domains of national security, AI, and cybersecurity, sharing my expertise across both regions,” Janjusevic explained.

**Option 2 (Highlighting the “Bridge” Metaphor):**

> Seeking a role where they can significantly impact the cybersecurity landscape through AI, Janjusevic also emphasizes a desire to spearhead collaborative efforts and innovation between the United States and Montenegro. “I want to be a bridge connecting Europe and the U.S. in national security, AI, and cybersecurity, bringing my knowledge to both sides,” they stated.

**Option 3 (More Direct and Concise):**

> Janjusevic is actively pursuing a position that will allow them to influence and advance the cybersecurity field using AI, while also cultivating collaboration and innovation between the U.S. and Montenegro. Their ambition is to act as a conduit for knowledge transfer between Europe and the United States, focusing on national security, artificial intelligence, and cybersecurity.

**Option 4 (Emphasizing Cross-Cultural and Technological Leadership):**

> With a clear objective to shape the future of cybersecurity through AI, Janjusevic is also committed to fostering a spirit of innovation and cooperation between the United States and Montenegro. “My aspiration is to be a crucial facilitator, a bridge between Europe and the U.S. in the interconnected fields of national security, AI, and cybersecurity, disseminating valuable knowledge across both continents,” Janjusevic shared.

These paraphrased versions aim to:

* **Be Unique:** They rephrase the original sentences using different vocabulary and sentence structures.
* **Be Engaging:** They use stronger verbs and more dynamic phrasing to capture the reader’s attention.
* **Maintain Core Meaning:** The central ideas of influencing cybersecurity with AI, fostering US-Montenegro collaboration, and acting as a bridge remain intact.
* **Adopt a Journalistic Tone:** The language is professional, clear, and objective, suitable for reporting.

Related Articles