President Donald Trump fired the head of the Coast Guard before her term was up on his first day in office. The Coast Guard commandant, Admiral Linda L. Fagan, was the first female uniformed leader of a branch of the armed forces.
Fagan’s firing sent shockwaves through the Coast Guard. Former Commandant Admiral Thad Allen criticized the decision in a statement saying, “Her dismissal is not a matter of her performance. It is political performance. One that should cause great concern for current and future military leaders,” he said.
Master Chief Petty Officer Charles Bowen and Master Chief Vincent Patton, two other high ranking former Coast Guard officials, also spoke out in Fagan’s defense.
“Admiral Fagan’s firing is wrong. There is no other way to say it. She is an honorable officer who has given her entire life to the Coast Guard and this is the wrong way for the new administration to end her career,” they said in a statement. The two, who worked with Fagan during her 40-year career, said Fagan inherited the DHS’s cited problems, and she “positively impacted current effort” to improve the service.
It has been reported that Fagan learned she had been fired while waiting to take a photo with Trump at the Commander in Chief Ball on Inauguration Day.
Teledyne FLIR Defense has been awarded a five-year Indefinite Delivery Indefinite Quantity (IDIQ) contract worth up to $74.2 million to provide modernized imaging surveillance systems to the United States Coast Guard (USCG).
FLIR Defense will deliver more than 125 Electro-Optic Sensor System-Modernized (ESS-M) systems for use on USCG rotary wing aircraft, specifically the MH-60 and MH-65. The advanced ESS-M platform features a full-HD sensor suite and updated user interfaces, as well as advanced processing capabilities and software enhancements that will support future growth.
The ESS-M systems provide operators with high-definition daylight, low light, and infrared imagery and will be used in support of all Coast Guard missions, with an emphasis on search and rescue, living marine resources, and law enforcement. The new technology also will augment coastal security, drug and migrant interdiction, ports and waterways protection, and other Coast Guard rapid response needs.
Teledyne FLIR Defense has been delivering and supporting legacy ESS systems for USCG medium- and short-range recovery aircraft since 2005.
“The significant updates through ESS-M will enable the U.S. Coast Guard to stay on technology’s cutting edge while conducting its wide range of key maritime operations,” said Dr. JihFen Lei, president of Teledyne FLIR Defense. “We’re proud to extend our history of support and look forward to building our relationship across all missions areas.”
Smart technologies are transforming the fundamental functions of ports, harbors, and shipping logistics, causing an unparalleled shift in the marine industry. The implementation of cutting-edge solutions is helping ports fulfill the increasing needs of international trade while adjusting to strict environmental rules, from improving sustainability to simplifying cargo administration. Smart-ports are now essential for competitiveness in the contemporary, networked economy, not just an ideal.
Cutting-edge technologies like blockchain, robotics, big data analytics, artificial intelligence (AI), the Internet of Things (IoT), and private 5G networks are coming together to drive this change. By facilitating smooth communication between ships, port officials, and inland logistics, these technologies work together to create integrated ecosystems that increase throughput, enhance safety, and save expenses.
Reduced vessel waiting times, improved supply chain transparency, predictive repair of vital infrastructure, and real-time emissions tracking are just a few advantages. Furthermore, by reducing greenhouse gas emissions through the integration of electrification technology and renewable energy systems, smart-ports strongly correspond with global climate action frameworks, including the Paris Climate Accord.
Defining the Smart-port
To improve operational efficiency, lessen environmental effects, and increase competitiveness in international supply chains, a smart-port incorporates digital, automated, and data-driven technologies. In contrast to traditional ports, which mostly use manual procedures, smart-ports use technology to support sustainable practices, guarantee smooth cargo movement, and streamline logistics.
Key Features of Smart-ports:
IoT-Enabled Ecosystem
By gathering and sending real-time data on a variety of operations, including ship movements, cargo conditions, and equipment performance, Internet of Things sensors integrated into port infrastructure transform operational efficiency. These gadgets facilitate the smooth exchange of data between linked systems, giving port operators the ability to keep an eye on and oversee operations with unmatched precision. For example, intelligent sensors built into containers continuously monitor and report vibration, temperature, and humidity levels, guaranteeing ideal conditions for delicate items like fresh produce or medications. Alerts are immediately notified when certain thresholds are crossed, allowing for prompt action to stop spoiling or damage.
IoT networks also make it possible to see the supply chain in real time, which increases transparency for all parties involved, including logistics providers, shipping businesses, and customs officers. Because the constant data stream helps identify inefficiencies and enhance overall efficiency, ports that use this ecosystem see less delays and optimal resource utilization.
Automation
By implementing cutting-edge technologies like robotic systems, guided vehicles, and autonomous cranes, smart-ports’ automation revolutionizes cargo handling procedures. These developments guarantee constant precision and accuracy in cargo handling while drastically reducing the need for manual labor. With their exceptional speed and efficiency, autonomous cranes driven by AI and renewable energy sources maximize ship loading and unloading while lowering the possibility of human error. Concurrently, self-driving guided vehicles improve operational efficiency by streamlining container movement between terminals.
Robotic systems, which are made to perform physically taxing and repetitive jobs, lower workplace injuries and free up employees to concentrate on higher-value duties. In addition to advancing environmental objectives, automated stacking cranes — which are frequently driven by renewable energy — also guarantee the best possible use of available space in container yards. Together, these systems increase throughput, save operational costs, and help smart-ports achieve their long-term sustainability goals.
AI and Predictive Analytics
Through the analysis of enormous amounts of historical and current data, artificial intelligence (AI) and predictive analytics are essential to port operations optimization. Systems driven by AI improve decision-making through pattern recognition, result prediction, and actionable insights. By examining variables like tidal patterns, ship arrival times, and available dock space, these systems, for example, can optimize vessel berthing schedules, reducing turnaround times and increasing port capacity. Additionally, ports can forecast cargo demand using historical trends, market circumstances, and shipping schedules thanks to predictive analytics, which helps operators better allocate resources.
Additionally, by tracking performance data and seeing early warning indicators, AI systems may forecast equipment breakdowns, allowing maintenance personnel to proactively solve problems and prevent expensive interruptions. This proactive strategy guarantees uninterrupted operations, minimizes downtime, and improves port infrastructure dependability, all of which contribute to providing stakeholders with better service.
Blockchain for Transparency
By establishing a safe, unchangeable ledger for monitoring cargo movements and emissions data, blockchain technology provides a novel way to improve transparency and confidence in port operations. Every action or transaction that is documented on the blockchain is cryptographically protected, guaranteeing data integrity and lowering the possibility of fraud or illegal changes. Blockchain, for example, can be used by shipping businesses to confirm the origin, transit history, and destination of products, giving all parties involved end-to-end visibility and accountability.
Because blockchain enables precise tracking and reporting of carbon emissions and other sustainability measures, this degree of transparency is especially advantageous for guaranteeing adherence to international trade laws and environmental norms. Additionally, blockchain systems’ smart contracts automate procedures like payments, freight releases, and customs clearance, cutting down on human interaction and administrative delays. Blockchain improves the overall effectiveness of port ecosystems and builds stakeholder trust by creating a safe and open operating environment.
Renewable Energy Integration
By incorporating energy-efficient infrastructure and renewable energy sources, smart-ports show their dedication to sustainability and lessen their environmental effect. By connecting moored vessels to the local electrical grid, shore-to-ship power systems, for example, enable them to switch off their diesel engines and drastically cut down on noise pollution and greenhouse gas emissions. In order to lessen their dependency on fossil fuels, ports are also implementing wind and solar energy installations to power vital infrastructure including automated systems, cranes, and lighting. Furthermore, cutting-edge technologies like microgrids and energy storage systems provide a steady and effective power supply even during times of high demand.
By reducing energy waste, the use of energy-efficient infrastructure — such as LED lighting, insulated buildings, and intelligent energy management systems — further improves sustainability. When taken as a whole, these programmes help ports become carbon neutral, comply with international environmental standards, and establish themselves as pioneers of sustainable marine practices.
By implementing these technologies, ports become intelligent hubs that can manage growing cargo volumes without sacrificing operational and environmental effectiveness.
Smart technologies are transforming the fundamental functions of ports, harbors and shipping logistics by reducing vessel waiting times, improving supply chain transparency, allowing for predictive repair of vital infrastructure and real-time emissions tracking, among other advantages. Image courtesy of Mario Eisenhut.
Case Studies: Smart-Ports Around the Globe
Port of Rotterdam (Netherlands)
As Europe’s largest and most innovative port, Rotterdam exemplifies the smart-port model. The port has invested heavily in IoT infrastructure, AI-driven logistics, and renewable energy solutions.
• Digital Twins: Rotterdam uses digital twin technology to create virtual replicas of its infrastructure. These replicas simulate various operational scenarios, enabling port authorities to optimize resource allocation and streamline vessel traffic.
• Predictive Maintenance: AI-powered systems analyze data from IoT sensors installed on cranes, conveyor belts, and docks. These systems identify wear patterns and predict maintenance needs, reducing downtime and extending equipment lifespans.
• Green Initiatives: The port operates wind farms and solar panel installations to power its operations. Shore-to-ship power systems allow docked vessels to connect to the grid, eliminating emissions from auxiliary engines.
Shanghai Yangshan Deep-Water Port (China)
As one of the world’s busiest and most advanced ports, Yangshan utilizes cutting-edge technologies to maintain its position as a global trade hub.
• Autonomous Guided Vehicles (AGVs): The port operates hundreds of AGVs that transport containers between vessels and storage areas. These vehicles use AI algorithms to optimize their routes, minimizing energy consumption and operational delays.
• AI-Powered Robotics: Robotic cranes equipped with machine learning capabilities automate container loading and unloading processes, ensuring speed and precision.
• Weather Resilience: Advanced weather prediction systems integrated with port operations mitigate the impact of storms and typhoons, ensuring uninterrupted service.
Port of Los Angeles (USA)
The Port of Los Angeles, a critical gateway for trans-Pacific trade, has embraced digital transformation to enhance its operational capabilities.
• Digital Twin Technology: This virtual modeling tool helps port authorities monitor real-time vessel movements, cargo flows, and infrastructure performance.
• Zero-Emission Equipment: The port is a pioneer in deploying zero-emission cargo-handling equipment, including electric-powered cranes and hydrogen-powered trucks.
• Smart Surveillance: AI-enabled cameras and drones monitor unauthorized activities, ensuring the safety and security of port infrastructure.
Port of Singapore
Singapore, a global logistics hub, leverages smart technologies to maintain its competitive edge.
• Blockchain-Driven Customs Clearance: The port utilizes blockchain for real-time cargo tracking and seamless customs processes, reducing delays and ensuring transparency.
• AI-Driven Traffic Management: Advanced algorithms analyze vessel arrival patterns to optimize berthing schedules, minimizing congestion and idle time.
• Cybersecurity Framework: A robust cybersecurity infrastructure safeguards the port’s data and systems from potential threats.
Port of Hamburg (Germany)
Under its SmartPORT initiative, Hamburg focuses on sustainability and operational efficiency.
• Big Data Analytics: The port processes vast amounts of data from IoT sensors to optimize vessel turnaround times and cargo movements.
• Green Energy Solutions: Hydrogen fuel-cell systems and solar installations support the port’s decarbonization efforts.
• Smart Parking: Automated parking systems for trucks reduce congestion and improve supply chain coordination.
Challenges in Implementing Smart-Port Technologies
Cybersecurity Threats
Smart-port systems’ interconnectedness greatly raises their vulnerability to cybersecurity threats. Every linked component becomes a potential weakness that hackers may take advantage of as smart-ports embrace IoT devices, logistical platforms, and autonomous systems. Cybercriminals may compromise systems to steal confidential information, interfere with business operations, or even destroy vital infrastructure, such ship berthing systems or cranes. Ransomware attacks, for instance, have the potential to halt port operations, resulting in monetary losses and supply chain interruptions. The blockchain systems used to track shipments may also be the target of sophisticated hackers, eroding transparency and confidence.
Strong cybersecurity measures must be put in place to combat these threats. This includes network segmentation to separate important systems from non-essential ones, intrusion detection systems to keep an eye out for illegal activity, and end-to-end encryption to protect data while it’s in transit. Staying ahead of changing threats also requires maintaining current software, implementing zero-trust frameworks, and performing frequent security audits. Ports are able to establish a cohesive approach to cybersecurity and guarantee the resilience of their digital ecosystems by encouraging cooperation amongst stakeholders, including government organizations, port operators, and technology providers.
High Initial Investment Costs
Adoption of smart-port technology necessitates a large initial cost outlay for sophisticated software, cutting-edge hardware, and infrastructure upgrades. Smaller or emerging ports find it especially difficult to compete with their larger, better-funded counterparts when it comes to the implementation of IoT networks, autonomous systems, and renewable energy solutions because these technologies frequently come with significant procurement and installation costs. The financial burden is further increased by continuing costs for cybersecurity, system maintenance, and upgrades. The adoption of smart-port innovations may be slowed down or discouraged by these expenses, which could lead to a greater disparity between established and underdeveloped ports.
Strategic public-private partnerships (PPPs), which combine resources and expertise, can be crucial in overcoming this obstacle. These costs might be further offset by government grants and subsidies, especially those related to sustainability and digital transformation projects. Innovative funding options can also be found by investigating finance methods like Build-Operate-Transfer (BOT) agreements or Green Bonds designed for sustainable infrastructure. Ports can boost the use of smart-port technologies and draw stakeholders by highlighting the long-term return on investment through increased efficiency, lower operating costs, and environmental benefits.
Skill Gaps
The adoption of smart-port systems creates a major need for workers with expertise in cutting-edge technologies like automation, blockchain, IoT, and artificial intelligence. However, it’s possible that a large number of port workers and operators lack the technical know-how required to run, maintain, and maximize these sophisticated technologies. Because poor management of smart technologies can result in operational failures, security flaws, and inefficiencies, this talent gap is a serious problem. A multifaceted strategy is needed to address this problem, starting with the creation of specialized training facilities aimed at upskilling the present workforce. These facilities ought to provide practical instruction in data analysis, programming, and system administration that is adapted to the particular needs of port operations.
Additionally, establishing collaborations between academics and business can help close the gap by creating specialized research opportunities, internships, and curriculum. Through grants, certificates, and scholarship programmes aimed at underprivileged populations, governments and trade associations can also encourage the development of skills. Ports can guarantee a seamless transition to smart systems and increase resilience against upcoming technology upheavals by developing a workforce that is knowledgeable and flexible.
Integration Complexities
It can be quite difficult to integrate modern technology with the port’s current infrastructure, especially when older, legacy systems are used. In order to interact with contemporary IoT devices, AI platforms, and autonomous systems, many traditional ports use antiquated technologies and disjointed systems. The potential advantages of smart-port developments may be compromised by operational bottlenecks, data silos, and inefficiencies brought on by this misalignment. Adopting middleware solutions that can bridge the gap between new technologies and legacy systems is necessary to overcome these integration challenges. By serving as a mediator, middleware facilitates smooth data transfer and platform interoperability.
The integration process can also be made simpler by the creation and use of standardized communication protocols, including API-driven frameworks or OPC UA (Open Platform Communications Unified Architecture). To reduce disruptions during the shift, careful planning is also necessary, including phased rollouts and pilot testing. Ports can maximize the return on their IT investments and future-proof their operations by investing in scalable and adaptable integration solutions.
Dependence on Foreign Technology
Concerns of data sovereignty, cybersecurity, and operational independence are brought up by the dependence on foreign-made hardware and software, such as cranes built in China, IoT platforms, or AI-driven systems. Because of these interconnections, ports are susceptible to supply chain interruptions, geopolitical unrest, and possible security threats from unapproved data access or concealed backdoors. For example, if access to proprietary systems or components is prohibited, depending on foreign technology providers may result in the loss of crucial operational control. It is imperative that regions make investments in the development of locally or regionally generated technologies in order to reduce these dangers. Government incentives, research funding, and public-private partnerships that promote domestic innovation in important fields like automation, the Internet of Things, and sustainable energy solutions might help achieve this.
Furthermore, establishing regional collaborations and supply networks can increase economic resilience and lessen dependency on any one nation. Data sovereignty and operational autonomy can be further improved by establishing strict procurement guidelines, carrying out thorough security evaluations, and giving open-source solutions priority. Ports can preserve more control over their infrastructure and protect their long-term interests by supporting local expertise and diversifying their sources of technology.
The use of developing technology to improve safety, extend the lifespan of infrastructure, and optimize port operations is causing a radical change in the marine sector. This article examines the critical functions of wireless sensor networks (WSNs) and artificial intelligence (AI) in contemporary ports, emphasizing its uses in environmental adaptability, autonomous operations, surveillance, predictive maintenance, and structural health monitoring. These developments are raising the bar for smart-port ecosystems by promoting sustainability and operational efficiency.
Ports handle enormous amounts of goods and must run smoothly to reduce delays and disruptions, making them essential nodes in the global supply chain. Ports are incorporating new technologies to meet the problems presented by growing demand, deteriorating infrastructure, and changing security concerns. With their sophisticated capacities to track, forecast, and enhance port operations and infrastructure, AI and WSNs stand out as game-changing solutions.
AI is transforming port operations through data analysis, process automation, and intelligent decision-making. Its many uses in the maritime industry are intended to increase productivity, lower operating expenses, and boost security.
By leveraging AI, ports can adapt to the demands of modern logistics while ensuring streamlined, secure, and efficient operations.
WSNs are a key component of smart-ports, allowing for real-time environmental and structural state monitoring. These networks are made up of linked sensors that offer useful information for operations and maintenance.
Port operations can benefit greatly from the combination of AI and WSNs. While autonomous systems and intelligent surveillance increase operational efficiency and security, predictive maintenance and corrosion monitoring increase the dependability of vital infrastructure. By lowering energy use, cutting waste, and extending asset lifespans, these technologies work together to make ports more sustainable.
There are still issues, though, such as the requirement for qualified workers to run and maintain these systems, the high upfront expenses, and cybersecurity threats. To fully utilize new technologies, these obstacles must be removed through focused training initiatives, public-private partnerships, and strong security frameworks.
The smart-port revolution is largely made possible by AI and WSNs, which turn conventional operations into intelligent, data-driven ecosystems. Ports can improve safety, maximize productivity, and guarantee the durability of vital infrastructure by utilizing these technologies. The use of AI and WSNs will continue to be essential to sustainable and effective port operations as the global maritime sector embraces innovation.
With its unmatched potential for sustainability, efficiency and security, the worldwide smart-port revolution is revolutionizing the maritime industry. Ports throughout the world can establish themselves as leaders in the changing marine ecosystem by embracing innovation, encouraging cooperation, and tackling important issues.
Mario Eisenhut
About the Author
Mario Eisenhut is a maritime professional with experience that includes diverse roles across multiple maritime projects. Eisenhut‘s career has included positions such as marine coordinator, risk advisor, yacht service manager, business development manager, project manager and captain. He is skilled in risk analysis, with hands-on experience as a test manager for drone operations, focusing on safety management. Currently he is serving as a marine coordinator in the North Sea, overseeing ship activities, managing permits and ensuring operational seamlessness. He can be reached at m.eisenhut@consulting-eisenhut.de.
Security has long been a front-of-mind issue for commercial aircraft owners/operators. Security risks are just as real in the business aviation sector. Security threats to business aviation are everywhere, so businesses and individuals who operate in the business aviation community must make sure to have a plan in place that’s active, effective and dynamic. Risks are incredibly varied and can be of a geopolitical, social, cyber, weather or medical-related variety among others, security experts say.
In a bid to address these risks, the International Business Aviation Council (IBAC) hosted an online course this past fall, entitled, “Business Aviation Security Fundamentals” (BASF). It was hosted by Dyami Security Intelligence and IBAC’s International Standard for Business Aircraft Operations (IS-BAO)/International Standard for Business Aircraft Handling (IS-BAH).
According to the BASF course description, “this new live, virtual, two-day course is designed to equip business aviation professionals with the essential tools to safeguard their operations. Learn about aircraft and passenger security, threats from emerging conflict zones, climate activism, and information security. Participants will gain a deeper understanding of effective risk-management strategies, integrating security practices into their organizational framework, and mitigating these potential threats. The course will provide insight into conforming to IS-BAO/IS-BAH standards and its security chapters.”
“Dyami founder and CEO Eric Schouten is the course presenter,” the BASF course description added. “He brings his aviation intelligence and expertise in espionage, terrorist plots, and the MH17 disaster that inspired him to create Dyami, aiming to make security and intelligence services accessible and affordable.”
During the two-day workshop, the business aviation topics covered included security rules and regulations, security awareness and culture, and risk assessment strategies and mitigation. The content was put together by Schouten, IBAC’s IS-BAO director, Andrew Karas, and IBAC’s IS-BAH director, Terry Yeomans.
In a wide-ranging discussion with Transport Security International after the BASF course was held, these three gentlemen explained the motivation for creating it, the security threats faced by business aviation, and the ideas that were shared to address these threats.
Transport Security International: What was the impetus for creating the Business Aviation Security Fundamentals course, and who was it aimed at?
Andrew Karas, IBAC’s IS-BAO director
Andrew Karas: Here at IBAC, we had thought about it for a couple of years. There’s been a growing need for an awareness of security tailored to business aviation operations.
The course itself was designed to educate people such as flight department personnel, security managers, aviation professionals, and both air operations and ground handling to enhance their understanding of security and best practices as well as touch on some regulatory requirements.
We reached out to Eric and his Dyami team to get some subject matter expertise and bring to the table his experience and the experience of his team, so that they can educate business aircraft operators as well as ground handling organizations on security.
Terry Yeomans, IBAC’s IS-BAH director
Terry Yeomans: I think as the reach of safety management systems expands into the ground handling sector, that we need to work out how we’re aligning the practices that we do with our standards and recommended practices between the IS-BAH and IS-BAO systems and how they can interface with security matters. After all, safety and security starts on the ground, and it’s all about trying to get people to talk, to engage, and to understand where those interfaces are and how we can make everyone safer and more secure. So there was a very simple logic behind why we decided to do something.
Transport Security International: Eric, what is your expertise in business aviation security?
Eric Schouten, founder/CEO Dyami
Eric Schouten: As a former intelligence liaison from the Dutch Security and Intelligence Service, I have found that the business aviation industry really needs support in knowing how to handle the security threats that are out there. For the people who have to deal with it, who are not doing this on a daily basis or as a full-time job, they need to understand what threats are out there, how to discuss this with the leadership, and also how to deal with it within the budgets that they have in place.
I worked over 13 years at the Dutch Security and Intelligence Service, and most of the time I was the aviation liaison serving the aviation industry with intelligence reporting and awareness. I was dealing with airports, FBOs, and airlines, providing them with the intelligence they needed to have a safe and secure operation on a global level.
I was involved with MH17 crisis management. I shared intelligence on counter-terrorism and counter-espionage situations. And I discovered during my career at the agency that the business aviation industry really needed support in dealing with these threats because airlines usually have large security departments, while the business aviation industry does not. So they also need that same type of intelligence.
Transport Security International: With respect to business aviation security, what are the threats facing the industry today?
Schouten: The most common threat right now is what’s happening in the world. The world is changing rapidly, and geopolitical risks are in place.
So you can’t just run an aircraft operation like you did four to five years ago. Countries are in conflicts. You have to deal with overflight risks, and you also have to understand the destination and what’s happening over there. Civil unrest is rising, which is why you have to understand what’s happening in the country of destination. Is it safe to park your aircraft over there, and how do you deal with espionage risks for your clients?
When you look at security risks from an FBO/airport level, they’re dealing with the rise of activism and it’s not just climate activists. It could also be activists dealing with what’s happening in another side of the country and all of a sudden your operation is affected. It could be that there is a facility at your airport that is providing services or is part of the supply chain of a war abroad and activists find you. So you really have to understand the why and how to counter this.
Transport Security International: So how did you tackle this during the two-day BASF course?
Schouten: Well, the first thing we did was to share stories together. We taught the students to drink coffee together and to share information.
I personally think that’s a very core principle of risk management. You have to be able to share information with others or be able to get help from other organizations, and then you have to identify what are the types of risks. Then you have to feed the risk management assessment with intelligence. You have to feed it by identifying what type of organization you are and what are the threats coming ahead of you.
As it turned out, we had a mix of students. Some of them are aircraft operators and others are FBO type of operations. They have different threat levels. An aircraft operator has to deal with geopolitical risk. What’s happening over there? Meanwhile, the operation on the ground really has to deal with the local risks. So you have different risk appetites. (Note: The Institute of Risk Management defines a risk appetite as “the amount and type of risk that an organization is willing to take in order to meet their strategic objectives.”)
Transport Security International: What relationship does the notion of “risk appetites” have on business aviation security?
Karas: I’ll touch on that, and then I’ll hand it over to Terry if he has any other comments.
My program is the International Standard for Business Aircraft Operations (IS-BAO). Like the IS-BAH program, IS-BAO has a chapter that covers security. That chapter asks organizations to establish and maintain a security program that’s proportional to the threats against the organization. So it asks their personnel and their facilities and their oversight to look at their vulnerabilities and see what requirements they need. Do they have regulatory requirements? Do they have corporate requirements? Do they have individual person requirements? So, our standards provide those questions for operators to answer.
Yeomans: Since the Pan Am incidents (such as the Lockerbie bombing of Pan Am Flight 103), there’s been increased heightened activity about airside activity and airside security. It’s been about trying to get people to think about what their risk appetite is and to start considering what they need to do, not necessarily just to deal with the regulation, but going beyond what the regulation’s looking for.
That being said, the regulation is really aimed at airline security. It’s not designed for business aircraft security. And we do have different risk appetites in terms of the business structure that we have. So it’s good to get people talking to open up and think about, “Well, maybe I’m not alone, maybe I can work this journey with other people that do this in the same way.” And that’s why we’re trying to bring everybody together; ground handling, aircraft operations, security intelligence saying, “Okay, what is out there? What do you think has happened? What have you seen happen in the past? And how can we better educate everybody to think outside the box?”
Transport Security International: So how was the BASF course structured?
Schouten: It was a two-day online virtual course, and what’s important to understand is that we truly made it an interactive course. It wasn’t a PowerPoint slide deck that people see all the time. No, it was all about sharing stories and experiences and deep diving into that with best practices. The best practices are key.
The most important part of the course was to take assumptions away. What organization is doing this? Is that organization doing this for you within the company? Are people doing this or your client assumes that you are taking care of their security risk assessments? Well, in reality, you may not. So you really have to understand that the security culture has to be in place, and also how to work with your board because it’s all about understanding.
Transport Security International: So what did you students learn about business aviation security during the BASF course?
Schouten: Basically what we noticed was a lot of eye-openers taking place.
For instance, the people in charge of business aviation security often get the task because they have backgrounds in the police force or in defense or something like that. And all of a sudden, they’re responsible for the security part of this business aviation operation where there is a challenge and they can’t do this alone. So we saw a lot of students really have an opening up like, “Oh wow, so this is all we need to do, but we need help with this.” And that was very interesting to see.
What I noticed — and Andrew and Terry can correct me or at least add to it — is that business aviation is a fast business. “We have to be somewhere quickly and it’ll be alright.” However, given the world today with the new threats out there, you can’t just operate like you used to.
Yet the assumption that everything will be fine is still there. I really notice it. I was at an aviation conference and you still see this mentality, and that really has to change. We have to change the security culture of assumptions about everything is still okay. We really need to change that.
Karas: To piggyback on what Eric said, from the aircraft operator side the assumptions are that the security situation will be handled at various steps to their destination; that there’s already security measures in place that allow them to have the awareness of overflight risks; the security at their destination, at their hotel or transportation is in place; and that the security situation at the destination is being managed appropriately by the state or the local police authorities. Those are the assumptions that I think many operators have and those assumptions, like Eric probably alluded to, may no longer be valid. I’ll pass it over to Terry because he handles the ground operations side.
Yeomans: Generally all of aviation — particularly in our sector — is very much inward facing: “What’s the security threat to me? What’s the security threat to my company, my workers, my employees?”
What we’re trying to get people to think about is how you can open up those silos; how you can bridge that and work together as a team, rather than that insular inward-looking focus all the time. Because by reaching out and speaking to people saying, “Okay, well what do you see? What do you hear? Can you help me with this?” — that’s going to open up and make everybody much safer in the way we operate.
Transport Security International: So how did the BASF course turn out? And does IBAC plan to offer it again?
Karas: We had seven in this class. We are offering this course as schedules permit, but it’d be offered a few times a year. It’s based on everybody’s availability. We don’t have anything set, but we do plan to offer it in the future.
Schouten: We are very willing to offer this every three months or every two months. And we’re seeing interest in this because a lot of people are struggling with how to deal with the threats out there. Look at the situation right now in the Middle East; it’s really a discussion point at this time. So people are interested in how to deal with emerging conflicts. It’s becoming a topic, so they need guidance and IBAC is providing this now.
Yeomans: Everybody knows there’s a risk, but they believe that it’s covered or somebody else is covering it for them. This course is opening up a pathway to get people to talk about where the gaps are in business aviation security today, and how we can address those gaps.
After a hiatus of several years where piracy and other state-backed threats across swathes of the global commons and national littorals had appeared to be on the wane, events over the last fifteen months have brought the requirement for coordinated maritime security back into sharp focus. Although Houthi efforts to disrupt shipping in the Red Sea and Gulf of Aden are probably the most well-known, viewing this group’s actions as the marker for the myriad other threats facing global supply chains in the maritime environment risks both over simplifying “threats,” and potentially over-engineering mitigation methodologies appropriate elsewhere.
Hard-earned lessons around the generic and specific nature of maritime security will inevitably have been forgotten as corporate institutional memory fades, and budgets are refocused elsewhere. Any renewed emphasis on maritime security must also be considered alongside the growth in dynamic new threats not even considered only short years ago. Simply put, this is now a far more complex environment than previously.
Understanding: The Key Enabler?
Regardless of where, how and when activity across global supply chains takes place, ensuring access to an understanding of threats and risks, including some that haven’t even been considered, is certainly the most critical enabling activity across all global logistics. This is particularly critical within the maritime environment to ensure a more profitable bottomline. The depth of knowledge and expertise required is often, but not always, best delivered via a trusted outsourced partner who has the subject matter expertise and international connections to deliver nuanced maritime security, specific intelligence assessment and appropriate security mitigations.
On-going conflicts in the Middle East and Russia’s attack on Ukraine have both been significant catalysts in the development of capabilities that can now be turned against global supply chains. State actors are now increasingly using proxies and others who can do their bidding in an unattributable manner, but often with covert state-backed support in the form of cyber effects, intelligence, surveillance and reconnaissance (ISR), including access to satellite technology, electronic eavesdropping and artificial intelligence, and logistics. All this can turn what may have previously been thought of as “simple” pirates or opportunist criminals operating around port facilities into potentially very significant threats. The capabilities to mount attacks are further magnified at a local level through the use of novel, but increasingly effective technologies, with commercial drones being the most noteworthy and potentially significant, both to conduct surveillance and also to mount attacks, without appropriate security measures to defeat them.
Because of this, the maritime security industry needs to be increasingly focused across the logistics chain that begins elsewhere, i.e., at the factory floor or a distribution warehouse, which becomes the industry’s responsibility on its journey and remains under observation and care until it has left the port. Simply focusing on the situation whilst at sea is no longer sufficient to counter the threats and risks that are faced by deeply interconnected global supply chains; some part of which will inevitably be a target of various actors and adversaries.
The Maritime Security: What Next?
This short article needn’t explain the well-established relationships and organizations between the industry and its clients, nor list all those groups who enable this. But the maritime security industry is probably better integrated into the needs of its client base than many others, all honed over years of prescient threats from the mid-1990s until the late 20-teens. At its zenith, the “Best Management Practices to Deter Piracy and Enhance Maritime Security” (BMP Series) has become the globally recognized guide designed to help vessels owners and Masters mitigate the risk of piracy and other maritime security threats. Each iteration of BMP reflects lessons learned from real-world incidents, evolving threats, and advances in maritime security practices. The BMP are very good but are in danger of not keeping up with rapidly evolving threats, particularly where geopolitics and state-based threats need to be considered. This means experts within the industry are more necessary than ever to translate a pragmatic interpretation of the threat as it actually exists, via their access to a refined and effective intelligence picture to then ensure the delivery of an entirely effective end-to-end security plan.
The days of armed and unarmed guards no longer providing close protection security on vessels transiting across the world’s oceans are still probably years away. But these individuals will increasingly be the forward sensor for a sophisticated intelligence and security ecosystem, able to harness technology to ensure their vessel is as safe as it can be from multiple threats; and can share insights with and from other vessels, including with allied naval flotillas in the highest risk areas. Informing dynamic routing advice to boardrooms and the Master of each vessel and acting as the anchor to global trade in an increasingly complicated and dangerous world.
About the Author
Cliff Thoburn MBE is head of intelligence at RMI Global Solutions, security and intelligence specialists that monitor and assess global risks using a bespoke risk management methodology. Thoburn has more than three decades of expertise gained in the U.K.’s government intelligence environment. With extensive experience delivering security and resilience solutions for critical national infrastructure, including the U.K.’s energy sector, he provides insight into threat mitigation. His particular interest is in the emerging risks posed by unmanned aerial and surface technologies, which are reshaping security challenges, and how to mitigate threats for RMI’s clients.
The global security order is facing unprecedented challenges. Russia’s war of aggression against Ukraine, growing geopolitical tensions, and the vulnerability of critical infrastructures are demanding an increased commitment to defence and security issues from Germany and other European countries. DSEI Germany will be held for the first time from 19 – 22 January 2027 at the Messegelände Hannover (Hannover Exhibition Grounds) to address this demand.
DSEI Germany is organised by Deutsche Messe AG in partnership with the organisers of DSEI UK and DSEI Japan, the world’s leading security and defence exhibitions. DSEI UK and DSEI Japan take place every two years in London and Tokyo respectively.
DSEI Germany will showcase the modern military equipment, armaments, technologies, products, processes, and materials required to ensure national defensive potential, the ability to meet alliance commitments, and geopolitical security. The event will support industrial companies and their suppliers to meet the increasing demand brought about by the “Zeitenwende,” the turning point which is transforming Germany’s defense policy.
The security policy priorities of NATO and the EU will form the basis of the debate, with military leaders and civilian decision-makers discussing strategic defence issues and opportunities for partnerships.
Following the historic “Trinity House” agreement between the UK and Germany, with the aim of deepening security and defence cooperation between the two countries, DSEI Germany will provide a forum for consolidating and expanding partnerships and alliances both within Europe and worldwide, while promoting cooperation in security policy.
Today’s defence requirements are becoming increasingly complex and demand comprehensive, networked solutions in all areas of the modern army. The trade fair offers industry partners a platform to present capabilities and technologies tailored to the respective military needs.
DSEI Germany is receiving comprehensive support from Germany’s Federal Ministry of Defence and Bundeswehr: “The turning point in Germany’s defence policy not only requires us to reorientate our defence strategy but also calls for technological and industrial capabilities to be promoted in a targeted manner,” explained Boris Pistorius, the Federal Minister of Defence. “DSEI Germany can provide Germany with an important platform to demonstrate its defence capabilities, technological leadership, and innovative strength on the international stage.”
Olaf Lies, Lower Saxony’s Minister of Economic Affairs, said: “The announcement of DSEI Germany is an important signal for Lower Saxony as an important industrial location. After all, the view of the defense industry has changed fundamentally, not least as a result of Russia’s war of aggression against Ukraine. In view of the current geopolitical challenges, the importance of close cooperation between industry, research and politics to develop new solutions for the security and defence capabilities of Germany and Europe is more evident than ever. Our security and resilience are directly linked to the operational readiness and capabilities of our armed forces. Hannover as the location of this new leading trade fair not only strengthens our defence industry, but also numerous suppliers and partners who play a key role in the value chain. Lower Saxony is an important location for industry in Germany and it is therefore only logical that Deutsche Messe AG is also involved in this sector and makes a decisive contribution to networking the industry.The Zeitenwende described by Federal Chancellor Olaf Scholz requires us as a society to set the right course for the business location. DSEI Germany offers a platform on which strategies, innovations and new partnerships can be established in order to meet the challenges of our time with combined forces. The fact that we in Lower Saxony are hosting this event shows that we are prepared to take responsibility here”.
“DSEI is a long established and respected brand in the defence and security sector and has a strong reputation for delivering events of outstanding value for the global audience we serve at both DSEI in London and Tokyo. DSEI Germany presents a key opportunity to bring the domestic industry together with its allies and partners to demonstrate capability and concepts,” said Chris Gallon, CEO, EMEA for DSEI.
“No other trade fair company has a national and international political network that can match that of Deutsche Messe,” said Dr. Jochen Köckler, CEO of Deutsche Messe. “Together with the DSEI team, and in combination with our modern premises which have a long track record of hosting world-class industrial trade fairs, we can wield our strengths in a targeted manner to make an important contribution toward strengthening security in Germany and elsewhere in Europe.”
Bulgarian shipping company, BMF, denied that its ship, the Vezhen, deliberately cut a crucial communications fiber optic cable in the Baltic Sea. The cable connects Latvia and the Swedish Island of Gotland. The Vezhen was detained in the Baltic Sea. Swedish prosecutors opened an investigation and said they were suspicious of sabotage.
“It is possible that the ship Vezhen caused the cable between Gotland and Latvia to break, but in no case, I personally do not believe that this was sabotage or any other action by our crew,” the company’s CEO, Captain Alexander Kalchev said. Kalchev referred to information obtained from the crew that the ship was sailing late on Sunday evening (26 January) in very bad weather. Eventually, the crew realized that the left anchor was being dragged along the seabed. He also said that the automatic ship identification system showed that the Vezhen passed over the cable, and that it was not clear when exactly it was cut.
On the evening of January 27, the Coast Guard interdicted a 40-foot panga-style vessel with 21 individuals aboard, approximately 20 miles off Point Loma, CA.
U.S. Customs and Border Protection alerted the Coast Guard, leading to a swift response from the USCGC Active and USCGC Terrell Horne.
While initial interviews indicated all claimed Mexican nationality, further checks revealed two were from Guatemala and El Salvador. All individuals were safely transferred to U.S. Border Patrol custody.
Regula, a global developer of forensic devices and identity verification solutions, has updated its Regula Document Reader SDK. Now, the software fully supports the new Digital Travel Credential (DTC) format, aligned with the International Civil Aviation Organization (ICAO) standards. This enhancement enables governments, airlines, and border control authorities worldwide to process travel documents with unmatched security, efficiency, and ease—whether on-site or remotely.
The DTC is a secure digital solution that streamlines travel experiences. It consolidates key personal information into a single virtual document that travelers can store on their mobile devices or upload to their digital wallets and share whenever needed. The main goal of the DTC is to facilitate clearance procedures during travel and ensure that people are eligible to enter their destination before they board a flight.
The process of DTC-VC creation
The ICAO has defined three types of DTC, each offering varying levels of convenience and security for travelers.
DTC Type 1 allows travelers to create their own digital credentials by extracting a Virtual Component (DTC-VC) from a physical electronic identity document, stored on their personal device. However, travelers must still carry the original document for identity verification.
DTC Type 2, issued by authorities, combines a cryptographically linked Virtual Component (DTC-VC) and a Physical Component (DTC-PC). This format adds an extra layer of security while maintaining a connection to the physical document.
DTC Type 3 represents the future of travel identification: a fully digital document issued directly by authorities. Unlike the other types, it eliminates the need for a physical ID, streamlining identity verification for a completely digital experience.
Now, with Regula Document Reader SDK, users can create and reprocess DTC-VC from ePassports, and verify it by passing DTC-VC data as input. Also, support for handling DTC-PC has been introduced. The updated Regula Document Reader SDK can:
read the document’s RFID chip with a smartphone or passport reader and create DTC-VC;
recognize, read, and verify DTC-VC with a smartphone, passport reader, or server;
read DTC-PC with a smartphone or passport reader, parse its data, and verify it.
The updated Regula Document Reader SDK is equipped with advanced features that fully support DTC implementation.
Trustworthy NFC verification. First and foremost, it provides trusted server-side NFC verification of the ID so it ensures accurate and trustworthy DTC-VC creation. Since all the data from the chip can be verified on a secure server, there is no need to question the reliability of the checks performed by a mobile device (which is prone to manipulation). Such an approach ensures that the virtual component of a traveler’s document is secure and taken from an authentic ID.
Compliance with ICAO guidelines and technical reports. Regula Document Reader SDK not only verifies DTCs but also guarantees that each DTC fully complies with ICAO guidelines and technical reports. This makes Regula’s solution an indispensable tool for airlines and governments so they can be confident in the validity of travelers’ DTCs.
Future-ready technology. In addition to supporting DTC-VC, Regula’s technology is fully compatible with handling DTC-PC. Looking further ahead, Regula is ready to process DTC Type 3, a digital passport that is expected in the next several years.
To facilitate the fast and smooth global application of DTCs, Regula Document Reader SDK relies on the most comprehensive identity document template database, which is owned and maintained by Regula. Currently, it contains more than 14,000 ID templates from 251 countries and territories, and it’s constantly growing.
Regula Document Reader SDK is designed for easy integration into third-party applications, allowing clients to incorporate this advanced DTC-ready technology seamlessly into their existing systems. With customizable options, businesses can adapt the solution to meet their unique operational requirements while providing end users with a secure, streamlined digital experience.
“We see that the world is rapidly moving to embrace digital IDs. According to the Forrester Consulting study commissioned by Regula earlier in 2024, nearly half of businesses around the world, 42%, are actively integrating digital IDs into their systems. For the Aviation sector, this rate is even higher: 50%. By ensuring full DTC support in the latest update of Regula Document Reader SDK, we are helping our clients to smoothly transition to the future of travel, where secure, digital-first solutions redefine the passenger experience.” — Ihar Kliashchou, Chief Technology Officer at Regula
Yemen’s Houthi rebels have released the crew of the Galaxy Leader — a cargo ship that was seized back in November 2023. It was at that time a campaign of attacks began in the Red Sea on shipping vessels began. These attacks have been linked to the Gaza war.
The crew, consisting of 25 Filipinos, Mexicans, Romanians, Bulgarians and Ukrainians have been held since the Houthis used a helicopter to board the vehicle carrier while en route from Turkey to India.
The crew was handed over to officials in Oman “in support of the ceasefire agreement in Gaza” between Hamas and Israel, which started on Sunday, according to a report on Al Masirah TV, a Houthi-run news outlet.
Previous months of diplomacy involving the countries of those involved, as well as the United Nations International Maritime Organization (IMO) had been, up until now, fruitless.
“This is a moment of profound relief for all of us — not only for the crew and their families, but also to the wider maritime community,” said Arsenio Dominguez IMO’s Secretary-General. “Today’s breakthrough is a testament to the power of collective diplomacy and dialogue, recognizing that innocent seafarers must not become collateral victims in wider geopolitical tensions.”
The UN Special Envoy for Yemen, Hans Grundberg, added: “This is a step in the right direction, and I urge [the Houthis] to continue these positive steps on all fronts, including ending all maritime attacks.”
To learn background info about the Galaxy Leader saga click here.