Counterintelligence Risks in Crew Management and Recruitment: The Role of Profiling and Screening in Shipping Companies

Authors

  • Anastasios-Nikolaos KANELLOPOULOS , Athens University of Economics and Business, Greece

DOI:

https://doi.org/10.53477/2284-9378-24-19

Keywords:

Counterintelligence, shipping companies, Shipping Crew Management, Profiling, Screening.

Abstract

This paper examines the critical role of profiling screening in countring security threats within the maritime industry, focusing on crew management and recruitment processes.In light of the industry’s susceptibility to espionage, terrorism, and sabotage, effective
counterintelligence measures are imperative. By scrutinizing the vulnerabilities and best practices associated with profiling screening, shipping companies can fortify their security defenses, mitigate insider threats, and ensure the safety of their assets and personnel.

Author Biography

Anastasios-Nikolaos KANELLOPOULOS, , Athens University of Economics and Business, Greece

Dimitrios Stavropoulos holds a Master in IT Systems in Business Administration from Harokopio University of Athens, a Bachelor in Physics from EKPA University of Athens and a Bachelor in Public Security from Hellenic Police Academy (Officers’ Faculty). In addition, he is a certified Forensic Analyst from the Hellenic Ministry of Citizen Protection.

His research interests include exploiting intelligence from multiple flows, creation trends and
patterns.Anastasios-Nikolaos Kanellopoulos is a PhD candidate of the Athens University of Economics and Business, holds a Master in International Relations, Strategy and Security from the University of Neapolis Pafos in Cyprus, a Bachelor in Business Administration from the Athens University of Economics and Business and a Bachelor in Public Security from Hellenic Police Academy. In addition, he is a certified Security Risk Analyst from
FRONTEX and the Hellenic Ministry of Citizen Protection. His research interests include Competitive Intelligence and Counterintelligence frameworks application in modern Business environment

References

Akpan, F., G. Bendiab, S. Shiaeles, S. Karamperidis, and M. Michaloliakos. 2022. “Cybersecurity challenges in the Maritime Sector .” Network 2 (1): pp. 123–138. https://doi.org/10.3390/network2010009.

Alcaide, J.I., and R.G. Llave. 2020. “Critical infrastructures cybersecurity and the Maritime Sector .” Transportation Research Procedia 45: pp. 547–554. https://doi.org/10.1016/j. trpro.2020.03.058.

Auster, E., and C.W. Choo. 1994. “How senior managers acquire and use information in environmental scanning.” Information Processing & Management 30 (5): pp. 607–618. https://doi.org/10.1016/0306-4573(94)90073-6.

Ball, K. 2021. “Electronic Monitoring and Surveillance in the Workplace.” Joint Research Center – European Commission. https://publications.jrc.ec.europa.eu/repository/ handle/JRC125716.

Barnea, A. 2019. “Big Data and Counterintelligence in Western countries .” International Journal of Intelligence and Counterintelligence 32 (3): pp. 433–447.

Barnea, A., and A. Meshulach. 2020. “Forecasting for Intelligence Analysis: Scenarios to abort strategic surprise.” International Journal of Intelligence and Counterintelligence 34 (1): pp. 106–133.

Barrick, M.R., and M.K. Mount. 1991. “The Big Five personality dimensions and job performance: A meta-analysis.” Personnel Psychology 44 (1): pp. 1-26.

BIMCO, Chamber of Shipping of America, Digital Containership Association, International Association of Dry Cargo, Shipowners (INTERCARGO), InterManager, International Association of Independent Tanker Owners (INTERTANKO), International Chamber of Shipping (ICS), International Union of Marine Insurance (IUMI), Oil Companies International, Marine Forum (OCIMF), Superyacht Builders Association (Sybass) and World Shipping Council (WSC). 2021. The Guidelines on Cyber Security Onboard Ships. https://www.icsshipping.org/wp-content/uploads/2021/02/2021-Cyber-Security-Guidelines.pd.

Caesar, L.D., and J. Fei. 2018. “Recruitment and the image of the shipping industry.” In Managing Human Resources in the Shipping Industry, pp. 18-36. Routledge. doi:10.4324/9781315740027-2.

Catrantzos, N. 2023. Managing the Insider Threat No Dark Corners and the Rising Tide Menace. CRC Press.

Cho, I., and K. Lee. 2016. “Advanced risk measurement approach to insider threats in Cyberspace.” Intelligent Automation & Soft Computing 22 (3): pp. 405–413. https://doi. org/10.1080/10798587.2015.1121617.

Clark, R.M., and W. Mitchell. 2019. Deception: Counterdeception and Counterintelligence. Washington, DC: CQ Press.

Cybersecurity and Infrastructure Security Agency. 2017. Awareness Briefing: Chinese Cyber Activity Targeting Managed Service Providers. https://www.cisa.gov/sites/default/files/ c3vp/Chinese-Cyber-Activity-Targeting-Managed-Service-Providers.pdf.

Duvenage, P., and S. Solms. 2014. Putting Counterintelligence in Cyber Counterintelligence. 13th European Conference on Cyber Warfare and Security. https://www.researchgate.net/publication/328732134_Putting_Counterintelligence_in_Cyber_Counterintelligence.

Duvenage, P., V. Jaquire, and S. Solms. 2018. “Towards a Literature Review on Cyber Counterintelligence .” Journal of Information Warfare 17 (4): pp. 284-297. https:// www.jstor.org/stable/26783824.

ENISA. 2024. Cyber Resilience Act Requirements Standards Mapping. https://www.enisa. europa.eu/publications/cyber-resilience-act-requirements-standards-mapping .

Estay, D. 2020. Cyber resilience for the shipping industry. CyberShip Project. https://www. dendanskemaritimefond.dk/wp-content/uploads/2017/03/Cybership_Report_WP_5. pdf.

Europol. 2023. New Modus Operandi: How organized crime infiltrates the ports of Europe . https://www.europol.europa.eu/media-press/newsroom/news/new-modus-operandihow-organised-crime-infiltrates-ports-of-europe.

Gelles, M. 2021. “Insider threat prevention, detection, and mitigation.” In International Handbook of Threat Assessment, pp. 669–679. https://doi.org/10.1093/medpsych/9780190940164.003.0037.

Georgiadou, A., S. Mouzakitis, and D. Askounis. 2021. “Detecting insider threat via a cyber-security culture framework.” Journal of Computer Information Systems 63 (4): pp. 706–716.

Giannakopoulou, E.N., E.I. Thalassinos, and T.V. Stamatopoulos. 2016. “Corporate governance in shipping: an overview.” Maritime Policy & Management 43 (1): pp. 19-39.

Grammenos, T. 2010. The Handbook of Maritime Economics and Business. Edited by Lloyd’s List.

Greene, R. 1966. Business Intelligence and Espionage. Homewood: Dow Jones‐ Irwin.

Johnson, L.K. 2010. Handbook of Intelligence Studies. London: Routledge.

Judge, T.A., and J.E. Bono. 2001. “Relationship of core self-evaluations traits—selfesteem, generalized self-efficacy, locus of control, and emotional stability—with job satisfaction and job performance: A meta-analysis.” Journal of Applied Psychology 86 (1): pp. 80-92.

Kanellopoulos, A.N. 2022. “The Importance of Counterintelligence Culture in State Security.” Global Security and Intelligence Note 5. https://www.buckingham.ac.uk/wpcontent/uploads/2022/07/GSIN_5a.pdf.

__. 2023. “The Dimensions of Counterintelligence and Their Role in National Security.” Journal of European and American Intelligence Studies 6 (2): pp. 85-104.

__. 2024. “Insider threat mitigation through human intelligence and counterintelligence: A case study in the shipping industry.” Defense and Security Studies (5) 1: pp. 10-19. https://doi.org/10.37868/dss.v5.id261.

Kantharia, Raunek. 2019. The Story of Maersk Alabama Container Vessel. https://www. marineinsight.com/marine-piracy-marine/the-story-of-maersk-alabama-containervessel/.

Leovy, J. 2017. “Cyberattack cost Maersk as much as $300 million and disrupted operations for 2 weeks.” Los Angeles Times. https://www.latimes.com/business/la-fi-maerskcyberattack-20170817-story.html.

Lowenthal, M. 2009. Intelligence: From secrets to policy. Washington, DC: CQ Press.

Morgeson, F.P., and S.E. Humphrey. 2006. “The Work Design Questionnaire (WDQ): Developing and validating a comprehensive measure for assessing job design and the nature of work .” Journal of Applied Psychology 91 (6): pp. 1321-1339.

Ones, D.S., C. Viswesvaran, and S. Dilchert. 2005. “Cognitive ability in selection decisions.” Handbook of employee selection 3: pp. 431–468.

Prunckun, H.W. 2019. Counterintelligence theory and practice. London: Rowman et Littlefield.

Ronn, K.V. 2016. “Intelligence ethics: A critical review and future perspectives.” International Journal of Intelligence and Counterintelligence 29 (4): pp. 760–784. https://doi:10.1080 /08850607.2016.1177399.

Shaikh, R. 2018. “More spills... thousands of passports, driver’s licenses, & Photo ids of fedex customers exposed.” Wccftech. https://wccftech.com/thousands-passports-fedexexposed/.

Spector, P.E., and S.M. Jex. 1998. “Development of four self-report measures of job stressors and strain: Interpersonal Conflict at Work Scale, Organizational Constraints Scale, Quantitative Workload Inventory, and Physical Symptoms Inventory.” Journal of Occupational Health Psychology 3 (4): pp. 356-367.

Wettering, F.L. 2000. “Counterintelligence: The broken triad.” International Journal of Intelligence and Counterintelligence 13 (3): pp. 265–300.

Downloads

Published

2024-07-08

How to Cite

KANELLOPOULOS, A.-N. . (2024). Counterintelligence Risks in Crew Management and Recruitment: The Role of Profiling and Screening in Shipping Companies. BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY, 13(2), 44–59. https://doi.org/10.53477/2284-9378-24-19

Issue

Section

Articles