Maritime Cyber Security in the Commercial Cargo Control sector Justin Dunning The Mission • Follow the cargo through its voyage • Observe all of the touch points that a container goes through • Determine if those touch points are susceptible to a cyber attack • Once vulnerabilities are detected, determine the following: • • Possibility Severity Who Would Disturb the Flow? • Drug Cartels • • Drug trade is worth $435 Billion Increased from $320 Billion in 2005 • Arms Distributors • Arms trade is worth between $45-60 Billion a year • Thieves • Can make a decent amount of money on the black market Who and What are Vulnerable? • RFID Tags • Possibility: High • • No uniformity= easily counterfeited Severity: High • Could contribute to drug, arms trade, and theft • Freight Forwarder/3PL • Possibility: High • • Email information is easily attackable Severity: High • Contribute to high confusion in ports halting operations Who and What are Vulnerable? • Algorithms • Possibility: Low • • Must be highly skilled to decrypt these Severity: High • Could alter the position on the vessel • Electronic Data Interchange (EDI) • Possibility: Medium • • Makes it possible for many people to view Severity: Medium • Has the potential to effect the flow of supply chain because information is not confidential to necessary personnel Who and What are Vulnerable? • The Ports • Possibility: Low • • Take measures to protect but wont be 100% protected Severity: High • If this happens, halting the port for numerous days would affect the local economy • DDoS Attack • Possibility: Low • • Measures put in place to protect their servers Severity: High • This would shut down every port function at the same time