All posts by Guest Author

State of War, State of Mind: Reconsidering Mobilization in the Information Age, Pt. 1

By LCDR Robert “Jake” Bebber, USN

This article is part one of a two-part piece, drawn from a recently completed report by the author that was published by The Journal of Political Risk, and is available in its entirety here

Introduction

Recently, American policymakers and national security thinkers have begun to recognize that revisionist powers in the Peoples’ Republic of China (PRC) and Russia have no interest in preserving the current liberal order, and instead have embarked on a course to challenge and supplant the U.S. as the world’s superpower. However, the United States is not postured to mobilize for long-term strategic competition or war with great powers. 

American policymakers’ assumptions regarding war preparation, prosecution, and sustainment are not aligned to the emerging 21st Century landscape dominated by three major trends: advances in understanding of neuroscience, dual-use technologies, and new financial business models. These articles take a holistic approach toward identifying how war mobilization in the 21st Century will look different from the industrial models of the mid-to-late 20th Century. Looking beyond the Defense Department, they explore economic, policy, social, technological, and informational aspects of planning and preparation. Part Two will identify why the intelligence and national security communities are not postured to detect or anticipate emerging disruptions and strategic latency. It will put forward strategies and recommendations on how to grow American power and create new sources of comparative advantage that can be rapidly converted into both kinetic and non-kinetic effects in all domains, not just military.

21st Century Trends That Will Shape the Coming War 

Three main forces will shape the 21st Century: advances in neuroscience, emerging dual-use technologies, and new financial business models. The convergence of these forces creates disruptions on a mass scale. Chinese and Russian operations, policies, and investment decisions, along with market forces and changing consumer preferences each play a part in the changing geopolitical landscape, threatening the efficacy of American assumptions in strategic competition, war preparation, prosecution, and sustainment. This requires rethinking how the U.S. considers strategic warning and intelligence during peacetime, the transition from competition to conflict, the resiliency and capacity of current forces to “weather the storm” of initial combat, and whether the country is postured to transition to other means of using force during a global war with a great power. Perhaps most important will be the means by which the U.S. sustains its economic power and the political will to fight. Right now, adversaries are conducting systematic attacks on U.S. and allied sources of economic power, reducing and eliminating what was once considered the principle advantage of industrialized democracies, while at the same time using non-kinetic means to deliver mass cognitive attacks, destabilizing political societies.

The Brain as the Battlefield

Over the past forty years, scientists have made significant advancements in the study of the human brain. James Giordano and others point to immense potential for neuroscience and neurotechnology to “study, predict and influence” human ecologies, potentially affecting human activities on individual, group, and population levels, and human relations on a local, regional, and global scale. These understandings will permit the U.S. and its competitors to develop capabilities to assess, access, and affect the human brain. It will come to influence, and perhaps dominate, the posture and conduct of national security and the defense agenda.

The growth in understanding of the human brain, from evaluating its components and functions, to accessing and influencing it, will be a central focus of strategic competition, not unlike the space program of the Cold War, but with perhaps even more profound implications — the weaponization of brain sciences. Neuroscience can be leveraged as a soft weapon to create economic advantages, intelligence capabilities, and advanced psychological influence operations such as narrative networks. More concerning is how neuroscience can help develop hard weapons that use chemicals, biologicals, toxins, and devices to have physical effects.

Neuroscientific advancement also has significant neuro-enablement application potential to enhance the performance military operators and intelligence officers. More broadly, these understandings can also be used to understand and shape public behavior.

Strategic competitors have invested considerable resources in the research, development, and fielding of neuroscience and biotechnology. China has announced initiatives to position itself as the leading power in brain science and is openly exploring the application of brain sciences to hard and soft power. Military writers and researchers in China argue that future battlefield success will depend on “biological dominance,” “mental/cognitive dominance,” and “intelligence dominance,” and are applying insights from neuroscience to exploit vulnerabilities in human cognition, to include the development of “brain control weaponry.”

Dual-Use, Radical Leveling, and Emerging Technologies

A key driver of strategic competition is the explosive growth in globally powerful “dual-use” or “dual purpose” technologies. These include mobile internet, cloud computing, the exploitation of “big data,” the “internet of things,” ubiquitous sensors, nano-materials, additive manufacturing, self-navigating vehicles, autonomous industrial and civilian robots, artificial intelligence and machine learning, advanced energy storage, renewable energy, and “do it yourself” genomics. Since the end of the Cold War, advances in these technologies have had a significant impact on military technology and operational concepts1 in areas as diverse as space and cyberspace operations, biological weapons development, precision guided munitions (PGM), the realization of transoceanic-range precision strikes, autonomous unmanned combat systems and platforms (to include swarms), directed energy combat systems, and enhanced and protected infantry.2

More profound perhaps is how existing and emerging developments in science and technology enhance power in non-kinetic engagements, creating mass disruptive “weapons” that “incur rippling effects in and across targeted individuals, societies and nations.” These actions “can adversely impact, if not defeat, an opponent …” without meeting the current legally accepted criteria of an explicit act of war. These engagements may cause immediate-to-long-term damage to popular stability, but because the perpetrator of these engagements might remain ambiguous, it is politically problematic for the victim to respond. These types of operations are exceptionally difficult to identify in advance as threats, or can evoke effects which “may not be easily recognizable or attributable to the technology or the actor(s).”3

Adversaries pursue these dual-use technologies as means to deliver effects on a population’s brains, or even its genetic code, through the use of the electromagnetic spectrum via radio frequency or directed energy.4 The increased proliferation of Chinese telecommunications hardware, platforms, and infrastructure may provide a way for the PRC to conduct surveillance, collect intelligence, and execute influence operations. It is also a means to use the frequency spectrum to deliver effects at the neurological and even genetic level.5 This would likely be done using mundane and ubiquitous technology, such as 5G networks, cell phone applications, or even music or video streams.6

Economic War Matters More

Investment decisions may telegraph human behavior and intent,7 and identify future asymmetric disruptions in ways superior to traditional strategic intelligence tradecraft. Investments can have multiplier effects that can move entire commercial sectors globally, with profound implications in a strategic competition where understanding future business models is more important than understanding future technology. 

For example, Chinese telecommunication firms can now exert considerable influence because they enjoy approximately 78% of the leverage in the $3.5 trillion global communications industry.8 These firms should not be confused with traditionally understood commercial firms in the democracies, however. The Chinese Communist Party has put in place a legal and political regime that effectively controls corporate operations. This influence began when a Chinese state-owned enterprise made the initial investment in Huawei, telegraphing the Party’s intent to influence the global telecommunications industry.9 The Party has translated its investment into geo-economic effects that create debt obligations among developing countries (“debt-trap diplomacy”) as well as provide entry to Chinese “techno-authoritarian” influence and control of communities and states outside of China.

American national security planners must consider how to build sources of economic power, and sustain that power in a time of strategic competition and conflict, when America’s competitors exercise significant leverage over American, allied, and global industries. The capture and control of key industries such as telecommunications or space systems will circumscribe U.S. power and force policymakers into more difficult trade-offs to sustain a conflict. Information is a strategic resource and should be treated as such.10

Conclusion

The strategic competition between the United States and Allies, China, and Russia, and how states attempt to create and wield power on a global scale will drive the future security environment. There are two broad competing visions of international order: the Chinese and Russian techno-authoritarian model of control, and the liberal model of broadly supported international rules. The chance of this strategic competition erupting into outright conflict is very real.

The fact that both China and the United States – and important powers such as Russia, Great Britain, India, France, Pakistan, and others – are nuclear powers shape the competition in ways similar to the Cold War. Each side will seek to achieve strategic effects while attempting to limit the likelihood of a nuclear exchange. However, as the balance between conventional and non-kinetic powers of each side fluctuate, the risk grows that competitors will see their options reduced to “go nuclear or surrender,” as President Kennedy famously suggested.

This competition, like the one with the Soviets, will require a national effort toward sustained power creation and planning toward the sustained conversion of power into wartime, crisis, and peacetime capabilities. The United States is in the early stages of evaluating its level of preparedness. There are also important distinctions between the current Information Age and how future technologies will reshape human behavior and our understanding of it, and what that means for power creation, sustainment, and rapid conversion. Theoretical frameworks drawn from the Cold War provide some broad insights, but new approaches will be required.

Ultimately, strategic competition, mobilization, and preparedness are still acts of political will, and no effort will be sustainable that does not have the broad buy-in from the American people. It will require not only engagement from senior leaders and elected officials, but also their bipartisan leadership in explaining, gaining, and keeping political support.

Part two of this article will outline what steps the U.S. and Allies should take. When the brain is a battlefield, American paradigms of conflict preparation and executions must change to meet the challenges of an increasingly connected world.

LCDR Bebber is a Cryptologic Warfare officer assigned to Information Warfare Training Command Corry Station in Pensacola, Florida. The views expressed here do not represent those of the Department of Defense, Department of the Navy or the U.S. government. He welcomes your comments at jbebber@gmail.com

Endnotes

1 Snow, Jen “Radical Leveling Technologies: What They Are, Why They Matter, and the Challenges to Come” Seminar Middlebury Institute of International Studies, Monterey, April 25, 2016.

2 Peter A. Wilson. “Concepts of National Mobilization circa 2036: Implications of Emerging Dual-Purpose and Military Technologies” prepared in support of the “Mobilization in 2030+” tabletop exercise played by the Long-Term Strategy program, (NDU Eisenhower School) March 30, 2016.

3 James Giordano, Joseph DeFranco & L.R. Bremseth “Radical Leveling and Emerging Technologies as Tools of Non-Kinetic Mass Disruption” Invited Perspective Series: Strategic Multilayer Assessment Future of Global Competition & Conflict Effort, February 3, 2019.

4 Markov, Marko S. ““Biological windows”: a tribute to W. Ross Adey.” Environmentalist 25.2-4 (2005): 67-74.

5 Ranzato, M.A., Boureau, Y.L., Chopra, S. and LeCun, Y., March. A unified energy-based framework for unsupervised learning. In Artificial Intelligence and Statistics. 2007. (pp. 371-379).

6 Adey, W.R., Brain interactions with RF/microwave fields generated by mobile phones. International Encyclopedia of Neuroscience. Third Edition. New York: Elsevier. 2003.

7 Rhemann, Maureen. Exploring Asymmetry to Detect Disruption 2018. Journal of Futures Studies 23(2), pp.85-99.

8 Rhemann, Maureen. “Disrupted. Space 2030”; Reperi Analysis Center (RAC). December, 2019.

9 USCC Research Staff, “The National Security Implications of Investments and Products from the People’s Republic of China in the Telecommunications Sector” (Washington, D.C.: U.S. – China Economic and Security Review Commission, January 2011).

10 Robert J. Bebber, “Treating Information as a Strategic Resource to Win the ‘Information War,’” Orbis Summer (2017): 394–403.

Featured Image: A naval honor guard at the in 2012 onboard the Chinese carrier Liaoning. (Xinhua News Agency Photo)

Sea Control 222 – TOPGUN’s Leadership Lessons with Guy Snodgrass & Graham Scarbro

By Jimmy Drennan

Retired Navy pilot and author Guy Snodgrass joins CIMSEC President Jimmy Drennan and TOPGUN grad Graham Scarbro to discuss his latest book, TOPGUN’s Top 10: Leadership Lessons from the Cockpit

Download Sea Control 222- Top Gun Leadership Lessons with Guy Snodgrass and Graham Scarbro


Links

1. TOPGUN’S TOP 10: Leadership Lessons from the Cockpit, by Guy Snodgrass, Sep 15, 2020.
2. “Take a Seat at the Campfire: TOPGUN’s Top Leadership Lessons from the Cockpit,” by Graham Scarbro, CIMSEC, January 10, 2021. 

Jimmy Drennan is President of CIMSEC. Contact him at President@cimsec.org. Contact the Sea Control podcast team at Seacontrol@cimsec.org.

Take a Seat at the Campfire: TOPGUN’s Top Leadership Lessons from the Cockpit

Commander Guy M. Snodgrass, TOPGUN’s TOP 10: Leadership Lessons from the Cockpit, Center Street, 2020, $17.99/hardcover.

By Graham Scarbro

The image is an iconic one in American culture: after a long day on the range, a group of cowboys settles in for the night at the campfire. Under a starry sky and over chow, they regale each other with stories of gunfights, lost loves, strange sights and sounds, cantankerous horses, and lessons learned from a life on the plains.

In naval aviation, pilots and flight officers have a similar tradition. Around a wardroom table or in the squadron ready room, aviators gather around one or a group of storytellers and discuss the same topics as their Wild West forebears. Gunfights are replaced with dogfights, and horses with fighter jets, but “cowboy time” is a revered institution in the Navy’s fighter squadrons. Cowboy time can sometimes yield nothing more than an embarrassing story or two, but more frequently it involves valuable lessons and mentorship, true confessions of lessons learned through trial and error (mostly error), and occasional (quixotic) attempts to fix the Navy’s myriad problems.

Out of these discussions may come life lessons, new policies, and even war-winning tactical innovations like the World War II “Thatch Weave,” but most often cowboy time is a way to connect with each other and share experiences with colleagues and friends.

Enter Commander Guy “Bus” Snodgrass, retired, an FA-18 pilot who upended the Beltway apple cart last year with his memoir Holding the Line: Inside Trump’s Pentagon With Secretary Mattis. Bus’s first book (I will address him by his callsign, the mark of respect between aviators for whom first names are reserved for their mothers and friends from high school days) was a solemn pondering of the highest levels of military bureaucracy, a look at the uncertainty surrounding the relationship between Secretary Mattis and the President. When I read the book, I picked up on the subtext of Bus’s writings: the Pentagon was a long way, physically and spiritually, from the cockpit of a fighter jet. Bus alluded to his time in the jet several times in Holding the Line, mostly to contrast it with the Pentagon, and there was the sense that he was straining to make sense of the byzantine world of the “Five Sided Circus” through the lens of decades in the cockpit.

A year later, and the lessons seem to have crystalized for Bus in his newest book, part leadership lesson and part cowboy time. TOPGUN’s Top 10: Leadership Lessons from the Cockpit (“TOPGUN” written as it should be: one word, all caps) represents a return to Bus’s roots in the jet, perhaps a natural consequence of a tumultuous year of self-reflection, following the publication of Holding the Line after an equally unpredictable stint at the Pentagon.

Bus illustrates his top ten leadership lessons with a series of anecdotes that recall nothing more than an evening in the ready room with shipmates. Stories of screwups big and small that, repeated and examined over the years, shape the course of a career and yield the life lessons learned in the fast-paced community that is naval aviation.

The book is a quick read, and Bus’s facility with speechwriting comes through as each leadership lesson only needs a few pages to make the point. This is typical of strike-fighter culture, in which flight briefers have limited time to communicate essential data before taking to the skies to execute the mission. Another aviation staple, the flight debrief, informs Bus’s use of bold-faced, succinct lessons to punctuate each chapter. After a long flight in which a thousand variables yield incalculable discreet results, identifying and examining key takeaways is a prime skill in aviation, used to good effect in the book. Bus follows his own advice to “Put the bottom line up front,” and despite it being the reviewer’s least favorite military aphorism, he uses the technique to good effect, explaining the intended lesson succinctly, illustrating each with a story, and wrapping up the chapter with a quick revisiting of the main point.

True to his title, Bus draws lessons from the everyday world of strike-fighter aviation and avoids an over-reliance on his days as a squadron commanding officer as a source for lofty words of inspiration. A common trope in leadership tomes is to pick stories designed to underscore the writer’s credibility as a commanding officer: the maneuvering of a billion-dollar warship, the ordering of a thousand troops into danger, the left hook into the Iraqi desert, and so on.

Instead of this approach, Bus chooses stories primarily from times when he was not in command, underscoring that leadership is a function of how one acts, and not necessarily the job one holds. This approach was thoroughly refreshing and a marked difference from many military leadership lessons that begin and end with: “Well, when I was in command…” and despite the fact that Bus was by all accounts a successful commanding officer. Bus’s connection of leadership with the daily grind of life in the cockpit as a junior or mid-level officer makes the stories more relatable. A reader can picture him or herself in so many similar situations, whether confronted with small decisions to do the right thing, the need to prioritize the important over the interesting, or being in need of a wingman.

From the personal: “Don’t Wait to Make a Friend Until You Need One,” to the professional: “Don’t Confuse Activity with Progress,” Bus’s advice applies beyond the cockpit to the boardroom, the office, and, ideally, to the Pentagon. Bus eschews complex acronyms and jargon for the sake of explaining in plain voice what he means. The result is understandable prose that remains accessible to all readers.

Readers with aviation backgrounds will recognize the book as a published version of cowboy time in the ready room, although Bus chooses stories that are more chaste and makes the lessons learned more obvious than in a typical aviator’s sea story. TOPGUN’s Top 10 gives readers a glimpse at why the Navy’s TOPGUN culture sets the standard for honest critique, self-reflection, and progress in the face of challenges both external and internal, large and small.

Commander Graham Scarbro is a Naval Flight Officer on active duty. The views expressed here do not represent those of his chain of command, the U.S. Navy, or the Department of Defense.

Featured Image: ATLANTIC OCEAN (Aug. 1, 2020) An F/A-18F Super Hornet attached to the “Gladiators” of Strike Fighter Squadron (VFA) 106 prepares to launch from the flight deck of the aircraft carrier USS Gerald R. Ford (CVN 78) during flight operations, Aug 1, 2020. (U.S. Navy photo by Mass Communication Specialist Seaman Aimee Ford)

The IMO’s 2021 Cyber Guidelines and the Work that Remains to Secure Ports

By CDR Michael C. Petta

Introduction

The coming of a new year often holds promise for the future. With the coronavirus pandemic dominating center-stage last year, many have their eyes keenly focused on new beginnings with the start of 2021. For some in the maritime industry, especially owners and operators of commercial vessels involved in international trade, 2021 brings a new set of guidelines for protecting vessels—the International Maritime Organization’s (IMO) guidelines on maritime cyber risk management.

These new guidelines, a milestone for maritime safety and security, are the product of collaboration and hard work among shipping industry leaders and IMO Member States. Some in the shipping industry consider this development to be game changing. Whether game changing or not, implementation of this new model is a vital step toward forging a uniform approach for combating cyber threats against vessels.

Notably, however, the 2021 guidelines leave an equally vital, and maybe just as vulnerable, part of the shipping industry—port facilities—without a similar set of principles. Now that the IMO’s vessel guidelines are in the implementation phase, Member States and maritime industry leaders should again prioritize cybersecurity and collaborate at the IMO to develop uniform cybersecurity standards for port facilities.

The IMO and International Maritime Regulation

Before exploring the need for port facility cybersecurity standards, it may be useful to review the IMO’s role in developing international regulations. In 1948, the Member States of the United Nations created the IMCO, which changed its name to IMO in 1982, to facilitate global cooperation with regulation and practices of shipping engaged in international trade. The IMO’s goal is to ensure safe, secure, and sustainable shipping, facilitating trade and friendly relations among all states. Because shipping is historically and inherently an international endeavor, the IMO depends on and promotes cooperation among its 174 Member States to build uniform regulations that support this essential goal. The IMO construct has remained durable and inclusive since its inception.

Few maritime regulatory regimes exemplify the IMO’s impactful work across the globe more than the International Convention for the Safety of Life at Sea (SOLAS). SOLAS is a treaty from the early 1900s drafted in response to, among other things, the infamous sinking of the RMS Titanic. After its initial adoption in 1914, SOLAS further evolved via multiple conventions over many years with the last convention adopted in 1974. Consequently, the treaty is commonly referred to as SOLAS 1974.

In general terms, SOLAS establishes minimum safety standards related to ship construction, equipment, and operation. Countries party to the treaty ensure vessels under their flags comply with SOLAS’s terms by way of nationally administered certification programs. At the time of this writing, 166 countries, representing about 99 percent of the world’s shipping tonnage, were contracting parties to SOLAS 1974.

Although the last SOLAS convention was adopted in 1974, the treaty has been amended various times since then via the IMO’s “tacit acceptance” procedures. And like SOLAS itself, these amendments often followed tragedy, such as when the International Safety Management (ISM) Code was added as a chapter of SOLAS after a 1987 ferry accident in Belgium killed nearly 200 people. Because casualty investigators found the company’s poor safety culture contributed to the accident, IMO Member States developed the ISM Code, a global safety management standard, to combat what one investigator called the “disease of sloppiness” on ships and ashore. Entering into force in 1998, the ISM Code has made “shipping safer and cleaner” for more than two decades.

The IMO’s 2021 Cyber Guidelines

The ISM Code serves as the foundation upon which IMO Member States have built the 2021 guidelines for cyber risk management. The guidelines were consigned in 2017 via three key declarations. First, in Resolution MSC.429(98), Maritime Cyber Risk Management in Safety Management Systems, the IMO affirmed a view that the ISM Code already requires mitigation of cyber risks. Per this view, cyber risk management is already encompassed in the code’s existing general requirement that companies establish safeguards against all risks to ships, personnel, and the environment.

Resolution MSC.429(98) also contains a second important declaration. In it, the IMO encouraged countries to “appropriately address” this preexisting requirement no later than January 1, 2021. Put in more practical terms, now that the anticipated deadline for IMO’s cyber guidelines has arrived with the start of this new year, the IMO encourages Flag States not to issue compliance documents to vessels if cyber risks are not appropriately addressed in the respective safety management system.

The third important IMO declaration is in a July 2017 circular, in which the IMO announced that its Maritime Safety Committee (MSC) and its Facilitation Committee jointly approved specific cyber risk management guidelines. Member States developed these non-mandatory guidelines in partnership with shipping industry leaders to promote compliance with the aforementioned preexisting ISM Code requirement to mitigate cyber risks. In the July 2017 circular, the IMO recommends vessels and Flag States utilize the guidelines during compliance checks to assess whether cyber risks have been appropriately addressed.

As a risk management regime, the ISM Code is expected to adapt well to the management and mitigation of cyber risks. Government officials and maritime industry leaders, experienced from roughly 18 years of ISM Code practice, are expected to rise to the challenge of applying the code in the emerging cyber arena. Moreover, by identifying in the ISM Code a preexisting, albeit seemingly dormant, cyber requirement and then complementing that requirement with non-binding industry guidelines, Member States avoided the lengthy process of amending SOLAS 1974 and the ISM Code.

This is all to say, harnessing the ISM Code’s risk management framework to mitigate cyber threats was an efficient approach. In 2021, Flag States will begin to utilize this approach and work toward global uniformity.

The Work that Remains to Secure Ports

SOLAS 1974 has been amended numerous times, often to implement subsidiary regulations such as the ISM Code. Another subsidiary regulation within SOLAS is the International Ship and Port Facility Security (ISPS) Code, the IMO’s comprehensive mandatory security regime developed after a different tragedy—the 9/11 attacks. Interestingly, as the IMO’s new model for addressing cyber threats was being considered, the MSC reported, via MSC 97/22, that some Member States felt ISPS might be more suitable for addressing cyber threats. Nonetheless, seemingly moved by the United States’ 2017 assertion that the ISM Code’s “application is sufficiently wide to include emerging risks associated with cyber-enabled systems,” the IMO chose to harness the ISM Code, not ISPS, to promote global maritime cyber standardization.

While tapping into the ISM Code’s wide framework was efficient, such resourcefulness also came with a major limitation. Unlike the ISPS Code that covers certain ships and the port facilities that serve them, the ISM Code, even with its broad risk management concepts, applies only to vessels. This limitation means owners and operators of port facilities around the world will not reap the protective benefits realized with 2021’s implementation of IMO’s new cyber guidelines.

Port facilities play a vital role in global trade and rely heavily on technology to operate. As the May 2020 incident at Iran’s Shahid Rajaee port terminal demonstrates, a cyberattack at a port facility can be crippling. Since 2017, each of the four biggest maritime shipping companies in the world have been the victim of a cyberattack, with a recent attack taking place only a few months ago in September 2020. Considering these events, one should have no doubt that port facilities across the globe are presently vulnerable to cyber threats and the potential that these vulnerabilities will be exploited is undeniably real.

With the reality of cyber threats in mind, Member States and maritime industry leaders should collaborate at IMO to develop uniform cybersecurity standards for port facilities, just as they did to protect vessels. Coincidentally, in 2016 the Islamic Republic of Iran offered this exact proposal to the MSC. In MSC 97/4, Iran stressed the critical need for cyber risk management guidelines specific to ports. This proposal, somewhat prophetically considering the 2020 events at the Port of Shahid Rajaee, underscored the serious consequences a cyberattack could have on a port and on critical infrastructure.

While the MSC did not act on Iran’s proposal, in December 2016 the MSC expressly thanked Iran for its recommendation and “invited interested Member States to submit a proposal” for consideration at a future MSC session. No record has been found that any Member State has submitted such a proposal. Now is the time for Member States to accept the invitation.

Conclusion

The IMO’s guidelines for managing cyber risks on vessels are a key development for the shipping industry. Flag States and shipping companies worldwide now have an industry-sponsored framework from which to recurringly assess cyber safeguards on ships. There is more work to be done, however, to appropriately protect the rest of the maritime transportation system. Like Flag States and their vessels, Port States and their ports require guidelines to ensure cyber risks are uniformly addressed at maritime facilities. With 2021 finally ushering in cyber standards for vessels, now is the time for Member States, in partnership with the maritime industry, to assemble at the IMO and develop similar standards to secure ports across the globe.

Commander Michael C. Petta, USCG, serves as Associate Director for Maritime Operations and professor of international law in the Stockton Center for International Law at the U.S. Naval War College. The views presented are those of the author and do not necessarily reflect the policy or position of the U.S. Coast Guard, the Department of Homeland Security, the U.S. Navy, the Naval War College, or the Department of Defense.

Featured Image: CMA CGM’s Benjamin Franklin at the Port of Los Angeles, December 26, 2015. (Photo via Wikimedia Commons)