Cyber Operators Course (Op) – Module 3

Different Risks and terminology – The Deep/Dark Web

It is not known how large the Deep Web is, but many experts estimate that search engines crawl and index less than 1% of all Web content that can be accessed over the internet. That part of the Internet which is crawled and indexed by search engines is sometimes referred to as the surface Web which is what we are used to surfing.

Many of the hacks we have used in this course, and to test ship’s equipment, are readily available to download form the deep web.



*Source: You tube video  www.youtube.com/watch?v=kigKU6eEpOQ

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Hacking Cellular Data

OpenBTS.org is an open source software project dedicated to making telco protocols and traditionally complex, proprietary hardware systems with Internet Protocol and a flexible software architecture. The OpenBTS software is a Linux application that uses a software-defined radio to present a standard 3GPP air interface to user devices, while simultaneously presenting those devices as SIP endpoints to the Internet.

Cyber Operators Course (Op) – Module 3

Different Risks and terminology – What defines an attack or crime?

Definition of Cyber Security – “measures taken to protect a computer or computer system (as on the Internet) against unauthorised access or attack”

Definition of cyber – “Relating to or characteristic of the culture of computers, information technology, and virtual reality.”

Definition of Cyber Attack – “An attempt by hackers to damage or destroy a computer network or system. “

Definition of Cyber Terror – “An organisation, working independently of a nation state, conducting terrorist activities through the medium of cyberspace.”

Definition of Cyber Crime – Conducted by individuals working alone, or in organised groups, intent on extracting money, data or causing disruption, cyber crime can take many forms, including the acquisition of credit/debit card data and intellectual property, and impairing the operations of a website or service.



*Above Image and quote Source: MBN (Market Business News)

hacker is somebody who gains unauthorised access to computers, in order to access data by breaking password codes. To hack means to break a password code, hence the name of the person. Anybody who deliberately gains access to a protected computer system is a hacker. People hack into systems either to gather information, shut down systems, or simply for the thrill of it.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Hacking Cellular Data

Crews should therefore be very aware of the potential for their network traffic to be intercepted whilst on shore or close to shore. Operators should also be alert to the potential for their crews data and communications to HQ by mobile phone and via the vessel when close to shore being intercepted.

A good defence against cellular (or any data) interception is to run a personal VPN from ones phone and laptop. Whilst free VPN software is available, there is some variability in the quality. Advertising is often used to compensate the VPN vendor. Instead, you may consider paying for a VPN service, given its importance to your privacy and resistance to data interception.

Business mobile devices should have a VPN or mobile device management (‘MDM’) platform installed. This provides an additional layer of defence against hacking. An MDM creates a secure environment within the smart phone or tablet that protects sensitive corporate data.

If no MDM or VPN is present, it is relatively straightforward for a hacker to fool the user in to allowing them to intercept sensitive data.

Cyber Operators Course (Op) – Module 3

Different Risks and terminology – What defines an attack or crime?

Definition of Cyber War – A nation state conducting sabotage and espionage against another nation in order to cause disruption or to extract data. This could involve the use of Advanced Persistent Threats (APTs).

Definition of Cyberspace – The notional environment in which communication over computer networks occurs.

Ransomware – A type of malware which restricts access to the computer system that it infects. Ransomware encrypts data on your PC so you can’t access or use your files. Normally many Ransomware attacks won’t unencrypt your data until you pay a large fee to do so.

Cyber espionage – Is becoming the weapon of choice for many national governments – no matter how tight-lipped they may be about any involvement in such activities to undermine their enemies. As Nesbitt said, “the next world war will be fought on a keyboard,” We should expect cyber espionage attacks to increase in frequency in 2016.

Cyber Theft – The stealing of financial information is nothing new. With stolen credit or debit card data on the black market, this makes for a well-established and lucrative business for cyber criminals.

Insecure Passwords – Easy to crack passwords will continue to be a big risk and is likely to be the first year when the password starts to be phased out in favour of a number of different multi-factor options. Next year may well be the first year of multi-factor by default,”Digital Shadows”, a cyber threat intelligence company said.

Internet of things – The ‘Internet of Things’ is a term that describes a world in which physical devices like home appliances and cars are connected to the Internet and can be synced so users can control everything from a single app. The Internet of Things will be integrated into every market you can think of and especially the marine industry network to save money and time, but it hasn’t been designed with security in mind. There are millions of hackers out there that could compromise these interconnected systems. We have sacrificed security for efficiency.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Wi-Fi, in the context of a satcom terminal

As with cellular communications, the vessel internet access can be connected to shore via Wi-Fi to reduce satellite airtime and mobile data costs.

This switch is often seamless with modern equipment, so the crew may not even realise that the crew Wi-Fi network has moved from satellite to cellular to shore Wi-Fi, though the bandwidth and response times may improve dramatically!

As the switch from satellite to Wi-Fi occurs, the crew and vessel are exposed to different security threats. If the basic security advice around satellite terminals is followed, data is likely to be relatively safe. As we move to Wi-Fi communications, any unencrypted data from the crew laptops, phones and any business systems aboard the vessel could be exposed to rogue Wi-Fi hotspots or hackers that have compromised the shore Wi-Fi network in port.

Operators would be well advised to ensure that a VPN is used for ALL communications on the business network. Crews would also be well advised to use a personal VPN.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Vulnerability of Ship Satellite Terminals

What could go wrong?

There are already numerous anecdotal incidents relating to ship hacking through satellite terminals. A number of ‘white hat’ or ethical hackers and security researchers have shown that compromise of these terminals is relatively easy. Their findings were first published in 2017, shortly followed by a real-time map of ships, located by their satellite terminal.

It is a natural progression that less ethical hackers will already know about these issues in terminal equipment and be exploiting them for gain.

It is very difficult to gather statistics about hacking incidents as operators are understandably reluctant to publish data.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Cloud Computing

One issue that many people have found at work with cloud storage is that the security of it is very much compromised. Thousands of everyday people and celebrities have had much of their personal details, photos and video stolen by hackers and leaked them to the web.

Cyber Operators Course (Op) – Module 3

Different Risks and terminology – What is Hacking?

The act of hacking is where a person is able to view, create and edit your computers files and software. Doing this enables them to see your screen, use your webcam, and see what you type and pretty much everything you do.

Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose.

Hacking is most common among teenagers and young adults…



Image above: Paul (12)  says that the Bluetooth and Wi-Fi connections that we use almost every day are extremely vulnerable to hacking. “I’ll never connect to a public Wi-Fi that I don’t know,” he said. “Somebody can just hack into that Wi-Fi network and poison it.”

He showed CBS News correspondent David Begnaud first-hand how a hacker’s poison can spread through a Wi-Fi signal. In just seconds he obtained the reporter’s Twitter username and password using a fake page he had cloned, after Begnaud connected to his public Wi-Fi network.


Do we allow external contractors/visitors or temporary staff access to a public account?

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Internet Risks

A virus is either a File or script looking to cause harm to your computer system. They tend to either slow down your computer or completely break them. Like a biological virus, a computer virus is something you don’t want to get.

Computer viruses are small programs or scripts that can negatively affect the health of your computer. These malicious little programs can create files, move files, erase files, consume your computer’s memory, and cause your computer not to function correctly. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. In fact opening an infected e-mail attachment is the most common way to get a virus.

A computer Viruses is a piece of malware which replicates into other files and hides as important data. Some extreme viruses infect the ‘boot sector’ which is one of the most important areas of a system (It’s the code that starts up the system)