EMERGING INTELLIGENCE OPERATIONAL THREATS FOR THE SHIPPING INDUSTRY
Abstract
Review paper
DOI: https://doi.org/10.37458/ssj.6.1.4
The shipping industry, driven by rapid technological advancement and digital transformation, faces an evolving landscape of threats to intelligence operations. This paper delves into the multifaceted challenges posed by information warfare, state-sponsored espionage, and corporate espionage, which are motivated by economic gain, geopolitical advantage, and the acquisition of critical data. These threats have profound security implications, extending from financial risks to vessel and cargo safety. In addition to external threats, the industry must confront the human element, with insider actions posing a formidable challenge. Insiders can be exploited through social engineering and infiltration, underscoring the need for security awareness and risk mitigation measures. Moreover, the geopolitical context further complicates the maritime sector's security landscape, with China's expanding presence in the South China Sea and Russia's assertiveness in key maritime regions. These actions have significant implications for global trade, regional security, and the balance of power. To address these emerging threats, the paper emphasizes the importance of a holistic counterintelligence approach. Cybersecurity measures, employee training, and regular audits form the foundation of defense. Competitive intelligence and risk analysis, focusing on monitoring geopolitical developments and cyber threat indicators, are crucial for crafting effective risk mitigation strategies.
References
Akpan, F., G., Bendiab, S., Shiaeles, S., Karamperidis, and M., Michaloliakos (2022). ‘Cybersecurity challenges in the Maritime Sector’. Network, 2(1), 123–138. https://doi.org/10.3390/network2010009.
Alcaide, J., and R. G., Llave (2020). ‘Critical infrastructures cybersecurity and the Maritime Sector’. Transportation Research Procedia, 45, 547–554. https://doi.org/10.1016/j.trpro.2020.03.058.
Amin, H., and A., Rafique (2021). ‘The maritime rise of China in the Indo-Pacific and Indo-US counter balancing approach’. Journal of Political Science and International Relations, 4(1), 18. https://doi.org/10.11648/j.jpsir.20210401.13
Amiri, N., S., Shirkavand, M., Chalak, and N., Rezaeei (2017). ‘Competitive Intelligence and developing sustainable competitive advantage’. AD-Minister, 173–194. https://doi.org/10.17230/ad-minister.30.9.
Barnea, A. (2019) ‘Big Data and counterintelligence in western countries’, International Journal of Intelligence and CounterIntelligence, 32(3), 433–447. doi:10.1080/08850607.2019.1605804.
Barnea, A. (2021). ‘Big Data Can Boost the Value of Competitive Intelligence’. Competitive Intelligence Magazine, 26(1). Available at: https://www.scip.org/page/Big-Data-Boost-Competitive-Intelligence (Accessed 24/09/2024).
Ben Farah, M., E., Ukwandu, H., Hindy, D., Brosset, M., Bures, I., Andonovic, and X., Bellekens (2022). ‘Cyber security in the Maritime Industry: A systematic survey of recent advances and future trends’. Information, 13(1), 22. https://doi.org/10.3390/info13010022.
Borozna, A. (2022). The Sources of Russian Foreign Policy Assertiveness. Europe-Asia Studies, 75(7), 1228-1229. https://doi.org/10.1007/978-3-030-83590-3.
Brady, A. (2014). ‘Russia’s Arctic strategies and the future of the Far North’. The Polar Journal, 4(1), 223–223. https://doi.org/10.1080/2154896x.2014.913911.
Buszynski, L. (2021). Australia’s geopolitics and the South China Sea. Security, Strategy, and Military Dynamics in South China Sea, Chapter in Security, Strategy, and Military Dynamics in the South China Sea, 267–286. https://doi.org/10.1332/policypress/9781529213454.003.0015. Available at: https://www.cambridge.org/core/books/abs/security-strategy-and-military-dynamics-in-the-south-china-sea/australias-geopolitics-and-the-south-china-sea/DE944B03538B9080A4838C7CC0A91D12. (Accessed 24/09/2024).
Calatayud, L. (2023). The complex relationship between Europe and Chinese investment: The case of Piraeus. Lau China Institute. King’s College London, Available at: https://www.kcl.ac.uk/lci/assets/china-in-focus-piraeus-paper-final.pdf. (Accessed 24/09/2024).
Çalışkan, S. (2023, March 22). China’s expanding influence in Iraq. The Diplomat. Available at: https://thediplomat.com/2023/03/chinas-expanding-influence-in-iraq/ (Accessed 24/09/2024).
Canepa, M., F., Ballini, D., Dalaklis, and S., Vakili (2021). Assessing the effectiveness of cybersecurity training and raising awareness within the maritime domain. INTED2021 Proceedings. https://doi.org/10.21125/inted.2021.0726.
Capano, D. E. (2023, September 30). Throwback attack: How notpetya ransomware took down Maersk. Industrial Cybersecurity Pulse. Available at: https://www.industrialcybersecuritypulse.com/threats-vulnerabilities/throwback-attack-how-notpetya-accidentally-took-down-global-shipping-giant-maersk (Accessed 24/09/2024).
Capsaskis, C., (2022). Moscow’s Strategic Obsession with the Eastern Mediterranean: Lessons from pre-Cold-War history. Hellenic Foundation for European & Foreign Policy. Available at: https://www.eliamep.gr/wp-content/uploads/2022/06/Policy-paper-103-final.pdf (Accessed 24/09/2024).
Catrantzos, N. (2012). ‘Insider Threats in the Shipping Industry’. Maritime Security Review, 8(2), 87-102.
Carvalho, P. (2021, June 30). Fundamentals of Competitive Intelligence (CI). IF Insight & Foresight. Available at: https://paulosoeirodecarvalho.medium.com/fundamentals-of-competitive-intelligence-ci-1-ebf07520746e. (Accessed 24/09/2024).
Cho, I., and K., Lee (2016). ‘Advanced risk measurement approach to insider threats in Cyberspace’. Intelligent Automation & Soft Computing, 22(3), 405–413. https://doi.org/10.1080/10798587.2015.1121617.
Chubb, A. (2022). Dynamics of assertiveness in the south china sea China, the Philippines, and Vietnam, 1970–2015 (Vol. 99). Seattle, Washington: The National Bureau of Asian Research. Available at: https://www.nbr.org/publication/dynamics-of-assertiveness-in-the-south-china-sea-china-the-philippines-and-vietnam-1970-2015/ (Accessed 24/09/2024).
Clark, R. M. and W. L., Mitchell (2019). Deception: Counterdeception and counterintelligence. Washington, DC: CQ Press.
Cloutier, A. (2013). ‘Competitive Intelligence Process Integrative Model based on a scoping review of the literature’. International Journal of Strategic Management, 13(1), 57–72. https://doi.org/10.18374/ijsm-13-1.7.
Cross, S. (2015). ‘NATO–Russia security challenges in the aftermath of Ukraine conflict: Managing black sea security and beyond’. Southeast European and Black Sea Studies, 15(2), 151–177. https://doi.org/10.1080/14683857.2015.1060017.
Cybersecurity and Infrastructure Security Agency, (2021). Defending Against Software Supply Chain Attacks. Available at: https://www.cisa.gov/sites/default/files/publications/defending_against_software_supply_chain_attacks_508_1.pdf (Accessed 24/09/2024).
Dalay, G., and N., Sabanadze, N. (2024, March 7). How geopolitical competition in the Black Sea is redefining Regional Order. Chatham House. Available at: https://www.chathamhouse.org/2024/03/how-geopolitical-competition-black-sea-redefining-regional-order (Accessed 24/09/2024).
Dempsey, K., V., Yan Pillitteri, and A., Regenscheid (2021). Managing the Security of Information Exchanges. Publication 800-47, National Institute of Standards and Technology - U.S. Department of Commerce. Available at: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-47r1.pdf (Accessed 24/09/2024).
Durlik, I., T., Miller, D., Cembrowska-Lech, A., Krzemińska, E., Złoczowska, and A., Nowak (2023). ‘Navigating the SEA OF DATA: A comprehensive review on data analysis in maritime IOT applications’. Applied Sciences, 13(17), 9742. https://doi.org/10.3390/app13179742.
Emmanuelides, G., and P., Tsavliris (2019). Winning shipping strategies. theory and evidence from leading shipowners. Economia Publishing.
Estay, D., (2020). Cyber resilience for the shipping industry. CyberShip Project. Available at: https://www.dendanskemaritimefond.dk/wp-content/uploads/2017/03/Cybership_Report_WP_5.pdf (Accessed 24/09/2024).
European Parliament (2023). In-Depth Analysis, Security implications of China-owned critical infrastructure in the European Union. Available at: https://www.europarl.europa.eu/RegData/etudes/IDAN/2023/702592/EXPO_IDA(2023)702592_EN.pdf (Accessed 24/09/2024).
Fadeev, A., A., Spiridonov, N., Kondratov, K., Zaikov, M., Kuprikov, and N., Kuprikov (2024). ‘Energy cooperation of Russia and China in the Arctic: State and prospects’. Polar Geography, 1–17. https://doi.org/10.1080/1088937x.2024.2321143.
Fu, R. (2015). ‘Correspondence: Looking for Asia's Security Dilemma’. International Security, 40(2), 181-204. https://doi.org/10.1162/ISEC_c_00220.
Gelles, M. G. (2021). Insider threat prevention, detection, and mitigation. Chapter in International Handbook of Threat Assessment, 669–679. https://doi.org/10.1093/med-psych/9780190940164.003.0037.
Geman Hélyette. (2009). Risk management in commodity markets from shipping to agriculturals and Energy. John Wiley & Sons, Ltd.
Giannakopoulou, E. N., E. I., Thalassinos, and T. V., Stamatopoulos (2016). ‘Corporate governance in shipping: an overview’. Maritime Policy & Management, 43(1), 19-38. https://doi.org/https://doi.org/10.1080/03088839.2015.1009185.
Grammenos, C. T. (2010). The Handbook of Maritime Economics and Business. Lloyd's List.
Greenberg , A. (2018, August 22). The untold story of notpetya, the most devastating cyberattack in history. Wired. Retrieved Available at: https://cyber-peace.org/wp-content/uploads/2018/10/The-Untold-Story-of-NotPetya-the-Most-Devastating-Cyberattack-in-History-_-WIRED.pdf (Accessed 24/09/2024).
Gruner, J. (2021). Digital Transformation in shipping: The Hapag-Lloyd Story. In: Seebacher, U.G. (eds) B2B Marketing. Management for Professionals. Springer, Cham. https://doi.org/10.1007/978-3-030-54292-4_23.
Guitton, M.J. and J., Fréchette (2023). ‘Facing cyberthreats in a crisis and post-crisis ERA: Rethinking Security Services Response Strategy’, Computers in Human Behavior Reports, 10, 100282. https://doi:10.1016/j.chbr.2023.100282.
Haralambides, H., E., Karakitsos, and S., Tenold (2019). shipping and Globalization in the Post-War Era. Palgrave Studies in Maritime Economics.
Herbert-Burns, R., and P., Lehr (2009). Lloyd’s Miu Handbook of Maritime Security. Auerbach.
Ichimura, Y., D., Dalaklis, M., Kitada, and A., Christodoulou (2022). ‘Shipping in the era of digitalization: Mapping the future strategic plans of Major Maritime Commercial Actors’. Digital Business, 2(1), 100022. https://doi.org/10.1016/j.digbus.2022.100022.
Kallimani, J. G. (2018). ‘The challenges of digitisation and data analysis in the maritime domain’. Maritime Affairs: Journal of the National Maritime Foundation of India, 14(1), 36–50. https://doi.org/10.1080/09733159.2018.1478433.
Kaminska, M., D., Broeders, and F., Cristiano (2021). Limiting Viral Spread: Automated Cyber Operations and the Principles of Distinction and Discrimination in the Grey Zone. 13th International Conference on Cyber Conflict.
Kanellopoulos, A. N. (2022). The Importance of Counterintelligence Culture in State Security. Global Security and Intelligence. Note 5. Available at: https://www.buckingham.ac.uk/wp-content/uploads/2022/07/GSIN_5a.pdf (Accessed 24/09/2024).
Kanellopoulos, A. N. (2024). ‘Insider threat mitigation through human intelligence and counterintelligence: A case study in the shipping industry’. Defense and Security Studies, 5(1), 10-19. https://doi.org/10.37868/dss.v5.id261.
Kipgen, N. (2021). The Politics of South China Sea Disputes. Routledge.
Ko, B., and D., Song (2022). New Maritime Business: Uncertainty, Sustainability Technology and big data. Springer Nature.
Kuo, M. (2023, December 20). Assessing China’s and Russia’s Arctic ambitions. The Diplomat. Available at: https://thediplomat.com/2023/12/assessing-chinas-and-russias-arctic-ambitions (Accessed 24/09/2024).
Lee, C. B., J., Wan, W., Shi, and K., Li (2014). A cross-country study of competitiveness of the shipping industry. Transport Policy, 35, 366–376. https://doi.org/10.1016/j.tranpol.2014.04.010.
Lixia, Y. (2021). ‘Belt and road initiative and China’s energy security: Can China be more energy secured?’, Energy Security in Times of Economic Transition: Lessons from China, 151–160. https://doi.org/10.1108/978-1-83982-464-720201007.
Lorange, P. (2020). Innovations in shipping. Cambridge University Press.
Luttwak, E. and B., Carson (2019, February 19). Jaw-Jaw: China's Great Power Disease. War on the Rocks. Available at: https://warontherocks.com/2019/02/jaw-jaw-chinas-great-power-disease (Accessed 24/09/2024).
Ministry of National Defense of the People's Republic of China, (2019). China's National Defense in the New Era, Ministry of National Defense of the People's Republic of China. Available at: https://english.www.gov.cn/archive/whitepaper/201907/24/content_WS5d3941ddc6d08408f502283d.html (Accessed 24/09/2024).
Moreno, J. E. (2024, February 22). China’s hacker network: What to know. The New York Times. Available at: https://www.nytimes.com/2024/02/22/business/china-hack-leak-isoon.html (Accessed 24/09/2024).
Niknami, N., A., Srinivasan, K., Germain, and J., Wu (2023). ‘Maritime Communications – Current State and the Future Potential with SDN and SDR’. Network. 3(4), 563-584. https://doi.org/10.20944/preprints202310.0880.v1.
Osiewicz, P. (2018). ‘The belt and Road Initi Ati Ve (BRI): Implications for Iran-China relations. Przegląd Strategiczny, 11, 221–232. https://doi.org/10.14746/ps.2018.1.16.
Papasotiriou, H. (2013). China from Heavenly Empire to the rising superpower of the 21st century, Poiotita Publications. [in Greek]
Perlroth, N., M., Scott, and S., Frenkel (2017, June 27). Cyberattack hits Ukraine then spreads internationally. The New York Times. Available at: https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html (Accessed 24/09/2024).
Prunckun, H.W. (2019), Counterintelligence theory and practice. London: Rowman et Littlefield.
Putter, D. and S. D., Dov Bachmann (2022) ‘Scoping the future counterintelligence focus’, International Journal of Intelligence and CounterIntelligence, 36(2), 358–385. doi:10.1080/08850607.2022.2091414.
Raine, S. (2017). Regional disorder the south china sea disputes. Taylor and Francis.
Riddervold, M. (2023). ‘The EU and the governance of the Maritime Global Space’. Journal of European Integration, 45(8), 1143–1159. https://doi.org/10.1080/07036337.2023.2270615.
Rumer, E., R., Sokolsky and P., Stronski (2021). Russia in the Arctic - A Critical Examination. Carnegie Endowment for International Peace. Available at: https://carnegieendowment.org/files/Rumer_et_al_Russia_in_the_Arctic.pdf (Accessed 19/03/2024).
Russel, D., and B., Berger (2020). Weaponizing the Belt and Road Initiative. Asia Society Policy Institute. Available at: https://asiasociety.org/sites/default/files/2020-09/Weaponizing%20the%20Belt%20and%20Road%20Initiative_0.pdf (Accessed 24/09/2024).
Saraswat, D., (2022). Iran’s Ties with China: Synergising Geoconomic Strategies. Arab Center for Research & Policy Studies. Available at: https://www.dohainstitute.org/en/Lists/ACRPS-PDFDocumentLibrary/iran-ties-with-china-synergising-geoconomic-strategies.pdf (Accessed 24/09/2024).
Schwarz, M., M., Marx and H., Federrath (2021). A Structured Analysis of Information Security Incidents in the Maritime Sector. Cornell University Archives, Available at: https://arxiv.org/pdf/2112.06545.pdf (Accessed 24/09/2024).
Sims, J. E. and B. L., Gerber (2009) Vaults, mirrors, and masks: Rediscovering U.S. counterintelligence. Washington, D.C.: Georgetown University Press.
Sly, L., and L., Ledur (2023, November 6). China has acquired a global network of strategically vital ports. The Washington Post. Available at: https://www.washingtonpost.com/world/interactive/2023/china-ports-trade-military-navy/ (Accessed 24/09/2024).
Sodhi, M. M. S., and C. S., Tang (2014). Managing supply chain risk. Springer.
Španja, S., A., Krajnović and J., Bosna (2017). ‘Competitiveness and business strategies of shipping companies’. Poslovna Izvrsnost - Business Excellence, 11(1), 123–137. https://doi.org/10.22598/pi-be/2017.11.1.123.
The Hague Centre for Strategic Studies (2019). Geopolitics and Maritime Security. Available at: https://hcss.nl/wp-content/uploads/2021/01/Geopolitics-and-Maritime-Security-web.pdf (Accessed 24/09/2024).
U.S. Department of Defense (2023). Military and Security Developments Involving the People’s Republic of China. Available at: https://media.defense.gov/2023/Oct/19/2003323409/-1/-1/1/2023-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA.PDF (Accessed 24/09/2024).
U.S. Department of Justice. (2020, October 19). Six Russian GRU officers charged in connection with worldwide deployment of destructive malware and other disruptive actions in Cyberspace. Office of Public Affairs. Available at: https://www.justice.gov/opa/pr/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-and (Accessed 24/09/2024).
U.S. National Transportation Safety Board (2017). Collision between US Navy Destroyer John S McCain and Tanker Alnic MC Singapore Strait, 5 Miles Northeast of Horsburgh Lighthouse August 21, 2017. Available at: https://www.ntsb.gov/investigations/accidentreports/reports/mar1901.pdf (Accessed 24/09/2024).
Van Cleave, M. K. (2007). Counterintelligence and national strategy. https://doi.org/10.21236/ada471485. Available at: https://apps.dtic.mil/sti/pdfs/ADA471485.pdf. (Accessed 24/09/2024).
Van der Putten, F-P. (2019). ‘European seaports and Chinese strategic influence’. Clingendael Institute. Available at: https://www.jstor.org/stable/pdf/resrep21415.4.pdf (Accessed 24/09/2024).
Yazdani, E., and J., Zeng (2022). ‘China’s Bri: A platform for Cultural Communications and exchanges with Iran’. China and the World, 5(1). https://doi.org/10.1142/s2591729322500018. Available at: https://www.worldscientific.com/doi/epdf/10.1142/S2591729322500018. (Accessed 24/09/2024).
SSJ conforms to open access (OA) policy. SSJ - Security Science JournalTM


