Technology in Port Security
docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
312
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
14
Uploaded by UltraSeaLion385
1
The Effects of Technology on Port Security
Brendan J. Cawthon
American Public University System
HLSS312 Port Security
Professor Matthew Stork
December 9, 2023
Abstract
A concern of many Americans that doesn’t cross their minds often is,”what if I didn’t have access to the goods I need on a daily basis?” This could be a reality if not taken seriously by the U.S. Government by maximizing security at the country's seaports. Port privacy and security has been compromised with the implementation of Chinese manufacturers' cranes in ports with spying capabilities sending back information on port operations and security to China. Drone attacks are already a threat to ports worldwide and this has been made evident in ports of Ukraine and Romania as they’ve been the victim of drone attacks from Russia destroying grain storage facilities. Not to mention an ongoing issue of human trafficking ravaging through ports worldwide and the United Nations has a plan to mitigate this by using the non profit company,
2
Love Justice International. How much is technology truly being used against the United States in
this new age of cyber warfare?
Keywords:
Seaports, Cranes, China, ZPMC, Trafficking, Drones
The Effects of Technology on Port Security
In an ever changing world of technology there are some great strengths and weaknesses that surface when used in various occasions. With tensions high between the United States between them and foreign adversaries such as China and Russia as well as many countries in the Middle East there is always a concern for attacks both on U.S soil, and in foreign land. Given the
use of technology everywhere in the world, cyberattacks are a well known threat. What is unknown of them is when they will strike and what kind of impact they will have. The effectiveness of ports with consideration to supply chain and improving the ship to shore connection is always something looking to improve upon, yet there are unforeseen threats in using ship to shore cranes manufactured in foreign countries utilizing foreign software. Having the knowledge of this brings into question whether they are collecting intelligence that could potentially be detrimental to military operations, national security, and well-being of American citizens by an economic collapse of our supply chain. Besides cyber threats alone, the increased use of drones poses a major physical threat in the fact they can be weaponized via airborne improvised explosive devices or be used for surveillance and intelligence on operations in ports worldwide. Drones have been becoming increasingly difficult to handle from a security perspective given the advancements in their abilities such as speed, range, detectability, and payload. My research question is “Are technological advancements being used against us?” And if so, “What role does foreign technology contribute to the breakdown of our security
3
measures?” My hypothesis states as,”Although technology is a great tool to use, it is also being weaponized against the United States and allies.”
Ship to Shore Cranes from Shanghai Zhenhua Heavy Industries Company
A growing concern for the United States federal government is port security. In March of 2023, members of the United States House Select Committee visited the Port of Miami in reference to the strategic competition between the United States and China. Just weeks prior, the Pentagon had made it known cranes manufactured in China specifically from Shanghai Zhenhua Heavy Industries Company, also referred to as ZPMC, may be a tool for spying. According to Lars Schonander (2023), his analysis suggests the average major American port has 49 percent of its ship to shore cranes manufactured from a single Chinese Company, ZPMC. This brings multiple risk factors into play based on a national security and supply chain perspective. The U.S. port system is an asset to the economy because of the amount of money and jobs it provides
the American people. Millions of people are employed at ports across the country and trillions upon trillions of dollars worth of goods are processed through annually. It is because of the benefits ports bring is why having Chinese cranes in service could be detrimental. Simply having
these cranes in service gives the Chinese the ability to spy on American ports, collecting information on how they maintain operation. Not only that, having access to the software maintained in the equipment leads to concern for cyberattacks and an entire region's economic fallout and collapse of the supply chain leaving Americans to suffer the consequences. Despite these risks Chinese manufactured cranes are still in service nationwide and around the world with no complete solution to the issue at hand but steps in place to mitigate such as using software from other companies rather than Shanghai Zhenhua Heavy Industries Company.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Drone Use in Port Scenarios
Emerging drone technology has brought great innovation to the capabilities of supervision in reference to construction, operations, observing weather patterns and many other areas. One of the biggest benefits of using drones in ports is to improve safety and security measures. Each drone is equipped with cameras to allow for surveillance over a job site at the respective port. Port Antwerp has been leading the charge along with the European Maritime Safety Agency (EMSA to expand upon drone usage in maritime and port settings and operations (Donnelly, 2021). The utilization of drones will make for more accurate response and information in reference to emergency situations such as fires, and rescues of all sorts. Real time imaging from fixed-wing drones fitted with cameras creates a safer port environment by allowing for more supervision remotely and improving effective response times. The latter is that
drones can be used for more than just security and surveillance. The threat of airborne improvised explosive devices is higher than ever with the innovation of drones and increased payload of newer drones. This scenario may not be against the United States but there is no telling whether this could be executed on one of our ports and is something to be addressed. Just
earlier this year amid the Ukrainian War, Russia attacked Port Izmayil in Danube and damaged key infrastructure to one of Kyiv’s main export locations for grain to the Romanian port of Constanta. Reports of this incident say Ukrainian air defenses shot down 28 out of the 33 Iranian drones(RFE/RL’s Ukrainian Service, 2023). Despite these defense efforts, port infrastructure and
residential buildings sustained damage as well as an unknown number of human injuries as a result of the drone attacks. Based on what damage a few dozen drones could do with small explosives, with payloads on drones increasing it forces the question and homeland security
5
officials to put in place defense mechanisms against a potential drone attack given the importance of ports to the economy.
Human Trafficking
A major issue where technology has been a massive help is with human trafficking. The United Nations Office on Drugs and Crime (UNODC) has founded Love Justice International, a civil society organization with funding from the United Nations Voluntary Trust Fund for Victims of Human Trafficking(UNVTF)(UNODC, 2020). By using information from previous potential victims, Love Justice has created heat maps based on the routes traffickers will use and utilize Visible Infrared Imaging Radiometer Suite to help place Transit Monitoring Stations. Although these monitoring stations have been able to intercept 30,578 people across 64 monitoring stations in 28 countries(UNODC, 2020), there is still some left on the table as there is
with any form of technology, the risk for hacking and cyber attacks. Despite their best efforts to catch all people being trafficked, the threat of cyber attacks and hacking which would disable the
technology utilized in catching traffickers. Rather than an attack, trafficking is an ongoing issue that will always need to be addressed. As of the publishing date of this United Nations article, there have been 1,176 arrests with a 32 percent case closing rate as a result of the Love Justice program.
Literature Review
Source 1: ZPMC and America’s Ship-to-Shore Crane Industry: Recommendations for Improving Port Security
Schonander, 2023 does a great job illustrating the all around issues that come along with putting Chinese manufactured ship to shore cranes in service aboard United States seaports, in which identifying three major research questions: “How reliant is the United States or foreign
6
manufactured cranes?”, “What are the implications of using foreign cranes and what risk to national security do they pose?”, and finally,”What steps can federal agencies and governments take to increase physical security, and cybersecurity in United States Seaports. In conducting his own research, Lars Schonander said the average container port has 49% of its ship to shore cranes manufactured from a single company in China. This company has been identified as Shanghai Zhenhua Heavy Industries Company and is said to have somewhat of a monopoly in the ship to shore crane manufacturing world. After thorough investigation, it is reasonable to suspect these cranes have capabilities of spying on operations of American ports pointed out by the Pentagon in early 2023. The gathering of intelligence by Chinese cranes to later be used against the United States and disrupt the supply chain. This would also be possible through cyber
attacks and hacking considering the technology has internet capabilities which only further jeopardizes national security and infrastructure through holes in cybersecurity. The recommended actions to the government agencies are to use their legislative powers to require a plan for cybersecurity and how to navigate the utilization of foreign cranes.
Source 2: Feds say Chinese cranes used at Port of Virginia could be spy tools
Katherine Schulte, 2023 was one of the initial articles posted when the Pentagon identified the issue with the ZPMC ship to shore cranes. More of an informative source rather than research based but it states the Pentagon had identified as many as 30 ship to shore cranes that are potential security threats. It is also mentioned that the discovery of the crane's capabilities came only shortly after the Chinese Spy Balloon sage made its way across the United
States which only raises suspicion of active spying at our nation’s ports. The biggest issues identified with the cranes were that the sensors built into them had the ability to track origins, destinations, and nature of the cargo. Remote access comes into play with this equipment as well
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
which raises concern for disruption of the supply chain as a result of hacking and cyber attacks. It states the Port of Virginia has been using ZPMC cranes as early as 2000, although there are no known security breaches, it is unknown what information has been leaked. The Newport News Marine Terminal’s crane which has been in service since 1982 is the only remaining crane manufactured by a different company. This all comes during heightened tensions between the U.S. and China with many other international situations arising. It must be noted by lawmakers in the U.S. that ZPMC has an 80% share of all cranes in the country and 70% of all cranes across
104 countries. Schulte stated port authorities can mitigate risks by conducting post-delivery systems checks for anything that may have been tracked by the cranes as well as changing software use. Many ports are still utilizing the ZPMC cranes but switching their software to a Swiss company called ABB Ltd. The Port of Virginia refused to comment on what software they
were using but did indicate they will be conducting detailed forensic cyber analysis before new cranes are put into service.
Source 3: Why are more ports using drones?
Donnelly, 2020 offers a change of pace from the theme of this topic. This article discusses the benefits of utilizing drones to improve safety and security. Specifically, Port Antwerp has partnered with European Maritime Safety Agency (EMSA) to expand utilization of drone technology. According to Paul Wauters, the Harbor Captain at Port Antwerp, the use of drones allows for quicker response to incidents and a safer port for employees and port users. In addition to this, Port Antwerp partnered with Sabca, an aerospace company in October 2021 to have trial use of fixed-wing drones fitted with cameras giving them access to real time aerial security footage of the port. Images recovered by the drone during the trial illustrated successful use of it allowing for more effective response and response times to emergency incidents such as
8
fire, person in distress, and man overboard. Other ports have followed suit after the successful trials such as the Port of Rotterdam. Others have taken it a step further and developed drones that
can travel up to 150 meters underwater for imaging. The only drawback to the implementation of
drone fleets is they require a 5G network which can be very costly.
Source 4: Russian Drones Damage Danube Port Facilities Amid Intense Fighting In Donetsk Region
According to RFE/RL’s Ukrainian Service, 2023, drones are, and have been used for attacks in conflicts around the world. Specifically in this scenario at a port in Ukraine exporting grain to Romania. The Ukrainian port of Izmayil on the Danube River was under attack by drones made by Iranians with explosives. Ukrainian air defense shot down 28 of the 33 drones sent out but despite their efforts, grain storage facilities were damaged as well as residential buildings and injuries to people in the area. While this may not involve the United States directly, it shows how easily capable a drone attack can be executed by other nations. U.S. officials must take this into account when implementing drones used for safety and security purposes. Given the drones are controlled remotely, they are vulnerable to hacking and can be used against the ports that put them into service.
Source 5: Preventing Human Trafficking at Seaports
Katie Amodei, 2020 is a brief article on the seriousness of human trafficking at ports. It provides a quick outline on the Department of Transportation (DOT) and the Department of Homeland Security (DHS) launching a national pledge program against human trafficking with the hopes of transportation employees to join in on the cause and receive additional training on the matter. The training involves building awareness and how to spot human trafficking and how to prevent it from the ports that employ so many American nationwide.
9
Source 6: Using the Power of Technology to Help Victims of Human Trafficking
UNODC, 2020 discusses the causes of increased human trafficking during the COVID-19
pandemic and how technology can be utilized to help reduce the issue. A civil society organization called Love Justice International has received funding from the United Nation Voluntary Trust Fund for Victims of Human Trafficking. This program has been implementing data from previous cases by providing a so-called “heat map” of what routes traffickers use to intercept potential victims before it’s too late. As of 2020, Love Justice International has intercepted 30,578 potential victims. They have 64 monitoring stations across 28 various countries which have resulted in a reported 1,176 arrests, and a 32 percent case closing rate of convictions. Methodology
Qualitative
According to Schult, 2023 and Schonander, 2023, given the information the Pentagon has
released in reference to the ZPMC cranes, it is clear that the capability of espionage and spying is
very real with this equipment, although it remains unknown what damage has already been done.
Precautions are being put in place to mitigate any damage that has already been done, or will be done in the future. Despite the positive use of drones from Jack Donnelly, 2021, the potential negatives outweigh the positives. Yes, using drones for surveillance is good, yes, it helps with response effectiveness and time, but so does normal surveillance if invested in and implemented properly. The risk of cyber attacks are much lower as cctv can be a wired connection versus a 5G network controlling drones. Not to mention, as we’ve seen from RFE/RL’s Ukrainian Service, 2023,
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
10
drone attacks are only going to become more prevalent and it’s only a matter of time before the U.S starts seeing issues in our own backyard unless proper procedures are put in place.
This is where some positive light can be shed on the United States seaports and agencies involved. Putting technology in place to actually be helpful in catching traffickers, and putting programs in place for victims and survivors of human trafficking.
Quantitative
The numbers from both Schonander, 2023, and Schulte, 2023, suggest there are far too many Chinese manufactured cranes with the capabilities to spy on American ports. Schulte, 2023
suggests her findings to be that ZPMC has a 70% share of worldwide cranes and 80% of all cranes in United States ports. Schonander, 2023 states his own research and findings to be roughly 49% of all ship to shore cranes in the United States.
Despite the benefits of using drones in seaports, it creates a camouflage for enemy drones
to infiltrate for attacks. Drone are becoming more and more advanced and with attacks becoming
more prominent overseas in the Middle East and Europe. Without procedures and precautions in place this could very quickly become an issue in the ports of America.
The effectiveness of the Love Justice program speaks for itself in a shining light of positivity technology can bring for the nation and the world. As of 2020 when this data was created, Love Justice has intercepted 30,578 people from being trafficked across 64 monitoring stations across 28 countries, while making 1,176 arrests with 32 percent of closed cases resulting
in conviction (UNODC, 2020).
Analysis & Findings
Despite many advancements in technology that is utilized for security and safety across ports around the world. Security will always be at least a step behind from the aggressor in
11
almost every scenario involving technology. The United States has given its best efforts in creating defense technology to keep up, and although they’re doing a great job, there will always be vulnerabilities or missed shots as discussed in the Ukrainian port where only 28 out of 33 drones were shot down, the other 4 went untouched. The Chinese crane situation is an issue that needs to be addressed as soon as possible. A whole uprooting of the equipment may be needed as
there is no telling how much information China has already received through the sensors on the cranes. Although, there is a bright spot in the fact that Love Justice has done a great job in catching and convicting human traffickers as well as providing rehabilitation for victims. A whole separate issue that will more than likely be used against the U.S. in some form or fashion in the future is drone attacks. We have become very familiar with improvised explosive devices from the War on Terror and even being used attached to vehicles. Now a threat is going to be airborne IEDs via drones and there must be a focal point to defend against them.
Conclusion and Recommendations
The peace of mind Americans are always hoping for is far from here unfortunately. Even with some of the best developers in the world at the United States' fingertips, it will always be a step behind the offensive and we can only hope to mitigate the damage done. With Chinese cranes from ZPMC, we have not only allowed a foreign adversaries equipment to be put into service on our homeland, but without security inspection allowing them to be spying and sending
information to the Chinese all while being vulnerable to cyber attacks. Although not yet being used against us, drones are currently being used by foreign adversaries and this is hugely concerning for the safety and security of our ports and for the well-being of American citizens. Drastic measures must be taken in order to prevent major losses from occurring. Despite the
12
positive that comes from technology advancements via Love Justice International, technology is, without a doubt being weaponized against the United States entering the era of cyberwarfare.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
13
References
admin@gotechark.com. (2023, March 8). Feds say Chinese cranes used at Port of Va. could be spy tools
. Virginia Business. https://www.virginiabusiness.com/article/feds-say-
chinese-cranes-used-at-port-of-va-could-be-spy-tools/
Donnelly, J. (2021, December 20). Why are more ports using drones?
Port Technology International. https://www.porttechnology.org/news/why-are-more-ports-using-drones/
Service, Rfe. U. (2023, October 12). Russian Drones Damage Danube Port Facilities Amid Intense Fighting In Donetsk Region. RadioFreeEurope/RadioLiberty
. https://www.rferl.org/a/russia-odesa-drone-strikes-grain-warehouse-belgorod/
32634003.html
The Maritime Executive. (2020). Preventing Human Trafficking at Seaports - Human Trafficking Search
. Human Trafficking Search. https://humantraffickingsearch.org/resource/preventing-human-trafficking-at-seaports/
#:~:text=Especially%20in%20the%20COVID%2D19
UNODC. (2020). Using the Power of Technology to Help Victims of Human Trafficking
. United Nations : Office on Drugs and Crime. https://www.unodc.org/unodc/frontpage/2022/July/using-the-power-of-technology-to-
help-victims-of-human-trafficking.html
14
ZPMC and America’s Ship-to-Shore Crane Industry: Recommendations for Improving Port Security | The Foundation for American Innovation
. (n.d.). Www.thefai.org. Retrieved December 9, 2023, from https://www.thefai.org/posts/zpmc-and-america-s-
ship-to-shore-crane-industry-recommendations-for-improving-port-security
Recommended textbooks for you

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning