THE IMPACT OF CYBERSECURITY ON THE REGULATORY LEGAL FRAMEWORK FOR MARITIME SECURITY DUARTE LYNCE DE FARIA duarte.lynce.faria@gmail.com Holder of Ph.D. in International Private Law from the University of Extremadura and in Corporate Law from the Faculty of Law of Lisbon with a research thesis in Maritime Law. Holder of a Master Degree and a Bachelor Degree in Law, Faculty of Law of Lisbon and of a Bachelor Degree in Military-Naval Sciences from the Navy Academy. As a Navy Officer he attended several courses in naval operations, communications and electronic warfare and performing duties on board ships

The concepts of maritime safety and maritime security were based, originally, on different aims, objectives, and perspectives. However, currently, most of the international maritime safety conventions have started to cover both aspects. In the analysis of most incidents and accidents at sea, it is quite difficult to delimit safety and security matters and, normally, after a breakdown, it is useless to do it since the planning and response to risks are usually given in an integrated manner. On the other hand, we are witnessing a progressive extension of the concept of maritime safety to include protection (or security) matters simultaneously with the emergence of a new type of threats that are always present from the moment computers are connected to networks anywhere the world: cyber threats! With ships equipped with new advanced technologies, protection against cyber-attacks is more important than ever. These technological advances have become an easy and high-priority target for cyber criminals. With this behaviour, they can pursue their purpose of attacking ships’ systems and, from them, different systems ashore. The digitization of the maritime industry took place very quickly. However, it has become essential for seafarers not only to understand and adopt these new technologies, but also to take a cautious attitude towards certain events that can follow in the wrong direction in a short period of time. A new stage of maritime readiness is envisaged, which needs a robust and well-defined “code” that broadens and concretizes a “new” concept of maritime safety in the broad sense that reinforces international maritime conventions and their application. The responsibilities of the "Flag States" and "Port States", under the terms of the United Nations Convention on the Law of the Sea (UNCLOS) and international maritime conventions as laid down in the different Memoranda of Understanding (MoU) at world level and in the documents of the IMO and other international organizations (such as the European Union), should be updated and start to consider, also, maritime security matters. In addition, it is essential to support close cooperation in the fields of maritime safety and maritime security with a view to drawing up a new and robust “Maritime Code”. This will be the guideline pursued, with the intention, at this moment, to “shake and roll” this matter towards a new regulatory stage.

In fact, with ships equipped with the most modern technologies for the bridge, the engine room and the whole vessel in general, the threat of cyber-attacks is more important than ever since most of the new systems work automatically and are extremely dependent on IT and data flows. 1 Article translated by Carolina Peralta. 2 This article was close to its conclusion when the COVID-19 pandemic broke out. In addition to compelling to (re)think the global world -with its strengths and weaknesses, its opportunities and threats (in a true SWOT analysis) -it is important to mention that "infectiology" can also far exceed the health domain. The example of the virulence of different malware at the level of all systems connected to the network can also, in times of crisis such as the one we are going through, drastically limit the response of health equipment and civil protection that require the adoption of pre-planned responses associated with different systems. For this reason, it is also necessary to plan the adoption of alternative measures, albeit with less efficiency, but with greater resilience to the fragility that some systems still present, particularly in these periods of greatest danger to mankind. 3 Direct costs. According to more recent estimates, total costs may have reached 600 M €. Let us check the threats to cybersecurity in 2020. In a recent article entitled "2020 Vision: Check Point's cyber-security predictions for the coming year", of 24 October 2019, in https: //www.checkpoint.com, blog.checkpoint.com, https://usercenter.checkpoint.com/usercenter/index.jsp, the situation related to cybersecurity has been described as follows: 1. A new cyber 'cold war'; 2. Fake news 2.0 at the U.S. 2020 elections; 3. Cyber-attacks on utilities and critical infrastructures will continue to grow; 4. High profile US brands, beware of cyber-attacks targeting high-profile American companies; 5. Increased lobbying to weaken privacy regulations. Regarding the perspectives related to cybersecurity technology, the main threats and forms of action expected for 2020 are as follows 2020: 1. Targeted ransomware; 2. Phishing attacks go beyond email; 3. Mobile malware attacks step up; 4. The rise of cyber insurance; 5. More IoT devices, more risks; 6. Data volumes skyrocket with 5G; 7. AI will accelerate security responses.
These are just two examples of targets at the mercy of cyber-attacks. As in other economic sectors, the maritime-port sector tends to increasingly rely on technology for being more competitive, more efficient in the management of its resources or responsible for complying with standards or policies.
On a global scale, there is an increasing procedural integration of the actors in the logistics chains and, consequently, of the ports, using services based on information systems.
The "Single Logistics Window" (commonly known in Portugal as "JUL"-"Janela Única Logística") -developed by Portuguese ports establishes the connection on an electronic platform between each port and authorities, shipping agents, freight forwarders and port, rail, road and logistics operators, securing the flow of goods traffic and passenger movement without the production of paper documents. This is a good example of this type of systems and of the level of integration of optimization provided for ports and other platforms included in the logistics chains.
These new technological advances have become an easy target for criminals 5 . There are several cybersecurity challenges that ports and associated platforms must face, whatever the type of technology or information system shall be used in the various activities.
The threats are so many, from interception of communications to service blocking, malware, identity theft, data theft or manipulation and information leakage, among others. The impacts can also be of various kinds and harmful, such as, for example, total paralysis of operations, death or injuries to people, kidnapping, cargo theft and financial or reputation losses, which must be avoided at all costs.
It is critical to prevent criminal entry into the ship's systems by unauthorized and uncertified persons, which implies an effective control of the access of a crew member who uses, for example, a free "Wi-Fi" network for telephone calls and emails next to land. Vulnerability is the immediate result of the almost permanent interconnection that today a modern ship has, which means that, due to the use of the same equipment as the ship's systems with unauthorized access to common networks, the onboard systems can be easily "infected" and thus compromised (for example, the opening of a phishing email attachment or hyperlinks or a previously "infected" media news 6 ).
The impacts of this unauthorized and criminal access can be very serious: disruption of the network, absence of information flows between the ship's control systems, unauthorized access to control and IT systems, unauthorized changes to the system parameters, harmful consequences on the environment, maritime safety on board jeopardized and the ship's critical and emergency procedures, and, if nothing is done in a timely manner, a security problem can quickly become a safety one 7 . 5 Since the introduction of new technology in each process increases the risk of human failure and the vulnerability degree. 6 Infected removable media. 7 Some authors are also beginning to envisage the chances of an occurrence of "safety" becoming a "security" incident in the maritime sector. These are, for example, sea events (stranding, collision, open water, etc.) that imply that a set of threats to the IT systems -now being degraded -materialize, preventing them from contributing to reducing on-board breakdowns. JANUS.NET, e-journal of International Relations e-ISSN: 1647-7251 Vol. 11, Nº. 2 (November 2020-April 2021), pp. 163- 184 The impact of cybersecurity on the regulatory legal framework for maritime security Duarte Lynce de Faria 166 Another very popular mode of action is the spoofing of the GPS 8 signal through ground stations -that can also take advantage of the differential GPS systems ashore (which use the platforms of many lighthouses) that have been designed to improve the accuracy of that positioning system -as reported in 2018 in the Eastern Mediterranean, the Black Sea and the Persian Gulf.
In 2019, "aggressive" spoofing of the GPS signal in 20 coastal areas of the PR of China, including the ports of Shanghai, Fuzhou (Huilutou), Qingdao, Quanzhou (Shiyucun), Dalian, and Tianjin was reported 9 by several entities and in particular by the US Coast Guard. The November 2019 MIT Technology Review magazine featured an article on this phenomenon, where the analyst Bjorn Bergman evaluated a substantial amount of information contained in the AIS (Automatic Identification System) of ships. In this analysis, he identified at least 20 locations close to the Chinese coast where the spoofing occurred in similar ways during 2019, some of which in oil terminals.
The organization C4ADS (Center for Advanced Defense Studies), based in Washington DC, also found that the spoofing of the signal was maintained for some time in those same areas 10 .
These occurrences were more persistent in the port of Dalian, in northern China, next to North Korea. It can be suspected that, given the chosen moment -when the US sanctions prohibiting the purchase of Iranian oil were in force-and it was proved, by third parties, that China had received that product, it would have been an operation to avoid the exact location of the ships involved in the oil transfer. In other cases, the spoofing of the GPS signal may also be related to important official visits, a resource also used by Russia to protect (i.e., cover up) official VIP visits.
This type of "mass" spoofing is easier to detect in coastal areas where there is a wide availability of AIS data provided by terrestrial or satellite channels, and may be caused by the spoofing of a satellite signal and another type associated with a land station or device. 11 8 The Global Positioning System (GPS) is a satellite navigation system designed to indicate the position of a mobile receiver from the simultaneous reception of at least three satellites. Two such systems are in operation: The North American GPS and the Russian GLONASS. However, two other systems are being launched: the European Union GALILEO and the Chinese COMPASS (or Beidou-2). The North American system is managed by the United States Government and began to be used exclusively by the military (however, the accuracy of the encrypted system for military use, namely, to aid in the direction of cruise missiles, was maintained). Its civilian use can quickly be altered or even lead to its blocking in periods of tension or crisis, including giving incorrect positioning information ("spoofing" from an internal source), as can happen with the use of differential GPS stations (which are able, in normal operation, to increase the accuracy of the geographical position of the receiver) for the introduction of errors in the positioning of the vehicle. GPS spoofing is the deliberate introduction of signals in the mobile receivers by other stations and which aims to indicate a wrong geographical position. This GPS spoofing signal usually coincides with unauthorized access to the IT systems that seeks to hide the user's true identity. See the article by Goward, Dana A., "Patterns of GPS Spoofing at Chinese Ports", MAREX, in Daily Collection of Maritime Press Clippings 2019-356, pp. 31-32. 10 C4ADS is a private non-profit organization that aims to analyse and report data in a context of conflict or transnational security issues. 11 The spoofing of electronic signals goes back to the time of the "Cold War", together with jamming and counter-jamming measures, and ECM and ECCM measures (Electronic Countermeasures and Electronic Counter Countermeasures, respectively). Thus, the transmission of false radar echo to mislead the opponent on his radar console was classified as deception jamming. 12 When the GPS system went into production, it was easy to see that its code was vulnerable to spoofing since it was an open code, 13 reproducible by anyone, through a simulator (i.e., the spoofing of the GPS signal). Naturally, this was the reason for the GPS system to also transmit an encrypted military signal (the so-called "P (Y) code"), in addition to allowing much higher precision in the conduct of military operations, particularly directing weapons.
However, as the GPS system started to have a universal civilian use, the vast majority of receivers are not capable of receiving coded signals and the development of coding for civilian purposes is not easy to harmonize and decide for system management. However, there are currently vulnerable critical infrastructures that should deserve special attention regarding the reception of GPS signals, particularly regarding the vehicles that use them daily 14 .
It turns out that the exponential growth in the market of certain specific transmitters (acronym SDR -"Low Cost Software Defined Radio") has currently made spoofing available to anyone who can simulate satellite transmission on the very same frequencies and signal characteristics. The time when communication frequencies with satellites were only available to the military is long over…. and there are even instructions on the Internet on how to spoof the radio control signals of drones.
These new threats clearly demand a reflection on how to approach "safety at sea" because, on one hand, the traditional divisions between "safety" and "security" are not closed and are mutually influential and, on the other, they themselves demand the consecration of a new instrument that fits them and also benefits from the strategic (and sovereign) thinking of States regarding the "use of the sea".
Although the concept of "safety at sea" is not a new one, the role of the maritime environment in the safety of States today assumes a strategic relevance that has been reinforced since the beginning of this decade, in an increasingly holistic view, particularly at European Union level 15 . In fact, it is "over the sea and in the ports" that most of the trade essential for the well-being of the population is to be found, with special reference to the imports of hydrocarbons (or energy sources in general) and as an alternative to land-based assets.
It is, therefore, desirable that the conceptual paradigm is progressively changed and expanded, i.e., on one hand, traditional maritime safety will have to be strengthened with measures to protect against illicit and disruptive attacks and, on the other, in legal terms, the "excusable" or "negligent" conduct of the crews should be less and less applied in view of the existing regulations -which include codes of good practices -and the serious consequences that can result from them. Those measures have a precautionary or preventive nature, but also reactive features, both in limiting the damage and in adopting alternative procedures provided for in contingency plans.
This approach will necessarily have consequences regarding the characterization of the reaction to and the combat of serious maritime accidents (such as, for example, oil spills in the jurisdictional spaces of a State), which is considered to have a strong security component since its origin, i.e., considering "wilful" (and not "negligent") the conduct of the crew that violates the rules of maritime safety resulting in the creation of a "danger" or "damage", legally qualified as "serious".
So, it looks that by extending the "malicious" conduct of the agent (and by reducing the "negligent" acts which, at times, exonerated or limited the liability of agents and companies), the way for the great majority of large maritime disasters is paved. This includes, for example, oil spills from ships, which will be considered from their origin an event in the scope of "security" and, consequently, as an increased regulatory role within the scope of the States 16 . and European Security", London, Brassey's, 1990, which, reminiscent of the nuclear deterrence strategy of the Cold War, refers to the importance of the sea for European security. However, it is with the presentation of the Maritime Strategy for the Atlantic in 2011, together with the Green Paper for European Integrated Maritime Policy and the European Integrated Maritime Policy that this strategic perspective for the use of the sea is reborn. More than the value of communication and transport, the sea is a source of essential resources and an indispensable means for the control of activities on land with the very projection of power and defence in advance and "in depth" that are essential to assert the European interests. See Pedra,José Rodrigues,op. cit,. On the other hand, this strategic relevance has also emerged as a result of the impact that the exploration and exploitation of marine resources have impacted progressively in the economies of States, faced with the growing scarcity and limitation of access to terrestrial resources. This situation has placed on the international agenda the countries' disputes regarding the delimitations of the contiguous seabed and the candidacies for the extensions of the continental platforms. At this point, it is appropriate to invoke a matter that also initiated its doctrine in Criminal Law and which, later, moved into the domain of International Law. It was about, in the criminal sphere, to legitimize, for example, the action of a severely disabled person (i.e., paraplegic) when he knew, with almost absolute certainty, that someone would come and murder him in the place where he was alone and without access to any contacts. And the question was whether it would be legitimate for the putative victim to neutralize the agent, shooting him in advance before entering the place where he was (for example, through a window). This example shows the difference, in International Law, between the "preventive" attack and the "preemptive" attack, legitimizing, in the latter case, the anticipated intervention in face of the intention (and evidence) of an imminent attack. Thus, the "preventive" attack falls to have legal legitimacy, given its arbitrariness and placed at the service of an "right of force" of impossible scrutiny, aiming only at pursuing a strategy to avoid changes in the balance of power that could favour the adversary. According to article 51 of the Charter of the United Nations, the "right of self-defence" is only recognized in the case of an armed attack and, with that extension, an attempt was made to include the intention of "armed attack". Now, in this case, the "imminent attack" (or to put it another way, the "real threat") exists from the moment JANUS.NET, e-journal of International Relations e-ISSN: 1647-7251 Vol. 11, Nº. 2 (November 2020-April 2021), pp. 163- 184 The impact of cybersecurity on the regulatory legal framework for maritime security Duarte Lynce de Faria 169 II. The influence of national security and sea environment on the concept of "Safety at Sea" The word "security" has numerous meanings, albeit with a common sense, both within the scope of the activity itself and with regard to the result: the protection (or guarantee) of a certain right or asset in the face of risks or obstacles that they come across. This means that, in the absence of obstacles to its exercise, it is unnecessary to adopt additional guarantees 17 .
Several security classifications can also emerge according to different criteria, namely, the protected subject (or target entities), the assets or materials to be protected, the territorial scope of intervention, the structures that ensure it and the intensity of the disturbance carried out (i.e., the effect of threats, risks and dangers on said assets or rights) 18 .
In addition to these criteria, "security" can also appear on several other forms -in conjunction, sometimes, with the word "safety", but really with a "protection" sensedepending on its specific object 19 , including energy security, safety at sea, maritime safety, air safety and transport safety. In this small list, it is a question of delimiting security depending on the activity carried out, which, in some cases, involves different transport segments (land, river, sea and air) and, in others, certain essential equipment and networks that interconnect them (energy security and cybersecurity, for example).
The security activity that is projected in the territorial scope of action of the resources in a given State must obey an upper spatial and material dimension called "national security" (alongside local, regional, international and global security). This concept arose in defence matters, prevailing the word "security" or "protection" against wilful and illegal acts.
It is clear that, nowadays, traditional "national security" is no longer just prosecution against criminal acts, but also embraces the prevention and solution of natural risks, within the scope of civil protection, increasing it in the sense of "safety" without, however, the ship's IT systems connect to the outside and, thus, it will be up to the Flag State to update its regulations and procedures to take into account the "preemptivity" of the exercise of the ship and the company. See, inter alia, Santos, Sofia, "Defesa preemptiva" e "Defesa preventiva" in Gouveia, Jorge Bacelar and Santos, Sofia (coord.), "Enciclopédia de Direito e Segurança", Almedina, Coimbra, 2015, pp. 102-105. 17 See Gouveia, Jorge Bacelar, "Direito da Segurança Cidadania, Soberania e Cosmopolitismo", Almedina, Coimbra, 2018, pp. 89 and following. The author supports the concept of a new branch of law: Security Law, and its dogmatic roots and autonomy and the analysis of State and international security entities that emerged. "Security Law" is defined as the "system of legal rules and principles that define the organization and functioning of security structures, establishing their powers and limits, with a view to protecting the fundamental legal rights and assets of citizens and political communities" (up to p. 119). This article is being framed on it, especially since in the future we will seek to "let go of the ropes and lines of the "new" Maritime Safety Law -that should embrace the security matters (as SOLAS Convention did with the ISPS Code). In our point of view, this is the moment to "grant" it its autonomy, in confrontation with the "Law of the Sea" and with "Maritime Law". However, the maritime world has started with the "safety" concept (rather than "security") and so it is easier to keep the word "safety" but now including "security" matters. 18 Ibidem, pp. 90-91. 19 Maritime Law deals with a specific object (the activity of maritime transport) within the scope of Commercial Law, which is more general but has not diminished its classification as a branch of Law. See also ibidem pp.93-96.
JANUS.NET, e-journal of International Relations e-ISSN: 1647-7251 Vol. 11, Nº. 2 (November 2020-April 2021), pp. 163- 184 The impact of cybersecurity on the regulatory legal framework for maritime security Duarte Lynce de Faria neglecting its "supra-state dimension, in line with the magnitude of the risks of terrorist attacks that are no longer national, localised, public and with conventional weapons, thus reinvigorating it in its sense of "security" 20 . Thus, "national security" is associated with national defence which, of course, interacts with political and strategic options above "security at sea" itself. . This author discusses the difference between the concepts of National Defence and National Security, proposing that the latter be adopted "resulting from a set of state policies duly articulated, in the military aspect but also in other sectoral policies such as the economic, cultural, and educational system, which includes coordinated actions of internal and external security, whose frontier is currently blurred". On the blurring between internal and external security, see We chose this collection as it started to conceptualize "safety at sea", which should cover "matters of maritime safety and maritime security and, in spatial terms, on ships and ports." (p. 435) in the article "Segurança no mar", ibidem, pp. 433-439. However, the "Strategic Concept of National Defence" (CEDN), approved by Resolution of the Council of Ministers no. 19/2013, of 21 March, although based on the concept of "national security", includes very important elements on the relevance of the sea in this context, considering, namely, that "as a strategic asset, the sea must be integrated in a broad perspective of national security and defence". Another component that may influence "safety at sea" concerns the definition of sectoral strategies. At national level, the "National Strategy for the Sea for the period 2013-2020" (ENM), approved by Council of Ministers Resolution no. 12/2014, of 23 January, emphasizes the use and preservation of the sea as a national asset, which reinforces the strategic relevance of "safety at sea". See note 13. The new National Strategy for the Sea -ENM 2021-2030 (in https://www.dgpm.mm.gov.pt/enm) is currently under public discussion -of which the following framework is cited on pp. 3-4: "Portugal started to monitor the economic relevance of the Sea in its national economy through a Satellite Sea Account, which resulted from a protocol between the National Statistics Institute (INE) and the Directorate-General for Sea Policy (DGPM) signed in 2013. According to estimates by the European Commission, in 2018, gross added value (GVA) in the blue economy represented 3.2% of the GVA in the national economy. The employment value generated represented 5.5% of national employment. These figures are among the highest in EU Member States. The sustainability of the blue economy depends on the conservation of the marine environment, and the services of its ecosystems, as well as the safeguarding of the maritime cultural heritage. The National Maritime Spatial Situation Plan, the Strategic Guidelines and Recommendations for the Implementation of a National Network of Marine Protected Areas approved in 2019, as well as the assessment of the Good Environmental Status of Marine Waters recently reported in compliance with the Marine Strategy Framework Directive, represented important milestones to ensure our commitment to the defence of marine ecosystems and nautical and underwater cultural heritage. Portugal should definitely assume the competitive advantages of its geostrategic position, its technological skills and its maritime tradition, minimizing administrative or fiscal barriers that prove to be harmful to it, and exercising the authority of the state at sea. The standards we set in the sustainable management of our sea will be a decisive contribution to the sustainability of the planet, in a future that we wish bluer for generations to come". Accordingly, "safety at sea" -as defined above -only partially has something in common with "national security" because it continues to have a transnational aspect, regardless of the state concerned. However, it will be, essentially, the "security" requirements that can model "safety at sea" through "national security" instead of the "safety" matrices that tend to be perennial and technical, aiming at improving navigability conditions of the medium used, without prejudice to considering natural phenomena. 24 In fact and in the vast majority of cases, only "security" is of interest to the politicalstrategic framework, involving other international States or actors, which means that it falls within the scope of the sovereignty of States and their corresponding unilateral enforcement mechanisms".
In contrast, regarding "safety", maritime safety rules derive from international conventions and coercibility results from international law (or international agreements such as the MoU in the context of Port State Control). 25 Another component that may influence "safety at sea" concerns the definition of sector strategies. Today, it is essential to articulate the issues of the "sea" with those of the "ports", with "transportation" and "logistics", whether in a more vertical and/or transversal view of sea matters. 26 On the other hand, threats and risks exist in military or civil documents -because they result from the analysis of civil components (namely, of an economic, cultural, scientific, technological, or environmental nature) or in strictly military -but they have repercussions in terms of strategic policy of any maritime country and thus, ultimately, in national security.  26 The political and strategic options in terms of "Defence and Security" must be followed permanently when addressing sea matters, all the more so since the protection, inspection, prospection and sustainable exploitation of its resources require suitable means for this purpose, listing them permanently and avoiding its predation. Having in mind the concepts of "safety" and "security" ("protection"), it is important to stress that "safety at sea" will always depend on the (global) strategy of the State 27 , although its holistic perspective is based on the deepening of the technological conditions of activities at "sea" -in particular, in the context of maritime transport and ports -and the degree of demand in compliance with good practices and the consequent accountability of crews, companies and port operators. 28 27 The introduction of the word "security" in conceptual documents emerges when the "strategy" based on a certain "concept" is developed. At national level, the "National Defence Strategic Concept" and the "National Defence and Security Strategy" are the main references.

28
In traditional terms, "safety" is related to the minimization of "risks" (from navigation) whereas "security" aims to combat intentional "threats" -although not exclusively -starting with a simple oil spill. In other words, "security" has as its essential core the threat and the intention to cause damage and, for this very reason, it is necessary to state its human origin ("threat actors"). Rather, "safety" focuses on the "risk" of maritime activities, that is, natural or unintended events that have serious consequences and are likely to materialize (i.e., traditionally, unexpected breakdowns, natural elements, etc.).
Our challenge is to prove that, nowadays, "risk" tends to be reduced to the so-called "natural" situations, since the conduct of a ship's crew that was exposed to a "danger" or "serious" damage can, in most cases, must be assumed as a "wilful" (i.e., beyond "negligent") performance for violation -although not intentionally -of maritime safety rules. If so, it is an "upgrade" of these conducts -considered, until today, "negligent" -being assumed as "threats" and, therefore, also, a matter of "security". Also in this field, the prevention and combat (or minimization) of damages resulting from occurrences of "security" and "safety", although with different conceptual origins, tend to increasingly overlap and articulate, in the actions, which is evident when moving towards global connections such as those that result from the fact that we live in a digitally interconnected world, whether physically or virtually, and thus permanently retaining its cybersecurity. On the website of the North American company CISA (Cybersecurity and Infrastructure Security Agency), created in 2018, it appears that one starts from the concept of "safety" to go to the one of "security" in a very simple way, stating that: "Being online exposes us to cyber criminals and others who commit identity theft, fraud, and harassment. Every time we connect to the Internet-at home, at school, at work, or on our mobile devices, we make decisions that affect our cybersecurity. Emerging cyber threats require engagement from the entire American community to create a safer cyber environment-from government and law enforcement to the private sector and, most importantly, members of the public". However, it is important to reiterate that it was the cyber threat and, consequently, cybersecurity, that came to leverage the thesis of the concentric relationship between "safety" and "security" and that a recent presentation on the repositioning of cyber threats in Operational Technologies (OT) systems -(Lisbon, at the PwC, on 5 February 2020). Its author (Rafael Maman), an Israeli expert in the area of cybersecurity who addressed the matter in a personal capacity, mentioned the following: "Corresponding to a shift in the cyber risk equation: traditional IT risks -data privacy, IP theft, etc. -are augmented by higher-order risks -to unman life, disruption of critical operations, environmental disasters, etc.(it should have as a consequence that) governments and industrial enterprises recognise the importance of OT Security for Critical Infrastructure protection and the risks involved, and initiate proactive action". With this qualitative change in the cyber risk equation, it is increasingly important to identify the fundamental differences between cybersecurity in IT and OT, in all its dimensions -including the legal one -precisely because it is in the OT domain that the interdependencies between "safety" and "security" are more relevant, given that the OT links the cyber world to the physical one. As a direct consequence, the permanent presence of the risk of cyber-attacks to critical infrastructures and essential services (which include maritime transport and ports) implies that "security" must always be considered. In our case, the creation of conditions for safe navigation, in the present times, must always take cyberspace into account and, therefore, the representative figure that is proposed, consisting of two concentric circles in which the central one corresponds to "safety". In this light, Rafael Maman goes even further when considering that the micro trends of cyber threats present the following evolution: "From "military-grade cyberweapons" to "industrial-grade ransomware". What used to be considered cyber warfare weapons used by the armed forces can now be used to disrupt critical industries and essential services by any actor technologically able to do it. In Maman's "The Reshaping Cyber Threat Landscape of Operational Technology", presentation at the "Conference organized by the PwC "Cybersecurity -The Challenges of Operational Technology (OT)", Lisbon, 5 February 2020. On the other hand, since the beginning of the century, the vast majority of incidents of appreciable size in sensitive industries have deliberate attacks (cyber and other), collateral damage from attacks or the poor functioning of systems as associated causes, not being possible, in most cases, to isolate sources according to the traditional "safety/security" bipartition or, if possible, it will lose all interest due to the need for an JANUS.NET, e-journal of International Relations e-ISSN: 1647-7251 Vol. 11, Nº. 2 (November 2020-April 2021), pp. 163- 184 The impact of cybersecurity on the regulatory legal framework for maritime security Duarte Lynce de Faria "Safety at sea", when encompassing those two concepts, unfolds into two types of dangers: the "threats" and the "risks" that involve the use of the sea, either in ships or in ports.
"Threats" are essentially of two kinds: generic offenses at sea and specific offenses that influence freedom of navigation. The first includes, in particular, trafficking in narcotic drugs and psychotropic substances, general and arms smuggling, the proliferation of weapons of mass destruction, the illegal exploitation of marine resources, the platform or underwater cultural heritage, attacks (including pollution) and illegal immigration. The second includes terrorism, piracy, cyber-attacks on information systems and other criminal activities classified as such by international law.
In turn, "risks" 29 tend to be accidental or natural and identify mostly (but not exclusively) with "maritime transport security" and "port security". The potential associated damage (or the condition of creating a "hazard") can affect ships and vessels, people on board, platforms or infrastructure at sea (and, equally, aircraft and submarines) and the environment in particular through pollution accidents.
This tendency to associate "safety" (in the strict sense) with "risks" and "protection" with "threats" has the great advantage of being able to learn from areas that, until recently, evolved autonomously and that the 9/11 forced to be closely associated. This resulted from the need to adopt measures applicable to ships and port facilities in the scope of "protection" and to identify security threats and take of accident prevention measures, which started to take place, cumulatively and in coordinated from, in accordance with the ISPS Code 30 .
Another circumstance that occurs with the deepening and development of maritime safety rules -translated, in essence, into the relevant IMO conventions -concerns the progressive exhaustion of exemption clauses and limitation of liability in maritime integrated response. See https://www.csis.org/programs/technology-policy-program/significant-cyberincidents. For this reason, the intention is not only to prove that the crew conduct that violates the rules of maritime safety and causes a "danger" or "damage" qualified legally as "serious" falls within the scope of "wilful misconduct", and within the representation by two concentric circles. The traditional division between neutralizing threat agents ("security") and helping to contain negative consequences ("safety"), in our opinion, may contribute to a common and consolidated plan that will form part of the maritime safety rules aboard, no matter their different origin or the measures to limit damage. The European Security Strategy and the Report on the Implementation of the European Security Strategy also highlight a set of "threats" with implications for the use of the sea, including illegal activities, organized crime, piracy, terrorism, proliferation weapons of mass destruction, regional conflicts, fragile States, maritime pollution, energy security and climate change. This means that this focus is essentially on "security". See http://www.consilium.europa.eu/uedocs (search for the respective titles). On the contrary, the EMSA (European Maritime Safety Agency) performs activities within the scope of "safety" and it is for this reason that it is nevertheless invoked in a common and broad perspective of "safety" (i.e., "safety" plus "security" ).

29
A "risk" is the product of the probability of the occurrence of a threat (or damage) by the severity (or intensity) of its effects. Traditionally associated with "safety", the ship's rules compliance hamper applying a waiver clause to any crew's conduct that violates the rules of maritime safety with serious consequences. The origin of these concepts is rooted in international law and, more specifically, in conflict resolution theory. In a succinct way and in this context, "threat" corresponds to a circumstance or event that endangers the pursuit of political and strategic objectives and "risk" is perceived as the degree of exposure to the threat in question. 30 The acronym ISPS designates the "International Ships and Port Facilities Security Code" that constitutes chapter XI-2 of the SOLAS Convention since 2002.
JANUS.NET, e-journal of International Relations e-ISSN: 1647-7251 Vol. 11, Nº. 2 (November 2020-April 2021), pp. 163- 184 The impact of cybersecurity on the regulatory legal framework for maritime security Duarte Lynce de Faria transport contracts (and conventions) that allow, for example, a carrier to discharge its liability whenever proceeding without a wilful misconduct. As a paradigmatic example, there is the "nautical fault" in international conventions on maritime transport that exonerates the carrier for damage to the cargo (at least, since the 1920s).
It means that the progressive technological requirements and good conduct for safe navigation (i.e., the rules on "maritime safety") make the circumstances initially considered to be "negligent", much more restricted in the scope of civil liability (contractual and in tort), including those present in oil spills 31 .
Accordingly, compliance with maritime safety standards, while minimizing "risks" (and errors), reinforces fighting "threats" and, at the same time, limits enforcing the exemption and liability limitation clauses present, for example and among others, in the conventions on pollution resulting from oil spills and in those concerning the maritime transport of goods 32 .
It is understood, therefore, that the broad notion of "safety at sea" (or "maritime safety" in the wide sense which is, in fact, one of the most common expression nowadays) must rule the material aspects of (maritime) safety (in strict sense) and (maritime) security and, in terms of its spatial range, focusing on ships and ports 33 . Particularly, in terms of the object, "safety at sea" -in both aspects -covers maritime transport -in which the focus is the "ship" and her movement -and ports -which essentially rules the safety in 31 This matter was defined as falling within the scope of "security", even in its origin, since, in the assessment made, in most cases with serious consequences, it results from a "wilful misconduct" of the crew. 32 The "nautical fault" as an exemption (or waiver) clause is provided for in clause a) of paragraph 2 of article 4 of the International Convention for the Unification of Certain Rules of Law relating to Bills of Lading Knowledge, signed in Brussels on 25 August 1924 -known as "The Hague Rules". It specifically refers that the clause only applies to "Acts, neglect or default of the master, mariner, pilot or servants of the carrier in the navigation or in the management". Thus, if the "nautical fault" consists of a violation of the essential rules of maritime safety (in a broad sense), it can hardly justify the exoneration of the carrier/shipowner for damage to the cargo. It should be noted that according to tort's doctrine and in accordance with the current conventionsparticularly under the 1969 Liability Convention for Damage Due to Oil Pollution (Civil Liability Convention 1969 or CLC/69) and its 1992 amendment (CLC/92) -the owner of the ship is responsible for a navigation error that led to the vessel being stranded and the subsequent oil spill (case of the M/V "Exxon Valdez" with the spill of about 38,000 tons of crude on the Alaskan coasts). In fact, Article V/2 of the CLC/92 establishes that the owner can lose the ability to limit his liability as long as the damage due to pollution results from an action or omission attributed to him "committed with the intention of causing such damage or recklessly and in the knowledge that such damage could occur". This formula is very close to that used in paragraph 5 (e) of Article IV of the Visby Protocol of 1968 ("Visby Rules") to the Brussels Convention of 1924 referred to, which removes the limitation of liability if the action or omission had the intention of causing damage or was done recklessly and with the knowledge that damage would probably take place. It is a form not covered by "negligence act" but by a "wilful misconduct". In terms of "value chain", the possibility of also covering agents and operators with responsibility in the logistics area is not ruled out as their performance is directly related to the information and communication systems, such as the Portuguese ports that use the modern "Port Single Window" (a "one stop shop" asset) or its upgrade, the new "Logistics Single Window" that now covers dry ports and land and logistic operators as well as freight forwarders.
JANUS.NET, e-journal of International Relations e-ISSN: 1647-7251 Vol. 11, Nº. 2 (November 2020-April 2021), pp. 163- 184 The impact of cybersecurity on the regulatory legal framework for maritime security Duarte Lynce de Faria areas under port jurisdiction, covering the various terminals, the adjacent land area and the contiguous wet area.
The "safety of maritime transport" (or "maritime safety in the strict sense") involves the set of measures in force for a safe navigation by ships, i.e., the conditions on board (qualification of the crew, stowage and cargo handling and, in general, the navigability conditions of the ship and its equipment), the navigation aid systems or the safe navigation in coastal waters, including, the ports.
On the other hand, "maritime transport protection" and "port protection" depending on the object -involve all physical safety 34 and other measures applicable in the area under port jurisdiction, regarding the ship's crew and passengers and other employees who operate in the ports, as well as the ships as carriers. Those measures are intended to secure normal trade activity according to the applicable technical rules 35 .

III. The modern perspective of defence against cyber-attacks in the maritime sector
Therefore, it is expected that the contents of an autonomous "Maritime Safety Law" 36 should take into account both vectors of "safety" and "security", for several reasons: first, "safety" is the oldest 37 , the most stable and the one that is dealt with in most IMO conventions; then, because the interpenetration between the two concepts is increasing; thirdly, because there are translations that no longer go back (the case of "cybersecurity"); and finally, because, nowadays, the two vectors tend to present themselves as two concentric circles -the "safety" (more interior) and the "security" that surrounds it. 34 From this point of view, there is also the need to certify personnel who interact with IT systems according to the type of ship, ports of origin, type of goods, i.e., according to the standard of risk assumed for the ship, as it is done today to comply with maritime safety conditions in which, for example, the conditions for the replenishment of bunkers (fuel for ships) by barge in ports are evaluated. 35 The Diplomatic Conference of the International Maritime Organization (IMO), meeting on 12 December 2002, amended the SOLAS Convention ("Safety of Life at Sea"), and adopted the International Ship and Port Facility Security Code (known as "ISPS Code"), which came into force on 1 July 2004. This new Code is an expression of the value of "protecting" maritime transport, terminals, and ports. It has been clarified that the SOLAS Convention includes several specific codes aiming at standardizing safety management on board (the case of the ISM Code -International Management Code for the Safe Operation of Ships and for Pollution Prevention, from 1992) or aimed at the rules for the investigation of maritime accidents or incidents (the CIA or Accident Investigation Code) that aggregates a set of IMO resolutions, with special reference to Resolution A.849 820) of November 1990 -which establishes the rules for the investigation of human factors in accidents and Resolution MSC.255 (84), of 16 May 2008, which contemplates the rules and recommendations to be adopted in investigations of maritime accidents or incidents. 36 The autonomy of Security Law as a branch of law was defended by Gouveia, Jorge Bacelar in the work "Direito da Segurança Cidadania, Soberania e Cosmopolitismo", Almedina, Coimbra, 2018. In this work, in particular in the second part, which refers to the "explanation of Security Law as a new legal sector and in the context of the respective sources" (p. 17), the author takes a path which, to some extent, may make it difficult to "search some more complex points in depth" (p. 15). However, it was its scope and the innovative approach that, in our opinion, led to the emergence, among other special areas, of Maritime Security Law as a branch of Security Law and to cut off the old ties with the traditional law of the sea and maritime law. 37 It is important to clarify that if it starts from an imminent commercial perspective, i.e., to establish the activity of maritime transport, it is necessary, in the first place, to use technologically safe assets. Only after that, it the importance of threat control can be assessed. Of course, in certain circumstances, it can be reversible, securing the aim of the minimum capacity for employing the assets.
JANUS.NET, e-journal of International Relations e-ISSN: 1647-7251 Vol. 11, Nº. 2 (November 2020-April 2021), pp. 163- 184 The impact of cybersecurity on the regulatory legal framework for maritime security Duarte Lynce de Faria In fact, the latter can strengthen (or weaken) the one at the centre 38 , in a constant dialectic and interaction.
This proposed structure is in line with an increasingly present finding: "security" incidents can have serious consequences in terms of "safety", which means that it is necessary to consider security procedures as essential to prevent those incidents from having a serious impact on the "safety" framework, even including them in the mandatory international maritime safety management codes.
However, the strengthening of the importance of "security" did not affect, in conventional terms, an upgrade and revision of concepts, and, after all, such position was not expected. In fact, the SOLAS convention has begun its long journey in 1914, with an essential aspect of maritime safety together with the safety of human life at sea (which, incidentally, comes from its acronym SOLAS -Safety of Life at Sea), having embraced new subjects (the ISPS Code, for example), and the autonomy of others (for example, the case of the COLREG convention, which, in 1972, approved the Regulation to Prevent Collisions at Sea).
Thus, Maritime Safety Law, within the scope of International Law, has its own essential sources on the specific IMO conventions that are based on the traditional classification of "safety", gradually extending its regulation to "security" -as it happens with the ISPS Code annexed to the SOLAS Convention or, autonomously, with the SUA Convention 39 .
This instrumental expansion of the traditional safety matter to maritime security (or "protection") will give response to the new risks and threats at sea and ports, which, however, still face the regulation difficulty in clear areas of the exercise of the sovereignty of States that traditionally would conflict with international law.
It is understood, however, that the new security environment requires a progressive capacity for harmonization and cooperation, including the employment of assets. Given the global dimension of risks and threats, this approach is of utmost importance. This is what happens currently with "maritime cybersecurity" 40 , which is increasingly more important for ports, maritime transportation and assets.

38
This means that "security" ("cyber") incidents can give rise to "safety" incidents, in a continuous interaction that should not be seen in an up and down approach. Thus, we are getting closer to the evolution of NATO's traditional "naval defence" mission towards a broad notion of "maritime security", whereby it is intended to "prevent the use of the sea for illegal activities and ensure freedom of navigation" cf. Pereira, Luis Sousa, "A NATO e a Segurança no Mar" in Cajarabille, Victor Lopo et all, "A Segurança no Mar -uma Visão Holística", Mare Liberum, Aveiro, 2012, p. 132. Our concept is not limited to the perspective of "naval defence" and requires a very significant "safety" component in the strict sense. However, for example, the Portuguese translation of NATO documents, such as the "Maritime Security Operations Concept" makes -once againthe term "security" correspond to the word "segurança" (and not "proteção"). In a recent paper (dated 30 August 2019), entitled "Polemologia da Segurança Marítima -Golfo da Guiné como estudo de caso" ("Maritime Security Polemology -Gulf of Guinea as a case study") (unpublished), written by Commander Luis Cuco de Jesus, within the scope of the Doctoral Degree in Law and Security of the Nova School of Law (Lisbon), this author uses the words "maritime safety" in order to elect legal mechanisms to suppress new threats at sea, which means that the proposed framework occurs, essentially and strictly, within the scope of "security".

39
Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation, 1988. 40 Which, in fact, should be designated in Portuguese as "ciberproteção marítima" because it is a matter of "security". See also the article by Marques, António Gameiro, "Cibersegurança no Setor Marítimo", in Revista de Marinha, no. 1004, Jul-Ago 2018. The author approaches this matter in a pioneering way, examining the developments in the European Union and the recently approved laws regarding cyberspace.
Accordingly, the interconnection between a security incident and a safety incident, including the impact of the former on the latter, is, in this context, a real probability, since it is not difficult to predict that spoofing in the ship's geographical position leads to deviation and the consequent stranding or collision.
In 2002, the ISPS Code recognized the role of port structures (terminals and ports) in the context of maritime protection and established mandatory requirements and recommendations applicable to ships and those facilities. However, the requirements may also cover cybersecurity measures relating to access control and certification of authorizations 41 .
In fact, the ISPS Code requires terminals drawing up the so-called "Port Facility Security Assessment" (PFSA), which identifies structures and equipment, possible threats and countermeasures and the "Port Facility Security Plan" (PFSP), which identifies the procedures, measures and actions to be carried out at different alert levels. The PFSA must address the following aspects: physical safety, structural integrity, personal protection systems, procedural policies, radio and telecommunications systemsincluding computer systems and computer networks -and relevant transport infrastructure. The PFSP specifies conditions for access to infrastructure, restricted areas, cargo handling, delivery of supplies to ships, and monitoring of infrastructure protection conditions.
Also the SOLAS and FAL Conventions (Facilitation on International Maritime Traffic) define nine standard forms to be used in the exchange of information in the maritime ecosystem, especially between ports (or terminals) and third parties that have been mandatorily processed by electronic means since 9 April 2019, especially through the use of "single window systems" (or "one stop shop"). It is the standardization of information exchange that has a strong impact on IT systems and poses new challenges.
Regarding cybersecurity for the maritime "ecosystem", special for ships, it was not until 2017 that international recommendations begun to be more abundant.
The IMO Facilitation Committee (FAL) and the IMO Maritime Security Committee (MSC) wrote the action lines in risk management of maritime cybersecurity in the document MSC-FAL 1/ Circ.3 42 . Both structures recognize the urgent need to raise awareness of the threats and vulnerabilities of marine cyberspace and to make high-level recommendations for the management of cyberspace risks in relation to current and See also, by the same author, "A Segurança do Ciberespaço em Portugal e no Setor Marítimo", Cadernos Navais, no. 52, April-June 2019, Centro de Estudos Estratégicos da Marinha, in www.marinha.pt. Regarding the concepts of cybersecurity and information security, see Santos, Lino, "Cibersegurança" e "Segurança da informação" in Gouveia,Jorge Bacelar Gouveia and Santos,Sofia (coord.),op. cit.,. This author states that "cybersecurity can be seen from two perspectives, regardless of whether the object of cybersecurity is the State, organizations or individuals: the security of cyberspace (in the physical sense of it as an autonomous entity) and the security of the "cyber" component of any system (cyberspace security of that system) "(p. 63). For its part and according to the same author, information security is indispensable to "guarantee confidentiality, integrity and availability of information at all times" (p. 422 emerging threats and vulnerabilities, including key areas that are considered essential to support cyberspace management (identify, protect, detect, respond and recover).
These action lines constituted the basis for distinguishing between IT systems (information technologies, i.e., use of data as information) and OT (operational technology, i.e., IT systems are increasingly linked to the OT of companies, which requires a new management perspective in the use of data to control or monitor physical processes, in a constant and bidirectional cyber-physical interaction). They reveal that all organizations in the shipping industry are different and that the role of governments and Flag States in their regulation is essential. These should also be guided updated recommendations of the most relevant international instruments and good practices, aiming at the improvement of the protective measures.
It was up to each State to take the measures considered to be most appropriate, in an environment far from the progressive uniformity required by the global connection of the systems.
At European Union level 43 , the important role of its specialized agency (ENISA -"European Union Agency for Network and Information Security") on the maritime sector has begun in 2011 with the publication of the report on maritime cybersecurity 44 .
This document characterized the systems that the maritime community uses. In general, they are highly complex, with different technologies, numerous manufacturers and a huge dispersion of nationalities. It turns out that issues associated with security (or protection in order to prevent intrusion and disruption) are, generally, considered negligible, increasing the risk of cyber-attacks, amplified by easy connections to the Internet without adopting good practices.
But even more serious was the lack of capacity to deal with both incidents and even cyber-attacks, denoting a complete lack of coordination among the various actors in the maritime-port sector.
In general terms, future chapters of the SOLAS Convention regarding "security" may include actions to respond to cyber-attacks, particularly when part of the general measures for the protection of ships, ports and personnel.
In this regard, the following Community legislation deserves special mention: - Page 3 of the European Union's Maritime Safety Strategy of 24 July 2014 reads: "Maritime security is understood as a state of affairs of the global maritime domain, in which international law and national law are enforced, freedom of navigation is guaranteed and citizens, infrastructure, transport, the environment and marine resources are protected". This paragraph also contains the idea of the 2 concentric circles that correspond to "safety" and "security", that is, the guarantee of freedom of navigation in safe conditions for citizens, for infrastructures, for transport, the environment and marine resources. Safety Management Code) for the maritime sector -that excludes, however, the ports included in the above directive; and -Directive 2010/65/EU, which stipulates the acceptance by Member States of standard forms ("FAL forms") to facilitate traffic. This Directive also introduces "SafeSeaNet" systems at national and European Union level in the legal system, promoting secure data traffic between the maritime administrations of each state and other authorities.
Briefly, Regulation (EC) No. 725/2004 andDirective No. 2005/65/EC constitute the legal reference framework that supports the assessment and plans for the protection of ports and port infrastructure, as well as ownership and maritime carriers' companies.
Meanwhile, in 2014, the document that approved the European Maritime Security Strategy (EUMSS), revised in 2018 45 , was defined as an instrument to identify, prevent and respond to any challenge that may affect the protection of Europeans, activities and means in the maritime ecosystem including ports.
The EUMSS identifies threats and risks that are embodied in "terrorism and other intentional and unlawful acts at sea and in ports against ships, goods, crews and passengers, ports and port infrastructure and critical maritime and energy infrastructures, including cyber-attacks". The 2018 version of the Strategy essentially focused on the reporting procedure with a view to improving the alert and monitoring subsequent actions. Strategy" in https://ec.europa.eu/maritimeaffairs/policy/maritime-security_en. It is clear that strategy documents on "safety" and/or "security" issues are almost invariably translated as "safety", an argument also in favour of proposing the "new" Maritime Safety Law as covering both aspects that are increasingly interrelated and whose limits are increasingly fluid. And its 2018 version in https://www.consilium.europa.eu/en/press/press-releases/2018/06/26/maritime-security-eu-revises-itsaction-plan/. In 2016, Regulation (EU) 2016/679 ("General Data Protection Regulation"), which was intended to protect the personal data of natural persons and their communication, also naturally covered the maritime sector, but without any specialization. 46 This Directive was transposed into Portuguese legislation by Law No. 46/2018, of 13 August, which establishes the legal regime for cyberspace security. Meantime, last September, the European Commission launched a public consultation as part of the review process of the NIS Directive with the aim of strengthening the resilience of networks and systems against cybersecurity risks. In this context, the Directive identifies "operators of essential services", including seaports. One of the problems identified by the Commission was the lack of harmonization on the part of the Member States in identifying those operators, which was also reflected in the selected seaports (for example, whether or not smaller ports should be excluded from the enforcement of the Directive). For this reason, it is also intended to revisit the terms foreseen for "sea ports" in the definition established therein that follows:"Managing bodies of ports as defined in point (1) of Article 3 of Directive 2005/65/EC, including their port facilities as defined in point (11) of Article 2 of Regulation (EC) No 725/2004, and entities operating works and equipment contained within ports". One of the core issues to be considered concerns the obligation that the Directive imposes on the notification of cybersecurity incidents to the competent authorities. In our opinion, all operators that are part of a "network or system of essential services", should be covered by the Directive, regardless whether the seaport (or other network member) is large or small. Thus, the obligations carried out by an "essential services operator" should be mandatory for all, regardless of their classification as "operators". This is the first European Union legislation on cyberspace security, aimed at increasing cooperation and creating a culture of security in sectors essential to society that rely heavily on IT.
Paragraphs 10 and 11 of the Directive are specific to the maritime sector: "10. In the maritime and inland waterway transport sector, safety requirements for companies, ships, port facilities, ports and maritime traffic services under Union legal acts cover all operations, including radio and telecommunication systems and information systems and networks. Part of the mandatory procedures to be followed includes notification of all incidents and, as such, should be considered as "lex specialis", insofar as these requirements are at least equivalent to the corresponding provisions of this Directive".
"11. When identifying operators in the maritime and inland waterway transport sector, Member States should take into account the international codes and guidelines -current and future -written by the International Maritime Organization in order to allow different maritime operators to follow a coherent approach".
According to Article 4, paragraph 4 of the Directive, an "operator of essential services" is a public or private entity belonging to one of the types referred to in Annex II and which fulfills the criteria set out in Article 5, paragraph 2 (that is, an entity provides an essential service for the maintenance of crucial society and/or economic activities, and the provision of that service depends on information networks and systems; and an incident can have major disruptive effects on the provision of that service).
However, as regards the maritime and inland waterway transport ecosystem, the operators listed in Annex II are as follows: -Inland waterway, maritime and coastal transport companies for passengers and goods, as defined, for maritime transport, in Annex I to Regulation ( Finally, in 2019, the "European Cybersecurity Act" 47 strengthened ENISA's position visà-vis Member States and defined the framework for cybersecurity certification for ICT products, services and processes, demanding compliance with certain requirements.
In addition, several Member States have strengthened the enforcement of international and EU regulations and policies on cybersecurity, developing their own initiatives to improve cyberspace risk management through national legislation 48 .

IV. Conclusions
Since old times, the sea has been a path for trade and, therefore, for globalization. Nowadays, this has led to the emergence of several risks and threats that require more demanding conditions for ICT products and associated services.
Cyber-attacks in the maritime-port sector have reinforced the need to approach the new maritime safety in a holistic way, integrating the two vectors ("safety" and "security"), which rely on the national strategy conducted by each State.
Thus, we can say that "safety at sea" is balanced between two concentric circles: "safety", from a technical nature, and "security", which reinforces the protection against wilful misconduct, strengthening resilience against those acts and detecting the systems' vulnerability, evaluating, preventing and deterring the threats.
The new stage attained by the European Union on cybersecurity was achieved by Directive 2016/1148 on the Security of Network and Information Systems (NIS), a new framework able to harmonize, among Member States, their national cybersecurity capacities, border collaboration and the supervision of critical and essential sectors in the Union.
A "secure navigation in cyberspace" requires, after all, facing and defeating new "obstacles" -accidental or deliberate -where the "unruled" globalization is the true enemy. It is the new Cape of Good Hope, in South Africa, that Portuguese navigator Bartolomeu Dias has "defeated" and overcome in the 15 th century.
As the Cape was turned safely then, cyberspace should also be safe, with tight regulations and new instruments, as Pedro Nunes did with the "grown latitudes" chart 49 , or with 47 https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-act. 48 Law "CIIP" in France -https://www.ssi.gouv.fr/en/cybersecurity-in-france/ciip-in-france/. UK specific port law -https://www.gov.uk/government/publications/ports-and-port-systems-cybersecurity-code-of-practice; "IT-Grundschutz" Law in Germany It should be noted that cybersecurity was a relevant topic on the agenda of the NATO Summit in London, in December 2019. 49 Even, at this stage, in small-scale charts, leaving for Gerardo Mercator, later, the glory of its generalization (Mercator chart). Pedro Nunes, as the first major cosmographer of the Portuguese Kingdom, appointed in 1547, born in Alcácer do Sal, nearby Sado river and Maths Doctor in Coimbra University, played a crucial role in the development of the study of the mathematical problems of nautical cartography that became essential in the methods and equipment used in oceanic navigation by the Portuguese. He was the first to JANUS.NET, e-journal of International Relations e-ISSN: 1647-7251 Vol. 11, Nº. 2 (November 2020-April 2021), pp. 163- 184 The impact of cybersecurity on the regulatory legal framework for maritime security Duarte Lynce de Faria 182 Bartolomeu Dias' courage and expertise, looking for new knowledge and navigation techniques, a step further to beginning, then, "Globalization"!