{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T06:00:40Z","timestamp":1762668040961,"version":"build-2065373602"},"reference-count":56,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:00:00Z","timestamp":1762387200000},"content-version":"vor","delay-in-days":309,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>This paper examines the strategic logic of cyber attacks on maritime and naval assets, positioning them as key elements of modern hybrid warfare. During periods of intense state-on-state competition, nations increasingly use non-kinetic cyber operations in contested maritime spaces to disrupt, coerce, and project power. Through a qualitative, theory-developing case study analysis of high-profile incidents, this study identifies the strategic purpose behind these campaigns. We argue that such operations are not simply tactical disruptions but are calculated components of gray zone strategy. By applying contemporary cyber conflict theory, including the concept of \u201cpersistent engagement,\u201d this paper demonstrates how maritime cyber operations serve as instruments for ongoing intelligence contests, signaling, and shaping the strategic environment below the threshold of armed conflict.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf031","type":"journal-article","created":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T05:52:06Z","timestamp":1762667526000},"source":"Crossref","is-referenced-by-count":0,"title":["Non-kinetic naval strategy: the role of cyber operations in modern maritime conflict"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3280-2678","authenticated-orcid":false,"given":"Francesco","family":"Ferazza","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London , London TW200EX ,","place":["United Kingdom"]},{"name":"Marina Militare , Rome 00196 ,","place":["Italy"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4402-2987","authenticated-orcid":false,"given":"Konstantinos","family":"Mersinas","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London , London TW200EX ,","place":["United Kingdom"]}]}],"member":"286","published-online":{"date-parts":[[2025,11,6]]},"reference":[{"key":"2025110900555083200_bib1","doi-asserted-by":"crossref","first-page":"770","DOI":"10.3390\/jmse8100776","article-title":"Assessing cyber challenges of maritime navigation","volume":"8","author":"Androjna","year":"2020","journal-title":"J Mar Sci Eng"},{"key":"2025110900555083200_bib2","first-page":"101","article-title":"Navigating uncharted waters: tackling maritime cybersecurity challenges in the black sea region","volume":"55","author":"Todorov","year":"2024","journal-title":"Inform Secur Int J"},{"article-title":"The Untold Story of NotPetya, the most devastating cyberattack in history","year":"2018","author":"Greenberg","key":"2025110900555083200_bib3"},{"key":"2025110900555083200_bib4","first-page":"109","article-title":"\u201cThings done by halves\u201d\u2014observations from America\u2019s first great-power competition","volume":"73","author":"Armstrong","year":"2020","journal-title":"Naval War College Rev"},{"key":"2025110900555083200_bib5","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1162\/ISEC_a_00136","article-title":"The myth of cyberwar: bringing war in cyberspace back down to earth","volume":"38","author":"Gartzke","year":"2013","journal-title":"Int Secur"},{"key":"2025110900555083200_bib6","first-page":"90","article-title":"The strategic promise of offensive cyber operations","volume":"12","author":"Smeets","year":"2018","journal-title":"Strategic Stud Quart"},{"key":"2025110900555083200_bib7","article-title":"Policy roundtable: cyber conflict as an intelligence contest","volume-title":"Texas Natl Secur Rev","author":"Rovner","year":"2021"},{"key":"2025110900555083200_bib8","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780197638255.001.0001","volume-title":"Cyber Persistence Theory: Redefining National Security in Cyberspace","author":"Fischerkeller","year":"2022"},{"key":"2025110900555083200_bib9","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1080\/01402390.2020.1732354","article-title":"Cyber campaigns and the era of persistent engagement","volume":"45","author":"Harknett","year":"2020","journal-title":"J Strategic Stud"},{"article-title":"Conflict in the 21st century: the rise of hybrid wars","year":"2007","author":"Hoffman","key":"2025110900555083200_bib10"},{"article-title":"Mastering the gray zone: understanding a changing era of conflict","year":"2015","author":"Mazarr","key":"2025110900555083200_bib11"},{"article-title":"The gray zone","year":"2015","author":"United States Special Operations Command","key":"2025110900555083200_bib12"},{"key":"2025110900555083200_bib13","doi-asserted-by":"crossref","first-page":"111","DOI":"10.31374\/sjms.233","article-title":"Hybrid warfare at sea? Russia, Svalbard and the Arctic","volume":"7","author":"Stensrud","year":"2024","journal-title":"Scand J Mil Stud"},{"article-title":"Maritime hybrid threats","year":"2021","author":"Kotman","key":"2025110900555083200_bib14"},{"key":"2025110900555083200_bib15","first-page":"1","article-title":"Use of force in hybrid naval warfare contexts: applicability of the law enforcement or conduct of hostilities rules?","volume":"55","author":"Petrig","year":"2024","journal-title":"Ocean Dev Int Law"},{"volume-title":"Handbook on maritime hybrid threats: 15 scenarios and legal scans","year":"2023","author":"Giannoulis","key":"2025110900555083200_bib16"},{"volume-title":"Age of deception: the politics of secret statecraft in the digital era","year":"2023","author":"Lindsay","key":"2025110900555083200_bib17"},{"key":"2025110900555083200_bib18","first-page":"2","article-title":"The rising threat of maritime cyber-attacks and the level of maritime cyber-security preparedness along the straits of Malacca and Singapore","volume":"42","author":"Neo","year":"2021","journal-title":"Soundings"},{"key":"2025110900555083200_bib19","first-page":"586","article-title":"Cybersecurity at sea: a literature review of cyber-attack impacts and defenses in maritime supply chains","volume":"15","author":"Clavijo\u00a0Mesa","year":"2024","journal-title":"Information"},{"article-title":"Case study research: design and methods","year":"2009","author":"Yin","key":"2025110900555083200_bib20"},{"article-title":"The industrial control system cyber kill chain","year":"2015","author":"Assante","key":"2025110900555083200_bib21"},{"article-title":"Cyber intelligence part 5: cyber threat intelligence","year":"2015","author":"Lee","key":"2025110900555083200_bib22"},{"key":"2025110900555083200_bib23","doi-asserted-by":"publisher","DOI":"10.1093\/wentk\/9780199918096.001.0001","volume-title":"Cybersecurity and cyberwar: what everyone needs to know","author":"Singer","year":"2014"},{"key":"2025110900555083200_bib24","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/01402390.2014.977382","article-title":"Attributing cyber attacks","volume":"38","author":"Rid","year":"2015","journal-title":"J Strategic Stud"},{"article-title":"Israel cyberattack caused \u2018total disarray\u2019 at Iran Port: Report","year":"2020","author":"Al Jazeera","key":"2025110900555083200_bib25"},{"article-title":"US Blames Russia for Devastating NotPetya Cyberattack","year":"2018","author":"Aarthun","key":"2025110900555083200_bib26"},{"article-title":"Cyber threat scenarios and protection steps for manufacturing","year":"2023","author":"Dragos I","key":"2025110900555083200_bib27"},{"article-title":"NotPetya: a Columbia University case study","year":"2021","author":"Steinberg","key":"2025110900555083200_bib28"},{"article-title":"Iran spoofing ship GPS signals, warns US","year":"2019","author":"Bockmann","key":"2025110900555083200_bib29"},{"article-title":"Attackers deploy new ICS attack framework \u201cTRITON\u201d and cause operational disruption to critical infrastructure","year":"2017","author":"Johnson","key":"2025110900555083200_bib30"},{"article-title":"The first ICS cyber attack on safety instrument systems (TRITON)","year":"2018","author":"Di\u00a0Pinto","key":"2025110900555083200_bib31"},{"article-title":"TRITON malware remains threat to global critical infrastructure","year":"2022","author":"Federal Bureau of Investigation (FBI)","key":"2025110900555083200_bib32"},{"article-title":"U.S. Navy network breach traced to Iran","year":"2014","author":"Gorman","key":"2025110900555083200_bib33"},{"article-title":"South Korea says North Korea GPS jamming signals affecting flights, ships","year":"2016","author":"Nichols","key":"2025110900555083200_bib34"},{"article-title":"Prioritizing national dangers from threats to GPS","year":"2016","author":"Goward","key":"2025110900555083200_bib35"},{"key":"2025110900555083200_bib36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3105063","article-title":"Enhanced accuracy simulator for a future Korean Nationwide eLoran System","author":"Rhee","year":"2021","journal-title":"IEEE Access"},{"article-title":"US officials investigating suspected foreign hack of Port of Houston","year":"2021","author":"Marquardt","key":"2025110900555083200_bib37"},{"year":"2022","key":"2025110900555083200_bib38","article-title":"APT attacks on industrial companies in H2 2021"},{"article-title":"Port of Houston was hit by an alleged state-sponsored attack","year":"2021","author":"Paganini","key":"2025110900555083200_bib39"},{"volume-title":"The influence of sea power upon history: 1660\u20131783","year":"1890","author":"Mahan","key":"2025110900555083200_bib40"},{"volume-title":"Some Principles of Maritime Strategy","year":"1911","author":"Corbett","key":"2025110900555083200_bib41"},{"key":"2025110900555083200_bib42","first-page":"1","article-title":"Seapower: a guide for the twenty-first century","author":"Till","year":"2013"},{"volume-title":"Red star over the pacific: China\u2019s rise and the challenge to U.S. Maritime Strategy","year":"2010","author":"Holmes","key":"2025110900555083200_bib43"},{"volume-title":"The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics","year":"2020","author":"Buchanan","key":"2025110900555083200_bib44"},{"article-title":"The minimum elements for a Software Bill of Materials (SBOM)","year":"2021","author":"National Telecommunications and Information Administration (NTIA)","key":"2025110900555083200_bib45"},{"article-title":"NIST SP 800-161 Rev. 1, Cybersecurity supply chain risk management practices for systems and organizations","year":"2022","author":"National Institute of Standards and Technology (NIST)","key":"2025110900555083200_bib46"},{"article-title":"US Coast Guard releases final rule on maritime security and cybersecurity standards","year":"2023","author":"Industrial Cyber Staff","key":"2025110900555083200_bib47"},{"article-title":"Cybersecurity in the marine transportation system","year":"2025","author":"U. S. Coast Guard, Department of Homeland Security","key":"2025110900555083200_bib48"},{"article-title":"2023 Dragos ICS\/OT cybersecurity year in review","year":"2024","author":"Dragos","key":"2025110900555083200_bib49"},{"article-title":"Guidelines on maritime cyber risk management","year":"2017","author":"International Maritime Organization (IMO)","key":"2025110900555083200_bib50"},{"article-title":"Report of the group of governmental experts on advancing responsible state behaviour in cyberspace in the context of international security","year":"2021","author":"United Nations General Assembly","key":"2025110900555083200_bib51"},{"key":"2025110900555083200_bib52","doi-asserted-by":"crossref","DOI":"10.1017\/9781316822524","volume-title":"Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations","author":"Schmitt","year":"2017"},{"article-title":"NATO 2022 Strategic Concept","year":"2022","author":"NATO","key":"2025110900555083200_bib53"},{"article-title":"Alert (AA21-259A): Threat Actors Exploiting ManageEngine ADSelfService Plus Vulnerability","year":"2021","author":"CISA","key":"2025110900555083200_bib54"},{"key":"2025110900555083200_bib55","doi-asserted-by":"crossref","first-page":"1844","DOI":"10.3390\/jmse12101844","article-title":"A critical review of the challenges in maritime cybersecurity training and compliance","volume":"12","author":"Chupkemi","year":"2024","journal-title":"J Mar Sci Eng"},{"volume-title":"Sea power: the history and geopolitics of the World\u2019s Oceans","year":"2017","author":"Stavridis","key":"2025110900555083200_bib56"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf031\/65235155\/tyaf031.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf031\/65235155\/tyaf031.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T05:56:03Z","timestamp":1762667763000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf031\/8315889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf031","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf031"}}