Skip to main content
Erschienen in: Journal of Transportation Security 3-4/2018

08.05.2018

Trojan horse risks in the maritime transportation systems sector

verfasst von: Lauren R. Shapiro, Marie-Helen Maras, Lucia Velotti, Susan Pickman, Hung-Lung Wei, Robert Till

Erschienen in: Journal of Transportation Security | Ausgabe 3-4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This article sought to raise the awareness of vulnerabilities in the maritime transportation systems sector and to ask those involved in security and emergency management to answer for themselves, “What are your acceptable risks?” In particular, the review alerts security and emergency managers to the Trojan horse risks that expose maritime organizations, including shippers, mariners, and port employees, to dangers from physical, personnel, and cyber security problems and from natural and man-made disasters, which may appear as Trojan horses. The article first discusses maritime threat actors, motives, tactics, and targets. Next, vulnerabilities of the maritime transportation systems sector that could be exploited by those seeking to conduct a Trojan horse attack are examined. Finally, a variety of security measures used to protect the maritime transportation systems sector from Trojan horse attacks are described. Advice to those in security and emergency management for maritime organizations on how to recognize, plan, and mitigate Trojan horse issues is provided.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Brantingham PL, Brantingham PJ (2004) Environment, routine, and situation: towards a pattern theory of crime. In: Clarke RV, Felson M (eds) Advances in criminological theory, vol 5. Transaction Publishers, New Brunswick, pp 259–294 Brantingham PL, Brantingham PJ (2004) Environment, routine, and situation: towards a pattern theory of crime. In: Clarke RV, Felson M (eds) Advances in criminological theory, vol 5. Transaction Publishers, New Brunswick, pp 259–294
Zurück zum Zitat Cohen SS (2006) Boom boxes: containers and terrorism. In: Haveman JD, Shatz HJ (eds) Protecting the nation’s seaports: balancing security and cost. Public Policy Institute of California, San Francisco, pp 91–128 Cohen SS (2006) Boom boxes: containers and terrorism. In: Haveman JD, Shatz HJ (eds) Protecting the nation’s seaports: balancing security and cost. Public Policy Institute of California, San Francisco, pp 91–128
Zurück zum Zitat Cote AE (2008) Fire protection handbook. National Fire Protection Association (NFPA) Cote AE (2008) Fire protection handbook. National Fire Protection Association (NFPA)
Zurück zum Zitat Fischhoff B, Slovic P, Lichtenstein S, Read S, Combs B (1978) How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sci 9(2):127–152CrossRef Fischhoff B, Slovic P, Lichtenstein S, Read S, Combs B (1978) How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sci 9(2):127–152CrossRef
Zurück zum Zitat Fisher BS, Peek-Asa C (2011) Domestic violence and the workplace: do we know too much of nothing? In: Bowie V, Fisher BS, Cooper CL (eds) Workplace violence: issues, trends, strategies. Routledge, London, pp 97–120 Fisher BS, Peek-Asa C (2011) Domestic violence and the workplace: do we know too much of nothing? In: Bowie V, Fisher BS, Cooper CL (eds) Workplace violence: issues, trends, strategies. Routledge, London, pp 97–120
Zurück zum Zitat Haveman JD, Shatz HJ (2006) Protecting the nation’s seaports: balancing security and cost. Public Policy Institute of California, San Francisco Haveman JD, Shatz HJ (2006) Protecting the nation’s seaports: balancing security and cost. Public Policy Institute of California, San Francisco
Zurück zum Zitat Haveman JD, Shatz HJ, Vilchis EA (2005) U.S. port security policy after 9/11: overview and evaluation. Journal of Homeland Security and Emergency Management 2(4):1–24CrossRef Haveman JD, Shatz HJ, Vilchis EA (2005) U.S. port security policy after 9/11: overview and evaluation. Journal of Homeland Security and Emergency Management 2(4):1–24CrossRef
Zurück zum Zitat Haveman JD, Shatz HJ, Vilchis EA (2006) The government response: U.S. port security programs. In: Haveman JD, Shatz HJ (eds) Protecting the nation’s seaports: balancing security and cost. Public Policy Institute of California, San Francisco, pp 185–232 Haveman JD, Shatz HJ, Vilchis EA (2006) The government response: U.S. port security programs. In: Haveman JD, Shatz HJ (eds) Protecting the nation’s seaports: balancing security and cost. Public Policy Institute of California, San Francisco, pp 185–232
Zurück zum Zitat Hoffman B (1998) Inside terrorism. Columbia University Press, NY Hoffman B (1998) Inside terrorism. Columbia University Press, NY
Zurück zum Zitat Islam T, Ryan J (2015) Hazard mitigation in emergency management. Butterworth-Heinemann, Waltham Islam T, Ryan J (2015) Hazard mitigation in emergency management. Butterworth-Heinemann, Waltham
Zurück zum Zitat Kendra JM, Wachtendorf T (2016) American Dunkirk: the waterborne evacuation of Manhattan on 9/11. Temple University Press, Philadelphia Kendra JM, Wachtendorf T (2016) American Dunkirk: the waterborne evacuation of Manhattan on 9/11. Temple University Press, Philadelphia
Zurück zum Zitat Kraska J (2009) Grasping “the influence of law on sea power”. Naval War College Review 62(3):113–135 Kraska J (2009) Grasping “the influence of law on sea power”. Naval War College Review 62(3):113–135
Zurück zum Zitat Kraska J (2013) International and comparative regulation of private maritime security companies employed in counter-piracy. In Guilfoyle D, E Elgar (eds) Modern high seas piracy. SSRN, pp 20–249 Kraska J (2013) International and comparative regulation of private maritime security companies employed in counter-piracy. In Guilfoyle D, E Elgar (eds) Modern high seas piracy. SSRN, pp 20–249
Zurück zum Zitat Leamer EE, Thornberg C (2006) Ports, trade, and terrorism: balancing the catastrophic and the chronic. In: Haveman JD, Shatz HJ (eds) Protecting the nation’s seaports: balancing security and cost. Public Policy Institute of California, San Fransciso, pp 31–69 Leamer EE, Thornberg C (2006) Ports, trade, and terrorism: balancing the catastrophic and the chronic. In: Haveman JD, Shatz HJ (eds) Protecting the nation’s seaports: balancing security and cost. Public Policy Institute of California, San Fransciso, pp 31–69
Zurück zum Zitat Leonard TJ, Gallo P, Véronneau S (2015) Security challenges in United States sea ports: an overview. J Transp Secur 8:41–49CrossRef Leonard TJ, Gallo P, Véronneau S (2015) Security challenges in United States sea ports: an overview. J Transp Secur 8:41–49CrossRef
Zurück zum Zitat Lillie N (2004) Global collective bargaining on flag of convenience shipping. Br J Ind Relat 42(1):47–67CrossRef Lillie N (2004) Global collective bargaining on flag of convenience shipping. Br J Ind Relat 42(1):47–67CrossRef
Zurück zum Zitat Maras M-H (2014) Computer forensics: cybercriminals, laws, and evidence, 2nd edn. Jones and Bartlett, Burlington Maras M-H (2014) Computer forensics: cybercriminals, laws, and evidence, 2nd edn. Jones and Bartlett, Burlington
Zurück zum Zitat Maras M-H (2016) Cybercriminology. Oxford University Press, NY Maras M-H (2016) Cybercriminology. Oxford University Press, NY
Zurück zum Zitat Martonosi SE, Ortiz DS, Willis JJ (2005) Evaluating the viability of 100 per cent container inspection at America’s ports. In: Richardson HW, Gordon P, Moore JE II (eds) The economic impacts of terrorist attacks. Edward Elgar Publishing, Cheltenham, pp 218–241 Martonosi SE, Ortiz DS, Willis JJ (2005) Evaluating the viability of 100 per cent container inspection at America’s ports. In: Richardson HW, Gordon P, Moore JE II (eds) The economic impacts of terrorist attacks. Edward Elgar Publishing, Cheltenham, pp 218–241
Zurück zum Zitat McNicholas M (2012) Terrorism and commercial transportation: use of ships, cargoes, containers to transport terrorists and materials. In: Uzer FB (ed) Maritime security and defense against terrorism. IOS Press, Amsterdam, pp 51–66 McNicholas M (2012) Terrorism and commercial transportation: use of ships, cargoes, containers to transport terrorists and materials. In: Uzer FB (ed) Maritime security and defense against terrorism. IOS Press, Amsterdam, pp 51–66
Zurück zum Zitat Meade C, Molander RC (2006) Considering the effects of a catastrophic terrorist attack. RAND Center for Terrorism Risk Management Policy, Santa Monica Meade C, Molander RC (2006) Considering the effects of a catastrophic terrorist attack. RAND Center for Terrorism Risk Management Policy, Santa Monica
Zurück zum Zitat Medalia J (2005) Terrorist nuclear attacks on seaports: threat and response. CRS Report for Congress. Order Code. RS21293 Medalia J (2005) Terrorist nuclear attacks on seaports: threat and response. CRS Report for Congress. Order Code. RS21293
Zurück zum Zitat Mintzberg H (1987) The strategy concept II: another look at why organizations need strategies. Calif Manag Rev 30(1):25–32CrossRef Mintzberg H (1987) The strategy concept II: another look at why organizations need strategies. Calif Manag Rev 30(1):25–32CrossRef
Zurück zum Zitat Moghaddam FM (2005) The staircase to terrorism: a psychological exploration. Am Psychol 60(2):161–169CrossRef Moghaddam FM (2005) The staircase to terrorism: a psychological exploration. Am Psychol 60(2):161–169CrossRef
Zurück zum Zitat Moghaddam FM, Marsella AJ (2004) Understanding terrorism: psychological roots, consequences, and interventions. American Psychological Association, Washington, DCCrossRef Moghaddam FM, Marsella AJ (2004) Understanding terrorism: psychological roots, consequences, and interventions. American Psychological Association, Washington, DCCrossRef
Zurück zum Zitat Mousavi M, Ghazi I, Omaraee B (2017) Risk assessment in the maritime industry. Engineering, Technology & Applied Science Research 7(1):1377–1381 Mousavi M, Ghazi I, Omaraee B (2017) Risk assessment in the maritime industry. Engineering, Technology & Applied Science Research 7(1):1377–1381
Zurück zum Zitat Nelson ES (2012) Maritime terrorism and piracy: existing and potential threats. Journal of Global Security Studies 3(1):15–28 Nelson ES (2012) Maritime terrorism and piracy: existing and potential threats. Journal of Global Security Studies 3(1):15–28
Zurück zum Zitat Nemeth C. P (2017a) Physical security. In: Private security: an introduction to principles and practice. CRS Press, Boca Raton, pp. 231–271 Nemeth C. P (2017a) Physical security. In: Private security: an introduction to principles and practice. CRS Press, Boca Raton, pp. 231–271
Zurück zum Zitat Nemeth CP (2017b) Human resources and personnel. In: Private security: an introduction to principles and practice. CRS Press, Boca Raton, pp. 273–332 Nemeth CP (2017b) Human resources and personnel. In: Private security: an introduction to principles and practice. CRS Press, Boca Raton, pp. 273–332
Zurück zum Zitat Rose A, Wei D (2013) Estimating the economic consequences of a port shutdown: the special role of resilience. Econ Syst Res 25(2):212–232CrossRef Rose A, Wei D (2013) Estimating the economic consequences of a port shutdown: the special role of resilience. Econ Syst Res 25(2):212–232CrossRef
Zurück zum Zitat Rudd D (2015) Maritime non-state actors: a challenge for the Royal Canadian Navy? J Mil Strateg Stud 16(3):45–62 ISSN: 1488-559X Rudd D (2015) Maritime non-state actors: a challenge for the Royal Canadian Navy? J Mil Strateg Stud 16(3):45–62 ISSN: 1488-559X
Zurück zum Zitat Sakhuja V (2010) Security threats and challenges to maritime supply chains. Disarmament Forum 59:1–12 Sakhuja V (2010) Security threats and challenges to maritime supply chains. Disarmament Forum 59:1–12
Zurück zum Zitat Shapiro LR, Maras M-H (2018) Women’s radicalization to religious terrorism: an examination of ISIS cases in U.S. Studies in Conflict & Terrorism, Special Issue (in press) Shapiro LR, Maras M-H (2018) Women’s radicalization to religious terrorism: an examination of ISIS cases in U.S. Studies in Conflict & Terrorism, Special Issue (in press)
Zurück zum Zitat Stahl WM (2011) The uncharted waters of cyberspace: applying the principles of international maritime law to the problem of cybersecurity. Georgia Journal of International and Comprehensive Law 40:247–273 Stahl WM (2011) The uncharted waters of cyberspace: applying the principles of international maritime law to the problem of cybersecurity. Georgia Journal of International and Comprehensive Law 40:247–273
Zurück zum Zitat Stowsky J (2006) Harnessing a Trojan horse: aligning security investments with commercial trajectories in cargo container shipping. In: JD Haveman, HJ Shatz, HJ (eds.) Protecting the nation’s seaports: balancing security and cost. Public Policy Institute of California, San Francisco: pp 129–154 Stowsky J (2006) Harnessing a Trojan horse: aligning security investments with commercial trajectories in cargo container shipping. In: JD Haveman, HJ Shatz, HJ (eds.) Protecting the nation’s seaports: balancing security and cost. Public Policy Institute of California, San Francisco: pp 129–154
Zurück zum Zitat Szyliowicz J (2014) The dimensions of maritime security. In: Szyliowicz JS, Celibi O (eds) Global maritime security new horizons. Turkish Naval Forces Printing Office, Istanbul ISBN: 978-975-409-675-0 Szyliowicz J (2014) The dimensions of maritime security. In: Szyliowicz JS, Celibi O (eds) Global maritime security new horizons. Turkish Naval Forces Printing Office, Istanbul ISBN: 978-975-409-675-0
Zurück zum Zitat U.S.C. Title 46: Shipping (2006) Office of the Law Revision Counsel U.S.C. Title 46: Shipping (2006) Office of the Law Revision Counsel
Zurück zum Zitat Urban T (2018) Maritime security and the convention on the law of the sea. In: Burgess J, Foulkes L, Jones P, Merighi M, Murray S, Whitacre J (eds) Law of the sea: a policy primer. The Fletcher School of Law and Diplomacy, Tufts University, Medford https://sites.tufts.edu/lawofthesea/chapter-six/. Accessed 7 April 2018 Urban T (2018) Maritime security and the convention on the law of the sea. In: Burgess J, Foulkes L, Jones P, Merighi M, Murray S, Whitacre J (eds) Law of the sea: a policy primer. The Fletcher School of Law and Diplomacy, Tufts University, Medford https://​sites.​tufts.​edu/​lawofthesea/​chapter-six/​. Accessed 7 April 2018
Zurück zum Zitat Van de Voort M, Willis H, Ortiz D, Martonosi S (2007) Applying risk assessment to secure the containerized supply chain. In: Linkov I, Wenning RJ, Kiker GA (eds) Managing critical infrastructure risks: decision tools and applications for port security. Springer, Dordrecht, pp 79–96CrossRef Van de Voort M, Willis H, Ortiz D, Martonosi S (2007) Applying risk assessment to secure the containerized supply chain. In: Linkov I, Wenning RJ, Kiker GA (eds) Managing critical infrastructure risks: decision tools and applications for port security. Springer, Dordrecht, pp 79–96CrossRef
Zurück zum Zitat Velotti L, Justice JB (2016) Operationalizing giddens’s recursive model of accountability. Public Performance & Management Review 40(2):310–335CrossRef Velotti L, Justice JB (2016) Operationalizing giddens’s recursive model of accountability. Public Performance & Management Review 40(2):310–335CrossRef
Zurück zum Zitat Wei H-L, Lindell MK (2017) Washington households’ expected responses to lahar threat from Mt. Rainier. International Journal of Disaster Risk Reduction 22:77–94CrossRef Wei H-L, Lindell MK (2017) Washington households’ expected responses to lahar threat from Mt. Rainier. International Journal of Disaster Risk Reduction 22:77–94CrossRef
Zurück zum Zitat Werse S, Phillips R, Luhta K (2016) Panel discussion: piracy today. SUNY Maritime Security Conference, Bronx, New York Werse S, Phillips R, Luhta K (2016) Panel discussion: piracy today. SUNY Maritime Security Conference, Bronx, New York
Zurück zum Zitat Willis HH (2014) Securing America’s ports, CT-410. RAND Corp, Santa Monica Willis HH (2014) Securing America’s ports, CT-410. RAND Corp, Santa Monica
Zurück zum Zitat Willis HH, Ortiz DS (2004) Evaluating the security of the global containerized supply chain, technical report. RAND Corp, Santa Monica Willis HH, Ortiz DS (2004) Evaluating the security of the global containerized supply chain, technical report. RAND Corp, Santa Monica
Zurück zum Zitat Willis HH, Ortiz DS (2005) Assessing container security: a framework for measuring performance of the global supply chain, research brief. RAND Corp, Santa Monica Willis HH, Ortiz DS (2005) Assessing container security: a framework for measuring performance of the global supply chain, research brief. RAND Corp, Santa Monica
Zurück zum Zitat Yeo G-T, Pak J-Y, Yang Z (2013) Analysis of dynamic effects on seaports adopting port security policy. Transp Res A 49:285–301 Yeo G-T, Pak J-Y, Yang Z (2013) Analysis of dynamic effects on seaports adopting port security policy. Transp Res A 49:285–301
Zurück zum Zitat Zalosh RG, Beller D, Till R (1996) Reliability analysis of carbon dioxide fire suppression system for shipboard machinery spaces. Center for Fire Safety Studies, WPI. Prepared for U.S. Coast Guard Zalosh RG, Beller D, Till R (1996) Reliability analysis of carbon dioxide fire suppression system for shipboard machinery spaces. Center for Fire Safety Studies, WPI. Prepared for U.S. Coast Guard
Metadaten
Titel
Trojan horse risks in the maritime transportation systems sector
verfasst von
Lauren R. Shapiro
Marie-Helen Maras
Lucia Velotti
Susan Pickman
Hung-Lung Wei
Robert Till
Publikationsdatum
08.05.2018
Verlag
Springer US
Erschienen in
Journal of Transportation Security / Ausgabe 3-4/2018
Print ISSN: 1938-7741
Elektronische ISSN: 1938-775X
DOI
https://doi.org/10.1007/s12198-018-0191-3

Weitere Artikel der Ausgabe 3-4/2018

Journal of Transportation Security 3-4/2018 Zur Ausgabe