Somali Piracy Regional Context and International Response

Total Page:16

File Type:pdf, Size:1020Kb

Somali Piracy Regional Context and International Response POTGIETER Somali Piracy Regional Context and International Response Due mainly to the disintegration of central government authority in Somalia, the lack of maritime security around the Horn of Africa has become a grave problem. Piracy is just one manifestation of the dire lack of maritime security. This is one of the few cases in Africa where security problems on land have affected maritime security. The origin and nature of the maritime security problems and piracy are discussed in this article. The further focus is on the impact and the international response to Somali piracy. The region is in need of an integrated ‘ocean policy’, involving national, regional and international players. T.D. Potgieter* he sea makes global trade possible and also the Horn of Africa, it is of international concern Tprovides us with vast resources. Much of and naval vessels from many countries now Africa’s international trade moves through its patrol these waters. ports, while its maritime resources, that could contribute much towards sustaining develop- This paper is essentially concerned with piracy ment, are underutilized and threatened. around the Horn of Africa. Following a few Pervasive maritime insecurity is a significant brusque remarks on the security situation in threat to security in Africa, to the shipping the region and the causes of piracy, the nature, around Africa’s coast and to maritime resources, impact and the international response to specifically in areas such as the Horn of Africa. Somali piracy will be briefly discussed. The Horn of Africa is a choke point as the internationally important trade routes around Origin and nature of the maritime it link the Indian Ocean with the Suez Canal security problems and piracy and beyond. Securing free and safe traffic around it is internationally important. Mainly For decades conflicts involving Ethiopia, Sudan, due to the disintegration of central govern- Eritrea and Somalia, have ravaged the Horn of ment authority in Somalia, the lack of maritime Africa region. The Cold War interests of the security in the region is a grave problem. This major powers initially added to the turbulence, is one of the few cases in Africa where security but these conflicts soon became interrelated. problems on land have affected maritime Countries were not only fighting each other, security. Not enforcing the law at sea and the but factions in the various countries obtained lack of maritime security has real impact on and provided support to belligerents across regional security and the stability of the entire national borders. region. Piracy, so often the news focus, is just Somalia has been in disorder for the best one manifestation of the dire lack of maritime part of two decades. After the notoriously security, but it receives much attention. With repressive regime of President Siad Barre valuable cargoes traversing the waters around came to an end in January 1991, Somalia collapsed into a state of chaos and civil war.1 * The author is director of the Centre for Military Studies (Cemis), Faculty of Military With utter lawlessness, banditry, mass Science, Stellenbosch University. 1 See Martin Meredith, The State of Africa. A History of Fifty Years of Independence (Jonathan starvation and no organised government, Ball, Johannesburg, 2005), p. 469 and G. Arnold, Africa. A Modern History (Atlantic, London, warlords fought each other for the spoils and 2006), pp. 660-3. 4 MILITAIRE SPECTATOR JAARGANG 179 NUMMER 1 – 2010 SOMALI PIRACY HORN OF AFRICA 40° Al Qunfudhah 45° 50° SAUDI ARABIA Atbara Abha- Red Sea Najran- Thamud- Alghiena policing along Somalia’s coast A - - t Sala Jizan Sa'dah b Nile a Shendi r a Nakfa Mersa Gulbub and harbours disappeared. Jaza'ir'- Af'abet a'e'e - YEMEN iwiwa Dahlak Farasan ERITREA iittss Hajjah - Khartoum M Archipelago San'a- Saywun The humanitarian situation is Sebderat Kassala Asmara (Sanaa)' Shabwah Barentu Inghel Ma'rib Al Ghaydah extremely serious as millions of 15° Teseney 15° Adi Quala Mersa Al Hudaydah - Omhajer Fatuma Dhamar- 'Ataq Ash Shihr Wad Tio Al Mukalla- Somalis depend on humanitarian Madani Gedaref Aksum - Himora Adwa Adigrat Idi Ibb Al Bayda' - Sinnar Te Balhaf keze aid – of which 80 percent is W Ta'izz h Mek'ele Ahwar i t B e D B i a Singar n Metema Debark' - N l d b delivered by sea. u e Shaykh 'Uthman a i e r Assab l l G G e M (Aden) w e N Adan a e Gonder Sek'ot'a a r s i n d l d a e a T'ana b Gulf of Aden Caluula fu Ed Damazin Serdo Obock y Hayk Weldiya Tadjoura DJIBOUTI Bahir Dar Djibouti Butyaalo Three international intervention Ab Boosaaso Guba ay Bati h (Bl s S U DA N ue a Dikhil Saylac Dese N Aw i l Karin e in ) b Ceerigaabo efforts (UNOSOM I and UNITAF Kurmuk Bure li Sa Xaafuun A A b Gewané Goha a Debre Mark'os y Boorama Baki Berbera and UNOSOM II) essentially failed 10° Mendi ETHIOPIA 10° 2 Fiche Debre Birhan Dire Dawa Hargeysa Burco during the early 1990s. The Gimbi Hagere Qardho Gidami Nek'emte Hiywet Addis Ababa Harer Jijiga Bandarbeyla Kigille Mojo Boor largest, UNOSOM II (20 000 Dembi Dolo Garoowe Nazret Laascaanood Gambela Gore peacekeepers, 8000 logistical Gil Agaro Degeh Bur Eyl o W Hosa'ina Asela en Akobo z Jima A Yeki Xamure ko Awasa staff and 3000 civilians from b Ginir o Shewa Gimira Sodo W Werder Pibor Post Goba ab K'ebri Dehar Gaalkacyo Yirga 'Alem e Omo G 23 nations) had a mandate to P e Imi ib Abaya st War Galoh o Arba Kibre r r Towot Sogata o Minch' Hayk Menguist Shilabo establish a new government, Ch'amo Galadi Wabe Shebele Dhuusamarreeb Hayk Genale Garadase Ferfer SOMALIA Hobyo police force, justice system and Administrative Murle DawaNegele Filtu 5° Boundary 5 Beledweyne ° Kapoeta Ch'ew Bahir to rebuild the economy. Their Todenyang Kusa Dolo Bay Xuddur Banya Mega Lokwa Lake Turkana Moyale Ramu Luug Buulobarde efforts to disband and disarm Kangole Ceeldheere (Lake Rudolf) Takaba Baydhabo Lodwar North Horr Garbahaarrey the militias failed and after US Jawhar Moroto Loiyangalani Buna El Wak INDIAN OCEAN helicopters and troops were Lokichar UGANDA Baardheere lle Webi Jubba e Wajir hab Muqdisho Laisamis i S mauled in an urban skirmish in eb Marka (Mogadishu) W KENYA Bu'aale Maralal Mogadishu (the infamous “Black Habaswein Baraawe National capital Jinja Tororo Eldoret u rur Archer's Post Jilib hu Town, village Kakamega a Nanyuki Hawk Down” incident in October y Meru Jamaame 0° Kisumu N Bilis Airport 0° Nyeri Qooqaani 1993), the US withdrew in March Lake Kericho Nakuru Garissa Kismaayo International boundary Victoria Embu 1994.3 Other participants soon Tilka Tana Road Musoma Nairobi Buur Gaabo Railroad followed, essentially leaving the Machakos Garsen Mwanza L. Natron Namanga 0 100 200 300 400 500 km warring factions to their own Lamu UNITED REPUBLIC OF Galana HORN 0 100 200 300 mi Moshi OF designs. Various subsequent TANZANIA Voi Malindi L Arusha AFRICA . M Kilifi The boundaries and names shown and the designations a Shinyanga L. Eyasi ny used on this map do not imply official endorsement or mediation efforts failed as the ara acceptance by the United Nations. P Mombasa a n ga warring factions received support ni 5° Tanga from countries in the region. In 35° 40° 45° 50° Map No. 4188 Rev. 2 UNITED NATIONS Department of Peacekeeping Operations June 2006 the Union of Islamic May 2007 Cartographic Section Courts (UIC) seized Mogadishu and much of the south. However, at the end of forces, AMISOM and Islamist insurgents.4 2006 forces loyal to the interim administration Somalia is still without strong central (Transitional Federal Government (TFG) created government authority and it is one of the in 2004), seized control from the Islamists with failed post-Cold War efforts at conflict the backing of Ethiopian troops. This caused resolution. a surge in violence. An African Union (AU) peacekeeping mission (AMISOM), currently in The anarchic situation ashore has spilled over Mogadishu, relieved the Ethiopians. However, into the maritime domain, causing a severe it is small (as a number of African countries did lack in maritime security. This is a grave not contribute to it as promised), faces logistic, problem which impacts on all aspects relating technical and financial constraints, while it is often the target of insurgent attacks. Only 2 A. Oyebade and A. Olao, Africa after the Cold War. The Changing Perspectives on Security, (Africa World Press, Trenton NJ, 1998), p. 162. parts of Mogadishu are under government 3 Meredith, State of Africa, pp. 478 and 482-3. control and 2009 has been characterised by 4 International Crisis Group, “Somalia: to move beyond the Failed State”, Africa Report, multi-sided fighting between government No 147, International Crisis Group, 23 December 2008, pp ii, 20 and 25. JAARGANG 179 NUMMER 1 – 2010 MILITAIRE SPECTATOR 5 POTGIETER to the use of the sea. Serious environmental The former Somali Navy no longer exists. degradation has taken place as countries in the Though semi-autonomous region of Puntland region claim vast damage as a result of illegal has a small coast guard and some countries in fishing, reef destruction and the depletion of the region operate small functioning navies many species. Also, unknown quantities of (notably Yemen, Kenya and Djibouti), they are illicit (often toxic and radioactive) waste have not able to control the situation. In maritime been dumped in Somali waters. Though the security terms the region lacks capabilities full extend of it is unknown, it certainly poses such as intelligence, early warning, maritime a serious threat to the environment and air surveillance and reconnaissance.
Recommended publications
  • Dai Hong Dan Incident
    Dai Hong Dan incident Dai Hong Dan incident Part of the Operation Enduring Freedom - Horn of Africa and War on Terror Date Location Result Dai Hong Dan underway 29 October 2007 Indian Ocean off Mogadishu US and North Korean victory Sailors regain control of ship Belligerents North Korea United States Somali pirates Strength 1 destroyer 1 seized cargo vessel 7 pirates Casualties and losses 6 North Korean. This was a surprising incident. The United States and North Korea cooperating and fighting a battle together. It was something the North Koreans never thought would happen. The United States claimed they did it as a good deed. This shows that even the biggest foes can cooperate with one another and defend one another when push comes to shove. Take this for example or when Russia assisted America in the 2001 invasion of Afghanistan. 75 Views. Related Questions. What is the worst incident when helping? Get the latest live position for the DAI HONG DAN. You can also check the schedule, technical details and many more. ⠗â—â—â—â—â— Wiki Further interesting facts, incidents, history, â—â—â—â—â—◠× Close. Risk Rating for DAI HONG DAN. No risk assessment yet. Request a Risk Rating Report. When the battle aboard the Dai Hong Dan was over, two pirates were dead and five were captured, the Navy said. Three wounded crew members from the cargo ship were being treated aboard the guided-missile destroyer USS James E. Williams. The captured pirates were being held aboard the North Korean vessel, the Navy said. It is the second incident of piracy reported in recent days.
    [Show full text]
  • Somali Fisheries
    www.securefisheries.org SECURING SOMALI FISHERIES Sarah M. Glaser Paige M. Roberts Robert H. Mazurek Kaija J. Hurlburt Liza Kane-Hartnett Securing Somali Fisheries | i SECURING SOMALI FISHERIES Sarah M. Glaser Paige M. Roberts Robert H. Mazurek Kaija J. Hurlburt Liza Kane-Hartnett Contributors: Ashley Wilson, Timothy Davies, and Robert Arthur (MRAG, London) Graphics: Timothy Schommer and Andrea Jovanovic Please send comments and questions to: Sarah M. Glaser, PhD Research Associate, Secure Fisheries One Earth Future Foundation +1 720 214 4425 [email protected] Please cite this document as: Glaser SM, Roberts PM, Mazurek RH, Hurlburt KJ, and Kane-Hartnett L (2015) Securing Somali Fisheries. Denver, CO: One Earth Future Foundation. DOI: 10.18289/OEF.2015.001 Secure Fisheries is a program of the One Earth Future Foundation Cover Photo: Shakila Sadik Hashim at Alla Aamin fishing company in Berbera, Jean-Pierre Larroque. ii | Securing Somali Fisheries TABLE OF CONTENTS LIST OF FIGURES, TABLES, BOXES ............................................................................................. iii FOUNDER’S LETTER .................................................................................................................... v ACKNOWLEDGEMENTS ............................................................................................................. vi DEDICATION ............................................................................................................................ vii EXECUTIVE SUMMARY (Somali) ............................................................................................
    [Show full text]
  • The Chinese Navy: Expanding Capabilities, Evolving Roles
    The Chinese Navy: Expanding Capabilities, Evolving Roles The Chinese Navy Expanding Capabilities, Evolving Roles Saunders, EDITED BY Yung, Swaine, PhILLIP C. SAUNderS, ChrISToPher YUNG, and Yang MIChAeL Swaine, ANd ANdreW NIeN-dzU YANG CeNTer For The STUdY oF ChINeSe MilitarY AffairS INSTITUTe For NATIoNAL STrATeGIC STUdIeS NatioNAL deFeNSe UNIverSITY COVER 4 SPINE 990-219 NDU CHINESE NAVY COVER.indd 3 COVER 1 11/29/11 12:35 PM The Chinese Navy: Expanding Capabilities, Evolving Roles 990-219 NDU CHINESE NAVY.indb 1 11/29/11 12:37 PM 990-219 NDU CHINESE NAVY.indb 2 11/29/11 12:37 PM The Chinese Navy: Expanding Capabilities, Evolving Roles Edited by Phillip C. Saunders, Christopher D. Yung, Michael Swaine, and Andrew Nien-Dzu Yang Published by National Defense University Press for the Center for the Study of Chinese Military Affairs Institute for National Strategic Studies Washington, D.C. 2011 990-219 NDU CHINESE NAVY.indb 3 11/29/11 12:37 PM Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the U.S. Department of Defense or any other agency of the Federal Government. Cleared for public release; distribution unlimited. Chapter 5 was originally published as an article of the same title in Asian Security 5, no. 2 (2009), 144–169. Copyright © Taylor & Francis Group, LLC. Used by permission. Library of Congress Cataloging-in-Publication Data The Chinese Navy : expanding capabilities, evolving roles / edited by Phillip C. Saunders ... [et al.]. p. cm. Includes bibliographical references and index.
    [Show full text]
  • Six Years at Sea… and Counting: Gulf of Aden Anti-Piracy and China's
    SIX YEARS AT SEA… AND COUNTING: GULF OF ADEN ANTI-PIRACY AND CHINA’S MARITIME COMMONS PRESENCE By Andrew S. Erickson and Austin M. Strange June 2015 Jamestown’s Mission The Jamestown Foundation’s mission is to inform and educate policymakers and the broader policy community about events and trends in those societies which are strategically or tactically important to the United States and which frequently restrict access to such information. Utilizing indigenous and primary sources, Jamestown’s material is delivered without political bias, filter or agenda. It is often the only source of information which should be, but is not always, available through official or intelligence channels, especially in regard to Eurasia and terrorism. Origins Launched in 1984 by its founder William Geimer, The Jamestown Foundation has emerged as one of the leading providers of research and analysis on conflict and instability in Eurasia. The Jamestown Foundation has rapidly grown to become one of the leading sources of information on Eurasia, developing a global network of analytical expertise from the Baltic to the Horn of Africa. This core of intellectual talent includes former high-ranking government officials, journalists, research analysts, scholars and economists. Their insight contributes significantly to helping policymakers around the world understand the emerging trends and developments in many of the world’s under-reported conflict zones in Eurasia. THE JAMESTOWN FOUNDATION Published in the United States by The Jamestown Foundation 1111 16th St. N.W. Suite 320 Washington, DC 20036 http://www.jamestown.org Copyright © The Jamestown Foundation, June 2015 All rights reserved. No part of this report may be reproduced in any manner whatsoever without written consent.
    [Show full text]
  • The Palingenesis of Maritime Piracy and the Evolution of Contemporary Counter-Piracy Initiatives
    THE PALINGENESIS OF MARITIME PIRACY AND THE EVOLUTION OF CONTEMPORARY COUNTER-PIRACY INITIATIVES BY ROBERT COLM MCCABE, M.A. THESIS FOR THE DEGREE OF Ph.D. DEPARTMENT OF HISTORY NATIONAL UNIVERSITY OF IRELAND, MAYNOOTH HEAD OF DEPARTMENT Dr Jacinta Prunty SUPERVISOR OF RESEARCH Dr Ian Speller December 2015 TABLE OF CONTENTS Contents............................................................................................................. i Dedication.......................................................................................................... iv Acknowledgments............................................................................................. v Abbreviations.................................................................................................... vii List of figures..................................................................................................... x INTRODUCTION............................................................................................ 1 CHAPTER I - MARITIME PIRACY: A TWENTIETH-CENTURY PALINGENESIS? 1.1 Introduction and general context...................................................... 20 1.2 Early legal interpretations and historical evolution......................... 22 1.3 Twentieth century legal evolution.................................................... 25 1.4 Resurgence of maritime piracy in the nineteenth century................ 31 1.5 Suppression of maritime piracy in the nineteenth century............... 37 1.6 Pre-war period (1900-14)................................................................
    [Show full text]
  • Full Spring 2010 Issue the .SU
    Naval War College Review Volume 63 Article 1 Number 2 Spring 2010 Full Spring 2010 Issue The .SU . Naval War College Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Naval War College, The .SU . (2010) "Full Spring 2010 Issue," Naval War College Review: Vol. 63 : No. 2 , Article 1. Available at: https://digital-commons.usnwc.edu/nwc-review/vol63/iss2/1 This Full Issue is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Naval War College: Full Spring 2010 Issue NAVAL WAR C OLLEGE REVIEW NAVAL WAR COLLEGE REVIEW Spring 2010 Volume 63, Number 2 Spring 2010 Spring N ES AV T A A L T W S A D R E C T I O N L L U E E G H E T R I VI IBU OR A S CT MARI VI Published by U.S. Naval War College Digital Commons, 2010 1 5430_NWCReview_Spring2010_Cover.indd 1 3/1/2010 4:14:52 PM Naval War College Review, Vol. 63 [2010], No. 2, Art. 1 Cover A model from the Naval War College Museum collection of a Korean “turtle ship,” such as those that helped repulse the sixteenth-century Japanese invasion of Korea—a campaign vital to the spirit of the modern Republic of Korea Navy, as noted by Yoji Koda (Vice Admiral, Japan Maritime Self-Defense Force, Retired) in this issue’s lead article.
    [Show full text]
  • Transfers of Small Arms and Light Weapons to Fragile States
    SIPRI Insights on Peace and Security No. 2013/1 January 2013 TRANSFERS OF SMALL ARMS SUMMARY w The need for security forces AND LIGHT WEAPONS TO in a fragile state to be adequately trained and FRAGILE STATES: equipped is recognized as a precondition for stability and development. However, STRENGTHENING OVERSIGHT supplying arms to security forces in fragile states can AND CONTROL contribute to armed conflict and instability. mark bromley, lawrence dermody, hugh griffiths, The risks associated with paul holtom and michael jenks* supplying arms and ammunition to fragile states, I. Introduction include the risk that the arms will be diverted to actors A key indicator of state fragility is the inability of state security forces to seeking to undermine exercise a monopoly over the legitimate use of force.1 The need for security stabilization efforts; the risk forces in a fragile state to be sufficiently trained and equipped is thus recog- that the arms will contribute to nized as a precondition for stability and development. This usually involves the renewal or intensification of the import of conventional arms, including small arms and light weapons armed conflict; and the risk of corruption in the transaction. (SALW) and ammunition. However, supplying arms and ammunition to A number of European Union, security forces in fragile states does not necessarily lead to the intended NATO and OECD states have goals and in a number of cases has instead contributed to armed conflict and undertaken risk mitigation instability. The challenge for the international community is therefore to measures, sometimes in contribute to the provision of security in fragile states while limiting these cooperation with recipients as risks.
    [Show full text]
  • Ukrainian Arms Supplies to Sub-Saharan Africa
    SIPRI Background Paper February 2011 UKRAINIAN ARMS SUPPLIES SUMMARY w Ukraine has consistently TO SUB-SAHARAN AFRICA been among the 10 largest arms exporters in the world during the past two decades. An paul holtom* estimated 18 per cent of Ukrainian arms exports during 2005–2009 were for recipients in sub-Saharan Africa, specifically to Kenya (or I. Introduction Southern Sudan), Chad, Nigeria, Equatorial Guinea, and SIPRI data indicates that Ukraine exported a significant volume of major the Democratic Republic of the conventional weapons to sub-Saharan Africa during 2005–2009, in par- Congo (DRC). Ukraine has ticular Ukrainian surplus aircraft, artillery and armoured vehicles. Ukrain- supplied surplus aircraft, tanks, ian enterprises and individuals have also provided maintenance, overhaul armoured vehicles, artillery, and modernization services for Soviet-designed equipment as well as SALW and ammunition to transportation and brokering services for the armed forces of sub-Saharan armed forces in sub-Saharan African countries. Africa. Additionally, Ukrainian Ukraine was identified as the source of arms and ammunition that were companies and individuals have diverted to armed forces and rebel groups subject to United Nations arms supplied other services related to arms transfers and embargoes, and also conflict zones, in sub-Saharan Africa during the 1990s.1 participated in combat missions However, Ukraine has made some progress in controlling exports and for African armed forces. improving transparency in recent years. Official Ukrainian reports on arms Concerns have been raised in exports indicate that Chad and Kenya have become important recipients of recent years regarding Ukrainian arms. In both cases, concerns have been raised regarding risks of Ukrainian arms exports to diversion, use in conflict or potentially destabilizing impacts in subregions.
    [Show full text]
  • CPC Outreach Journal #661
    USAF COUNTERPROLIFERATION CENTER CPC OUTREACH JOURNAL Maxwell AFB, Alabama Issue No. 660, 21 October 2008 Articles & Other Documents: From Beirut to 9/11 2 British Antiterror Experts Say U.S. Takes Wrong Path Lebanon’s Bloody Sunday The Philippines: America's Other War on Terrorism From the Beirut Bombing to 9/11 A Safer Nuclear Stockpile Why Do Terrorists Love to Strike Around Elections? New and Unnecessary Al-Qaeda is Watching the US Election Official Describes Secret Uranium Shipment On Al-Qaeda Web Sites, Joy Over U.S. Crisis, Support Air Force Seeks to Fix Nuke Mission For McCain Reactors for the Middle East Terror Websites Downed in Suspected Cyber Counter- Strike Stopping a Nuclear Tehran Expert Says Nuclear Terrorism is Not a Major Threat Iran is Job One Is it Really All Over for Al-Qaida? Huge New Biodefense Lab is Dedicated at Fort Detrick Saudi Arabia Puts 1,000 Al-Qaeda Suspects on Trial NATO Warships to Battle Piracy Afghanistan, Pakistan Agree on Co-op in Fighting Somali Piracy Shakes Confidence in Suez Canal Route Terrorism Welcome to the CPC Outreach Journal. As part of USAF Counterproliferation Center’s mission to counter weapons of mass destruction through education and research, we’re providing our government and civilian community a source for timely counterproliferation information. This information includes articles, papers and other documents addressing issues pertinent to US military response options for dealing with nuclear, biological and chemical threats and attacks. It’s our hope this information resource will help enhance your counterproliferation issue awareness. Established in 1998, the USAF/CPC provides education and research to present and future leaders of the Air Force, as well as to members of other branches of the armed services and Department of Defense.
    [Show full text]
  • The Borderlands of Southeast Asia Southeast of Borderlands the That Comforting Ambiguity Has Disappeared
    Edited by James Clad, Sean M. McDonald, and Bruce Vaughn s an academic field in its own right, the topic of border studies is experiencing a revival in university geography courses as well as in wider political commentary. Until recently, border studies in con- Atemporary Southeast Asia appeared as an afterthought at best to the politics of interstate rivalry and national consolidation. The maps set out all agreed postcolonial lines. Meanwhile, the physical demarcation of these boundar- ies lagged. Large slices of territory, on land and at sea, eluded definition or delineation. The Borderlands of Southeast Asia That comforting ambiguity has disappeared. Both evolving technologies and price levels enable rapid resource extraction in places, and in volumes, once scarcely imaginable. The beginning of the 21st century’s second decade is witnessing an intensifying diplomacy, both state-to-state and commercial, over offshore petroleum. In particular, the South China Sea has moved from being a rather arcane area of conflict studies to the status of a bellwether issue. Along with other contested areas in the western Pacific and south Asia, the problem increasingly defines China’s regional relationships in Asia—and with powers outside the region, especially the United States. Yet intraregional territorial differences also hobble multilateral diplomacy to counter Chinese claims, and daily management of borders remains burdened by a lot of retrospective baggage. The contributors to this book emphasize this mix of heritage and history as the primary leitmotif for contemporary border rivalries and dynamics. Whether the region’s 11 states want it or not, their bordered identity is falling into ever sharper definition—if only because of pressure from extraregional states.
    [Show full text]
  • Ÿþm I C R O S O F T W O R
    Copernic Agent Search Results Search: Gulf of Aden war ship battle portal (All the words) Found: 1019 result(s) on _Full.Search Date: 7/23/2010 11:06:20 AM 1. Indian Frigate Sinks Pirate Ship in Gulf of Aden ... NEW DELHI, Nov. 19 -- An Indian navy frigate battled with and sank a vessel described as a pirate mother ship in the Gulf of Aden, one of the world's busiest and most ... http://www.washingtonpost.com/wp-dyn/content/article/2008/11/19/AR2008111900364.html 94% 2. Pirate Attack in the Gulf of Aden Michael Briant completed a circumnaviagion in Bambola reports on Pirates, Red Sea Anchorages lightning strikes, French Canal routes and all the fun of blue water ... http://www.michaelbriant.com/attacked.htm 93% 3. What is Happening in the Gulf of Aden? « Revolutionizing Awareness It has a Swirl Pattern just Like A Portal In ... those who have been in charge of making war ... French Ship Guepratte Provides a Presence in Gulf of Aden http://revolutionizingawareness.wordpress.com/2010/02/01/what-is-happening-in-the-gulf-of-aden/ 93% 4. Piracy in Somalia - Wikipedia, the free encyclopedia ... 11 May 2010, Somali pirates seized a Bulgarian-flagged ship in the Gulf of Aden. ... increased war insurance premium due to the high risk off the Gulf of Aden."[80] ... http://en.wikipedia.org/wiki/Piracy_in_Somalia 92% 5. Shippers urge naval blockade of Somali coast World news channel covers Asia-Pacific, Middle East, Europe, America and Africa. Chinadaily.com.cn is the largest English portal in China, providing news, business ..
    [Show full text]
  • Cleveland-Spring Conference 2019
    Cleveland-Spring Conference 2019 Position Papers for: General Assembly Delegation from: Algeria Represented by: Strongsville High School Position Paper for Disarmament and International Security (GA1 DISEC) The issues before Disarmament and International Security (DISEC) are as follows: Addressing the Uses of Cyber Warfare and Protecting Trade from Somalian Pirates. The issue at stake is the decree to work to maintain cooperation and peace in the world and find a middle ground of level security among all countries. I. Addressing the Uses of Cyber Warfare DISEC has the responsibility of facilitating a relationship of peace and security between the internet and humans. The digital age is one that is virtual and physically untouchable. The idea of virtual warfare is one that is becoming of our generation and being idolized as the ideal weaponry attack system. Taking a stroll through history, the internet really did not surface until 1990, even though the United Nations (UN) prefaced the issue 1945 with Article 51 and the addressment of issues demanding “armed response”. Yet the idea evolutionized with time to turn from this idealistic enemy to one that sits in front of the president of the United States. One tweet in this virtual age could push the self-destruct button on the United States and Korea’s missile would be here in ten minutes. That being said, cyber warfare, the movie Blackhat in and of itself, is the next pawn in this warfare game that the world is playing with itself. People are utilizing the vulnerability of computer systems to hack in and take a piece away from countries and make them lose control at the hands of faith in their security and life.
    [Show full text]