Proceedings Of The Marine

WIN 2015

Proceedings magazine is a communication tool for the Coast Guard's Marine Safety & Security Council. Each quarterly magazine focuses on a specific theme of interest to the marine industry.

Issue link: https://uscgproceedings.epubxp.com/i/436751

Contents of this Issue

Navigation

Page 63 of 94

61 Winter 2014 – 2015 Proceedings www.uscg.mil/proceedings trust, develop effective working relationships, and drive timely information sharing. Information sharing methods with industry partners include private industry notifcations (PINs) and FBI liai- son alert system reports. For example, a maritime-specifc PIN, "Maritime Supply Chain Vulnerable to Cargo Theft," recently highlighted a serious cyber vulnerability to the maritime industry. 3 The FBI remains determined to develop and deploy cre- ative solutions to defeat today's complex cyber threat actors. Instead of reacting to cyber threats, we must also build bet- ter relationships, overcome the obstacles that prevent us from sharing information and, most importantly, continue to step forward to collaborate with partners across govern- ment and the private sector. About the author: Special Agent Richard Kolko joined the FBI in 1996 and is currently assigned to the Cyber Division. He has served in Atlanta, New York, and at headquarters, and has conducted investigations on fve continents. Special Agent Kolko served on the Joint Terrorism Task Force, deployed to Iraq, was chief of the National Press Offce, and a National Academy instructor. He served in the Navy as a P-3 pilot and reserve intelligence offcer, retiring as a commander in 2011. He has a bachelor's degree in communication from the University of Miami, and a master's degree in homeland security from American Military University. Endnotes: 1. Available at www.gsnmagazine.com/article/39138/cyber_attack_major_ port_ could_cost_1_billion_day. 2. Available at www.nationaldefensemagazine.org/archive/2012/May/Pages/Pira- tesExploitingCybersecurityWeaknessesinMaritimeIndustry.aspx. 3. M a r it i me Sup ply C h a i n Vu l n e ra ble t o C a r go Th e f t, M a r c h 26, 2014. Av a i l a b l e a t h t t p s ://w w w. o s a c . g o v/P a g e s/R e s o u r c e L i b r a r y. a s p x ? CategoryId=7&ctl00;_ctl14_g _b21907d9_dde3_4c37_8858_3b9dd657f773_ctl00_ l i n k sR adGr idC h a ngePage =12&c; t l0 0 _ SPWe bPa r t Ma n ager1_ g _ b219 07d9_ dde3_4c37_8858_3b9dd657f773_ctl00_linksRadGridChangePage=5_20. Bibliography: Anderson, T. Cyber-attack at a Major Port Could Cost $1 Billion per Day. Government Security News. N.p., 24 November 2013. Web, May 9, 2014. Available at www.gsn- magazine.com/article/39138/cyber_attack_major_port_could_cost_1_billion_day. Bryant, D. L. Marine Cybersecurity: Is Your Ship Safe? Are You. Marine Link. Mari- time Reporter & Engineering News, Jan. 2, 2014. Web. May 9, 2014. Available at www. marinelink.com/news/cybersecurity-marine-your362503.aspx. Demarest, J. Personal interview Apr. 24, 2014. European Union Agency for Network and Information Security. Cyber Security Aspects in the Maritime Sector — ENISA. N.p., Dec. 19, 2011. Web. May 9 2014. Available at www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure- and-services/dependencies-of-maritime-transport-to-icts. Farivar, C. Professor Fools $80M Superyacht's GPS Receiver on the High Seas. Ars Tech- nica. Conde Nast, 29 July 2013. Web. May 9, 2014. Available at www.arstechnica. com/security/2013/07/professor-spoofs-80m-superyachts-gps-receiver-on-the- high-seas. Frodl, M. G. "Pirates Exploiting Cybersecurity Weaknesses in Maritime Industry." National Defense. National Defense Industrial Association, May 2012. Web. May 9, 2014. Available at www.nationaldefensemagazine.org/archive/2012/May/Pages/ PiratesExploitingCybersecurityWeaknessesinMaritimeIndustry.aspx. Honoroff, M. "Cops Shut Down Hacker Drug Ring." Msnbc.com. June 19, 2013. Web. May 12, 2014. Available at www.nbcnews.com/id/52242128/ns/technology_and_ science-tech_and_gadgets/t/cops-shut-down-hacker-drug-ring/. Osborn, Gina. Personal interview. April 10, 2014. Presidential Policy Directive – Critical Infrastructure Security and Resilience. The White House. The White House, Feb. 12, 2013. Web. May 9, 2014. Available at www. whitehouse.gov/the-press-offce/2013/02/12/presidential-policy-directive-critical- infrastructure-security-and-resil. Statement before the Senate Committee on Homeland Security and Governmental Affairs (2013) (testimony of James B. Comey, Director Federal Bureau of Investiga- tion). Web. Available at www.fbi.gov/news/testimony/homeland-threats-and-the- fbis-response. Vargas, J. Drug Cartels Hacking Shipping Companies — Seaports Are Targets. InterPort- Police. June 18, 2013. Intelligence Briefng compiled by the InterPort Police Law Enforcement and Public Safety Research Services Center. An FBI SWAT operator boards a cargo ship during an annual maritime training exercise, designed to hone FBI SWAT team members' abilities in the event of a terrorist attack, hostage situation, or criminal or national security threat. Photo courtesy of the Federal Bureau of Investigation.

Articles in this issue

Links on this page

Archives of this issue

view archives of Proceedings Of The Marine - WIN 2015