"

Table of Contents – Detailed

Title Page
Cover Art (K. Nichols)
Copyright / Publication Page
Books also by Sr. Professor Randall K. Nichols and the KSU Wildcat Team
Dedications
Disclaimers (Lonstein)
Foreword (KSU IS Troy Harding)
Acknowledgments
List of Contributors
Table of Contents
Table of Figures
Table of Tables
Table of Equations
CHAPTERS

Chapter 1: Maritime Transportation Systems (Nichols)
Abbreviations
Student Learning Objectives
What Are We Trying To Secure?
Three Perspectives
CRYPTOWIZ
DHS
MTS SIZE, SCOPE, USERS
MTS
Ships
Ports
People
Shipping Lines
Inland Waters
Intermodal Transfers
Special Assignments – Interdiction and Customs and Border Protection (CBP) / ICE
Modern Threats
Countermeasures Forgotten?
MTS Vectors
Vessel Operations
Shipping Line Operations
Port Operations
Cargo and Shipping
Manufacturing
Vessel Traffic Control (VTC)
Remote Control and Automation
Legal Environment
Threats
Cyber: Attack Tools
GPS and Navigation
MTS Networks
SCADA UAS / UUVS: CBNRECy DEW Weapons
Undersea Communications Cables
Risk Assessments
Ryan-Nichols (RN) Qualitative Risk Assessment
CARVER
MSHARPP
OCTAVE
ADRA
NOTICE TO MARINERS – A very useful RA tool for Boat Captains
Conclusions
References
Endnotes

Chapter 2: Global Threats to Communications Cables (Nichols & Beckman)

Abbreviations
Student Learning Objectives
Submarine Communications Cables (SCC)
What is a submarine (underwater) cable?
How Does an Undersea Cable Work?
Cable Faults
Landing Points
Commercial Use Of Undersea Cables
Worldwide Undersea Cables
Undersea Cable Services in the Western Pacific
Undersea Cable Mission Support
THREATS – CHINESE
THREATS – RUSSIAN
Threats – Russian Submarines!
Russian Losharik
THREATS – CHINESE SHIPS – YANTAR
VULNERABILITIES
Vulnerabilities – Concentration of International Switching Facilities
Vulnerabilities – Asia-America Gateway Cable System (AAG)
Lantau Cable Landing Station, or Lantau CLS
COUNTERMEASURES
Countermeasures – New Cable Routes
Countermeasures – Guam, The Big Switch in the Pacific
Conclusions / Discussion / Analysis
References

Chapter 3: Naval Strategic Importance of Guam and its Defense (Diebold & Nichols)

Abbreviations
Student Learning Objectives
Undersea Cable Problem / Risk Review from Chapter 2.
Risk Assessment – Spratly Islands
MSHARPP Perspective – Spratly Islands (R.K. Nichols, Johnson, & Diebold, 2024)
Guam: Military Significance – Bullet points to consider:
SE Asia Terrorist Operations (2014-2021)
Guam: Terror Threat 2021 and beyond – The US must take notice of the continuing Threats to the Guam AOR, to wit:
SE Asia Terrorism: Additional Factors & Influences
Guam – Piti and Tanguisson Landing Points
Piti-I Facts
Guam Police Coverage
Guam Recommendations based on CARVER Analysis and Lack of Local LEOs
Hong Kong History and Recent Context
Hong Kong – Cyber Attack/Surveillance of Cable Traffic
Hong Kong Specific Threats
Connectivity with China
AAG Associated Infrastructure with Chinese Interests is:
Key Takeaways for AAG
Lantu Island Landing Station Source: (WIKI, 2025)
Conclusions
References
Endnotes

Chapter 4: Integrating Drones Into USAF Ops (DeMaio)

Special acknowledgement
Abbreviations
Student Learning Objectives
Vulnerability Repeated
Drone Combat in Ukraine
A Revolution Observed
A War of Necessity and Adaptation
Cheap, Smart, and Disposable
Drone Production
Offensive and Defensive Drone Operations
Democratization of Airpower
The Lure of High-End Technology
Israel’s Attack on Iran
US Strike on Iran
The Drone Domain
Drone Doctrine
Air parity
Air Superiority
Air Supremacy
Integrated Airpower
Defensive Counterair (DCA)
Active Defenses
Passive Defenses
Offensive Counterair (OCA)
Agile Combat Employment (ACE)
Way Ahead
References

Chapter 5: Cyberattacks On The Maritime Sector (Nichols & Malhotra)

Abbreviations
Student Learning Objectives
Cyber Environment in the Maritime Transportation Sector (MTS)
Attacks via Cyber on the Maritime Transportation Sector and their Execution
The Case and Argument for Navigation Early Effective Spoofing in the Pacific Against the US. Capital Ships (GNSS/GPS/AIS)
US Navy Vessel Collisions in the Pacific
The Navy’s Official Reaction regarding the possibility of a Cyber-Weapon or Cyber-Attack
The Case for a Cyber Weapon
Surfacing Questions
How could GPS chaos be achieved against US Vessels?
Cyber Attacks on Navy Port Supply Operations
Cyber Vulnerabilities on a Ship
A Cyber Vulnerability Assessment of the US Navy in the 21st Century
Navigating the Intersection of Submarine and Cyber Warfare
Expanding the Navigation Attacks on GNSS/GPS/AIS – a much bigger threat
SPOOFING
ECD
GPS SPOOFING RESEARCH: OUT OF THE BOX BRILLIANCE TO ECD DEFENSE
Maximum Likelihood Localization
Spoofing Mitigation
Successive Signal Interference Cancellation
GPS Signal Jamming
Two Robust GPS Signal Spoofing Attacks and ECD
Seamless Satellite-Lock Takeover (SSLT)
Navigation Data Modification (NDM)
Need For New Cyber Defense Architecture
Conclusions
References
Endnotes

Chapter 6: Port Security Law in the United States (Lonstein)

Introduction
Historical Review of Port Security and Regulation
Revolutionary Era
Transition to Independence and Naval Foundations
The Continental Navy and Early Privateers
The Tariff Act of 1789
The Embargo Act of 1807
The Non-Intercourse Act of 1809
The War of 1812 and Port Security
Civil War and Union Blockade
Post–Civil War Period
Quarantine and Immigration Controls
Harbors as Strategic Assets
The 20th Century – A Modern Era Requires Modern Port
The Creation of the US Coast Guard (1915)
World War I and Port Security
Prohibition and Anti-Smuggling
World War II Port Security Measures
Project Underworld
Cold War Cargo and Nuclear Security
Late 20th Century Terrorism and Environmental Security
September 11, 2001, and Aftermath
Legal Considerations
Cybersecurity Threats to Ports
Autonomous Technologies
Conclusions
Questions to Consider
References

Chapter 7: Connected, Complex, Compromised (Murthy & Ghaffari)

Abbreviations
Terminology
Student Learning Objectives
Maritime Communication Systems
Shipboard Communication, Navigation, and Network Systems
Internal Communication Systems
External Communication Systems
Navigation systems
Shipboard network systems
Supervisory Control and Data Acquisition (SCADA)
Maritime Communication Protocols and Standards
IMO Standard Marine Communication Phrases (SMCP)
Global Maritime Distress and Safety System (GMDSS)
Digital and Radio Protocols
Emerging Standards
Case Studies
Maritime ICT Threats and Challenges
Emergent Properties in Maritime ICT
Tools for Student Further Exploration
Core Challenges
Global Maritime Distress and Safety System (GMDSS)
Technical Overview and Attack Vectors
Real-World Incidents and Risks
Impact of a GMDSS Compromise
Safety of Life
Operational Disruption
Strategic Risk
Reputational and Regulatory Consequences
Mitigation and Defense Strategies
Background and Attack Vector
Technical Behavior and Systems Affected
Operational and Financial Impact
Response and Recovery
Lessons Learned
Industry-Wide Impact
Summary
Impact of Emerging Technologies
Role of SDN, Network Virtualization, and Cloud Computing
Potential Mitigation Strategies include:
COMMON THREATS – A DETAILED VIEW
• Threat Brief: GPS Spoofing
• Threat Brief: GPS Jamming
• Threat Brief: Ransomware
• Threat Brief: AIS Spoofing
• Threat Brief: Phishing & Social Engineering
• Threat Brief: USB-Based Malware
• Threat Brief: SATCOM Exploits
• Threat Brief: ECDIS Hacking
• Threat Brief: Engine / Propulsion System Attack
• Threat Brief: Cargo System Manipulation
Conclusions
References
Endnotes

Chapter 8: Naval Advanced Weapons Systems (Puntoriero)

Abbreviations
Student Learning Objectives
Introduction
Section 1: Directed-Energy Weapons: Revolutionizing Naval Defenses
Section 2: Autonomous Systems: Expanding Naval Reach
Section 3: Emerging Naval Weapon Systems
Hypersonic Weapons
Electromagnetic Railguns
Electronic Warfare and Cyber Systems
Section 4: Tactical Doctrines for the Modern Navy
Section 5: Challenges and Limitations
Section 6: Future Directions
Conclusions
Questions to Consider
References

Chapter 9: Anti-Piracy Countermeasures (Mumm & Malhotra)

Student Learning Objectives
The Evolution of Maritime Piracy
Anti-Piracy and The Challenges to the Worldwide Maritime Industry
Piracy Today: Are We Gaining Ground?
Cyber and Digital Environment and Its Impact on Maritime Piracy
Securing Shipping Manifests and Passenger Authenticity
Exploring Alternatives to Reduce Maritime Losses Due to Piracy
Conclusions
References

Chapter 10: UAS / UUV Threats launched from Ships (Mumm & Ghaffari)

Acronyms
Student Learning Objectives
Historical Look at UAS/UUV in Maritime Piracy and Security
Early Use of UAS in Maritime Security
UAS Use in Maritime Operations: Limitations and Next Generation Technology
Limitations of Current Maritime UAS
Next Generation Maritime UAS: Autonomous and AI Systems
UUV Use in Maritime Operations-It’s a New World
Civilian UUV Uses
Quick Comparison in UUV Size Range From 2-Person Carry to Submarine Class Size
Legal and Ethical Considerations
Underwater Cables, National Security, and the Threat of Autonomous Systems Use
Strategic Importance of Underwater Cables
Autonomous Systems as Emerging Threat Vectors
Known Incidents and Precedents
Gaps in Legal and Policy Frameworks
Defensive and Resilience Measures
Looking Ahead
Weather Impacts on Maritime Autonomous Systems Use
Environmental Challenges
Impacts on Operations
Mitigation Strategies
Communication Challenges in The Maritime Arena
Above-Surface Communication
Underwater Communication
Interoperability and Security
Cyber Security Challenges in the New World of Maritime Autonomous Systems
Potential Threats
Implications
Defensive Measures
Conclusions
Questions
References

Chapter 11: Sea of Risk (Murthy)

Abbreviations
Terminology
Student Learning Objectives

Sea of Risk
Divergence and Convergence in Maritime Transportation Strategies
States Versus Corporations: Dual Lenses of Maritime Security
Major Frameworks and Standards
International Ship and Port Facility Security (ISPS) Code
SOLAS Convention (International Convention for the Safety of Life at Sea)
SUA Convention (Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation)
IMO Cybersecurity Guidelines
National and Regional Legislation
Challenges in a Multidimensional Maritime Environment
Case 1: Baltimore Bridge Collapse (2024)
Case 2: Black Sea Incidents (2017–present)
Case 3: NotPetya Cyberattack (2017)
What These Incidents Teach Us
The Sea of Risk: Anticipation Over Reaction
Dimensions × Disciplines in Maritime Security
Cross-Cutting Threats in the Sea of Risk
Technological Evolution and Emerging Threats
Automation and Autonomous Vessels
The Expanding Threat Surface
Legal and Governance Gaps
The Human Element Remains Central
The Strategic Gaps
Siloed by Design:
Reactive, not Anticipatory: .
Jurisdictional Fragmentation:
Weak Integration of Human & Organizational Factors: Sectoral instead of systemic
STRATOS: A Strategic Framework for the Sea of Risk
TTM – Trans-dimensional Thinking Model (Cognitive Clarity)
OSSTE – Operational Systems for Security, Tactics, and Execution (Practical Resilience)
STRATOS as a Bridge
Conclusions
References
Endnotes

Chapter 12: Offshore Chemical Engineering & Quantum Technologies For Maritime Risk & Resilience (Sharkey)

Learning Objectives:
Section 12.1 Chemical Engineering at Sea: Foundations and Strategic Relevance
Section 12.2 Ammonia as a Strategic Molecule: Fuel, Capture Medium, and Catalyst
1. Fuel and Energy Carrier
2. Medium for Carbon Capture
3. Catalyst and Systems Enabler
Circuit Overview
Hardware-Level Studies: Nitrogen Activation on Iron Surfaces
Historical Perspective: Ammonia and the Foundations of Quantum Computing
Strategic Outlook for Offshore Platforms
Section 12.4 GPS-Free Quantum Navigation Systems for Maritime Defense
Key advantages of quantum inertial navigation systems (QINS)
Section 12.5 Integrating Quantum AI in Autonomous Maritime Infrastructure
Integration with AI and Inertial Navigation Systems (INS)
Operational Advantages: Stealth, Resilience, and Independence from Satellites
Section 12.6 Risks, Challenges, and Operational Considerations
AI–Sensor Integration Risks in Maritime ChemE Systems
Section 12.7. Future Outlook: Resilient Infrastructure and Floating Intelligence From Platforms to Platforms-as-Systems
Strategic Autonomy Beyond Shorelines
The Rise of Sea-Based Quantum Laboratories
Ethics, Governance, and Risk Frontiers
Conclusions: Toward a Chemically Cognizant Ocean
References:
Endnotes

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

MARITIME TRANSPORTATION SYSTEMS Copyright © 2025 by Copyright © 2025 Nichols; R. K., Beckman, J., Carter, C.M., DeMaio, D., Diebold, C., Ghaffari, R., Lonstein, W.D., Malhotra, V., Mumm, H.C., Murthy, R., Puntoriero, J.L., Sharkey, K.L. is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.