CIMSEC discussed the development of the 1980s Maritime Strategy and the role played by the CNO Strategic Studies Group with Admiral William Owens (ret.). Admiral Owens was part of the first SSG during 1982. In this discussion, he discusses changes brought about by the Maritime Strategy, the implementation of the Maritime Strategy concepts by the fleet, and what lessons the Maritime Strategy and SSG have for the modern era.

What was new about the Maritime Strategy and how was it a shift from 1970s concepts and plans?

For the Navy and the Marine Corps, for the entire Defense Department, and for our country the Maritime Strategy was a turning point in the Cold War! For most of the years since World War II the United States Navy and Marine Corps had been focused on how to most efficiently get land and air forces into Central Europe to protect against a Soviet attack. This was the focus of all our force planning. All our analytic efforts in the Pentagon and the grand majority of money in the defense budget was organized around that particular task. The Maritime Strategy changed all of that in profound ways.

Can you briefly describe your personal involvement in the strategy development process?

My personal role was as a member of the first Strategic Studies Group, the SSG. This SSG and the concept was set up by Admiral Tom Hayward, the Chief of Naval Operations (CNO). And it is thanks to Tom Hayward, his vision, and his leadership style, that we wound up with a Maritime Strategy that materially changed everything.

Tom Hayward established the group under Bob Murray, a wonderful gentleman who had been the Under Secretary of the Navy. My personal involvement then was as one of the eight members of that first SSG. Admiral Hayward had personally chosen the eight of us, one from each branch of the Navy and two from the Marine Corps, to spend a year together. That was a transformative year for me and for all of us. As a submariner, I had spent all of my years, about 18 of them, in the submarine force, and had very little experience in the grand strategy of the Navy or the Defense Department. Indeed, I had very little knowledge of the other branches of the Navy, such as the fighter community, the surface navy, the amphibious forces, or the Marine Corps. This year changed all of that for me personally and immersed me in what was, we thought, the principal effort to bring together a very different position for our Navy.

While Secretary Lehman had talked about a different strategic force and several had talked about the need for a more offensive Navy, never before to my knowledge had we put together such a broad view of what the Navy and Marine Corps could possibly execute as principal members of U.S. forces. It is important to note Admiral Hayward’s role in the formation and tasking of the SSG, and in his leadership in imagining the entire year for the eight of us. I will always remember that as a precious lesson of how to lead! The CNO told us personally when we asked “what was the deliverable,” that he did not know. He said, “I formed this group because I have tremendous confidence in each of you, and I expect you to spend a year with no restrictions to do something good for the United States Navy and to make the year worthwhile in every respect, including for yourself.”

Follow-up sessions with Admiral Hayward occurred only two or three times during the year, and under Bob Murray’s leadership we had no restrictions, all doors were open, and all lines of thought were encouraged. This was the only time in my entire time in the Navy that I saw this degree of complete confidence and “gutsy” leadership to do something very special for our Navy and our country.

The SSG is often cited as a key (if not the key) driver behind the emergence of the Maritime Strategy. But at the same time, other initiatives and groups, including exercises such as Ocean Venture ’81, the OP-603 strategist community, the Advanced Technology Panel, and Secretary Lehman’s personal involvement were combined with pre-SSG elements such as Sea Plan 2000 and the Global War Games. In your opinion, which of these elements were the most significant and how did they interact with each other to create what we know as the Maritime Strategy?

While many of these products were well-known to us, there were none in my opinion which laid out the specifics of a new Maritime Strategy, one that would indeed change all of the force analysis, and that would change the thinking in the Congress and in the inner halls of the Kremlin. Regarding which organization came first with the Maritime Strategy, I leave it to the readers. But from our standpoint in the SSG, we had been sent by Admiral Hayward to “do good for the U.S. Navy,” and after many, many discussions among ourselves and many other potential activities that we could have undertaken, we chose to look at how the United States Navy and Marine Corps could play a much more offensive role in what was then the great challenge, the Soviet Union. I know that others were interested in this work, the CNO’s staff was doing work on strategy, and Secretary Lehman had done some work thinking about the Navy of the future.

But for us, we were not aware of any macro-level strategy for our country that dealt with the use of offensive maritime forces. Additionally, when we were looking to brief various commands, through Bob Murray and Admiral Hayward, there was a decision that we should go and visit all of the four-star U.S. Navy commanders to represent a new way of thinking about our Navy, which we called the Maritime Strategy. So, regarding who the originator was, from our standpoint we believed that we were taking the lead and had founded something that could be very special for our country, and I believe it was the SSG who dubbed it the Maritime Strategy.

How did the SSG, and through it the Maritime Strategy, influence and spur innovation in real-world fleet operations and exercises, both at the theater and at the tactical levels? What role did the SSG’s extensive travel to operational fleet commands, or the feedback received from the theater commands and flag ranks, help influence the strategy?

Commander Art Cebrowski and I were the two most junior officers on the first SSG. The natural flow had us both involved in developing presentations, doing some writing, and then eventually being the two briefers that took the Maritime Strategy to each of the four-star commanders-in- chief of the theaters. As such we were able to internalize and absorb the many comments that we received, which were at first quite doubtful, and then in a growing way, believing that there was indeed a new way possible to use naval force. Eventually Art and I started to feel more and more confident. With Bob Murray as an enormous mentor, a shield, we had a great interface with CNO Admiral Tom Hayward to continue our work and then to broaden it.

We noticed that within a few months exercises were being conducted in the various fleets, especially Seventh Fleet, to test out some of the concepts in the field. But more importantly, each of us was blessed to move on to become more senior and start exercising these concepts ourselves. As a young one-star admiral, I was able to mass four dozen attack submarines far forward and “demonstrate to the Soviets directly that we were there in numbers.”

When we looked at the ability of the United States Navy to take the battle forward to the Soviet bastions, to the northern flank of Norway and even the Arctic, when we were able to use carriers, surface forces, and the submarine force together far forward both in the Atlantic and the Pacific, we started to realize that we were having an impact on the Soviets themselves. No longer were the bastions and the northern and western flanks totally the property of the Soviet Union. After the Cold War was over, there were intelligence reports reflecting the critical difference the Navy and Marine Corps’ positioning had had on strategic thinking in the Soviet Union and indeed in their reflection that they could not win, no matter how much they poured into their defense systems.

Why did the Maritime Strategy “work,” if it did, and what about the process has been so hard to replicate?

The Maritime Strategy worked because there was an open mind in the leadership ranks of the Navy, there were very active supporters in OP 603, and in the intelligence community. And I would note that Rich Haver was particularly valuable to us in gaming and supporting our efforts. Rich was a senior civilian, an intelligence professional working in the Chief of Naval Operations office directly in what was called Code 009. He was extremely interested in the SSG’s deliberations and participated in many of our wargames and discussions. He was also a source of information from the intelligence community, and we spent considerable time with Rich regarding the intelligence implications of our thoughts on the Maritime Strategy. We saw a lot of Rich in Newport with the SSG.

Underlying it all, of course, was Tom Hayward and Bob Murray’s terrific leadership. They were the single most important factors in driving the success of those first SSGs! I think it was hard to duplicate the work of the first three or four SSGs, as follow-on CNOs did not lead the effort in the same sense that Tom Hayward did, and there was never another Bob Murray. I think the concept is strong and could remain strong under the right leadership. In other words, “take the very best from the warfare communities, give them a free rein for a year, and ask them to deliver a product that is worth the time and effort for their Navy and Marine Corps.” I don’t think that ever happened again after the first two or three SSGs.

How did the strategy interface with the POM process? What was its budgetary and programmatic influence, what mechanisms channeled this influence, and how did these processes change over this time period?

Because of senior leadership and our exposure to all of the Navy’s four-star officers, there eventually was considerable support and understanding of what the United States Navy and Marine Corps capability was, and I believe that flowed through every branch of both services. Especially for those of us who became three- and four-star officers, we drove the Maritime Strategy as part of all of our budgeting and programmatic directions. It was a critical part of my own efforts both as the first N-8 in the Navy staff and as the Sixth Fleet commander, and then the Vice Chairman of the Joint Chiefs of Staff.

Putting pressure on the Soviet Union, and indeed realizing that the Navy and Marine Corps were operating forward, aggressively, and offensively, I believe this carried over after the Cold War ended in the way we thought about our service. It changed the paradigms of World War II. Of course, the submarine force had always been operating forward. But now we were able to operate with other branches of the Navy and Marine corps in a very offensive forward position, and we coordinated those actions with other naval forces to make a much larger difference. In many ways the Maritime Strategy was a coming-of-age for maritime forces.

What lessons can be taken from the 1980s for engaging in modern great power competition, both specifically about the role of the SSG and its functionality, and more generally about the centrality of the Maritime Strategy in 1980s great power competition?

Many of the lessons of the 1980s pertain to naval and Marine forces today, and will in the future. And when we are thinking of great power competition it allowed us to think of truly offensive and game-changing actions in the forward theaters, which pertains as much in today’s world as it did then. I predict that this will continue as we look to the future.

The lessons of the SSG were profound for me. The degree of thinking and engagement that a dedicated, supported from-the-top-group of quality officers can provide, was stunning. Art Cebrowski and I, I’m sure, had our lives changed in many ways from this experience. The leadership lessons learned from Tom Hayward, Bob Murray, and others who supported us also had a profound effect on Art and myself. And I have to add, the loss of Art Cebrowski to our entire Defense Department was a loss that is more than one could ever have imagined.

How did the strategy enhance the Navy’s ability to tell its story to outside audiences, such as Congress, the other services, and allies? How was it received and challenged by outside audiences?

The Maritime Strategy dramatically enhanced the Navy’s confidence in what it already knew in part that it could do. Whether it was with Congress, where the demonstration of the Navy and Marine Corps offensive forces working jointly with the other services became known, or with our allies, where this broad naval offensive power was broadly accepted, the maritime strategy was clearly now a part of everything we did. And in many cases, such as the United Kingdom, our allies joined as part of our forward-thinking Maritime Strategy.

Many audiences of traditionalists, including several of our four-star commanders at the time, were strongly unconvinced, even disapprovingly so. But it did not take long with continued exercises, demonstrated capability, and a realization on the Hill that this was something that could truly change America’s position in the world of military power, that there was widespread acceptance.

For many of us throughout our careers, we took pride in showing our friends and allies around the world and in the United States the true power and ability of our maritime forces to operate freely, jointly, and with substantial capability even in the most challenging areas. It is hard to say this needs to be proven now, since this is the way our country’s military services take military force forward, with naval forces on the leading edge!

Admiral William Owens (ret.) is a retired four-star U.S. Navy admiral. He was Vice Chairman of the Joint Chiefs of Staff, and was Commander of the U.S. Sixth Fleet from 1990 to 1992, which included Operation Desert Storm. Owens also served as the Deputy Chief of Naval Operations for Resources. Owens was the Senior Military Assistant to two Secretaries of Defense (Secretaries Cheney and Carlucci) and served in the Office of Program Appraisal for the Secretary of the Navy. He began his military career as a nuclear submariner. He served on four strategic nuclear-powered submarines and three nuclear attack submarines, including tours as Commanding Officer of the USS Sam Houston, USS Michigan, and USS City of Corpus Christi. He currently serves as an executive in the private sector, as well as a member of the Council on Foreign Relations.

Joe Petrucelli is an assistant editor at CIMSEC, a reserve naval officer, and an analyst at Systems, Planning and Analysis, Inc.

The opinions expressed here are the author’s own, and do not necessarily represent the positions of employers, the Navy, or the DoD.

 

Source: cimsec


Subex, a provider of Internet of Things (IoT) and Operational Technology (OT) cybersecurity solutions, and SkyLab, a specialist in 5G Multi-Access Edge Computing (MEC) and Industrial IoT have announced a partnership to offer IoT and OT cybersecurity solutions and services to the maritime sector.

According to Subex’s research, shipping companies around the globe were attacked almost 1.5 million times in the last 30 days. Of these, over 64,000 attacks were highly sophisticated and carried out using complex malware and breach tactics. Social engineering, deception, and traffic manipulation were all used to create breaches and enable intrusion into core and peripheral infrastructure.

Targets for these attacks include datacenters, command and control infrastructure, navigation systems, power, and life support systems among others. The increase in volume also increases the chances of a successful breach. Thus, the industry continues to be at risk.

In addition to the rising threat to maritime infrastructure, there is also the secondary threat of potentially significant losses caused by the loss of shipping days, delays in transit of goods, damage to critical infrastructure, loss of either customer or commercially sensitive data and ransom demands. In one incident off the coast of the United States, hackers tried to take over the navigation systems of a ship and ram the vessel into a port. It was with much difficulty that the crew was able to gain control and prevent a catastrophe.

The International Maritime Organization (IMO), the United Nations specialized agency with responsibility for the safety and security of shipping and the prevention of pollution by ships, has also recognized the importance and urgency required to tackle the challenges posed by cybersecurity risks. IMO has issued MSC-FAL.1/Circ.3 Guidelines on maritime cyber risk management and adopted resolution MSC.428(98) encouraging administrations to ensure that cyber risks are appropriately addressed in existing safety management systems before the first annual verification of the company’s Document of Compliance after January 1 2021.

Through their partnership, Subex and SkyLab will be jointly offering cybersecurity solutions and services including Security Operations Center services to improve overall maritime cybersecurity posture and cyber–resilience.

 

Source: hstoday


Digital threats are becoming more complex. The access, connectivity, and networking of IT (Information Technology) and OT (Operational Technology has led to increased cyber security threats and risks for many maritime operations. It’s more important than ever to stay ahead of these threats before they cause damage to your organization.

Vulnerability Management should be an inherent part of your company’s safety and security culture – ensuring the safety, security, and protection of the ship, the crew, the cargo, and the marine environment. An investment in our platform will help your operation runs smoothly and on time.


Noting this threat, shipping companies are reminded of the importance of applying BMP 5 to ensure that the voyage is fully risk assessed and that ships are hardened against the security threats in the region. Similarly, it is recommended that ships rerouting southwards should route north-east of Socotra before turning South and that where possible, should maintain a safe distance from the Somali coastline in accordance with the risk assessment.

Furthermore, it is stressed that all ships in the region should register with MSCHOA and report to UKMTO as outlined in BMP 5, to ensure they are visible to the military assets deployed in the region which can assist in cases of piracy, and to ensure that they will be alerted to any threats or incidents.

 

Source: bimco


This partnership aims to help boost the overall cybersecurity posture of the maritime industry as ships, offshore and onshore maritime assets, communication channels and shipping infrastructure will now receive the highest levels of cybersecurity protection, threat risk management support, solutions, and services.

According to Subex’s research conducted using data from its global honeypot, shipping companies around the globe were attacked almost 1.5 million times in the last 30 days. Of these, over 64,000 attacks were highly sophisticated and carried out using complex malware and breach tactics. Social engineering, deception, and traffic manipulation were all used to create breaches and enable intrusion into core and peripheral infrastructure.

Targets for these attacks include data centers, command and control infrastructure, navigation systems, power, and life support systems among others. The increase in volume also increases the chances of a successful breach.

In addition to the rising threat to maritime infrastructure, there is also the secondary threat of potentially significant losses caused by the loss of shipping days, delays in transit of goods, damage to critical infrastructure, loss of either customer or commercially sensitive data and ransom demands. In one incident off the coast of the United States, hackers tried to take over the navigation systems of a ship and ram the vessel into a port. It was with much difficulty that the crew was able to gain control and prevent a catastrophe.

Through this partnership, Subex and SkyLab will be jointly offering cybersecurity solutions and services including Security Operations Centre services to improve overall maritime cybersecurity posture and cyber–resilience.

Vinod Kumar, managing director & CEO, Subex, said: “This alliance combines Subex’s deep expertise in cybersecurity and SkyLab’s strengths in 4G/5G mobile edge computing and core networking technologies to reliably accelerate, monitor and inspect traffic whilst adapting to dynamic connectivity conditions at sea.  This association will help secure the industry and ensure compliance to standards whilst offering reliable protection to both critical and non-critical systems.

“We are delighted to partner Subex in addressing one of the core concerns of the shipping industry – cybersecurity. Together, we endeavour to empower reliable, secured, and cyber-resilient shipping lanes globally by partnering maritime stakeholders, and enable them to secure of their operations, assets, people as well as data,” said Stephen Ho, group chief operating officer, SkyLab.

Caption: The partnership between Subex and SkyLab aims to boost cybersecurity in the maritime industry

 

Source: thedigitalship


The enduring feature of cyber threats is their ability to adapt and evolve, with new lines of attack developed as barriers are put in place, and strategies to expose vulnerabilities constantly emerging. A June 2020 White Paper** from the British Ports Association and cyber risk management specialists Astaara suggests that reliance on remote working during the COVID-19 crisis coincided with a fourfold increase in maritime cyber attacks from February onwards, for example.

In fact, cyber security was ranked as the second highest risk for shipping in 2019, behind natural disasters, according to a survey of over 2,500 risk managers conducted by Allianz. Given that, according to IBM, companies take on average about 197 days to identify and 69 days to contain a cyber breach, it is clear that an attack on a vessel’s critical systems could threaten the safety of a ship as well as the business of shipping. The fact that a 2019 Data Breach Investigations Report from Verizon indicates that nearly one-third of all data breaches involve phishing provides one indicator that, where cyber vulnerabilities exist, the ‘human element’ can badly expose them.

 

Source: rivieramm


Maritime digital transformation is in its most rapid and turbulent era. Such a transformation offers substantial advantages and benefits, but with commensurate risks in the cyber domain.

On June 16, 2017, the International Maritime Organization (IMO) adopted Resolution MSC.428(98) that “encourages administrations to ensure that cyber risks are appropriately addressed in existing safety management systems (as defined in the ISM Code) no later than the first annual verification of the company’s Document of Compliance (DOC) after 1 January 2021.” The same year the IMO developed related guidelines (MSC-FAL.1/Circ.3). While the resolution is a formal acknowledgement of the importance of cybersecurity by the UN agency, the guidelines highlighted that effective cyber risk management should start at the senior management level.

But even smart and elaborate risk management will not be effective until appropriate cyber awareness arises among all those engaged in the maritime world. The human element is the most valuable but also the most vulnerable in maritime cybersecurity. While modern technology affords a measure of protection against direct hacking, social engineering has become the most prevalent vector for cybercrime.

There is a popular opinion that the direct targeting of senior leaders (known as whaling attacks, or CEO fraud), is the most probable scenario for a lucrative cyberattack. In cases of success, offenders can get access to sensitive data or even entire networks and affect many processes within the system. In some cases, attackers could even get options to direct groups of ships. On the other hand, such a “whaling attack” is a complicated process with disputable chances of success. The obligation senior executives have toward cyber risk management is fast becoming a standard assumption. These leaders are becoming more and more aware of these hazards and are better maintaining prudent behavior to reduce cyber risks to themselves personally. Much simpler is the method of attempting to socially engineer other types of maritime workers, who at first sight appear less significant than executives, but who also enjoy broad access to maritime systems and networks.

There are two main groups that can be distinguished as desirable targets. The first group includes crewmembers onboard commercial vessels and naval ships, especially those who have direct access to the ship’s control systems or important elements of shipboard systems, like communications, engines, or cargo handling equipment and storage areas. The second group includes shore-based personnel, including technicians and advisors, third party contractors, especially those who have remote access to seaborne networks and contacts.

There are three critical areas attractive to attackers, including navigational systems and sensors, cargo handling and storage, and propulsion and power. In most cases the latter two elements require direct physical access to effectively access critical systems. In contrast, navigational systems are perhaps among the most advanced networked and digitally accessible systems onboard.

If cyber intruders got access to ECDIS (the Electronic Chart Display and Information System), they would be able to attempt offensive options such as jamming  or corrupting signals received from external sensors (GPS, AIS, Radar/ARPA, Navtex), gathering critical hydrographic information, and tampering directly with the Electronic Navigational Chart (ENC). While official ENCs often feature highly protected data, unauthorized access to the ENC’s manual correction option can be disruptive. Hackers could also go for the simpler option of disabling the operating systems of the ECDIS workstations, where in the majority cases this is a commonplace Windows operating system, and not necessarily the latest version. With the highly integrated bridge navigational systems of modern chemical tankers and passenger ships, attackers could even target the ship’s auto-steering algorithm.

Unauthorized access to such an important navigational system can be obtained with malware accepted by equipment operators via their email client and personal social media profiles. Today, with the internet widely available onboard modern commercial vessels, shipboard personnel can freely use their personal mobile devices or laptops for web access and private communications. At the same time, cybersecurity hygiene and best practices are often neglected, and the same personal devices can be used for operational data storage and transfer, including transferring data to and from ECDIS workstations.

Imagine a scenario where a chemical tanker was chosen as a target by a hacking group. Information regarding the vessel’s static and dynamic (course/speed/position) data, crew composition, type and quantity of cargo, destination, captain’s name, and other items of interest could be collected from the web. Attackers could search and exploit the social media networks of crewmembers, preferably the targeted vessel’s bridge team member. The task is made easier by social media networks and websites focused on professional groups and employment.

During the second stage, the stage of evaluation, the opted profile is carefully examined by the offenders for weakpoints. Nowadays, the majority of social media users are registered across several platforms, such as those focused on personal and professional connections, as well as entertainment preferences. Therefore adversaries can gain information not only about the mariner’s place of service but also about their family, hobbies, places visited, and other information that could be relevant to designing a socially engineered attack.

Their objective will be to obtain unsanctioned admittance into the vessel’s systems. The targeted person can either be blackmailed or contacted by a fake profile of a trusted contact with the aim of dispatching malware via the victim’s access. An untrained and unaware navigational officer could install the malicious software to the navigational computer, under the guise of ‘colleague’s friendly tip.’

A socially engineered attack can be made to seem more credible when shore personnel, such as technicians or support desk members, are targeted. With almost the same measures in searching, evaluating, targeting, and hacking, perpetrators can infiltrate and attack even larger groups of ships due to how shore professionals often have access and jurisdiction over many vessels.

More nefarious intentions could include causing a chemical spill, setting a ship on a collision course with a naval ship or a passenger vessel, or damaging critical shore-based infrastructure. In respect of these scenarios, maritime cyber threats should be considered as a matter for the International Ship and Port Facility Security Code (ISPS), and not only the International Safety Management Code (ISM). The ISPS code consolidates various constructive requirements so that it can achieve certain objectives to ensure the security of ships and ports.

There are some important requirements under the ISPS. The security-related information exchanges among the appropriate contracting agencies, both government and private, include collecting and assessing the obtained information and further distributing it. Correspondingly, definitions are included for the relevant communication protocols for vessels and port facilities for uncomplicated exchanges of information. Another important element is attempting to prevent any unauthorized access on a vessel, port facility, or other important restricted areas. Even if unsanctioned entry is not a threat, it is always regarded as a potential danger.

The ISPS also regulates provisions of different options for alarm-raising in case a security-related incident is encountered or potential danger is evaluated. It seems logical enough to apply similar requirements for maritime cybersecurity. There are several main tasks to consider: cybersecurity information collecting, evaluation and exchange between concerned parties; prevention of unauthorized access; malware and spyware installation or transfer; and appropriate training of personnel.

Eventually, regulation should be introduced regarding the human element. Specifically, trainings and exercises should be introduced for vessels’ crew and port facilities’ staff to ensure their awareness with the security plan and that there will be no delay in procedure execution in case of a real threat. Advanced cybersecurity training and education should be encouraged, especially for critical staff like watchkeeping officers or engineers. The purpose of such an education would be to gain knowledge and develop skills in cybersecurity in order to anticipate threats at early stages. Trained personnel should also be ready to prevent unauthorized access to critical equipment and systems and be vigilant for particular malfunctions that could be caused by illicit infiltration. In cases of potential penetration, staff should be skilled enough to insulate affected areas of the system without losing control of the vessel. Their proficiencies should include the ability to manage a transition to emergency manual control and utilizing classic techniques in seamanship and communication.

Maritime security, through cybersecurity, will become a much more complex endeavor. It will require a considered combination of the human element, technical innovation, management procedures, security protocols, and classical maritime know-how. Considering the lack of cyber-awareness among some mariners, a transfer of malware from a personal device to a ship’s navigational system is just a matter of time. The international maritime community should accelerate and strengthen efforts to develop adequate measures to withstand future challenges in the maritime cyber domain.

Leonid Vashchenko is a professional mariner, currently serving as a chief officer on board ocean-going commercial vessels. He holds a Masters Degree in Marine Navigation from the National University “Odessa Maritime Academy,” Ukraine, and is a active member of the Nautical Institute, London. His views are his own and do not necessarily represent the official views or policies of the organization or companies he is employed with.

 

Source: cimsec


The maritime transport industry is increasingly reliant on computing and communication technologies, and the need for cyber risk management of critical systems and assets on vessels is becoming critically important. In this paper, a comprehensive cyber risk assessment of a ship is presented. An experimental process consisting of assessment preparation activities, assessment conduct and results communication has been developed. The assessment conduct relies on a survey developed and performed by interviewing a ship’s crew. Computational vulnerability scanning of the ship’s Electronic Chart Display and Information System (ECDIS) is introduced as a specific part of this cyber security assessment. The assessment process presented has been experimentally tested by evaluating the cyber security level of Kobe University’s training ship Fukae-maru. For computational vulnerability scanning, an industry-leading software tool has been used, and a quantitative cyber risk analysis has been conducted to evaluate cyber risks on the ship.

 

Source: cambridge


Vessels worldwide are now facing compliance with IMO 2021 cyber security regulations.  These are the first of what could be additional cyber security regulations for regulated vessels and facilities. International Maritime Security Associates (IMSA), the developers of the award-winning ARMS software platform, have developed a suite of cyber security tools and services for the maritime industry.  The company has recently launched the capability to conduct basic shipboard network vulnerability assessments without sending personnel onboard.

“This capability is necessary in today’s current COVID environment.” Comments Corey Ranslem, CEO of IMSA. “We know it isn’t always easy, practical or cost effective to send people onboard a vessel to conduct a cyber security assessment, so we’ve developed this amazing remote assessment tool.  Through this tool, our cyber specialists can conduct a remote assessment at about half the cost of sending personnel onboard. This tool helps our global clients with IMO 2021 cyber security compliance along with protecting passengers, crew, and cargo.”

This unique tool is part of a larger suite of cyber security tools IMSA has developed to support vessels and maritime facilities with expanding their cyber security defenses.  Some of these cyber security tools are part of the ARMS software platform. Through ARMS, IMSA can monitor a vessel’s critical systems and networks remotely in real-time through their state-of-the-art SOC (Security Operations Center).  This capability protects vessels from real-time threats to IT, OT, and other critical network systems.

“IMSA is continually enhancing the levels of protection we provide our clients.” Says Ranslem.  “Through ARMS and our 24/7 operations center we provide a variety of client focused services to ensure the safety of your voyage and critical systems.”

 

Source: maritime-executive


There are growing signs that a military crisis could erupt across the Taiwan Strait this year as China flexes its military muscle to strongarm Taipei into accepting unification.

ASPI’s Peter Jennings notes that Beijing is also seeking to test the mettle of the new US administration.

It’s vital that the United States stand firm against any Chinese provocation. A failure to defend Taiwan would be an abdication of US international leadership. It would seriously damage America’s credibility in the Indo-Pacific and would invite China and others to become ever more aggressive. Thankfully, all indications suggest that President Joe Biden is set to continue strengthening Washington’s relationship with Taipei.

Jennings argues that it’s equally important for Australia to stand with the US in any Taiwan Strait crisis. If China decides that military adventurism, timed to exploit the ongoing Covid-19 pandemic and political turmoil in the US, is a way to further its goal of ending America’s strategic primacy in the Indo-Pacific, the worst thing Australia could do is look the other way.

Principles matter. As Australia enjoys all the benefits of a free and open society in a stable and functioning democracy, our principles and values must extend to supporting the survival of Taiwan as a vibrant democracy of 24 million people with a successful market economy. The examples of Hong Kong and Xinjiang suggest a dark future for the Taiwanese people if China decides to force unification with the mainland.

Taipei’s success provides a powerful alternative to Beijing’s promotion of authoritarianism with Chinese characteristics as a model for development. Ideological competition is intensifying as Xi Jinping pushes for a Chinese-led ‘community of common destiny’ as a basis for the future global order. It’s just as vital for Western democracies to win this new ideological battle as it was for us to resist Soviet communism during the Cold War. To turn away from a fellow democracy under threat from an aggressive authoritarian neighbour would make a mockery of the values we advocate and lower our credibility in the eyes of many developing countries.

China has a geostrategic agenda that goes beyond forcing unification on the Taiwanese people. Taiwan is a means to a Beijing-dominated regional order that would dramatically worsen our strategic outlook.

A Chinese-controlled Taiwan would ease the challenges for Beijing in projecting naval power across the Indo-Pacific and weaken the ability of the US to maintain a forward presence in the western Pacific. From ports and air bases in Taiwan, the People’s Liberation Army could support the extension of its maritime militia and coast guard northwards through the Ryukyu Islands and against the Senkaku Islands. That would make it more difficult for Japan to protect its southern islands and give Beijing added coercive leverage against Tokyo in a crisis, including by interfering with Japan’s maritime commerce.

From Taiwan, the PLA could also pivot south, effectively enveloping the Philippines and giving Beijing easier access to the resource-rich Benham Rise. China has already sent oceanographic vessels there and challenged Manila’s sovereignty over those waters. Chinese control of Taiwan would also strengthen Beijing’s ability to control the South China Sea by blocking the Luzon Strait and the Balintang and Babuyan channels, cutting off the traditional access paths used by US naval vessels.

Control of Taiwan would make it easier for the PLA to reach Guam using long-range missiles and airpower, extending its anti-access capabilities beyond the first island chain. It would also enable the PLA to operate Type 096 ballistic-missile submarines further out into the middle sea between the first and second island chains, bringing more of the US within reach of JL-3 nuclear-armed submarine-launched ballistic missiles.

Taiwanese strategic analyst Eli Huang argued in 2017 that China had big plans for regional dominance extending well beyond the Taiwan Strait. Its development of large aircraft carriers and advanced aviation vessels for amphibious operations reinforces a power-projection capability that is increasing. Access to forward bases, whether through direct military conquest, such as the seizure of Taiwan and the militarisation of the South China Sea, or by exploiting its Belt and Road Initiative to gain access to commercial ports that could support Chinese naval vessels, would further extend that reach.

If China were to provoke a crisis over Taiwan, whether this year or in a future year, some would no doubt argue that it’s not Australia’s business and that supporting a US response would increase the risk of devastating Chinese military, political and economic retaliation against us. To accept that argument as policy would mark the end of our strategic alliance with the US, leaving us more exposed to Chinese coercive pressure and political warfare, or even a direct military threat.

As Kim Beazley stated in 2020:

Australia cannot be defended without the alliance with the United States. It’s as simple as that. If you know the math. If you know the capability. And if you know what we can actually spend—and I’d still say that at 2.3% of GDP—to contemplate a situation without them, you can forget it.

The loss of the US alliance would be catastrophic for our security, and a hegemonic China with grand imperial ambitions would force us to confront an ugly strategic choice. Acting alone, we’d need  significant boosts to our defence spending to achieve a degree of self-sufficiency beyond the traditional levels of ‘self-reliance’ that past defence white papers have alluded to. That could include developing military capabilities normally not considered for our defence force to deter a nuclear-armed adversary. We may well see an intensification of the political and economic pressure Beijing applied to Australia for much of 2020.

A military crisis across the Taiwan Strait would be a serious test of our national resolve, the strength of our most vital strategic relationship and our commitment to the values we stand for. The outcome of such a crisis would shape the strategic environment of the Indo-Pacific region for decades.

 

SHIP IP LTD – Remote internal/external Vulnerability &

Penetration Testing

TRUST OUR NETWORK – WE GUARANTEE BEST PRICES!

READ MORE

Maritime Vulnerability and Penetration Testing

 

Source: aspistrategist


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED