Maritime Irregular Warfare
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Maritime Terrorism
1 Maritime terrorism naval bases, offshore oil and gas facilities, other By Emilio Bonagiunta, Maritime Security Consultant critical infrastructure, or the maritime trade itself.ii Operations of this kind are reportedly part of Al-Qaeda's maritime strategy.iii Past here are two main forms in which attacks against oil facilities and tankers in Saudi terrorist groups benefit from the Arabia and Yemen demonstrate that terrorist T vastness and lawlessness of the sea: by networks in the region have ambitions to conducting attacks against sea-based targets and severely disrupt energy supplies from the by using the sea to transport weapons, militants Arabian Peninsula. A successful series of large- and other support means from one place to the scale attacks against the oil industry would have i other. In both cases, the low level of control and tremendous impacts on international energy law enforcement provides a beneficial markets and the global economy. It is from this environment for preparation and conduction perspective that Al-Qaeda poses a serious threat terrorist operations in the maritime domain, against maritime trade.iv unthinkable of on the ground. Yet, the fact that these fears have not Along with this, offshore assets and critical materialized can be attributed to a variety of infrastructure on the coast are seen as high-value factors: greater vigilance and measures adopted targets for terrorist groups. Operations against by sea-users and maritime security providers, the USS Cole (2000) and the tanker Limburg lack of confidence by terrorist groups in the (2002), attributed to Al-Qaeda, are good success of major attacks against sea-based examples of maritime terrorism in the Arabian targets due to insufficient expertise and Peninsula, where small crafts laden with experienced militants for conducting such explosives have proven successful in causing operations. -
Floating Armories: a Legal Grey Area in Arms Trade and the Law of the Sea
FLOATING ARMORIES: A LEGAL GREY AREA IN ARMS TRADE AND THE LAW OF THE SEA BY ALEXIS WILPON* ABSTRACT In response to maritime piracy concerns, shippers often hire armed guards to protect their ships. However, due to national and international laws regarding arms trade, ships are often unable to dock in foreign ports with weapons and ammunition. As a response, floating armories operate as weapons and ammuni tion storage facilities in international waters. By operating solely in interna tional waters, floating armories avoid national and international laws regard ing arms trade. However, there is a significant lack of regulations governing floating armories, and this leads to serious safety concerns including lack of standardized weapon storage, lack of records documenting the transfer of weapons and ammunitions, and lack of regulation from flags of convenience. Further, there is no publically available registry of floating armories and so the number of floating armories operating alongside the quantity of arms and ammunition on board is unknown. This Note suggests several solutions that will increase the transparency and safety of floating armories. Such solutions include requirements that floating armory operators register their vessels only to states in which a legitimate relationship exists, minimum standards that operators must follow, and the creation of a publically available registry. Finally, it concludes by providing alternative mechanisms by which states may exercise jurisdiction over foreign vessels operating in the High Seas. I. INTRODUCTION .................................... 874 II. THE PROBLEM OF MARITIME PIRACY ..................... 877 III. HOW FLOATING ARMORIES OPERATE..................... 878 IV. FLOATING ARMORIES AND THE LEGAL GRAY AREA............ 880 A. The Lack of Laws and Regulations ................. -
2014 Ships and Submarines of the United States Navy
AIRCRAFT CARRIER DDG 1000 AMPHIBIOUS Multi-Purpose Aircraft Carrier (Nuclear-Propulsion) THE U.S. NAvy’s next-GENERATION MULTI-MISSION DESTROYER Amphibious Assault Ship Gerald R. Ford Class CVN Tarawa Class LHA Gerald R. Ford CVN-78 USS Peleliu LHA-5 John F. Kennedy CVN-79 Enterprise CVN-80 Nimitz Class CVN Wasp Class LHD USS Wasp LHD-1 USS Bataan LHD-5 USS Nimitz CVN-68 USS Abraham Lincoln CVN-72 USS Harry S. Truman CVN-75 USS Essex LHD-2 USS Bonhomme Richard LHD-6 USS Dwight D. Eisenhower CVN-69 USS George Washington CVN-73 USS Ronald Reagan CVN-76 USS Kearsarge LHD-3 USS Iwo Jima LHD-7 USS Carl Vinson CVN-70 USS John C. Stennis CVN-74 USS George H.W. Bush CVN-77 USS Boxer LHD-4 USS Makin Island LHD-8 USS Theodore Roosevelt CVN-71 SUBMARINE Submarine (Nuclear-Powered) America Class LHA America LHA-6 SURFACE COMBATANT Los Angeles Class SSN Tripoli LHA-7 USS Bremerton SSN-698 USS Pittsburgh SSN-720 USS Albany SSN-753 USS Santa Fe SSN-763 Guided Missile Cruiser USS Jacksonville SSN-699 USS Chicago SSN-721 USS Topeka SSN-754 USS Boise SSN-764 USS Dallas SSN-700 USS Key West SSN-722 USS Scranton SSN-756 USS Montpelier SSN-765 USS La Jolla SSN-701 USS Oklahoma City SSN-723 USS Alexandria SSN-757 USS Charlotte SSN-766 Ticonderoga Class CG USS City of Corpus Christi SSN-705 USS Louisville SSN-724 USS Asheville SSN-758 USS Hampton SSN-767 USS Albuquerque SSN-706 USS Helena SSN-725 USS Jefferson City SSN-759 USS Hartford SSN-768 USS Bunker Hill CG-52 USS Princeton CG-59 USS Gettysburg CG-64 USS Lake Erie CG-70 USS San Francisco SSN-711 USS Newport News SSN-750 USS Annapolis SSN-760 USS Toledo SSN-769 USS Mobile Bay CG-53 USS Normandy CG-60 USS Chosin CG-65 USS Cape St. -
Port Security
S. HRG. 107–593 PORT SECURITY HEARING BEFORE A SUBCOMMITTEE OF THE COMMITTEE ON APPROPRIATIONS UNITED STATES SENATE ONE HUNDRED SEVENTH CONGRESS SECOND SESSION SPECIAL HEARING APRIL 4, 2002—SEATTLE, WA Printed for the use of the Committees on Appropriations ( Available via the World Wide Web: http://www.access.gpo.gov/congress/senate U.S. GOVERNMENT PRINTING OFFICE 81–047 PDF WASHINGTON : 2002 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 VerDate 21-JUN-2000 10:09 Oct 23, 2002 Jkt 081047 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 U:\12HEAR\2003\081047.XXX CHERYLM PsN: CHERYLM COMMITTEE ON APPROPRIATIONS ROBERT C. BYRD, West Virginia, Chairman DANIEL K. INOUYE, Hawaii TED STEVENS, Alaska ERNEST F. HOLLINGS, South Carolina THAD COCHRAN, Mississippi PATRICK J. LEAHY, Vermont ARLEN SPECTER, Pennsylvania TOM HARKIN, Iowa PETE V. DOMENICI, New Mexico BARBARA A. MIKULSKI, Maryland CHRISTOPHER S. BOND, Missouri HARRY REID, Nevada MITCH MCCONNELL, Kentucky HERB KOHL, Wisconsin CONRAD BURNS, Montana PATTY MURRAY, Washington RICHARD C. SHELBY, Alabama BYRON L. DORGAN, North Dakota JUDD GREGG, New Hampshire DIANNE FEINSTEIN, California ROBERT F. BENNETT, Utah RICHARD J. DURBIN, Illinois BEN NIGHTHORSE CAMPBELL, Colorado TIM JOHNSON, South Dakota LARRY CRAIG, Idaho MARY L. LANDRIEU, Louisiana KAY BAILEY HUTCHISON, Texas JACK REED, Rhode Island MIKE DEWINE, Ohio TERRENCE E. SAUVAIN, Staff Director CHARLES KIEFFER, Deputy Staff Director STEVEN J. CORTESE, Minority Staff Director LISA SUTHERLAND, Minority Deputy Staff Director SUBCOMMITTEE ON TRANSPORTATION AND RELATED AGENCIES PATTY MURRAY, Washington, Chairman ROBERT C. -
CHAP 9 Sri Lanka
79o 00' 79o 30' 80o 00' 80o 30' 81o 00' 81o 30' 82o 00' Kankesanturai Point Pedro A I Karaitivu I. Jana D Peninsula N Kayts Jana SRI LANKA I Palk Strait National capital Ja na Elephant Pass Punkudutivu I. Lag Provincial capital oon Devipattinam Delft I. Town, village Palk Bay Kilinochchi Provincial boundary - Puthukkudiyiruppu Nanthi Kadal Main road Rameswaram Iranaitivu Is. Mullaittivu Secondary road Pamban I. Ferry Vellankulam Dhanushkodi Talaimannar Manjulam Nayaru Lagoon Railroad A da m' Airport s Bridge NORTHERN Nedunkeni 9o 00' Kokkilai Lagoon Mannar I. Mannar Puliyankulam Pulmoddai Madhu Road Bay of Bengal Gulf of Mannar Silavatturai Vavuniya Nilaveli Pankulam Kebitigollewa Trincomalee Horuwupotana r Bay Medawachchiya diya A d o o o 8 30' ru 8 30' v K i A Karaitivu I. ru Hamillewa n a Mutur Y Pomparippu Anuradhapura Kantalai n o NORTH CENTRAL Kalpitiya o g Maragahewa a Kathiraveli L Kal m a Oy a a l a t t Puttalam Kekirawa Habarane u 8o 00' P Galgamuwa 8o 00' NORTH Polonnaruwa Dambula Valachchenai Anamaduwa a y O Mundal Maho a Chenkaladi Lake r u WESTERN d Batticaloa Naula a M uru ed D Ganewatta a EASTERN g n Madura Oya a G Reservoir Chilaw i l Maha Oya o Kurunegala e o 7 30' w 7 30' Matale a Paddiruppu h Kuliyapitiya a CENTRAL M Kehelula Kalmunai Pannala Kandy Mahiyangana Uhana Randenigale ya Amparai a O a Mah Reservoir y Negombo Kegalla O Gal Tirrukkovil Negombo Victoria Falls Reservoir Bibile Senanayake Lagoon Gampaha Samudra Ja-Ela o a Nuwara Badulla o 7 00' ng 7 00' Kelan a Avissawella Eliya Colombo i G Sri Jayewardenepura -
The American Legion [Volume 135, No. 3 (September 1993)]
I THE AMERICAN \ %%>^^ Legiom^ FOR GOD AND COUNTRY September 1993 Two Dollars HOME SCHflOUHB, Going To School By Staying Home It's Warm, it's Hefty, it's Handsome and it's 100% Acrylic Easy Care! Grey Use this coupon and grab yourself a couple today! Cardigan Sweater Q5 2 for 49.50 3 for 74.00 HAB 24 4 for 98.50 lOOFainiew HABAND COMPANY Prospect Park 100 Fairview Ave., Prospect Park, N J 07530 Send 07530 I Regular Sizes: S(34-36) M{38-40) L(42-44) XL(46-4£ sweaters, *Big Men Sizes: Add $4 each for cable knit I Handsome have enclosed 2XL(50-52) 3XL(54-56) 4XL(58-60) both front and back WHAT HOW is an expensive fealLir purchase price plus $3.50 7A7-72C SIZE? MANY? an amazing low pi le Burgundy postage and handling. A ECRU Check Enclosed B GREY D BURGUNDY 1 CARD # Name . Mail Addr ;ss ' Apt. # City 1 State Zip The Magazine for a Strong America Vol. 135, No. 3 ARTICLES September 1993 RETiraNG GRADUALLY By Gordon Williams 18 VA RESEARCH: WE ALL SeiEHT AWxnt^ VA research has improvedAmericans' health, budget cuts now threaten thisprogram. By Ken Schamberg 22 TO SCHOOL BY STAYING AT I More and more parents believe they can succeed at home where schools havefailed. By Deidre Sullivan 25 To dramatize the dangers, activists have been playingfast and loose with the numbers. By Steve Salerno 28 THE GHOST PLANE FROM MINDANAO You may have the information to help solve this WWII mystery. FAMILY TIES: LONGER UVES Centenarians reveal the secret oftheir long and healthy lives. -
Alite's Archives: Bro Dadcagting from Ok the Outlaw Empirek
Big Changes In Amateur Service Rules On Page 65 D08635 APRIL 2000 4IP A Loo How WBT Folght Soviet Propaganda Alite's Archives: Bro_dadcagting From ok The Outlaw Empirek, cene, The Pirate's Den, I Got Started, And Much More! CARRY THE WORLD '''''',--4000.111111111P WITH YOU! s. r. Continuous Coverage: 145 100 kHz to 1299.99995* MHz! 1.i.1f:s1711711.:: 'Cellular telephone frequencies are docked and cannot be restored. VR-500 RECEIVER All Mode Reception: COMMUNICATIONS FM, Wide -FM, USB LSB, CW, and AM! Huge Memory Capacity: 1091 Channels! B.W P.SET Ultra Compact Size! STEP 58 mm x 24 mm x 95 mm SCHOCN MW/MC 220 g including Antenna / Battery) MEMO 1ozCP.. CD MODE PW Simulated display / keypad Illumination SCH/rmS . SW/SC S 40SET/NAMEIrk arso LAMP ' ATT Actual Size CODW CIO421,et Features *Multiple Power Source Capability Huge 1091-ch Memory System *Convenience Features *Direct Keypad Frequency Entry With Search & Scan 1 MHz Fast Steps Front-end 20 dB *Large High -Output Speaker Regular Memories 11000 ch) Attenuator RF Squelch 'Power On / Polycarbonate Case Search Band Memories10 ch) Power Off Timers Adjustable *Real -Time 60-ch* Band Scope Preset Channel Memories Battery Saver Extensive Menu `Range 6 MHz / Step 100 kHz (19 ch +10 Weather Channels` Customization Clone Capability ,',1.1F11 *Full Illumination For Dual Watch Memories (10 ch` Computer Control Display And Keypad Priority Memory (1 ch) COMMUNICATIONS RECEIVER Mb *Versatile Squelch / Smart SearchTM Memories as Monitor Key (11/21/31/41 ch) Ct--2 VR-500 *Convenient "Preset" All -Mode Wideband Receiver OD CD0 0 ®m Operating Mode gg YAE SU ©1999 Yaesu USA, 17210 Edwards Road. -
Applying Traditional Military Principles to Cyber Warfare
2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1]. -
Stygian Myth: U.S. Riverine Operations Against the Guerrilla
Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1994-12 Stygian myth: U.S. riverine operations against the guerrilla Freitas, Mark. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/42802 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA ELECTEES "JUN 2 6 1995 THESIS STYGIAN MYTH: U.S. RIVERINE OPERATIONS AGAINST THE GUERRILLA by Mark Freitas and Braddock W. Treadway December, 1994 Thesis Advisor: Jan Breemer Second Reader: Wayne P. Hughes Approved for public release; distribution is unlimited. «jY INSPECTED 5 jyn^QlTAI^ 19950623 010 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-018 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE REPORT TYPE AND DATES COVERED December 1994 Master's Thesis TITLE AND SUBTITLE STYGIAN MYTH: U.S. RIVERINE FUNDING NUMBERS OPERATIONS AGAINST THE GUERRILLA 6. AUTHOR(S) Mark Freitas and Braddock W. Treadway 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) PERFORMING Naval Postgraduate School ORGANIZATION Monterey CA 93943-5000 REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. -
The Drug Trade in Colombia: a Threat Assessment
DEA Resources, For Law Enforcement Officers, Intelligence Reports, The Drug Trade in Colombia | HOME | PRIVACY POLICY | CONTACT US | SITE DIRECTORY | [print friendly page] The Drug Trade in Colombia: A Threat Assessment DEA Intelligence Division This report was prepared by the South America/Caribbean Strategic Intelligence Unit (NIBC) of the Office of International Intelligence. This report reflects information through December 2001. Comments and requests for copies are welcome and may be directed to the Intelligence Production Unit, Intelligence Division, DEA Headquarters, at (202) 307-8726. March 2002 DEA-02006 CONTENTS MESSAGE BY THE ASSISTANT THE HEROIN TRADE IN DRUG PRICES AND DRUG THE COLOMBIAN COLOMBIA’S ADMINISTRATOR FOR COLOMBIA ABUSE IN COLOMBIA GOVERNMENT COUNTERDRUG INTELLIGENCE STRATEGY IN A LEGAL ● Introduction: The ● Drug Prices ● The Formation of the CONTEXT EXECUTIVE SUMMARY Development of ● Drug Abuse Modern State of the Heroin Trade Colombia ● Counterdrug ● Cocaine in Colombia DRUG RELATED MONEY ● Colombian Impact of ● Colombia’s 1991 ● Heroin Opium-Poppy LAUNDERING AND Government Institutions Involved in Constitution ● Marijuana Cultivation CHEMICAL DIVERSION ● Opium-Poppy the Counterdrug ● Extradition ● Synthetic Drugs Eradication Arena ● Sentencing Codes ● Money Laundering ● Drug-Related Money ● Opiate Production ● The Office of the ● Money Laundering ● Chemical Diversion Laundering ● Opiate Laboratory President Laws ● Insurgents and Illegal “Self- ● Chemical Diversion Operations in ● The Ministry of ● Asset Seizure -
LWP-G 7-5-1, Musorian Armed Forces – Organisations and Equipment, 2005 AL1
Contents The information given in this document is not to be communicated, either directly or indirectly, to the media or any person not authorised to receive it. AUSTRALIAN ARMY LAND WARFARE PROCEDURES - GENERAL LWP-G 7-5-1 MUSORIAN ARMED FORCES – ORGANISATIONS AND EQUIPMENT This publication supersedes Land Warfare Doctrine 7-5-2, Musorian Armed Forces Aide-Memoire, 2001. This publication is a valuable item and has been printed in a limited production run. Units are responsible for the strict control of issues and returns. Contents Contents Contents Contents iii AUSTRALIAN ARMY LAND WARFARE PROCEDURES - GENERAL LWP-G 7-5-1 MUSORIAN ARMED FORCES – ORGANISATIONS AND EQUIPMENT AMENDMENT LIST NUMBER 1 © Commonwealth of Australia (Australian Army) 2005 28 February 2008 Issued by command of Chief of Army C. Karotam Lieutenant Colonel Commandant Defence Intelligence Training Centre LWP-G 7-5-1, Musorian Armed Forces – Organisations and Equipment, 2005 AL1 Contents Contents iv CONDITIONS OF RELEASE 1. This document contains Australian Defence information. All Defence information, whether classified or not, is protected from unauthorised disclosure under the Crimes Act 1914 (Commonwealth). Defence information may only be released in accordance with Defence Security Manual and/or DI(G) OPS 13-4 as appropriate. 2. When this information is supplied to Commonwealth or foreign governments, the recipient is to ensure that it will: a. be safeguarded under rules designed to give it the equivalent standard of security to that maintained for it by Australia; b. not be released to a third country without Australian consent; c. not be used for other than military purposes; d. -
India Architecture Guide 2017
WHAT Architect WHERE Notes Zone 1: Zanskar Geologically, the Zanskar Range is part of the Tethys Himalaya, an approximately 100-km-wide synclinorium. Buddhism regained its influence Lungnak Valley over Zanskar in the 8th century when Tibet was also converted to this ***** Zanskar Desert ཟངས་དཀར་ religion. Between the 10th and 11th centuries, two Royal Houses were founded in Zanskar, and the monasteries of Karsha and Phugtal were built. Don't miss the Phugtal Monastery in south-east Zanskar. Zone 2: Punjab Built in 1577 as the holiest Gurdwara of Sikhism. The fifth Sikh Guru, Golden Temple Rd, Guru Arjan, designed the Harmandir Sahib (Golden Temple) to be built in Atta Mandi, Katra the centre of this holy tank. The construction of Harmandir Sahib was intended to build a place of worship for men and women from all walks *** Golden Temple Guru Ram Das Ahluwalia, Amritsar, Punjab 143006, India of life and all religions to come and worship God equally. The four entrances (representing the four directions) to get into the Harmandir ਹਰਿਮੰਦਿ ਸਾਰਹਬ Sahib also symbolise the openness of the Sikhs towards all people and religions. Mon-Sun (3-22) Near Qila Built in 2011 as a museum of Sikhism, a monotheistic religion originated Anandgarh Sahib, in the Punjab region. Sikhism emphasizes simran (meditation on the Sri Dasmesh words of the Guru Granth Sahib), that can be expressed musically *** Virasat-e-Khalsa Moshe Safdie Academy Road through kirtan or internally through Nam Japo (repeat God's name) as ਰਿਿਾਸਤ-ਏ-ਖਾਲਸਾ a means to feel God's presence.