• Thanks for stopping by. Logging in to a registered account will remove all generic ads. Please reach out with any questions or concerns.

The Threat of Modern Piracy- A Merged Thread

Per CBC: 

Pirate attacks shift from Somalia to Gulf of Guinea
Piracy cost West African region $2 billion US last year, International Maritime Bureau reports


The London-based International Maritime Bureau published figures for the first six months of the year indicating that while piracy is down in the rest of the world, the Gulf of Guinea has overtaken Somalia as the world's new hot spot.

link:  http://www.cbc.ca/news/world/story/2013/07/15/pirates-west-africa-report.html

Gulf of Guinea (courtesy Google maps):  http://goo.gl/maps/Zi6vj

 
Speaking of another pirate-infested area in the Gulf of Guinea...

Lagos (AFP) - Nigeria, United States, Britain, Spain and the Netherlands Friday conducted a joint military exercise as part of international efforts to curb piracy in the Gulf of Guinea, which has become a global hotspot.

Coastguards, frigates, warships and helicopter patrols took part in the joint amphibious exercise, codenamed "African Wings", in a show of military strength off Lagos.

Nigeria's naval chief Vice Admiral Dele Joseph Ezeoba said the exercise aimed to demonstrate the combat-readiness of his country's navy in the fight against piracy.

"This is a joint military exercise between our armed forces and our foreign partners to send a clear signal to the criminals in our waters that we are ever ready and prepared for them," he said.

Rear Admiral Ben Bekkering, leading the Dutch navy at the exercise, promised further cooperation to "make the Gulf of Guinea and the international waters safe and secure."

The number of attacks in the Gulf of Guinea rose from 39 in 2010 to 53 in 2011 and 62 in 2012, according to the London-based think tank Chatham House.


Pirate attacks in the region have increasingly targeted international cargo tankers, with stolen fuel sold on the international black market.

Other instances have occurred off Nigeria's oil-producing southern coast, where vessels have been raided, sometimes with expatriate workers kidnapped for ransom.


Yahoo News
 
Seriously, this was NOT from an Onion story...  ;D

As reported by the National Post

The ultimate weapon against Somali pirates: Britney Spears

Not every member of the merchant navy can be Captain Phillips, and so as Somali pirates continue to be a maritime threat, protective forces have turned to a new force of weaponry: Britney Spears.

Specifically Spears’ chart-topping hits Baby One More Time and Oops! I Did It Again, which according to a representative of the merchant navy, are the songs the pirates presumably “hate the most.”


“These guys can’t stand Western culture or music, making Britney’s hits perfect,” Scottish merchant navy officer Rachel Owens told the U.K. Mirror. “They’re so effective the ship’s security rarely needs to resort to firing guns — as soon as the pirates get a blast of Britney they move on as quickly as they can.”

Navy members use the pop tunes, which are played at extremely high volume, when initial warnings fail to have an effect on the pirates. “The speakers can be aimed solely at the pirates so as not to disturb the crew,” Owens said, noting that pirates will often wear earplugs to avoid hearing the songs.

“Playing loud pop songs has been proven as one of the most effective ways of fending off attackers,” a spokesman for the British Association of Private Security Companies confirmed to the Mirror, adding that there is a choice of music made available to each security detail.

It’s not the first instance of armed forces using pop music as a weapon: Chilean dictator reportedly used the songs of Julio Iglesias to torture political opponents in the 1970s, and the U.S. army reportedly used Western music — including songs by Spears, as well as Eminem — as an offensive tactic in the War on Terror.

And according to Steven Jones of the Security Association for the Maritime Industry, the pirates should consider themselves lucky to have to suffer only Spears — he can think of at least one other pop star whose tunes would be considerably more potent.

“I’d imagine using Justin Bieber would be against the Geneva Convention,” he joked to the Mirror.

(...)
 
Goose15 said:
I believe the Americans do a similar thing but with really OLD OLD country music. Has the RCN never considered using this technology?

Finally!  A use for the musician trade!
 
Why would that music be a deterrent? Have you listened to the crap they call music? It's the equivilant to two bullfrogs fighting over a salamander..... ::)
 
GAP said:
Why would that music be a deterrent? Have you listened to the crap they call music? It's the equivilant to two bullfrogs fighting over a salamander..... ::)

Would you want to approach someone if they were blaring the sounds of those two fighting bullfrogs right at you? ;)

To them it's equivalent apparently :p
 
Another security contractor possibly aims to target pirates in the Niger delta with this retired Irish Navy warship:

From the IRISH TIMES

Navy’s retired LE Emer sells for €320,000 to businessman

New owner says he’s unsure on private or security role for vessel in Niger Delta

The former Naval Service vessel the LE Emer, which was stood down last month after 35 years, has been sold at auction in Cork today for €320,000 to a Nigerian businessman based in London.

Cyprian Imobhio, chief executive and managing director of Uniglobe Group, said he had got the LE Emer, stripped of its armaments, for a good price, but he was reluctant to say it was a bargain. “It was a good price - but I would have preferred to get her for €200,000,” he said with a smile.

(...)

327696_1.jpg


 
Related:

Net Security news link

Digital ship pirates: Researchers crack vessel tracking system

Posted on 16 October 2013.


In the maritime business, Automated Identification Systems (AIS) are a big deal. They supplement information received by the marine radar system, are used for a wide variety of things - including ship-to-ship communication - and are relied upon each and every day. Unfortunately, the AIS can also be easily hacked in order to do some real damage, claims a group of researchers presenting at the Hack In The Box Conference currently taking place in Kuala Lumpur.

Automated Identification Systems (AIS) transceivers can currently be found on over 400,000 ships sailing the high seas, and it is estimated that by 2014, that number will reach a million. The installation is mandatory for all passenger ships and commercial (non-fishing) ships over 300 metric tonnes, and it tracks them automatically by electronically exchanging data with other ships, AIS base stations, and satellites.

AIS hasn't replaced the marine radar system - it has been added to it to enhance marine traffic safety. The system has been first mandated for some 100,000 vessels in 2002. In 2006, the AIS standards committee published the Class B type AIS transceiver specification, which enabled the creation of a lower cost AIS device and triggered widespread use.

The data exchanged includes everything that has to do with the position of the ship, the cargo it carries, information on nearby ships, etc. The system used by the ships to communicate with other ships, plot their course and follow it, avoid collision with other ships, reefs and things that may be floating nearby that could cause damage to the vessels, as well as to aid in accident investigation and in search and rescue operations.

The information is also sent to upstream providers such as Maritimetraffic.com, Vesselfinder.com or Aishub.net, where anyone can check a specific vessel's position and additional information about it.

The upstream data sending can be effected via email, TCP / UDP, commercial software, smartphone apps, and radio-frequency gateways, and is sent via different types of messages (27 types in all). For example, message 18 delivers the position report (longitude, latitude, navigation status, an so on) and is sent every 30 second to 3 minutes depending on the speed of the ship, and message 24 provides the static report (type of ship, name, dimension, cargo type, etc) and is sent every 6 minutes.

Message type 8 is a binary broadcast message that can include any type of data, type 22 is for channel management (and only port authorities are allowed to use it). Type 14 is a safety-related broadcast message (and alerts of emergencies such as crew or passengers falling off board).

But, as Dr. Marco Balduzzi and Kyle Wilhoit of Trend Micro and independent security researcher Alessandro Pasta showed, AIS is vulnerable both at the implementation and at the protocol level.

The researchers detailed a couple of different attack vectors and divided the exploitations of threats into software and radio frequency (RF) attacks. The root of all problems is the same: there is no authentication and no integrity checks, so the apparent validation of spoofed and specially crafted packets is a huge problem.


The software attacks demonstrated to the full packed conference hall included:

AIS spoofing

There are a number of online AIS services that track vessel positions and locations around the world - the aforementioned Marine Traffic, Vessel Finder and AIS Hub are just some of them. These services are receiving AIS data and use maps to provide visual plotting that showcases global maritime traffic.

AIS services track vessels, but don't do any checkups on who is sending AIS data. This data usually includes vessel identification, location details, course plotting and other data specific to the vessel in question. With this on mind, the attackers can send specially crafted messages that could mimic the location of an existing vessel, or even create a fake vessel and place it on its own virtual course. This can cause a bit of panic, especially because you can fake a whole fleet of let's say war ships sailing on course to an enemy country or showing up off the coast of it.

Ship hijacking

This variation of the spoofing attack on AIS could be used to download the data of an existing ship, changing some of the parameters and submitting it to the AIS service. The result is virtual placement of a vessel on a completely different position or plotting a bizarre route that could include some "land sailing".

Replay attacks

All of the packets above can be saved and stored locally and then replayed at any time. By using the script and a scheduling function on a local system, the attacker can carefully replay spoofed messages in specific timeframes.

The mentioned scenarios were just an introduction on what you can do when you have reverse engineered AIS and know how to modify the date and reuse it. The most interesting part of the research includes attacking vessels over RF. The researchers coded an AIS frame builder, a C module which encodes payloads, computes CRC and oes bit operations. The output of the program is an AIS frame which is transferred from a digital into the radio frequency domain.

(...)
 
You know the pilot of that SA316 Alouette III is likely thinking "If I hear another Sea King pilot complain about their helo's being old....."
 
Piracy in the Med?

Military.com

Quote:


SEALs Seize Hijacked Tanker in Mediterranean

STUTTGART, Germany -- A team of U.S. Navy SEALs seized control early Monday of a commercial tanker that was hijacked in the Mediterranean earlier this month by a small group of armed Libyan men, the Defense Department announced.

The SEALs, acting under an order from President Barack Obama, embarked from the USS Roosevelt, which is deployed to the Mediterranean as part of the George H.W. Bush Carrier Strike Group.

"No one was hurt tonight when U.S. forces, at the request of both the Libyan and Cypriot governments, boarded and took control of the commercial tanker Morning Glory, a stateless vessel seized earlier this month by three armed Libyans," DoD spokesman Rear Adm. John Kirby said in a news release.

(...EDITED)
 
What are they gonna do, TORPEDO Somali pirate skiffs?  ;D

US Naval Institute

Chinese Submarine Headed to Gulf of Aden For Counter Piracy Operations

By: Sam LaGrone
Published: September 30, 2014 1:03 PM
Updated: September 30, 2014 1:08 PM
China has sent a submarine to the Gulf of Aden to help in counter piracy operations — a first for the People’s Liberation Army Navy’s (PLAN) submarine fleet, according to the Chinese Ministry of National Defense. In a press briefing last week, ministry spokesman Col. Geng Yansheng confirmed a PLAN submarine was headed off the coast of Somalia to join a Chinese task force effort to piracy in the region.

News of the submarine emerged earlier this month when what appeared to be a Song-class diesel attack submarine (SSK) took on fuel and provisions in Sri Lanka from Sept. 7 to 14, raising questions if China was expanding submarine operations into the Indian Ocean.

“What needs to be pointed out is that it is a common practice for navies of all countries to have their submarines and ships replenished at certain intervals at ports,” Geng said.

(...EDITED)
 
you haven't heard of the latest trend? Periscoping small vessels? The Chinese sub comes with an extended periscope that can puncture holes in small wooden boats.
 
Moving from an aforementioned half-a**ed attempt at an air force, ISIS is now exploring a maritime arm...  :facepalm:

Defense News

Is Islamic State Group Getting Into the Piracy Business?
Nov. 2, 2014 - 02:38PM  |  By AWAD MUSTAFA 

DUBAI — An expert is downplaying concerns raised last week by the United Arab Emirates that Islamic State militants could unite with al-Shabab terrorists and expand to the seas, since no evidence has been established of links between terrorists and pirates.

On Oct. 29, UAE Foreign Minister Sheikh Abdullah bin Zayed al-Nahyan raised the piracy concerns, calling for the international community to be more vigilant regarding new threats at the fourth UAE Counter Piracy Conference in Dubai.

“As groups like Daesh [Islamic State] develop ties to criminal networks and arms networks like al-Shabab, it is essential that we prevent them from expanding their operations into the sea and threaten vital channels such as the Strait of Hormuz, the Red Sea, Bab al Mandab and the Gulf of Aden,” he said.

(...SNIPPED)
 
Back
Top