TASK FORCE 2012 the Challenge of Piracy Off the Horn of Africa

Total Page:16

File Type:pdf, Size:1020Kb

TASK FORCE 2012 the Challenge of Piracy Off the Horn of Africa TASK FORCE 2012 The Challenge of Piracy off the Horn of Africa University of Washington | Henry M. Jackson School of International Studies Cover Photograph: A member of the HMS MONMOUTH force protection team providing cover during the boarding of the merchant vessel MV CARAVOS HORIZON. Image used in accordance with UK’s Crown Copyright regulations. Image captured 08/12/2011 by LA(Phot) Stuart Hill / MOD - Crown Copyright. Retrieved from www.combinedmaritimeforces.com. All trademarks mentioned in this report remain the property of their owners. Th eir inclusion in this report should in no way be taken as an endorsement of this report or its conclusions by the trademark owners. All maps included in this report were created by the Task Force, based off the open source Wikimedia Commons World Map “BlankMap-World6.svg” dated 14 February 2012. Printed at the University of Washington in Seattle ii The Henry M. Jackson School of International Studies University of Washington, Seattle Task Force Report 2012 Th e Challenge of Piracy off the Horn of Africa: U.S. Policy in Dealing With Criminal Elements and Dangerous Non-State Actors Faculty Advisor: Frederick Michael Lorenz, JD, LLM Senior Lecturer, Jackson School of International Studies University of Washington, Seattle Evaluator: Donna L. Hopkins Coordinator for Counter Piracy and Maritime Security, Bureau of Political Military Aff airs U.S. Department of State Task Force: Natalie Block (Editor) H. Jacqueline Brehmer Ashley Bullock Steven Chang Brittany Davis-Roberti Karl Eckhardt Luke Eden Zachary Gerber Lauren Graves David La Boon Seung Hee Lee Erika Maskal (Editor) Emily Stromme Nacha [Poi] Udomsrirungruang Andrijana Valladares Jeff Wheeler Report designed by Luke Eden. Body typeset in Minion Pro. Maps and fi gures typeset in Miso. iii Th e Task Force would like to thank Frederick Michael Lorenz and Donna L. Hopkins for making this report possible. Th e Task Force would also like to thank the Hon. Admiral Joseph Sestak (Ret.), Casey Kuhlman, Wayne Miller, the NATO Civil-Military Fusion Center, Worldwide Somali Students and Professionals, and the State Department Offi ce of Counter Piracy and Maritime Security for their contributions. iv ACRONYMS Acronyms African Mission in Somalia (AMI) African Union Mission in Somalia (AMISOM) Electronic Intelligence (ELINT) Ahlu Sunna Waljamaca (ASWJ) European Union Naval Force (EUNAVFOR) AMISOM Troop Contributing Country (TCC) Exclusive Economic Zone (EEZ) Anti-Money Laundering (AML) Area of Responsibility (AOR) Federal Bureau of Investigation (FBI) Automatic Identifi cation System (AIS) Financial Action Task Force (FATF) Financial Intelligence Unit (FIU) Best Management Practices (BMP) Forward Looking Infrared (FLIR) Cash For Work (CFW) Global Children Organization (GCO) Cellphone Exploitation (CELLEX) Government Accountability Offi ce (GAO) Central Intelligence Agency (CIA) Guided Missile Destroyer (DDG) Civil/Military Operations Center (CMOC) Guided Missile Frigate (FFG) Closed Circuit TV (CCTV) Coast Guard Operations Group (CGOG) High Risk Area (HRA) Combined Joint Intelligence Operations Center Horn of Africa (HOA) (CJIOC) Human Intelligence (HUMINT) Combined Joint Operations Center (CJOC) Human Terrain System (HTS) Combined Joint Task Force Horn of Africa (CJTF- Human Terrain Team (HTT) HOA) Combined Joint Task Force (CJTF) Illegal, Unreported and Unregulated Fishing (IUU Combined Joint Task Force Maritime Component Fishing) (CJTFMC) Image Intelligence (IMINT) Combined Joint Task Force Maritime Component Integrated Command Structure (ICS) Operations Group Commander (CJTFMCOGC) Intelligence Community (IC) Combined Joint Task Force Maritime Component Intelligence, Surveillance and Reconnaissance (ISR) Operations Group Deputy Commander International Code of Conduct for Private Security (CJTFMCOGDC) Service Providers (ICoC) Combined Maritime Forces (CMF) International Committee for the Red Cross (ICRC) Combined Task Force (CTF) International Criminal Tribunal for Rwanda Combined Task Force 151 (CTF-151) (ICTR) Command and Control (C2) International Crisis Group (ICG) Command Naval Fift h Fleet (COMNAVFTHFLT) International Maritime Bureau (IMB) Command, Control, Communications, Computers, International Maritime Organization (IMO) Intelligence, Surveillance, Reconnaissance International Standardization Agreements (ISA) (C4ISR) Internationally Recommended Transit Corridor Commander United States Naval Central (IRTC) Command (COMNAVCENTCOM) Islamic Courts Union (ICU) Commander, Combined Joint Task Force (CCJTF) Common Operating Picture (COP) Joint Intelligence Operations Center (JIOC) Confi dential Informant (CI) Joint Non-Lethal Weapons Directorate (JNLWD) Congressional Budget Offi ce (CBO) Joint Special Operations Command (JSOC) Contact Group on Piracy off the Coast of Somalia Joint Task Force (JTF) (CGPCS) Counter-piracy Coordination Center (CPCC) Kenyan Shippers Council (KSC) Kidnap and Ransom (K&R) Deputy Commander, Combined Joint Task Force (DCCJTF) Lead-Nation Command Structure (LNCS) U.K. Department For International Development Line-of-sight (LOS) (DFID) Littoral Combat Vessels (LCS) DOT Maritime Administration (USDOTMA) Long-range acoustic device (LRAD) v Th e Challenge of Piracy off the Horn of Africa Standing NATO Maritime Group 1 (SNMG 1) Marine Security Center Horn of Africa (MSCHOA) Standing NATO Maritime Group 2 (SNMG 2) Maritime Asset Security and Training (MAST) Standing Rules of Engagement (SROE) Maritime Domain Awareness (MDA) Marine Stewardship Council (MSC) Task Force (TF) Maritime Security Operations (MSO) Transitional Federal Government (TFG) Memorandum of Understanding (MOU) Merchant Maritime Warfare Centre (MMWC) United Kingdom Maritime Trade Operations Ministry of Human Rights (MOHR) (UKMTO) United Nations Children’s Fund (UNICEF) National Geospatial-Intelligence Agency (NGA) United Nations Convention on the Laws of the Sea National Organization for Defending Rights and (UNCLOS) Freedom (HOOD) United Nations Convention on the Suppression National Reconnaissance Offi ce (NRO) of Unlawful Acts Against the Safety of Maritime National Security Council (NSC) Navigation (SUA Convention) Navigation (SUA Convention) United Nations Development Program (UNDP) Network Centric Warfare (NCW) United Nations Development Programme (UNDP) Network Intelligence (NETINT) United Nations Offi ce on Drugs and Crime North Atlantic Treaty Organization (NATO) (UNODC) Nuclear Aircraft Carrier (CVN) United Nations Political Offi ce for Somalia (UNPOS) Offi ce of Foreign Disaster Assistance (OFDA) United Nations Security Council (UNSC) Offi ce of Naval Intelligence (ONI) United States Africa Command (AFCOM) Offi ce of the Director of National Intelligence United States Central Command (CENTCOM) (ODNI) United States Coast Guard (USCG) Ogaden National Liberation Front (ONLF) United States Department of Defense (DoD) Open Source Intelligence (OSINT) United States Department of Homeland Security (DHS) Parallel Command Structure (PCS) United States Department of Justice (DoJ) Private Maritime Security Company (PMSC) United States Department of State (DoS) Private Military Contractors (PMC) United States Department of Transportation Private Security Contractor (PSC) (USDOT) Privately Contracted Armed Security Personnel United States Dollars (USD) (PCASP) United States Government (USG) Public International Law Policy Group (PILPG) United States Navy (USN) Public Private Partnership (PPP) United States Navy Maritime Liaison Offi ce Puntland Maritime Police Force (PMPF) (MARLO) Unmanned Aerial Systems (UAS). Radar Cross Section (RCS) Unmanned Aerial Vehicles (UAV) Recognized Maritime Picture (RMP) Regional Agreement on Combating Piracy and Vehicle Mounted Active Defense System Armed Robbery (ReCAPP) (V-MADS) Rocket-Propelled Grenade (RPG) Visit Board Search and Seizure (VBSS) Rules of Engagement (ROE) Voice of America (VOA) Safe Muster Point (SMP) Worldwide Somali Students & Professionals Security Association for the Maritime Industry (WSSP) (SAMI) Shared Awareness and Deconfl iction (SHADE) Ship Protection Measures (SPM) Ship Security Alert Systems (SSAS) Ship Security Assessment (SSA) Ship Security Plan (SSP) Signals Intelligence (SIGINT) Small Tactical Unmanned Aerial System (STUAS) Special Forces Operations Group (SFOG) Special Warfare Combat Crew (SWCC) Standard Operating Procedure (SOP) vi EXECUTIVE SUMMARY Executive Summary: Th e Challenge of Piracy off the Horn of Africa By Natalie Block and Erika Maskal In the failed state of Somalia, piracy is increasing at an alarming rate, impacting all nations that engage in trade or travel in the region. In 2011, Somali pirates attacked 122 vessels and successfully hijacked 28. Since the problem of piracy fi rst escalated in 2008, thousands of hostages have been taken, including a number of American citizens. Th ese hostages have oft en suff ered systematic abuse and torture, and have on some occasions been used as hu- man shields. In the last year alone, four American hostages were murdered by their captors. Although the economic cost of piracy is comparatively low for the U.S., it is imperative to address the issue before the economic and human costs of piracy become overwhelming. From 2010 to 2011, total ransom payouts to Somali pirates increased from $111 million USD to $160 million USD, raising the global cost of piracy in 2011 to approximately $6.75 billion USD. In response to the three international task forces protecting ships in the Gulf of Aden, pirates have expanded their attack areas and are
Recommended publications
  • An Analysis of the Afar-Somali Conflict in Ethiopia and Djibouti
    Regional Dynamics of Inter-ethnic Conflicts in the Horn of Africa: An Analysis of the Afar-Somali Conflict in Ethiopia and Djibouti DISSERTATION ZUR ERLANGUNG DER GRADES DES DOKTORS DER PHILOSOPHIE DER UNIVERSTÄT HAMBURG VORGELEGT VON YASIN MOHAMMED YASIN from Assab, Ethiopia HAMBURG 2010 ii Regional Dynamics of Inter-ethnic Conflicts in the Horn of Africa: An Analysis of the Afar-Somali Conflict in Ethiopia and Djibouti by Yasin Mohammed Yasin Submitted in partial fulfilment of the requirements for the degree PHILOSOPHIAE DOCTOR (POLITICAL SCIENCE) in the FACULITY OF BUSINESS, ECONOMICS AND SOCIAL SCIENCES at the UNIVERSITY OF HAMBURG Supervisors Prof. Dr. Cord Jakobeit Prof. Dr. Rainer Tetzlaff HAMBURG 15 December 2010 iii Acknowledgments First and foremost, I would like to thank my doctoral fathers Prof. Dr. Cord Jakobeit and Prof. Dr. Rainer Tetzlaff for their critical comments and kindly encouragement that made it possible for me to complete this PhD project. Particularly, Prof. Jakobeit’s invaluable assistance whenever I needed and his academic follow-up enabled me to carry out the work successfully. I therefore ask Prof. Dr. Cord Jakobeit to accept my sincere thanks. I am also grateful to Prof. Dr. Klaus Mummenhoff and the association, Verein zur Förderung äthiopischer Schüler und Studenten e. V., Osnabruck , for the enthusiastic morale and financial support offered to me in my stay in Hamburg as well as during routine travels between Addis and Hamburg. I also owe much to Dr. Wolbert Smidt for his friendly and academic guidance throughout the research and writing of this dissertation. Special thanks are reserved to the Department of Social Sciences at the University of Hamburg and the German Institute for Global and Area Studies (GIGA) that provided me comfortable environment during my research work in Hamburg.
    [Show full text]
  • The Somali Maritime Space
    LEA D A U THORS: C urtis Bell Ben L a wellin CONTRIB UTI NG AU THORS: A l e x andr a A mling J a y Benso n S asha Ego r o v a Joh n Filitz Maisie P igeon P aige Roberts OEF Research, Oceans Beyond Piracy, and Secure Fisheries are programs of One Earth Future http://dx.doi.org/10.18289/OEF.2017.015 ACKNOWLEDGMENTS With thanks to John R. Hoopes IV for data analysis and plotting, and to many others who offered valuable feedback on the content, including John Steed, Victor Odundo Owuor, Gregory Clough, Jérôme Michelet, Alasdair Walton, and many others who wish to remain unnamed. Graphic design and layout is by Andrea Kuenker and Timothy Schommer of One Earth Future. © 2017 One Earth Future Stable Seas: Somali Waters | i TABLE OF CONTENTS STABLE SEAS: SOMALI WATERS .......................................................................................................1 THE SOMALI MARITIME SPACE ........................................................................................................2 COASTAL GOVERNANCE.....................................................................................................................5 SOMALI EFFORTS TO PROVIDE MARITIME GOVERNANCE ..............................................8 INTERNATIONAL EFFORTS TO PROVIDE MARITIME GOVERNANCE ..........................11 MARITIME PIRACY AND TERRORISM ...........................................................................................13 ILLEGAL, UNREPORTED, AND UNREGULATED FISHING ....................................................17 ARMS TRAFFICKING
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • Historical Volcanism and the State of Stress in the East African Rift System
    Historical volcanism and the state of stress in the East African Rift System Article Accepted Version Open Access Wadge, G., Biggs, J., Lloyd, R. and Kendall, J.-M. (2016) Historical volcanism and the state of stress in the East African Rift System. Frontiers in Earth Science, 4. 86. ISSN 2296- 6463 doi: https://doi.org/10.3389/feart.2016.00086 Available at http://centaur.reading.ac.uk/66786/ It is advisable to refer to the publisher’s version if you intend to cite from the work. See Guidance on citing . To link to this article DOI: http://dx.doi.org/10.3389/feart.2016.00086 Publisher: Frontiers media All outputs in CentAUR are protected by Intellectual Property Rights law, including copyright law. Copyright and IPR is retained by the creators or other copyright holders. Terms and conditions for use of this material are defined in the End User Agreement . www.reading.ac.uk/centaur CentAUR Central Archive at the University of Reading Reading’s research outputs online 1 Historical volcanism and the state of stress in the East African 2 Rift System 3 4 5 G. Wadge1*, J. Biggs2, R. Lloyd2, J-M. Kendall2 6 7 8 1.COMET, Department of Meteorology, University of Reading, Reading, UK 9 2.COMET, School of Earth Sciences, University of Bristol, Bristol, UK 10 11 * [email protected] 12 13 14 Keywords: crustal stress, historical eruptions, East African Rift, oblique motion, 15 eruption dynamics 16 17 18 19 20 21 Abstract 22 23 Crustal extension at the East African Rift System (EARS) should, as a tectonic ideal, 24 involve a stress field in which the direction of minimum horizontal stress is 25 perpendicular to the rift.
    [Show full text]
  • Offshore-October-November-2005.Pdf
    THE MAGAZ IN E OF THE CRUIS IN G YACHT CLUB OF AUSTRALIA I OFFSHORE OCTOBER/ NOVEMB rn 2005 YACHTING I AUSTRALIA FIVE SUPER R MAXIS ERIES FOR BIG RACE New boats lining up for Rolex Sydney Hobart Yacht Race HAMILTON ISLAND& HOG'S BREATH Northern regattas action t\/OLVO OCEAN RACE Aussie entry gets ready for departure The impeccable craftsmanship of Bentley Sydney's Trim and Woodwork Special ists is not solely exclusive to motor vehicles. Experience the refinement of leather or individually matched fine wood veneer trim in your yacht or cruiser. Fit your pride and joy with premium grade hide interiors in a range of colours. Choose from an extensive selection of wood veneer trims. Enjoy the luxury of Lambswool rugs, hide trimmed steering wheels, and fluted seats with piped edging, designed for style and unparalleled comfort. It's sea-faring in classic Bentley style. For further details on interior styling and craftsmanship BENTLEY contact Ken Boxall on 02 9744 51 I I. SYDNEY contents Oct/Nov 2005 IMAGES 8 FIRSTTHOUGHT Photographer Andrea Francolini's view of Sydney 38 Shining Sea framed by a crystal tube as it competes in the Hamilton Island Hahn Premium Race Week. 73 LAST THOUGHT Speed, spray and a tropical island astern. VIEWPOINT 10 ATTHE HELM CYCA Commodore Geoff Lavis recounts the many recent successes of CYCA members. 12 DOWN THE RHUMBLINE Peter Campbell reports on sponsorship and media coverage for the Rolex Sydney H obart Yacht Race. RACES & REGATTAS 13 MAGIC DRAGON TAKES GOLD A small boat, well sailed, won out against bigger boats to take victory in the 20th anniversary Gold Coast Yacht Race.
    [Show full text]
  • Country Environmental Profile for Malawi
    COMMISSION OF THE EUROPEAN COMMUNITIES EC Framework Contract EuropeAid/119860/C/SV/multi Lot 6: Environment Beneficiaries: Malawi Request for Services N°2006/122946 Country Environmental Profile for Malawi Draft Report (Mrs. B. Halle, Mr. J. Burgess) August 2006 Consortium AGRIFOR Consult Parc CREALYS, Rue L. Genonceaux 14 B - 5032 Les Isnes - Belgium Tel : + 32 81 - 71 51 00 - Fax : + 32 81 - 40 02 55 Email : [email protected] ARCA Consulting (IT) – CEFAS (GB) - CIRAD (FR) – DFS (DE) – EPRD (PL) - FORENVIRON (HU) – INYPSA (ES) – ISQ (PT) – Royal Haskoning (NL) This report is financed by the European Commission and is presented by AGRIFOR Consult for the Government of Malawi and the European Commission. It does not necessarily reflect the opinion of the Government of Malawi or the European Commission. Consortium AGRIFOR Consult 1 Table of Contents Acronyms and Abbreviations 3 1. Summary 6 1.1 State of the environment 6 1.2 Environmental policy, legislative and institutional framework 8 1.3 EU and other donor co-operation with the Country from an environmental perspective 10 1.4 Conclusions and recommendations 11 2. State of the Environment 15 2.1 Physical and biological environment 15 2.1.1 Climate, climate change and climate variability 15 2.1.2 Geology and mineral resources 16 2.1.3 Land and soils 16 2.1.4 Water (lakes, rivers, surface water, groundwater) 17 2.1.5 Ecosystems and biodiversity 19 2.1.6 Risk of natural disasters 20 2.2 Socio-economic environment 21 2.2.1 Pressures on the natural resources 21 2.2.2 Urban areas and industries 31 2.2.3 Poverty and living conditions in human settlements 35 2.3 Environment situation and trends 37 2.4 Environmental Indicators 38 3.
    [Show full text]
  • Piracy, Illicit Trade, and the Construction of Commercial
    Navigating the Atlantic World: Piracy, Illicit Trade, and the Construction of Commercial Networks, 1650-1791 Dissertation Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Graduate School of The Ohio State University by Jamie LeAnne Goodall, M.A. Graduate Program in History The Ohio State University 2016 Dissertation Committee: Margaret Newell, Advisor John Brooke David Staley Copyright by Jamie LeAnne Goodall 2016 Abstract This dissertation seeks to move pirates and their economic relationships from the social and legal margins of the Atlantic world to the center of it and integrate them into the broader history of early modern colonization and commerce. In doing so, I examine piracy and illicit activities such as smuggling and shipwrecking through a new lens. They act as a form of economic engagement that could not only be used by empires and colonies as tools of competitive international trade, but also as activities that served to fuel the developing Caribbean-Atlantic economy, in many ways allowing the plantation economy of several Caribbean-Atlantic islands to flourish. Ultimately, in places like Jamaica and Barbados, the success of the plantation economy would eventually displace the opportunistic market of piracy and related activities. Plantations rarely eradicated these economies of opportunity, though, as these islands still served as important commercial hubs: ports loaded, unloaded, and repaired ships, taverns attracted a variety of visitors, and shipwrecking became a regulated form of employment. In places like Tortuga and the Bahamas where agricultural production was not as successful, illicit activities managed to maintain a foothold much longer.
    [Show full text]
  • What We Know About Piracy
    WHAT WE KNOW ABOUT PIRACY WHAT WE KNOW ABOUT PIRACY Author: Lydelle Joubert May 2020 http://dx.doi.org/10.18289/OEF.2020.046 Design and layout by Liz Allen, One Earth Future. Cover Image: HMS Monmouth’s Boarding Team Approach a Dhow in the Arabian Gulf. Photo: Will Haigh, Defence Images. FOREWORD What We Know About Piracy is the outcome of a collaboration between the SafeSeas Network, based at the Universities of Bristol (UK) and Copenhagen (Denmark) and the Stable Seas programme of the One Earth Future Foundation. The report provides a comprehensive overview of the data available on piracy, drawing on desk-based research conducted between June 2019 and March 2020. It is the first of three reports and will be followed by similar data overviews on smuggling at sea and on maritime environmental crimes. The research forms part of the research project Transnational Organised Crime at Sea: New Evidence for Better Responses, funded by the UK Economic and Social Research Council (ESRC) as part of UK Research and Innovation’s (UKRI) Partnership for Conflict, Crime and Security Research (PaCCS) (Award Number: ES/S008810/1). Additional funding for the work was provided by the One Earth Future Foundation. Further information on the project is available at www.safeseas.net. The report was authored by Lydelle Joubert (Stable Seas). Input and comments on earlier drafts were provided by Dr Curits Bell (Stable Seas), Professor Tim Edmunds (SafeSeas/University of Bristol), Dr Scott Edwards (SafeSeas/University of Bristol), and Professor Christian Bueger (SafeSeas/University of Copenhagen). TABLE OF CONTENTS I.
    [Show full text]
  • Military Guide to Terrorism in the Twenty-First Century
    US Army TRADOC TRADOC G2 Handbook No. 1 AA MilitaryMilitary GuideGuide toto TerrorismTerrorism in the Twenty-First Century US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity - Threats Fort Leavenworth, Kansas 15 August 2007 DISTRIBUTION RESTRICTION: Approved for Public Release; Distribution Unlimited. 1 Summary of Change U.S. Army TRADOC G2 Handbook No. 1 (Version 5.0) A Military Guide to Terrorism in the Twenty-First Century Specifically, this handbook dated 15 August 2007 • Provides an information update since the DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, publication dated 10 August 2006 (Version 4.0). • References the U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • References the National Counterterrorism Center (NCTC), Reports on Terrorist Incidents - 2006, dated 30 April 2007. • Deletes Appendix A, Terrorist Threat to Combatant Commands. By country assessments are available in U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • Deletes Appendix C, Terrorist Operations and Tactics. These topics are covered in chapter 4 of the 2007 handbook. Emerging patterns and trends are addressed in chapter 5 of the 2007 handbook. • Deletes Appendix F, Weapons of Mass Destruction. See TRADOC G2 Handbook No.1.04. • Refers to updated 2007 Supplemental TRADOC G2 Handbook No.1.01, Terror Operations: Case Studies in Terror, dated 25 July 2007. • Refers to Supplemental DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, dated 10 August 2006. • Refers to Supplemental DCSINT Handbook No.
    [Show full text]
  • Lost Pirate Treasure Hunt Or Secretary Will Suffice
    August 2009 MTHE NEWSLEAINTTER OFS THAMESHEET YACHT CLUB From the Commodore Congratulations to Justin Codner who was elected to the If you have an unauthorized craft at the club I encourage Executive Committee at the General Membership meeting you to remove it ASAP so the House Committee does not on July 19th. have to take additional action. Within this MainSheet is a copy of an email from Bevan Unauthorized craft may be declared abandoned property Crighton about his resignation as House Committee Chair. and disposed of accordingly. We are grateful for Bevan’s superior performance during Please join us for Members’ Day and the Oscar Ker- his tenure. The improved appearance of our facility is a man race on Saturday, August 15th. Additional infor- reflection of the pride and diligence that Bevan takes in mation is within the MainSheet. his work. Ron Reinhart has graciously volunteered to as- As the season begins to wind down for many of you sume the responsibility of House Committee Chair and we with children returning to school at the end of August look forward to working with him. please remove your lawn chairs, beach toys and personal Members who have more than 10 years of continuous watercraft from the property. Senior membership who will become 65 years of age next Walt Pratt, Commodore year may petition the Executive Committee for Master Mariner status. The application must be submitted by Sep- tember 1st. A simple letter, or email, to the Commodore Lost Pirate Treasure Hunt or Secretary will suffice. FLAT Thanks go to Bruce Meyers for refinishing the Thames HAMMOCK rose DESERT Yacht Club Life Ring.
    [Show full text]
  • Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (Avbieds): Insurgent Use and Terrorism Potentials
    Claremont Colleges Scholarship @ Claremont CGU Faculty Publications and Research CGU Faculty Scholarship 2-2-2016 Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (AVBIEDs): Insurgent Use and Terrorism Potentials. Robert J. Bunker Claremont Graduate University Recommended Citation Bunker, R. J. (2016, February 02). Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (AVBIEDs): Insurgent Use and Terrorism Potentials. Retrieved February 02, 2016, from TRENDS Research & Advisory, http://trendsinstitution.org/daeshis- armored-vehicle-borne-improvised-explosive-devices-avbieds-insurgent-use-and-terrorism-potentials/ This Blog is brought to you for free and open access by the CGU Faculty Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CGU Faculty Publications and Research by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. Robert J. Bunker Non-Resident Fellow, Counter-Terrorism © January 2016 http://trendsinstitution.org/daeshis-armored-vehicle-borne-improvised-explosive-devices-avbieds-insurgent- use-and-terrorism-potentials/ Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (AVBIEDs): Insurgent Use and Terrorism Potentials This essay in the TRENDS terrorism futures series focuses on advanced threats related to vehicle borne improvised explosive devices (VBIEDs). It provides a threat typology of these devices with their evolution into the armored (AVBIED) variant that has now been fielded by Daesh/IS in both Iraq and Syria. A short overview of such insurgent use will be provided as well as a brief discussion of the terrorism potentials of such use if directed against the UAE, Europe, or the United States. VBIED Threat Typology Vehicle borne improvised explosive devices (VBIEDs), or simply vehicle bombs, have existed since the September 1920 deployment of ‘Buda’s Wagon’—an actual horse drawn wagon filled with explosives and scrap metal—at Wall and Broad streets in downtown Manhattan by the anarchist Mario Buda.
    [Show full text]
  • A Pirate's Life for Me
    A Pirate’s Life for Me 1| Page April 13th Kutztown University of Pennsylvania Table of Contents Staff Introductions…………………………………………………………………………………..……....3-4 Crisis Overview………………………………………………………………………………………......…...5 Pirate History………………………………..……………………………………………….…………....….6-10 Features of the Caribbean……………...…………………………………………….……………....….11-13 Dangers of the Sea………………………………………………………………………………….………..13-14 Character List…………………….…………………………………………………………….…...…….......14-24 Citations/Resources………..…………………………………………………………………..…………...25-26 Disclaimers…………….…………………………………………………………...………………………......26-27 2| Page Staff Introductions Head Crisis Staff - Sarah Hlay Dear Delegates, Hello and welcome to the “It’s A Pirate’s Life For Me” Committee! I am very excited to have all of you as a part of my committee to learn and explore the era that is the Golden Era of Piracy. My name is Sarah Hlay and I will be your Crisis Director for this committee. I am a junior at Kutztown University and this is my fourth semester as a part of Kutztown Model UN. This is my second Kumunc but first time running my own crisis. I am excited for you all to be part of my first crisis and to use creative problem solving together over the course of our committee. Pirate history is something that has always fascinated me and is a topic I enjoy learning more about each day. I’m excited to share my love and knowledge of this topic within one of the best eras that have existed. I hope to learn as much from me as I will from you. At Kutztown, I am studying Art Education and although I am not part of the Political Science department does not mean that debating and creative thinking is something I’m passionate about.
    [Show full text]