Nmiotc Maritime Interdiction Operations Journal
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Issue 14 st 1 Issue 2017 ISSN: 2242-441X nmiotc Maritime Interdiction Operations NATO MARITIME INTERDICTION OPERATIONAL Journal TRAINING CENTRE 1
NATO Maritime Interdiction Operational Training Centre 2nd Conference on Cyber Security “Maritime Cyber Security and Cyber Defense: NATO-EU cooperation implementing the outcomeS of the Warsaw Summit. Recent international evolutions in the environment.” 21st to 22nd September 2017 2
CONTENTS nmiotc COMMANDANT'S EDITORIAL MARITIME INTERDICTION Editorial by Georgios Tsogkas OPERATIONS 4 Commodore GRC (N) Commadant NMIOTC JOURNAL MARITIME SECURITY Director Commodore G. Tsogkas GRC (N) Operation Sea Guardian - The NATO Maritime Security Operation in Commandant NMIOTC 6 the Mediiterranean Sea by Captain Corrado Campana ITA (N) Toward a Comprehensive Approach to Addressing. Transnational Executive Director 8 Threats in the Mediterranean by Mr Christopher Kremidas Captain C. Campana ITA (N) Director of Training Support CYBER SECURITY Editor Maritime Cyberpower Projection Lt Commander G. Tzevelekis GRC (N) 15 by Mr Adrian Venables Head of Transformation Section Layout Production ENERGY INFRASTRUCTURES SECURITY CPO E. Miskou GRC (N) Journal Assistant Editor Holistic Protection of Critical Infrastructures. Resilience and protec- tion of dependncies between Greek Critical Infrastructures. 29 by George Stergiopoulos, Dimitris Gritzalis, Panayotis Kotzanikolaou, Manos Margkos and Georgia Lykou TECHNOLOGICAL ISSUES The views expressed in this Securing Maritime Logistics and Supply Chain : The Medusa and issue reflect the opinions of 42 MITIGATE approaches. by Dr. Spyridon Papastergiou and Associate Professor Nineta Polemi the authors, and do not nec- essarily represent NMIOTC's or NATO’s official positions. HIGH VISIBILITY EVENTS All content is subject to Greek Copyright Legislation. Pictures used from the web 49 VIP visitors to NMIOTC are not subject to copyright restrictions. NMIOTC TRAINING You may send your comments to: tzevelekisg@nmiotc.nato.int 52 Photos from NMIOTC Training Activities 3
NMIOTC Commandant’s Editorial The world continues to face a serious ance’s regional understanding and sit- It is anticipated that the Warsaw / Brus- threat from terrorism – a global threat uational awareness, its capabilities for sels Summit outcomes would call for that knows no border, nationality or re- expeditionary operations and its ability enhanced training opportunities along ligion. NATO Heads of State and Gov- to project stability in its neighborhood. with our partners providing security. ernment stated at Warsaw, “terrorism This is exactly why NMIOTC is more has risen to an unprecedented level of Maritime environment is character- relevant than ever. In its capacity as intensity, reaches into all Allied terri- ized by complexity and diversity. The a NETF, awarded by ACT with a Qual- tory and now represents an immediate oceans are an increasingly accessible ity Assurance Accreditation, focused and direct threat to our nations and the environment for transnational criminal on the maritime environment, offers international community”. and terrorist activities. Disruption of education and training opportunities to international maritime transportation Allies and Partners. NATO is as essential as ever. At this and distribution networks would un- pivotal time, the Alliance is strong dermine equally the industrial produc- With Operation Sea Guardian and EU and continues to adapt. This was the tion and the flow of energy sources, Operation Sophia under which the de- core of NATO’s Summit in Brussels in thus it will have a significant impact in mand for training of the Lybian authori- late May. NATO’s Framework for the our security and at the welfare of our ties is increasing, the emphasis on South focuses on improving the Alli- populations. partner capacity building and the es- 4
tablishment of the Hub for the South at closer co-operation with international As a conclusion, I would like to an- JFC Naples, the request for NMIOTC stakeholders to address the secu- nounce with great pleasure, the 2nd expertise and services to serve as the rity challenges. Adrian Venables, PhD NMIOTC Cyber Conference which will Trainer for the Hub in the South at both Student at Lancaster University and be held at our premises (Souda Bay JFC Naples and MARCOM disposal, Commander UK RN (reserve), on his – Crete) from 21st to 22nd September can only grow. article “Maritime Cyberpower Projec- 2017, with theme “Maritime Cyber Se- tion” investigates the unexplored area curity and Cyber Defense: NATO-EU Having said that and referring to this of how cyberspace can be used to cooperation implementing the out- journal, I wish to draw your attention influence a target population. Senior come of the NATO Warsaw Summit. to the fact that it presents articles fo- Researcher George Stergiopoulos Recent international evolutions in the cused on current and future challeng- and Professor Dimitris Gritzalis, deals environment”. es to maritime security. In particular; with the “Holistic Protection of Critical Infrastructure” a subject of high impor- Given the opportunity, please mark In the lead article, Mr. Christopher tance for the welfare of each country. your calendars for the 9th NMIOTC Kremidas US European Command Finally, Dr Spyridon Papastergiou and Annual Conference from 5th to 7th Liaison to NATO and EU, on his pa- Associate Professor Nineta Polemi, at June 2018 with the main topic to de per “Toward a Comprehensive Ap- their paper explore the risks and vul- determined and announced in due proach to Addressing – Transnational nerabilities of the Maritime Logistics time. Threats in the Mediterranean” draws and Supply Chain presenting two Eu- upon building a comprehensive ap- ropean research projects. proach culture within NATO, enabling Georgios Tsogkas Commodore GRC (N) Commadant NMIOTC 5
MARITIME SECURITY Operation Sea Guardian The NATO Maritime Security Operation in the Mediterranean Sea by Corrado Campana Captain ITA (N) T he NATO Operation Sea Guardian Operation Sea Guardian (OSG) con- trolling and boarding merchant vessels started in November 2016 as a result of stitutes the first actual activation of in the Mediterranean for more than a the July 2016 Warsaw Summit, during one of the tasks assigned to NATO’s decade, has provided the Alliance with which the Alliance decided to launch maritime forces by the Alliance Mari- a strong expertise in the deterrence a new maritime security mission in time Strategy (AMS) of March 2011, and prevention of maritime terrorist the Mediterranean Sea. As reported the Maritime Security Operations, and and criminal activities, and this profi- in the Warsaw Summit Communiqué: directly derives from its predecessor ciency is exploited by OSG as it con- “We have transitioned Operation Ac- Operation Active Endeavour (OAE), tinues with the efforts of OAE, but with tive Endeavour, our Article 5 maritime which was launched after the events a significantly broader scope. operation in the Mediterranean, which of September 11 with the purpose to As mentioned in the “Operation Sea has contributed to fight against terror- deter and disrupt terrorist activity in the Guardian Factsheet” of the Allied ism, to a non-Article 5 Maritime Secu- Mediterranean Sea. Maritime Command: “Operation Sea rity Operation, Operation Sea Guard- The broad and long-lasting experience Guardian is a standing Maritime Se- ian, able to perform the full range of gained by OAE, with NATO Standing curity Operation (MSO) aimed at work- Maritime Security Operation tasks, as Naval Forces ensuring presence, col- ing with Mediterranean stakeholders needed”. lecting information, monitoring, con- to deter and counter terrorism amd 6
MARITIME SECURITY mitigate the risk of other threats to se- to the implementation of the arms em- allocated to OSG are separated by the curity”. In this context, the three main bargo in the high seas off the coast of assets (ships, submarines and mari- missions of OSG are to provide mari- Libya in accordance with the UNSCR time patrol aircrafts) that compose, on time situational awareness, to counter 2292 (2016). a rotational basis, the NATO Stand- terrorism and human trafficking, and The NATO involvement in tackling the ing Naval Forces. This characteristic to contribute to the regional capacity worst migration crisis since the Sec- allows OSG to keep the focus on its building, while additional tasks – such ond World War and, more in general, main tasks without being committed to as countering the proliferations of in securing the Mediterranean Sea, the responsibilities of the NATO Re- Weapons of Mass Destruction (WMD), can be considered as a remarkable sponse Force (NRF). ensuring the freedom of navigation accomplishment for the Alliance, as The launch of OSG represents the first and protection of maritime critical in- it demonstrates its willingness and real implementation of the NATO-EU frastructure – can be performed as readiness to take action to cope with Joint Declaration and, while accom- necessary. a challenge affecting the Allies, and plishing the task of crisis management Further to a Joint Declaration signed also because it proves the capability to in the Mediterranean Sea, it promotes by the NATO Secretary General, the make the Allied Maritime Strategy op- the dialogue in the region and im- President of European Council and the erational. Indeed, with the Operation proves the cooperative maritime se- President of European Commission in Sea Guardian in the Mediterranean curity ensuring presence and surveil- July 2016, OSG also cooperates with Sea NATO is not only implementing lance. the European Union Naval Force (EU- the AMS, but also – for the first time The efforts to address the migrants NAVFOR) MED Operation Sophia. In since its approval in 2011 – executing and arms smuggling, to fight the mari- the Joint Declaration, it was recog- the full spectrum of Maritime Security time terrorism and, in broader terms, nized that “a stronger NATO and a operations. to contribute to maritime security and stronger EU are mutually reinforcing”, Within the framework of the AMS, Op- stability in the Mediterranean Sea, are and with this in mind NATO contributes eration Sea Guardian is an updated performed by NATO in the full aware- to the activities of Operation Sophia in version of the precedent Operation ness that the security in Europe can the Mediterranean Sea with the provi- Active Endeavour, with a broader only be granted by ensuring stability in sion of information, surveillance and scope and mission, though a relevant this strategic Sea and in the region of logistic support, while also contributing change from OAE is that the resources Middle East and North Africa. Captain Corrado Campana Attended the Italian Naval Academy from 1987 until 1991, when he was commissioned as Ensign. He has achieved the qualification in Naval Artillery and Missile Systems and the specialization in Naval Weapons Direction. He served onboard several Italian Navy ships such as the frigates Libeccio and Maestrale and the destroyers Ardito and Luigi Durand de la Penne, and was appointed as Commanding Officer of the auxiliary ship Ponza and of the frigate Granatiere. He served in international staffs such as the Force HQ of the Multinational Force and Observers (M.F.O.) in El-Gorah (Sinai, Egypt) as Naval Advisor, and the EU Naval Force OHQ in Northwood (UK) as ACOS CJ3 Operations within the anti-piracy Operation ATALANTA. He served in national staffs such as the Command in Chief of the Italian Fleet as Head of the Artillery and Missile Systems Section, the Command of Italian Maritime Forces in Taranto as ACOS N3 Operations and at the Italian Joint Operations HQ in Rome, as Head of Maritime Operations Section (J3). He attended the Italian Joint War College and the Course in International Humanitarian Law at the Centre for Defence High Studies in Rome and also served as Tutor for the attendees. Captain Campana has achieved the Degree in Maritime and Naval Science at the University of Pisa, the Degree in Political Science at the University of Trieste, and the Master in International and Military-strategic Studies at the L.U.I.S.S. University “Guido Carli” in Rome. Since the 1st August 2013 he is appointed at the NATO Maritime Interdiction Operational Training Centre in Souda Bay, Crete, Greece as Director of the Training Support and Transformation Directorate. 7
MARITIME SECURITY Toward a Comprehensive Approach to Addressing Transnational Threats in the Mediterranean by Mr. Christopher Kremidas US European Command Liaison to NATO and the EU Abstract by the current security environment violence and humanitarian disasters include instability in fragile and fail- has led NATO to adopt the Compre- In recent years the challenges posed ing states and the resulting cycles of hensive Approach to improve coor- 8
MARITIME SECURITY dination among international actors. a number of tasks required to bring ers endorsed an Action Plan for the At the same time, some of the most stability to a failed state while simul- development and implementation of prevalent challenges facing the Euro- taneously addressing the impact of NATO’s contribution to a Comprehen- Atlantic community today are transna- transnational threats, some of which sive Approach. tional threats such as organized crime, seek to take advantage of a vacuum At the Lisbon Summit in November terrorism, illicit trafficking in humans, in governance. 2010 and in its new Strategic Concept, drugs, and weapons and weapons, the Alliance “…decided to enhance cyber crime, and the possibly destabi- 2. The Comprehensive NATO’s contribution to a comprehen- lizing challenge of irregular migration. Approach sive approach to crisis management as Within this context, the Euro-Atlantic part of the international community’s community should take a more proac- The Comprehensive Approach (CA) effort and to improve NATO’s ability tive approach to employing the Com- is a way to achieve a common un- to deliver stabilization and reconstruc- prehensive Approach, starting with derstanding and approach among all tion effects”. To support this decision, addressing transnational threats in actors of the International Community NATO agreed to form a modest civilian the Mediterranean before they reach through the coordination and de‐con- capability to interface more effectively the crisis stage. At the same time, fliction of political, development and with other actors and conduct appro- building a Comprehensive Approach security efforts in solving an interna- priate planning in crisis management. culture within NATO and in conjunc- tional crisis. The effective implementation of a tion with other international actors will The requirement to work with partners comprehensive approach requires all help to transform its relationships with and the nature of these new chal- actors to work together with a shared the and enable closer cooperation and lenges have made operations increas- sense of responsibility and openness, collaboration in addressing common ingly complex, requiring a closer level taking into account and respecting security challenges. of coordination and collaboration. On each other’s strengths, mandates and the ground, partners generally find a roles, not to mention their decision- 1. Introduction way to work together successfully but making autonomy. In other words, the at the operational and strategic levels, Comprehensive Approach is not hier- In recent years the challenges posed coordination has been characterized archical but rather it is a collaborative by the current security environment by a lack of understanding and insuf- effort among equals. include instability in fragile and fail- ficient awareness and coordination of NATO’s experience from operations, ing states and the resulting cycles of each other’s planning. A strategic and including Afghanistan and in address- violence and humanitarian disasters. operational level process was needed ing piracy, has demonstrated that More recently, we have also seen the to build coherency and the answer has managing complex conflicts and cri- impact of spillover from these fragile been the Comprehensive Approach, ses requires a wide range of internal and failing states. In some cases, which focuses on building a shared and external actors, including govern- these effects have been serious understanding of the problem, devel- ments, civil society, the private sector enough to impact and endanger previ- oping a shared overarching vision of and international agencies, to work to- ously stable states. At the same time, the solution and facilitating coordina- gether in a coherent and coordinated some of the most prevalent challenges tion of effort while respecting the in- effort. In a Comprehensive Approach, facing the Euro-Atlantic community to- dividual mandates of multiple entities. the military can provide a secure space day are transnational threats such as NATO heads of state and government to enable other actors to address im- organized crime, terrorism, illicit traf- recognized the need for a Compre- mediate humanitarian needs and the ficking in humans, drugs, and weap- hensive Approach when it tasked the root causes of the problems. ons and weapons, cyber crime, and North Atlantic Council to develop prag- Given the requirement to include civil the possibly destabilizing challenge of matic proposals for it during the Riga society, nongovernmental organiza- irregular migration. Summit in November 2006. In 2008, tions (NGO), and private enterprise In some cases, we can be dealing with at the Bucharest Summit, Allied lead- - no single organization or nation can 9
MARITIME SECURITY conduct an effective Comprehensive 3.1 Since 2014, Russia’s use of and continuity of governance in the Approach by itself. This large number broad-spectrum tactics to splinter Eu- face of hybrid threats. At the same of actors and the complexity involved rope’s ability for collective action has time, both documents call for greater in coordinating actions are particularly been given a name; hybrid warfare. NATO-EU cooperation in addressing challenging from the perspective of the The concept of hybrid warfare is the hybrid threats and the staffs of both Comprehensive Approach (CA). Ac- mix of conventional and unconven- organizations have worked together to tors can vary from local governmental tional, military and non-military, overt agree upon a number of areas where officials and parties in the conflict to and covert actions employed in a co- they can focus their cooperative ef- private sector entities and local NGOs. ordinated manner to achieve specific forts. The variety of international actors in- objectives while remaining below the 3.5 As we can see, both NATO and cludes other international organiza- threshold of a formally declared war- the EU are proactively applying some tions and NGOs, humanitarian actors, fare. (but not all) of the principles of the donor governments and representa- 3.2 Hybrid Warfare targets critical Comprehensive Approach as they ad- tives of the private sector. vulnerabilities and seeks to create dress the challenges of hybrid warfare. The risk of not working together ambiguity in order to hinder swift and But even this method is not sufficient through a Comprehensive Approach is effective decision-making. There are in dealing with the broader challenge to have our efforts result in fragment- a wide range of measures applied as of transnational threats on NATO’s ed and inconsistent programs and part of a hybrid campaign; from cyber southern flank nor does it address root policies, which can duplicate efforts attacks on critical information sys- causes. Thus, the work that remains leading to inefficient spending and a tems, through the disruption of critical to be done is for the Comprehensive reduced capacity for delivering results. services, such as energy supplies or Approach to be applied to the chal- At the same time, a failure to work to- financial services, to undermining pub- lenge of Transnational Threats in the gether to address the often linked con- lic trust in government institutions or south, especially in the Mediterranean ditions of underlying causes can force exploiting social vulnerabilities. While Region. us to start over again and again, much the concept of hybrid warfare is not like Sisyphus endlessly trying to push new, its application by Russia, and to a 4. Transnational Threats: A the rock up the hill. lesser extent by Daesh, against NATO Challenge to Governance member states’ interests has present- 3. Toward a Proactive Appli- ed a new challenge to the Alliance. Transnational threats are commonly cation of The Comprehensive 3.3 In response, NATO finds itself at defined as threats such as organized Approach a transformative juncture once again. crime; terrorism, illicit trafficking in Post-2014 NATO has adopted the humans, drugs, and weapons, cyber Since its inception, the Comprehen- Readiness Action Plan (RAP) as a crime, and the destabilizing challenge sive Approach has been applied in means of responding rapidly to new of irregular migration. In the Mediter- the aftermath of emergency situations threats as they present themselves ranean, this broad group of threats can where international actors found them- along the eastern and southern flanks. also take the form of proliferation of selves thrust together by necessity – in 3.4 More recently, NATO adopted a weapons of mass destruction (WMD), other words, we’ve used it only when Hybrid Warfare Strategy in December cyber attacks targeting the commercial reacting to security challenges. Given 2015 and the European Union adopt- shipping and port security sector, nat- the two main challenges facing the ed its Joint Framework for Addressing ural and manmade disasters, illegal, alliance today: hybrid warfare threats Hybrid Threats in April 2016. Both irregular and unreported (IUU) fish- from the east and transnational threats documents speak to taking a proac- ing and environmental pollution. The from the south, a more proactive ap- tive “whole-of-government” approach three aspects most discussed current- plication of the Comprehensive Ap- in conjunction with a variety of actors ly are transnational organized crime, proach is urgently needed. in order to improve resiliency, security, terrorism, and irregular migration. 10
MARITIME SECURITY 4.1 Transnational organized crime re- nate their activities. In addition and been to erect stronger immigration fers to self-sustaining groups that oper- unlike organized crime groups, ter- barriers that affect both regular and ir- ate transnationally to obtain power, in- rorists also require sophisticated stra- regular migrants as well as refugees. fluence, and commercial gains, wholly tegic communications capacities in These policies have a number of un- or in part by illegal means. They also order to gain the maximum impact for intended consequences such as in- protect their activities through corrup- their actions. creasing illicit entries, causing them to tion and/or violence, while exploiting Terrorists also present a challenge attempt riskier methods to gain entry, and creating gaps and seams in the to governance in that they stress the and fostering the growth of sophisti- framework of transnational commerce, system to respond which can lead to cated criminal trafficking networks. communications, and financial mecha- harsh measures, disrupted economic At the same time, irregular migration is nisms. activity and reduced freedom of move- seen as more than just a humanitarian Increasingly, their illicit activities ment for citizens – all of which can concern. One danger is the potential across borders and communities not drive a wedge between the people and of terrorists exploiting illicit crossings only adversely impact security and their government. to facilitate their operational aims. economic health but also contribute to 4.3 Irregular migration is a complex Two possible forms come to mind: an illicit underworld operated by pow- erful criminal networks that can pres- ent a challenge to governance. These illicit criminal organizations pose an immediate threat to public trust and weaken governance since unlike legitimate business, they re- quire a system of impunity that gives them the freedom of action to con- duct their illicit activities. In building, maintaining, and growing this system of impunity they corrupt government officials, computer systems, financial institutions, and deny governments the ability to maintain their sovereign bor- ders and exclusive economic zones. This in turn weakens their ability to collect taxes and customs fees to fund their government’s activities. problem because it presents a wide using migrants as a cover to secretly It is important to note the challenge to variety of human security, law enforce- enter Europe and taxing smugglers to governance is not just a threat to trou- ment, development, and governance access departure points under militant bled states but to our own as well. As challenges in dealing not just with the control as a means of raising money. criminal networks’ influence spreads symptoms but also the root causes. outward, it brings corruption with it – This issue can also be a sensitive 5. Applying the Comprehen- even into currently well-governed na- problem internally when absorbing sive Approach to addressing tions. large irregular migrant flows. Transnational Threats in the 4.2 Terrorists require and use the In many cases, these arrivals are Mediterranean same financial and transportation viewed as unwelcome and a potential pathways and system of impunity to threat to national identity, unity, and So, what would a Comprehensive Ap- move people, weapons, and coordi- stability. The typical response has proach in the Mediterranean look like? 11
MARITIME SECURITY In order to know for certain, it would sive Approach in action. obligations and security constraints. require the actors to come together In this case, it is necessary to move Despite this seemingly large number to work through the stages of con- from a culture of “need to know” to one of obstacles to closer cooperation, ap- ducting a common assessment of the of the “duty to share “ information. This plying the Comprehensive Approach challenges, developing common ap- is the most effective way to build trust, to addressing transnational threats proaches to address them, and plan- enable coordinated action, ensure true can show us the areas where we can ning for coordinated actions among interagency cooperation, and facilitate work together to achieve our common nations and organizations. Until then, the production of common threat as- goal of security and stability in the there are some indications of what sessments. Mediterranean. their results may look like. While information sharing is gener- “Don’t Let What You Cannot Do Inter- In the last few years of facilitating in- ally viewed as essential in dealing with fere With What You Can Do” ~ John ternational discussions among law maritime threats, instituting a robust Wooden enforcement, diplomatic, military, intel- information fusion capability encom- ligence, and humanitarian actors on passing military, law enforcement, 6. Potential Areas For Fur- how to collectively address transna- and commercial sources can be a real ther Exploration tional threats in the Mediterranean, a challenge, few common themes emerge. This is due to the number of laws and 6.1 Situational awareness: Seeking 5.1 First, is the need for complemen- agencies involved and the reality that shared awareness and developing tarity, coordination and collaboration. many agencies are reluctant to re- a common understanding of evolv- Unilateral and/or partial responses lease real-time actionable information. ing threats through a continuous ex- are recognized not only as limited Often this stems from the inherent cul- change of information among actors in and short sighted but also as leading tural tension between entities involved the Mediterranean region. The Infor- to secondary effects which expose in interdiction (with a bias for immedi- mation Fusion Centre (IFC) in Singa- neighboring governments to a new ate action) and those responsible for pore is a good model for a non-hierar- array of challenges to their national investigations (whose concern is to chical multinational maritime security security. collect and protect evidence on an information fusion capability. Through 5.2 Secondly, it is general recognized entire network for successful criminal the timely sharing of information, it fa- that most all of the transnational threats prosecutions). cilitates timely and effective responses in the Mediterranean are of a law en- 5.4 Finally, reducing the tension be- from partners through linkages to 65 forcement nature and thought must be tween security concerns and human agencies in 35 countries, and with 16 given to how military capabilities can rights in this context is an area where International Liaison Officers (ILOs) support and amplify law enforcement the Comprehensive Approach can from 15 countries. The IFC also con- efforts while not crossing any legal help us to find common ground. In ducts capacity-building activities such boundaries which may prohibit military this case, a Comprehensive Approach as international information-sharing forces from directly conducting law could include contributions from ex- exercises and workshops, for exam- enforcement activities. Finding ways perts in Law of the Sea, maritime se- ple, the biennial Maritime Information to achieve this is necessary because curity, migration and refugee studies, Sharing Exercise (MARISX). no government can afford to purchase and human rights, to address the po- 6.2 Planning and Conduct of Op- these same capabilities twice. sition of migrants and refugees from erations: Enhance integrated civilian- 5.3 Thirdly, because of the large num- an integrated perspective. Through military-law enforcement planning ber of security-related agencies from the inclusion of these perspectives, throughout the planning process and more than a dozen countries operating we can develop an approach on how in operations in adjacent waters. in the Mediterranean, rapid and com- to respond to differing needs and legal FRONTEX’s European Patrols Net- prehensive information dissemination entitlements of migrants and refugees work (EPN) is an excellent example is necessary to enable a Comprehen- and how to reconcile them with State of how to accomplish this among sev- 12
MARITIME SECURITY eral nations, ministries, and agencies. ber incident prevention, prediction, ing Group of regional actors must be The EPN is a permanent regional bor- detection, and response. The NATO convened at once to apply the process der security concept that enables the Cooperative Cyber Defence Centre of to the problem of both Transnational synchronization of national measures Excellence in Estonia can serve an im- Threats and threats from state actors of EU Member States and their inte- portant role in bridging the civ-mil gap in the Mediterranean Region. This gration to joint European activities. It in cyber security. group can provide a holistic assess- is based on Member States´ existing ment of the issues and make recom- activities and on strengthening of co- 7. Summary and Recommen- mendations for a common approach operation and coordination at national dations and enable the Alliance to develop and EU levels. its own strategy in concert with other 6.3 Lessons Learned, Training, and The Comprehensive Approach is now regional and international actors. A Exercises: Commonly collect and a recognized method to achieve a similar effort for the Black Sea region share lessons learned and best prac- common understanding and approach should also be considered. tices from putting the Comprehensive among various actors of the interna- 7.2 A More Proactive Use of the Com- Approach into action in the maritime tional community through the coordi- prehensive Approach. When major environment and incorporate them into nation and de‐confliction of political, international challenges arise, rather training and exercises. At the same development and security efforts in than waiting until the crisis stage is time, invite other actors to participate solving an international crisis. reached, a Comprehensive in exercises and training to strengthen Currently, both NATO and the EU Approach Working Group should be cooperation and mutual trust. With its are applying some principles of the convened at the problem recognition experience and connections to a wide Comprehensive Approach in their stage to provide a holistic assessment variety of maritime experts and actors, strategies to address the challenges of the issues and make recommenda- especially from years of addressing of hybrid warfare. But even this ap- tions for a common approach among counter-piracy and its more recent proach is not sufficient in dealing with regional and international actors. This emphasis on transnational threats, the broader challenge of transnational would also allow for the NATO Secre- the NATO Maritime Interdiction Op- threats on NATO’s southern flank tary General to provide a more com- erations Training Center (NMIOTC) since it does not address root causes prehensive strategic assessment to is uniquely suited to serve as a focal nor include the collaboration of a num- better frame the issues for SACEUR point for the Comprehensive Approach ber of entities to include private enter- when asking for military options and in the maritime environment. prise, NGOs, and civil society. advice to be provided to the North At- 6.4 Strategic Communications: Where Taking into account the increasing lantic Council. possible, share information strategies recognition of the Comprehensive 7.3 Build a Comprehensive Ap- and campaigns regularly to ensure Approach as an essential process to proach Culture. Sponsor and host complementarity and mutual reinforce- improving coordination among various Comprehensive Approach Awareness ment with other involved international actors in solving major security chal- Seminars at headquarters throughout organizations and local actors. lenges, the following recommenda- the NATO Command Structure and 6.5 Cyber Defense: Seek to build tions are offered. Centers of Excellence to engage and shared threat awareness and mutu- 7.1 A Comprehensive Approach for build habitual relationships with re- ally supportive improvements to resist the Mediterranean. On NATO’s south- gional actors to enable the Alliance to cyber attack. Enhance cyber informa- ern flank and in particular the Medi- enhance its readiness to put the Com- tion sharing of best practices at the terranean region, the Hybrid Warfare prehensive Approach into action at technical level – including on technical Strategy is insufficient to address the the strategic, operational, and tactical innovations, incident handling meth- variety of transnational threats since levels. This will enable a Comprehen- odologies, and secure configuration they are much broader in scope. Thus, sive Approach culture to take root at of networks in order to improve cy- a Comprehensive Approach Work- all levels within the Alliance and help 13
MARITIME SECURITY to transform its relationships with other no longer seen just as a Civilian-Mili- resent the author’s personal opinion international actors. tary (CIMIC) or J9 function but rather and findings and not the official views 7.4 Move the Comprehensive Ap- one that is equally owned and sup- or policy of the United States govern- proach into the Mainstream. Finally, ported by operators, strategists, and ment. within NATO it is time to mainstream logisticians. the Comprehensive Approach so it is The views presented in this paper rep- References European Commission (2016), Joint Framework on Countering Hybrid Threats. http://ec.europa.eu/DocsRoom/docu- ments/16201 “Effective Cooperation: The Bedrock of Any Security Architecture” ADM (ret) P. Xinofotis, NMIOTC Journal, July 2013. http://www.nmiotc.nato.int/files/NMIOTCjournal7.pdf European Commission (2014). “Maritime Security Strategy”, http://ec.europa.eu/maritimeaffairs/policy/maritime-security/ index_en.htm Guptill, Murray “Sandy,” Course Designer, NATO Comprehensive Approach Awareness Seminar, Interviews Sept 2015-April 2016 NATO (2011), “Alliance Maritime Strategy”, http://www.nato.int/cps/en/natohq/official_texts_75615.htm NATO (2010), “NATO’s Strategic Concept 2010”, http://www.nato.int/nato_static_fl2014/assets/pdf/pdf_publica- tions/20120214_strategic-concept-2010-eng.pdf NATO Defense College (2011), NATO Comprehensive Approach Awareness Seminar, Course Guide Christopher Kremidas Chris Kremidas currently serves as Liaison to NATO and the EU for US European Command (EUCOM). His previous positions include service as Political Advisor to the Commander, NATO Training Mission – Iraq and Assistant Political Advisor to Commander, Joint Forces Command Naples. He has also served as Chief Strategist for US Joint Task Force North, Policy Planner at the US Delegation to NATO, and as Deputy Defense Policy Advisor for the US Mission to the European Union (EU). Previ- ously he served as Regional Cooperation Manager for the Mediterra- nean region at the EUCOM Joint Interagency Counter-Trafficking Cen- ter (JICTC). He earned a master’s degree with honors in Strategic Studies from the Swiss Federal Institute of Technology (ETH Zurich) and a Bachelor of Arts in Political Science from Ball State University. He is also a distin- guished honor graduate of the NATO Defense College and a veteran of Operation Iraqi Freedom. Mr. Kremidas is a recognized expert on the NATO Comprehensive Approach and has published sev- eral articles on it as well as serving as facilitator and course designer for NATO Comprehensive Ap- proach seminars throughout Europe. Chris Kremidas is also a sought-after expert on multinational maritime border security cooperation and has facilitated numerous dialogues on information sharing, coordinated responses, and addressing irregular migration. 14
CYBER SECURITY Maritime Cyberpower Projection by Adrian Venables, PhD Student at Lancaster University, UK and Commander UK Royal Naval Reserve a.venables2@lancaster.ac.uk Abstract ighting arms as demonstrated by the ronments in the projection of seapow- use of amphibious troops, maritime er. This paper examines the as yet un- UK military doctrine recognises five op- aviation and the use of satellite de- explored area of how cyberspace can erating environments, Maritime, Land, rived communications and intelligence be used as a mechanism by which the Air, Space and Cyberspace. These are illustrating how naval forces can utilise maritime environment can generate not regarded as totally separate warf- the distinctive attributes of other envi- cyberpower to influence a target popu- 15
CYBER SECURITY lation afloat or ashore. The maritime present additional unique challenges air forces to embark on expeditionary and cyber environments have many of operating at sea or in coastal re- operations as part of a coordinated similar characteristics such as their de- gions. The link between the maritime strategy to achieve their government’s pendence on manufactured resources and cyber environments is a subject strategic objectives. The maritime op- to exploit their potential and that their that is poorly researched, yet the erating environment is described in UK size prevents them from being under two have many similarities and have Ministry of Defence (MoD) doctrine as the total control of a single power, but mutual dependencies in their use for providing critical access for joint as- that temporary regional control is vital trade, communication and the projec- sets allowing influence in support of for trade, communication or to achieve tion of national power. Current doc- political objectives, the conduct of a an effect on an adversary’s behaviour. trinal definitions are explained and wide range of maritime security and By examining the components of cy- the two environments are compared international engagement and when berspace that are dependent upon leading to the introduction of the new necessary, the means to assemble the maritime environment, methods terms of Maritime Cyberpower and and apply decisive combat power at to identify the components that can Cyber Seapower. This is followed by a time and place of political choice.2 project the new concepts of maritime an examination of the composition of The Doctrine highlights that maritime cyberpower and cyber seapower are maritime cyberspace and its charac- power is not an end in itself, but op- explored with particular emphasis on teristics to show how they contribute erates within a wider national security addressing the potential cyber vulner- to security and the influence of others framework and that the environment abilities of ship systems. through power projection. The paper comprises six dimensions; Physical, concludes with methods to identify the Economic, Political, Diplomatic, Legal, Introduction components of maritime cyberspace in and Military. These are noted as being order to project maritime cyberpower interrelated and of equal importance The maritime operating environment and cyber seapower with particular although the physical element pro- is one of five recognised by UK Min- emphasis on the need to address the vides the overarching context for all istry of Defence (MoD) doctrine, the potential cyber vulnerabilities of ship and highlights its uniqueness.3 others being Land, Air, Space and systems. Cyberspace. This paper describes the Cyberpower and the maritime relationship between the maritime and Defining the maritime envi- environment cyber environments and introduces ronment \ the concept of maritime cyberspace The UK Ministry of Defence defines in terms of cyberpower projection. At the heart of any definition of the maritime power as the ability to proj- The nature of maritime power is an maritime environment is an accep- ect power at sea and from the sea to important one for states that are either tance of its critical importance to global influence the behaviour of people or dependent on the seas for trade or trade, security and as a source of fuel the course of events. 4 As such, it is security or wish to have an influence and food. With the growth of globalisa- coherent with other more general de- in the areas surrounding their coasts. tion, climate change and over popula- scriptions of the concept of power and Drawing on UK maritime doctrine, the tion resulting in unsustainable regional to achieve this maritime forces have a concept of power at sea and from the pressure on natural resources, this role number of unique attributes that they sea in terms of control and denial is is not going to diminish in the foresee- can exploit such as Access, Mobility, explained in which free access to ar- able future. Indeed, it is predicted that Lift Capacity, Sustained Reach, Versa- eas of the oceans are required to be a high proportion of future conflicts will tility, Poise, Resilience and Leverage.5 maintained by nation states. Allied to occur in or adjacent to a zone of mari- Although cyberspace is viewed as a sea power is the issue of maritime time influence.1 From a military per- unique nvironment alongside land, security and its related tasks, which spective, the sea also provides access air, sea and space, these are not re- may include a cyber element that will for amphibious, land and embarked garded in isolation as operating areas. 16
CYBER SECURITY This is demonstrated in the UK by the in its own right.6 However, the use by cyberattacks experienced at sea must coordinated use of the Royal Marines both state and non-state actors of cy- not be investigated in isolation, but amphibious troops, the Royal Navy’s berspace as an asymmetric means to that evidence, precedence and devel- Fleet Air Arm and the deployment of seek an advantage over an otherwise opments in other environments should satellite supported communications militarily superior force is also recog- be considered as part of a holistic ap- and intelligence capabilities illustrating nised. This is significant as it implies proach in their resolution.8 how naval forces can utilise the dis- that the maritime community afloat tinctive attributes of the other environ- is no longer platform centric and de- Maritime Power at sea ments in the projection of seapower. tached from cyberspace, but an inte- However, although the dependencies gral part of it if connected via satellite, In order to project maritime power, it between these physical elements is mobile telephony or via radio trans- is necessary to be able to deliver an well recognised, each one’s unique mission of digitised navigation or other effect at sea and from the sea. Initially link to cyberspace is not and the con- maritime related information. Although the term Command of the Sea was cept of how the projection of cyber- this bring advantages, it also exposes used to be able to exploit the environ- power could be conducted from the the maritime community to the same ment to an advantage. However, as sea has not attracted much, if any, dis- risks and vulnerability to attack as their this implied total control of the entire cussion and requires further investiga- land based counterparts. This is exac- ocean all of the time, which was im- tion. This may be due to a lack of un- erbated by the issue of software aging practical, other terms are now used derstanding of the unique conditions of in which a ship’s lifespan may exceed that refer to a more realistic aspiration the coastal and oceanic regions or that that of the software that is required to of temporary control limited in time they are not considered suitably differ- operate it. This will require regular, but and space to that required to conduct ent from the other environments to potentially expensive and time con- a given task or operation. Sea Control warrant particular investigation. What suming ‘software refits’ to mitigate for is defined as the freedom to use an effort has been devoted to the subject any vulnerabilities in their systems, but area of the sea for one’s own purpose has been concentrated on the related which may in reality offer no additional for a period of time and if necessary security aspects of shipping, which in functionality and may even reduce per- to deny its use to an opponent if it is 2016 is now gaining increased inter- formance if the hardware upon which it contested and requires dominance of est from both the mercantile industry is running is not upgraded at the same the surface and sub surface environ- and suppliers of cyber security prod- time.7 This may well also be combined ments including the seabed and the ucts. The maritime environment and with increased automation and the in- air above.9 This may range from being its relationship with cyberspace in the tegration of different functions into a able to exercise the right of innocent projection of power introduces the single system to reduce the manpower passage in a state’s territorial water concept of maritime cyberpower as a required afloat, which further limits its or Exclusive Economic Zone to using facilitator of maritime power. The role ability to operate without the aid of the force to eliminate another naval force of cyberspace in contributing to mari- computer systems. Ocean going ves- from challenging control over an area time power is acknowledged as going sels are also increasingly reliant upon of sea. As Sea Control is a temporary beyond just information systems and a robust logistics organisation to pro- condition, it would usually be an ob- reaching into command and control, vide global support – a system that it- jective in order to conduct a particu- intelligence, surveillance and recon- self is dependent upon Internet based lar mission or as a precursor to other naissance activities as well as the communications and disruption of operations. Depending on the threat, physical control of systems. Thus the such networks may have a significant obtaining it may involve actual military importance of the cyber environment effect on the seaworthiness or ability action against an opponent at sea or is recognised as a facilitator in the ef- of a ship to embark on transcontinental their containment by blockade to pre- fective operation of other systems, but passages. This emphasises the inte- vent them from accessing the disputed not as a means to exert power at sea grated nature of cyberspace and that area. The concept of Sea Denial dif- 17
CYBER SECURITY fers from Sea Control in that it occurs the operation of offshore oil platforms navigation, maritime attack against when one party prevents another from from the adverse influence of others. the national infrastructure, arms pro- controlling an area, but without con- The UK National Strategy for Maritime liferation, drugs and people smuggling trolling the region itself. Historically Security defines it as: are all listed.13 minefields or the threat of submarines …the advancement and pro- were used to deny access to an area tection of the UK’s national in- Defining the cyber environ- or threaten opposition surface forces. terests, at home and abroad, ment More recently and especially in littoral through the active manage- areas, surface to surface missile or ment of risks and opportuni- Although there is no formally accepted gun batteries have been used to pres- ties in and from the maritime definition for the cyber environment, ent an increased level of risk that may domain, in order to strengthen the UK Ministry of Defence’s Cyber deter maritime forces from operating in and extend the UK’s prosperity, Primer describes it as the interdepen- coastal regions. Sea Control and Sea security and resilience and to dent network of information technology Denial may also be used in conjunc- help shape a stable world.11 infrastructures, (including the Internet, tion as denial in one region may facili- Within the military context, British telecommunications networks, com- tate control in another. Defence Doctrine notes that the role puter systems, as well as embedded of national security encompasses processors and controllers), and the Maritime security the safety of the State and its protec- data therein within the information en- tion from both external and internal vironment.14 At the heart of cyberspace There is a direct correlation between threats, but is also integrated within, is information and the information en- power and security, which is applica- and dependent upon, the security of vironment is defined by the UK Minis- ble in all environments including mari- neighbouring states and partners. The try of Defence as a logical construct time and cyberspace. As power seeks former of these counter the threat of whereby assured information can pass to influence the behaviour of people invasion, attack or blockade and the unhindered from point of origin to point or the course of events, this may be latter includes the dangers from ter- of need, with assured meaning that the perceived as a threat, particularly if it rorism, subversion, civil disorder, information can be proven as authen- is detrimental to a government or so- criminality, insurgency, sabotage and tic and that the originator can be iden- ciety’s policy, social norms or strategic espionage.12 The role of cyberspace tified.15 The Cyber Primer also moves ambitions. Among multiple definitions is referred to within the context of an beyond just describing cyberspace to of security, the Oxford English Diction- attack on the country’s critical national what comprises military operations in ary includes Freedom from threat or infrastructure. This document also the environment, defining them as the danger, and safeguarding the inter- obliquely refers to the maritime com- employment of capabilities where the ests of a state.10 Effective security can ponent by highlighting that the govern- primary purpose is to achieve effects thus be used as a means to counter ment’s primary duty is to maintain the in, or through, cyberspace. This has the effects of a campaign of power freedom and integrity of the UK and significant coherence with the defini- projection or influence – it is a coun- that its stability, prosperity and well-be- tions of maritime power projection and ter power strategy. At sea, maritime ing depend on international trade and security in being able to influence the security can be utilised as a means to investment. This it notes requires raw behaviour of people or the course of counter some of the measures used to materials being imported and goods events. In an attempt to explain cy- exert control over people or systems exported by sea and are facilitated berspace as part of the Information by a threat actor, be they state spon- through access to global information environment, the Primer describes it sored or criminally motivated. These flows. In highlighting the threat posed in terms of three domains; the Physi- may range from efforts to exercise to the UK by criminals operating in cal (hardware, location and network- power through Sea Control or Denial the maritime environment; terrorism, ing components), Virtual (software, to protecting fisheries or maintaining disruption to trade or the freedom of networking protocols and information), 18
CYBER SECURITY and Cognitive (people, their roles and when seeking to achieve an effect in berspace.’ 17 groupings). Noting that cyberspace is cyberspace. For example, the total- In addition to using the features of the a complex and dynamic environment, ity of the two environments are both maritime environment as a means of the Cyber Primer emphasises its im- ungovernable by a single authority, influencing others in the wider medium portance to military operations and indicating that sea control and denial of cyberspace, it is also conceivable the reliance it places on defence com- may have equivalents in cyberspace to use the properties of cyberspace to munications. However, it also notes for power projection. Both also require develop the concept of power at sea in the need to use Commercial Off The manufactured devices to effectively the conventional sense. This presents Shelf (COTS) hardware, software and use them, be they ships or computing a new theory of cyber seapower, which civilian owned and operated infrastruc- devices as unlike land warfare, a hu- can be termed: ture for its essential operations.16 This man cannot enter and engage with the ‘The ability to use cyberpower requires protective measures to be environment unaided. Furthermore, to project power at sea and from implemented to enable mission criti- the maritime and cyber environments the sea to influence the behav- cal systems and the information they are international in nature with ships ior of people or the course of carry to function with the requisite re- at sea originating from many coun- events in the maritime environ- silience in order to maintain the same tries and cyberspace comprised of ment’ confidentially, integrity and availability components manufactured worldwide, There is a distinct difference in these of data as military systems. A key facet with no single country having total new concepts of maritime cyberpower of this is its relationship and interde- dominance in either. However, influ- and cyber seapower as whereas the pendency with the electromagnetic ence can be exerted as seen by some former seeks to achieve an effect from spectrum, which is an integral part of states having large merchant fleets or the sea that influences events any- the cyber environment, particularly for being dominant in the computer or net- where in cyberspace, the latter seeks mobile platforms that do not have ac- working markets. Similarly, in order to to use cyberspace to achieve an effect cess to a fixed infrastructure for com- function, there are global agreements solely in the maritime environment, munication. However, data exchange that govern both environments – The including the littoral. An example of via radio frequency transmissions United Nations Convention on the Law maritime cyberpower would therefore have the significant disadvantage in of the Sea (UNCLOS) in regulating the be to use a maritime platform to dis- that they can be intercepted and un- use of the oceans and the use of in- rupt or influence a cyber infrastructure less encrypted can be subject to col- ternationally accepted addressing and at sea or ashore to prevent access or lection for analysis, manipulation or routing protocols that control how data to alter the content of systems in order interference by persons other than is exchanged in the networks of cyber- to affect the behaviour of a popula- the intended recipient thereby making space. By adapting the UK’s definition tion ashore. Cyber seapower how- them a valuable target for espionage, of Maritime Power of The ability to ever would be to utilise the medium sabotage or subversion. project power at sea and from the sea to directly affect the ability to facilitate to influence the behaviour of people Sea Control or Sea Denial. This would Comparing maritime and cy- or the course of events and by using include adversely affecting the ability ber environments the concept of seapower as the basis of ships, ports or offshore installations for projecting cyberpower, the notion to operate normally. The concepts of Although the maritime and cyber envi- of Maritime Cyberpower can be intro- Maritime Cyberpower and Cyber Sea ronments may appear very dissimilar duced as: Power within the contexts of Cyber- at first inspection, there are a signifi- The ability to project cyberpow- power and Sea Power are shown in cant number of parallels that can be er at sea and from the sea to in- Figure 1 below, which emphasise their drawn between them and many of fluence the behaviour of people contributory nature to the wider power the factors that need to be considered or the course of events through component and their role in circum- when operating at sea can also apply and within the medium of cy- venting the security of the defender: 19
You can also read