Counterintelligence Risks in Crew Management and Recruitment: The Role of Profiling and Screening in Shipping Companies
DOI:
https://doi.org/10.53477/2284-9378-24-19Keywords:
Counterintelligence, shipping companies, Shipping Crew Management, Profiling, Screening.Abstract
This paper examines the critical role of profiling screening in countring security threats within the maritime industry, focusing on crew management and recruitment processes.In light of the industry’s susceptibility to espionage, terrorism, and sabotage, effective
counterintelligence measures are imperative. By scrutinizing the vulnerabilities and best practices associated with profiling screening, shipping companies can fortify their security defenses, mitigate insider threats, and ensure the safety of their assets and personnel.
References
Akpan, F., G. Bendiab, S. Shiaeles, S. Karamperidis, and M. Michaloliakos. 2022. “Cybersecurity challenges in the Maritime Sector .” Network 2 (1): pp. 123–138. https://doi.org/10.3390/network2010009.
Alcaide, J.I., and R.G. Llave. 2020. “Critical infrastructures cybersecurity and the Maritime Sector .” Transportation Research Procedia 45: pp. 547–554. https://doi.org/10.1016/j. trpro.2020.03.058.
Auster, E., and C.W. Choo. 1994. “How senior managers acquire and use information in environmental scanning.” Information Processing & Management 30 (5): pp. 607–618. https://doi.org/10.1016/0306-4573(94)90073-6.
Ball, K. 2021. “Electronic Monitoring and Surveillance in the Workplace.” Joint Research Center – European Commission. https://publications.jrc.ec.europa.eu/repository/ handle/JRC125716.
Barnea, A. 2019. “Big Data and Counterintelligence in Western countries .” International Journal of Intelligence and Counterintelligence 32 (3): pp. 433–447.
Barnea, A., and A. Meshulach. 2020. “Forecasting for Intelligence Analysis: Scenarios to abort strategic surprise.” International Journal of Intelligence and Counterintelligence 34 (1): pp. 106–133.
Barrick, M.R., and M.K. Mount. 1991. “The Big Five personality dimensions and job performance: A meta-analysis.” Personnel Psychology 44 (1): pp. 1-26.
BIMCO, Chamber of Shipping of America, Digital Containership Association, International Association of Dry Cargo, Shipowners (INTERCARGO), InterManager, International Association of Independent Tanker Owners (INTERTANKO), International Chamber of Shipping (ICS), International Union of Marine Insurance (IUMI), Oil Companies International, Marine Forum (OCIMF), Superyacht Builders Association (Sybass) and World Shipping Council (WSC). 2021. The Guidelines on Cyber Security Onboard Ships. https://www.icsshipping.org/wp-content/uploads/2021/02/2021-Cyber-Security-Guidelines.pd.
Caesar, L.D., and J. Fei. 2018. “Recruitment and the image of the shipping industry.” In Managing Human Resources in the Shipping Industry, pp. 18-36. Routledge. doi:10.4324/9781315740027-2.
Catrantzos, N. 2023. Managing the Insider Threat No Dark Corners and the Rising Tide Menace. CRC Press.
Cho, I., and K. Lee. 2016. “Advanced risk measurement approach to insider threats in Cyberspace.” Intelligent Automation & Soft Computing 22 (3): pp. 405–413. https://doi. org/10.1080/10798587.2015.1121617.
Clark, R.M., and W. Mitchell. 2019. Deception: Counterdeception and Counterintelligence. Washington, DC: CQ Press.
Cybersecurity and Infrastructure Security Agency. 2017. Awareness Briefing: Chinese Cyber Activity Targeting Managed Service Providers. https://www.cisa.gov/sites/default/files/ c3vp/Chinese-Cyber-Activity-Targeting-Managed-Service-Providers.pdf.
Duvenage, P., and S. Solms. 2014. Putting Counterintelligence in Cyber Counterintelligence. 13th European Conference on Cyber Warfare and Security. https://www.researchgate.net/publication/328732134_Putting_Counterintelligence_in_Cyber_Counterintelligence.
Duvenage, P., V. Jaquire, and S. Solms. 2018. “Towards a Literature Review on Cyber Counterintelligence .” Journal of Information Warfare 17 (4): pp. 284-297. https:// www.jstor.org/stable/26783824.
ENISA. 2024. Cyber Resilience Act Requirements Standards Mapping. https://www.enisa. europa.eu/publications/cyber-resilience-act-requirements-standards-mapping .
Estay, D. 2020. Cyber resilience for the shipping industry. CyberShip Project. https://www. dendanskemaritimefond.dk/wp-content/uploads/2017/03/Cybership_Report_WP_5. pdf.
Europol. 2023. New Modus Operandi: How organized crime infiltrates the ports of Europe . https://www.europol.europa.eu/media-press/newsroom/news/new-modus-operandihow-organised-crime-infiltrates-ports-of-europe.
Gelles, M. 2021. “Insider threat prevention, detection, and mitigation.” In International Handbook of Threat Assessment, pp. 669–679. https://doi.org/10.1093/medpsych/9780190940164.003.0037.
Georgiadou, A., S. Mouzakitis, and D. Askounis. 2021. “Detecting insider threat via a cyber-security culture framework.” Journal of Computer Information Systems 63 (4): pp. 706–716.
Giannakopoulou, E.N., E.I. Thalassinos, and T.V. Stamatopoulos. 2016. “Corporate governance in shipping: an overview.” Maritime Policy & Management 43 (1): pp. 19-39.
Grammenos, T. 2010. The Handbook of Maritime Economics and Business. Edited by Lloyd’s List.
Greene, R. 1966. Business Intelligence and Espionage. Homewood: Dow Jones‐ Irwin.
Johnson, L.K. 2010. Handbook of Intelligence Studies. London: Routledge.
Judge, T.A., and J.E. Bono. 2001. “Relationship of core self-evaluations traits—selfesteem, generalized self-efficacy, locus of control, and emotional stability—with job satisfaction and job performance: A meta-analysis.” Journal of Applied Psychology 86 (1): pp. 80-92.
Kanellopoulos, A.N. 2022. “The Importance of Counterintelligence Culture in State Security.” Global Security and Intelligence Note 5. https://www.buckingham.ac.uk/wpcontent/uploads/2022/07/GSIN_5a.pdf.
__. 2023. “The Dimensions of Counterintelligence and Their Role in National Security.” Journal of European and American Intelligence Studies 6 (2): pp. 85-104.
__. 2024. “Insider threat mitigation through human intelligence and counterintelligence: A case study in the shipping industry.” Defense and Security Studies (5) 1: pp. 10-19. https://doi.org/10.37868/dss.v5.id261.
Kantharia, Raunek. 2019. The Story of Maersk Alabama Container Vessel. https://www. marineinsight.com/marine-piracy-marine/the-story-of-maersk-alabama-containervessel/.
Leovy, J. 2017. “Cyberattack cost Maersk as much as $300 million and disrupted operations for 2 weeks.” Los Angeles Times. https://www.latimes.com/business/la-fi-maerskcyberattack-20170817-story.html.
Lowenthal, M. 2009. Intelligence: From secrets to policy. Washington, DC: CQ Press.
Morgeson, F.P., and S.E. Humphrey. 2006. “The Work Design Questionnaire (WDQ): Developing and validating a comprehensive measure for assessing job design and the nature of work .” Journal of Applied Psychology 91 (6): pp. 1321-1339.
Ones, D.S., C. Viswesvaran, and S. Dilchert. 2005. “Cognitive ability in selection decisions.” Handbook of employee selection 3: pp. 431–468.
Prunckun, H.W. 2019. Counterintelligence theory and practice. London: Rowman et Littlefield.
Ronn, K.V. 2016. “Intelligence ethics: A critical review and future perspectives.” International Journal of Intelligence and Counterintelligence 29 (4): pp. 760–784. https://doi:10.1080 /08850607.2016.1177399.
Shaikh, R. 2018. “More spills... thousands of passports, driver’s licenses, & Photo ids of fedex customers exposed.” Wccftech. https://wccftech.com/thousands-passports-fedexexposed/.
Spector, P.E., and S.M. Jex. 1998. “Development of four self-report measures of job stressors and strain: Interpersonal Conflict at Work Scale, Organizational Constraints Scale, Quantitative Workload Inventory, and Physical Symptoms Inventory.” Journal of Occupational Health Psychology 3 (4): pp. 356-367.
Wettering, F.L. 2000. “Counterintelligence: The broken triad.” International Journal of Intelligence and Counterintelligence 13 (3): pp. 265–300.
Downloads
Published
How to Cite
Issue
Section
License
The published articles are subject to copyright law. All rights are reserved to the “Carol I” National Defense University, regardless of whether all or part of the material are considered, especially the rights to translation, reprinting, re-use of illustrations, quotations, broadcasting through the media, reproduction on microfilms or any other way and storage in data banks. Any replicas without the associated fees are authorized provided the source is acknowledged.