07.10.2015 Views

InView Autumn/Winter 2015

Welcome to the second issue of InView where we focus on the highly topical and hugely important issues surrounding technology, including cyber risks.

Welcome to the second issue of InView where we focus on the highly topical and hugely important issues surrounding technology, including cyber risks.

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

12 <strong>InView</strong> | An independent eye on insurance<br />

HOW TO STAY AFLOAT IN<br />

THE FACE OF CYBER ATTACKS<br />

Stringent digital security systems surround our airports and banks, but ports and<br />

vessels are highly vulnerable to cyber attack. Phil James examines this pressing issue.<br />

The marine industry is open to cyber attack due to a number<br />

of reasons which include the development of its digital<br />

security systems failing to keep pace with the technology<br />

being used in other areas of the transport sector. Further,<br />

and more worryingly, marine organisations are lagging<br />

behind the increasingly sophisticated systems being used<br />

by organised criminals and terrorists. This therefore raises<br />

the disturbing question of not ‘if’ our ports and vessels will<br />

fall victim to cyber attack, but ‘when’?<br />

There are numerous ways in which digital marine<br />

infrastructure can be penetrated. Bills of lading, manifests<br />

and transit orders can be falsified, resulting in serious<br />

financial consequences – not to mention the movement<br />

of cargoes such as drugs, weapons, human traffic and<br />

even ‘dirty bombs’.<br />

Fraudulent data can be inserted into systems to create the<br />

illusion of legitimacy to criminal and terrorist activities<br />

carried out by certain criminal organisations. Automatic<br />

Identification System (AIS) data is based on radio<br />

transmission, which is also relayed via the internet and is<br />

susceptible to interference. Another weakness in marine<br />

security arises out of electronic payment for bunkers.<br />

Like any digital financial transaction, it is susceptible to<br />

interference by cyber criminals. Unlike some digital financial<br />

transactions, the sums involved are always significant.<br />

The Port of Antwerp hacking incident in 2013 is a recent high<br />

profile example of a cyber breach. Drug smugglers planted<br />

an extraordinary array of disguised remote access devices<br />

on the Belgian port’s logistics systems as part of a major<br />

hacking attack.<br />

The attack is thought to have taken place over a two year<br />

period from June 2011. The organised crime group used<br />

hackers based in Belgium to infiltrate computer networks in<br />

at least two companies operating in the Port. The systems<br />

that controlled the movement and location of containers<br />

were breached. This allowed:<br />

■■<br />

■■<br />

the hackers to access secure data containing location and<br />

security details of containers, which in turn allowed<br />

the traffickers to hide cocaine and heroin among<br />

legitimate cargoes including timber and bananas shipped<br />

in containers from South America.<br />

It was then easy for the traffickers to steal the relevant<br />

containers before the legitimate owner arrived.<br />

© Copyright. Weightmans <strong>2015</strong>. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!