The Marine Corps Systems Command has announced that service is updating its tactical satellite system that provides increased communication on the battlefield.

Based on field user evaluations, the upgraded technology is performing beyond expectations.

The Mobile User Objective System is a next-generation, narrowband satellite communication capability that enables Marines to connect to SATCOM networks. It encompasses updated firmware to the AN/PRC-117G radio system and one of three antenna kits that help users simultaneously access these networks.

Initially fielded in March 2019, the system enables mobile or stationary Marines to leverage cellular technology to increase access to voice and data communication. It also improves overall reliability in urban environments.

“MUOS gives us a 3G capability using satellite constellations,” said Lt. Col. Jeff Decker, MCSC’s Ground Radios product manager. “It is similar to a cell phone capability in the sky that covers the entire globe.”

“We try to figure out anything that could be a possible issue for the warfighter. This helps to validate the concept of operations, and it allows us to provide lessons learned to other MEFs,” Lt. Col. Jeff Decker, MCSC’s Ground Radios product manager said.

The 3G networks used with MUOS remain far superior to the Marine Corps’ legacy SATCOM channels, said Decker. He noted that the Ground Radios program office continues to monitor the latest technologies and looks toward working with other services for future incremental improvements to the capability.

“We’re looking to support the warfighter with a lethal and sustainable capability, which is the command’s focus,” said Decker. “The more robust and resilient the capability, the more we can start adding on back-end systems to help Marines. MUOS is changing the way we look at a tactical satellite architecture.”

The importance of evaluations

From March to May 2020, MCSC conducted various field user evaluations with I Marine Expeditionary Force at Twentynine Palms, California, to assess an updated version of MUOS that increases network stability while executing missions.

During the testing, Marines participated in fire support simulation exercises where they employed MUOS for coordinated air strikes and mortar support. They also used the technology during scenario-based exercises that involved rehearsing command and control operations.

“We tested the system through user evaluation exercises to understand not only what the capability can do on paper, but how we can use it to increase lethality and provide redundancy across the [Fleet Marine Forces],” said Decker.

The testing enabled users to grow familiar with the system, ask questions and provide feedback. It allowed MCSC to learn more about MUOS, including the system’s strengths and limitations. Leveraging Marine feedback, the program office can make additional updates to MUOS as needed.

“We try to figure out anything that could be a possible issue for the warfighter,” said Decker. “This helps to validate the concept of operations, and it allows us to provide lessons learned to other MEFs.”

Eddie Young, project officer of Multiband Radio II Family of Systems at MCSC, said the testing helped the Ground Radios Team assess MUOS in combat-operational environments, which will better prepare them to employ the system during real missions.

“We wanted to bring in these units and make sure the system is working as it should,” said Young. “We want to ensure the warfighter’s needs are met.”

‘Exciting’ assessment results

Both Decker and Young said the feedback on the updated MUOS from Marines has been overwhelmingly positive, and that the system has exceeded performance expectations. Decker noted how Marines commended the new waveform for its lack of performance gaps, its adaptability and the absence of any technical difficulties while testing.

“Marines showed no frustration while trying to execute point-to-point calls while employing MUOS in an operational environment,” said Decker. “The system is doing what we expect it to do, and that is exciting.”

Sgt. Mason J. Roy, video chief for Communication Strategy and Operations at I MEF, participated in the communication exercises. He raved about the benefits of the exercises in training Marines for future missions that involve MUOS employment.

“I believe the exercises went really well,” said Roy. “The idea that we can send a video or photo from the field to a command post [using MUOS] shows we can rapidly inform commanders with visual information so that commands could potentially adjust battlespaces to promote mission accomplishment and protect our troops.”

The program office will begin fielding the updated version of MUOS this summer.

Source: defence-blog


Latent cyber risk. That’s what we in the cyber business call a cyber threat that is undetected, unplanned and unanticipated. These are the cyber risks that lurk in the dark places of your networks and the exposures that you didn’t think about that come out when you least expect.

Maritime has a lot of examples of these, such as when companies start connecting systems, devices and networks that were never designed to be connected. As fleets become more automated and digitized, we are connecting all sorts of systems—ones where cyber security was never even a consideration. The legacy networks don’t have the protection, updates or design to make them cyber resilient, because no one thought they would be connected when they were built. Hook up an old system to the internet, and you run the risk of unintentionally exposing it to a whole host of new cyber risks that you never considered.

Snap-back cyber risk

COVID-19 has its own latent cyber risk. With the sudden and unexpected onslaught of the COVID-19 pandemic, companies had precious little time to convert to an almost fully remote working environment. They scramble to adapt expanded and stretched networks way beyond their normal limits. As entire workforces switched to working from home, work networks mingled with home networks, people emailed documents to personal accounts and USB drives were used to help move and share files like never before.

Most IT departments have done a great job reworking their systems and networks to accommodate an immediate and severe shift in how they operate. However, they exchanged a lot of control for operational flexibility. Work offices became home offices, that also became home schools, entertainment centers, online shopping and part of family daily life. For months, work computers have been sitting on home networks and are used to help people cope with the realities of safer-at-home restrictions.
As a result, the attack surface – the exposure points that attackers can exploit – exploded. Add to that the COVID-19 related cyber scams that have employees unintentionally clicking on bad links, and you have a perfect environment for cyber malware and other exploitation to grow.

Now, many organizations are bringing everyone back to the workplace. Most are thoughtfully planning how to bring people back together. Temperatures will be taken, masks will be worn and social distances will be respected. However, few are considering how to reintegrate computers, devices and systems.

As networks snap back from their over-extension, they will bring back the cyber malware and exploits that could be infiltrating their over-extended networks. This is the latent cyber risk of COVID-19 and needs to be addressed.

It’s about safety

The snap-back risk of COVID-19 can have real-world consequences. Attackers are no longer only just interested in stealing data from corporate IT systems. They now are actively trying to understand how to take control of operational networks on-board vessels. This means they now want to take control of navigation systems, engines, valves, and anything else they can get their hands on. The operational networks that control these systems, called operational technology (OT), are uniquely exposed to these kinds of attacks. This is because, as you might guess, they were never designed to have the kind of connectivity we now have.

As attackers target OT systems, cyber security becomes a real-world cyber safety concern. Cyber risk impacts vessel, public, and environmental safety.
You cannot socially distance a network

Once your systems and networks are interconnected, and connected to the Internet, malware and intruders can spread almost instantaneously. The most you can do is segment, protect and monitor those networks. Unfortunately, too many OT networks do none of these.

Contact tracing a cyber attack is very difficult. Once in, it can be extremely hard to see where malware or an attacker has spread. It can spread in nanoseconds and attackers can be very skilled at covering their tracks. This is much harder in the OT environment, where it takes very specialized expertise to even understand how attack could spread.

No system is stand-alone. There is a perception that some systems are not connected to anything, thus they have an “air gap” and are not vulnerable. That is incorrect. From updates to operations, systems will have some form of connectivity, even if it is someone running an update from a disk. The general rule in cyber is, if someone can get to it, they will.

Cyber hyper-mutates

We are hoping the COVID-19 does not significantly mutate. Unfortunately, the nature of cyber is to hyper mutate. Every malware, every attack type and every mutation is being continuously adapted. Attackers are relentless at refining their attacks. Malware strains last months, weeks or days before new iterations come out. As we become more digital, we reshape the environment for cyber attacks. They respond by being in a constant state of change. You can’t only consider the last attack, you need to anticipate the next one.
We change. They change. We change. Constant vigilance, flexibility and adaptation is the nature of cyber.

You need good cyber hygiene

What can you do? First, you need to account and plan for cyber security. It is now a business imperative. It needs to be a daily part of operational and safety risk management. You then need to proactively manage it. This means that you need to create a cyber program that accounts for the assessment, planning, protection, defense, detection and response needed to minimize your cyber risks.

There are a number of cyber technologies, services and solutions that can help you protect your networks. Find the right partners who have the deep expertise in IT and OT environments, and work with them to build the program that fits your specific situation. Strong cyber hygiene can prevent most cyber infections. It can also help you handle a critical exploitation, if you are unfortunate enough to have to face one.

As for the COVID-19 snap back. You need to make it an integral part of your restart program. This could mean everything from new policies and education, to enhanced scanning, monitoring and management of IT and OT networks.

Remember that COVID-19 is not the only virus that your employees can bring back into your work place.
Source: ABS Group


The GDPR has successfully met its main objectives but work still needs to be done to improve cross-border investigations, increase regulator resources and address fragmented approaches across the EU, according to the European Commission.

The review of the data protection legislation two years on highlights several areas for improvement.

One of the most pressing is the need for harmonization across the region. This is because, although the regulation must be applied across the board, it allows for member states to legislate in some areas and provide specificity in others.

This has led to the “extensive use of facultative specification clauses,” which has made for differences in areas such as the age of children’s consent across different countries, the report claimed.

This could create problems for cross-border business and innovation, especially in tech and cybersecurity innovation, the Commission said.

“A specific challenge for national legislation is the reconciliation of the right to the protection of personal data with freedom of expression and information, and the proper balancing of these rights,” it argued.

“Some national legislations lay down the principle of precedence of freedom of expression, whilst others lay down the precedence of the protection of personal data and exempt the application of data protection rules only in specific situations, such as where a person with public status is concerned.”

Other areas that need continued work include the more efficient handling of cross-border cases and the disparity in “human, financial and technical” resources between many regulators.

This echoes a report issued in April by web browser firm Brave, which claimed that regulators are unable to match the financial might of technology giants like Google and Facebook, which puts them at a distinct disadvantage in investigations.

Only five of Europe’s 28 GDPR regulators have over 10 tech specialists, while half have budgets of under EUR5m. The UK’s ICO, which is the largest and most expensive watchdog to run, has only 3% of its 680 staff focused on tech issues, the report claimed.

Stewart Room, global head of data protection and cybersecurity at DWF, took issue with the Commission’s claim that GDPR has “successfully met its objectives of strengthening the protection of the individual’s right to personal data protection and guaranteeing the free flow of personal data within the EU.”

“A key problem to note is that there is an absence of such evidence on data protection performance levels under the previous legal regime (the 1995 Directive), so, therefore, there isn’t a benchmark available to substantiate progress made under the GDPR,” he argued.

“In contrast, reports of personal data security breaches have not run dry, there are still structural problems in the AdTech environment and with the ceaseless progression of developments in technology, such as facial recognition and AI, there have to be doubts about the ability of the law and the regulatory system to keep up speed.”

This post European Commission: Still Work to Do on GDPR originally appeared on InfoSecurity Magazine.


Safety is critical to the tanker industry. The International Safety Guide for Oil Tankers and Terminals, or ISGOTT as it is now widely known, has become the standard reference work on the safe operation of oil tankers and the terminals they serve. To remain so, the Guide must keep abreast of changes in vessel design and operating practice and reflect the latest technology and legislation.

ISGOTT was first published in 1978 by combining the Tanker Safety Guide (Petroleum) published by the International Chamber of Shipping (ICS) and the International Oil Tanker and Terminal Safety Guide published on behalf of the Oil Companies International Marine Forum (OCIMF). This Sixth Edition updates and replaces the 2006 Fifth Edition and has been reviewed by OCIMF and ICS together with the International Association of Ports and Harbors (IAPH). Support has also been provided by other industry associations, including INTERTANKO, the Society of International Gas Tanker and Terminal Operators (SIGTTO) and the Society for Gas as a Marine Fuel (SGMF), as well as specialists in topics such as human factors.

This new edition covers a range of topical issues including gas detection, the toxicity and the toxic effects of petroleum products (including benzene and hydrogen sulphide), the generation of static electricity and stray currents, fire protection and the growing use of mobile electronic technology.

In addition, the opportunity was taken to include new topics or to significantly reappraise topics previously covered that have undergone a shift in emphasis since the Fifth Edition. These include:

  • Enclosed space entry
  • Human factors
    Safety Management Systems (SMSs), including complementary tools and processes such as permits to work, risk assessment, Lock-out/Tag-out (LO/TO), Stop Work Authority (SWA) and their linkage to the underlying principles of the International Safety Management (ISM) Code
  • Marine terminal administration and the critical importance of the tanker/terminal interface
  • Alternative and emerging technologies
  • Bunkering operations, including the use of alternative fuels such as Liquefied Natural Gas (LNG)
  • Cargo inspections
  • Alignment with OCIMF’s recently revised Mooring Equipment Guidelines
  • Maritime security and linkage to both the International Ship and Port Facility Security (ISPS) Code and industry’s maritime security Best Management Practices (BMP).

The Ship/Shore Safety and Bunkering Operations Checklists have also been completely revised to reflect changes in the understanding of the impact of human factors in their effective use.

Source: maritimecyprus


The European Commission has approved an approximately €80 million (HRK 600m) Croatian scheme to support enterprises active in the maritime, transport, travel, infrastructure and related sectors that have been severely impacted by the coronavirus outbreak. The scheme, comprising two measures, was approved under the state aid Temporary Framework.

The support will take the form of state guarantees on new loans from banks or other financial institutions. The State guarantee will cover up to 90% of the loans. The scheme aims at providing liquidity to enterprises of all sizes affected by the coronavirus outbreak, thus enabling them to continue their activities, start investments and maintain employment. The scheme is expected to support over 1,000 companies.

The Commission found that the Croatian scheme is in line with the conditions set out in the Temporary Framework. In particular, under the first measure, aid does not exceed €800,000 per company. Under the second measure, (i) the loan amount per company is limited to what is needed to cover its liquidity needs for the near future, (ii) the interest rates correspond to the minimum levels laid down in the Temporary Framework, and (iii) the guarantees and loans will be provided until the end of this year, with a maximum duration of six years.

Under both measures, aid may be granted only to companies that were not in difficulty already on 31 December 2019 but were significantly affected by the coronavirus outbreak. The measures also include safeguards to ensure that the aid is effectively channeled by the banks or other financial institutions to the beneficiaries in need. The Commission concluded that the measures are necessary, appropriate and proportionate to remedy a serious disturbance in the economy of a member state, in line with Article 107(3)(b) TFEU and the conditions of the Temporary Framework.

On this basis, the Commission approved the measures under EU state aid rules. The non-confidential version of the decision will be made available under the case number SA.57711 in the state aid register on the Commission’s competition website once any confidentiality issues have been resolved.

Source: eureporter


HAIFA, IsraelJuly 1, 2020 (NASDAQ: ESLT) (TASE: ESLT) (“Elbit Systems” or “the Company”) announced today that it was awarded a contract valued at approximately $53 million to provide and integrate intelligence suites onboard vessels of the Navy of a country in Southeast Asia. The contract will be performed over a two-year period.

Under the contract Elbit Systems will equip several vessels with suites that provide the capability to perform complex reconnaissance missions, generating an operational picture of the air, surface and underwater domains. Elbit Systems will supply and integrate comprehensive suites comprised of an array of systems from across the Company’s maritime portfolio, including: AES-212 electronic intelligence systems, NATACS naval tactical communication intelligence systems and jamming capabilities, SPECTRO XR™ electro-optical payloads, M670 hull mounted sonars, TRAPS towed reel-able active/passive sonars, underwater communication systems and combat management systems.  The program also includes maritime radars and satellite communication capabilities. In addition, the Company will provide training services.

Elad Aharonson, General Manager of Elbit Systems ISTAR Division, said: “There is growing demand for our maritime solutions. I believe that the unique combination of a diverse portfolio of operational systems and groundbreaking technological innovation enables us to effectively address the evolving needs of maritime forces.”

About Elbit Systems

Elbit Systems Ltd. is an international high technology company engaged in a wide range of defense, homeland security and commercial programs throughout the world. The Company, which includes Elbit Systems and its subsidiaries, operates in the areas of aerospace, land and naval systems, command, control, communications, computers, intelligence surveillance and reconnaissance (“C4ISR”), unmanned aircraft systems, advanced electro-optics, electro-optic space systems, EW suites, signal intelligence systems, data links and communications systems, radios, cyber-based systems and munitions. The Company also focuses on the upgrading of existing platforms, developing new technologies for defense, homeland security and commercial applications and providing a range of support services, including training and simulation systems.

This press release may contain forward–looking statements (within the meaning of Section 27A of the Securities Act of 1933, as amended, Section 21E of the Securities Exchange Act of 1934, as amended and the Israeli Securities Law, 1968) regarding Elbit Systems Ltd. and/or its subsidiaries (collectively the Company), to the extent such statements do not relate to historical or current facts. Forward-looking statements are based on management’s current expectations, estimates, projections and assumptions about future events. Forward–looking statements are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995, as amended. These statements are not guarantees of future performance and involve certain risks, uncertainties and assumptions about the Company, which are difficult to predict, including projections of the Company’s future financial results, its anticipated growth strategies and anticipated trends in its business.  Therefore, actual future results, performance and trends may differ materially from these forward–looking statements due to a variety of factors, including, without limitation: scope and length of customer contracts; governmental regulations and approvals; changes in governmental budgeting priorities; general market, political and economic conditions in the countries in which the Company operates or sells, including Israel and the United States among others; changes in global health and macro-economic conditions; differences in anticipated and actual program performance, including the ability to perform under long-term fixed-price contracts; changes in the competitive environment; and the outcome of legal and/or regulatory proceedings.  The factors listed above are not all-inclusive, and further information is contained in Elbit Systems Ltd.’s latest annual report on Form 20-F, which is on file with the U.S. Securities and Exchange Commission. All forward–looking statements speak only as of the date of this release. Although the Company believes the expectations reflected in the forward-looking statements contained herein are reasonable, it cannot guarantee future results, level of activity, performance or achievements. Moreover, neither the Company nor any other person assumes responsibility for the accuracy and completeness of any of these forward-looking statements. The Company does not undertake to update its forward-looking statements.

Elbit Systems Ltd., its logo, brand, product, service and process names appearing in this Press Release are the trademarks or service marks of Elbit Systems Ltd. or its affiliated companies.  All other brand, product, service and process names appearing are the trademarks of their respective holders.  Reference to or use of a product, service or process other than those of Elbit Systems Ltd. does not imply recommendation, approval, affiliation or sponsorship of that product, service or process by Elbit Systems Ltd. Nothing contained herein shall be construed as conferring by implication, estoppel or otherwise any license or right under any patent, copyright, trademark or other intellectual property right of Elbit Systems Ltd. or any third party, except as expressly granted herein.

SOURCE Elbit Systems Ltd.


Dryad Global’s cyber security partners, Red Sky Alliance, perform weekly queries of  backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Email subject line Motor Vessel (MV) or Motor Tanker (MT) keyword usage is a common lure to entice users in the maritime industry to open emails containing malicious attachments.

With our cyber security partner we are providing a weekly list of Motor Vessels where it is observed that the vessel is being impersonated, with associated malicious emails.

The identified emails attempted to deliver malware or phishing links to compromise the vessels and/or parent companies.  Users should be aware of the subject lines used and the email addresses that are attempting to deliver the messages.

Tactical Cyber Intelligence Reporting

 

In the above collection, we see malicious actors attempting to use vessel names to try to spoof companies in the maritime supply chain.  This week we observed a wide variety of maritime-related subject lines.    Some of the new vessel names used this week include “MV EVIAPETROL V” and “MV XIU SHAN” among others. “Maersk Kleven” was used again this week. This vessel is currently flying under the Liberian flag and is a Hazard A (major) cargo ship.  It is currently headed from Charleston, US to Algeciras, Spain.

Analysts observed subject line “RE: MV WESTERN TOKYO 62,647DWT / LOADING CLINKER – REQUEST FOR PDA” being used in a malicious email this week.  The MV Western Tokyo is a bulk carrier currently sailing under the flag of the Philippines. The carrier is in port at WAFR – Gulf of Guinea.

This email message was sent from “shipping@san-nikolla.gr” which is likely owned by San Nikolla Shipmanagement S.A.  While the company is headquartered in Albania, the sender appears to be located in Greece, based on the .gr sending domain and the phone numbers provided in the email signature.  There is a web portal login located at “san-nikolla[.]gr” and the address and phone numbers in the email signature appear to be linked to the real San Nikolla Group.  The san-nikolla[.]gr “site is down for maintenance.”

The message body contains a request for a PDA (Profoma Disbursement Account).  As with many malicious emails, the greeting is generic “GOOD DAY DEAR SIRS” and the message contains an attached .xlsx file named “WESTERN TOKYO vessel description 201907 CoA.xlsx.”  When opened, this spreadsheet would activate Trojan:Win32/Vigorf.A malware.[1]  This malware has the ability to download, install, and communicate with other malware. It also has the ability to steal and exfiltrate sensitive information from the victim’s device.

Analysts observed another malicious email which appears to impersonate the M/V BBC Congo.  The malicious email subject line used is “M/V BCC CONGO – Port Agency Appointment.”  Although there were no results found for the “M/V BCC Congo,” there is an active general cargo ship sailing under the flag of Antigua Barbuda named “BBC Congo.”  The actual BBC Congo is currently on a voyage from China to Korea.[2]  The email states the ship will discharge between 22-25 June so it is possible the email is referencing a new vessel.

The sending email operation@inter-trans[.]co” does not appear to be registered to any legitimate company or listed on any company website.  The inter-trans[.]co domain leads to a Roundcube login port with Bulgarian text saying “Welcome” and offering a user/password field.

The sender, according to the email signature is Capt. Gultekin Ozturk, the “Managing Director,” but does not identify the name of the company.   He leaves his Skype, email, and phone contacts, as well as an address based in Turkey.

With the email written in English and the sender based in Turkey, the attached spreadsheet “vsl MV BCC CONGO.xlsx” is written in Chinese text.  One of the more unusual aspects of the email is the target email address “jameshall@compasspub.com.”  This email is owned by the International Sales and Marketing Coordinator for Compass Publishing, which is a Florida, US-based publishing company.  The target does not appear to have any relevance to the maritime industry or the BBC Congo specifically.

When the victim opens the attached spreadsheet, they are actually activating Exploit:O97M/CVE-2017-11882.L malware.[3]  This malware is one of the most common exploits seen “in the wild.”  It takes advantage of a memory corruption vulnerability in Microsoft Office products.  This allows attackers to extract sensitive and private information from the victim’s device.  If successful, an attacker could steal proprietary information from the publishing company.  They would also be able to commit impersonation attacks with insider information

Source: https://dryadglobal.com/


The Coronavirus pandemic is leaving the maritime and offshore energy sectors vulnerable to cyber-attack, with the maritime security firm Naval Dome citing a massive 400% increase in attempted hacks since February 2020. 

An increase in malware, ransomware and phishing emails exploiting the Covid19 crisis is the primary reason behind the spike. Naval Dome says that travel restrictions, social distancing measures and economic recession are beginning to bite into a company’s ability to sufficiently protect itself.

The global crisis and social distancing measures are preventing specialist maritime technicians flying out to ships and oil rigs to upgrade and service critical systems, resulting in operators circumventing established security protocols, leaving them open to attack.

IT and other maritime Operating systems (OT) are no longer segregated and individual endpoints, critical systems and components may become vulnerable. Some of these are legacy systems which have no security update patches and are even more vulnerable.

The increase in specialist maritime security personnel working remotely on home networks and personal computers and WiFi routers just makes the problem worse.

The economic downturn and the drop in the price of crude oil is also having an effect, with oil companies and contractors being faced with limited budgets available to implement effective cyber security measures. The Mission to Seafarers has published a COVID-19 special issue of its Seafarer Happiness Index report, which shows a growing feeling of confusion from crew changing as the landscape shifts around them. According to the report, shore leave, which is already a problematic issue, has become even more difficult for seafarers as ports are locked down and there are fears of contracting the virus.

Seafarers also reported feeling that not enough is being done to ensure the safety of those onboard and a feeling of loneliness, physical and mental exhaustion, and homesickness.

Shen Attacks
A report, written by the University of Cambridge Centre for Risk Studies last year, called the Shen Attack: Cyber risk in Asia Pacific Ports, says that a cyber attack on ports could cause substantial economic damage to a wide range of business sectors globally due to the inter-connectivity of the maritime supply chain.

The combination of ageing shipping infrastructure and complex supply chains makes the shipping industry vulnerable to attack and consequentially huge losses. 

While the Shen attack is not a definitive forecast, it does highlight the need for vigilance in an industry that could be brought to its knees by a cyber event originating in Asia and spreading to Europe, America and the rest of the world.

The report is the second publication from the Cyber Risk Management project, the Singapore-based public-private initiative that assesses cyber risks, of which Lloyd’s is one of the founding members. Shen Attack estimates that losses of up to $110 billion would occur in an extreme scenario in which a computer virus infects 15 ports. Transportation, aviation and aerospace sectors would be the most affected ($28.2 billion total economic losses), followed by manufacturing ($23.6 billion) and retail ($18.5 billion).

Source: https://www.cybersecurityintelligence.com/


Further to the recent news posting ‘Composing a Picture from the Puzzle Pieces’, this is the first of seven pieces that describe in more detail the make up of the puzzle and covers the maritime transport demonstrator. The goal of each demonstrator is to ‘put the correct pieces together’ which are firstly described through concrete use cases.

The Use Cases

Although the security requirements of maritime transport are vast and cover multiple areas of cyber security controls, based on the requirements’ analysis and the maritime transport research and development roadmap developed in earlier stages of the project, we have identified four concrete security services (use cases) that will be integrated and later demonstrated.

1.Threat modelling and risk analysis for maritime transport services

We identified targeted threats and risks for maritime transport that include various other use cases, which describe all the distinctive phases, such as:

  • critical maritime assets & services identification;
  • vulnerability management;
  • threat modelling & scenarios specification;
  • maritime transport risk analysis;
  • attack paths representation; and
  • maritime transport risk management.

2. Maritime system software hardening

Applications used in the maritime domain, such as software running on a moving vessel, usually utilize legacy code which is hard to update and sometimes even harder to replace. An attractive option is software hardening, whereby a program is re-written in order to avoid memory-related vulnerabilities. Re-writing the code can be done either by re-compiling the source (where possible) or by reconstructing the binary. Note that this re-writing is focused on the security properties of software and not on its base functionality. Hardening can be applied much more easily than a total replacement of the code.

3. Secure maritime communications

We examined the secure exchange of various types of information, including maritime-specific systems such as:

  • VHF data exchange system (VDES) frequencies;
  • automatic identification system (AIS) information;
  • maritime mobile service identity (MMSI), time, ship position, speed, course etc.;
  • vessel voyage information (such as route plans and mandatory ship reports);
  • maritime single window reporting information (e.g. ship certificates, log books, passengers’ lists and crew lists); and
  • port to vessel information, such as weather reports, passenger or cargo manifestos.

4. Trust infrastructure for secure maritime communication

As various types of information are exchanged/transmitted between different maritime stakeholders and actors at sea and on shore, designing a specially crafted trust infrastructure is vital. However, it is not straightforward to set up and operate a typical public key infrastructure (PKI) solution, since there are constraints associated with the maritime transport domain. The communication bandwidth of ship networks have to be taken into account. For example, the SATCOM component of VDES is expected to become a bottleneck in ship communication, due to its low capacity. In addition, it is not rare for ships to sail for long periods of time without any Internet connectivity at all; and, as shipping is a low cost business, this imposes strict limitations on what solutions will be acceptable to the industry. Here we will research those constraints and design and demonstrate a PKI service specifically adapted to fit the needs of the maritime domain.

The Demonstrator Set-up

Here is what the three demonstrators will illustrate:

(A) Threat modelling and risk analysis for maritime transport services using a web application utilising multiple modules to give a complete risk assessment process. The sequence of information insertion will ultimately lead to a complete asset map and multiple informative risk assessment result output forms.

(B) Maritime system software hardening firstly by enhancing the risk analysis framework realised in (A), and then hardening unsafe components used in (C).

(C) Secure maritime communications and trust infrastructure for secure maritime communication initially implementing the PKI service described in (4) and in the next phase will be extended to demonstrate the secure maritime communications, described in (3).

For more information on this phase of all the demonstrators, detailed descriptions can be found here.

Panayiotis Kotzanikolaou, University of Piraeus

Source: https://cybersec4europe.eu/


Cyber-security specialist Naval Dome has reported that maritime and offshore energy companies were facing an increase in cyber security threats during the Covid-19 pandemic. It sad that there’s been a 400% increase in attempted cyber-attacks in these sectors since February 2020.

An increase in malware, ransomware and phishing emails exploiting the Covid-19 crisis were the primary reasons behind the spike, Naval Dome said that travel restrictions, social distancing measures and economic recessions were reducing the ability of companies  to protect themselves to the extent that they would like or need.

Naval Dome CEO Itai Sela  said that “Covid-19 social restrictions and border closures have forced OEMs, technicians and vendors to connect standalone systems to the internet in order to service them”.

The pandemic had prevented OEM technicians flying out to ships and rigs to upgrade and service critical OT systems, resulting in operators circumventing established security protocols. That, Seal said, left them open to attack.

“As budgets are cut and in the absence of service engineers, we are seeing ship and offshore rig staff connecting their OT systems to shoreside networks, at the behest of OEMs, for brief periods of time to carry out diagnostics and upload software updates and patches themselves,” Sela explains.

“This means that their IT and OT systems are no longer segregated and individual endpoints, critical systems and components may be susceptible. Some of these are legacy systems which have no security update patches and are even more susceptible to cyber-attack.”

He said that the increase in OEM personnel working remotely on home networks and personal PCs, which were not well protected, added to the problem.”

“Companies are stretched thin, and this is benefitting the hacker,” Sela said, noting that it was not sufficient to protect only networks from attack. “Each individual system must be protected. If networks are penetrated, then all connected systems will be infected.”

Ido Ben-Moshe, Vice President Business Development, says the problem is particularly acute in the marine and offshore oil and gas sectors. “If hackers penetrate networks, and critical equipment is exposed there could be significant safety, downtime, financial and potential reputational damage.”

Source: https://insurancemarinenews.com/


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED