The Submersible Threat to Maritime Homeland Security

Total Page:16

File Type:pdf, Size:1020Kb

The Submersible Threat to Maritime Homeland Security View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2013-09 The submersible threat to maritime homeland security Davis, Donald B. Monterey California. Naval Postgraduate School http://hdl.handle.net/10945/37609 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS THE SUBMERSIBLE THREAT TO MARITIME HOMELAND SECURITY by Donald B. Davis September 2013 Thesis Advisor: Rodrigo Nieto-Gomez Second Reader: Alan Tubbs Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED September 2013 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS THE SUBMERSIBLE THREAT TO MARITIME HOMELAND SECURITY 6. AUTHOR(S) Donald B. Davis 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING N/A AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. government. IRB Protocol number ____N/A____. 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited A 13. ABSTRACT (maximum 200 words) Small submersible vessels have been used for years by nation states, terrorist groups, and criminal organizations to achieve operational objectives. These entities have sought to capitalize on the overriding tactical advantage of submersible technology which is stealth. For example, drug trafficking organizations in Central and South America have been routinely using self-propelled semi-submersible vessels to clandestinely transport large quantities of illicit drugs to North America. Small submersible vessels can also be nefariously used in the maritime domain to transport persons or weapons or they could be used as waterborne improvised explosive devices. Terrorists and criminals are complex adaptive adversaries and are driven to innovate when confronted with threats to their operational effectiveness. Innovation and adaption are driving these foes to leverage disruptive technology towards the development or acquisition of fully-submersible vessels. Furthermore, there is a growing population of privately owned submersibles within the U.S. that policymakers have little visibility of. Homeland security policymakers lack adequate situational awareness regarding the vulnerabilities, threats, and consequences to the maritime transportation system from the malicious use of submersibles. The core challenge for the maritime homeland security enterprise with regards to submersibles is developing effective strategies to mitigate their potential risk. 14. SUBJECT TERMS Department of Homeland Security, disruptive technology, drug trafficking 15. NUMBER OF organization, maritime domain awareness, maritime homeland security, self-propelled fully- PAGES submersible (SPFS), self-propelled semi-submersible (SPSS), small vessel security strategy (SVSS), 93 strategic risk, submarines, terrorism, United States Coast Guard, waterborne improvised explosive 16. PRICE CODE device (WBIED) 17. SECURITY 18. SECURITY 19. SECURITY 20. LIMITATION OF CLASSIFICATION OF CLASSIFICATION OF THIS CLASSIFICATION OF ABSTRACT REPORT PAGE ABSTRACT Unclassified Unclassified Unclassified UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 i THIS PAGE INTENTIONALLY LEFT BLANK ii Approved for public release; distribution is unlimited THE SUBMERSIBLE THREAT TO MARITIME HOMELAND SECURITY Donald B. Davis Lieutenant, United States Coast Guard Reserve, Port Clinton, Ohio B.S.B.A., University of Central Florida, 1990 M.S.M., Florida Institute of Technology, 1995 Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL September 2013 Author: Donald B. Davis Approved by: Rodrigo Nieto-Gomez Thesis Advisor Alan Tubbs Second Reader Mohammed Hafez, PhD Chair, Department of National Security Studies iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Small submersible vessels have been used for years by nation states, terrorist groups, and criminal organizations to achieve operational objectives. These entities have sought to capitalize on the overriding tactical advantage of submersible technology which is stealth. For example, drug trafficking organizations in Central and South America have been routinely using self-propelled semi-submersible vessels to clandestinely transport large quantities of illicit drugs to North America. Small submersible vessels can also be nefariously used in the maritime domain to transport persons or weapons or they could be used as waterborne improvised explosive devices. Terrorists and criminals are complex adaptive adversaries and are driven to innovate when confronted with threats to their operational effectiveness. Innovation and adaption are driving these foes to leverage disruptive technology towards the development or acquisition of fully-submersible vessels. Furthermore, there is a growing population of privately owned submersibles within the U.S. that policymakers have little visibility of. Homeland security policymakers lack adequate situational awareness regarding the vulnerabilities, threats, and consequences to the maritime transportation system from the malicious use of submersibles. The core challenge for the maritime homeland security enterprise with regards to submersibles is developing effective strategies to mitigate their potential risk. v THIS PAGE INTENTIONALLY LEFT BLANK vi TABLE OF CONTENTS I. INTRODUCTION........................................................................................................1 A. STATEMENT OF THE PROBLEM .............................................................1 B. BACKGROUND AND NEED ........................................................................1 C. RESEARCH QUESTION AND METHODOLOGY ...................................4 D. SIGNIFICANCE TO THE FIELD.................................................................4 E. LITERATURE REVIEW ...............................................................................5 F. LIMITATIONS ................................................................................................8 II. HISTORICAL USE OF SMALL SUBMERSIBLE VESSELS AS WEAPONS ....9 A. NATION STATE USE OF SUBMERSIBLES ..............................................9 1. Confederate States of America (CSA)................................................9 2. Japan ...................................................................................................10 3. Germany and the Battle of the Atlantic ...........................................12 4. U.S. Central Intelligence Agency (CIA) ...........................................14 5. North Korea ........................................................................................15 6. Iran ......................................................................................................18 B. TERRORIST AND INSURGENT USE OF SUBMERSIBLES ................19 1. American War of Independence .......................................................19 2. Moro Islamic Liberation Front (MILF) ..........................................20 3. Revolutionary Armed Forces of Columbia (FARC) .......................21 4. Liberation Tigers of Tamil Eelam (LTTE) ......................................22 C. DRUG TRAFFICKING ORGANIZATION’S (DTO’S) USE OF SUBMERSIBLES ..........................................................................................22 III. PRIVATELY OWNED AND OPERATED SUBMERSIBLES ............................27 A. THE PRIVATE SUBMARINE COMMUNITY .........................................27 B. REMOTELY OPERATED VEHICLE (ROV) TECHNOLOGY .............29 C. UNREGULATED VS. REGULATED VESSELS ......................................30 D. MARITIME DOMAIN AWARENESS (MDA) ..........................................32 E. PRICE AND AVAILABILITY .....................................................................33 IV. RISK: VULNERABILITIES, THREATS, & CONSEQUENCES .......................39 A. RISK ................................................................................................................40 B. VULNERABILITIES ....................................................................................41 C. THREAT .........................................................................................................41
Recommended publications
  • The Wolf Pack the Wolf Pack: a Collection of U-Boat Modelling
    The Wolf Pack The Wolf Pack: A Collection Of U-Boat Modelling Articles Page 1 The Wolf Pack Contents Introduction Articles: Kriegsmarine U-Boat Colours & Markings Type VIIC Free-Flooding Vent Patterns Type VII U-Boat Modifications The Snorting Bull Insignia U 96 & The Laughing Sawfish German U-Boat Victory Pennants U-Boat Model Kits & Accessories Super-detailing Revell’s 1/72nd Type VIIC U-Boat* Revell Type VIIC Checklist Appendices: References Photo Sources Recommended Reading Index *Super-detailing Revell’s 1/72nd Type VIIC U-Boat by Wink Grisé All other articles by Dougie Martindale All text and drawings copyright © Dougie Martindale / Wink Grisé / Accurate Model Parts, 2010 The Wolf Pack: A Collection Of U-Boat Modelling Articles Page 2 The Wolf Pack Contents Introduction ............................................................................................. 7 Induction ....................................................................................................................................................... 7 A seminal release .......................................................................................................................................... 8 The allure of the VIIC .................................................................................................................................. 9 A growing collection ..................................................................................................................................... 9 The Wolf Pack ...........................................................................................................................................
    [Show full text]
  • Submarine Warfare in the North Atlantic, 1942-44 Convoy Battles During the Most Decisive Stages of Influence Game Play Have Been Indicated on the Map
    strictly a solitaire game in which a single Player [3.0] GAME EQUIPMENT controls both of the opposing forces. During the game, the Player, representing the U·boat [3.1) THE GAME MAP Command, maintains complete control over the The 22" x 34" mapsheet portrays the expanse of U·boat force while the Allied convoy and anti· the North Atlantic Ocean between the Canadian submarine forces are operated according to a coast on the western ext~mity, and the European strictly defined set of rules. These rules prescribe coastline (primarily the British Isles) near the exactly how the Allied units move and engage in eastern mapedge. Various land formations anti· submarine combat. A total of four scenarios, includlng parts of Greenland and Iceland as well I: each a separate game, allow the Player to simulate as a number of graphic distinctions which Submarine Warfare in the North Atlantic, 1942-44 convoy battles during the most decisive stages of influence game play have been indicated on the map. These will be explained in the appropriate Copyright © 1974, Simulations Publications, Inc., New York, NY the Battle of the Atlantic. Various optional rules are included by whIch the Player may examine the rules sections. A numbered hexagon grid is 1.0 INTRODUCfION 13.0 U·BOAT PACKS effects of the increasing technology implemented superimposed on the mapsheet to regularize the 2.0 GENERAL COURSE OF PLAY 13.1 How U·boat Packs are Formed and Organized or being developed by both sides during the course movement and position of the Playing pieces and 3.0 GAME EQUIPMENT 14.0 COMBAT of the war.
    [Show full text]
  • MHMP 2014 UPDATE PART 3 III Humanrelated
    III. HUMAN-RELATED HAZARDS The following list summarizes the significant human-related hazards covered in this section: 1. Catastrophic Incidents (National Emergencies) 2. Civil Disturbances 3. Nuclear Attack 4. Public Health Emergencies 5. Terrorism and Similar Criminal Activities These hazards all tie in with each other in various ways, and by placing them all in the same section of this document, this updated 2014 edition of the Michigan Hazard Mitigation Plan intends to make it easier for planners and emergency management personnel to learn about and consider the many aspects of these threats, risks, activities, conditions, and incidents. The new hazard section, Catastrophic Incidents (National Emergencies), was primarily inspired by some of the states of alert and response activities that Michigan had to adopt in the past decade for incidents that primarily took place outside of its own borders. The main examples were the 9/11/2001 terrorist attacks (and subsequent anthrax incidents and threats), and the Gulf Coast disaster involving Hurricanes Katrina and Rita in 2005. It makes sense to consider, in advance, these types of incidents as well as other types of large-scale disasters that could occur in the future, which require a large-scale national response even though the actual incident itself may occur only within the borders of a few states outside of Michigan’s immediate environment. Preparedness, planning, exercising, and mutual aid arrangements are the main “mitigation” activities proposed for this hazard during its initial phase of consideration in this 2014 edition of the Michigan Hazard Mitigation Plan. Some catastrophic incidents may involve other types of human-related hazards.
    [Show full text]
  • Terrorismterrorism
    U.S. FOREIGN POLICY AGENDA VOLUME 6 AN ELECTRONIC JOURNAL OF THE U.S. DEPARTMENT OF STATE NUMBER 3 TERRORISMTERRORISM Threat Assessment, Countermeasures and Policy November 2001 TERRORISM: THREAT ASSESSMENT, COUNTERMEASURES AND POLICY On September the 11th, enemies of freedom committed an act of war against our country. Americans have known wars — but for the past 136 years, they have been wars on foreign soil, except for one Sunday in 1941. Americans have known the casualties of war — but not at the center of a great city on a peaceful morning. Americans have known surprise attacks — but never before on thousands of civilians. All of this was brought upon us in a single day — and night fell on a different world, a world where freedom itself is under attack... This is not, however, just America’s fight. And what is at stake is not just America’s freedom. This is the world’s fight. This is civilization’s fight. This is the fight of all who believe in progress and pluralism, tolerance and freedom. We ask every nation to join us. We will ask, and we will need, the help of police forces, intelligence services, and banking systems around the world. The United States is grateful that many nations and many international organizations have already responded — with sympathy and with support. Nations from Latin America, to Asia, to Africa, to Europe, to the Islamic world. Perhaps the NATO Charter reflects best the attitude of the world: An attack on one is an attack on all. The civilized world is rallying to America’s side.
    [Show full text]
  • Seeschlachten Im Atlantik (Zusammenfassung)
    Seeschlachten im Atlantik (Zusammenfassung) U-Boot-Krieg (aus Wikipedia) 07_48/U 995 vom Typ VII C/41, der meistgebauten U-Boot-Klasse im Zweiten Weltkrieg Als U-Boot-Krieg (auch "Unterseebootkrieg") werden Kampfhandlungen zur See bezeichnet, bei denen U-Boote eingesetzt werden, um feindliche Kriegs- und Frachtschiffe zu versenken. Die Bezeichnung "uneingeschränkter U-Boot-Krieg" wird verwendet, wenn Schiffe ohne vorherige Warnung angegriffen werden. Der Einsatz von U-Booten wandelte sich im Laufe der Zeit vom taktischen Blockadebrecher zum strategischen Blockademittel im Rahmen eines Handelskrieges. Nach dem Zweiten Weltkrieg änderte sich die grundsätzliche Einsatzdoktrin durch die Entwicklung von Raketen tragenden Atom- U-Booten, die als Träger von Kernwaffen eine permanente Bedrohung über den maritimen Bereich hinaus darstellen. Im Gegensatz zum Ersten und Zweiten Weltkrieg fand hier keine völkerrechtliche Weiterentwicklung zum Einsatz von U-Booten statt. Der Begriff wird besonders auf den Ersten und Zweiten Weltkrieg bezogen. Hierbei sind auch völkerrechtliche Rahmenbedingungen von Bedeutung. Anfänge Während des Amerikanischen Bürgerkrieges wurden 1864 mehrere handgetriebene U-Boote gebaut. Am 17. Februar 1864 versenkte die C.S.S. H. L. Hunley durch eine Sprengladung das Kriegsschiff USS Housatonic der Nordstaaten. Es gab 5 Tote auf dem versenkten Schiff. Die Hunley gilt somit als erstes U-Boot der Welt, das ein anderes Schiff zerstört hat. Das U-Boot wurde allerdings bei dem Angriff auf die Housatonic durch die Detonation schwer beschädigt und sank, wobei auch seine achtköpfige Besatzung getötet wurde. Auftrag der Hunley war die Brechung der Blockade des Südstaatenhafens Charleston durch die Nordstaaten. Erster Weltkrieg Die technische Entwicklung der U-Boote bis zum Beginn des Ersten Weltkrieges beschreibt ein Boot, das durch Dampf-, Benzin-, Diesel- oder Petroleummaschinen über Wasser und durch batteriegetriebene Elektromotoren unter Wasser angetrieben wurde.
    [Show full text]
  • Palestinian Women: Mothers, Martyrs and Agents of Political Change
    University of Denver Digital Commons @ DU Electronic Theses and Dissertations Graduate Studies 1-1-2011 Palestinian Women: Mothers, Martyrs and Agents of Political Change Rebecca Ann Otis University of Denver Follow this and additional works at: https://digitalcommons.du.edu/etd Part of the Gender and Sexuality Commons, Near and Middle Eastern Studies Commons, and the Politics and Social Change Commons Recommended Citation Otis, Rebecca Ann, "Palestinian Women: Mothers, Martyrs and Agents of Political Change" (2011). Electronic Theses and Dissertations. 491. https://digitalcommons.du.edu/etd/491 This Dissertation is brought to you for free and open access by the Graduate Studies at Digital Commons @ DU. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. Palestinian Women: Mothers, Martyrs and Agents of Political Change __________ A Dissertation Presented to the Faculty of the Josef Korbel School of International Studies University of Denver __________ In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy __________ by Rebecca A. Otis June 2011 Advisor: Dr. Martin Rhodes ©Copyright by Rebecca A. Otis 2011 All Rights Reserved Author: Rebecca A. Otis Title: PALESTINIAN WOMEN: MOTHERS, MARTYRS AND AGENTS OF POLITICAL CHANGE Advisor: Dr. Martin Rhodes Degree Date: June 2011 ABSTRACT This dissertation seeks to understand the role of women as political actors in the rise of Islamo-nationalist movement in Palestine. Using a historical and ethnographic approach, it examines the changing opportunity structures available to Palestinian women in the nationalist struggle between 1987 and 2007.
    [Show full text]
  • Master Thesis Project Front Page for the Master's Thesis
    The Faculty of Humanities Master Thesis Project Front page for the Master’s thesis Submission June: [2019] Supervisor: Thijs J. Maarleveld Department: History Title, Danish: Tyske ubåde fra 2. Verdenskrig i danske farvande Title, English: German World War II Submarines in Danish Waters Min./Max. number of characters: 144,000 – 192,000 Number of characters in assignment1: 179.040 (60 – 80 normal pages) (1 norm page = 2400 characters incl. blanc spaces) Please notice in case your Master’s thesis project does not meet the minimum/maximum requirements stipulated in the curriculum your assignment will be dismissed and you will have used up one examination attempt. Solemn declaration I hereby declare that I have drawn up the assignment single-handed and independently. All quotes are marked as such and duly referenced. The full assignment or parts thereof have not been handed in as full or partial fulfilment of examination requirements in any other courses. Read more here: http://www.sdu.dk/en/Information_til/Studerende_ved_SDU/Eksamen.aspx Handed in by: First name: Last name: Date of birth Anders Jensen 20 /11 1975 1 Characters are counter from first character in the introduction until and including the last character in the conclusion. Footnotes are included. Charts are counted with theirs characters. The following is excluded from the total count: abstract, table of contents, bibliography, list of references, appendix. For more information, see the examination regulations of the course in the curriculum. 1 Table of Contents Acknowledgements
    [Show full text]
  • Osprey Publishing, Elms Court, Chapel Way, Botley, Oxford OX2 9LP, United Kingdom
    WOLF PACK The Story of the U-Boat in World War II The Story - oat iq-Workd War 11 First published in Great Britain in 2005 by Osprey Publishing, Elms Court, Chapel Way, Botley, Oxford OX2 9LP, United Kingdom. Email: [email protected] Previously published as New Vanguard 51: Kriegsmarine U-boats 1939-45 (1); New Vanguard 55: Kriegsmarine U-boats 1939-45 (2); and Warrior 36: Grey Wolf. © 2005 Osprey Publishing Ltd. All rights reserved. Apart from any fair dealing for the purpose of private study, research, criticism or review, as permitted under the Copyright, Designs and Patents Act, 1988, no part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, electrical, chemical, mechanical, optical, photocopying, recording or otherwise, without the prior written permission of the copyright owner. Enquiries should be addressed to the Publishers. CIP data for this publication is available from the British Library. ISBN 1 84176 872 3 Editors: Anita Hitchings and Ruth Sheppard Design: Ken Vail Graphic Design, Cambridge, UK Artwork by Ian Palmer and Darko Pavlovic Index by Alan Thatcher Originated by The Electronic Page Company, Cwmbran, UK Printed and bound by L-Rex Printing Company Ltd 05 06 07 08 09 10 9 8 7 6 5 4 3 2 1 FOR A CATALOGUE OF ALL BOOKS PUBLISHED BY OSPREY PLEASE CONTACT: NORTH AMERICA Osprey Direct, 2427 Bond Street, University Park, IL 60466, USA E-mail: [email protected] ALL OTHER REGIONS Osprey Direct UK, P.O. Box 140, Wellingborough, Northants, NN8 2FA, UK E-mail: [email protected] www.ospreypublishing.com EDITOR'S NOTE All photographs, unless indicated otherwise, are courtesy of the U-Boot Archiv.
    [Show full text]
  • Cockburn Sound's World War II Anti
    1 Contents Acknowledgements Introduction Project aims and methodology Historical background Construction of the World War II Cockburn Sound naval base and boom defences Demolition and salvage Dolphin No.60 2010 site inspections Conclusions Significance Statement of cultural significance Legal protection Recommendations References Appendix 1 – GPS Positions 2 Acknowledgements Thanks to Jeremy Green, Department of Maritime Archaeology for geo- referencing the Public Works Department plans. Thanks to Joel Gilman and Kelly Fleming at the Heritage Council of Western Australia for assistance with legal aspects of the protection of the Dolphin No.60 site. Thanks to Mr Earle Seubert, Historian and Secretary, Friends of Woodman Point for providing valuable information regarding the history and demolition of the boom net and Woodman Point sites. Also to Mr Gary Marsh (Friends of Woodman Point) and Mr Matthew Hayes (Operations Manager, Woodman Point Recreation Camp). Matt Carter thanks the Our World Underwater Scholarship Society (OWUSS) and Rolex for enabling him to assist the WA Museum with this project. Thanks to Marie-Amande Coignard for assistance with the diving inspections. Thanks to Timothy Wilson for the cover design. Cover images Public Works Department Plan 29706 Drawing No.7 Dolphin No.60 (National Archives of Australia) Diver inspecting Dolphin No.60 site (Patrick Baker/ WA Museum) Type ‘A’ anti-boat hurdles (Australian War Memorial) 3 Introduction The Cockburn Sound anti-submarine boom defences were a major engineering project undertaken during World War II to protect the approaches to Cockburn Sound, and the northern boom defences spanned 9.37 km of seabed. In 1964 the timber pylons and dolphins were demolished with explosives and the steel nets were cut and dropped onto the seabed (Jeffery 1988).
    [Show full text]
  • Interdisciplinary Review for the Humanities
    Interdisciplinary Review for the Humanities Are so-called suicide bombers our “ritual others”? Stamenkovic, Marko. estrema: Interdisciplinary Review for the Humanities 5 [ Fall 2014 ] / Special Issue: Insecurity and Global Terror(s). Edited by Nuno Marques, Igor Furão and Susana Araújo. A project of the Center for Comparative Studies of the University of Lisbon / Special Issue in collaboration with the project City and (In)security in Literature and the Media (CILM). For further information CILM project official website 1 Are so-called suicide bombers our “ritual others”?1 Marko Stamenkovic2 Abstract Within the First World scholarship, the concept of “suicide missions” has occupied an uneasy place in relation to the issues of risk and security for Western neoliberal democracies. As part of colonial humanism, these and related concepts have been contested by mediated (ideological, gendered and racist) perspectives growing within a single, imperial epistemic paradigm. This paper challenges such a paradigm by centering on the most recent neuralgic points surrounding the ‘universalist’ and ‘rationalist’ imaginaries of “suicide terror.” It approaches “suicide bombers” as theoretical figures from an interdisciplinary perspective, focused mainly on contemporary decolonial philosophy and post-Eurocentric social and cultural theories. This paper aims to break away from normative exercises of discursive power through which an ethical interruption of the epistemological becomes my primary task, in particular with regard to the notions of ritual otherness, death-politics, colonial matrix of power, sovereignty, resistance, and self-sacrifice. Keywords: epistemic violence, ‘suicide bombing,’ ritual others, necropolitics, decolonial thinking. 1 STAMENKOVIC, Marko. 2014. “Are so-called suicide bombers our ‘ritual others’?” Special Issue: Insecurity and Global Terror(s), estrema: Interdisciplinary Review for the Humanities 5 (Fall).
    [Show full text]
  • Submarine Warfare, Fiction Or Reality? John Charles Cheska University of Massachusetts Amherst
    University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses 1911 - February 2014 1962 Submarine warfare, fiction or reality? John Charles Cheska University of Massachusetts Amherst Follow this and additional works at: https://scholarworks.umass.edu/theses Cheska, John Charles, "Submarine warfare, fiction or reality?" (1962). Masters Theses 1911 - February 2014. 1392. Retrieved from https://scholarworks.umass.edu/theses/1392 This thesis is brought to you for free and open access by ScholarWorks@UMass Amherst. It has been accepted for inclusion in Masters Theses 1911 - February 2014 by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. bmbb ittmtL a zia a musv John C. Chaaka, Jr. A.B. Aaharat Collag* ThMis subnlttwi to tho Graduate Faculty in partial fulfillment of tha requlraaanta for tha degraa of Master of Arta Uoiwaity of Maaaaohuaetta Aaherat August, 1962 a 3, v TABU OF CONTENTS Hm ramp _, 4 CHAPTER I Command Structure and Policy 1 II Material III Operations 28 I? The Submarine War ae the Public Saw It V The Number of U-Boate Actually Sunk V VI Conclusion 69 APPENDXEJB APPENDIX 1 Admiralty Organisation in 1941 75 2 German 0-Boat 76 3 Effects of Strategic Bombing on Late Model 78 U-Boat Productions and Operations 4 U-Boats Sunk Off the United States Coaat 79 by United States Forces 5 U-Boats Sunk in Middle American Zone 80 inr United StatM ?bkii 6 U-Bosta Sunk Off South America 81 by United States Forces 7 U-Boats Sunk in the Atlantio in Area A 82 1 U-Boats Sunk in the Atlentio in Area B 84 9A U-Boats Sunk Off European Coast 87 by United States Forces 9B U-Bnata Sunk in Mediterranean Sea by United 87 States Forces TABLE OF CONTENTS klWDU p«g« 10 U-Boats Sunk by Strategic Bombing 38 by United States Amy Air Foreee 11 U-Boats Sunk by United States Forces in 90 Cooperation with other Nationalities 12 Bibliography 91 LIST OF MAPS AND GRAPHS MAP NO.
    [Show full text]
  • Maritime Terrorism, Piracy and Acts of Armed Robbery of Ships: Southeast Asia and Africa, 2000 – 2008
    MARITIME TERRORISM, PIRACY AND ACTS OF ARMED ROBBERY OF SHIPS: SOUTHEAST ASIA AND AFRICA, 2000 – 2008 by LYDELLE AMELIA JOUBERT Submitted in fulfilment of the requirements for the degree of MASTER OF INTERNATIONAL RELATIONS in the Department of Political Sciences, Faculty of Humanities at the University of Pretoria Study Leader: Professor M. Hough September 2011 © University of Pretoria DEDICATION I dedicate this study to Deon Terblanche. i ACKNOWLEDGEMENTS I would like to thank the following people and organizations for their assistance and contribution towards this study: My supervisor, Professor M. Hough for his support, insight and perspective, and guidance during the study. I felt privileged for this opportunity. The International Maritime Bureau for providing their Annual Reports to me. The Norwegian Council for Africa for access to African Newspaper articles. Mr Eric Frécon for making his book and lectures on pirate groups in Southeast Asia available to me. Ms M. Buys from the University of Pretoria‟s library and Ms J.M. Calitz of the South African Navy Library in Simonstown for assisting me with obtaining research material. Ms W. Martin for her administrative assistance. Deon Terblanche, Janis Peart and Ron Kessler for their help in proof reading. My fiancée, Deon Terblanche for his love and support that made this study possible. God for his blessings and my good health. ii Acronyms 5e RIAOM Fifth Regiment Interarmes d‟Outre-Mer 9/11 11 September 2001 AAIA Aden-Abyan Islamic Army AFRICOM United States African Command AIS Automatic
    [Show full text]