Page 1
Page 2
Page 3
Page 4
Page 5
Page 6
Page 7
Page 8
Page 9
Page 10
Page 11
Page 12
Page 13
Page 14
Page 15
Page 16
Page 17
Page 18
Page 19
Page 20
Page 21
Page 22
Page 23
Page 24
Page 25
Page 26
Page 27
Page 28
Page 29
Page 30
Page 31
Page 32
Page 33
Page 34
Page 35
Page 36
4 OCTOBER 2015 FOGHORN Security Its Not Just About Vessel Operations On September 11 2001 hijacked 757 and 767 jet airplanes departed Bostons Logan Airport bound for Los Angeles deliberately crashed into World Trade Center Tower 1 and 20 minutes later a second plane crashed into World Trade Center Tower 2. Within moments both towers had collapsed. Thousands of people killed. Moments later another jet had crashed into the Pentagon with hundreds feared dead. Yet moments later again another hijacked jet had crashed in Pennsylvania believed to have been targeted for the White House. All passengers on board did not survive. This is a very sad day in history. This world will never be the same from this day forward. President George Bush declares war on those who did this. This was the statement I logged on my laptop on this unforgettable day. On September 17 2001 Fire Island Ferries Bay Shore NY began restoring service to the financial district in New York City in conjunction with New York Waterway Weehawken NJ providing passenger ferry service to financial district employees and first responders to lower Manhattan. In 2002 Congress passed the Maritime Transportation Security Act MTSA in response to the large-scale nationwide vulnerabilities that were exposed by these attacks with the goal to improve the physical and personnel security standards for U.S. ports facilities and vessels. MTSA was drafted to focus on the prevention and response to transporta- tion security incidents which are security incidents resulting in a significant loss of life environmen- tal damage transportation system disruption or economic disruption in a particular area. In response to the imposed MTSA regulations certain PVA vessels and operations are required to conduct security assessments and implement security plans to address how we will deter transportation security incidents. The Coast Guard-approved PVA Alternate Security Plan ASP addresses how facilities andor vessels will communicate with the federal gov- ernment in the event of a security incident and include provisions for maintaining physical passenger cargo and personnel security controlling access to security areas of the vessel or facility while maintaining com- munications within their facility or vessel with first responders. An aspect of growing security concern which is all too commonly ignored is the threat of cyber security attacks and how prepared we are. Cyber security is defined as the body of technologies processes and practices designed to protect networks computers programs and data from attack damage or unauthorized access. As an association comprised of diverse members from mom and pop operations to large complex operations cyber security should not be neglected. In a span of just eight years maritime cyber threats have risen from 5500 in 2006 to an astounding 67000 in 2014. What is our risk as small passenger vessel operators The risk of having your vessels propulsion system compromised by a cyber attack is probably minimal at our level. However how prepared are you for a cyber attack on your shore-side infrastructure Are you fully prepared if you lose all your computer operating systems and the data stored on them Can you accommodate sales and reservations if your computer operating systems are hacked I attended a webinar on cyber security recently to learn of a particu- lar event about a foreign countrys maritime operation whose computer system was hacked resulting in the hack essentially turning more than 30000 computer systems into paperweights. As business managers these are issues we need to be concerned about. Im sure some of you reading this are not prepared for these situations. So what can you do to minimize the threat risk Very simplethink outside of the box and be proactive rather than reactive. Here are some things that you should do now to protect your operation Manage your risk by recognizing and understand- ing your dependence on cyberspace and where your information is stored. Continuously monitor and assess the effectiveness of risk mitigation and how to reduce vulnerabilities. Recruit educate train and retain agile employees that thrive in technology-rich operations. Identify information technology IT systems networks and data that are critical to your operation and understand their vulnerabilities critical depen- dencies and the potential for cascading disruptions on your operation. Improve the training and education of your employees empowering them to effectively operate LETTER FROM THE PRESIDENT Dave Anderson LETTER FROM THE PRESIDENT CONTINUED ON PAGE 34