TY - JOUR
T1 - Cyber threats to maritime SAR operations in the arctic: risks from public data
AU - Karahalios, Hristos
PY - 2025/6/30
Y1 - 2025/6/30
N2 - The challenging climate conditions in the Arctic Ocean make Search and Rescue (SAR) operations particularly difficult. An emerging risk that demands attention in this context is cybersecurity. The paper examines cybersecurity threats by focusing on the perspective of Arctic SAR operations. A ship may require assistance due to cyberattacks compromising its IT networks or navigation equipment. Attacks could occur through random incidents or intentional actions by cyber criminals who can target vulnerable ships from public databases. The research explores how cyber-attacks could compromise SAR operations, providing detailed threat scenarios by implementing the STAP safe-sec methodology and utilising experts from Arctic rescue operations. The paper highlights areas that need Ships in the Arctic Ocean to be cyber-attack resilient. Cybercriminals could use several pieces of information from public domains to select one or multiple targets when rescue operations would be particularly challenging. The information includes ship equipment failures, wind force, sea state, the number of crew and passengers in distress, and the proximity of nearby ships. A practical scenario demonstrates the methodology's application, focusing on bulk carriers with Polar Code certification. This scenario utilises historical data on weather conditions and ship traffic along the North Sea Route to highlight the practical implications of the research findings.
AB - The challenging climate conditions in the Arctic Ocean make Search and Rescue (SAR) operations particularly difficult. An emerging risk that demands attention in this context is cybersecurity. The paper examines cybersecurity threats by focusing on the perspective of Arctic SAR operations. A ship may require assistance due to cyberattacks compromising its IT networks or navigation equipment. Attacks could occur through random incidents or intentional actions by cyber criminals who can target vulnerable ships from public databases. The research explores how cyber-attacks could compromise SAR operations, providing detailed threat scenarios by implementing the STAP safe-sec methodology and utilising experts from Arctic rescue operations. The paper highlights areas that need Ships in the Arctic Ocean to be cyber-attack resilient. Cybercriminals could use several pieces of information from public domains to select one or multiple targets when rescue operations would be particularly challenging. The information includes ship equipment failures, wind force, sea state, the number of crew and passengers in distress, and the proximity of nearby ships. A practical scenario demonstrates the methodology's application, focusing on bulk carriers with Polar Code certification. This scenario utilises historical data on weather conditions and ship traffic along the North Sea Route to highlight the practical implications of the research findings.
U2 - 10.1007/s12198-025-00298-8
DO - 10.1007/s12198-025-00298-8
M3 - Article
SN - 1938-775X
VL - 18
JO - Journal of Transportation Security
JF - Journal of Transportation Security
IS - 1
M1 - 7
ER -