<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>All Posts - Maritimeinfosec.org</title><link>https://maritimeinfosec.org/posts/</link><description>All Posts | Maritimeinfosec.org</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright Maritimeinfosec.org 2018-2026</copyright><lastBuildDate>Tue, 07 Apr 2026 19:44:00 +0000</lastBuildDate><atom:link href="https://maritimeinfosec.org/posts/" rel="self" type="application/rss+xml"/><item><title>NORMA Cyber 2026 Report: a maritime threat that is primarily geopolitical, more hybrid than spectacular</title><link>https://maritimeinfosec.org/norma-cyber-2026-ata-analysis/</link><pubDate>Tue, 07 Apr 2026 19:44:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/norma-cyber-2026-ata-analysis/</guid><description><![CDATA[<p><a href="https://www.normacyber.no/news/ata26" target="_blank" rel="noopener noreferrer ">The latest NORMA Cyber annual report</a> has the merit of placing maritime cybersecurity back where it now truly operates: in a space saturated with geopolitical tensions, logistical interdependencies, and blurred boundaries between cyber, physical, and informational domains. Its main outlook for 2026 (for those who still believe in cyber crystal balls) is that the structuring risk is not so much the &ldquo;big&rdquo; destructive attack as the accumulation of intelligence operations, opportunistic disruptions, and hybrid effects on already strained logistical and operational chains. In that sense, it is a less alarmist report than it may appear at first glance, and that is probably its main strength.</p>]]></description></item><item><title>Maritime phishing: analysis of US Coast Guard cyber bulletin MCB 01-26</title><link>https://maritimeinfosec.org/uscg-maritime-cyber-bulletin-phishing/</link><pubDate>Sat, 21 Mar 2026 18:00:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/uscg-maritime-cyber-bulletin-phishing/</guid><description>&lt;p>On March 18, 2026, the US Coast Guard published a cyber bulletin titled &lt;em>MCB 01-26: Awareness for Increased Phishing&lt;/em> (available at the end of this article). This short document aims to shed light on the evolution of cyber threats in the maritime sector, and more specifically on the growing role of phishing attacks in incidents affecting the Marine Transportation System (MTS). It is not specified—although it naturally comes to mind—whether the release of this bulletin is directly linked to the current conflict in the Persian Gulf and the risk of phishing attacks originating from Iran.&lt;/p></description></item><item><title>When Marine Technology, Ocean Development and the Law of the Sea addresses maritime cybersecurity, GNSS risks and autonomous vessels</title><link>https://maritimeinfosec.org/marine-technology-law-sea-cyber-gnss/</link><pubDate>Sat, 21 Mar 2026 14:30:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/marine-technology-law-sea-cyber-gnss/</guid><description><![CDATA[<p>The collective volume <em>Marine Technology, Ocean Development and the Law of the Sea</em> (2026), <a href="https://www.cambridge.org/core/services/aop-cambridge-core/content/view/80E6678C4CFC6A52B73D5786C703CF43/9781009760188AR.pdf/Marine_Technology__Ocean_Development_and_the_Law_of_the_Sea.pdf" target="_blank" rel="noopener noreferrer ">available as open access</a>, devotes significant attention to digital issues, with numerous occurrences of the term “cyber” and several chapters more broadly dedicated to the security of maritime systems.</p>
<h2 id="gnss-jamming-and-spoofing-a-clearly-documented-risk">GNSS, jamming and spoofing: a clearly documented risk</h2>
<p>The chapter on maritime cybersecurity provides a detailed description of the threats affecting GNSS systems. It recalls that associated attacks (spoofing, jamming) can lead to a loss of reliable positioning and to navigation errors, directly impacting maritime safety. It also emphasizes that users must “plan” (or at least anticipate!) “potential GPS disruptions, authenticate the reliability of received data and consider alternative positioning sources” (cyber chapter, pp. 278–280).</p>]]></description></item><item><title>Ireland: a 2026–2030 maritime strategy addressing cyber issues and subsea cables</title><link>https://maritimeinfosec.org/ireland-maritime-strategy-2026-cyber-cables/</link><pubDate>Sat, 21 Mar 2026 12:00:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/ireland-maritime-strategy-2026-cyber-cables/</guid><description><![CDATA[<p>Ireland published in February 2026 its first national maritime security strategy (<a href="https://www.gov.ie/en/department-of-defence/publications/national-maritime-security-strategy-20262030/" target="_blank" rel="noopener noreferrer "><em>National Maritime Security Strategy 2026–2030</em></a>).</p>
<p>This document marks an important evolution for this island state, which we particularly appreciate, highly dependent on its maritime infrastructure, but historically limited in terms of surveillance and protection capabilities over its maritime domain.</p>
<p>The strategy explicitly identifies the protection of critical infrastructure as a central issue, in particular subsea telecommunications cables and energy interconnectors (such as the <a href="https://www.celticinterconnector.eu/" target="_blank" rel="noopener noreferrer ">Celtic Interconnector</a>). These infrastructures are presented as essential to the country’s economic and digital functioning, in a context where a significant share of transatlantic data flows passes close to Irish waters.</p>]]></description></item><item><title>Analysis of the BIMCO webinar on solutions against GNSS spoofing and jamming</title><link>https://maritimeinfosec.org/analysis-bimco-webinar-gnss-solutions-spoofing-jamming/</link><pubDate>Thu, 19 Mar 2026 14:43:38 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/analysis-bimco-webinar-gnss-solutions-spoofing-jamming/</guid><description><![CDATA[<p><a href="https://maritimeinfosec.org/en/lost-at-sea-confronting-GPS-jamming-and-spoofing-in-maritime-operations/" target="_blank" rel="noopener noreferrer ">Following a previous webinar</a>, in February 2026, in connection with current developments in the Persian Gulf, BIMCO hosted <a href="https://www.bimco.org/news-insights/video/2026/0224-gnss/" target="_blank" rel="noopener noreferrer ">a webinar dedicated to GNSS interference</a>. I encourage you to watch it, and here is a brief personal analysis. This webinar had an immediate merit: amid the numerous publications on the subject (particularly on LinkedIn), and although the topic is not new (especially since the conflict between Russia and Ukraine), it did not treat jamming and spoofing as a purely theoretical issue reserved for specialists, nor from a purely alarmist perspective, but as a now very real operational risk for commercial navigation.</p>]]></description></item><item><title>GNSS jamming and spoofing: when a hypothesis gradually becomes a... fact</title><link>https://maritimeinfosec.org/gnss-jamming-spoofing-oman-collision/</link><pubDate>Sun, 15 Mar 2026 10:00:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/gnss-jamming-spoofing-oman-collision/</guid><description><![CDATA[<p>Over the past few days, there has been a noticeable increase in publications discussing GNSS interference, particularly GPS jamming and spoofing.</p>
<p>This brings me back to a case that is frequently cited in public and private reports, both in France and internationally: the collision that occurred off the coast of Oman between two vessels, which continues to be mentioned as an example of a collision “linked” to GPS spoofing.</p>
<p>What catches my attention is not the hypothesis itself.<br>
GNSS interference in that region is documented and certainly not a new phenomenon. It obviously deserves to be taken seriously.</p>]]></description></item><item><title>Cyber Europe 2026: EU prepares cybersecurity exercise targeting maritime transport</title><link>https://maritimeinfosec.org/cyber-europe-2026-maritime-cybersecurity-exercise/</link><pubDate>Sun, 15 Mar 2026 09:00:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/cyber-europe-2026-maritime-cybersecurity-exercise/</guid><description><![CDATA[<p>The European Union Agency for Cybersecurity (ENISA) is preparing a new edition of its pan-European Cyber Europe cybersecurity exercise, scheduled for June 2026.</p>
<p>This 8th edition of the exercise series will focus on critical transport infrastructure, particularly the maritime and rail sectors, both considered highly critical under the NIS2 Directive.</p>
<p>Official exercise page:<br>
<a href="https://www.enisa.europa.eu/topics/skills-and-competences-for-companies/cyber-europe" target="_blank" rel="noopener noreferrer ">https://www.enisa.europa.eu/topics/skills-and-competences-for-companies/cyber-europe</a></p>
<hr>
<h1 id="a-pan-european-cyber-crisis-exercise">A pan-European cyber crisis exercise</h1>
<p>Organised every two years since 2010, the Cyber Europe series simulates complex cyber crises involving multiple EU Member States and organisations.</p>]]></description></item><item><title>EU Ports Strategy highlights rising cyber threats targeting ports.</title><link>https://maritimeinfosec.org/eu-ports-strategy-cyber-threats/</link><pubDate>Wed, 04 Mar 2026 09:05:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/eu-ports-strategy-cyber-threats/</guid><description><![CDATA[<p>On 4 March 2026, the European Commission also released a second communication specifically focused on European ports: the EU Ports Strategy.</p>
<p>This document complements the Industrial Maritime Strategy published the same day and focuses on the strategic role of ports in logistics chains, trade and European economic security.</p>
<p>The full document is available here:<br>
<a href="https://transport.ec.europa.eu/document/download/8a1a9516-8efd-44ca-b308-4b3cafc59f38_en?filename=communication_on_EU_ports_strategy.pdf" target="_blank" rel="noopener noreferrer ">https://transport.ec.europa.eu/document/download/8a1a9516-8efd-44ca-b308-4b3cafc59f38_en?filename=communication_on_EU_ports_strategy.pdf</a></p>
<p>The Commission highlights that European ports have become critical infrastructure for the European economy and supply chains.</p>]]></description></item><item><title>EU Industrial Maritime Strategy highlights emerging cybersecurity risks.</title><link>https://maritimeinfosec.org/eu-industrial-maritime-strategy-cybersecurity/</link><pubDate>Wed, 04 Mar 2026 09:00:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/eu-industrial-maritime-strategy-cybersecurity/</guid><description><![CDATA[<p>On 4 March 2026, the European Commission released two separate communications outlining its vision for the future of the maritime sector: an Industrial Maritime Strategy and a dedicated strategy for European ports.</p>
<p>The first document, the EU Industrial Maritime Strategy, aims to strengthen the competitiveness and strategic autonomy of Europe’s maritime industries.</p>
<p>The full document is available here:<br>
<a href="https://transport.ec.europa.eu/document/download/2cda36ec-b5fc-4cc9-9091-a8014ba8177e_en?filename=communication_on_EU_industrial_maritime_strategy_3.pdf" target="_blank" rel="noopener noreferrer ">https://transport.ec.europa.eu/document/download/2cda36ec-b5fc-4cc9-9091-a8014ba8177e_en?filename=communication_on_EU_industrial_maritime_strategy_3.pdf</a></p>
<p>Beyond industrial and energy considerations, the strategy also highlights the growing importance of security challenges in the maritime domain.</p>]]></description></item><item><title>Foreign interference on a ferry in Sète: between Raspberry Pi, RAT and media overreaction</title><link>https://maritimeinfosec.org/ferry-fantastic-raspberry-pi-internal-threat/</link><pubDate>Wed, 24 Dec 2025 17:30:00 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/ferry-fantastic-raspberry-pi-internal-threat/</guid><description><![CDATA[<p>The case of the ferry <em>Fantastic</em> (operated by the Italian company Grandi Navi Veloci, GNV) in Sète, in December 2025, is interesting for several reasons. Not so much for its technical sophistication — which remains limited — but for what it reveals about how cyber incidents are handled, particularly in the maritime domain.</p>
<p>Very quickly, the event was portrayed as a potentially serious case of foreign interference, or even as a scenario involving remote control of a vessel. The reality, as it gradually emerges from publicly available information, is more nuanced — and probably more instructive.</p>]]></description></item></channel></rss>