Page 28: of Maritime Reporter Magazine (May 2015)

The Marine Propulsion Edition

Read this page in Pdf, Flash or Html5 edition of May 2015 Maritime Reporter Magazine

SATCOM & CYBER SECURITY

Figure 3: Maritime navigation equipment that use GPS as a data input.

Figure 4: Small jammers that can be purchased via the Internet. (Grant, Williams, Ward, & Basker, 2008) (Source U.S. Government) areas, or maneuvering in higher traf? c GNSS Jamming Equipment densities. With some exceptions, use of GNSS

These vulnerabilities are not unique jammers is generally illegal in the U.S., to the maritime industry. A number of Canada and Europe. Despite this, jam- other industries are also at risk. For in- mers of various sizes and power ratings stance, the aviation and ? nancial indus- (see Figure 5) are available via the in- tries are heavily dependent on properly ternet. These small handheld jammers functioning PNT systems and would be are extremely dif? cult for law enforce- affected in varying degrees by a cyber- ment of? cials to locate and suppress attack on GNSS. because they can be used intermittently,

Largely unique to the maritime in- disguised or hidden easily, are highly dustry however, is that much of marine mobile, and if necessary disposed of environment information transfer is via quickly by perpetrators.

radio frequency (RF) and not a dedicat- Advanced GPS receivers are more ed hard-line network or directional mi- resistant to jamming than conven- crowave dish. A good example of this tional designs. For example, receiv- type of transfer is positioning signals ers equipped with nulling antennas are by satellite systems. Data being sent more resistant to jamming than receiv- to and from shipboard computers along ers without them (Jones, 2011).

Fig. 5. Coverage area of the GPS jamming unit at 25m above ground level with other shipboard technology is cy- Figure 5 shows the area affected by a on maximum power of 1.58W ERP. ber; therefore interference with the data GPS jammer during tests conducted at (Grant, Williams, Ward, & Basker, 2008 - Image courtesy of DSTL).

? ow constitutes a cyber threat. Ergo, a Bridlington, U.K. along the coast of the

Maritime Cyber Security (MCS) issue. North Sea in 2008. During the test a

Table 1

Intentional High-Power Jamming of Korea

Dates August 23-26, 2010 March 4-14, 2011 August 28– May 13, 2012

Jammer Kaesong Kaesong and Kaesong

Locations Mt. Kumgang

Affected Gimpo, Paju, Gangwon Gimpo, Paju, Gangwon Gimpo, Paju, Gangwon

Areas

GPS 181 cell towers, 15 145 cell towers, 106 1,016 aircraft,

Disruptions aircraft, 1 military vessel aircraft, 10 vessels 254 vessels

Table 1: Source: (Seo & Kim, 2013) 28 Maritime Reporter & Engineering News • MAY 2015

MR #5 (26-33).indd 28 MR #5 (26-33).indd 28 4/30/2015 10:31:38 AM4/30/2015 10:31:38 AM

Maritime Reporter

First published in 1881 Maritime Reporter is the world's largest audited circulation publication serving the global maritime industry.