Scientia Militaria: South African Journal of Military Studies https://www.ajol.info/index.php/smsajms <p><em>Scientia Militaria: South African Journal of Military Studies</em> is a peer-reviewed scholarly journal published bi-annually by the Faculty of Military Science of Stellenbosch University in South Africa. Our journal has a long and proud history of researching and publishing on a broad spectrum of matters and issues relating to defence, security and military affairs using a discipline-based and inter-disciplinary research approach. Published articles are of high quality since all submissions are refereed (peer-reviewed) by at least two experts in the field. Refereeing is done with complete anonymity and confidentiality.</p> <p>Other websites related to this journal: <a title="http://scientiamilitaria.journals.ac.za" href="http://scientiamilitaria.journals.ac.za" target="_blank" rel="noopener">http://scientiamilitaria.journals.ac.za</a></p> en-US Copyright belongs to the Faculty of Military Science, Stellenbosch University thomasm@sun.ac.za (Prof Thomas Mandrup) raymondsf@ma2.sun.ac.za (Dr Raymond Steenkamp-Fonseca) Thu, 18 Jan 2024 13:35:45 +0000 OJS 3.3.0.11 http://blogs.law.harvard.edu/tech/rss 60 A Critical Reflection on African Maritime Cybersecurity Frameworks https://www.ajol.info/index.php/smsajms/article/view/262852 <p>With a coastline of 26,000 nautical miles and 38 out of 55 African states being either coastal or island states, trading activities on the&nbsp; continent are facilitated by over a hundred port facilities in the region, which make up 90 per cent of African seaborne trade. These factors indicate that the continent is dependent on well-run ports, effective protection of its maritime resources, and regulated shipping.&nbsp; Regulating the maritime sector requires new technologies that come at the cost of cyber vulnerabilities. However, in Africa, there are very&nbsp; few legal instruments, both at national and at regional level, specifically addressing the issue of cyberattacks on ships and port&nbsp; facilities. Given the lack of attention given to maritime security and the lack of collective action from African states, the study on which&nbsp; this article reports, sought to provide a critical reflection on how cyber technology is affecting is affecting the African maritime domain; and the consequences that could manifest should the cybersecurity of ships, ports, and their critical infrastructure continue to be&nbsp; ignored. The aim of this study was to broaden the understanding of the maritime cybersecurity legal frameworks in Africa by using the&nbsp; ‘black letter’ methodology, which is a positivist approach described by academics as being the best avenue by which to assess the&nbsp; existence, meaning and application of a defined system of legal principles. In engaging with those conventions, policies, laws, and&nbsp; regulations that are currently guiding the area of maritime cybersecurity, the study sought to identify the gaps in the legal frameworks&nbsp; on the continent and to provide policy recommendations.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p> Tefesehet Hailu Sime Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262852 Thu, 18 Jan 2024 00:00:00 +0000 Investigating the Intersection of Maritime and Cyber Crime in the Gulf of Guinea https://www.ajol.info/index.php/smsajms/article/view/262855 <p>As technology expands and spreads worldwide, the maritime industry and maritime crime are rapidly evolving While the heightened&nbsp; adoption of digital technologies has positively impacted the efficient and prompt execution of tasks like maritime surveillance, policing,&nbsp; monitoring, and early warning systems, it has also brought about significant challenges that impact the interconnected network of&nbsp; maritime actors. This dilemma can be attributed to geographical location, surveillance, and navigation systems of ports, vessels, and&nbsp; other state intuitions. With the emergence of cyber threats, West Africa is poised to face a dual-pronged threat at its ports and shores,&nbsp; affecting the broader security environment of coastal states as actors in the maritime domain are increasingly using digital technologies.&nbsp; Moreover, these threats demonstrate a path for maritime criminals to evolve into maritime cybercriminals. The central theme of this&nbsp; article is the connection between cybercrime and maritime crimes, and the cybercrimes that have found a lucrative avenue in the&nbsp; maritime industry. It also discusses cybercrime in maritime criminal activities occurring in West Africa, and the implications for the&nbsp; maritime and cyber landscape of the region. Finally, the article concludes with approaches for dealing with the risks posed by maritime&nbsp; cyber risks.&nbsp;&nbsp;</p> Elsie Amelia Tachie-Menson Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262855 Thu, 18 Jan 2024 00:00:00 +0000 The African Shipping Sector, the Need for and Means to Achieve Effective Cyber Risk Management https://www.ajol.info/index.php/smsajms/article/view/262857 <p>The African shipping sector is a significant enabler of trade within Africa and trade between Africa and the world. African countries are&nbsp; sourcing and integrating technical solutions from foreign suppliers and service providers within their maritime domain. Such technologies are embedded within and enable functionality within transportation systems, port and navigation infrastructure,&nbsp; telecommunications infrastructure, downstream oil and gas infrastructure, and various national defence and security systems.&nbsp; Unfortunately, while providing the required functionality, these technical solutions create security vulnerabilities that place the African&nbsp; shipping sector and national interests at risk if security within the maritime cyber domain is taken for granted. The study on which this article is based firstly sought to identify and deconstruct the technology and associated vulnerabilities within the African maritime&nbsp; domain. Secondly, the research attempted to determine how national strategy and policy could be used to manage these security vulnerabilities to raise awareness of maritime cybersecurity in the context of the African shipping sector and propose pragmatic steps to&nbsp; achieve it.&nbsp;</p> Chris Myers Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262857 Thu, 18 Jan 2024 00:00:00 +0000 Vulnerability of South African Commodity Value Chains to Cyber Incidents https://www.ajol.info/index.php/smsajms/article/view/262860 <p>A commodity value chain can be considered the ‘route’ from the source (provider) to the destination (client), including the various modes&nbsp; of transportation. This will often include some form of road or rail to a port for export to a destination country. Due to the rise in&nbsp; cybercrime and state-backed cyber operations, these commodity value chains may be disrupted, having a cascading effect down the&nbsp; value chain. Previous research has considered this a form of economic information warfare, and has indicated that statesponsored cyber&nbsp; operations to disrupt a commodity intentionally will most likely fall below the threshold of a ‘use of force’ or ‘attack’ under international&nbsp; law. Subsequently, two pertinent instances of cyber incidents at ports have occurred: the disruption of a major Iranian port, and a&nbsp;&nbsp; ansomware incident at a major South African freight and logistics state-owned enterprise.&nbsp;</p> <p>&nbsp;</p> <p>&nbsp;Following the disruption resulting from the ransomware incident affecting South&nbsp; African freight organisations, there is a need to analyse&nbsp; the vulnerabilities of the freight transportation sector further, in particular the ports and associated railways in terms of&nbsp;&nbsp; malicious cyber interference. Expanding previous research, this article provides a&nbsp; specific view of the major commodity value chains in&nbsp; South Africa that are supported by the freight transportation infrastructure, their possible vulnerability to cyber incidents, and the&nbsp; potential implications thereof. In addition, publicly available information on the responses to the ransomware incident will be discussed&nbsp; to gauge national readiness in terms of crisis management of a major disruption to the primary trade mechanisms in the country. The&nbsp; article focuses on identifying single points of failure within the commodity value chain, and employs hypothetical scenarios to illustrate&nbsp; possible ramifications of a major incident. The port of Durban is shown to the most critical single point of failure overall.&nbsp; Recommendations include the introduction of a sector-specific computer security incident response team for the freight transportation&nbsp; sector.</p> Brett van Niekerk Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262860 Thu, 18 Jan 2024 00:00:00 +0000 Fighting the Fleet: Operational Art and Modern Fleet Combat https://www.ajol.info/index.php/smsajms/article/view/262863 <p>No Abstract</p> Dries Putter Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262863 Thu, 18 Jan 2024 00:00:00 +0000 The Naval War in South African Waters, 1939–1945 https://www.ajol.info/index.php/smsajms/article/view/262864 <p>No Abstract</p> Andre Wessels Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262864 Thu, 18 Jan 2024 00:00:00 +0000 President Mandela’s Admiral: The South African Navy’s Story of the 1990s: Challenging Politics, Radical Transformation, Ambitious Voyages and the Quest for New Ships and Submarines https://www.ajol.info/index.php/smsajms/article/view/262865 <p>No Abstract</p> Leon Steyn Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262865 Thu, 18 Jan 2024 00:00:00 +0000 A Century of South African Naval History: The South African Navy and its Predecessors, 1922–2022 https://www.ajol.info/index.php/smsajms/article/view/262866 <p>No Abstract</p> Allan du Toit Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262866 Thu, 18 Jan 2024 00:00:00 +0000 Die Affäre Patzig: Ein Kriegsverbrechen für das Kaiserreich? https://www.ajol.info/index.php/smsajms/article/view/262867 <p>No Abstract</p> Tilman Dedering Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262867 Thu, 18 Jan 2024 00:00:00 +0000 Human Intelligence: Supporting Composite Warfare Operations in Africa https://www.ajol.info/index.php/smsajms/article/view/262868 <p>No Abstract</p> Hussein Solomon Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262868 Thu, 18 Jan 2024 00:00:00 +0000 IOT and IIOT Security for the South African Maritime and Freight Transport Sectors https://www.ajol.info/index.php/smsajms/article/view/262858 <p>The advent of the Fourth Industrial Revolution (4IR) has seen a rapid increase in connected smart devices known as the Internet of Things&nbsp; (IoT). While this ‘revolution’ is most noticeable in commercial devices, there has also been an evolution in industrial devices, known as the Industrial Internet of Things. As Africa – and in particular South Africa – is racing to compete in the 4IR, various sectors,&nbsp; including the transport sector, are introducing innovative projects. However, the Internet of Things and the Industrial Internet of Things present cybersecurity risks. Cybersecurity itself is also considered a key component of the 4IR; yet, organisations often neglect to&nbsp; consider the security implications of the Internet of Things.</p> <p>The current research aimed to evaluate and prioritise cyber threats, vulnerabilities, and risk related to the Internet of Things and the&nbsp; Industrial Internet of Things in the South African physical transport sector. This article focuses on the responses to a questionnaire to&nbsp; obtain quantitative data from those with experience in the related fields. The threats and vulnerabilities of concern are illustrated, and&nbsp; the risks are evaluated based on the perceived impact of such risks and the likelihood of the Internet of Things and the Industrial Internet of Things being compromised. While no clear leaders of risk were found, the top three risks based on the perceived severity and&nbsp;&nbsp; ikelihood are unavailability of Internet of Things and Industrial Internet of Things devices and/or networks, damage to reputation, and&nbsp; cyberespionage.</p> Barend Pretorius Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262858 Thu, 18 Jan 2024 00:00:00 +0000 Guest Editorial https://www.ajol.info/index.php/smsajms/article/view/262849 <p>No Abstract</p> Francois Vrey, Denys Reva Copyright (c) 2024 https://www.ajol.info/index.php/smsajms/article/view/262849 Thu, 18 Jan 2024 00:00:00 +0000