Page 12: of Maritime Reporter Magazine (November 2019)

Workboat Edition

Read this page in Pdf, Flash or Html5 edition of November 2019 Maritime Reporter Magazine

I

INSIGHTS: GOVERNMENT UPDATE

Dennis L. Bryant

Dennis Bryant is with Bryant’s Maritime Consulting, and a regular contributor to Maritime Reporter & Engineering News as well as online at MaritimeLogisticsProfessional.com. dennis.l.bryant@gmail.com

The Internet of Maritime Things he Internet of Maritime Things fall when things go wrong. ons systems. There were no communi- placed in a unique portion of the casino’s (IoMT) is coming! Start plan- Computerized machines will moni- cations. It took several hours to restore computer network, separate from all ? - ning now. tor their own performance and schedule rudimentary radio contact so that the nancial systems. Hackers were able to

T The Internet of Things (IoT) preventive maintenance. Sophisticated casualty could be reported to the chain gain access to the ? sh tank controls and is already with us. You can get a door- technology is being developed that will of command. Other warships were di- then breach the entire network, copying bell camera that allows you to see on shut down if the purchaser attempts their verted to render assistance. The cruiser a large amount of sensitive data. The your smartphone who is at or approach- own repairs or alterations. Manufactur- was then towed back to its homeport in more computerized equipment that are ing your front door. You can also get a ers will have to work out how to main- Norfolk. The incident was classi? ed for integrated into a system the greater the refrigerator that keeps track of items in- tain computerized equipment that has an some time. number of potential targets for hackers.

side and will advise you when you are extended lifespan. Currently, most com- What measures can a commercial ves- Manufacturers of computerized equip- running low (maybe on beer). It can puterized items, such as smartphones, sel take if its computerized controls fail? ment are aware of the vulnerability and also automatically place orders with are only supported for ? ve years. Ships, In February 2019, a container ship ap- have the means to reduce the risks. Few, your local grocery store for replenish- though, have lifespans of three or more proaching New York reported that its though, invest much time and effort into ment. Your automobile will attempt to decades. onboard computer network had been the process. Risk reduction for each keep you in your lane and avoid colli- What happens with future computer- ‘totally debilitated’ by malware. A thor- piece of equipment can be time-consum- sions while keeping track of where you ized ships? Who will keep the software ough analysis revealed that the malware ing and expensive, requiring the writing are, getting you to your destination, and and hardware operational and up-to-date signi? cantly degraded the functionality of complex lines of code and utilization entertaining you. There is also a black when the ships are 10 or 20 years old? of the ship’s computer system. Fortu- of more capable and costly chips. There box that keeps track of your speed. This Will the then owner/operator/master in- nately, in this instance, the essential is little incentive to make those invest- black box also records your location, stall updates and changes as released? vessel control systems had not been con- ments. driving habits, and automotive health Will the ship builder (and its contractors) nected to the computer system. If they Purchasers generally buy such equip- (among other things) and automatically be able to monitor the vessel worldwide had been, this commercial vessel may ment based on factors other than cyber- sends that information to the car’s manu- like car manufacturers can now? Can have been found itself in a situation sim- security. Even if cybersecurity protocols facturer. Smart speakers in your home the ship builder shut down the ship (or ilar to that suffered by USS Yorktown. are provided by a manufacturer, pur- or of? ce will play the radio station or certain equipment) if certain repairs are Adding more interconnected electronics chasers often fail to change the default music you request. They are always on attempted without its authorization? in future smart-ships, though, increases passwords, effectively leaving the door and can record other audio events, such What happens when things go wrong? the number of potential points of failure. unlocked.

as conversations. These recordings (or In the 1970s, the guided missile cruiser If hackers can access a smart ship’s at least portions thereof) are automati- USS Yorktown (CG 48) was one of the Cybersecurity computer system (in either a targeted cally transmitted to the speaker’s manu- most sophisticated warships in the US There is another issue to consider – cy- or random attack), they can effectively facturer. And this is only the beginning. Navy, being known as a ‘smart ship’. bersecurity. take control of the operation of the ship.

On 21 September 1997, a storekeeper on When all computerized equipment is Hackers have demonstrated the ability

Technological promise board was ordering supplies while the tied together (such as in a ‘smart home’ to take control of smart cars, operating

If ports and vessels are all intercon- ship was underway in the North Atlantic or a ‘smart ship’), access to one item can the stereo, the windshield wipers, the en- nected, transits could be arranged for op- on an unescorted operation. A ‘division lead to access to all the connected de- gine, the brakes, and the steering wheel. timum performance and safety. Cargoes by zero error’ occurred. vices. While some or even most of the Imagine what could be done with a com- could be loaded and unloaded with max- The ship’s computer system overload- connected devices may have high-level promised ship.

imum ef? ciency. At sea, passages could ed and shut down. The main computer cybersecurity, if any of the devices have be optimized, accounting for weather, was connected to everything electronic no or minimal security, it may allow a Summary sea conditions, marine hazards (such as on the ship. All of that equipment ceased hacker access to the entire system. In The Internet of Maritime Things is rocks and shoals), and other traf? c. The to operate. There was no propulsion. 2017, a casino purchased an internet- coming. It holds great promise, but also deck of? cer (whether physically or vir- There was no ventilation. There were connected ? sh tank, designed to allow great risk. Industry’s role must be to op- tually present) would largely be there to no regular lights. There was no radar. remote control of the water temperature timize the promise while minimizing the meet legal requirements and to take the There was no ? re control for the weap- and salinity. The ? sh tank controls were risk. 12 Maritime Reporter & Engineering News • NOVEMBER 2019

MR #11 (10-17).indd 12 10/29/2019 10:00:29 AM

Maritime Reporter

First published in 1881 Maritime Reporter is the world's largest audited circulation publication serving the global maritime industry.