The Third International Consultative Committee meeting of DocksTheFuture project took place on 29 July 2020 between 11.00-12.15. The Objective of the conf.call  was to discuss how to implement the European Green Deal objectives in European ports , the drivers and challenges. For this purpose, two officials from the ESPO were invited to present.

The participants of this meeting were from three below groups:

  • The ICC extinguished members:   Michele Acciaro, Paul Brewster, Angela Carpenter, Drik’t Hooft, Alessandro.Panaro
  • ESPO: Isabelle Ryckbost -Secretary General, & Valter Selén – Senior Policy Advisor Sustainable Development, Cruise and Ferry Network, EcoPorts Coordinator
  • Docks The Future (DTF) project’s partners: Circle s.p.a: Reza Karimpour, Alexio Picco, PortExpertise group: Joris Claeys, Peter Bresseleers, Magellan Association: Andrea Hrzic, ISL Group, and Circle Group.

Mr.Reza Karimpour from Circle s.p.a organised this  Docks The Future conf.call and welcomed the participants. Mr.Alexio Picco from Circle s.p.a that leads the project welcomed the participants of the meeting and explained about the project and its progress. He gave a brief introduction to the project. He mentioned that the project is coordinated by Circle S.p.A (Italy) as the leader of the project working group including ISL – Institut für Seeverkehrswirtschaft und Logistik  (Germany) ,Magellan (Portugal), PortExpertise (Belgium) , University of Genoa (Italy).

After welcoming, Mr. Alexio Picco left the floor to  Ms. Isabelle Ryckbost -Secretary General to present the “ESPO’s Roadmap to implement the European Green Deal objectives in ports”. She started with mentioning the overall view of the EU Green Deal with a focus on three elements of: More than lowering emissions = New Growth strategy, Transforming the economy, “transforming the way we produce and consume”, and Sustainable product policy “Will frame everything what is happening”.

In continuation, she added that Green deal goals are:

  • Net-zero by 2050
  • 50 to 55% by 2030
  • 90% CO2 emission reduction by 2050 for transport
  • New Climate Law: enshrining carbon neutrality by 2050 into law

It was stated that ESPO welcomes Europe’s ambition to be the world’s first net zero emission area by 2050. However, this ambition must be delivered in the most effective way while the competitiveness of Europe’s economy must be safeguarded. In addition, it should be noted that achieving this objective will require an unprecedented level of cooperation across all policy departments and stakeholders.

M.s Isabelle at this stage highlighted the importance of the EU Ports as key strategic partners at the crossroads of supply chains, clusters of energy, and clusters of industry clusters of blue economy. They can be a key strategic partner in making the European Green Deal happen . . . . . . . . continue reading the report on the DocksTheFuture website here


Costa Cruises has introduced the Costa Safety Protocol, a new set of health and safety measures designed to support the cruise line’s return to operation after the Covid-19 pandemic.

The cruise line has worked with a panel of independent scientific experts to develop the protocol in line with global and national health guidelines. Crew will be screened for Covid-19 in their country of residence including two different swab tests for confirmation of suspected cases. They will then be tested a third time upon their arrival in Italy, with those confirmed negative to be allowed onboard for a 14-day period of quarantine. Crew will then continue to be monitored with daily temperature checks and swab tests every month.

Upgraded digital procedures, such as online check-in and self-certification, will be provided for guests, along with the possibility to book services onboard using the MyCosta app. Health screenings with temperature checks will be carried out at every access and exit to the ship, and they will be available through self-service electronic devices onboard the vessel. Social distancing will be observed in the cruise terminal, with similar measures for shore excursions.

The number of guests onboard will be reduced in order to guarantee appropriate distancing, and it will be mandatory to wear masks when indoors. Entertainment offerings have also been modified to allow for more shows with smaller groups of people, while self-service restaurants will not be operated.

More frequent cleaning will be carried out using specialist sanitation products, and additional disinfection dispensers will be placed at check-in and onboard. The onboard ventilation systems have been equipped with new filters to ensure high filtering efficiency of fresh air from outside the ship, rather than recirculating air from inside.

Processes have also been developed to facilitate the care, disembarkation and return home for any patients who are confirmed to have Covid-19. Specific training modules will be created concerning compliance with the new protocols and the implementation of the management system.

Following the development of the protocol, Costa has applied to receive RINA’s Biosafety Trust Certification. The scheme will conduct a series of audits both on the ships and onshore to confirm that the appropriate measures have been taken to manage health risks.

Source: cruiseandferry


The Jacksonville City Council has unanimously awarded the Jacksonville Port Authority (JAXPORT) $75m for the ongoing harbour deepening project.

The amount is comprised of a $35m grant and a $40m loan.

“It’s a historic win for our community and the 15,000 jobs that will be created or protected by the Jacksonville Harbour Deepening Project,” JAXPORT said.

The project to deepen the Jacksonville shipping channel to a maximum depth of 12.5m (50 ft) from its current depth of 10m (40 ft) will be completed in 2023. Upon completion of the deepening the SSA Jacksonville Container Terminal at Blount Island will feature a vessel turning basin and have the ability to simultaneously accommodate two post-Panamax vessels.

It will allow larger container ships to call JAXPORT with more cargo on board, bringing more profit to the region.

Jacksonville’s maritime labor unions have advocated for a deeper harbour for more than a decade and describe the funding as “monumental for the hardworking men and women who work in and around JAXPORT’s terminals.”

“As Northeast Florida’s economic engine, JAXPORT will continue to play a vital role in the economic recovery of our region and state,” JAXPORT ceo Eric Green said.

Earlier this year, the US federal government also allocated $93m for the next phase of deepening the Jacksonville shipping channel.


At least four ships – Jouri (IMO 9174475) City of Rome (IMO 9174763) Raouf H (IMO 8325535) and Mero Star IMO 8321682) could have been moored in the vicinity of Tuesday’s massive explosion in the port of Beirut, which looks to have put the port out of action for the foreseeable future.

Lebanon has placed under house arrest the Beirut port officials responsible for storage and security, pending an investigation into the explosion, which looks likely to have killed hundreds, injured thousands and caused property damage worth north of a billion dollars.

The Lebanese army will oversee the house arrests while the investigation continues.

Lebanese President Michel Aoun said that 2,750 tonnes of ammonium nitrate had been stored at the site continuously for the past six years. Aoun said that long-term storage of a large quantity of explosive material so close to central Beirut was “unacceptable.”

Maritime security firm Dryad Global said that the explosion was probably an accident. “At this stage, it is likely that this incident is an industrial accident, and did  not suggest military or terrorist activity. The presence of naval assets within the area was not indicative of any likelihood of potential targeting by foreign actors, said Dryad, adding that “the area surrounding the port location is not a key location associated with incident reporting. The risk to vessels intending to transit to or in the vicinity of Beirut is not immediately escalated as a result of this incident. However, on account of the cessation of all operations at the port and potential for chemical contamination, all vessels should avoid.”

Customs chief Badri Daher told LBCI TV that his agency had repeatedly asked for the ammonium nitrate to be removed from the port, but he said that “this did not happen, and we leave it to the experts to determine the reasons”.

The port’s general manager Hassan Koraytem told local broadcaster OTV that the ammonium nitrate had been in the port for six years, following a court order. However, despite instructions from the customs department and state secretary to move or export it, “nothing happened”, he said.

A letter shared on social media showed that on several occasions between 2014 and 2017 customs officials had warned judges of the risks associated with storing the explosives in Hangar 12.

How the material might have found its way into Hangar 12 was revealed by the FleetMon web site.

Russian-owned general cargo vessel Rhosus set sail from Georgia to Mozambique in September 2013, carrying 2,750 tonnes of ammonium nitrate.

The Moldovan-flagged vessel called at Beirut port after the vessel suffered technical difficulties. It was inspected by Port State Control officers, who found “deficiencies” and banned it from sailing. That left the Rhosus stranded in Beirut.

The majority of the ship’s Ukrainian crew were repatriated on the grounds that they were in “imminent danger” due to the explosive nature of the cargo on board.

FleetMon said that the Rhosus was owned and operated by Mr Grechushkin Igor, a Russian citizen who in 2014 was resident in Cyprus. The last known manager was Teto Shipping, Cyprus. But the Rhosus was, effectively, abandoned. The owner of the cargo also declared abandonment. The ammonium nitrate was later stored in Hangar 12, which on Tuesday appeared to have been ignited by the Hangar immediately to the east of it, which had caught fire shortly before.

However, none of this has yet been confirmed officially.

Ammonium nitrate is a crystal-like white solid which is made in large industrial quantities. Its biggest use is as a source of nitrogen for fertiliser, but it is also used to create explosions for mining. If a large amount of material remains in the same place for a long time it begins to decay. If it absorbs moisture it can solidify. Also, former senior military intelligence officer Philip Ingram told BBC Radio 4’s Today programme that the longer it is left, the more likely it will get contaminated with items such as fuel oil. Once that happens it can produce a reaction in the chemical. “It generates its own heat and, once it’s started, it continues to generate it and that will build up over time,” Ingram said, adding that this could “then lead to the high-order explosion that we saw in those horrific videos that came out of Beirut.”

Lebanon’s ability to import food supplies will be minimal now that its main port is unusable. In addition, a grain silo next to the Hangars that exploded was severely damaged. Food supplies for Lebanon could become a critical factor within weeks.

The size of yesterday’s explosion can perhaps be better appreciated if one realizes that the Oklahoma City bombing in 1995, which destroyed a federal building and killed 168 people, was caused by two tonnes of ammonium nitrate – less than 1/1000th of the material which made up yesterday’s blast.

The force was so great that the ground beneath the hangar was vaporized, leaving the sea to enter the gap.

Jouri (IMO 9174475)

1999-built, Lebanon-flagged, 9,950 gt livestock carrier owned by Etab Shipping SA care of manager Safe Sea Services Sarl of Jounieh, Lebanon

City of Rome (IMO 9174763)

1999-built, Isle of Man-flagged, 9.950 gt vehicles carrier owned by Eldorado Maritime Inc care of manager Fairmont Shipping (Canada) of Vancouver, BC, Canada. Entered with Japan Club (Tokyo Office) on behalf of Eldorado Maritime Inc.

MeroStar (IMO 8321682)

1983-built, Sierra Leone-flagged, 3,780 gt general cargo ship Mero Star owned by Friends Shipmanagement Inc care of manager El Reedy Shipping Agency of Damietta, Egypt.

Raouf-H (IMO 8325535)

1985-built, Comoros-flagged, 4,362 gt general cargo ship owned by Raouf Marine Co SA care of manager Cedar Marine Services of Tripoli, Lebanon.

https://www.fleetmon.com/maritime-news/2014/4194/crew-kept-hostages-floating-bomb-mv-rhosus-beirut/


Cargoes have come off ships at sea it seems like forever. Some years ago a ship suffered a casualty transiting the English Channel in a storm. Much of its cargo of lumber and other floating items washed ashore on the southwest English coast. Before the authorities could arrive, enterprising local residents gathered it up.

Nowadays, the majority of non-bulk cargo is carried in containers. Container ships have gotten larger and are capable of carrying thousands and thousands of containers. The ships have greater length, greater breadth, and greater draft. They also have greater air draft. Containers at or near the top of each stack swing through a greater arc as the ship rolls than do those located at or near the bottom of the stack.

One source estimates that approximately 10,000 containers are lost at sea annually due to falling overboard from underway vessels, but it is unclear how this estimate was derived. Given the millions of annual container transits, this is an impressive testament to good cargo handling and seamanship. The World Shipping Council, an association of the major container shipping companies, representing 80% of the total global vessel container capacity, states that ships of its members lost an average of 1,382 containers annually during the period 2008-2019.

Until recently, governments only got involved in container losses if they created a hazard to navigation (such as by floating) or if a hazardous cargo were involved. Otherwise, the loss was treated as an insurance matter between the involved parties.


See related story: Insurers Discuss Container Casualty Causes


Lately, though, governments have shown great concern about containers lost within their territorial seas (generally 12 nautical miles offshore) and potentially further, particularly if the cargo is deemed hazardous.

In February 2014, the container ship Svendborg Maersk lost 517 containers during heavy weather while transiting the Bay of Biscay. At the request of the French government, Maersk hired a survey vessel which located most of the containers so that fishing vessels would not inadvertently entangle their nets. One of the lost containers later washed ashore in England unleashing 11 million very wet cigarettes. This incident ranks as the largest recorded overboard container loss to date.

On 31 May 2018, the container ship YM Efficiency lost approximately 80 containers during heavy weather off southeast Australia. The owner paid for recovery and cleanup of containers that washed ashore or were found in the vicinity of the coast but has allegedly denied responsibility for recovery of containers on the seafloor in deeper waters.

On 1 January 2019, the container ship MSC Zoe reported the loss of approximately 342 containers during a storm in the North Sea. Most of the containers soon washed ashore on the Frisian Islands of the Netherlands and Germany. The Netherlands government has opened an investigation into the incident.

On 24 May 2020, the container ship APL England lost 50 containers in waters about two kilometers deep during heavy seas about 73 kilometers southeast of Sydney. Fifteen containers have washed ashore but the others remain missing. A formal written undertaken of $22.5 million was required before the vessel was released from detention to ensure remediation of all impacts of the incident. The owner has been directed to search the seafloor for the containers and recover containers as agreed with the Australian Maritime Safety Authority (AMSA). Charges have been laid against the master for pollution and/or damage to the Australian marine environment as a result of poor cargo loading. The incident is under investigation.

On 22 June 2020, a deck barge under tow from Honolulu to Hilo lost 21 containers in a storm. The U.S. Coast Guard is requiring the operator of the barge to locate and recover the containers. The incident is under investigation.

On 26 June 2020, the container ship Navios Unite lost three containers in rough weather approximately 33 nautical miles off southwest Australia. The Australian Maritime Safety Authority (AMSA) immediately launched an aircraft to search (albeit unsuccessfully) for the containers but has issued no follow-up reports.

There are indications that the design of modern container ships may be a significant factor in the loss of shipping containers overboard. These ships are designed chiefly to achieve two goals: maximize carrying capacity and operate efficiently at high speed. Thus, the ships have wide bow flare and wide beams that minimizes frictional resistance as the bow passes through the water. As the wave crest moves aft, the bow pitches down. If the seas are on either forward quarter, this causes the ship to roll. Due to a combination of the vessel’s speed and the offsetting wave action, the roll can sometimes become synchronous resulting in increasing roll. The dangers are exacerbated in vessels with flat sterns and in heavy sea conditions. The combination of all these factors can result in parametric rolling. This condition can occur very rapidly, going from moderate rolling to rolling in excess of 30° in just a few wave cycles. Parametric rolling has been implicated or suspected in many of the instances cited above. Naval architects and ship designers would do well to include this consideration in their future work. Masters and deck officers of container ships should be alert to signs of parametric rolling and take immediate action to ameliorate the situation.

The APL England lost at least 50 containers in heavy seas off the coast of Australia in May 2020. (Photo: Australian Maritime Safety Authority)

Source: maritimeprofessional


Ecochlor said it has received Type Approval from the Norwegian Maritime Authority (NMA) for the IMO BWMS Code (MEPC.300(72) / revised 2016 G8) standards. The new certification applies to the entire range of Ecochlor ballast water management systems (BWMS), with flow rates of between 500 m3/hr. and 16,200 m3/hr., meaning that vessel owners may continue to install Ecochlor’s BWMS after the IMO BWMS Code October 28, 2020 deadline.

Ecochlor’s BWMS uses a two-step treatment process to treat ballast water; filtration and chlorine dioxide. Treatment is during uptake only, with no discharge neutralization step required.

The company completed the additional testing required for active substance technologies for full approval in marine, brackish and fresh waters earlier in the year. The tests confirmed that no changes in equipment or in the operation of the Ecochlor BWMS were required.

Ecochlor’s Vice President of Operations, Pete Thompson, coordinated the testing and documentation efforts for Type Approval. He commented, “For two decades we have continued to test the effectiveness of our system to the highest standards available worldwide. This commitment reinforces our determination to bring a quality, reliable BWMS to the maritime industry.”

After October 28, 2020, all vessels installing a BWMS must comply with the international BWMS Code. Approval pursuant to the previous G8 guidelines (MEPC.174(58)) will no longer be acceptable. Ecochlor is among a limited number of BWMS manufacturers presently providing G8 compliance to shipowners.

“This latest regulatory approval is another example of Ecochlor’s unwavering commitment to obtain and maintain regulatory approvals from Class Societies and Flag Administrations across the globe, even as the requirements continue to evolve,” said Steve Candito, Ecochlor’s CEO.

Source: marinelink


A feature from Volume 1, Issue 1 of Pacific Ports Magazine
By Christy Coffey, Vice President of Operations, Maritime Transportation System ISAC

First, we would like to thank the Association of Pacific Ports for requesting a blog. We are looking forward to speaking at their 107th annual event in 2021.

The concept of collaborating as a maritime community to identify, detect and protect against threats to the maritime transportation system (MTS) has a long tradition in the Pacific. This has been true whether facing a wide variety of threats and hazards and continues today. Look at the COVID-19 virus and how communities are using crowdsourcing, with public and private sector organizations working together locally and globally, to identify and move much-needed supplies and perform research.

Another example we regularly see relates to weather-related emergency response scenarios. These events are an excellent example of how public and private sector organizations work together to address and recover from the threat. While storms are not entirely predictable, we are aware that they occur, we understand the range of their potential impacts, and understand that there are actions that both sets of stakeholders are responsible for taking. So, the MTS develops and exercises plans to ensure preparedness.

Cyber risk management and the MTS 

When cybersecurity professionals in the Pacific apply the maritime community traditions with their own best practices from the NIST Cybersecurity Framework (www.nist.gov/cyberframework/online-learning/five-functions) — Identify, Protect, Detect, Respond, and Recover — the community can become more resilient to cyber risks in the face of motivated cyber adversaries. While information security professionals, or their organizational team, often focus on internal, individual activities to manage cyber risk, the sharing of threat information can serve as a force multiplier. Sharing information allows multiple organizations to more quickly identify vulnerabilities, threat activity and effective countermeasures. Rather than each individual stakeholder trying to counter cyber-attacks on their own, we can more efficiently tackle challenges at the community level for multiple reasons.

First, given the resources that cyber threat actors are pouring into their capabilities, the resources required to defend against threats is currently insufficient, especially when efficient use of those resources is not maximized. We believe the maritime community well understands the resource challenges that are present.

Second, the MTS continues to rapidly apply new technologies to port environments to increase operational efficiencies. Information technology (IT), operational technology (OT), and Internet of Things (IoT) technologies are being quickly integrated in port operations. These technologies are being integrated less often by single organizations, but frequently across the MTS ecosystem by multiple stakeholders including suppliers, vendors, and operators of other modes of transportation. As a result, IT, OT, and IoT cybersecurity challenges have become community challenges. However, we often try to address them as individual organizational challenges.

Third, we know that there is a shortage of cybersecurity expertise around the globe, and even fewer professionals that are focused on the specific challenges of maritime environments. This shortage places additional pressure on organizations. While the initial reaction to this pressure might be to focus those resources internally, we understand the efficiencies generated by pooling resources into a larger community effort. A team of resources can accomplish more than the sum of its parts.

U.S. Government is adjusting its focus

Well, we’re starting to see government actions to focus resources on these maritime community cybersecurity challenges. In February, the Department of Homeland Security’s (DHS) Federal Emergency Management Agency (FEMA) released the Port Security Grant Program (PSGP) Notice of Funding Opportunity which prioritized cybersecurity as the one area that “attracts the most concern” and subsequently included it as a funding priority for this year’s grants. This is certainly a welcome reprioritization.

A month later, the U.S. Coast Guard published the Navigation and Vessel Inspection Circular (NVIC) No. 01-20: Guidelines for Addressing Cyber Risks at MTSA Regulated Facilities which requires regulated facilities to address cyber risk in their Facility Security Assessments (FSAs) and Facility Secur-ity Plans (FSPs). Industry had been eagerly awaiting this NVIC. While it provides some clarification regarding MTSA requirements, the Coast Guard also released a “Cyber Job Aid” to “provide the service’s marine safety personnel with additional guidance as they address facilities’ documented cyber vulnerabilities.”

Unfortunately (and please keep in mind challenges #2 and #3 above), this guidance is being read by some who may not understand the details of cybersecurity as to what is required to manage cyber risk. The NVIC and the “Cyber Job Aid” fail to mention some of the basics of cybersecurity (e.g., access control lists, alerts, securing APIs, asset inventory, availability — those are just some of the As, let alone B-to-Z).

Helping connect the community

How can we help break this cycle by managing risk through “checklist cyber controls” to address compliance requirements?  First, we have to acknowledge the challenges above as well as the limitations of traditional approaches. The MTS-ISAC community, which engages both public and private sector stakeholders, is leveraging historical, regional relationships in a new way to address local cybersecurity challenges while maintaining global connectedness and situational awareness.

The MTS-ISAC has issued several TLP:GREEN Advisories that highlighted how threat actors have targeted MTS critical infrastructure, and how security controls can prevent unauthorized access to port systems. These advisories are shared quickly throughout the MTS-ISAC community and then more broadly with the maritime community with actionable intelligence and cybersecurity control recommendations to help other MTS stakeholders prevent similar cyber risk from impacting them. Stakeholders have not seen this type of timely advisory used in the maritime sector other than by the MTS-ISAC.

While working at the international as well as the local level to share malicious and suspicious cybersecurity activity is effective, local communities also provide a connectedness for working together on educational initiatives, adoption of best practices, and incident preparedness through exercises and response plans. We will be more successful in mitigating cyber risks through an MTS and critical infrastructure all-hands approach — private and public sector working together, private sector working together at a local level with global connectedness, and cross-sector collaboration. In addition to issuing regular TLP-GREEN advisories to trusted maritime stakeholders, the MTS-ISAC is holding regular webinars to raise awareness on a variety of maritime cybersecurity topics, including a recent informational webinar on protecting GPS, and supporting local maritime cybersecurity exercises.

For more information on the MTS-ISAC, visit https://www.mtsisac.org/. We hope you will join our community and learn more about efforts underway to manage cyber risk at the Maritime Cybersecurity Summit in Orlando, FL November 4-5, 2020 (https://www.maritimecybersecuritysummit.com/).  


Although shipowners have until 1 January 2020 to retrofit cyber risk management into their ship safety management systems to meet IMO’s updated requirements within the International Ship Management (ISM) Code,

But owners should work with shipyards to adopt cyber-secure operational technology (OT) during ship construction, panellists said during Riviera’s ‘Cyber security: readying for the ISM Code’s 1 January 2021 requirements’ webinar.

This was held on 5 August in association with premier partner ClassNK and sponsor F-Secure as part of Riviera’s Maritime Cyber Security Webinar Week.

Panellists included ClassNK cyber security team deputy manager Makiko Tani, TÜV Rheinland director for consulting services in Asia Pacific for cyber security and functional safety Rajeev Sukumaran, Moran Cyber managing director Captain Alex Soukhanov and Beazley senior risk manager Kelly Malynn.

During the webinar, they discussed how shipping companies can incorporate cyber security into their safety management systems no later than the first annual verification of the company’s document of compliance following 1 January 2021.

The panellists clarified IMO’s requirements, confirmed what owners and operators need to do now, and underlined the help and advice available.

Ms Tani said cyber security “should not just be about compliance” but could open “new opportunities for business and new innovations”. She said owners with existing fleets need to understand the OT on ships and required cyber risk controls. “Aim high, but start small,” Ms Tani said. “Start from knowing the vessels and being aware of the onboard OT and IT, and where these meet.”

This is easier if owners engage with shipyards and classification societies during the newbuilding phase.

“Ships can be designed to be cyber-secure,” said Ms Tani. “Ships can be constructed with cyber security capacity” and with class society cyber secure notations.

Mr Sukumaran agreed cyber security should start with ship design. “Builders, designers, owners, etc all need to be taking in cyber security,” he said.

Cyber security was not just about onboard IT and OT, said Mr Sukumaran, as ships were part of a much wider ecosystem involving ports and supply chains. “It is not just about technology, owners need supporting processes and procedures,” he said.

Capt Soukhanov brought a seafarer’s perspective to cyber risk management in his presentation. He agreed cyber security should be incorporated in the build stage. “We are currently retrofitting cyber security” into existing ships, he said.

Which is why all of the supply chain needs to be included in the process. “Our number one priority is the business strategy, as digitalisation needs to be protected,” Capt Soukhanov said, adding that ship operators and vendors “should collaborate and work together to protect onboard systems”.

Ms Malynn said vessel owners should use these requirements to incorporate cyber risk management under the ISM Code “as an opportunity to get to know vessels”. It is also an opportunity to review insurance cover for cyber risk.

She recommended owners conduct risk assessments and gain a better understanding of the cyber threats and vulnerabilities on ships. “Risk assessment quality is important. Owners need to invest in this,” Ms Malynn said.

You can view the webinar, in full, along with the rest of our Cyber Security Week webinars in our webinar library.

And you can sign up to attend our upcoming webinars on our events page.

Source: rivieramm


Cyberattacks on the maritime industry’s operational technology systems have increased by 900% over the last three years with the number of reported incidents set to reach record volumes by year-end, according to Israeli cybersecurity specialist Naval Dome.

Addressing port and terminal operators during an online forum last week, Robert Rizika, Naval Dome’s Boston-based Head of North American Operations, explained that in 2017 there were 50 significant OT hacks reported, increasing to 120 in 2018 and more than 310 last year. He said this year is looking like it will end with more than 500 major cyber security breaches, with substantially more going unreported.

Rizika said that since NotPetya – the virus that resulted in a $300 million loss for Maersk – “attacks are increasing at an alarming rate”.

Recalling recent attacks, he told delegates that in 2018 the first ports were affected, with Barcelona, then San Diego falling under attack. Australian shipbuilder Austal was hit and the attack on COSCO took down half of the shipowner’s US network.

He said this year a US-based gas pipeline operator and shipping company MSC have been hit by malware, of which the latter incident shut down the shipowner’s Geneva HQ for five days. A US-based cargo facility’s operating systems were infected with the Ryuk ransomware, and last month the OT systems at Iran’s Shahid Rajee port were hacked, restricting all infrastructure movements, creating a massive backlog.

Intelligence from Iran, along with digital satellite imagery, showed the Iranian port in a state of flux for several days. Dozens of cargo ships and oil tankers waiting to offload, while long queues of trucks formed at the entrance to the port stretching for miles, according to Naval Dome.

Emphasising the economic impact and ripple effect of a cyber-attack on port infrastructures, Rizika revealed that a report published by Lloyd’s of London indicated that if 15 Asian ports were hacked financial losses would be more than $110 billion, a significant amount of which would not be recovered through insurance policies, as OT system hacks are not covered.

The network connecting RTGs, STS cranes, traffic control and vessel berthing systems, cargo handling and safety and security systems, etc., – are all under threat, Rizika said.

“Unlike the IT infrastructure, there is no “dashboard” for the OT network allowing operators to see the health of all connected systems. Operators rarely know if an attack has taken place, invariably writing up any anomaly as a system error, system failure, or requiring restart.

“They don’t know how to describe something unfamiliar to them. Systems are being attacked but they are not logged as such and, subsequently, the IT network gets infected,” Rizika explained.

“What is interesting is that many operators believe they have this protected with traditional cybersecurity, but the firewalls and software protecting the IT side, do not protect individual systems on the OT network,” he said.

An example would be the installation of an antivirus system on a vessel bridge navigation system (ECDIS) or, alternatively, a positioning system in a floating rig DP (Dynamic Positioning), or on one of the dock cranes on the pier side of the port.

“The antivirus system would very quickly turn out to be non-essential, impairing and inhibiting system performance. Antivirus systems are simply irrelevant in places where the attacker is anonymous and discreet,” he said.

“Operational networks, in contrast to information networks, are measured by their performance level. Their operation cannot be disconnected and stopped. An emergency state in these systems can usually only be identified following a strike and they will be irreparable and irreversible.”

Where OT networks are thought to be protected, Rizika said they are often inadequate and based on industrial computerised system, operating in a permanent state of disconnection from the network or, alternatively, connected to port systems and the equipment manufacturer’s offices overseas via RF radio communication (wi-fi) or a cellular network (via SIM).

“Hackers can access the cranes, they can access the storage systems, they can penetrate the core operational systems either through cellular connections, wi-fi, and USB sticks. They can penetrate these systems directly.”

Rizika said that as the maritime industry moves towards greater digitalisation and increases the use of networked, autonomous systems, moving more equipment and technologies online, more vulnerabilities, more loopholes, will be created.

There will be a whole series of new cyber security openings through which people can attack if systems are not properly protected.

“If just one piece of this meticulously-managed operation goes down it will create unprecedented backlog and impact global trade, disrupting operations and infrastructure for weeks if not months, costing tens of millions of dollars in lost revenues.”

Naval Dome also predicts that cyber criminals, terrorists and rogue states will at some point begin holding the environment to ransom.

“One area we see becoming a major issue is cyber-induced environmental pollution. Think about it: you have all these ships in ports, hackers can easily over-ride systems and valves to initiate leaks and dump hazardous materials, ballast water, fuel oil, etc.,” Rizika warned.

He said a deep understanding of the differences between the two spaces is vital.

There is a disconnect between IT and OT security. There is no real segregation between the networks. People can come in on the OT side and penetrate the IT side. We are actually seeing this now. Successful IT network hacks have their origins in initial penetration of the OT system.”

Rizika warned that if many operators are not even aware that they are being attacked, stressing that they need to start to work on prevention before it is too late, especially since the risk of attacks and their frequency rise.

Source: offshore-energy


What is Maritime Security?

Maritime cybersecurity is essentially the collection of policies, tools, habits, security safeguards, and guidelines that maritime groups implement in order to protect their organizations, vessels, and associated networks.

According to the International Maritime Organization (IMO), “​Maritime cyber risk refers to a measure of the extent to which a technology asset could be threatened by a potential circumstance or event, which may result in shipping-related operational, safety or security failures as a consequence of information or systems being corrupted, lost or compromised.”

Over the years, maritime technology has improved rather significantly. Yet over that same time, many organizations have continued to leverage legacy technologies that were never built to be connected to the internet. This has exposed vessels and maritime networks to increased risk.

“There was a time when connectivity on a vessel was minimal, and ship control engineers addressed security issues with air gapping to physically isolate a secure network from unsecured networks. By definition, an air-gapped system is neither connected to the Internet nor any other system,” Mission Secure explains. “But now, using something as simple as a USB flash drive or unsecured Wi-Fi connection, a malicious hacker or even an inexperienced insider could infiltrate and infect critical systems. This development is especially concerning given the connectivity of modern maritime vessels.

4 Tips for Better Maritime Security

In 2020, the need for better maritime security is clear and convincing. Here are some tips organizations within the industry can use to stay safe:

1. Emphasize Physical Security

Believe it or not, physical security comes first. Many cyberattacks are made possible by giving physical access to people who have no business interacting with certain parts of the network or system.

Good physical security calls for vigilance, continuous monitoring, and regular drills. These drills will help you identify weaknesses that may not be obvious otherwise. Try surveying your team, analyzing crew performance, and studying all duties of the ship security officer so that you can identify and phase out any loopholes that represent a vulnerability.

2. Manage User Privileges

All users should be given the least amount of access they need to perform the duties that align with their job role. Be reasonable, but certainly don’t be liberal in how you hand out user privileges.

When granting high level system privileges, users should be carefully monitored and managed. In other words, access doesn’t mean the individual has free reign. Multi-layered safeguards are a must.

3. Invest in Malware Prevention

Malware can be referred to as any type of malicious content that’s intended to access, influence, and/or damage key systems of a computer or network. When deployed successfully, a piece of malware acts as a virus – seriously impacting all of the ship’s systems and services.

Maritime organizations must be serious about investing in and implementing the right anti-malware policies and solutions. And once implemented, they need to be rigorously monitored and updated to stay fully operational.

4. Develop a Robust Strategy

Mission Secure believes in a six-part cybersecurity risk management approach. While it’s a complex process with too many proprietary steps to outline here, it’s basically broken down like this:

  • Identify threats. Make a thorough list of all internal and external cybersecurity threats to the ship.
  • Identify vulnerabilities. Develop a comprehensive inventory of all onboard systems that have direct and indirect communication.
  • Assess risk exposure. Analyze the risk exposure of internal threats, external threats, and all vulnerabilities. Determine the likelihood of being exposed in any of these ways.
  • Develop protection and detection measures. The plan should include tactics for reducing the likelihood of being compromised, as well as the impact of certain vulnerabilities being exploited.
  • Establish contingency plans. This plan should have a prioritized list of action steps to mitigate cyber risks as they’re detected.
  • Respond and recover. Focus on recovering and strengthening cyber defenses so that similar future attacks don’t stand a chance of being successful.

A meticulous approach like this takes time to develop, but creates a strong defense that stands up in even the most hostile environments. A failure to invest in a 360-degree strategy like this could lead to serious compromises.

Safer Times Ahead

While the industry is moving fast to protect against cyber attacks, it’s going to take a while for all of the major maritime companies to coalesce around comprehensive cybersecurity strategies that stand up to the latest and most advanced threats. But once the wrinkles get ironed out, it’ll be smooth sailing into the future.

Source: smartdatacollective


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED