Effective Maritime Cybersecurity Regulation - The Case For A Cyber Code
Effective Maritime Cybersecurity Regulation - The Case For A Cyber Code
net/publication/327588589
CITATIONS READS
4 1,332
2 authors, including:
Rory Hopcraft
University of Plymouth
1 PUBLICATION 4 CITATIONS
SEE PROFILE
All content following this page was uploaded by Rory Hopcraft on 01 May 2019.
To cite this article: Rory Hopcraft & Keith M. Martin (2018): Effective maritime cybersecurity
regulation – the case for a cyber code, Journal of the Indian Ocean Region, DOI:
10.1080/19480881.2018.1519056
RESEARCH NOTE
ABSTRACT KEYWORDS
Ships and ports are increasingly connected to each other through Maritime cybersecurity;
cyberspace. This connectivity streamlines many aspects of International Maritime
maritime business, but also exposes maritime operators and Organisation; cybersecurity
administrations to new types of risk including hacking and regulation; maritime
industry; port security; risk
outage. The maritime industry has been slow to realize the management
implications of this new environment within which it operates,
and now lags behind other industries (like aviation) when it
comes to cyber risk mitigation and regulation. We argue that the
International Maritime Organisation (IMO), alongside its members,
urgently needs to create robust and resilient cybersecurity
regulations. We suggest that the IMO should consider creating a
standalone Cyber Code, based on a framework created by
previous IMO Codes such as the Polar Code. Since the IMO uses
Codes as a legally binding instrument, this would help to ensure
the continued safety and efficiency of the maritime industry in the
face of threats from cyberspace.
Background
Over the last decade, the world maritime industry has amplified its reliance on cyber-
enabled technology (IMO, 2017a). This technology has been used to increase both the
safety and productivity of maritime activities, including the remote monitoring of
vessels. However, this technology has simultaneously opened up the maritime industry
to new risks from cyberspace in its efforts to safeguard vessels and cargoes. These risks
range from unintentional human errors to ensuring software and data integrity to
planned state-level attacks. This situation is exacerbated by integrated information tech-
nology and the intensification in communication between ships and land-based entities,
which opens up many more methods in which a ship at sea could be exposed to a threat
from the cyber-realm.
Within the maritime sector, the adoption of cyber-enabled technology has occurred
incrementally over time, so the industry has been relatively slow to implement effective
risk mitigation and appreciate the extent to which ships and ports need to be kept up-
to-date in dealing with cyberspace (Latarche, 2018). The International Maritime Organiz-
ation (IMO), the specialized United Nations (UN) body charged with facilitating
cooperation to achieve the practicable standards of maritime security and regulate
shipping, has also been late and somewhat inactive in considering regulation when it
comes to a number of cybersecurity standards.
While full digitalization of ships and related systems is a global risk-management issue,
it is of high significance to the Indo-Pacific region, which incorporates the third largest of
the world’s oceans and acts as the gateway to many of the major shipping lanes, straits
and canals, including the Suez Canal. At the same time, the Indo-Pacific region experi-
enced the rise of a number of non-traditional security threats including piracy between
2008 and 2013 (IMO, 2017b). This spike was attributed to an increase in the financial
value of cargoes transiting the area, being led by strong demands for imports of crude
oil to both India and China, and the export of petroleum products (UNCTAD, 2017). So
while maritime security does remain a high priority in a variety of ways, the expanded
nature of security threats no longer entails only physical attacks by pirates and other crim-
inal groups on the water itself. Security decisions must also deal with the digitization in the
maritime industry that involves attacks on cyber-enabled ships by cybercriminals and a
growing myriad of hostile state and non-state actors.
A cumulative body of literature has documented how maritime systems are vulnerable
to an ever-growing range of cyber threats that can cause considerable damage (BIMCO,
2017; IET, 2016; TRANSAS, 2016). Malicious attacks on maritime systems have come
about through many points of vulnerability due to not taking necessary steps for cyber
security mitigation and preparedness, including poor access control to communications
systems and manipulation of employees (social engineering). The consequences of
these types of issues have been varied, including extortion, the loss or compromise of
business sensitive information and the opportunistic criminal disruption of chart naviga-
tion systems (Kelion, 2018). Yet with both ports and vessels moving towards systems of
automation and connectivity, the security of a modern-day vessels will need to ensure sig-
nificant security improvements to address ongoing issues like ransomware attacks and
cyber-sabotage. Such security concerns need to be assessed within the reality of globally
accessible navigation systems and the fact that the operation of modern technology-
dependent vessels are configured in ways that can invite these types of cyber-incidents.
In short, multiple systems may be connected together. It is therefore imperative that
the maritime industry, through the IMO, creates actionable, robust and resilient cyberse-
curity regulations that reflect this technological revolution. New regulations and guide-
lines are vital to progress towards a less vulnerable infrastructure as well as allowing
the maritime industry space to improve efficiency and decrease costs, without heedlessly
comprising the safety and security of the seafarer. At the very least, navigation and associ-
ated digital communication will continue to indispensably buttress the maritime sector,
improving the technology that supports activities such as international shipping, cruising,
leisure boating and marine scientific exploration
This research paper will outline some of the central challenges in the development of
robust maritime cybersecurity regulations. It will argue that there is a need to embed an
appropriate risk management regime via capacity-building and the advance and cham-
pioning of global cyber-security standards. We will also address how a collaborative
approach by the maritime industry can help to bring about a sense of renewed urgency
to ensure more formal process in establishing a self-reinforcing Cyber Code with
respect to maritime cyber-security.
JOURNAL OF THE INDIAN OCEAN REGION 3
and the only immediate support available is via limited and low-speed bandwidth connec-
tions (ESC Global Security, 2015).
more than 20 states, alongside with regional stakeholders, the Code provides an example
of how the IMO used its expertise and power to initiate the establishment of multi-agency,
multidisciplinary maritime security partnerships. This institutional framework, where poss-
ible, coordinates military and civilian resources to avoid duplication and strengthens trans-
regional coordination such as facilitating the operational coordination of regional navies.
Cyber-security however, cannot be approached through a limited regional oceanic
network of like-minded actors. Due to the unique nature and scope of maritime
systems and digital infrastructure, the impacts and detrimental flow-on effects of an
attack are not limited to just one region or domain. The far-reaching impacts of the
cyber-attack on A.P. Moller-Maersk in 2017, highlights the importance of international col-
laborative approaches to addressing cybersecurity threats. This attack started on an office
terminal in Ukraine, spread through the company’s global network, and eventually
impacted international port terminals including those in India (Saul, 2017).
Nonetheless, regional stakeholders are still important to regulatory discussions, as they
are more acutely aware of the immediate geopolitical, environmental, resource and
related issues for a particular region. The Indian Ocean is one of the major conduits for
Middle Eastern oil transport, and therefore its shipping lanes are predominantly used by
tankers, which carry their own specific risks. Also, as was seen by the worldwide impli-
cations of a 2017 ransomware attack – WannaCry through the Windows XP operating
system – there are some states who lack the capability to easily implement updated tech-
nical mitigation processes (AFP, 2017). Problematically, this lack of capacity will inhibit
their ability to co-ordinate with non-government stakeholders and met stringent regulat-
ory compliance.
So maritime cybersecurity is an inter-dependent global challenge, tackled by a compre-
hensive strategic framework of international collaboration, feedback, coordination and
communication in order to achieve common or complementary risk analysis. The creation
of a stronger shared understanding of both the risks and impacts of a cyber-attack will
allow the formation of a cross-sectoral security community, focused on cybersecurity
and associated threats to operation-critical, technology platforms such as navigation
systems. It is through standardization and certification that all relevant regional and inter-
national stakeholders will be able to better assist with incident management as well as
acting to ensure the development of adaptable regulation, which is then monitored
and evaluated by all within the sector.
Code for Ships Operating in Polar Waters (Polar Code), which outlines regulation that
applies only to vessels operating in polar waters, has mandatory sections that are enforce-
able under both SOLAS and maritime pollution conventions.
By using Codes, the IMO can highlight long-term and specific risks that are unique to a
process or environment that the code pertains too. It creates an unambiguous reference to
how the overarching conventions still apply, regardless of the uniqueness of a process or
environment. The Polar Code outlines the requirements on safety equipment, such as life
jackets and ice axes, that are distinctive to the operational environment and that are
required to ensure continued compliance with SOLAS. In other words, as well as reiterating
requirements, Codes allow additional requirements, above and beyond the basic require-
ments of compliance to be added to the overarching convention. The Polar Code outlines
stringent hull specifications that vessels wishing to be classified as ‘Icebreakers’ require.
Such a classification applies to ships constructed of steel and intended for independent
navigation in ice-infested polar waters. This then allows the IMO to restrict the scope of
aspects of compliance, to specific practices and process when required.
The use of Codes also allows for the harmonization of the different and discrete rules
that regulate shipping. Again, taking the Polar Code, it creates a consistent regulatory fra-
mework that incorporates parts of both IMO frameworks and those of the Arctic Council
(Bai, 2015). This allows other administrations’ requirements, local authority law and exper-
tise all to be incorporated into wider IMO regulations and standards. Such a uniform
approach ensures there is no unfair advantage given to ships under certain adminis-
trations (Schröder-Hinrichs & Hebbar, 2006).
Additionally, this harmonization occurs between the various councils that form the IMO.
It allows each council to use their technical expertise to develop holistic regulations through
a better decision-making process. Through the use of working groups, each council will con-
sider regulation and guidance that ensure the reduction of the risks present in relevant
specific environments, such as in known regions of high piracy. These recommendations
are then collated under the IMO parent committee, normally the Maritime Safety Commit-
tee, to develop a single code that includes all the recommendations.
Codes allow a wide and varied IMO membership (via its member states, various think
tanks, shipping associations and Non-Governmental Organizations) to share their exper-
tise and experiences to the decision-making process. This collaboration is aided by Ship-
ping Associations who work on behalf of smaller bodies that do not have their own seats
within IMO discussions. This means that the smaller parties, that are the practitioners
within the maritime community, can have a sense of ownership among all actors as
their interests feed into an equally-beneficial governance process. This allows the
decision-making process to consider not only the broader industry risks, but also the
more nuanced risks that only a specific section of the industry might face. Codes thus
facilitate information sharing, promote engagement within the maritime community,
encourage greater awareness among public stakeholders, and ensure a better co-ordi-
nated decision making process to support relevant cross-sector maritime regulation.
Enabling enforcement
The creation of a Cyber Code would increase the ability to enforce cybersecurity regulation
from within the maritime industry itself. The Code would highlight the authority of auth-
orized members to carry out inspections to ensure the continued compliance with these
regulations. A vessel in breach of these regulations could be detained.
Enforcement authorities within the maritime industry, such as Flag Administrations and
Classification Societies, would be party to discussions about establishment of a Cyber
Code. This would provide the necessary leverage to develop a cohesive enforcement
structure. The Code would serve to create a framework for states to use entering regu-
lations into national law and in ensuring the consistency of these across the international
community and relevant third party stakeholders.
In 2017, the IMO amended two of their general security management codes to explicitly
include cybersecurity. The International Ship and Port Facility Security Code (ISPS) and
International Security Management Code (ISM) detail how port and ship operators
should conduct risk management processes. Making cybersecurity an integral part of
these processes should ensure that operators are at least conscious of cyber-risks.
8 R. HOPCRAFT AND K. M. MARTIN
Hopefully, the above developments could initiate a more holistic approach to maritime
cybersecurity regulation. The knowledge gained from these new cyber-risk assessments
may enable the IMO to develop a broader set of cybersecurity regulations. Readily attain-
able is, for example, the harmonizing of some equipment requirements with existing
cybersecurity standards adopted by other sectors.
The inclusion of cyber risk management into both the ISM and ISPS security assess-
ments will allow administrations to have the enforcement capabilities required to
ensure compliance, and thus increase the security of maritime cyberspace. As part of a
Cyber Code these requirements are not left as standalone assessments, but would form
part of a wider assessment and mitigation process that includes compliance with other
standards and regulations, thus ensuring that all systems have a basic level of security.
There also seems to be a lack of urgency to get the house in order. It is also worth
noting that the cyber-specific amendments to the ISM and ISPS do not come into force
until January 1 2021 and they only represent starting point to move towards a more hol-
istic approach to maritime cybersecurity regulation.
Given a major obstacle is that maritime surveillance is strongly linked with national sover-
eignty, the voluntary section of the Code would allow the IMO to build in recommen-
dations that states could enact into national law. This combination of mandatory and
voluntary elements would allow minimum standards to be set by the mandatory
section, with additional security supplemented through the voluntary section. This volun-
tary section permits states to implement additional security in ways that they see fit, but
which might be seen as too prescriptive in other legal jurisdictions. By including these
regulation as voluntary, with no obligation to implement, states with reservations can
still agree to the Code, allowing it to enter into force.
As discussed previously, maritime cyberspace is closely connected to terrestrial infra-
structure, which falls under the individual sovereignty of states. Within IMO discussions,
JOURNAL OF THE INDIAN OCEAN REGION 9
issues that are seen to infringe on state sovereignty, like submarine cabling, are often met
with resistance and outright rejection of the suggested regulation. Therefore, creating a
Cyber Code which is goal-based, a concept the IMO has utilized since the early 2000s,
could help overcome some of this resistance. This is because goal-based standards do
not specify a means of achieving compliance, but rather set flexible goals permitting
alternative ways to achieve compliance (Hoppe, 2005). This would allow sovereign
states the freedom to implement practices that fit in with their national guidance, as
long as the overall goal is met, and are included in operational security assessments, to
be assessed by the Flag Administration This would involve controlling checking all the
security navigation documentation and having direct control on the compliance of
foreign-registered vessels calling at domestic ports.
addressed the unique challenge of strengthening existing conventions in a way where com-
pliance was only required by those who operated within that specific environment.
Overall, the bulk of the cyber-specific regulations that would be included in a Cyber
Code are directly formed from the initial information gained through ISM and ISPS assess-
ments. It can be argued that the voluntary incorporation of these assessments will form a
much better stimulant for development of a Code rather than being reactive and knee-
jerk. Instead, such an assessment process will allow the industry to utilize the strength
of its collective participants to develop comprehensive regulation based from best prac-
tice and not be reliant on intentions based from past experiences.
There is no inevitability that a Cyber Code will be created from this process. However, as
this research note has outlined, it would be the logical and productive step. Currently,
there does seem a trend from the maritime industry not to want a Cyber Code, but this
may come from the lack of appropriate risk management regime across shipping organ-
izations. With an increased clarity about applicable risk boundaries and the threats to
systems or services posed by digitization and integration, the industry might tap into
new opportunities to drive an international standard. This standard, in the form of a
Cyber Code, would then act to ensure a uniform and parallel approach is adopted while
increasing the cost and consequences of non-compliance.
Conclusion
The maritime industry is undoubtedly behind other transportation sectors, such as aero-
space, in cybersecurity terms. The co-operative establishment of a holistic Cyber Code
by the maritime community would allow the development of robust maritime cybersecur-
ity regulations. These would equip the sector with the capability and adaptability to
address whatever future cyber security challenges arise.
Disclosure statement
No potential conflict of interest was reported by the authors.
Funding
The research of Hopcraft was supported by the EPSRC as part of the Centre for Doctoral Training in
Cyber Security at Royal Holloway, University of London [EP/P009301/1].
Notes on Contributors
Rory Hopcraft is a Ph.D. student from the Centre of Doctoral Training in Cyber Security within the
Information Security Group at Royal Holloway University of London. Prior to starting his Ph.D., he
attained his M.Sc. in Geopolitics and Security from Royal Holloway. Rory is co-supervised by both
the Information Security Group and the Geography departments. Rory’s current research focuses
on the regulatory aspects of maritime cybersecurity.
Professor Keith M. Martin B.Sc. (Glasgow), Ph.D. (London), CMath FIMA, is Professor of Information
Security. He received his B.Sc. (Hons) in Mathematics from the University of Glasgow in 1988 and
a Ph.D. from Royal Holloway in 1991. Between 1992 and 1996 he held a Research Fellowship at
the University of Adelaide, investigating mathematical modeling of cryptographic key distribution
problems. In 1996 he joined the COSIC research group of the Katholieke Universiteit Leuven in
Belgium, working on security for third generation mobile communications. Keith rejoined Royal Hol-
loway in January 2000, became a Professor in Information Security in 2007 and was Director of the
12 R. HOPCRAFT AND K. M. MARTIN
Information Security Group between 2010 and 2015. Keith’s research interests include cryptographic
applications and geopolitical aspects of cyber security. He is the author of Everyday cryptography by
Oxford University Press. In addition to conventional teaching, Keith is a designer and module leader
on Royal Holloway’s distance learning M.Sc. Information Security program, and regularly presents to
industrial audiences and schools.
ORCID
Rory Hopcraft http://orcid.org/0000-0003-1962-6903
References
APT. (2017, May 14). Manhunt for hackers behind global cyberattack. Seychelles News Agency [online].
Retrieved from http://www.seychellesnewsagency.com/articles/7262/Manhunt+for + hackers
+behind+global+cyberattack
Bai, J. (2015). The IMO polar code: Emerging rules of Arctic shipping governance. The International
Journal of Marine and Coastal Law, 30(4), 674–699. doi:10.1163/15718085-12341376
Basarn, I. (2015). IMO-polar code: History, content, and shortcomings. Arctic Summer College 2015
Contributions [online]. Retrieved from https://arcticsummercollege.org/sites/default/files/ASC%
20Paper_Basaran_Ilker.pdf
BIMCO. (2017). The guidelines on cyber security onboard ships [online]. Retrieved from http://www.ics-
shipping.org/docs/default-source/resources/safety-security-and-operations/guidelines-on-cyber-
security-onboard-ships.pdf?sfvrsn=16
Bueger, C. (2015). What is maritime security? Marine Policy, 53, 159–164. doi:10.1016/j.marpol.2014.
12.005
ESC Global Security. (2015). Maritime cyber security white paper – safeguarding data through increased
awareness [online]. Retrieved from http://www.escgs.com/files/WP_ESC_Safeguarding%20data%
20through%20increased%20awareness.PDF
Glück, Z. (2015). Piracy and the production of security space. Environment and Planning D: Society and
Space, 33(4), 642–659. doi:10.1068%2Fd14245p
Hoppe, H. (2005). Goal-based standards – a new approach to the international regulation of ship con-
struction. WMU Journal of Maritime Affairs, 4(2), 169–180. [online]. doi:10.1007/BF03195072
Institute of Engineering and Technology. (2016). Code of practice – cyber security for ports and port
systems [online]. Retrieved from https://assets.publishing.service.gov.uk/government/uploads/
system/uploads/attachment_data/file/546160/cyber-security-for-ports-and-port-systems-code-
of-practice.pdf
International Maritime Organisation. (2005). Report of the maritime safety committee on its eightieth
session. MSC 80/24 [online]. Retrieved from https://docs.imo.org/Shared/Download.aspx?did=
31865
International Maritime Organisation. (2012). ISPS code - guide to maritime security and the ISPS code.
London: IMO Publishing.
International Maritime Organisation. (2014a). Implications of the United Nations convention on the law
of the sea for the International Maritime Organization. LEG/MISC.8 [online]. Retrieved from http://
www.imo.org/en/OurWork/Legal/Documents/LEG%20MISC%208.pdf
International Maritime Organisation. (2014b). Measures toward enhancing maritime cyber security.
MSC 94/4/1 [online]. Retrieved from https://docs.imo.org/Search.aspx?keywords=MSC%2094%
2F4%2F1
International Maritime Organisation. (2014c). SOLAS - safety of life at sea. London: IMO Publishing.
International Maritime Organisation. (2016). Interim guidelines on maritime cyber risk management.
MSC.1/Circ.1526 [online]. Retrieved from http://www.imo.org/en/OurWork/Security/Guide_to_
Maritime_Security/Documents/MSC.1-CIRC.1526%20(E).pdf
International Maritime Organisation. (2017a). Guidelines on maritime cyber risk management. MSC-
FAL/Circ.3 [online]. Retrieved from http://www.imo.org/en/OurWork/Security/Guide_to_
JOURNAL OF THE INDIAN OCEAN REGION 13
Maritime_Security/Documents/MSC-FAL.1-Circ.3%20-%20Guidelines%20On%20Maritime%
20Cyber%20Risk%20Management%20(Secretariat).pdf
International Maritime Organisation. (2017b). Reports on acts of piracy and armed robbery against
ships. Circ.245 Annex 4 [online]. Retrieved from http://www.imo.org/en/OurWork/Security/
PiracyArmedRobbery/Reports/Documents/245%20Annual%202016.pdf
International Maritime Organisation. (2018a). ISM code - international safety management code.
London: IMO Publishing.
International Maritime Organisation. (2018b). MARPOL amendments enter into force. IMO Press
Briefing [online]. Retrieved from http://www.imo.org/en/mediacentre/pressbriefings/pages/
04marpolamendments.aspx
Jones, K. D., Tam, K., Papadaki, M. (2016). Threats and impacts in maritime cyber security. Engineering
& Technology Reference, 1(1). doi:10.1049/etr.2015.0123
Kelion, L. (2018, June 7). Ship hack ‘risks chaos in English Channel. The BBC [online]. Retrieved from
https://www.bbc.co.uk/news/technology-44397872
Latarche, M. (2018, June 6). Shpping lags behind in new tech adoption, but change is inevitable
Posidonia 2018 experts agree. Shipinsight.com [online]. Retrieved from https://shipinsight.com/
articles/shipping-lags-behind-in-new-tech-adoption-but-change-is-inevitable-posidonia-2018-
experts-agree
National Institute of Standards and Technology. (2018). Framework for improving critical infrastructure
cybersecurity [online]. Retrieved from https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.
04162018.pdf
NATO. (2016). Operation OCEAN SHIELD. Operations Archive, Allied Maritime Command, Northwood
UK [online]. Retrieved from https://mc.nato.int/missions/operation-ocean-shield.aspx
NATO. (2017). Tallinn manual 2.0 on the international law applicable to cyber operations. Cooperative
Cyber Defence Centre of Excellence. Cambridge: Cambridge University Press.
Novet, J. (2017, August 16). Shipping company Maersk says June cyberattack could cost it up to $300
million. CNBC [online]. Retrieved from https://www.cnbc.com/2017/08/16/maersk-says-notpetya-
cyberattack-could-cost-300-million.html
Remuss, N. (2010). Space & maritime security – strategies for countering pirates. Space Policy, 26(2),
124–125. doi:10.1016/j.spacepol.2010.02.013
Saul, J. (2017, June 29). Global shipping feels fallout from maersk cyber attack. Reuters [online].
Retrieved from https://www.reuters.com/article/us-cyber-attack-maersk-idUSKBN19K2LE
Schmitt, M. (2017). Tallinn manual 2.0 on the international law of cyber operations: What it is and
isn’t. Just Security [online]. Retrieved from https://www.justsecurity.org/37559/tallinn-manual-2-
0-international-law-cyber-operations/
Schröder-Hinrichs, J., & Hebbar, A. (2006). International standard setting through the IMO. Baltic
Master Issue Brief. World Maritime University [online]. Retrieved from https://www.researchgate.
net/publication/237258882_International_Standard_Setting_through_the_IMO
Smith, M. (2011). The deepwater horizon disaster: An examination of the spill’s impact on the gap in
international regulation of oil pollution from fixed platforms. Emory International Law Review, 25,
1477–1516. Retrieved from http://law.emory.edu/eilr/_documents/volumes/25/3/comments/
smith.pdf
TRANSAS. (2016). Connected ships and cybersecurity. Frank J Coles CEO [online]. Retrieved from
https://docs.wixstatic.com/ugd/9491c8_5fbc6ff941df40f8a5b90d703de4a64b.pdf
United Nations. (1980). Vienna convention on the law of treaties. General Assembly [online]. Retrieved
from https://treaties.un.org/doc/Publication/UNTS/Volume%201155/volume-1155-I-18232-
English.pdf
United Nations. (1982). Convention on the law of the sea. General Assembly [online]. Retrieved from
http://www.un.org/depts/los/convention_agreements/texts/unclos/closindx.htm
United Nations Conference on Trade and Development. (2017). Review of maritime transport 2017
[online]. Retrieved from http://unctad.org/en/PublicationsLibrary/rmt2017_en.pdf
University of Texas at Austin. (2013). UT Austin researchers spoof superyacht at sea [online]. Retrieved
from http://www.engr.utexas.edu/features/superyacht-gps-spoofing