You are on page 1of 52

Issue 15

nd
2 Issue 2017
ISSN: 2242-442X

nmiotc
Maritime Interdiction Operations
NATO MARITIME INTERDICTION OPERATIONAL

Journal

Cyber Threat Scenarios for


TRAINING CENTRE

Maritime Power

Violence within the Maritime


Domain of the CEMAC Region
The NATO Cybersecurity Generic
Reference Curriculum - Application
to the Maritime Environment
Biometrics in Support of Naval
Units to fight Piracy and Terrorism

1
NATO
Maritime Interdiction Operational
Training Centre

9th Annual Conference

“FOSTERING PROJECTION OF STABILITY


THROUGH MARITIME SECURITY:
ACHIEVING ENHANCED CAPABILITIES AND
OPERATIONAL EFFECTIVENESS”

5th to 7th June 2018


2
CONTENTS nmiotc
COMMANDANT'S EDITORIAL
MARITIME INTERDICTION
Editorial by Georgios Tsogkas OPERATIONS
4 Commodore GRC (N)
Commadant NMIOTC
JOURNAL

CYBER SECURITY
Director
Commodore G. Tsogkas GRC (N)
Cyber Threat Scenarios for Maritime Power
6 by Dr. Elena (Helene) Mandalenakis
Commandant NMIOTC

The NATO Cybersecurity Generic Reference Curriculum - Executive Director


28 Application to the Maritime Environment
by Dinos Kerigan-Kyrou
Captain R. La Pira ITA (N)
Director of Training Support

MARITIME SECURITY
Editor
Commander P. Batsos GRC (N)
Violence within the Maritime Domain of the CEMAC Region
17 by Judith Akah
Head of Transformation Section

Biometrics in support Naval units to fight Piracy and Terrorism


32 by Ioannis Argyriou Lieutenant Commander GRC (CG)
Layout Production
Lt JG I. Giannelis GRC (N)
Journal Assistant Editor

HIGH VISIBILITY EVENTS

VIP visitors to NMIOTC


35
NMIOTC TRAINING
The views expressed in this
issue reflect the opinions of
the authors, and do not nec-
Photos from NMIOTC Training Activities
43 essarily represent NMIOTC's
or NATO’s official positions.

All content is subject to Greek


Copyright Legislation.
Pictures used from the web
are not subject to copyright
restrictions.
You may send your comments to:
batsosp@nmiotc.nato.int

3
NMIOTC
Commandant’s Editorial

Cyber has changed our space domains by NATO, marks a military cyber defense strategies and
world. new era. The cyberspace has become operations.
The ongoing digital revolution an operational domain that various The impact of cyber security
has fueled unprecedented prosperity sectors (industry, commercial, civil- incidents on the conduct of future mar-
and efficiency in our globalized eco- ian, military) interact and operate on. itime operations may be catastrophic.
nomy, and has become inextricably On the other hand Cyber criminals Maritime operations are conducted by
linked with all aspects of our modern become more and more intelligent technology-intensive platforms, which
life. These innovations will continue to and cybercrime evolves at an aston- today rely heavily on information sys-
drive global progress for the foresee- ishing pace. Collaborative actions are tems. How will this dependence that
able future, and by most perspectives needed to effectively defend against navies possess on information tech-
will continue to evolve at astonishing advanced attacks and avoid cata- nologies affect their ability to maintain
speeds. In the wake of this progress, strophic impacts to our nations and security at sea?
a growing number of challenges and peoples. Cyber information sharing, To operate effectively within
risks that threaten the very core of the collaborative incident handling and the cyber domain, we must develop and
global security and prosperity lie on. cyber situational awareness are the leverage a diverse set of cyber capa-
The recognition of the cyber- most essential areas that NATO and bilities and authorities. Cyberspace
space as an operational domain, in EU collaboration will lead to success- operations, information and commu-
analogy to land, air, maritime and ful civilian, industrial, commercial and nications networks and systems, can

4
help detect, deter, disable, and defeat to highlight that the NMIOTC Cyber Maritime Domain of the Central African
adversaries. Robust intelligence, law Security conferences every autumn Economic and Monetary Community
enforcement, and maritime along are the ongoing commitment of (CEMAC) Region”. Dr. Dinos Kerigan-
with other military cyber programs NMIOTC to tackle the cyber security Kyrou, Chartered Member of the
are essential to enhancing the effec- issues in the Maritime Environment, Institute of Logistics and Transport
tiveness of Maritime Operations, and an area and a topic that will dominate (CMILT) focuses upon the application
deterring, preventing, and responding our efforts intensively, at least for the of the NATO Cybersecurity Curriculum
to malicious activity targeting critical next decade. It will be another step- to the maritime environment. Last but
maritime infrastructure. We should ping stone for NMIOTC to engage with not least Lt Cdr Ioannis Argiriou (HEL.
recognize that cyber capabilities are the international community to create CG) presents his views on “Biometrics
a critical enabler of success across all opportunities for a better understand- in support of naval units to fight Piracy
missions, and ensure that these capa- ing and to support the cyber security at and Terrorism”.
bilities are leveraged by Commanders sea that will eventually reduce poten- At this point, I wish to
and decision-makers at all levels. tial cyber threats to the international take this opportunity to announce
Besides the challenges, maritime community for the years to with great pleasure, the 9th Annual
there are opportunities for collabora- come. NMIOTC Conference which will be
tion especially in the maritime domain. The first article presented held at NMIOTC’s premises (Souda
Alliance relies on strong and resilient by Dr. Elena (Helene) Mandalenakis Bay – Crete) from 5th to 7th June 2018,
cyber defence to fulfill the core tasks of addresses “Cyber Threat Scenarios with the theme “Fostering Projection
collective defence, crisis management for Maritime Power”. It is followed by of Stability through Maritime Security:
and cooperative security. Our Partners an interesting take of Ms Akah Judith Achieving Enhanced Capabilities and
could be engaged as well. Ewo épouse Ndze and Mr Dalaklis Operational Effectiveness”.
Having said that allow me Dimitrios on “Violence within the

Georgios Tsogkas
Commodore GRC (N)
Commadant NMIOTC

5
CYBER SECURITY

Cyber Threat Scenarios for


Maritime Power
by Dr. Elena (Helene) Mandalenakis 1

Maritime power is an integral compo- of dependency however, presents a of hostilities, preemptively, covertly
nent for a coastal state’s existence. great advantage and a great disadvan- and significantly more effectively than
The use of maritime trade routes not tage alike. Any disruption or denial of ever before. During military conflict,
only benefits the economy and devel- access to maritime trade routes could the cyber technology may disrupt the
opment of the state but it forces it to significantly damage the economic in- maritime supply routes, which are vital
cultivate its economic and inevitably, terests of any state to the benefit of an- for the supply of the state and render
its diplomatic relations with foreign other. In the past, any such attempted the resupply of any military offensive
states. In an era of globalization, interruption demanded a disruption by obsolete. The emphasis of this paper
the economic drive of each state has physical means (i.e. naval blockades, is centered on the security of the mari-
turned into a race of economies much naval interception of merchant navy). time supply routes worldwide by com-
like the arms race of the 20th cen- The downside to any such attempt mercial shipping.
tury. Each state seeks to dominate entailed a de facto declaration of war
the economic battlefield in the fastest or initiation of hostilities between the State sovereignty and Trade
and most efficient way possible. This nations involved. Today, it is possible
led to an ever-increasing, and by now, to destabilize a state by disrupting its State sovereignty defines the inter-
continuous, use of the maritime trade maritime supply routes through cyber national system of states, as this has
routes, which have instilled a level of means. The current state of cyber been shaped after the Treaty of West-
dependency for the viability of a state’s technology allows for this disruption phalia (1648) after the Thirty-Year War
economy and prosperity. This level prior to a declaration of war or initiation in Europe. According to this principle,

1
I would like to express my great appreciation to Emmanuel Mandalenakis [LL.B., LL.M., LL.M (Adv)] for his valuable legal contribu��-
tion to this work in his capacity as Legal Adviser with specializations in EU Law and Air and Space Law.

6
every state has the absolute author- land-locked states purposely engaged nificant economic sector which lies
ity over its internal affairs without any in war in order to acquire access to the at the heart of cross-border transport
external interference. The state has sea and enhance their economic activ- networks that support supply chains,
the right to control its, clearly by inter- ity. This is how some states became thus, serving both businesses and
national law, defined territory and its empires with regional or even global consumers. Apart from satisfying

CYBER SECURITY
citizens. As all states are equal un- powers. the interests of the trading partners,
der international law, the state is also The creation of the League of Nations maritime transport promotes regional
obliged to recognize this same right to (1919) was the first successful attempt and international economic integra-
all other political entities in the interna- to render war obsolete in favor of glob- tion. The International Chamber of
tional system and refrain from any in- al welfare. As a result, war became Shipping estimates that approximately
terference in their domestic affairs. In relegated as the last line of diploma- 90% of world trade is carried by the
order for new states, to have formal re- cy. With the elimination of war as a international shipping industry. This
lations with other states, they have to primary means to conduct business, staggering amount is supported by
be internationally recognized, which trade was further encouraged between over 50.000 merchant ships, 150 na-
justifies the protection of clearly de- former rivals, neighbors primarily, with tions and over a million of personnel.
fined borders and precludes any uni- the common objective to attain and In 2015, estimated world seaborne
lateral attempts to change them. Any maintain peace through mutual coop- trade volumes surpassed 10 billion
disagreement regarding the validity of eration and profit. tons.2 The significance of the maritime
such borders may lead to war and the The dawn of the twentieth century was trade industry is an economic sector
creation of new political entities which also marked by considerable improve- that generates employment for high
will seek the international community’s ments over maritime, land and air to low-skilled personnel, revenue from
recognition. This practice has led to transport. Innovations in these sectors, trading goods between the involved
the creation of new states and the dis- further enhanced the ability of states to partners as well as economic and polit-

2nd NMIOTC Cyber Security Conference (Sept 2017)


integration or disappearance of others. broaden their trade horizons to include ical power for the state.3 These factors
destinations previously unavailable. justify the countries’ interest to con-
In the past, a state would magnify its In conjunction to the already estab- tinuously explore new maritime trade
power by conquering new territories. lished maritime mode of transport, routes to increase interconnectivity, ef-
The additional territory increased the together, they stimulated the current ficiency and profit. China’s “One Belt,
size of the state, its population, and its form of international trade which typi- One Road Initiative” for example, aims
ownership of natural resources. The cally includes overseas destinations. “to establish new trading routes, links
geographical location of the newly ac- and business opportunities by further
quired land and its proximity to mari- Maritime Supply Routes connecting China, Asia, Europe, Africa
time routes, further increased the polit- and countries with economies in tran-
ical weight of the state. Hence, certain Modern maritime transport is a sig- sition along five routes.”4

2
International Chamber of Shipping at http://www.ics-shipping.org/shipping-facts/shipping-and-world-trade Accessed at 27 August
2017.
3
For more details look at UNCTAD Review of Maritime Transport 2016 (UNCTAD/RMT/2016), p.5 at http://unctad.org/en/
PublicationsLibrary/rmt2016_en.pdf
4
Ibid., p.21.

7
Maritime routes are the preferred geopolitical dimensions as it allows departure is based on notions of ex-
choice of transport for bulky goods and the actors to advance their geopoliti- traterritorial jurisdiction combined with
materials. This is not a random choice cal strategies. Cyberspace has been an effects doctrine that establishes a
as the principles of cost effectiveness, mainly used for industrial espionage, liability regime for acts which originate
frequency of service and distance, de- sabotage, direct and indirect econom- in a different state or territory and have
CYBER SECURITY

termine the internationally recognized ic interferences and organized crime. a direct effect within the borders of the
supply routes, as well as the modes Lately however, it has been increas- attacked.
of transport. Mode choice involves ingly used for offensive operations In political and military terms, national
balancing certain tradeoffs, which are from one state to another. security is the state’s capacity to de-
generally influenced by the nature of These state offensive operations are fend its territory and citizens through
goods and materials as well as their in the form of hostile cyber interfer- its security services. Industrial security
time sensitive nature and reliability, ences which although not violating ter- refers to the ability to protect a specific
along with the distance to destination. ritorial borders, affect the smooth op- industrial sector or agent from unau-
In that sense, the nature of the goods eration of key sectors of governance thorized physical or cyber intrusions.
is divided into low cost mode, for cargo by hindering the effective control of In certain sectors, namely the critical
with high or no life expectancy restric- national affairs. This infringement of infrastructures, industrial and national
tions and, fast mode, for cargo that its sovereignty has as a potential con- security coincide. Hence, critical infra-
is very time sensitive and perishable. sequence the destabilization of the structures are considered “those used
The difference between them lies in state. The issue of state sovereignty for, inter alia, the generation, trans-
the capacity of the method of trans- may not seem important to cyber se- mission and distribution of energy,
port, with the maritime one bearing the curity practitioners, however, its dis- air and maritime transport, banking
highest capacity available but with the cussion is not a theoretical exercise, and financial services, e-commerce,
longest delivery times by comparison as state sovereignty is closely linked water supply, food distribution and
to the others. to the ability to exercise state power public health-and the critical informa-
and consequently it determines state tion infrastructures that increasingly
Cyber Threat to State Sover- foreign policy. The borderless nature interconnect and affect their coopera-
eignty of cyberspace presents challenges in tion.”5 It is in the interest of the state
the application of the traditional no- to guarantee and protect the security
Cyberspace provides a new virtual tion of sovereignty. The state’s right of its vital sectors, as they comprise
arena for actors to interact in attaining to respond and defend itself requires a the pillars of its society and the base
their economic and/or political inter- departure from the interpretation of the for its economic and military prowess.
ests. The particularity of this domain traditional norms, much like the inter- In that regard, the protection of state
is that although it is virtual, the results pretation afforded for terrorist attacks territory and borders, is extended to
of any virtual operation may have within the borders of the state. This the protection of its infrastructure from

Dr Elena Mandalenakis at the 2nd NMIOTC Cyber Security Conference (Sept 2017)

5
UNGA Resolution 58/199, 23 December 2003.

8
physical and virtual threats alike. The nature of recent cyber-attacks The initial cyber-attacks against Geor-
The safety of physical assets neces- reveals the offensive and destruc- gia could not immediately be attributed
sitates the continuous presence from tive nature of cyber weapons such as to Russian hackers. The identification
the security services and the military Stuxnet, WannaCry, NotPetya, etc. As of the actor responsible for the attack
alike. On the other hand, the virtual as- technology evolves, it becomes more requires thorough analysis of evidence

CYBER SECURITY
sets, namely the systematic use and difficult to predict future cyber targets that is not readily available or not de-
flow of electronic information in all criti- or vulnerabilities and develop an effi- tected at all. The difficulty to instantly
cal sectors operating within the state cient defense system. recognize a concealed “cyber enemy”
or for its interests, require the use of As a cyber-attack’s origin and primary hinders the attribution of cyber acts.
cyber defence strategies or otherwise target can eventually be determined, Furthermore, as the infiltration of a
known as cybersecurity. The inclusion the state may opt to either defend it- system or network is not usually de-
of cybersecurity on state sovereignty self with cyber or physical means to tectable in real time, or launched from
has been guided by perceptions of protect itself against the hostile action. a single platform, it renders the “cyber
risk and eventuality of threat. Refer- A cyber-attack may also be instigated victim” incapable of containing the ef-
ence to cyber threats, and not risks, as complementary to a physical at- fects of the cyber-attack. Keeping
implies a degree of malicious inten- tack, since a well-organized combined these in mind, it is easy to deduct that
tion and a direct effect to the detriment strike is more effective in paralyzing a state is not in a position to organize a
of the attacked. As William J. Burns a state. Russia applied this tactic in timely counter cyber-attack before the
said, “patching national cybersecurity 2008, when it initiated a cyber-attack escalation of “cyber hostilities.”

vulnerabilities in today’s world is often against the Georgian government, be- Cyber hostilities are not conditioned
just as important as border security.”6 fore and during its military operations by a declaration of war as a state
at the Georgian province of South Os- can disrupt the functioning of the criti-
State Actors and Cyber setia. This was the first time in history cal civil and military infrastructure of
Capacity that cyber and military offensives were another and place it under a state of
simultaneously orchestrated. The emergency. Once a state engages in
A cyber-attack that weakens a state by DDoS cyber-attacks targeted govern- or sponsors cyber-attacks on critical
obstructing the attainment of its prima- ment sites, media, communications infrastructures of another state, apart
ry interests is considered an act of war. and transportation companies, para- from the real effects of the attacks, it
A cyber offensive superiority could act lyzing Georgia while hindering any cultivates a perception regarding its
as a deterrent against other cyber communication between the govern- cyber capacity, that may encourage
state powers which justifies their grow- ment and its supporters during the or deter other states to contest it. As
ing interest in cyber advancement. fights.7 Shaheen explains, “in cyber warfare,

6
William J. Burns, Jared Cohen, “The Rules of the Brave New Cyberworld,” Foreign Policy, 16 February 2017, at http://carn-
egieendowment.org/2017/02/16/rules-of-brave-new-cyberworld-pub-68024
7
John Markoff, “Before the Gunfire, Cyber-attacks,” The New York Times, 12 August 2008, at www.nytimes.com/2008/08/13/
technology/13cyber.html?mcubz=1

9
given the advantages of mobility, sur- offensive power. further its maritime and cyber power
prise, penetration and precision that State cyber offensive power does domains to become more effective
cyber weapons offer to an attacker and not necessarily imply adequate cy- while downsizing and rationalizing its
the underdeveloped defensive side of ber defense power. Cyber defense army but without diminishing its war
this warfare, the attacker will develop strategies exist but are not adequate fighting capabilities. It has merged the
CYBER SECURITY

strong perception about its offensive as a) the network interconnectivity of cyberspace, space and electromag-
advantage.”8 In cyberspace then, as all critical infrastructures continues to netic domains under the umbrella of
in the physical world, perceptions are grow and cannot be controlled by the the Chinese Strategic Support Force.9
formed on both sides and determine state, b) the actors are also non-state Declining states acquiring cyber capa-
the initiation or the prevention of war, or state sponsored, c) the launching bility, may not just preserve, but also
despite the fact that they may be inac- of the attack can take place through strengthen their geopolitical position.
curate. multiple points or platforms, and d) the Accordingly, developing cyber capabil-
The nuclear arms race during the Cold cyber weapons cannot be stockpiled ity is not a choice but a necessity for
War and recent wars, indicate that and therefore can only be assessed the once powerful states to increase
political decisions regarding weapon through the impact of their launch. their power of influence. Russia for
stock piling are not always based Despite the designed precision of a cy- example, complements its military
on real data but rely on perceptions. berattack, such as Stuxnet in 2010, its strength with cyber capabilities and
Once a state’s power is measured in impact on the intended target is only is very active in cyberspace. On the
conventional arms, the supremacy of half of the story, as any collateral dam- other hand, small states with cyber
one state over another is more appar- age from its spill over to systems sup- capability such as Israel and Estonia,
ent. In the case of nuclear power, a porting different infrastructures even have an opportunity to show their po-
state possesses nuclear power and in different states, should be taken tential, despite their geographical or

Jamie Shea, NATO Deputy Assistant Secretary General for Emerging Security Challenges
at the 2nd NMIOTC Cyber Security Conference (Sept 2017)
the potential of creating nuclear arms into account. The Stuxnet malware geopolitical attributes and to enhance
with catastrophic effects for its enemy although it hit its primary target it fur- their position and influence in interna-
states. In the case of cyber power, ther infected the infrastructure of other tional affairs.
a state amplifies its offensive cyber states too.
capability to use the first strike pre- A state’s cyber capacity serves as Maritime supply routes
emptively against another state. The a force multiplier for rising powers in during war
success of attack will determine the the international system. China for
international recognition of its cyber example, has chosen to develop even Having established the importance of

8
Salma Shaheen, “Offense-Defense Balance in Cyber Warfare,” p. 90 in J. F. Kremer and B. Müller, eds. Cyberspace and Inter-
national Relations: Theory, Prospects and Challenges, (Heidelberg: Springer, 2014).
9
Adam Ni, “Why China is Trimming its Army,” The Diplomat, 15 July 2017 at
http://thediplomat.com/2017/07/why-china-is-trimming-its-army

10
maritime supply routes for the viability advantage but at the same time it military navy.11 Four incidents at sea
of a state’s economy during peace- could be catastrophic for the defence in 2017, involving two US cruisers
time, it is important to consider the ev- initiative. Regarding the maritime sup- and two US destroyers, may have el-
er-growing importance of these routes ply routes used during the WWII, a evated that theoretical threat scenario
used in support of the war effort. The substantial number of military vessels to an actual threat scenario. Although

CYBER SECURITY
majority of conflicts post WWII, have from the Allies were needed and were the US Navy investigations have ruled
occurred in countries separated by diverted from the front for the pro- out cyber interference, sabotage, or
thousands of miles from each other. tection of the supply convoys. Con- unlawful interference, cyber security
The attacking state had to coordinate versely, an enormous number of Axis circles are whispering of the possibil-
the deployment of its troops and navi- military assets were deployed to inter- ity of electronic interference. Although
gate complex logistical minefields to cept the convoys. The most success- there has been no evidence to sup-
coordinate a successful attack. The ful wolfpack operation, codenamed port any such theories, the high rate
transportation of the military assets “West”, was comprised of 23 German of three collisions at sea in less than
required, had to be coordinated to U-Boats, attacked 10 convoys in the a year, combined with the news of
coincide with the strategic planning period of 44 days, sunk 33 vessels and the US Navy ordering a global pause
and initiation of hostilities. Each na- damaged an additional 4. It has been in operations in order to examine any
tion possesses a dedicated fleet of written in history as the most success- contributory factors that led to the col-
transports for military use alone. Nev- ful wolfpack of WWII.10 lision of the USS John S. McCain, only
ertheless, the number of such military fueled further speculations.12
freight vessels cannot serve the needs a) Military Offence On the 22nd of June 2017, an incident
of a large-scale conflict, which will of GPS spoofing was reported involv-
lead to the tried and tested solution of It has already been proven that the ing more than 20 ships off the Russian
sub-contracting the resupply effort to cybersecurity of the navy is far more port of Novorossiysk in the Black Sea.
commercial entities. Historically, in a advanced than the cybersecurity of According to the captain who filed the
large-scale war, the military comman- the merchant fleets, therefore the level report with the US Maritime Adminis-
deered all civilian assets to aid in the of difficulty in directing a cyberattack tration, the GPS had placed his ship
war effort. During WWII, the majority against the navy increases exponen- inland at the vicinity of Gelendzhik
of the merchant navy was used for tially. At the same time, the possibility Airport, more than 20 miles off his
the transportation of troops, equip- of exploiting well known vulnerabilities current position.13 The captain further
ment, supplies and ammunition, often in the electronic navigation systems confirmed that twenty other captains
at great cost and loss of life. Regard- of the merchant navy, is consider- in the area, were reporting the same
ing defensive strategies, cutting off ably easier and comes at a minimum anomaly on their radios. The RNT
the supply lines of the enemy, thereby cost. Although the vulnerabilities are Foundation has received numerous
denying military effectiveness in the well known, there has been neither a anecdotal reports of maritime prob-
battlefield, ranks within the highest of uniform strategy nor a uniform imple- lems with AIS and GPS in Russian wa-
priorities. mentation on how to effectively shield ters. In fact, GPS spoofing in Russia
In times of war, where the maritime the merchant fleet from cyber threats, is known to be highly advanced, with
supply routes will be used for the es- leaving any attempt to do so on the over 250,000 cell towers equipped
sential supply and resupply of the personal initiative of ship owners. with GPS jamming devices. The tech-
military campaign, safety of navigation In a previous work concerning mari- nological leap from spoofing the GPS
will be of the utmost concern. The use time security, we highlighted a pos- signal from a 213-foot private yacht in
of any technology that could disrupt sible threat scenario that may have 201314 to affecting multiple commercial
this supply line could be of the most seemed unlikely; the threat possibil- vessels simultaneously, is enormous.
strategic importance as an offensive ity of using known vulnerabilities of As the commercial maritime sector is
measure. This could be an enormous the commercial shipping against the the weakest link and the least cyber

10
For further details regarding Wolfpacks’ operations see http://uboat.net/ops/wolfpacks/3.html
11
Elena (Helene) Mandalenakis, “Political Implications of Cyber Space on State Power,” NMIOTC Maritime Interdiction Operations
Journal, 13, 2016, p.21 at http://www.nmiotc.nato.int/files/NMIOTCjournal13.pdf
12
Christopher Woody, “The Navy’s 4th accident this year is stirring concerns about hackers targeting US warships,” Business
Insider, 24 August 2017 at http://www.businessinsider.com/hacking-and-gps-spoofing-involved-in-navy-accidents-2017-8
13
“2017-005A-GPS Interference-Black Sea MARAD Alert,” United States Department of Transportation at https://www.marad.dot.
gov/msci/alert/2017/2017-005a-gps-interference-black-sea/
14
“UT Austin Researchers Successfully Spoof an $80 million Yacht at Sea,” UTNews, 29 July 2013 at https://news.utexas.
edu/2013/07/29/ut-austin-researchers-successfully-spoof-an-80-million-yacht-at-sea

11
cumstances, would be to roll back to
analog operations with visual naviga-
tion and determination of the vessel’s
position via celestial navigation. In-
cidentally, the US Navy has already
CYBER SECURITY

realized that the overreliance on satel-


lites could be a major drawback in a
large-scale conflict, especially when
these can be destroyed or jammed
by the enemy forces. To counter this
possibility, the US Navy is reintroduc-
ing celestial navigation as a training
requirement for its officers.15

b) State Defence
secure, it is the sector that will most and effectively renders it a remotely
likely become the prime target for cy- operated vehicle, much like a drone The offensive strategy discussed
ber-attack. Any technologically savvy that is controlled from thousands of above may be crucial in determining
hacker, would know that to defeat miles away. The ramifications on a the outcome of war. As important as a
a pair of opponents, the military as- threat scenario involving the intention- military offensive can be, it is equally
sisted by the commercial fleet in this al GPS spoofing of multiple merchant important to have a defensive initiative
case, one simply attacks the weakest vessels aided by electronic hijacking at home that relies in exactly the same
one to bring down both. Technological of controls of one or two ships to use principles as the military cyber offen-
evolution allows for the disruption of as battering rams against military ves- sive does. The known and unknown
the supply line without diverting any sels, becomes a feasible endeavor that vulnerabilities of electronic systems
military resources from where they could prove quite useful if exploited for will be exploited by both sides. It is
are actually needed the most. This military offensive purposes. In real- imperative then, to shield the integrity
can be achieved by interfering with ity, not all of the above systems need of the state from any unwanted inter-
key electronic equipment and signals to be interfered with to disrupt a mari- ference that may alter the outcome
that could render the concept of safe time supply route. Total control would of war. An elaborate defence strategy
and automated navigation inoperable. require an unprecedented number of would also require an equal amount
Tampering with the Satellite communi- hackers working simultaneously and of attention to other critical infrastruc-
cation equipment, Voice Over Internet attacking every seaborne electronic tures and ancillary transportation sec-
Protocols (VOIP) equipment, Wireless system with known vulnerabilities. tors that complement each other dur-
networks (WLANs), Public address Despite the undeniable skills of these ing both peace and war. This becomes
and general alarm systems, one can individuals, such an endeavor is sim- relevant for this paper in respect to the
effectively disable the communications ply too time consuming for such a time transport of raw materials and sup-
capability of any commercial vessel. sensitive operation to be effective. plies from the factory or warehouse to
In addition, interfering with the Posi- What is really effective however, is a the port for shipping. Thus, if a state
tioning systems (GPS, etc.), the Elec- strategy that involves random attacks disrupts the supply of cargo directly
tronic Chart Display Information Sys- on different systems and components before reaching the supply vessels,
tem (ECDIS), Systems that interface each time with different disruption re- the maritime supply routes become
with electronic navigation systems sults that would render the trust and useless. Consequently, other critical
and propulsion/maneuvering systems, overreliance to automated systems infrastructures may become principal
Automatic Identification System (AIS), obsolete. Navigating a route riddled targets for cyber-attack, making their
Global Maritime Distress and Safety with phantom ships, fake weather re- protection crucial as a defensive mea-
System (GMDSS), Radar equipment, ports, fake collision alarms, no com- sure. For the purposes of this analysis,
Voyage Data Recorders (VDRs), Pow- munication capability, glitchy propul- we will only focus on the rail transport,
er management, Integrated control sion and steering systems, could be as it is the primary means of transport
system, Alarm system and the Emer- a challenge for the most experienced and supply for ports.
gency response system, allows for the seafarer. The only way to operate a Freight trains have been participating
virtual hijacking of the vessel controls maritime supply route under such cir- in the national and global trade with

15
Geoff Brufiel, “U.S. Navy Brings Back Navigation By The Stars For Officers,” National Public Radio, 22 February 2016 at
http://www.npr.org/2016/02/22/467210492/u-s-navy-brings-back-navigation-by-the-stars-for-officers

12
significant financial gains for the states been four known hacking incidents the Polish Rail, indicates how easy it is
and the companies using them. Rail in the UK railway in 201519, although to interfere in the rail control systems.
freight gradually increases its mar- these hacks were attributed to or sup- The boy modified a TV remote control
ket share due to its capacity for large ported by foreign state actors and and unaware of the extent of its ac-
consignments of goods, as well as which have been exploratory in na- tions, derailed four vehicles and injured

CYBER SECURITY
its speed and reliability. To enhance ture and not destructive. According twelve people.22 The concern of the ex-
this capability even further, the Euro- to Sergey Gordeychik of the Moscow perts is the security of the control sys-
pean Rail Traffic Management System Kaspersky Lab, these hacks could po- tem connection with the outside world.
(ERTMS) is replacing traditional sig- tentially be used as a “cyber weapon
naling across Europe. The signaling against civil infrastructure” since sys- Countermeasures
system directly affects the capacity of tem vulnerabilities are common and
the rail corridor along with other sys- widespread.20 The UK Department for Beyond the use of brute force strong
tem configurations.16 Wireless tech- Transport explains that the “railway countermeasures for a state on a
nology and the computerization of systems are becoming vulnerable to political level, are the use of deter-
in-cab signals will transform the basic cyber-attack due to the move away rence and compellence strategies. As
component of ERTMS, the European from bespoke stand-alone systems Thomas Schelling explained, compel-
Train Control System (ETCS), and to open-platform, standardized equip- lence aims at coercing an opponent
trains will become practically auto- ment built using commercial off the to change its behavior or to stop act-
matic.17 The German Aerospace Cen- shelf components, and increasing use ing at all. Instead, deterrence is de-
tre (DLR) is working on a project for a of networked control and automation signed to persuade and discourage an
driverless high-speed intercontinental systems that can be accessed remote- adversary from initiating an action by
freight train that would incorporate ly via public and private networks.”21 threatening the use of military force.23
aerodynamic features already used in In 2015 Japan’s Railways Hokkaido The use of actual or potential credible
passenger trains. The expectation is new Shinkansen line was hacked just threats is key for the success of these
that in time, it would carry both pas- before its operation. The aim was the strategies, which were quite effective
sengers and cargo. DLR even tested collection of transport security informa- in relation to the use of nuclear weap-
for automatic loading and unloading of tion. The 2008 case of a teenager tak- ons by contending states. The appli-
packages, as the aerodynamic design ing control of the signaling system of cation of these strategies in the cyber
would not work with sea containers.18 domain however, is not as clear as in
The modernization of the rail system the physical, political and military do-
implies its digitization with the benefits main, largely on account of the virtual
and risks associated with it. Some of nature of the threat. As such, there is
the benefits are interoperability, safety, an absence of advanced warning of a
and greater capacity, while one of the cyber-attack. With the exception of at-
main risks is the security of the auto- tacks from groups seeking to further
matic function and remote control of their reputation, a state sponsored
the systems involved. There have cyber-attack will only be made known

16
“The capacity of a rail corridor is defined as the number of trains that can safely pass a given segment within a period of time. The
capacity is affected by variations in system configurations, such as track infrastructure, signaling system, operation philosophy, and
rolling stock.” In H. Pouryousef et al., “Railroad capacity tools and methodologies in the U.S. and Europe,” Journal of Modern
Transport, (2015), 23(1): 30–42 at https://link.springer.com/content/pdf/10.1007%2Fs40534-015-0069-z.pdf
17
Gary Peters, “A digital railway: is it cyber secure?” 23 March 2017 at http://www.railway-technology.com/features/featurea-digi-
tal-railway-is-it-cyber-secure-5770312/
18
Gary Peters, “The driverless freight train as imagined in Germany” 21 June 2017 at http://www.railway-technology.com/features/
featurethe-driverless-freight-train-as-imagined-in-germany-5848101/
19
Gary Peters, “A digital railway: is it cyber secure?” 23 March 2017 at http://www.railway-technology.com/features/featurea-digi-
tal-railway-is-it-cyber-secure-5770312/
20
“Cyber attacks on UK railways pose ‘real disaster’ risk,” 12 July 2016
at http://www.theweek.co.uk/74396/cyber-attacks-on-uk-railways-pose-real-disaster-risk
21
Gary Peters, “A digital railway: is it cyber secure?” 23 March 2017 at http://www.railway-technology.com/features/featurea-digi-
tal-railway-is-it-cyber-secure-5770312/
22
“Monitor without risk of remote cyber attacks – Unidirectional security for railways,” 16 January 2017 at https://www.globalrailnews.
com/2017/01/16/monitor-without-risk-of-remote-cyber-attacks-unidirectional-security-for-railways
23
Thomas C. Schelling, Arms and Influence, (New Haven: Yale University Press, 1966).

13
mechanical components. Following
this logic, the remedy for a potential
cyber-attack is the replacement of
the affected instruments, equipment,
parts and components. This percep-
CYBER SECURITY

tion of troubleshooting however, could


change abruptly in the future and es-
pecially in a case of war.
During peace time, the incidents of
cyber-attacks are generally limited to
economic objectives. The overwhelm-
ing majority of cyber criminals are
non-state actor individuals or groups,
with its adverse effects towards the Acting or simply reacting? launching commoditized and targeted
system that is compromised. Although attacks with a financial cost ranging
some attacks leave certain identifiable As of 2016, the number of registered from 200 dollars to 1 million dollars.
traits leading to the identity or even merchant vessels worldwide was esti- From a business point of view, 1 mil-
nationality of the group involved, these mated at just over 51.400 with 16.892 lion dollars’ worth of damage control,
traits cannot be attributed with any of them bulk carriers, 10.919 general is a number far smaller than the cost
amount of certainty to a specific actor. cargo ships, 7.065 crude oil tankers of a comprehensive cyber security so-
This is even more the case in relation and 5.239 container ships.24 The num- lution. Thus, companies will undoubt-
to high-end attacks, where the meth- ber of vessels sailing the seas is very edly prefer to pay that amount for
ods of incursion are custom made and high, with certain shipowners often something that they consider a unique
novel. On account of the complex- owning 500 vessels or more each. or rare situation.
ity and interconnectivity of electronic These numbers however, do not only There is however, a smaller segment
systems that often rely on each other, reflect the size of the maritime indus- of cyber criminals that deal exclusively
it becomes even more difficult to as- try but also present 51.400 potential with high-end attacks. These groups
sess, with any certainty, the real pur- targets for cyber-attack. To this day, possess expert level technical ca-
pose and scale of the attack in relation the number of known cases is low, as pabilities, they are highly organized,
to its consequences. attacks often remain invisible to the extremely covert and operate inter-
The virtual nature of the attack and the company or businesses avoid report- nationally. Their attacks are few and
lack of attribution or claimed responsi- ing them for fear of alarming investors, numbered but they are customized
bility, lead to a situation of “non liquet” regulators or insurers.25 This level of in tools and vulnerabilities, leaving a
or otherwise known as legal vacuum. underreporting is a major contribu- permanent post-attack impact in repu-
An invisible attack, by equally invisible tory factor to the largely cyber unpro- tation to their victims, costing them
attackers, invalidates the doctrine of tected state of affairs of the industry. anywhere from 1 to 100 million dol-
proportional response. Although major lars. These groups are often linked or
cyber states have agreed that there c) Theoretical or Real threat even directly supported by state actors
should be international norms on cy- scenario? and their target preference is limited
ber behaviour and that states should to large scale financial systems and
refrain from cyber-attacking critical in- The current lack of reporting, has en- critical infrastructure. In case of war,
frastructures of other states, an inter- abled a false sense of security for the these will become the primary virtual
national institution with the capacity to major players in the maritime industry. commandos in any cyber offense or
address such state cyber grievances Incidents of cyber-attacks, when expe- defense.
and to enforce and monitor rule obe- rienced, are often treated as isolated The deciding factor for the shipown-
dience, has not been established. As incidents and are mostly not even ers then, in a choice between full cy-
such, the ability of a state to react with- recognized as such. Shipowners tend ber protection versus non-protection
in the limits of legality to a threat or at- to treat incidents of electronic tam- and damage control, seems to rely
tack with force, is hindered by the lack pering as faulty electronic equipment exclusively on three factors alone: fre-
of legal precedence of cyber wars. and interference to the propulsion or quency, severity and cost of a potential
power management system as faulty cyber-attack.

24
Statista at https://www.statista.com/statistics/264024/number-of-merchant-ships-worldwide-by-type/
25
Jeremy Wagstaff, “All at sea: global shipping fleet exposed to hacking threat,” Reuters, 24 April 2014 at http://www.reuters.com/
article/us-cybersecurity-shipping-idUSBREA3M20820140424

14
each day.26 This translates to several
thousands of alerts per year for ev-
ery company. Commercial companies
however, have limited human and
technical resources, inadequate know-

CYBER SECURITY
how and insufficient expertise to inves-
tigate all security alerts, leaving them
with an effective investigation capacity
of 4-5%, that has the potential to miss
the threat by a huge margin. Therefore,
in the eyes of an entrepreneur, who
tends to take decisions based on a
margin of profit and risk principle, a cy-
ber protection solution that yields such
low reliability results is not justifying
the investment of millions of dollars.
Commodore G. Tsogkas (GRC N), NMIOTC Commandant,
opening the 2nd Cyber Security Conference (Oct 2017)
f) Cost of rectification if no
d) Frequency and Severity or interference and they remain largely implementation
undetected. These have the capacity
The first two factors cannot objectively of becoming quite dangerous when Questioning the effectiveness and re-
be fully analyzed due to the underre- the group involved decides to launch liability of cyber protection solutions
porting of incidents from the maritime an attack, as they have already by- versus the frequency and potential
industry. Consequently, we will have passed the security protocols. In such severity of a cyber-attack presents
to make certain logical assumptions a case, both factors of frequency and a valid argument, which cannot be
based on the existing mentality of the severity will increase exponentially. elaborated further as it is not the topic
sector, the available technology and High-end attacks would dominate the of this paper. What every entrepreneur
the modus operandi of hackers world- virtual battlefield in case of war. needs to judge before taking a deci-
wide. We estimate the frequency of sion, is the post cyber-attack fallout.
attacks during peace time in the low e) Cost of implementation A cyber-attack insurance could have
category because if the frequency was been procured, which could cover a
any higher, the maritime sector would The cost of a cyber security solu- majority or even a portion of the fi-
have already taken aggressive cyber tion for large scale enterprises and nancial damage incurred, depending
measures to curb the trend of attacks. critical infrastructure is difficult to es- of course on the severity of the at-
In addition, the size of the merchant timate. There are a variety of factors tack. Despite the potential existence
fleet worldwide and the multiplicity of involved that determine the most ef- of insurance, there are multiple factors
components and parts with vulnerabili- fective method of protection, including that need to be assessed, that include
ties, combined with unclear economic a) available technical infrastructure, b) short term and long-term costs. Short
objectives, limit the type of cyber- dedicated IT human resources, c) size term costs, would arise immediately
attack to opportunistic or exploratory of material assets, d) value of intellec- after the attack and would include
attacks. tual property, e) number of employees, among others, a) physical damage to
The opportunistic attacks would be at- and f) geographical market and many property or equipment, b) injuries or
tributable to single hackers, driven by others. As such, it is virtually impos- loss of life, c) business interruption,
the challenge of intrusion alone and sible to provide one cyber security d) forensic investigation, e) legal fees,
perhaps with some minor illicit men- solution that fits every company and f) public relations for damage control,
tality (i.e. ransomware attack). On the every budget. In addition, even when g) customer notification, and h) pro-
other hand, the exploratory attacks a suitable cyber protection solution is curement of cyber security protection
could be the result of targeted attacks in place, it suffers from an unavoidable if not already existing. The values of
as well as high-end attacks. Their na- security alert overload. In the third the long-term costs are subject to the
ture is infiltration, collection of informa- quarter of 2016 alone, Panda Labs severity of the attack and would be
tion and identification of vulnerabilities. reported 18 million new malware sam- associated to the impact on the busi-
Often, they do not result in disruption ples captured, an average of 200,000 ness and reputation of the company.

26
“Cybercrime Reaches New Heights in the Third Quarter,” PandaLabs, 20 October 2016 at http://www.pandasecurity.com/media-
center/pandalabs/pandalabs-q3/

15
In reality, these long-term costs could vital for the transportation of troops, equally take all necessary steps to
be much more expensive and damag- ammunition and heavy military equip- protect them. Currently, the maritime
ing than the cyber-attack itself, as they ment. In a sense, without the maritime sector is left by the state to shipowners
would include among others, a) radical supply support, a large-scale war effort and operators to protect at their discre-
corporate reorganization, b) attribution overseas would not be feasible or pos- tion but without establishing mandato-
CYBER SECURITY

of liability for negligence to the man- sible. In military scenarios, where the ry minimum requirements to effectively
agement, c) third party litigation for cli- need of a certain number of troops and secure it against cyber-attacks. The
ents and injured personnel, d) total or equipment surpasses the capacity al- shipowners and operators on the other
partial reimbursements, e) payment of lowed by the military freight and troop hand, are not proactive against cyber
damages for breach of contract, f) loss transport systems, the merchant navy threats, either because these attacks
of clientele, g) loss of revenue, h) dam- is called upon to fill the capacity gap. are not recognized as such or because
age to the reputation of the company, Hence, the merchant navy assumes protection against them is too expen-
i) devaluation of share price, j) loss a military role, although not based on
of product market and k) loss of geo- military infrastructure regarding cyber
graphical market. Accordingly, in an security.
extreme scenario, a high-end cyber- An effective cyber-attack would exploit
attack has the potential of destroying the network vulnerabilities upon which
the competitive advantage of even the a state’s infrastructure is founded on,
largest of companies. such as the ability to resupply itself in
economic and military terms. As the
Conclusion transportation and distribution of com-
modities tend to evolve towards the
The maritime supply routes are the direction of an unmanned process, it
state’s lifeline both during peace and becomes imperative for the state to sive and time consuming.
war. During peace, they stimulate the control its proper functioning. A popular saying states that “the
economy and keep the population The civilian and military maritime infra-
strength of a chain is measured by its
content. During war time, they are structures are critical for the survival
weakest link”. Hence, the state and its
an essential, if not indispensable part of the state either during an economicmilitary, is regarded as a chain itself.
of the state’s defence. In a scenario race or a military conflict. As they are
Its weak points if targeted, result it total
where the offensive action is located in interdependent, they should both be cohesion failure and inability for effec-
a different country separated by sea, included in the definition of criticaltive management of any situation.
the maritime supply routes become infrastructures, and the state should
Biographical Note
Dr. Elena (Helene) Mandalenakis obtained a B.A. in Political Science from McGill Uni-
versity in Canada and was awarded with a Masters’ degree in European Studies from the Katho-
lieke Universiteit Leuven (KUL) in Belgium. She received her Doctorate in Political Science from
McGill University. Her doctorate research was supported by the Research Group on International
Security (REGIS) of McGill University and Université de Montréal with scholarships and fellow-
ships from the Greek-Canadian Association and McGill University.
She has been a researcher –Fellow and Associate- at the Institute of International Re-
lations of Panteion University and McGill University.
Dr. Mandalenakis’ teaching experience includes courses on foreign policy, international
political economy, European and EU politics as well as on minorities at McGill University and the University of Pelopon-
nese.
She has presented her research in international conferences and has published in peer-reviewed academic and
policy journals as well as in books on issues of foreign and security policy, cybersecurity, conflict resolution, migration,
ethnic relations, state formation and identity, European affairs and resource management. Her current research interests
involve international, regional and European security, cybersecurity, European affairs, policy formation, international mi-
gration, and identity.
Dr. Mandalenakis is a member of the “Regional Stability in the South Caucasus” Partnership for Peace Consor-
tium Study Group of Defense Academies and Security Studies Institutes (PfPC) and participates in the “Regional Stability
in South East Europe” and “Emerging Security Challenges” PfPC Groups

16
Violence within the Maritime
Domain of the CEMAC Region1

MARITIME SECURITY
by Akah Judith Ewo épouse Ndze
Dalaklis Dimitrios

Abstract along with both national and interna- with the already implemented efforts.
tional cooperation measures adopted
A practical consideration of the con- by the countries of the CEMAC region Introduction
cept of maritime violence in relation to stem it. The methodology adopted
to the Central African Economic and is a literature review of existing prima- Security at sea is challenged by nu-
Monetary Community’s (CEMAC) ry and secondary sources, realized merous threats. In recent years, there
maritime space is provided. This is through traditional library and archival has been global concern for maritime
achieved through an examination of research in Sweden (Malmo) and in security, considering that an extended
the relevant definition under interna- Cameroon, including the use of online number of violent acts are committed
tional law, as well as a discussion of sources. An important finding is that at sea, such as armed robbery against
the factors accounting for its emer- the causes, effects and challenges of ships, maritime terrorism, (maritime)
gence and growth, including the re- such violence in the countries of the interstate disputes associated with
spective characteristics of manifesta- CEMAC region are common in nature threat and/or use of violence, traf-
tion. Acts of maritime violence within and sometimes interrelated. The con- ficking of narcotics, people and illicit
the CEMAC maritime areas that have clusion and recommendation section goods, or arms proliferation. Illegal
already captured the attention of the points to the need to enhance the cur- fishing, various environmental crimes
international community and the mass rent level of cooperation efforts of the and even maritime accidents associat-
media of communication interest in- countries involved; it also emphasizes ed with disastrous consequences can
clude piracy, armed robbery against the need to explore an additional port- also negatively impact upon both the
ships and terrorism. The overall impact folio of solutions towards stemming safety and security domains (Bueger,
of those phenomena is considered, maritime violence, working in parallel 2014, p. 1). The above mentioned un-
1
The World Maritime University (WMU) in Malmö, Sweden is a postgraduate maritime university founded by the International Mari-
time Organization (IMO), a specialized agency of the United Nations. The analysis at hand is an adaptation of a Thesis submitted by
Ms. Akah in November 2017, to fulfill the requirements of WMU’s Master of Science (MSc) in Maritime Affairs degree. The leading
author is a diplomat by training and is currently serving at Cameroon’s Ministry of External Relations, where she is the Sub-Director
in charge of Cameroon’s relations with Nigeria. Dr. Dimitrios Dalaklis joined WMU in the summer of 2014, upon completion of a
twenty-six years distinguished career with the Hellenic Navy (HN). He is serving as an Associate Professor, focusing on the extended
Maritime Education and Training (MET) domain, as well as maritime safety & security issues.

17
lawful phenomena have steadily been a few landlocked ones (Lindskov et al, sub-region can be understood against
on the forefront of attention, causing 2015, p. 7). The region is comprised the backdrop of insecurity in the Gulf.
enormous damage to human life and by the States of West and Central
property, with great negative impacts Africa (Angola, Cameroon, Congo PART 1: MARITIME
MARITIME SECURITY

on international trade, peace and se- Brazzaville, Gabon, Equatorial Guin- VIOLENCE IN THE CEMAC
curity. ea, Nigeria, Democratic Republic of SUB-REGION
According to the Oxford Learners’ Congo, Sao-Tome and Principe). It is
Dictionary, security involves the act of of a certain geo-strategic importance, This part initially provides a geograph-
protecting a country, infrastructures/ as GoG is the region’s major shipping ical presentation of the Central African
buildings or persons against attacks, route and is significantly rich in natu- Economic and Monetary Community’s
danger, etc. But, beyond this simplis- ral resources, with oil/gas and various (CEMAC) sub-region and then high-
tic definition, maritime security can minerals standing out. In 2012, for ex- lights the issue of maritime violence
be viewed as measures put forth to ample, it was estimated that the region within the sub-region’s maritime space
respond to collective needs for order under discussion produced approxi- as seen in the creation of a variety
and protection from internal and ex- mately 4% of oil at global level and by of structures aimed at addressing
ternal threats in the oceans and from 2015 it could supply a quarter of Unit- the continuous security challenges.
the oceans (Klein, 2011, p.2). From a ed States’ (US) oil needs (IPI, 2014, Trend and characteristics of those
maritime perspective, (maritime) secu- p.2). This region also supplies signifi- security threats are also considered.
rity is a recent expression that became cant quantities of petroleum products
prominent after the September 11, to Europe and Asia. Section A: The problem
2001 attack; thus, it can be understood Despite, or because of these attri- Maritime violence is a worldwide phe-
as a set of policies, regulations, mea- butes, the GoG is facing numerous nomenon and each ‘hot spot’ around
sures and operations to guard against challenges caused by increasing the world has its own history, geog-
security threats within the maritime do- maritime crimes often manifested at raphy and other characteristics. The
main (Germond, 2015, p.1). sea, but also related to land-based CEMAC region in Central Africa is
Maritime safety on the other hand, origins. In 2013, for example, the geo-strategically situated in the Gulf of
involves all measures put in place by GoG surpassed the Horn of Africa in Guinea, at the West Coast of Africa.
maritime stakeholders (international terms of piracy risk, since it was as- The maritime space within the CEMAC
maritime community, maritime ad- sociated with the highest number of sub-region (which includes the waters
ministrations, insurance companies, piracy attacks and armed robbery of Cameroon, Gabon, Equatorial Guin-
ship-owners etc.) to ensure safety, against ships that comprised 1/5 of all ea and the Republic of Congo) is an
prevent dangers and minimize the recorded maritime incidents globally important area at a pivotal position in
effects of any mishap when it occurs. (Osinowo, 2015, p. 2). This worrying the Gulf of Guinea - hence insecurity
The International Maritime Organiza- rise in number of attacks off the coast within this sub-region can be under-
tion (IMO) addressed the complexity of of West and Central Africa resulted in stood against the backdrop of inse-
these two domains under the Maritime the region being termed as the ‘next curity in the Gulf of Guinea. The Gulf
Safety Committee by distinguishing piracy hot spot’ (Dalaklis, 2012, p. 5) of Guinea is an area endowed with
appropriately between maritime safe- It is also indicative that the Internation- valuable resources and it is a strategic
ty and security. Thus, maritime safety al Crisis Group (ICG) referred to it as transport route for international ship-
is the act of preventing or minimizing ‘The New Danger Zone’ (ICG Report, ping. The flow of international maritime
the occurrence of accidents at sea, 2012, p.1). Meanwhile, the peculiarity trade in the CEMAC zone as well as
while security is related to protection of attacks in this region is that they import and export of vital goods are
against unlawful and deliberate acts are more violent when compared with heavily dependent on the specific mar-
(Klein, 2011, p.8). Criminal acts, which other regions of the world and Nige- itime corridor. This maritime space is
remain a reality today, are a major ria alone accounts for an average of faced with numerous threats to peace
security challenge to the internation- about 87 attacks per year (Steffen, and security as a result of increasing
al community, especially in the Gulf 2017, p.1). This figure is quite high in acts of maritime violence such as pi-
of Guinea in terms of prevention and view of the fact that it moved up from racy, armed robbery against ships and
curbing the various manifestations/ previous years and many more inci- even terrorism.
management. dents remain usually unreported. The CEMAC works hand in hand with oth-
The Gulf of Guinea (GoG) covers a maritime space within the CEMAC er regional bodies like the Economic
vast area (6000km of coastline) from sub-region (especially the waters of Community for Central African States
Senegal to Angola with its influence Cameroon, Gabon, Equatorial Guinea, (ECCAS) to prevent regional crisis, a
extending upon over 20 sovereign and Republic of Congo) is a portion of priority for African Union in the main-
coastal States (and islands), but also the GoG. Hence, insecurity within this tenance of peace and security in the

18
MARITIME SECURITY
continent. These Central African re- curity in Central Africa (CRESMAC)) p.24). CRESMAC promotes informa-
gional bodies have major security was created in Cameroon to link EC- tion sharing, joint patrols/surveillance
structures established to tackle mari- CAS and the Economic Community of of maritime space, as well as harmoni-
time threats in the sub region. In terms West African States (ECOWAS). Also, zation of actions at sea. Furthermore,
of security structures, the Horn of the Africa Law Enforcement Program MOWCA`s major objective is to tackle
Africa (Somalia) and the Gulf of Guin- was initiated by the US Department for all maritime matters that are region-
ea are the main maritime sceneries Homeland Security and the US Coast al in character. It has an information
in Africa that witness numerous and Guard, to help build maritime law en- communication center to ensure con-
severe acts of violence/ criminality at forcement and capability to detect and trol and flow of information between
sea. The waters of the CEMAC region deter illicit activities within the Gulf of member-states, as well as an intelli-
falls within the maritime landscape of Guinea (Shafa, 2011, p.13). Addition- gence gathering capacity to help them
the Gulf of Guinea, where attacks are ally, the Maritime Organization of West gain a better understanding of threats
most visible in the maritime zones of and Central Africa (MOWCA) and the and security trends in the region (Sha-
Cameroon, Congo, Equatorial Guin- Gulf of Guinea Commission are in- fa, 2011, p.20).
ea and Gabon (Ingerstad & Lindell, stitutions established to ensure inte- Following the increase of maritime
2015, p.1). It is therefore important for gration and coordination of maritime security threats in the CEMAC sub-re-
States in the region to ensure security activities (Lindskov et al, 2015, p.28). gion, in June 2013, a milestone was
within the maritime space as maritime Meanwhile, IMO in collaboration with achieved when Heads of States of
insecurity has far-reaching socio-eco- MOWCA established a sub-regional West and Central African States
nomic and political ramifications that Integrated Coast Guard Network for (ECOWAS and ECCAS) as well as
transcend national borders. West and Central Africa in order to the Gulf of Guinea Commission met
In the Central African sub-region, tackle security challenges within the in Yaounde to adopt the respective
CEMAC and ECCAS are the two re- region. Code of Conduct; they also adopted
gional economic communities that Therefore, there are two (2) major se- a Memorandum of Understanding
address the issues of peace and se- curity institutions that are engaged into (MoU) to prevent and suppress illegal
curity (Meyer, 2011, p. 9). Created tackling maritime security issues in acts perpetrating the GoG states (Mi-
in 1983, with a special emphasis on the Central African sub-region: CRES- chel Luntumbue, GRIP report, 2016).
enhancing Central Africa`s region MAC and MOWCA. CRESMAC`s Considering the above, it is safe to
Peace and Security, ECCAS works security agenda began in 2009 when point-out that maritime violence is
in parallel with CEMAC on maritime it was institutionalized by the Interna- both a reality and a challenge in the
safety and security issues; seven (7) tional Coordination Centre for Central CEMAC sub-region; constant efforts
member-states of ECCAS have coast Africa (ICC) with headquarters in Con- made by organizations and involved
in the Gulf of Guinea, with four (4) of go. It is aimed at creating an integrat- nations individually testify the need
them being CEMAC member-states. ed maritime security strategy needed to continue to find ways and means
An inter-regional coordination center to effectively respond to emerging of curbing this continuous challenge.
(the Regional Centre for Maritime Se- security threats (Ujeke et al, 2013,

19
Section B: Trends and char- of the current analysis, the total num- hotspots around the world.
acteristics ber of actual and attempted attacks
During the entire period from the early amounts to a total of 37 reported cas- PART II: CAUSES, EFFECTS,
1990s to 2008, minor incidents of vi- es between 2010 and 2015. Studies AND CONTROL OF
MARITIME SECURITY

olent crimes or petty thefts occurred demonstrate that the number of at- MARITIME VIOLENCE
in the coastal waters of the countries tacks during this period saw an overall
of the CEMAC region (Cameroon, downward trend with Congo witness- This part is divided into three dif-
Equatorial Guinea, and Congo); more ing the highest percentage (7.9%), ferent sections: section A is dealing
importantly, these types of activities followed closely by Cameroon with with the causes of maritime violence
remained at very low levels. Indeed, 3.3% and Gabon 1%. This downward in the CEMAC sub-region; section
Professor Ntuda Ebude has already trend in the Central African sub-region B is discussing the effects, while
correctly pointed out that piracy and during that period is all the more sig- section C examines the various ef-
armed robbery against ships actual- nificant when compared to West Af- forts being made to address the is-
ly started along the Cameroon coast rica, where Nigeria alone witnessed sue and its negative consequences.
during the 2nd half of the 1990s, but a 47.4% increase of attacks between
remained concentrated around the 2010 and 2016. Generally speaking, Section A: Causes
Bakassi oil exploitation areas (Ebode, although statistics on incidents of The causes of maritime violence in the
2010, p.82). piracy and armed robbery in recent CEMAC sub-region can be discussed
Bakassi stands out distinctly from oth- years are readily available based on from the geographical, political, eco-
er coastal areas between Cameroon IMB reports, details of these incidents nomic and social perspectives.
and Nigeria (as well as the CEMAC are hard to cross-check, especially
zone) in terms of piracy and armed as around 50% of piracy in West and 1. Geographical factors
robbery against ships, as various Central Africa remain underreported The Gulf of Guinea is a vast area with
armed groups operating within/around either because of the victim’s desire difficult topography; the coastlines are
this area have often used grievances for discretion, or lack of the necessary typified by many creeks and tough
associated with the Bakassi conflict supervision (Mohamed & Abdel, 2015, highlands. Such difficult geographical
as a pretext for their actions. A typical p. 4). features, coupled with the porosity of
example of what these criminal gangs In terms of features, Professor Ntuda the area means that the said coastal
can do is the hostage taking in 2008, Ebode has distinguished four cate- region inherently provides advantage
when the rebels of the Bakassi Free- gories of maritime violence occurring to pirates and armed robbers who
dom fighters launched an attack on the within the GoG (specifically in the take advantage of the geographical
supply boat SS SAGITTA that resulted coastal states of the CEMAC zone): a) characteristics (numerous small in
into the kidnaping ten (10) persons, those who steal from ships or vessels size islands; existence of the Bakas-
seven (7) of whom were French, with at ports such as ‘petit bandits’ roam- si Peninsula; mangroves close to
two Cameroonians and one Tunisian ing the ports in small or less organized the beach and the coastline, which
around Bakassi and within the territori- groups with their actions generally make access difficult). Given that the
al waters of Cameroon (Ebode, 2010, less violent; b) those who operate on pirates know the terrain more than
p.82). This attack was significant, be- platforms generally at night involving anyone else, such features make the
cause it marked the beginning of a se- mostly the theft of materials; c) those area an ideal hiding place for pirates
ries of violent attacks that took place who target vessels at sea, usually as against those who seek to pursue
in the Cameroonian coastal waters organized groups carrying out well them; this provides the pirates the op-
between the period 2008-2009, ex- orchestrated actions such as hostage portunity to operate with a very high
tending to land with spillover effects to takings and being armed with heavy level of freedom (ICG Report, 2012,
other neighboring states. The nature weaponry such as AK47 etc. and p.4). Simply put, these natural fea-
and frequency of these attacks under- claiming to belong to politically moti- tures of the area provide numerous
scores the fact that by 2009 there were vated groups whose main objective hideouts and escape routes, which
signs of new characteristics of piracy seems to be to make money through are very advantageous to pirates.
in the GoG as activities of insurgents maritime violence; and d) those who
in the region expanded beyond the carry out unauthorized fishing (Ebode, 2. Political factors
southern and western coast of Nigeria, 2010, p.82-83). However, Nincic has Countries of the CEMAC region, like
attacking ships off the coast of Cam- also pointed out that pirates operating most African Nations, face problems
eroon and neighboring coasts of the close to the shores in the GoG area are of corruption, mismanagement, and
CEMAC region. generally heavily armed (Nincic, 2009, lack of resources etc., which all im-
Concerning the specific case of CE- p. 5). Therefore, their attacks are often pact on policy issues. The CEMAC
MAC coastal states, which is the focus more violent there than in other piracy maritime border area has not always

20
received the attention one would have ders has proven unlikely to prohibit region, has a large population and
expected from the governments of the the political instability and militancy abundant energy resources typified
region in terms of security, exploitation off the south-eastern coast of Nigeria by the proximity of large oil producers
of resources and development efforts, from having an effect in CEMAC wa- (Nigeria and Angola), maturing oil pro-

MARITIME SECURITY
among others. In fact, piracy incidents ters, hence the ‘spillover effect’ often ducers (Congo Brazzaville), mature oil
in Africa should not be simply consid- mentioned by analysts or academics. producers showing signs of decline
ered as being the outfall of not main- Other maritime disputes in the CE- (Cameroon and Gabon) and new oil
taining good order at sea (Vreÿ, 2009, MAC region include the Camer- producers (Equatorial Guinea and
p. 20). This is the good old problem of oon-Equatorial dispute over an island Chad); these West and Central Afri-
bad ocean governance facing most Af- at the mouth of the Ntem River, and can countries border an important sea
rican nations generally, which is often the dispute between Equatorial Guin- lane that has vital connectivity with en-
a reflection of bad governance on land ea and Gabon in Corisco Bay (Shafa, ergy commodities (Vreÿ, 2009, p.20).
as well. Regional instability as a result 2011, p.12). The one time rebel stand- Furthermore, a significant number of
of state failure and bad governance off in Chad, political tension in the vessels are engaged in the neces-
leads to insecurity; insecurity on land Republic of Congo and even claims sary oil transport supporting activities.
can easily transform into maritime in- of a coup d’état attempt in Equato-
security. It is no coincidence that ac- rial Guinea, amongst other political 4. Social factors
cording to Mohamed (Mohamed, 2015 threats, could all be characterized as It is a very influential factor that diffi-
p. 5): “pirates are not born at sea, emerging maritime threats for coun- cult living conditions such as unem-
but on land” (IPI report, 2014, p.2). tries in the region (Vreÿ, 2009, p.23). ployment, coupled with a sense of
For reasons of clarity, the political Such disputes make it difficult to ad- neglect and abandonment could be a
situation of the Bakassi peninsula dress shared security challenges and recipe for criminality both on land and
crisis between Cameroon and Nige- it is a self-explanatory fact that they at sea. Cameroon, for example, finds
ria, is brought into discussion; armed create ‘a window of opportunity’ for itself confronted by a threat from the
groups which have been fighting criminals to carry out their activities. Bakassi Peninsula where local inhab-
against government forces have of- itants have felt excluded, abandoned
ten extended their activities towards 3. Economic factors and unhappy since the Peninsula
the sea; the peninsula became a ‘safe It is basic knowledge that if there were was handed back to Cameroon (Vrey,
haven’ for pirates throughout the pe- no economic resources and mari- 2009, p.23). Meanwhile, livelihoods
riod that the involved countries could time traffic was rather scarce within of local populations are threatened
not agree on the maritime boundary the CEMAC coastal region, criminal by the continuous degradation of the
in the area (Lindskov et al, 2015, p. gangs would have little or nothing to coastal environment and hampering
16). Noteworthy here is the fact that go after. But, the Gulf of Guinea is agriculture-fishing; this can easily ex-
the porous nature of the CEMAC bor- very rich in resources. The CEMAC plain the ‘temptation’ of the locals to

21
engage in illegal activities for survival their action, particularly with respect states have likewise come under at-
(ICG, 2012, p.3). Also, growth of mar- to the Cameroon-Nigeria Bakassi con- tack for achieving ‘an easy and quick
itime crime is as a result of structural flict. The Bakassi freedom fighters, profit’. While the cost to the interna-
problems such as poverty of the great for example (who operate within the tional community of maritime violence
MARITIME SECURITY

majority of the population alongside Cameroon-Nigerian maritime space) may be important in terms of monetary
the wealthy elite, unequal distribu- use deliberate campaigns or attacks losses and energy or other resources,
tion of wealth, socio-political tension at sea to influence political decisions other costs this phenomenon can im-
and the grievances of the local com- thereby extending their political agen- pose are less frequently considered
munities (ICG, 2012, p.3). One way da offshore although their interests are (Nincic, 2009, p. 5). The analyst Anna
of understanding the poverty aspect driven by a combination of greed and Bowden examined the economic cost
is to recall that, at the local border grievances (Neethling, 2010, p.101- associated with maritime piracy and
area, youths that are more frequently 102). While the intention may not be armed robbery against ships in terms
involved in acts of piracy and armed to dwell on the complexities of the Ni- of “Direct Economic Cost of Piracy”
robbery come from poor families and, gerian political situation as it relates and “Secondary (Macroeconomics)
because of their vulnerability, probably to this conflict, suffice is to note that Costs”. The former comprises the cost
undergo some brainwashing before there is a clear interrelation as unfor- of ransom payment, insurance cover,
joining the criminal groups they belong tunately its impact is not limited to the re-routing, warning security equip-
to. The promise of reward, comfort two countries but spills over to other ment, navigational force, prosecution
and expensive cars, financial gains, neighboring States in the CEMAC of pirates and pre-emption, while the
luxurious consumer goods and weap- coastal waters. later concerns the cost of regional
ons are strong motives; these unem- trade, food price, inflation and foreign
ployed youths are lured to engage in 2. Economic impact revenue (Bowden, 2010, p. 8-19).
piracy, which has become a thriving Piracy and armed robbery against These costs are most indicative of
business (Nincic, 2009, p.100). Fur- ships within the GoG and the CEMAC how costly piracy and armed robbery
thermore, dense population in the maritime space in particular obvious- against ships could be.
coastal areas, urban disorder, and ly have certain socio-economic con-
continuous rural-urban migration are sequences. Professor Neethling has 3. Social impact
exacerbated by economic disparities stated that the best armed groups The social impact of maritime vio-
and conflict over resources is leading operating within this region were re- lence should be viewed in the context
to violent opposition within commu- sponsible for attacks on oil pipelines of poverty, political marginalization,
nities. This existence of discontent of multinational corporations and also and even armed conflict over oil. The
is a fertile ground for the recruitment on vessels chattered by oil internation- plight of the coastal population of the
of criminal gangs, pirates and armed al exporters; vessels in neighboring CEMAC states is an important issue
robbers (ICG, 2012, p.3). These social
problems thus tend to fuel insecurity
within the CEMAC maritime space.

Section B: Effects
Given the importance of the sea in
terms of international trade and the
exploitation of resources, there is no
doubt that insecurity within any inter-
national route such as the CEMAC
maritime space is bound to exercise
negative impacts of one form or an-
other, not only locally, but also inter-
nationally. These impacts may be
political (national or transnational) or
socio-economic.

1. Political impact
Maritime violence within the CEMAC
maritime space is often perpetrated
by armed gangs who advance polit-
ical grievances as a reason behind

22
as they rely mostly on fishing for their Affairs and Inland Waterways which is states of the CEMAC region are im-
livelihood. Most of the populations the contracting authority of Cameroon portant African Union (AU) members,
living around the area generally live in dealing with the IMO over maritime they make their voices heard within
under difficult social condition due to issues while cooperating with other the AU in terms of addressing issues

MARITIME SECURITY
the factors related to their immediate relevant institutions in the country on that have to do with maritime security.
environment and respective countries. maritime crimes. There are also in- It is important to remember that, at the
Also, pirate attacks are not limited to stitutions like the Ministry of Defense 15th ordinary session of the assembly
oil transport facilities but extend to (with the Navy patrolling the coast) of the Conference of Maritime Trans-
fishing boats as well, leading to a hike and the ‘Gendarmerie’ also intervenes port Ministers of the AU that held in
in sea food prices due to scarcity of in certain reported cases (Ebode, Kampala, Uganda, 28th July 2010,
fish, an important source of protein to 2010, p.83-86). member states agreed to promote bi-
the citizens (Nincic, 2009, p.8). lateral and multilateral cooperation as
2. Regional measures well as develop and promote mutual
Section C: Measures UNCLOS 82, the most instrumental assistance and cooperation between
This section discusses measures tak- document on ocean governance points state parties in areas of maritime secu-
en to protect the CEMAC maritime out the need for States to cooperate in rity and safety (African Union, 2010).
zone against on-going maritime vio- fighting piracy. Indeed, article 100 of
lence. Such measures certainly exist the convention puts forward the follow- 3. International Cooperation
at the national level, but also extend ing: “All states shall cooperate to the Cooperation of CEMAC states with
well beyond that. fullest possible extent in the repres- major countries around the world such
sion of piracy on the high seas or in as China, various EU members -with
1. National measures any other place outside the jurisdiction France standing out- and the US are
CEMAC coastal states, like other of any state”. Cooperation consists of relevant with respect to stemming
coastal states around the globe, do many actors in the international soci- maritime violence within the CEMAC
have within their borders traditional ety, jointly acting or working together maritime space. The growing role of
institutions responsible for fighting for a common purpose. The states of France and USA for example, to assist
piracy and armed robbery against the CEMAC region have traditionally and contribute to safety and security in
ships, although it may be necessary maintained high level summit dia- the CEMAC maritime space is becom-
sometimes to adapt these institutions logue to solve problems of insecurity. ing more and more visible, as these
to cope with the new challenges. Gov- In fact, the CEMAC states are deeply countries have established permanent
ernments of these coastal states have involved in regional cooperation while naval presence for training and opera-
different policies on maritime security remaining committed to international tional purposes that constitute vibrant
threats, since they suffer different im- efforts. This sub-regional cooperation maritime partnership in the CEMAC
pacts at different times. For some, this in the CEMAC zone could be seen, for region and GoG in particular (Vrey,
security threat endangers the national example, in the drafting of legislation 2009, p. 26). Furthermore, states of
economy; but, others consider it a rel- concerning piracy (the case of the CE- the CEMAC region try to deal with the
atively small-scale trans-border crime MAC Merchant Shipping Code). issue of maritime violence within the
that does not destabilize the economy context of international organizations
(ICG, 2012, p 5). Basically, because Further, as members of the Maritime like UN and IMO. The fact that CE-
security issues transcend national Organization of West and Central Af- MAC country members are members
geographical and political boundaries, rican States (MOWCA), the CEMAC of the UN ipso facto implies that the
cooperation between states at the bi- states have been active within the countries participate in efforts made by
lateral level is necessary or even im- organization in addressing maritime UN to address issues concerning pira-
perative. security issues that could be helpful in cy and armed robbery against ships
As a result, Cameroon, Gabon, and their own maritime space. For exam- whenever they may occur within the
Equatorial Guinea (which are the ple, in 2008, during a MOWCA meeting region. The peculiar case of Somalia
major coastal states in the CEMAC held in Abidjan, the creation of an inte- illustrates how this may occur (e.g. UN
region), have made efforts in recent grated sub regional network of West Security Council Resolutions 2018 of
years to recruit more personnel that and Central Africa Coast-Guards was October 2011 and 2039 of February
will deal with security duties at sea, envisaged. This would enable member 2012 calling on states to take active
acquire new equipment and better states to reinforce cooperation among part in fighting piracy by deploying na-
train their navies/coastguards. These national coast guards and help them val vessels and aircrafts to the Horn of
traditional measures in terms of spe- to deal more efficiently in their fight Africa and cooperate with the transi-
cific institutions include, for example, against security problems (MWOCA tional federal government of Somalia
Cameroon`s Department of Maritime 7th session, 2011, p.3). Meanwhile, as towards this end).

23
seems to be situated at the level of
national efforts as well as meaning-
ful cooperation between the states of
the CEMAC region. One may want to
MARITIME SECURITY

imagine, for example, what would be


the situation where Cameroon, with
cooperation from Nigeria, succeed-
ed in effectively ‘integrating’ Bakassi
and settling the different populations
around the area, while Nigeria on its
part, successfully addressed the com-
plexities with the Niger Delta and the
other states of the CEMAC region face
with persistent conflict strengthen their
efforts to address the issues. It is safe
to say that this would go a long way
towards curbing piracy and armed rob-
bery against ships within the CEMAC
maritime space. Meanwhile, CEMAC
nations must constantly remind them-
selves of the importance of each and
every legal instrument dealing with
Conclusions and recommen- against ships (including instances of maritime security - e.g. relevant pro-
dations petty theft, of course). However, many visions of UNCLOS82, SOLAS and
of the acts of maritime violence per- the ISPS Code, SUA 88, etc. – hence
a) Conclusions petrated in this region tend to be very the need for these nations not only to
Maritime violence within the CEMAC peculiar, in the sense that they some- become party to such instruments but
maritime space has been a problem times involve extreme violence and to effectively implement them at the
since the early 90s. It became rather ruthlessness and are partly carried national level and through cooperation
prominent after the major outbreak of out on land. Some of them are even with other countries.
the Bakassi conflict between Cam- perceived to be politically motivated, Effective bilateral cooperation requires
eroon and Nigeria in 1993, as the which means that speculating about that decision makers in the states con-
effects of that war spilled over to the terrorism may not be too far-fetched. cerned come together to ‘chart modal-
neighboring states. Although there What this means is that the socio-eco- ities’ necessary for achieving their ob-
were pre-existing factors conducive nomic and political ramifications of jective. Constant evaluation is also a
to the emergence of the maritime vi- these activities could be far-reaching key imperative, since the maritime sec-
olence phenomenon, such as the indeed. The states of the CEMAC re- tor is dynamic and constantly presents
geographical configuration of the area, gion ought to be cognizant of this fact new challenges. Bilateral cooperation
developments such as persistent and and particularly within the context of is a process that requires a great deal
protracted conflicts/rebellions in some the delicate political atmosphere that of goodwill on the part of the states
states of the CEMAC region and the reigns between some of the states of concerned as the challenges facing
ICJ ruling of 10th October 2002 in fa- the sub-region. The states of the re- the states of the CEMAC region are
vor of Cameroon over the Bakassi gion must therefore be more serious, numerous and complex reason why
conflict also contributed into ‘fueling’ in terms of enhancing current efforts the nations must indulge in genuine
the armed groups and other criminal and adopting more concrete, pervad- cooperation with each other and avoid
gangs operating within the CEMAC ing and effective measures to stem making politically motivated decisions
maritime space. Such groups used the problem. If the situation is not con- that address internal short-term and
these developments as a pretext to trolled, the threats may grow to under- immediate priorities as opposed to
carry out their violent attacks, kidnap- mine political stability and economic long term sub- regional goals.
pings and hostage; negative spillover development of the region and further
effects were discussed extensivly. undermine the African maritime repu- b) Recommendations
There is no doubt that most of the tation. As stated by the famous author and
acts of violence recorded within the International cooperation efforts clergyman Alphonso R. Bernard, if you
CEMAC maritime space could be clas- may be good, regional efforts better, don’t have a vision for the future, then
sified as piracy and armed robbery but what may be best in this context your future is threatened to be a repeat

24
of the past. It is therefore important to elaborate on the solution perspective that can be adopted to improve maritime secu-
rity in the CEMAC maritime space. To effectively deal with maritime violence in the CEMAC region, a number of measures
have to be improved, strengthened and reinforced. These include inter alia measures in the legal domain to begin with; the
political and socio-economic domains are also important. Needless to point out, regional cooperation is deemed essential,

MARITIME SECURITY
as criminal acts of maritime violence transcends any physical and artificial boundary like states’ borders.

1. Regional cooperation plays an important role in solving the problem of piracy and armed robbery against ships.
This has already proven successful in the straits of Malacca and Singapore where the Regional Cooperation
Agreement on Combating Piracy and Armed Robbery against ships in Asia (ReCAAP) has been an effective
example that IMO recommends other states especially in the GoG to emulate (Maximo Q. Meija, 2012, p.37).
2. The states of the CEMAC region in collaboration with ECCAS, ECOWAS and the GoG Commission need to
strengthen coordination of legal efforts as stated in the Memorandum of Understanding between member coun-
tries of West and Central African states by ensuring a comprehensive review of the legal framework of each
member country. This approach will enable states to effectively apprehend, prosecute and trial the arrested
maritime criminals. Continuing the discussion of how to strengthen the relevant judicial support, involved states
should also work towards the establishment of courts ‘tailor-made’ to deal with piracy and armed robbery cases
cases (Mohamed, 2015, p.8); zonal coordination mechanisms for a common understanding and prosecution of
cross border and territorial crimes is also necessary.
3. As an additional solution, states of the sub-region should think of acquire and operate fixed and/or rotatory mar-
itime patrol aircraft(s), further enhancing their capabilities of ship borne patrols and invest in ground and satellite
based surveillance asserts for constant observation, monitoring and surveillance to secure the maritime space.
4. Maritime violence originates from land as a result of socio- political lapses in most African states such as poor
governance, youth unemployment, unequal distribution of wealth, and accumulated grievances of the local pop-
ulation as a result of neglect, poor coastal and environmental protection. It is therefore important for states of the
CEMAC region to ensure good governance; dealing with these ‘social deficits’ is one of the most effective ways
of solving problems and tackle the root cause of the problem.
5. Another pertinent point could be the need of greater awareness and sensitization of the population on maritime
issues. This can be done through popularization of research findings on maritime violence by governments via
sponsorship of radio and television programs, or even seminars and workshops as well as seek ways and means
of sorting out the practical difficulties that go with using military means to curb maritime violence (Ndze, 2015, p.
69)
6. The states of the CEMAC region should ensure optimal implementation of international and regional instruments
such as the GoG Code of Conduct, as well as prepare themselves now and in the future to be able to adequately
address issues of maritime violence through relevant information sharing and reporting, or implementing joint
patrol schemes, amongst others.The states of the CEMAC region should ensure optimal implementation of inter-
national and regional instruments such as the GoG Code of Conduct, as well as prepare themselves now and in
the future to be able to adequately address issues of maritime violence through relevant information sharing and
reporting, or implementing joint patrol schemes, amongst others.

REFERENCES
African Union. (2010). Revised African Maritime Transport Charter, 27. Retrieved from http://www.peaceau.org/uploads/
revised-african-maritime-transport-charter-en.pdf
Baldauf, S. (2012). Next pirate hotspot; Gulf of Guinea. The Christain Science Magazine. Retrieved June 18, 2012 from
the World Wide Web: http://www.csmonitor.com/World/Africa/2012/0228/Nextpirate-hot-spot-the-Gulf-of-Guinea.
Bowden, A. (2010). The Economic Costs of Maritime Piracy. [Louisville, Colo.]: One Earth Future Foundation.
Bueger, C. (2014). What is maritime security? Marine Policy, 53(Murphy 2010), 159–164. Retrieved from https://doi.
org/10.1016/j.marpol.2014.12.005
Chatham House Report. (2013). Maritime Security in the Gulf of Guinea. Report of the Conference Held at Chatham
House, London, 6 December 2012. (Rep.). Retrieved https://www.chathamhouse.org/sites/files/chathamhouse/public/
Research/Africa/0312confreport_maritimesecurity.pdf
Churchill, R. R., & Lowe, A. V. (1999). The Law of the Sea (3rd ed.). Yonkers, N.Y, Juris: Manchester University Press.
Dalaklis, D., & Chrysochou., G. (2012). Small Arms and Light Weapons (SALWs) Illegal Trafficking: Another Challenge
for Global Security. Hellenic Naval Academy. Department of Combat Systems, Naval Operations, Sciences of the Sea,

25
Navigation, Electronics and Communication Systems., Volume (4/2).
Dalaklis Dimitrios. (2012). Piracy in the Horn of Africa: Some good news, but a lot of work has still to be done…. Maritime
Security Review, (9).
MARITIME SECURITY

Ebode, N. (2010). Piraterie et Terrorisme: De Nouveaux Défis Sécuritaires en Afrique Centrale. B.P. 8106 Yaoundé,
Cameroun: Presses Universitaires d’Afrique.
Germond, B. (2015). The geopolitical dimension of maritime security. Marine Policy, (54), 137-142. Retrieved from
https://doi.org/10.1016/j.marpol.2014.12.013
Gilpin, R. (2007). Enhancing Maritime Security in the Gulf of Guinea. Retrieved August 20, 2017, from: http://africacenter.
org/wp-content/uploads/2007/07/Enhancing-Maritime-Security-in-the-Gulf-ofGuinea.pdf
Ingerstad, G., & Lindell, M. T. (2015). Challenges to Peace and Security in Central Africa : The Role of ECCAS. Swedish
Defense Research Agency.
International Chamber of Commerce. (2012). IMB notes increase in piracy off West Africa. Retrieved from http://www.
icc-ccs.org/news/753-imb-notes-increase-in-piracy-off-west-africa
International Crisis Group (ICG). (2012). The Gulf of Guinea: The New Danger Zone. (Rep. No. ICG Report, (Africa
Report N°195 – 12 December 2012).).
International Maritime Organization, (2010 January 19). Code of Practice for the Investigation of Crimes of Piracy and
Armed Robbery against Ships. Resolution A.1025 (26). Retrieved August 20, 2017. http://www.imo.org/OurWork/Securi-
ty/PiracyArmedRobbery/Guidance/Documents/A.1025.pdf
International Maritime Organization (IMO). (2013). Strengthening Maritime Security in West and Central Africa. Retrieved
from http://www.imo.org/en/MediaCentre/HotTopics/piracy/Documents/west africa Maritime Security.pdf
International Maritime Bureau. Annual Report (2010-2016). Piracy and Armed robbery against ships
IPI. (2014). Insecurity in the Gulf of Guinea: Assessing the Threats, Preparing the Response. International Peace Insti-
tute Report.
Kamal-Deen, A. (2015). The Anatomy of Gulf of Guinea Piracy. Naval War College Review, 1(68), 93-118. Retrieved from
http://search.proquest.com/openview/f0b98e5688d45bd0185614601f823967/1?pq-origsite=gscholar
Klein, N. (2011). Maritime Security and the law of the sea. New York: Oxford University Press.
Kraska, J. (2011). Contemporary Maritime Piracy: International Law, Strategy, and Diplomacy at Sea (1st ed.). Califonia,
USA: Praeger Security International.
Leke, S. K. (2012). Chapter 4. In The History and structure of CEMAC. Retrieved from http://wiredspace.wits.ac.za/jspui/
bitstream/10539/11740/6/Chapter_4.pdf
Lindskov, J. K., & Riber, N. J. (2015). Maritime Security in the Gulf of Guinea. Retrieved from http://www.fak.dk/publika-
tioner/
Mané, D. O. (2005). Emergence of the Gulf of Guinea in the Global Economy: Prospects and Challenges. 1-22.
Mayer, A. (2011). Peace and security cooperation in central africa Developments, Challenges and Prospects (Discussion
Paper 56). Uppsala: Nordiska Afrikainstitutet.
Meija, M. Q. (2002). Defining Maritime Violence and Maritime Security. In Maritime Violence and other security issues at
sea. (P. K Mukherjee, M.Q.Mejia & G.M. Gauci (Eds.) ed.). Malmo, Sweden: World Maritime University.
Meija, M. Q. (2012). Maritime Piracy: A Multi-Dimensional Issue: Exploring Linkages Between Economic Development,
Political Stability and Maritime Piracy. (S.S Sida).
Michel Luntumbue. (2016). The Long March of African Maritime Safety and Security in the Gulf of Guinea (Rep.). Re-
trieved https://www.grip.org/en/node/2113
Mohamed, C., & Abdel, M. (2015). Piracy in Gulf of Guinea causes, efforts and solutions. Regional Maritime Security
Institute, (AASTMT).
Mukherjee, P. K. (2002). Maritime violence and other security issues at sea: The proceedings of the Symposium on Mar-
itime Violence and other Security Issues at Sea, 26-30 August 2002, Malmö, Sweden (1st ed.). Malmo, Sweden: World
Maritime University.

26
Ndze, B. E. (2015). Effects of Maritime Violence on Cameroon`s Maritime Passenger Transport to Neighboring Countries
(Unpublished doctoral dissertation). Regional Maritime University, Accra-Ghana. Retrieved from http://ugspace.ug.edu.
gh:8080/xmlui/bitstream/handle/123456789/8213
Neethling, T. (2010). Piracy around Africa’s West and East coasts: A comparative political perspective. Scientia Militaria

MARITIME SECURITY
South African Journal of Military Studies, 38(2), 89-108.: https://doi.org/10.5787/38-2-91
Nicoll, A. (2008). The Africa Partnership Station. The International Institute for Strategic Studies, 14(6), 1-2. Retrieved
from https://doi.org/10.1080/13567880802390594.
Nincic, D. (2009). Maritime piracy in Africa: The humanitarian dimension. African Security Review, 18(3), 1-16. https://doi.
org/10.1080/10246029.2009.9627538
Onuoha, F. C. (2010). “Piracy and Maritime Security off the Horn of Africa: Connections, Causes, and Concerns.”. African
Security Review, 3(4), 191-215.
Onuoha, F. C. (2012). Piracy and Maritime Security in the Gulf of Guinea: Nigeria as a Microcosm. Retrieved from http://
studies.aljazeera.net/en/reports/2012/06/2012612123210113333.htm
Onuoha, F. C. (2013). Piracy and Maritime Security in the Gulf of Guinea: Trends, Concerns, and Propositions. The
Journal of the Middle East and Africa, 4(3), 267-293. Retrieved from https://doi.org/10.1080/21520844.2013.862767.
Osinowo, A. A. (2015). Combating Piracy in the Gulf of Guinea. Africa Security Briefs, 30, 1-8.
Patrick. (2007). Maritime Security in the Gulf of Guinea. JFR Forum, 45, 28-32. Retrieved from http://www.dtic.mil/dtic/tr/
fulltext/u2/a517524.pdf
Piracy increasing in West Africa, latest report shows. (2017, February 14). Retrieved from https://iccwbo.org/media-wall/
news-speeches/piracy-increasing-in-west-africa-latest-report-shows/
Shafa, B. M. (2011). Maritime security in the Gulf of Guinea sub-region: Threats, challenges and solutions. 1-28. Re-
trieved from http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA560829
Shaw, M. R., & Hunter, M. (2014). Comprehensive Assessment of Drug Trafficking and Organised Crime in West
and Central Africa. Retrieved from https://www.google.pt/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=r-
ja&uact=8&ved=0CCYQFjAA&url=http://www.globalinitiative.net/download/drugs/subsaharan-africa/ Organized Crime in
West and Central Africa
Starr, S. (2014). Maritime Piracy on the rise in West Africa. Combating Terrorism Centre, Vol.4.
Steven, J. (2013). Maritime Security handbook: Coping with Piracy (M. Freeth ed.). London: The Nautical Institute.
Steven, J. (2013). Maritime Security handbook: Coping with Piracy. The Nautical Institute., (M. Freeth, Ed.). Lamberth
Road, London:
Talley, W. (2008). Maritime Safety, Security and Piracy (First ed.). London: Informa Law, Mortimer House.
Ukeje, C., & Mvomo Ella. (2013). African Approaches to Maritime Security - The Gulf of Guinea. Friedrich Ebert Stiftung:
Peace and Security Series. Retrieved from http://library.fes.de/pdf-files/bueros/nigeria/10398.pdf
United Nations Convention on the Law of the Sea, 1982, Retrieved October 21, 2012 from http://www.un.org/Depts/los/
convention_agreements/texts/unclos/unclos_e.pdf
United Nations Security Council Resolution 2018(2011, October 11). Retrieved October 8, 2012 from: http://www.securi-
tycouncilreport.org/atf/cf/%7
United Nations Security Council (2012b, February 27). Gulf of Guinea Piracy ‘Clear Threat’ To Security, Economic Devel-
opment of Region. Retrieved September 12, 2012. http://www.un.org/News/Press/docs/2012/sc10558.doc.htm.
United Nations Security Council Resolution 2039(2012c, February 29). Retrieved October 8 2012, from: http://www.
un.org/ga/search/view_doc.asp?symbol S/RES/2039%20(2012) The views herein
are solely of the
Vreÿ, F. (2009). Bad Order at Sea: From the Gulf of Aden to the Gulf of Guinea. authors and do not
African Security Review, 18(3), 17-30. Retrieved from https://doi.org/10.1080/1024 represent the views
6029.2009.9627539.
of the Cameroon
Wambua, P. M. (2009). Enhancing Regional Maritime Cooperation in Africa: The Government or the
Planned End State. African Security Review, 18(3), 45-59. Retrieved from https:// United Nations/
doi.org/10.1080/10246029.2009.9627541. World Maritime
University

27
The NATO Cybersecurity Generic
CYBER SECURITY

Reference Curriculum
Application to the
Maritime Environment
by Dinos Kerigan-Kyrou
Co-Author, NATO Cybersecurity Curriculum
Emerging Security Challenges Working Group, Partnership for
Peace Consortium
At a United States Congress Border + Cyberspace and the Fundamentals itime operations depend on the secu-
and Maritime Security hearing, US of Cybersecurity. rity of cyberspace. Dr. Mandalenakis
Coast Guard Rear Admiral Paul F. + The Risk Vectors of Cybersecurity. gives the examples of the United
Thomas was asked his solution to the + Cybersecurity Management. States Arleigh Burke-class destroyer,
unique challenges facing the maritime first deployed in 1991 with a crew of
environment arising from rapidly ad- How can the NATO Cyberse- 329, and the Zumwalt-class, deployed
vanced, interconnected technology. curity Curriculum be applied in 2013 with a crew of only 158, but
RADM Thomas argued for a ‘layered to the maritime environment? with a tenfold increase in defence ca-
cyber protection strategy’ incorporat- pabilities. The Zumwalt-class is, how-
ing cybersecurity within all aspects of Cyberspace, the Fundamen- ever, totally reliant on electronic, inte-
the maritime environment. tals of Cybersecurity and the grated systems for its military abilities
The NATO Cybersecurity Generic Maritime Environment and operational systems.4 Likewise,
Reference Curriculum1 encapsulates Section one of the NATO Cybersecuri- civilian vessels are being digitalised
this layered approach advocated ty Curriculum examines how the con- and increasingly interconnected.5
by the US Coast Guard2, cyberse- stituent parts (or topology), of cyber- The internet is the backbone of this
curity must be integrated from the security are interrelated and arranged. interconnection. Contrary to popular
very outset, in all aspects of tech- The maritime environment is increas- belief there is no ‘separate’ internet for
nology and human factors, not as ingly dependent on integrated digital critical infrastructure such as energy,
an isolated ‘end point’ in a process. systems on-board vessels and within communications, or indeed maritime
The NATO Curriculum is a generic the land-based maritime environment.3 transport. The topography of cyber-
reference programme applicable to As Elena Mandalenakis states: “Cyber space in the maritime environment
a wide range of government, military, systems are globalized, inter-connect- consists of increasing dependence on
and commercial activity. It is based ed and highly integrated.” This fact integrated systems, connected online.
around themes crucial to the applica- exacerbates any disruption in a local So what of the possible vulnerabilities?
tion of cybersecurity in the maritime system with “unforeseen risks and
environment. The themes include: consequences.” The success of mar The Risk Vectors of Cyber
1
The ‘NATO Cybersecurity Curriculum’ is part of Allied Command Transformation training. The programme was led by
the Canadian Dept of National Defence Canada / Canadian Armed Forces, with the Emerging Security Challenges Work-
ing Group at the Partnership for Peace Consortium (PfPC). See: www.nato.int/nato_static_fl2014/.../20161025_1610-cy-
bersecurity-curriculum.pdf
2
RADM Paul F. Thomas, US Coast Guard. Evidence to: ‘Protecting Maritime Facilities in the 21st Century’. Hearing
before the Subcommittee on Border and Maritime Security; US House of Representatives, October 8, 2015. Serial No.
114–35, p.43.
3
United States Coast Guard Cyber Strategy’, Washington D.C.

28
security and the Maritime to the maritime environment. April maintenance and management, pol-
Environment Danos, of Port Fourchon Louisiana lution and environmental control sys-
Cybersecurity Risk Vectors are identi- and the US National Maritime Securi- tems.12
fied as the key method of addressing ty Advisory Committee, and a leading
cybersecurity concerns by the NATO authority on maritime cybersecurity, How can cybersecurity vulnerabilities

CYBER SECURITY
Cybersecurity Curriculum. In the mar- underscores the challenge: “We are affecting the maritime environment
itime environment one of the greatest blind, useless and potentially locked arise?
emerging challenges is the security of out of our own house if we are hacked; + Maritime operations can be delib-
the ‘Internet of Things’ (IoT), operated and let’s face it, it isn’t ‘if’, it’s ‘when’.”10 erately targeted by a hostile military,
by Industrial Control Systems.6 Modern vessel components increas- pirates, and terrorists.
The IoT consists of internet devices ingly comprise the Internet of Things For example, research conducted
(or ‘things’), receiving and transmitting connected to control systems via by the University of Texas at Austin
data. These devices contain sensors the internet. For example, the power on ‘spoofing’ a vessel’s GPS demon-
and actuators able to perform critical management, loading and stability, strates modern navigation systems’
functions. Most of these devices are, container monitoring, alarms, bridge vulnerability to hostile actors.13
in effect, computers running software control console, Electronic Chart Dis- And in 2012 Saudi Aramco and Qa-
and ‘firmware’ (a computer program play and Information System (ECDIS), tar’s RasGas, both of which are signif-
stored within the hardware). Automatic Identification System, Nav- icant maritime operators, were victims
The US and EU have highlighted par- igation Decision Support (NAVDEC), of the ‘Shamoon’ and ‘Flame’ malware
ticular concerns regarding the ‘security Voyage Data recorders, Computerized causing significant outage. Malicious
vulnerability’ of these devices.7 A pro- Automatic Steering, and the Global software has also targeted oil rig sta-
posed US Bill ,’The Internet of Things Maritime Distress and Safety System bility off Africa and South Korea.14
Cybersecurity Improvement Act of (GMDSS). + A maritime operator can become vic-
2017’ , defines a security vulnerability Ports increasingly feature multiple ex- tim to what the author calls ‘Collateral
as a “compromise of the confidentiali- amples of IoT including port security, Damage from a Non-Targeted Cyber
ty, integrity, or availability” of a device access control, CCTV, gates, ID cards, Attack’, where it is affected by mal-
or its information.8 automated cargo handling equip- ware not specifically targeted at them.
Due to commercial and legal concerns ment, the Terminal Operating Centre, In July 2017 the shipping and logis-
there is a great reluctance to share cranes, and integrated supply chain tics company A.P. Moller-Maersk was
knowledge of these vulnerabilities. logistical systems. (Modern ports are caught-up in the ‘NotPetya’ malicious
However, Stefan Lüders at CERN rapidly becoming advanced logistical software (or ‘malware’).15 Maersk lost
states that while hundreds of their IoT centres incorporating IoT into almost about $300m as a direct result of being
devices control power, security and every function).11 unable to operate their booking sys-
research, 32% of CERN’s IoT devices Moreover, port IoT devices are directly tem. (Indeed Maersk employees re-
either crashed or failed when faced interacting with vessels’ IoT including sorted to using the popular ‘WhatsApp’
with the most basic vulnerability scan.9 communications, GPS (Global Posi- messaging app to process customer
These IoT concerns clearly extend tioning System), lock operations, bookings until the problem
4
Dr. Elena Mandalenakis, “Political Implications of Cyber Space on State Power,” ‘NMIOTC - Maritime Interdiction Oper-
ations Journal’, 13, no.2 (2016): 15-24; Available at: www.kenap.mil.gr/files/NMIOTCjournal13.pdf
5
EU ENISA “Analysis of Cyber Security Aspects in the Maritime Sector,” 2011 at: www.enisa.europa.eu/publications/cy-
ber-security-aspects-in-the-maritime-sector-1/at_download/fullReport
6
For further explanation of SCADA (Supervisory Control and Data Acquisition), and Industrial Control Systems see:
Robert Radvanovsky & Jacob Brodsky, ed., ‘Handbook of SCADA / Control Systems Security’ (Boca Raton: CRC Press,
2016).
7
EU ENISA: ‘Security and Liability in the Internet of Things’, June 2017, see: www.enisa.europa.eu/publications/
ed-speeches/security-and-liability-in-the-internet-of-things
8
United States Senate. 115th Congress, 1st Session. ‘Internet of Things Cybersecurity Improvement Act of 2017’.
See also concerns raised about IoT security by Senators Mark R. Warner and Cory Gardner, co-chairs of the Senate
Cybersecurity Caucus, at: www.warner.senate.gov/public/index.cfm/pressreleases?id=06A5E941-FBC3-4A63-B9B4-
523E18DADB36
9
Dr. Stefan Lüders, CERN. Presentation at the ITU; available at: www.itu.int/en/ITU-T/studygroups/com17/Documents/
tutorials/2012/11-CERNComputerandGridSecurityITU(2012).pdf
10
Security Industry Association webinar, March 16, 2016 ‘Keeping Cargo Moving: Maritime Cybersecurity’ with Brett
Rouzer, US Coast Guard Cyber Command, and April Danos, Port Fourchon; available at: www.youtube.com/watch-
v=2naiQd-U_kM
11
or further information on port security see: April Danos ‘Innovative Approaches using Information Technology’ (2013),
at: aapa.files.cms-plus.com/SeminarPresentations/2013AnnualConvention/Danos%2C%20April.pdf
12
‘Keeping Cargo Moving’ op.cit.

29
CYBER SECURITY

was solved).16 mote access to the port’s administra- (CBRN) materials.18


Maersk was not specifically targeted; tion systems. They were able to clone
nonetheless a victim of a ‘Non-Target- swipe cards to access the quayside Cybersecurity Management
ed Cyber Attack’ may sustain the same and the automated container stacking and the Maritime Environ-
harm as if it were deliberately targeted.  yard to precisely locate and transport ment
+ A maritime operator can become an their container before inspection by
unwilling facilitator of crime via a cy- port authorities. The management of cybersecurity is a
bersecurity breach. The Maersk and Antwerp examples central part of the NATO Curriculum.
In 2013 the EU’s Europol police agen- demonstrate the interconnectedness Cybersecurity management in the
cy announced arrests had been made of both ‘administration’ and ‘critical maritime environment requires devel-
regarding a cyber attack on the Port function’ cybersecurity. Critical infra- opment of human factors and secur-
of Antwerp. The criminals aimed to structure operators attempt to isolate ing technology. Training and raising
use the port’s computer systems to these systems from one another via a all employees’ and contractors’ cyber
facilitate their activities. This access process known as ‘air gapping’. How- awareness is the first necessary step
enabled them to monitor the transport ever, as these situations demonstrate, - developing an environment where
of a container holding over 1,000 kg of air gapping is difficult, perhaps impos- cybersecurity is seen as each individ-
drugs.17 sible to achieve such is the cross-over ual’s responsibility, whether they are
The cybersecurity breach was caused between administration and critical on-board a vessel or within the land-
by ‘phishing’ emails, containing attach- functions. based maritime environment. Indeed,
ments with hidden malware, and also A similar cyber attack could enable over 70% of cybersecurity breaches
by physically breaking into the port’s criminals or terrorists to utilise mari- are caused by human factors - “people
administration and placing ‘keylog- time facilities for trafficking humans, or and process” not by the technology,
ging’ devices to capture passwords. for smuggling weapons and Chemical, according to Adrian Leppard, Commis-
The passwords were then used for re Biological, Radiological and Nuclear sioner of the City of London Police.19
13
UT, Austin “UT Austin Researchers Spoof Superyacht at Sea” (2013), www.engr.utexas.edu/features/su-
peryacht-gps-spoofing.
14
Shamoon and Flame viruses target Windows operating systems. More information: “New wiper malware hits Middle
East and Europe”, in ‘Computer Weekly’, at: www.computerweekly.com/news/450414424/New-wiper-malware-hits-Mid-
dle-East-and-Europe
15
See: “New Petya / NotPetya ransomware outbreak”, ‘Kaspersky Daily’: www.kaspersky.com/blog/new-ransomware-ep-
idemics/17314/
16
“Moller-Maersk puts cost of cyber attack at up to $300m” in, ‘Financial Times’, August 16, 2017.
17
‘Europol EC3 ‘Hackers deployed to facilitate drug smuggling’ www.europol.europa.eu/sites/default/files/documents/
cyberbits_04_ocean13.pdf
18
For more information on CBRN see: Brg Gen (ret’d) Galatas Ioannis MD, ‘CBRNE Terrorism Newsletter’, at: https://
www.cbrne-terrorism-newsletter.com
19
Commissioner of City of London Police, Adrian Leppard, speaking at meeting of CSARN, London, May 2014.
20
Dinos Kerigan-Kyrou ‘Critical Infrastructure: Cybersecurity and Organization’; presented at the ‘Critical Infrastructure
Resilience conference, UK Security Expo’, London, November 2016.
21
See: RADM Paul F. Thomas, US Coast Guard, op.cit.

30
It is crucial that all maritime employ- veloped the author proposes that the damage when they do occur.
ees are able to identify cybersecurity standard for Information Security Man-
concerns as early as possible in a ‘no agement Systems (ISO 27001:2013), Summary
blame’ environment, so that a problem is used as a guideline for the maritime The NATO Cybersecurity Generic
is identified and dealt with when the industry to verify software, control sys- Reference Curriculum makes clear

CYBER SECURITY
problem is ‘small’ before it becomes tems, and the multiple IoT devices that that achieving the highest standards
‘big’. (Indeed, the maritime and avia- the maritime industry increasingly de- of cybersecurity is a multifaceted
tion industries already do this in mat- pends upon.24 The maritime industry, task, requiring a layered approach
ters concerning operational safety). possibly in close collaboration with EU concerning human and technological
The IT departments will continue to ENISA (the EU’s cybersecurity agen- factors. It requires an understanding
remain crucial, but identification of a cy based in Heraklion, Crete), and the of the fundamentals of cybersecurity,
problem is a responsibility concerning US Dept of Homeland Security may its risk vectors, and the management
every individual; not a single employee wish to develop a testing programme of these risks. As Major General Ste-
or contractor now has a role that can for maritime interconnected devices. fano Vito Salamida states on behalf
be considered separate from cyberse- While 100% security can never be of Supreme Allied Commander Trans-
curity.20 guaranteed, the industry may need to formation: “I am convinced that it can
Managers and directors may need to exert greater influence on device sup- serve as a reference for partner coun-
further understand that cybersecurity pliers to ensure the robustness and tries in the design and development
is as integral to successful operations resilience of components. of course models and programmes
as logistics, fuel supply, or safety. In- Finally, improving cybersecurity infor- for professional Cybersecurity military
deed, incorporating cybersecurity into mation sharing across the maritime education. It will also serve as an en-
safety and security, rather than having environment may greatly help. Indeed, hancement of military interoperability
it perceived as an isolated cost centre, the US has developed an excellent between NATO and its partners and
is central to the development of mari- platform for industry to share cyber- strengthen the collaboration on a re-
time cybersecurity.21 security threats and challenges, US- sponsive education and training sys-
As the maritime industry progresses CERT.25 Likewise, the EU’s ‘Network tem. It is my pleasure to support the
toward an environment consisting of and Information Systems Directive’ will PfPC Emerging Security Challenges
the Internet of Things, the suppliers compel critical infrastructure operators Working Group through publishing this
of components and devices need to to share cybersecurity breach infor- Cybersecurity Reference Curriculum
play a much greater role in ensuring mation.26 Further engagement by the as a NATO document.” The NATO
their products’ security.22 CERN’s maritime industry with EU Europol’s Curriculum is a training programme
Stefan Lüders points out that there is EC3 Cybercrime Centre and ENISA that is fully adaptable to the maritime
presently no device standard or verifi- will help both minimise the occurrence environment
cation system for IoT.23 Until one is de- of cybersecurity problems and limit the
22
Freely available software through the Open Vulnerability Assessment System (OpenVAS), include ‘Metasploit’ vulnera-
bility scanning and ‘Kali Linux’ penetration testing software to test the robustness and resilience of IoT products.
23
Lüders, op.cit.
24
This is known as a Second Party audit, or ‘an audit on suppliers’. See: International Standards Organization, ISO
27001:2013.
25
See: www.us-cert.gov
26
EU ‘Directive on Network and Information Systems, 2016’ See: www.ec.europa.eu/digital-single-market/en/net-
work-and-information-security-nis-directive

Dr. Dinos Kerigan-Kyrou CMILT


Co-Author, NATO Cybersecurity Curriculum
Emerging Security Challenges Working Group of the Partnership for Peace Consortium

Dinos is a member of the Emerging Security Challenges Working Group, an external con-
sultative body to NATO’s Emerging Security Challenges Division, based at the Partnership
for Peace Consortium in Garmisch, Germany. He is a visiting lecturer at the University of
Greenwich and is responsible for the cybersecurity division of the Senior Command & Staff
Course at Defence Forces Ireland. Dinos holds the ISO 27001 lead auditor certificate for Information Security
Management Systems, and is a Chartered Member of the Institute of Logistics and Transport. For several
years he conducted training at the NATO School Oberammergau to NATO and Partnership for Peace mil-
itary and civilian staff on subjects including cybersecurity, energy security, and critical infrastructure resil-
ience. He previously worked for many years in aviation law and policy at British Regional Airlines, and then
as Communications Director for CANSO, the organisation representing Air Traffic Management providers.
Dinos is on the editorial board of ‘Connections’, the Journal of the Partnership for Peace Consortium. Dinos
has a PhD in European Union law. He is an active member of the Hellenic Community of Ireland.

31
Biometrics in Support of Naval Units
to fight Piracy and Terrorism
MARITIME SECURITY

by Lieutenant Commander GRC (CG)

Introduction of these actions depend on the maritime area in which the


illegal act is committed.
The maritime environment that NATO faces today is com- Terrorists and pirates consistently use the maritime environ-
plex and often comprised of unconventional, irregular, and ment to achieve their goals. Cooperation of all stakeholders
hybrid elements. This human-centric environment contains in the field of security is essential in order to reduce piracy
terrorists, insurgents, influential leaders and clandestine and terrorism.
state-sponsored groups hidden among civilian populations These maritime challenges are often interrelated and re-
and is complicated by multiple levels of associations and quire governments to develop multi-national solutions
complex human factors. The security environment is likely rooted in International cooperation. Cooperation amongst
to contain a broad and dynamic set of challenges where nations and international entities is not always easy, with
adversaries and other actors alike compete with each oth- economical, political, and social constraints impacting the
er across a broad range of environments. Commanders willingness and ability to act. Improving cooperation within
should seek a deeper understanding of these challenges. NATO on maritime security concerns is a vital issue. NATO
Intelligence is crucial to develop this understanding by pro- needs cooperation in all areas to strengthen its response to
viding the insight and foresight commanders need to make threats to maritime security.
decisions.
Maritime shipping is an integral component of the global Piracy and terrorism
economy, and is inextricably linked to both national pros-
perity and international cohesion. In order to take all the Piracy
necessary measures to ensure the safe transportation of The issue of piracy has affected the the merchant commu-
people and goods in the marine environment, we must first nity throughout history and continues today. The causes,
be aware of illegal activities and threats that occur at sea. consequences, and methods of addressing piracy are of
Such prohibited activities include acts of terrorism, piracy, primary concern to the international community, shipping
armed robbery, acts of violence against maritime naviga- companies, and organizations such as the International
tion, potential quarantine situations, drug trafficking, mi- Maritime Organisation (IMO).
grant smuggling, unsafe transport of migrants, transport of Piracy is an international crime. Traditionally, a state can ex-
wanted felons and/or terrorists, arms trafficking, unresolved ercise jurisdiction only within its territorial waters. However,
radiation alarms, and illegal fishing. The legal implications the 1982 United Nations Convention on the Law of the Sea

32
(UNCLOS) specifies three distinct cases in which warships communities. They also differ in their use of force.
or ships under public authority may apply jurisdiction out- Terrorism is a concept with multiple causes, consequenc-
side their maritime sovereignty zones. These are boarding, es and manifestations and therefore not easily defined. In
hot pursuit, and piracy. Here we will focus on the latter. essence, it is a broad ideology aimed at provoking terror

MARITIME SECURITY
According to Article 101 of UNCLOS, piracy is defined as: with the purpose of destabilizing political life, expressing a
a. any illegal act of violence or detention, or any act reaction to government policy and carrying out an extreme
of depredation, committed for private ends by the form of protest. Terrorist attacks can be perpetrated by one
crew or the passengers of a private ship or a pri- or more individuals. Moreover, they are aimed at injuring or
vate aircraft, and directed: destroying as many people and assets as possible. Addi-
(i) On the high seas, against another ship or tionally, terrorist attacks may be perpetrated by people who
aircraft, or against persons or property on are not born in the same country and are being carried out
board such ship or aircraft; to avenge citizens of another country for political or religious
(ii) Against a ship, aircraft, persons or prop- motives.
erty in a place outside the jurisdiction of
any State; What is Biometrics
b. Any act of voluntary participation in the operation Biometrics is the automated recognition of individuals
of a ship or of an aircraft with knowledge of facts based on their behavioural and biological characteristics.
making it a pirate ship or aircraft; Today there are many types of biometric data can be col-
Any act of inciting or of intentionally facilitating an act de- lected to identify a person, such as fingerprint, face, iris,
scribed in subparagraph (a) or (b). DNA, gait analysis and hand geometry. Some of those com-
monly used by biometric data capture devices are analyzed
Terrorism in more details below.
Terrorism is the unlawful use or threatened use of force Fingerprints
or violence with the goal of instilling fear and terror, in Fingerprint collection is critical to catching explosives man-
order to coerce or intimidate governments or societies, to ufacturers, identifying who handled weapons and explo-
achieve political, religious or ideological objectives. sives in a cache, and who was present a safe house other
Terrorism can be seen as a violent act specifically designed than the people that were found. Fingerprint recognition has
to attract attention and spread fear to a large audience. been around for over 100 years and can be extremely accu-
Terrorists aim to use violence to gain the maximum degree rate in positively identifying a person from a visible or latent
of leverage needed in order to achieve desired change. fingerprints. Because of its extensive use worldwide, tech-
Through their actions, terrorists seek to sway public atten- nologies for capturing standardized fingerprints are widely
tion to issues they consider important and pass across their available.
message. While not as accurate as Iris recognition, fingerprint recog-
Various terrorist groups differ considerably based on their nition tools have the ability work in concert with collected fo-
motivation. They differ in the nature of their ideology and rensics from a crime scene or taken from an object. These
their political goals. They differ in their relationship with reli- latent fingerprints can then be loaded into the system and
gion, as well as the level of support they receive from their checked against the database. Fingerprints can lead you to

33
the bomb maker, the person that loaded the weapons into Biometrics is needed not only in force protection and secu-
the cache, and the individuals who were at the safe house. rity missions, but is also used to achieve an advantage over
Face an enemy in such operations as conventional warfare, com-
Recognizing a person using face geometry is a technology bating terrorism, forcible entry, strikes, raids and operations
MARITIME SECURITY

that has evolved significantly in recent years. These sys- with multinational partners.
tems are increasingly being developed on a wider scale of Biometrics can be used to link people to times, locations,
applications making this technology promising for the fu- groups, and activities, while simultaneously providing a
ture. The facial recognition process consists of capturing means to detect and identify them in the future. Whether a
many images of the face then extracting unique facial fea- biometric match links a new record with a latent fingerprint
from an IED, or a previous record captured for base access,
these links offer potential value that can be realized through
specialized analysis.

Advantages
The greatest advantage to using biometrics is to remove
the power of anonymity at its most basic level, answer the
question of who is standing in front of you at the gate. Ev-
ery individual can be considered a package of distinctive, if
not unique, biometric identifiers, from palm prints to iris and
tures as well as distances from or between the nose, ears, from handwriting to gait.
mouth, eyes and cheeks Any human characteristic, either biological or behavioral
Iris can (in theory at least) be used as a biometric modality.
Iris recognition is the process of recognizing a person by The listed characteristics are currently some of the biomet-
analyzing the random pattern of the iris. The iris is a muscle rics that can be used to recognize a person with a certain
within the eye that regulates the size of the pupil, controlling degree of accuracy. No single modality should be consid-
the amount of light that enters the eye. It is the colored por- ered perfect for all applications.
tion of the eye with coloring based on the amount of mela-
tonin pigment within the muscle. Due to its uniqueness, uni- Limitations
versality, reliability and stability, Iris patterns serve a major - Applicable Laws and Policies must be considered when
role in several recognition and authentication applications. developing operational and intelligence functions for captur-
ing biometric data.
Why we use biometrics - Cultural Considerations for the population from which
- To catch IED makers and members of the networks biometric data is being captured must be made when plan-
- To confirm or refute identity ning and carrying out biometric activities. Because of cul-
- To give the population a way to identify each other tural differences, biometric capture must be conducted in
- To identify, track, locate and deal with the population accordance with acceptable local customs. For this reason,
- To deny the enemy the ability to hide within the popula- commanders or those directing biometric capture must be
tion, eliminate local support familiar with, and sensitive to, the local culture.
- Security is required for Biometric Capture as it takes the
These key reasons show why we use biometrics for the pro- time and attention of personnel. Biometric Capture must not
tection of our own forces as well as for the local populace. risk the safety of the personnel or the individual being en-
The capability to positively identify an individual enhances rolled.
the overall mission success. When you can identify, track Environment can limit Biometric Capture as weather and
and locate members of the populace, you can help control operational factors can influence the quality of data, which
what happens and when it happens rather than being in a has subsequent impacts on the entire Biometric Cycle.
reactive mode.
Ioannis Argyriou
Lieutenant Commander GRC (CG)
Instructor at NATO Maritime Interdiction Operational Training Center (NMIOTC)
In 2001, he joined the Hellenic Naval Academy (Coast Guard Officers’ Cadet School) and in 2002 he was
sworn in as Ensign of the Hellenic Coast Guard. During his career in the Hellenic Coast Guard he has served
in a number of local Port Authorities. In March 2014 he was appointed a National Briefing Officer and liaison
by FRONTEX on issues of illegal immigrants. Since April 2014 he has been serving at NATO Maritime In-
terdiction Operational Training Center (NMIOTC) as an instructor and an officer of primary responsibility for
the conduction of training events by the International Maritime Organisation (IMO) and East Africa Standby Force (EASF). Moreover
he coordinates the training for various groups from NATO state members and other affiliated countries.
E-mail: argirioui@nmiotc.nato.int - johnarg00@yahoo.gr Mobile: (0030) 6974014100

34
HIGH VISIBILITY EVENTS
Visit of The Chief of Italian Fleet, Vice Admiral Donato
Marzano and The Chief of the Hellenic Fleet,
Vice Admiral Ioannis Pavlopoulos, June 2017

Visit of The American Hellenic Institute, July 2017

35
HIGH VISIBILITY EVENTS

Visit of SEEBRIG, July 2017

Visit of World Hellenic Inter-Parliamentary Association,


July 2017

36
HIGH VISIBILITY EVENTS
Visit of the Chief of Defence of Norway, Admiral Haakon
Bruun-Hanssen and the Cfief of Defence of Hellenic Armed
Forces, Admiral Evangelos Apostolakis, September 2017

2nd NMIOTC Cyber Security and Cyber Defence in the


Maritime Environment Conference, September 2017

37
HIGH VISIBILITY EVENTS

Visit of Hellenic National Defence College, September 2017

Visit of the Minister of Defence of the Slovak Republic,


Mr Peter Gajdos, September 2017

38
HIGH VISIBILITY EVENTS
NMIOTC Commandant, Commodore Georgios Tsogkas,
cutting the “birthday” cake for the Centre’s 9th anniversary,
with senior Staff Officer, October 2017

The Commander of the Naval Base in Alexandria, Rear


Admiral Iham Mohamed Sobhy Aly visited training ship ARIS,
in the context of the multinational excercise MEDUSA 2017,
October 2017

39
HIGH VISIBILITY EVENTS

Visit of the Deputy Assistant Secretary of the US Navy,


Mr. Jim Balocki and Senior Director for Policy and
Strategy Deputy under Secretary of the Navy for Policy,
Ms. Mindy Montgomery, November 2017

Visit of Cfief of Defence of Hellenic Armed Forces, Ad-


miral Evangelos Apostolakis with Chief of Cyber De-
fence & Information of Armed Forces of Norway, Odd
Pedersen, during the Military Partnership
Directorate Meeting,November 2017

40
HIGH VISIBILITY EVENTS
European Defence Agency Conference, with the pres-
ence of the Cfief of Defence of Hellenic Armed Forces,
Admiral Evangelos Apostolakis and the Chief of the Hellenic
Fleet, Vice Admiral Ioannis Pavlopoulos, November 2017

Exercise NIRIIS 2017 Pre-Sail Conference, November 2017

41
HIGH VISIBILITY EVENTS

Interview of NMIOTC Commandant, Commodore Georgios


Tsogkas, December 2017

Visit of Hellenic Navy Naval Cadets,December 2017

42
NMIOTC TRAINING
Exercise Sea Breeze, July 2017

Course “5000”, August 2017

43
NMIOTC TRAINING

Joint Training of Dutch and Swedish Armed Forces,


September 2017

Joint Training of Dutch and Swedish Armed Forces,


September 2017

44
NMIOTC TRAINING
Course “8000”, September 2017

Training of Qatari Special Forces, September 2017

45
NMIOTC TRAINING

Training of German Forces for Boarding Deployment,


October 2017

Training of ROS REGELE FERDINAND Command and


Boarding Teams, October 2017

46
NMIOTC TRAINING
Training of Polish Special Forces Team NSWU FORMOZA,
October 2017

Course “12000”, October 2017

47
NMIOTC TRAINING

Pilot Course “21000”, October 2017

Training of GRC Special Forces Team, October 2017

48
NMIOTC TRAINING
Training of Egyptian Boardind Team, during Exercise
MEDUSA 2017, October 2017

Training of Ghanaian Special Forces Team, November 2017

49
NMIOTC TRAINING

Course “18000”, December 2017

Training of NMIOTC personnel at the firing range,


December 2017

50
51
Hellenic Army Printing Office
NMIOTC/ΚΕΝΑΠ
Souda Bay 732 00 Chania
Crete, Hellas

Phone: +30 28210 85710


Email: studentadmin@nmiotc.nato.int
nmiotc_studentadmin@navy.mil.gr
Webpage: www.nmiotc.nato.int

www.facebook.com/nmiotc

www.instagram.com/nmiotc

52

You might also like