SlideShare a Scribd company logo
Respond to discussion with 250 words:
The focus of maritime security post September 11th was to
improve the physical infrastructure of port facilities and vessels
by implementing security plans, identification systems,
detection methods, and strict inspection and clearance
procedures for cargo and personnel. There are numerous
legislative pieces which have created a layered security
approach to protecting the marine industry (CSI, C-TPAT,
foreign port assessment, etc.). According to the U.S.
Department of State, this layered approach “aligns all Federal
government maritime security programs and initiatives into a
comprehensive and cohesive national effort involving
appropriate Federal, State, local, and private sector entities”
(2005, p. ii). While there have been improvements in maritime
security to protect against physical attacks, little has been done
in terms of cyberattacks.
When enacted, the Maritime Transportation Security Act and
Safe Accountability For Every Port Act did not include
elements of cybersecurity, and there is still no such legislation
in place today. The United States Coast Guard has not
conducted a thorough assessment on cyber risks, and until
properly done, “maritime stakeholders will be less able to
appropriately plan and allocate resources to protect the
maritime transportation mode” (USGAO, 2014, p. 17). Ports are
concerned with operations, vessel movement, and cargo flow.
Cyber threats are not a priority and are not considered a large
enough to warrant action. According to Kramek, “not only is
cybersecurity awareness in U.S. port facilities generally low,
but the cybersecurity culture in U.S. port facilities is generally
lacking” (2013, p. 27). This is extremely concerning, because
ports across the nation use technology to manage all aspects of
their operations. A cyber-attack would devastate port and
economic activity, especially if it targeted the Global
Positioning System (GPS).
The Global Positioning System is a satellite based navigation
system which can accurately determine an object’s position on
the earth. GPS was developed by the United States military in
the 1970’s, and became available for public use some time after.
It’s an extremely valuable system and has transformed the
transportation and logistics industry. In terms of marine
applications, it “is playing an increasingly important role in the
management of maritime port facilities” (NCO, 2006, para. 6).
Port and marine operators heavily rely on GPS to monitor cargo
and ships deployed around the world, which would have a
significant impact on the day to day operations if hacked.
A cyber event on GPS within a port system could disrupt
operations, sending a ripple effect, much like a tsunami,
throughout supply chains. Kugler explains the ease in which
GPS can be “spoofed”, and “cargo shipments are at risk,
especially dangerous or high-value ones that are required to
follow designated GPS routes” (2017, p. 19). Hijacking GPS
receivers would allow attackers to dictate where and when a
container is moved. It could be offloaded from a ship in the
wrong port, sent on a train, truck, or warehouse facility.
Suppliers would lose track of their shipments and suffer
enormous financial loses. Port authorities would have no choice
but to shut down operations until the GPS signal could be
restored. A shutdown would cause shipping companies to divert
their ships to other ports, leading to delays and lost revenue.
Ships alongside the berth at the affected port would have no
choice but to wait idly, until cargo operations resumed.
Financial loses could reach billions, as proven by the port
closures on the West Coast due to a union disputes and contract
negotiations a few years ago.
Respond to discussion with 250 wordsThe focus of maritime sec

More Related Content

Similar to Respond to discussion with 250 wordsThe focus of maritime sec

Respone each  with 110 Response 1According to Investopedia .docx
Respone each  with 110 Response 1According to Investopedia .docxRespone each  with 110 Response 1According to Investopedia .docx
Respone each  with 110 Response 1According to Investopedia .docx
wilfredoa1
 
Gabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docxGabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docx
hanneloremccaffery
 
Damian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxDamian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docx
simonithomas47935
 
In 2012, the Commonwealth of Virginia contemplated outsourcing the m.pdf
In 2012, the Commonwealth of Virginia contemplated outsourcing the m.pdfIn 2012, the Commonwealth of Virginia contemplated outsourcing the m.pdf
In 2012, the Commonwealth of Virginia contemplated outsourcing the m.pdf
umamaheshwari991
 
Cost-Benefit Analysis of Sydney's Second Airport
Cost-Benefit Analysis of Sydney's Second AirportCost-Benefit Analysis of Sydney's Second Airport
Cost-Benefit Analysis of Sydney's Second Airport
Jonathon Flegg
 

Similar to Respond to discussion with 250 wordsThe focus of maritime sec (20)

Is the future of shipping in ships and ports, or chips and blocks?
Is the future of shipping in ships and ports, or chips and blocks?Is the future of shipping in ships and ports, or chips and blocks?
Is the future of shipping in ships and ports, or chips and blocks?
 
C sigma short abstract - v. 2
C sigma short abstract - v. 2C sigma short abstract - v. 2
C sigma short abstract - v. 2
 
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
20220613_CYBER SECURITY THEORETICAL TRAINING_rev8.pptx
 
Respone each  with 110 Response 1According to Investopedia .docx
Respone each  with 110 Response 1According to Investopedia .docxRespone each  with 110 Response 1According to Investopedia .docx
Respone each  with 110 Response 1According to Investopedia .docx
 
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdfGramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
 
Gabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docxGabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docx
 
Maritime cyber security threats & consequence part 2
Maritime cyber security  threats & consequence part 2Maritime cyber security  threats & consequence part 2
Maritime cyber security threats & consequence part 2
 
Damian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docxDamian Gillespie1. How does port facility technology interface w.docx
Damian Gillespie1. How does port facility technology interface w.docx
 
O - Transportation Event Data Recorders
O - Transportation Event Data RecordersO - Transportation Event Data Recorders
O - Transportation Event Data Recorders
 
403 3
403 3403 3
403 3
 
In 2012, the Commonwealth of Virginia contemplated outsourcing the m.pdf
In 2012, the Commonwealth of Virginia contemplated outsourcing the m.pdfIn 2012, the Commonwealth of Virginia contemplated outsourcing the m.pdf
In 2012, the Commonwealth of Virginia contemplated outsourcing the m.pdf
 
IHS Markit - Maritime Trade - Making headway
IHS Markit - Maritime Trade - Making headwayIHS Markit - Maritime Trade - Making headway
IHS Markit - Maritime Trade - Making headway
 
IoT_sensors.pdf
IoT_sensors.pdfIoT_sensors.pdf
IoT_sensors.pdf
 
DIGITALISATION IN SHIPPING & LOGISTICS
DIGITALISATION IN SHIPPING & LOGISTICSDIGITALISATION IN SHIPPING & LOGISTICS
DIGITALISATION IN SHIPPING & LOGISTICS
 
FMASP_ShowAudio_short
FMASP_ShowAudio_shortFMASP_ShowAudio_short
FMASP_ShowAudio_short
 
Back to the Future: OIESS 2025, Burrows and Rosetta
Back to the Future: OIESS 2025, Burrows and RosettaBack to the Future: OIESS 2025, Burrows and Rosetta
Back to the Future: OIESS 2025, Burrows and Rosetta
 
Back to the Future: OIESS 2025, Burrows and Rosetta
Back to the Future: OIESS 2025, Burrows and RosettaBack to the Future: OIESS 2025, Burrows and Rosetta
Back to the Future: OIESS 2025, Burrows and Rosetta
 
Cargo security
Cargo securityCargo security
Cargo security
 
Cost-Benefit Analysis of Sydney's Second Airport
Cost-Benefit Analysis of Sydney's Second AirportCost-Benefit Analysis of Sydney's Second Airport
Cost-Benefit Analysis of Sydney's Second Airport
 
What will it look like
What will it look likeWhat will it look like
What will it look like
 

More from mickietanger

Discussion1 Racism and PrivilegeIn many societies certain grou.docx
Discussion1  Racism and PrivilegeIn many societies certain grou.docxDiscussion1  Racism and PrivilegeIn many societies certain grou.docx
Discussion1 Racism and PrivilegeIn many societies certain grou.docx
mickietanger
 
Discussion Workflow ModelingWorkflow modeling is widely used .docx
Discussion Workflow ModelingWorkflow modeling is widely used .docxDiscussion Workflow ModelingWorkflow modeling is widely used .docx
Discussion Workflow ModelingWorkflow modeling is widely used .docx
mickietanger
 
Discussion Unit 7 - Option 2 Mirror of Society Option 2 Art .docx
Discussion Unit 7 - Option 2 Mirror of Society Option 2 Art .docxDiscussion Unit 7 - Option 2 Mirror of Society Option 2 Art .docx
Discussion Unit 7 - Option 2 Mirror of Society Option 2 Art .docx
mickietanger
 
Discussion wee 4Required[removed]Hall, R. E. (2008). E.docx
Discussion wee 4Required[removed]Hall, R. E. (2008). E.docxDiscussion wee 4Required[removed]Hall, R. E. (2008). E.docx
Discussion wee 4Required[removed]Hall, R. E. (2008). E.docx
mickietanger
 
Discussion Social Work CompetenceThe term competence connotes.docx
Discussion Social Work CompetenceThe term competence connotes.docxDiscussion Social Work CompetenceThe term competence connotes.docx
Discussion Social Work CompetenceThe term competence connotes.docx
mickietanger
 
Discussion The Systems Development Life Cycle and the Nurse Infor.docx
Discussion The Systems Development Life Cycle and the Nurse Infor.docxDiscussion The Systems Development Life Cycle and the Nurse Infor.docx
Discussion The Systems Development Life Cycle and the Nurse Infor.docx
mickietanger
 
Discussion Respiratory AlterationsIn clinical settings, patients .docx
Discussion Respiratory AlterationsIn clinical settings, patients .docxDiscussion Respiratory AlterationsIn clinical settings, patients .docx
Discussion Respiratory AlterationsIn clinical settings, patients .docx
mickietanger
 
Discussion Racism and PrivilegeIn many societies certain groups p.docx
Discussion Racism and PrivilegeIn many societies certain groups p.docxDiscussion Racism and PrivilegeIn many societies certain groups p.docx
Discussion Racism and PrivilegeIn many societies certain groups p.docx
mickietanger
 
Discussion questionThe media, and Hollywood in particular, r.docx
Discussion questionThe media, and Hollywood in particular, r.docxDiscussion questionThe media, and Hollywood in particular, r.docx
Discussion questionThe media, and Hollywood in particular, r.docx
mickietanger
 
Discussion QuestionsUser-interface design techniques and human-com.docx
Discussion QuestionsUser-interface design techniques and human-com.docxDiscussion QuestionsUser-interface design techniques and human-com.docx
Discussion QuestionsUser-interface design techniques and human-com.docx
mickietanger
 

More from mickietanger (20)

DISCUSSIONDiscuss how Platos four cardinal virtues might help m.docx
DISCUSSIONDiscuss how Platos four cardinal virtues might help m.docxDISCUSSIONDiscuss how Platos four cardinal virtues might help m.docx
DISCUSSIONDiscuss how Platos four cardinal virtues might help m.docx
 
Discussion1 Racism and PrivilegeIn many societies certain grou.docx
Discussion1  Racism and PrivilegeIn many societies certain grou.docxDiscussion1  Racism and PrivilegeIn many societies certain grou.docx
Discussion1 Racism and PrivilegeIn many societies certain grou.docx
 
Discussion(200 Word min)Identify some common miscellaneous itemize.docx
Discussion(200 Word min)Identify some common miscellaneous itemize.docxDiscussion(200 Word min)Identify some common miscellaneous itemize.docx
Discussion(200 Word min)Identify some common miscellaneous itemize.docx
 
Discussion Workflow ModelingWorkflow modeling is widely used .docx
Discussion Workflow ModelingWorkflow modeling is widely used .docxDiscussion Workflow ModelingWorkflow modeling is widely used .docx
Discussion Workflow ModelingWorkflow modeling is widely used .docx
 
DiscussionAshley is an attorney who specializes in family law. She.docx
DiscussionAshley is an attorney who specializes in family law. She.docxDiscussionAshley is an attorney who specializes in family law. She.docx
DiscussionAshley is an attorney who specializes in family law. She.docx
 
Discussion Unit 7 - Option 2 Mirror of Society Option 2 Art .docx
Discussion Unit 7 - Option 2 Mirror of Society Option 2 Art .docxDiscussion Unit 7 - Option 2 Mirror of Society Option 2 Art .docx
Discussion Unit 7 - Option 2 Mirror of Society Option 2 Art .docx
 
Discussion Topic 5Monopoly is nearly always seen as something un.docx
Discussion Topic 5Monopoly is nearly always seen as something un.docxDiscussion Topic 5Monopoly is nearly always seen as something un.docx
Discussion Topic 5Monopoly is nearly always seen as something un.docx
 
Discussion that demonstrate that Ive read the assigned reading and .docx
Discussion that demonstrate that Ive read the assigned reading and .docxDiscussion that demonstrate that Ive read the assigned reading and .docx
Discussion that demonstrate that Ive read the assigned reading and .docx
 
Discussion wee 4Required[removed]Hall, R. E. (2008). E.docx
Discussion wee 4Required[removed]Hall, R. E. (2008). E.docxDiscussion wee 4Required[removed]Hall, R. E. (2008). E.docx
Discussion wee 4Required[removed]Hall, R. E. (2008). E.docx
 
Discussion Social Work CompetenceThe term competence connotes.docx
Discussion Social Work CompetenceThe term competence connotes.docxDiscussion Social Work CompetenceThe term competence connotes.docx
Discussion Social Work CompetenceThe term competence connotes.docx
 
Discussion The Systems Development Life Cycle and the Nurse Infor.docx
Discussion The Systems Development Life Cycle and the Nurse Infor.docxDiscussion The Systems Development Life Cycle and the Nurse Infor.docx
Discussion The Systems Development Life Cycle and the Nurse Infor.docx
 
Discussion response 250 to 300 words to the message below with your .docx
Discussion response 250 to 300 words to the message below with your .docxDiscussion response 250 to 300 words to the message below with your .docx
Discussion response 250 to 300 words to the message below with your .docx
 
Discussion QuestionWomen have a long history of being considered i.docx
Discussion QuestionWomen have a long history of being considered i.docxDiscussion QuestionWomen have a long history of being considered i.docx
Discussion QuestionWomen have a long history of being considered i.docx
 
Discussion Respiratory AlterationsIn clinical settings, patients .docx
Discussion Respiratory AlterationsIn clinical settings, patients .docxDiscussion Respiratory AlterationsIn clinical settings, patients .docx
Discussion Respiratory AlterationsIn clinical settings, patients .docx
 
Discussion Racism and PrivilegeIn many societies certain groups p.docx
Discussion Racism and PrivilegeIn many societies certain groups p.docxDiscussion Racism and PrivilegeIn many societies certain groups p.docx
Discussion Racism and PrivilegeIn many societies certain groups p.docx
 
Discussion questionThe media, and Hollywood in particular, r.docx
Discussion questionThe media, and Hollywood in particular, r.docxDiscussion questionThe media, and Hollywood in particular, r.docx
Discussion questionThe media, and Hollywood in particular, r.docx
 
Discussion QuestionsUser-interface design techniques and human-com.docx
Discussion QuestionsUser-interface design techniques and human-com.docxDiscussion QuestionsUser-interface design techniques and human-com.docx
Discussion QuestionsUser-interface design techniques and human-com.docx
 
Discussion QuestionsWhat purpose does systems analysis serve Is.docx
Discussion QuestionsWhat purpose does systems analysis serve Is.docxDiscussion QuestionsWhat purpose does systems analysis serve Is.docx
Discussion QuestionsWhat purpose does systems analysis serve Is.docx
 
Discussion QuestionReview the Healthy People 2020 objectives for t.docx
Discussion QuestionReview the Healthy People 2020 objectives for t.docxDiscussion QuestionReview the Healthy People 2020 objectives for t.docx
Discussion QuestionReview the Healthy People 2020 objectives for t.docx
 
Discussion Questions Chapter 11 & 12 Intermediate AccountingP.docx
Discussion Questions Chapter 11 & 12  Intermediate AccountingP.docxDiscussion Questions Chapter 11 & 12  Intermediate AccountingP.docx
Discussion Questions Chapter 11 & 12 Intermediate AccountingP.docx
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 

Recently uploaded (20)

Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 

Respond to discussion with 250 wordsThe focus of maritime sec

  • 1. Respond to discussion with 250 words: The focus of maritime security post September 11th was to improve the physical infrastructure of port facilities and vessels by implementing security plans, identification systems, detection methods, and strict inspection and clearance procedures for cargo and personnel. There are numerous legislative pieces which have created a layered security approach to protecting the marine industry (CSI, C-TPAT, foreign port assessment, etc.). According to the U.S. Department of State, this layered approach “aligns all Federal government maritime security programs and initiatives into a comprehensive and cohesive national effort involving appropriate Federal, State, local, and private sector entities” (2005, p. ii). While there have been improvements in maritime security to protect against physical attacks, little has been done in terms of cyberattacks. When enacted, the Maritime Transportation Security Act and Safe Accountability For Every Port Act did not include elements of cybersecurity, and there is still no such legislation in place today. The United States Coast Guard has not conducted a thorough assessment on cyber risks, and until properly done, “maritime stakeholders will be less able to appropriately plan and allocate resources to protect the maritime transportation mode” (USGAO, 2014, p. 17). Ports are concerned with operations, vessel movement, and cargo flow. Cyber threats are not a priority and are not considered a large enough to warrant action. According to Kramek, “not only is cybersecurity awareness in U.S. port facilities generally low, but the cybersecurity culture in U.S. port facilities is generally lacking” (2013, p. 27). This is extremely concerning, because ports across the nation use technology to manage all aspects of their operations. A cyber-attack would devastate port and
  • 2. economic activity, especially if it targeted the Global Positioning System (GPS). The Global Positioning System is a satellite based navigation system which can accurately determine an object’s position on the earth. GPS was developed by the United States military in the 1970’s, and became available for public use some time after. It’s an extremely valuable system and has transformed the transportation and logistics industry. In terms of marine applications, it “is playing an increasingly important role in the management of maritime port facilities” (NCO, 2006, para. 6). Port and marine operators heavily rely on GPS to monitor cargo and ships deployed around the world, which would have a significant impact on the day to day operations if hacked. A cyber event on GPS within a port system could disrupt operations, sending a ripple effect, much like a tsunami, throughout supply chains. Kugler explains the ease in which GPS can be “spoofed”, and “cargo shipments are at risk, especially dangerous or high-value ones that are required to follow designated GPS routes” (2017, p. 19). Hijacking GPS receivers would allow attackers to dictate where and when a container is moved. It could be offloaded from a ship in the wrong port, sent on a train, truck, or warehouse facility. Suppliers would lose track of their shipments and suffer enormous financial loses. Port authorities would have no choice but to shut down operations until the GPS signal could be restored. A shutdown would cause shipping companies to divert their ships to other ports, leading to delays and lost revenue. Ships alongside the berth at the affected port would have no choice but to wait idly, until cargo operations resumed. Financial loses could reach billions, as proven by the port closures on the West Coast due to a union disputes and contract negotiations a few years ago.