{"id":33,"date":"2020-02-10T12:52:29","date_gmt":"2020-02-10T12:52:29","guid":{"rendered":"http:\/\/www.safeseas.net\/evidence\/?p=33"},"modified":"2022-11-01T21:44:35","modified_gmt":"2022-11-01T21:44:35","slug":"cyber-crimes","status":"publish","type":"post","link":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/","title":{"rendered":"Cyber crimes"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"cybint\">Introduction<\/h2>\n\n\n\n<p style=\"font-size:16px\">Maritime cyber-crimes are illegal actions undertaken against ships or critical infrastructures through computer channels. Attacks can have a wide variety of purposes, including to damage, destroy or hijack IT (Information Technology) or OT (Operations Technology) systems.<span id='easy-footnote-1-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-1-33' title='&lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352146520302209&quot;&gt;Alcaide &amp;amp; Llave 2020&lt;\/a&gt;'><sup>1<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Multiple different targets, forms of attacks, motivations, and perpetrators can be involved in cyber-crimes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"799\" height=\"533\" src=\"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/08\/16005967512_0deee0303a_c.jpg\" alt=\"\" class=\"wp-image-301\" srcset=\"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/08\/16005967512_0deee0303a_c.jpg 799w, https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/08\/16005967512_0deee0303a_c-300x200.jpg 300w, https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/08\/16005967512_0deee0303a_c-768x512.jpg 768w, https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/08\/16005967512_0deee0303a_c-150x100.jpg 150w\" sizes=\"(max-width: 799px) 100vw, 799px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><em>Port, by <a href=\"https:\/\/www.flickr.com\/photos\/skynoir\/16005967512\/in\/photolist-qooLv7-3hMqP-UxuNsY-4BWbGQ-7ayuC-2ngNmeL-53qCMK-boPkHz-9eFiDs-5NjkKP-2cRM1iV-mDjjP-4Lymp-4LymQ-5Pzde4-iufdec-61PEFm-54VT7k-5F7C2q-8GvzH2-4Lymc-7sq8r-dp9NN-X8cNZj-3pAjHR-2jh4gHz-BoyjAA-27ek55A-MXJVpE-ChHg4J-6ykQvN-bpTmEp-kPjTY4-5XQmKj-b7FRav-cu4tVj-7cqXMz-ogXxK-EybyB3-5XsXgb-4Kf8Pa-Nu3vGg-a5np3M-4V7Frr-2hMKxA3-HQhYcJ-HE6V1r-Mqic8Z-zd7iWD-6r2YM\">Bill Dickinson<\/a> Attribution-NonCommercial-NoDerivs 2.0 Generic (CC BY-NC-ND 2.0)<\/em><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cybcha\">Characteristics<\/h2>\n\n\n\n<p style=\"font-size:16px\"><em>Targets<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Not all cyber-crimes discussed in this entry specifically target the maritime sector, but may instead aim to infect as many systems as possible.<span id='easy-footnote-2-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-2-33' title='&lt;a href=&quot;https:\/\/marlink.com\/resources\/&quot;&gt;MARLINK 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;'><sup>2<\/sup><\/a><\/span> As such, there is a distinction between targeted and untargeted attacks.<span id='easy-footnote-3-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-3-33' title='&lt;a href=&quot;https:\/\/marlink.com\/resources\/&quot;&gt;MARLINK 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;'><sup>3<\/sup><\/a><\/span>  Even so, cyber-crimes pose an increasing risk to the maritime sector, even when untargeted. This is due to the specific dynamics of the sector\u2019s critical infrastructure.<span id='easy-footnote-4-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-4-33' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/23738871.2018.1513053?journalCode=rcyb20&quot;&gt;Tam &amp;amp; Jones 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/ieeexplore.ieee.org\/document\/8899382&quot;&gt;2019&lt;\/a&gt;'><sup>4<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">For example, the movement of ships across international boundaries exposes their systems to a larger number of unknown IT networks.<span id='easy-footnote-5-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-5-33' title='&lt;a href=&quot;https:\/\/ieeexplore.ieee.org\/document\/8560690&quot;&gt;Tam and Jones 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/ieeexplore.ieee.org\/document\/8899382&quot;&gt;2019&lt;\/a&gt;'><sup>5<\/sup><\/a><\/span> Because many ships are relatively old (the average age of ships is over 20 years),<span id='easy-footnote-6-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-6-33' title='&lt;a href=&quot;https:\/\/www.statista.com\/statistics\/1102442\/age-of-world-merchant-fleet-by-vessel-type\/&quot;&gt;Statista 2022&lt;\/a&gt;'><sup>6<\/sup><\/a><\/span> they often have a mix of old and new systems, some of which may be obsolete. Many ships (including naval vessels) cannot upgrade these easily due to outdated hardware.<span id='easy-footnote-7-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-7-33' title='&lt;a href=&quot;https:\/\/money.cnn.com\/2015\/06\/26\/technology\/microsoft-windows-xp-navy-contract\/index.html&quot;&gt;Goldman 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/23738871.2018.1513053?journalCode=rcyb20&quot;&gt;Tam &amp;amp; Jones 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/ieeexplore.ieee.org\/document\/8899382&quot;&gt;2019&lt;\/a&gt;'><sup>7<\/sup><\/a><\/span> Tam and Jones argue that the design cycle of newer ships is of a duration that means this problem will likely continue to exist.<span id='easy-footnote-8-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-8-33' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/23738871.2018.1513053?journalCode=rcyb20&quot;&gt;Tam &amp;amp; Jones 2018&lt;\/a&gt;'><sup>8<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Other reasons ships are particularly vulnerable to cyber-attacks are their differing systems, the duration of their voyages which create large windows of opportunity for cyber-attacks, a nominally low bandwidth while at sea, and alternating between extreme isolation and global connectivity at international ports.<span id='easy-footnote-9-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-9-33' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/23738871.2018.1513053?journalCode=rcyb20&quot;&gt;Tam &amp;amp; Jones 2018&lt;\/a&gt;'><sup>9<\/sup><\/a><\/span> Because ships often change crews, it can be difficult to ensure that all crews are aware of cyber-vulnerability, meaning human failure can also be significant risk factor for ships.<\/p>\n\n\n\n<p style=\"font-size:16px\">Ships are increasingly connected to networks through very-small-aperture terminals (VSAT), and their bandwidth capacity is increasing. This means they can access networks with greater regularity and share more information, making them more susceptible to cyber-attack.<span id='easy-footnote-10-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-10-33' title='&lt;a href=&quot;https:\/\/marlink.com\/resources\/&quot;&gt;MARLINK 2018&lt;\/a&gt;'><sup>10<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Shipping is also increasingly reliant on networked systems for its operation.<span id='easy-footnote-11-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-11-33' title='&lt;a href=&quot;https:\/\/dl.acm.org\/doi\/10.1145\/2664243.2664257&quot;&gt;Balduzzi et al. 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/womencourage.acm.org\/archive\/2016\/poster_abstracts\/womENcourage_2016_paper_10.pdf&quot;&gt;Driva 2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.cambridge.org\/core\/journals\/journal-of-navigation\/article\/abs\/enhancing-navigator-competence-by-demonstrating-maritime-cyber-security\/AF9FD35689C5B5F879B2446722B5CA1B&quot;&gt;Hareide et al. 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/23738871.2018.1513053?journalCode=rcyb20&quot;&gt;Tam &amp;amp; Jones 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/ieeexplore.ieee.org\/document\/8899382&quot;&gt;2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.scirp.org\/journal\/paperinformation.aspx?paperid=113658&quot;&gt;Tam et al. 2021&lt;\/a&gt;'><sup>11<\/sup><\/a><\/span> Navigation depends on electronic systems such as ECDIS, GNSS, VDR and Radar\/ARPA, as well as the un-encrypted Automatic Identification System (AIS) network.<span id='easy-footnote-12-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-12-33' title='&lt;a href=&quot;https:\/\/www.marsh.com\/pr\/en\/industries\/marine\/insights\/risk-of-cyber-attack-to-maritime-sector.html&quot;&gt;Marsh 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;'><sup>12<\/sup><\/a><\/span> In some cases, ships are unable to sail without these systems; many are designed to be paper-less and are therefore  dependent on digital means of navigation.<span id='easy-footnote-13-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-13-33' title='&lt;a href=&quot;https:\/\/ieeexplore.ieee.org\/document\/8560690&quot;&gt;Tam and Jones 2018&lt;\/a&gt;'><sup>13<\/sup><\/a><\/span> Propulsion too is increasingly automated, especially power control systems, and is often networked through integration with navigation.<span id='easy-footnote-14-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-14-33' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;'><sup>14<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Ports are also at risk of being targeted. Computer systems undergird the global flow of maritime commerce. Ports incorporate a variety of networked OT systems, including modern gantry cranes, and scanning systems.<span id='easy-footnote-15-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-15-33' title='&lt;a href=&quot;https:\/\/www.brookings.edu\/research\/the-critical-infrastructure-gap-u-s-port-facilities-and-cyber-vulnerabilities\/&quot;&gt;Kramek 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;'><sup>15<\/sup><\/a><\/span> The advent of \u2018smart ports\u2019 means more of the day-to-day operations are automated, increasing vulnerability.<span id='easy-footnote-16-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-16-33' title='&lt;a href=&quot;https:\/\/issafrica.org\/iss-today\/security-vs-efficiency-smart-ports-in-a-post-covid-19-era&quot;&gt;Chelin &amp;amp; Reva 2020&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.ntu.edu.sg\/cas\/news-events\/news\/details\/development-of-smart-ports-in-africa&quot;&gt;Bagwandeen 2022&lt;\/a&gt;'><sup>16<\/sup><\/a><\/span> Port operators and agents also rely on IT for their management, such as freight management, operations data, traffic control communications, financial data, and corporate systems.<span id='easy-footnote-17-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-17-33' title='&lt;a href=&quot;https:\/\/www.brookings.edu\/research\/the-critical-infrastructure-gap-u-s-port-facilities-and-cyber-vulnerabilities\/&quot;&gt;Kramek 2013&lt;\/a&gt;'><sup>17<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">These infrastructures are often connected, with data flowing between a large number of actors from across the globe.<span id='easy-footnote-18-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-18-33' title='&lt;a href=&quot;https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/report\/raising-the-colors-signaling-for-cooperation-on-maritime-cybersecurity\/&quot;&gt;Loomis et al. 2021&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.garykessler.net\/MaritimeCybersecurityBook\/index.html&quot;&gt;Kessler &amp;amp; Shepard 2022&lt;\/a&gt;'><sup>18<\/sup><\/a><\/span> This means that a cyber-attack targeting or impacting on one actor can quickly spread to other actors and different infrastructures.<span id='easy-footnote-19-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-19-33' title='&lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;'><sup>19<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Types of attack<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Cyber-attacks can take multiple different forms.<span id='easy-footnote-20-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-20-33' title='&lt;a href=&quot;https:\/\/www.garykessler.net\/MaritimeCybersecurityBook\/index.html&quot;&gt;Kessler &amp;amp; Shepard 2022&lt;\/a&gt;'><sup>20<\/sup><\/a><\/span> In order to provide a simplified overview, these will be explored through the effects they have \u2013 firstly, those that impact directly on operations, and secondly, those that are used to facilitate other forms of criminality.<\/p>\n\n\n\n<p style=\"font-size:16px\">The first type of cybercrime stops or limits operations, generally through a direct attack that damages systems or makes them either inaccessible or limited in such a way that continuing operations in ports or onboard ships and offshore infrastructure would be impossible or unsafe. Autonomous shipping, port services, navigation aid systems, offshore platforms and marine traffic control centres are all potential targets for these kinds of crimes.<\/p>\n\n\n\n<p style=\"font-size:16px\">Cyberattacks of this type can include mechanisms such as malware, software designed to damage systems, ransomware, software that blocks access to systems or publishes data unless a ransom is paid, and Distributed Denial of Service (DDoS &#8211; the flooding of a network with data to make it inaccessible). The Baltic and International Maritime Council (BIMCO) report a case where a shipowner opened an infected email attachment sent from two unwitting ship agents which made systems inaccessible until a ransom had been paid.<span id='easy-footnote-21-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-21-33' title='&lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;'><sup>21<\/sup><\/a><\/span> Similarly, a large-scale destructive malware attack was targeted at the Maersk line in 2017.<span id='easy-footnote-22-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-22-33' title='&lt;a href=&quot;https:\/\/www.forbes.com\/sites\/leemathews\/2017\/08\/16\/notpetya-ransomware-attack-cost-shipping-giant-maersk-over-200-million\/?sh=2bb5f2914f9a&quot;&gt;Mathews 2017&lt;\/a&gt;'><sup>22<\/sup><\/a><\/span> This saw malware spread across up to 76 ports causing widespread system outages. Both of these examples shut down operations by making information systems inaccessible. <\/p>\n\n\n\n<p style=\"font-size:16px\">Ships are also at risk from these forms of attack. In 2016 in South Korea 280 ships had to halt operations due to problems with their navigation systems.<span id='easy-footnote-23-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-23-33' title='&lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;'><sup>23<\/sup><\/a><\/span> Viruses and malware have been shown to contribute to these issues, causing stoppages in operations due to safety concerns and an inability to navigate effectively.<span id='easy-footnote-24-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-24-33' title='&lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;'><sup>24<\/sup><\/a><\/span> While these navigation systems were connected to the internet, even air-gapped systems (those not physically connected to an external network) have been shown to have dormant viruses.<span id='easy-footnote-25-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-25-33' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/23738871.2018.1513053?journalCode=rcyb20&quot;&gt;Tam &amp;amp; Jones 2018&lt;\/a&gt;'><sup>25<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Many of these attacks are likely to have been untargeted. However, analysis by BIMCO suggests that targeted attacks are more sophisticated, because specific tools and techniques will be created for targeting the company or ship. These might include the manipulation of insider individuals; brute force (where many passwords are tried); and DDoS attacks.<span id='easy-footnote-26-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-26-33' title='&lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;'><sup>26<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Spoofing is a targeted form of attack that has become a concern for ship navigation.<span id='easy-footnote-27-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-27-33' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;'><sup>27<\/sup><\/a><\/span>. Spoofing involves convincing the positioning systems of the ship into believing a counterfeit signal in order to make unintentional course corrections.<span id='easy-footnote-28-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-28-33' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;'><sup>28<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">One study conducted by Trend Micro demonstrated an ability to recreate a VHF frequency on AIS that could simulate a \u201cghost ship\u201d in a nearby port, which would alert vessels they were on a collision course and change their path.<span id='easy-footnote-29-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-29-33' title='&lt;a href=&quot;https:\/\/abcnews.go.com\/Blotter\/guys-make-oil-tankers-disappear-virtually\/story?id=20565851&quot;&gt;Ferran 2013&lt;\/a&gt;'><sup>29<\/sup><\/a><\/span> In a further study the University of Texas-Austin were able to effectively take remote control of a yacht in the Mediterranean by overpowering the onboard GPS.<span id='easy-footnote-30-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-30-33' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;'><sup>30<\/sup><\/a><\/span> Spoofing can also cause ships to misreport or lose their own position, as occurred in the Black Sea in 2017 in an incident that impacted over 20 vessels.<span id='easy-footnote-31-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-31-33' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;'><sup>31<\/sup><\/a><\/span> The diversion of ships through spoofing impacts negatively on operations, requiring the them to right the course manually or halt altogether until the issue is resolved.<span id='easy-footnote-32-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-32-33' title='&lt;a href=&quot;https:\/\/www.cambridge.org\/core\/journals\/journal-of-navigation\/article\/abs\/enhancing-navigator-competence-by-demonstrating-maritime-cyber-security\/AF9FD35689C5B5F879B2446722B5CA1B&quot;&gt;Hareide et al. 2018&lt;\/a&gt;'><sup>32<\/sup><\/a><\/span> Jamming can also cause such issues by causing failures in navigation systems.<span id='easy-footnote-33-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-33-33' title='&lt;a href=&quot;https:\/\/info.publicintelligence.net\/DHS-SeaportCyberAttacks.pdf&quot;&gt;Homeland Security 2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;'><sup>33<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">Data loss and theft resulting from hacking can be a serious targeted cyber-crime. In a case against an Iranian Shipping Line, for example, data loss relating to delivery and locations of containers meant that  cargo containers could not be identified or located, causing financial loss.<span id='easy-footnote-34-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-34-33' title='&lt;a href=&quot;https:\/\/www.sfmx.org\/wp-content\/uploads\/2017\/03\/Maritime-Cyber-Crime-10-2014.pdf&quot;&gt;Cyberkeel 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/book\/10.1007\/978-3-030-34630-0&quot;&gt;Kapalidis 2020&lt;\/a&gt;'><sup>34<\/sup><\/a><\/span> There have also been cases where companies have been extorted into paying hackers so that confidential business information is not released.<span id='easy-footnote-35-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-35-33' title='&lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;'><sup>35<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">A second type of cybercrime aims to facilitate other maritime crimes such as drugs trafficking, piracy, and fraud though various forms of cyber-attack, for example by hacking port systems that control and track container movement in order to hide shipments of illicit goods. An indicative case was the hacking of the Port of Antwerp\u2019s digital container tracking system in 2013.<span id='easy-footnote-36-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-36-33' title='&lt;a href=&quot;https:\/\/www.europol.europa.eu\/sites\/default\/files\/documents\/cyberbits_04_ocean13.pdf&quot;&gt;EUROPOL 2013&lt;\/a&gt;'><sup>36<\/sup><\/a><\/span> Containers trafficking drugs could be released without port authorities becoming aware, and traffickers could reach containers before their legitimate owners.<span id='easy-footnote-37-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-37-33' title='&lt;a href=&quot;https:\/\/www.sfmx.org\/wp-content\/uploads\/2017\/03\/Maritime-Cyber-Crime-10-2014.pdf&quot;&gt;Cyberkeel 2014&lt;\/a&gt;'><sup>37<\/sup><\/a><\/span> Initially this was done through the cultivation of insiders in the port system, which then allowed hackers to re-enter electronic systems remotely. In other cases, traffickers have been able to discover which containers are under suspicion in order to avoid collection, as occurred in Australia in 2012 <span id='easy-footnote-38-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-38-33' title='&lt;a href=&quot;https:\/\/www.kaspersky.com\/blog\/maritime-cyber-security\/8796\/&quot;&gt;Kotchekova 2015&lt;\/a&gt;'><sup>38<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Robbery and piracy can be facilitated by cybercrimes. By hacking a system, attackers can browse cargo and container lists to identify the most valuable goods for black markets, to then be stolen in the port or targeted for future piracy attacks when the ship is at sea.<span id='easy-footnote-39-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-39-33' title='&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;'><sup>39<\/sup><\/a><\/span> Between 2010 and 2011, for example, a Greek Shipping Company was targeted by pirates in the Gulf of Aden after hackers had gained access to route timetables and ship vulnerabilities.<span id='easy-footnote-40-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-40-33' title='&lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.garykessler.net\/MaritimeCybersecurityBook\/index.html&quot;&gt;Kessler &amp;amp; Shepard 2022&lt;\/a&gt;'><sup>40<\/sup><\/a><\/span> It has been suggested that spoofing can also make piracy easier, by making the ships appear to be elsewhere \u2013 either leading them into more dangerous areas or making rescue difficult.<span id='easy-footnote-41-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-41-33' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;'><sup>41<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">Cyber-fraud, too, is an increasing problem. A number of maritime bunkering and fuel services have fallen victim to such frauds, including World Fuel Services, who were defrauded of $17.9 million by a faked order.<span id='easy-footnote-42-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-42-33' title='&lt;a href=&quot;https:\/\/bunkerindex.com\/news\/article.php?article_id=17335&quot;&gt;Bunker Index 2016&lt;\/a&gt;'><sup>42<\/sup><\/a><\/span> Criminals were able to create a fake fuel supply tender, which led to a ship-to-ship transfer. When they attempted to bill the agency in the documents, however, there was no record of the transaction. Vulnerabilities are increased because many transactions occur over email.<span id='easy-footnote-43-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-43-33' title='&lt;a href=&quot;https:\/\/shipandbunker.com\/news\/am\/171559-recent-cyber-attacks-highlight-bunker-industry-vulnerability&quot;&gt;Ship &amp;amp; Bunker 2014&lt;\/a&gt;'><sup>43<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Perpetrators<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Some attacks are undertaken by independent individuals and are relatively minor in scale and effect. These may be carried out by hackers outside of the system or disgruntled employees.<span id='easy-footnote-44-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-44-33' title='&lt;a href=&quot;https:\/\/www.gov.uk\/government\/publications\/ship-security-cyber-security-code-of-practice&quot;&gt;Department for Transport 2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/859925\/cyber-security-for-ports-and-port-systems-code-of-practice.pdf&quot;&gt;2020&lt;\/a&gt;; &lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;'><sup>44<\/sup><\/a><\/span> The motivation for such attacks may be economic gain, but non-financial reasons such as a desire to cause vandalism, leak information, prove cyber skills and enhance reputation in the wider community, or even ideological motivations when wanting to damage operations to protest for an activist cause.<span id='easy-footnote-45-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-45-33' title='&lt;a href=&quot;https:\/\/www.gov.uk\/government\/publications\/ship-security-cyber-security-code-of-practice&quot;&gt;Department for Transport 2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/859925\/cyber-security-for-ports-and-port-systems-code-of-practice.pdf&quot;&gt;2020&lt;\/a&gt;; &lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/report\/raising-the-colors-signaling-for-cooperation-on-maritime-cybersecurity\/&quot;&gt;Loomis et al. 2021&lt;\/a&gt;'><sup>45<\/sup><\/a><\/span> Within these relatively small activities some may be opportunistic rather than planned and be undertaken without specialist knowledge of techniques and tools.<span id='easy-footnote-46-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-46-33' title='&lt;a href=&quot;https:\/\/www.gov.uk\/government\/publications\/ship-security-cyber-security-code-of-practice&quot;&gt;Department for Transport 2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/859925\/cyber-security-for-ports-and-port-systems-code-of-practice.pdf&quot;&gt;2020&lt;\/a&gt;'><sup>46<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Other cybercrimes are more organised. In the cases of trafficking facilitation above for example, there were links to South American organised criminal groups. Corrupt employees can also be implicated in such attacks. Attackers often need an in-depth knowledge of port systems and infrastructure, as well as expert knowledge of the techniques and tools for cyberattacks, both of which demand sophisticated organisational capacities.<\/p>\n\n\n\n<p style=\"font-size:16px\">Other groups engage in corporate or industrial espionage. <span id='easy-footnote-47-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-47-33' title='&lt;a href=&quot;https:\/\/www.semanticscholar.org\/paper\/Maritime-Critical-Infrastructure-Cyber-Risk-Newberry\/222bae0f01661a9a3293b5dc887ee72a88a26ba5&quot;&gt;Newberry 2015&lt;\/a&gt;'><sup>47<\/sup><\/a><\/span> These can include corporations seeking to create competitive advantage .<span id='easy-footnote-48-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-48-33' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;'><sup>48<\/sup><\/a><\/span> They may act directly or through third parties with the aim of harming a rival by collecting business intelligence, stealing intellectual property, or disrupting operations to cause financial or reputational loss.<span id='easy-footnote-49-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-49-33' title='&lt;a href=&quot;https:\/\/www.gov.uk\/government\/publications\/ship-security-cyber-security-code-of-practice&quot;&gt;Department for Transport 2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/859925\/cyber-security-for-ports-and-port-systems-code-of-practice.pdf&quot;&gt;2020&lt;\/a&gt;; &lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;'><sup>49<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Not all organised cyber-crimes are targeted or have a financial motivation. For example, the Maersk case discussed above was well-orchestrated, but seems to have been aimed at disruption as much as financial gain. This has led to a recognition of a distinction between vandalism, which is relatively small scale and disorganised on the one hand, and well-organised and intentional sabotage on the other.<span id='easy-footnote-50-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-50-33' title='&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;'><sup>50<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">A final difficulty is distinguishing between acts undertaken by criminal groups or independent hackers, and those carried out by states. State-led cyber-crimes tend to be viewed as issues of national security. Cyber-attacks are increasingly difficult to attribute,<span id='easy-footnote-51-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-51-33' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/blogs.icrc.org\/law-and-policy\/2017\/12\/07\/combating_cyber-fatigue-in-the-maritime-domain\/&quot;&gt;Fahey 2017&lt;\/a&gt;'><sup>51<\/sup><\/a><\/span> especially if they are undertaken by perpetrators with less clear state-sponsorship. Some of these criminal acts are thought to be undertaken by states due to the targets involved and the sophistication of the attacks. In 2020 for example, a cyber-attack in Iran\u2019s Shahid Rajaee port terminal \u2013 thought to have been conducted by Israel &#8211; halted operations.<span id='easy-footnote-52-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-52-33' title='&lt;a href=&quot;https:\/\/www.washingtonpost.com\/national-security\/officials-israel-linked-to-a-disruptive-cyberattack-on-iranian-port-facility\/2020\/05\/18\/9d1da866-9942-11ea-89fd-28fb313d1886_story.html&quot;&gt;Warrick &amp;amp; Nakashima 2020&lt;\/a&gt;'><sup>52<\/sup><\/a><\/span> There are also increasing concerns that terrorist groups could engage in cyber-crimes.<span id='easy-footnote-53-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-53-33' title='&lt;a href=&quot;https:\/\/www.brookings.edu\/research\/the-critical-infrastructure-gap-u-s-port-facilities-and-cyber-vulnerabilities\/&quot;&gt;Kramek 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.semanticscholar.org\/paper\/Maritime-Critical-Infrastructure-Cyber-Risk-Newberry\/222bae0f01661a9a3293b5dc887ee72a88a26ba5&quot;&gt;Newberry 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.lexisnexis.com\/legalnewsroom\/public-policy\/b\/public-policy-law-blog\/posts\/cyber-terrorism-a-new-threat-against-the-maritime-industry&quot;&gt;Tanti-Dougall 2014&lt;\/a&gt;'><sup>53<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cybsco\">Scope<\/h2>\n\n\n\n<p style=\"font-size:16px\">There was initially criticism that the frequency and potential of cyber-attacks was been overestimated.<span id='easy-footnote-54-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-54-33' title='&lt;a href=&quot;https:\/\/timreview.ca\/sites\/default\/files\/article_PDF\/Jensen_TIMReview_April2015.pdf&quot;&gt;Jensen 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.sfmx.org\/wp-content\/uploads\/2017\/03\/Maritime-Cyber-Crime-10-2014.pdf&quot;&gt;Cyberkeel 2014&lt;\/a&gt;'><sup>54<\/sup><\/a><\/span> In response, sources such as CyberKeel and Maritime Cyber Emergency Response Team produce bulletins identifying maritime cyber attacks when they take place.<span id='easy-footnote-55-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-55-33' title='&lt;a href=&quot;https:\/\/www.maritimecert.org\/&quot;&gt;Maritime CERT n.d.&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.sfmx.org\/wp-content\/uploads\/2017\/03\/Maritime-Cyber-Crime-10-2014.pdf&quot;&gt;Cyberkeel 2014&lt;\/a&gt;'><sup>55<\/sup><\/a><\/span> BIMCO also collect this information.<span id='easy-footnote-56-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-56-33' title='&lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;'><sup>56<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">Despite these efforts, the scope of cybercrime in the maritime sphere is not well understood. There is no centralized reporting mechanism and there has been some degree of confusion whether channels for reporting emergencies include cybercrimes.<span id='easy-footnote-57-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-57-33' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/23738871.2018.1513053?journalCode=rcyb20&quot;&gt;Tam &amp;amp; Jones 2018&lt;\/a&gt;'><sup>57<\/sup><\/a><\/span> This has led to calls for an accessible and streamlined reporting process.<span id='easy-footnote-58-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-58-33' title='&lt;a href=&quot;https:\/\/ieeexplore.ieee.org\/document\/8826949&quot;&gt;Silverajan &amp;amp; Vistiaho 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/report\/raising-the-colors-signaling-for-cooperation-on-maritime-cybersecurity\/&quot;&gt;Loomis et al. 2021&lt;\/a&gt;'><sup>58<\/sup><\/a><\/span> However, such systems are limited because cybercrimes are sometimes not disclosed by those targeted due to concerns over reputational loss the exposure of flaws in their IT infrastructure, or misclassification as technological error.<span id='easy-footnote-59-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-59-33' title='&lt;a href=&quot;https:\/\/www.econstor.eu\/bitstream\/10419\/209316\/1\/hicl-2017-23-343.pdf&quot;&gt;Ahokas et al. 2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.sfmx.org\/wp-content\/uploads\/2017\/03\/Maritime-Cyber-Crime-10-2014.pdf&quot;&gt;Cyberkeel 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/timreview.ca\/sites\/default\/files\/article_PDF\/Jensen_TIMReview_April2015.pdf&quot;&gt;Jensen 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/ieeexplore.ieee.org\/document\/9585112&quot;&gt;Larsen &amp;amp; Lund 2021&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/report\/raising-the-colors-signaling-for-cooperation-on-maritime-cybersecurity\/&quot;&gt;Loomis et al. 2021&lt;\/a&gt;'><sup>59<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Even so, it is clear that cybercrimes in the maritime sector are on the rise and that many more attacks occur than are made public.<span id='easy-footnote-60-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-60-33' title='&lt;a href=&quot;https:\/\/commons.erau.edu\/publication\/1318\/&quot;&gt;Kessler 2019&lt;\/a&gt;'><sup>60<\/sup><\/a><\/span> Cybersecurity consultancy Naval Dome for example reported a 400 per cent increase in their detected attempted attacks between February and May 2020.<span id='easy-footnote-61-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-61-33' title='&lt;a href=&quot;https:\/\/maritime-executive.com\/article\/report-maritime-cyberattacks-up-by-400-percent&quot;&gt;Maritime Executive 2020&lt;\/a&gt;'><sup>61<\/sup><\/a><\/span> The COVID-19 pandemic is thought to have had an impact on this increase, because more systems are became digitally connected out of necessity.<span id='easy-footnote-62-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-62-33' title='&lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1007\/s13437-021-00235-1&quot;&gt;Khun et al. 2021&lt;\/a&gt;'><sup>62<\/sup><\/a><\/span> Overall, Safety at Sea and BIMCO report 31 per cent of companies surveyed reported an attempted cyber attack in 2020.<span id='easy-footnote-63-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-63-33' title='&lt;a href=&quot;https:\/\/cdn.ihsmarkit.com\/www\/prot\/pdf\/1020\/Safety-at-Sea-and-BIMCO-Cyber-Security-White-Paper-2020.pdf&quot;&gt;Safety at Sea &amp;amp; BIMCO 2021&lt;\/a&gt;'><sup>63<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cybimp\">Impact<\/h2>\n\n\n\n<p style=\"font-size:16px\">The kinds of attacks described above have a number of tangible impacts. There are also hypothetical impacts should some (so far unsuccessful) cybercrimes to be successful.<\/p>\n\n\n\n<p style=\"font-size:16px\">First, paying ransoms or dealing with operational shutdowns has an economic impact. The attack on Maersk for example, is argued to have cost as much as $300 million in lost revenue and costs associated with re-building compromised networks.<span id='easy-footnote-64-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-64-33' title='&lt;a href=&quot;https:\/\/commons.erau.edu\/publication\/1318\/&quot;&gt;Kessler 2019&lt;\/a&gt;'><sup>64<\/sup><\/a><\/span> Systems may also be damaged or destroyed. Theft facilitated by cybercrimes also causes a significant economic impact.<span id='easy-footnote-65-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-65-33' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/23738871.2018.1513053?journalCode=rcyb20&quot;&gt;Tam &amp;amp; Jones 2018&lt;\/a&gt;'><sup>65<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">Reputation damage, while negative in itself, might also have an economic impact by limiting future revenue.<span id='easy-footnote-66-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-66-33' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/23738871.2018.1513053?journalCode=rcyb20&quot;&gt;Tam &amp;amp; Jones 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/marlink.com\/resources\/&quot;&gt;MARLINK 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352146520302209&quot;&gt;Alcaide &amp;amp; Llave 2020&lt;\/a&gt;'><sup>66<\/sup><\/a><\/span> There are concerns that if ports were disrupted by cyber-attacks, the zero-inventory just-in-time nature of many economies would see commerce severely disrupted.<span id='easy-footnote-67-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-67-33' title='&lt;a href=&quot;https:\/\/www.brookings.edu\/research\/the-critical-infrastructure-gap-u-s-port-facilities-and-cyber-vulnerabilities\/&quot;&gt;Kramek 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1007\/s13437-021-00235-1&quot;&gt;Khun et al. 2021&lt;\/a&gt;'><sup>67<\/sup><\/a><\/span> This would have a severe economic impact for workers, business revenue and also the shipping lines themselves as goods would have to be diverted.<\/p>\n\n\n\n<p style=\"font-size:16px\">Cyber-crimes that facilitate drug trafficking undermine enforcement efforts and the rule of law. They also contribute to income for illicit organised groups. In the wake of the Antwerp case discussed above, over $365 million of drugs were seized \u2013 demonstrating just how profitable the operation was to the organised gangs.<span id='easy-footnote-68-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-68-33' title='&lt;a href=&quot;https:\/\/link.springer.com\/book\/10.1007\/978-3-030-34630-0&quot;&gt;Kapalidis 2020&lt;\/a&gt;'><sup>68<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">Cyber-attacks may impact on the physical safety of ships, crews and others. Disrupting navigation could lead to ship-on-ship collisions or even cause ships to collide go aground.<span id='easy-footnote-69-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-69-33' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;'><sup>69<\/sup><\/a><\/span> As yet, this remains only a hypothesised outcome, but the growing reliance on automated shipping means it is a possibility based on the successful spoofing attacks that have occurred so far. Undetected attacks on Mobile Offshore Drilling Units have the potential to cause oil spills or loss of life through explosions.<span id='easy-footnote-70-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-70-33' title='&lt;a href=&quot;https:\/\/maritime-executive.com\/blog\/maritime-cyber-attacks-changing-tides&quot;&gt;Belmont 2015&lt;\/a&gt;'><sup>70<\/sup><\/a><\/span> If OT systems in ports were compromised, it could lead to injury or death due to the dangerous natures of the cranes and ship movement.<span id='easy-footnote-71-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-71-33' title='&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;'><sup>71<\/sup><\/a><\/span> There are also serious security and safety implications of having queues of ships outside of a port entrance in the case of a shutdown.<span id='easy-footnote-72-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-72-33' title='&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;'><sup>72<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Finally, Kramek hypothesises that some cyber-crimes could also impact on military operations, and therefore have a significant national security dimension.<span id='easy-footnote-73-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-73-33' title='&lt;a href=&quot;https:\/\/www.brookings.edu\/research\/the-critical-infrastructure-gap-u-s-port-facilities-and-cyber-vulnerabilities\/&quot;&gt;Kramek 2013&lt;\/a&gt;'><sup>73<\/sup><\/a><\/span> In his analysis of the Port of Beaumont, through which much of the US Army\u2019s logistics run, he argues that any attack there could impact the military\u2019s ability to respond to crisis or conflict.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cyblin\">Linkages &amp; Synergies<\/h2>\n\n\n\n<p style=\"font-size:16px\">Cybercrime is most often linked to illicit trafficking, given traffickers&#8217; past usage of cyber to facilitate the movement of cargo through ports. It is also linked to piracy, as information gained through cyber-attacks has been used to inform pirate attacks in the past.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cybres\">Responses<\/h2>\n\n\n\n<p style=\"font-size:16px\">Responses to cybercrime in the maritime sector have been slow in coming, though there is a movement towards improved guidelines for maritime stakeholders.<\/p>\n\n\n\n<p style=\"font-size:16px\">Most evidence suggests that ports and shipping lines are under-prepared for cyber threats <span id='easy-footnote-74-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-74-33' title='&lt;a href=&quot;https:\/\/www.econstor.eu\/bitstream\/10419\/209316\/1\/hicl-2017-23-343.pdf&quot;&gt;Ahokas et al. 2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;'><sup>74<\/sup><\/a><\/span> due to a lack of awareness about cyber-security among management and stakeholders, and a belief that the prospect of an attack is either unlikely or theoretical.<span id='easy-footnote-75-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-75-33' title='&lt;a href=&quot;https:\/\/www.sfmx.org\/wp-content\/uploads\/2017\/03\/Maritime-Cyber-Crime-10-2014.pdf&quot;&gt;Cyberkeel 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1007\/s13437-021-00235-1&quot;&gt;Khun et al. 2021&lt;\/a&gt;'><sup>75<\/sup><\/a><\/span>. There may also be a confusion of responsibility for cyber security between port authorities and IT providers.<span id='easy-footnote-76-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-76-33' title='&lt;a href=&quot;https:\/\/www.brookings.edu\/research\/the-critical-infrastructure-gap-u-s-port-facilities-and-cyber-vulnerabilities\/&quot;&gt;Kramek 2013&lt;\/a&gt;'><sup>76<\/sup><\/a><\/span> Kramek demonstrates that most ports in the US did not claim Port Security Grant Program funds (which could be used for any aspect of port security) for cybersecurity purposes.<span id='easy-footnote-77-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-77-33' title='&lt;a href=&quot;https:\/\/www.brookings.edu\/research\/the-critical-infrastructure-gap-u-s-port-facilities-and-cyber-vulnerabilities\/&quot;&gt;Kramek 2013&lt;\/a&gt;'><sup>77<\/sup><\/a><\/span> Most did not have cyber incident response plans. These factors have led some to argue that the maritime industry is 10-20 years behind comparable industries in addressing cyber security challenges.<span id='easy-footnote-78-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-78-33' title='&lt;a href=&quot;https:\/\/maritime-executive.com\/article\/Maritime-Cybersecurity-A-Growing-Unanswered-Threat-2014-10-24&quot;&gt;Caponi &amp;amp; Belmont 2014&lt;\/a&gt;'><sup>78<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>International<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">A number of international organisations have released guidelines for shipping companies and ports, including BIMCO, the International Maritime Organisation (IMO), the European Union Agency for Cybersecurity (ENISA), International Association of Ports and Harbors (IAPH),<span id='easy-footnote-79-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-79-33' title='&lt;a href=&quot;https:\/\/sustainableworldports.org\/wp-content\/uploads\/IAPH-Port-Community-Cyber-Security-Report-Q2-2020.pdf&quot;&gt;IAPH 2020&lt;\/a&gt;'><sup>79<\/sup><\/a><\/span> and EUROPOL. <\/p>\n\n\n\n<p style=\"font-size:16px\">The expected outcome of these guidelines is a greater awareness amongst stakeholders of the issues, leading to better cyber security policies and training for staff.<span id='easy-footnote-80-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-80-33' title='&lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1007\/s13437-021-00235-1&quot;&gt;Khun et al. 2021&lt;\/a&gt;'><sup>80<\/sup><\/a><\/span> Such training is important due to the \u2018insider threat\u2019, where employees may unwillingly contribute to cyber-attacks through their own lack of awareness.<span id='easy-footnote-81-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-81-33' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/23738871.2018.1513053?journalCode=rcyb20&quot;&gt;Tam &amp;amp; Jones 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/ssg.lancs.ac.uk\/wp-content\/uploads\/oliver-the-maritime.pdf&quot;&gt;Fitton et al. 2015&lt;\/a&gt;'><sup>81<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Insurance companies have played a role in raising awareness, especially as many exclude cyber-attacks from their policies and therefore increase risk (the Institute Cyber Attack Exclusion Clause).<span id='easy-footnote-82-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-82-33' title='&lt;a href=&quot;https:\/\/www.marsh.com\/content\/dam\/marsh\/Documents\/PDF\/US-en\/silent-cyber-changing-ins-markets-slides.pdf&quot;&gt;Marsh 2020&lt;\/a&gt;'><sup>82<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">International guidelines also suggest security audits and assessments,<span id='easy-footnote-83-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-83-33' title='&lt;a href=&quot;https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships&quot;&gt;BIMCO 2021&lt;\/a&gt;; &lt;a href=&quot;https:\/\/issafrica.org\/iss-today\/security-vs-efficiency-smart-ports-in-a-post-covid-19-era&quot;&gt;Chelin &amp;amp; Reva 2020&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;'><sup>83<\/sup><\/a><\/span> penetration testing, network segmentation, regular network scans, multi-factor authentication, identification of stakeholders, the creation of a security operations centre with a dedicated cybersecurity officer, and physical security assessments.<span id='easy-footnote-84-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-84-33' title='&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.gov.uk\/government\/publications\/ship-security-cyber-security-code-of-practice&quot;&gt;Department for Transport 2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/859925\/cyber-security-for-ports-and-port-systems-code-of-practice.pdf&quot;&gt;2020&lt;\/a&gt;'><sup>84<\/sup><\/a><\/span> Relatively basic guidelines include the need to employ antivirus and encryption measures, frequent password updates, and electronic data backup, as well as limiting the use of USB devices by employees.<span id='easy-footnote-85-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-85-33' title='&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;'><sup>85<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">In their Interim Guidelines in Maritime Security Cyber Risk Management, issued in 2017, the IMO proposes an approach based on five functional elements: identify, protect, detect, respond and recover. Shipping companies had to come into compliance on the 1st of January, 2021.<span id='easy-footnote-86-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-86-33' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jmlc50&amp;amp;div=7&amp;amp;id=&amp;amp;page=&quot;&gt;Daum 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/cimsec.org\/the-imos-2021-cyber-guidelines-and-the-work-that-remains-to-secure-ports\/&quot;&gt;Petta 2021&lt;\/a&gt;'><sup>86<\/sup><\/a><\/span> <\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>National<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">National guidelines have also been implemented. Examples include two sets of codes of practice from the UK&#8217;s Department for Transport (Cybersecurity for Ships, and the Cyber Security Code of Practice for Ports),<span id='easy-footnote-87-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-87-33' title='&lt;a href=&quot;https:\/\/www.gov.uk\/government\/publications\/ship-security-cyber-security-code-of-practice&quot;&gt;Department for Transport 2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/859925\/cyber-security-for-ports-and-port-systems-code-of-practice.pdf&quot;&gt;2020&lt;\/a&gt;'><sup>87<\/sup><\/a><\/span>, France\u2019s Critical Infrastructures Information Protection Law,<span id='easy-footnote-88-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-88-33' title='&lt;a href=&quot;https:\/\/www.ssi.gouv.fr\/en\/cybersecurity-in-france\/ciip-in-france\/&quot;&gt;ANSSI n.d.&lt;\/a&gt;'><sup>88<\/sup><\/a><\/span> and the German IT-Grundschutz.<span id='easy-footnote-89-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-89-33' title='&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/topics\/threat-risk-management\/risk-management\/current-risk\/risk-management-inventory\/rm-ra-methods\/m_it_grundschutz.html&quot;&gt;ENISA n.d.&lt;\/a&gt;'><sup>89<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">While preventative guidelines to cyber-threats are increasingly common, strategies for actually responding to cyber-attacks are less well-developed. Reporting attacks to national jurisdictions when underway remains problematic, for example. <\/p>\n\n\n\n<p style=\"font-size:16px\">Some countries have delegated cyber-security to a specific agency or department in order to build stronger cyber resilience. In the US for example, the US Coast Guard is charged with protecting the maritime sector from cyber-crimes. They send out monthly notices to the maritime community in the United States with links to cybersecurity awareness bulletins, training, tools, and alerts.<span id='easy-footnote-90-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-90-33' title='&lt;a href=&quot;https:\/\/www.dco.uscg.mil\/Our-Organization\/Assistant-Commandant-for-Prevention-Policy-CG-5P\/Inspections-Compliance-CG-5PC-\/Office-of-Port-Facility-Compliance\/Domestic-Ports-Division\/cybersecurity\/&quot;&gt;USCG n.d.&lt;\/a&gt;'><sup>90<\/sup><\/a><\/span> However, coordination with other relevant agencies has sometimes been problematic.<span id='easy-footnote-91-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-91-33' title='&lt;a href=&quot;https:\/\/www.brookings.edu\/research\/the-critical-infrastructure-gap-u-s-port-facilities-and-cyber-vulnerabilities\/&quot;&gt;Kramek 2013&lt;\/a&gt;'><sup>91<\/sup><\/a><\/span> Coordination challenges have also been recognised within the EU. The European Union Agency for Cyber Security (ENISA) for example argues that \u2018the fragmentation of European maritime policies brings difficulties for the clear definition of responsibilities and roles to be taken regarding cyber security matters in this sector.\u2019<span id='easy-footnote-92-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-92-33' title='&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/cyber-security-aspects-in-the-maritime-sector-1\/at_download\/fullReport&quot;&gt;ENISA 2011&lt;\/a&gt;'><sup>92<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Coordination and information-sharing between state and private stakeholders such as shipping agents and port authorities can also be difficult. This is problematic when these stakeholders  share access to the same systems and networks.<span id='easy-footnote-93-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-93-33' title='&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/cyber-security-aspects-in-the-maritime-sector-1\/at_download\/fullReport&quot;&gt;ENISA 2011; &lt;\/a&gt;&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;'><sup>93<\/sup><\/a><\/span> One port can incorporate up to 900 different stakeholders for example.<span id='easy-footnote-94-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-94-33' title='&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;'><sup>94<\/sup><\/a><\/span> Some may use different IT systems with different technical support teams behind them. As ENISA argues, \u2018this [port] ecosystem is built from companies of various sizes, with various levels of cybersecurity capabilities and can even be direct competitors among themselves\u2019.<span id='easy-footnote-95-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-95-33' title='&lt;a href=&quot;https:\/\/www.enisa.europa.eu\/publications\/port-cybersecurity-good-practices-for-cybersecurity-in-the-maritime-sector&quot;&gt;ENISA 2019&lt;\/a&gt;'><sup>95<\/sup><\/a><\/span> Efforts are underway to solve this problem &#8211; Port Information Sharing and Analysis centres, for example, aim to establish public-private partnerships and are predicated on trust-based networks that allow for secure information-exchange.<span id='easy-footnote-96-33' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#easy-footnote-bottom-96-33' title='&lt;a href=&quot;https:\/\/homeport.uscg.mil\/Lists\/Content\/DispForm.aspx?ID=45422&amp;amp;Source=\/Lists\/Content\/DispForm.aspx?ID=45422&quot;&gt;USCG 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/ieeexplore.ieee.org\/document\/9585112&quot;&gt;Larsen &amp;amp; Lund 2021&lt;\/a&gt;'><sup>96<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cybres\">List of References<\/h2>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Maritime cyber-crimes are illegal actions undertaken against ships or critical infrastructures through computer channels. Attacks can have a wide variety of purposes, including to damage, destroy or hijack IT (Information Technology) or OT (Operations Technology) systems. Multiple different targets, forms of attacks, motivations, and perpetrators can be involved in cyber-crimes. Port, by Bill Dickinson ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/\" title=\"read more\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-33","post","type-post","status-publish","format-standard","hentry","category-crimes-against-mobility"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber crimes - Blue Crime: the evidence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber crimes - Blue Crime: the evidence\" \/>\n<meta property=\"og:description\" content=\"Introduction Maritime cyber-crimes are illegal actions undertaken against ships or critical infrastructures through computer channels. Attacks can have a wide variety of purposes, including to damage, destroy or hijack IT (Information Technology) or OT (Operations Technology) systems. Multiple different targets, forms of attacks, motivations, and perpetrators can be involved in cyber-crimes. Port, by Bill Dickinson ..Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/\" \/>\n<meta property=\"og:site_name\" content=\"Blue Crime: the evidence\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-10T12:52:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-01T21:44:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/08\/16005967512_0deee0303a_c.jpg\" \/>\n<meta name=\"author\" content=\"Scott Edwards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@safeseas1\" \/>\n<meta name=\"twitter:site\" content=\"@safeseas1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Edwards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/\"},\"author\":{\"name\":\"Scott Edwards\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#\\\/schema\\\/person\\\/badfedbf2d4954158ef35ddc418502bd\"},\"headline\":\"Cyber crimes\",\"datePublished\":\"2020-02-10T12:52:29+00:00\",\"dateModified\":\"2022-11-01T21:44:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/\"},\"wordCount\":3707,\"publisher\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/16005967512_0deee0303a_c.jpg\",\"articleSection\":[\"Crimes against mobility\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/\",\"url\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/\",\"name\":\"Cyber crimes - Blue Crime: the evidence\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/16005967512_0deee0303a_c.jpg\",\"datePublished\":\"2020-02-10T12:52:29+00:00\",\"dateModified\":\"2022-11-01T21:44:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/16005967512_0deee0303a_c.jpg\",\"contentUrl\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/16005967512_0deee0303a_c.jpg\",\"width\":799,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/cyber-crimes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber crimes\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#website\",\"url\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/\",\"name\":\"Blue Crime: the evidence\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#organization\",\"name\":\"Blue Crime: the evidence base of SafeSeas\",\"url\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/cropped-SafeSeas01-768x519-1.png\",\"contentUrl\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/cropped-SafeSeas01-768x519-1.png\",\"width\":553,\"height\":362,\"caption\":\"Blue Crime: the evidence base of SafeSeas\"},\"image\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/safeseas1\"]},{\"@type\":\"Person\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#\\\/schema\\\/person\\\/badfedbf2d4954158ef35ddc418502bd\",\"name\":\"Scott Edwards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g\",\"caption\":\"Scott Edwards\"},\"url\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/author\\\/expert2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber crimes - Blue Crime: the evidence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/","og_locale":"en_GB","og_type":"article","og_title":"Cyber crimes - Blue Crime: the evidence","og_description":"Introduction Maritime cyber-crimes are illegal actions undertaken against ships or critical infrastructures through computer channels. Attacks can have a wide variety of purposes, including to damage, destroy or hijack IT (Information Technology) or OT (Operations Technology) systems. Multiple different targets, forms of attacks, motivations, and perpetrators can be involved in cyber-crimes. Port, by Bill Dickinson ..Read more","og_url":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/","og_site_name":"Blue Crime: the evidence","article_published_time":"2020-02-10T12:52:29+00:00","article_modified_time":"2022-11-01T21:44:35+00:00","og_image":[{"url":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/08\/16005967512_0deee0303a_c.jpg","type":"","width":"","height":""}],"author":"Scott Edwards","twitter_card":"summary_large_image","twitter_creator":"@safeseas1","twitter_site":"@safeseas1","twitter_misc":{"Written by":"Scott Edwards","Estimated reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#article","isPartOf":{"@id":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/"},"author":{"name":"Scott Edwards","@id":"http:\/\/www.safeseas.net\/evidence\/#\/schema\/person\/badfedbf2d4954158ef35ddc418502bd"},"headline":"Cyber crimes","datePublished":"2020-02-10T12:52:29+00:00","dateModified":"2022-11-01T21:44:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/"},"wordCount":3707,"publisher":{"@id":"http:\/\/www.safeseas.net\/evidence\/#organization"},"image":{"@id":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/08\/16005967512_0deee0303a_c.jpg","articleSection":["Crimes against mobility"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/","url":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/","name":"Cyber crimes - Blue Crime: the evidence","isPartOf":{"@id":"http:\/\/www.safeseas.net\/evidence\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#primaryimage"},"image":{"@id":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/08\/16005967512_0deee0303a_c.jpg","datePublished":"2020-02-10T12:52:29+00:00","dateModified":"2022-11-01T21:44:35+00:00","breadcrumb":{"@id":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#primaryimage","url":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/08\/16005967512_0deee0303a_c.jpg","contentUrl":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/08\/16005967512_0deee0303a_c.jpg","width":799,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/cyber-crimes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/www.safeseas.net\/evidence\/"},{"@type":"ListItem","position":2,"name":"Cyber crimes"}]},{"@type":"WebSite","@id":"http:\/\/www.safeseas.net\/evidence\/#website","url":"http:\/\/www.safeseas.net\/evidence\/","name":"Blue Crime: the evidence","description":"","publisher":{"@id":"http:\/\/www.safeseas.net\/evidence\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.safeseas.net\/evidence\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"http:\/\/www.safeseas.net\/evidence\/#organization","name":"Blue Crime: the evidence base of SafeSeas","url":"http:\/\/www.safeseas.net\/evidence\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"http:\/\/www.safeseas.net\/evidence\/#\/schema\/logo\/image\/","url":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2020\/02\/cropped-SafeSeas01-768x519-1.png","contentUrl":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2020\/02\/cropped-SafeSeas01-768x519-1.png","width":553,"height":362,"caption":"Blue Crime: the evidence base of SafeSeas"},"image":{"@id":"http:\/\/www.safeseas.net\/evidence\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/safeseas1"]},{"@type":"Person","@id":"http:\/\/www.safeseas.net\/evidence\/#\/schema\/person\/badfedbf2d4954158ef35ddc418502bd","name":"Scott Edwards","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g","caption":"Scott Edwards"},"url":"https:\/\/www.safeseas.net\/evidence\/author\/expert2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/posts\/33","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":22,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/posts\/33\/revisions"}],"predecessor-version":[{"id":1043,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/posts\/33\/revisions\/1043"}],"wp:attachment":[{"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/media?parent=33"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/categories?post=33"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/tags?post=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}