Trinco Dialogue Maritime Symposium 2013 - NMA

Transcription

Trinco Dialogue Maritime Symposium 2013 - NMA
1
Trinco Dialogue Maritime Symposium 2013
FOREWORD
1.
The Trinco Dialogue is an annual Maritime Symposium conducted by Naval and
Maritime Academy, Trincomalee. The inaugural session of Trinco Dialogue was conducted by
the Junior Naval Staff College on 28 November 2011 under the astute guidance of Commandant
Naval and Maritime Academy and on the initiative of the then Commander Eastern Naval Area
and present Commander of the Navy, Vice Admiral Jayanath Kolambage, RSP, VSV, USP,
RCDS, psc. The aim of this annual symposium is to impart knowledge on various relevant and
contemporary maritime and military subjects to large Naval audience especially officers under
trainees and also provide opportunity to officers and Student officers of JNSC to broaden their
horizon on relevant topics through participation in symposium. The theme of the first
symposium was ―Identifying Maritime Challenges Through a Dialogue and the second Trinco
Dialogue was conducted on 27 October 2012 with the theme of ―Collaborative Maritime
Security through Modern Technology‖.
2.
Total six papers were presented in Trinco Dialogue 2012. Two papers were presented in
the first session of symposium namely ―Maritime Domain Awareness‖ by Commander R Joseph,
RSP, psc, BSC (DS), Sri Lanka Coast Guard and ―Integrated Defence Effort to Enhance National
Security‖ by Lieutenant Commander BARI Abeysekara Student Officer 8th JNSC. Both the
speakers set the tone of the Symposium and generated lot of discussions that was evident through
question and answer session. Thereafter the second session imparted an in-depth knowledge on
the topics of ―Application of Cloud Computing in Military Context‖ and ―Exploitation of
Modern Communication Technology for Effective Management of Defence Communication
Network‖ presented by Commodore AMPS Alahkoon, USP, psn, MBA (MofT), Dockyard
Superintendent of Department of Electrical and Lieutenant IP Wijesinghe, Student Officer 8th
JNSC respectively. The endeavour of both the speakers was to highlight the revolution in
military affairs and importance of technology in modern warfare. The third session had two very
informative topics ― Influence of Middle East Crisis to Indian Ocean Region‖ and Cyber
Terrorism- Its Implications on Low Intensity Conflict Operations‖ presented by Lieutenant
Commander CRP Walakuluge Student Officer of 8th Jnsc and Commander(S) ABRA De Silva,
RSP, psc, MDS, Acting CS(SPDC) and ILMS Coordinator respectively.
3.
The opening remarks of Trinco Dialogue 2012 was made by the Commandant Naval and
Maritime Academy Commodore USR Perera, RSP,USP,psc, MSc (D&SS). The key note was
delivered by the Chief Guest of the event, Commander Eastern Naval Area Rear Admiral RC
Wijegunaratne, WV, RWP, RSP, USP, NDC, psn, M Phil (D&SS). The Admiral highlighted the
importance of Maritime Domain Awareness and brought out the geo-strategic significance and
role of Sri Lanka Navy in IOR. The Chief Guest also appreciated the effort put in by JNSC and
Naval and Maritime Academy towards proficient conduct of Trinco Dialogue 2012. The
2
Trinco Dialogue Maritime Symposium 2013
concluding remark of the symposium was delivered by the then JNSC Coordinator Captain (I)
HGUD Kumara, USP, psc, B Sc (DS).
4.
Under the able guidance of the Commandant Naval and Maritime Academy, the
Directing Staff of Junior Naval Staff College once again will be conducting the third Trinco
Dialogue 2013 which is scheduled to be held on 07th January 2014 at Admiral Wasantha
Karannagoda Auditorium, Eastern Naval Command, Trincomalee. The Commander Eastern
Naval Area Rear Admiral AR Amarsinghe, RSP, USP, psc will be the Chief Guest. He will also
deliver the key note address following the opening remarks by the Commandant Naval and
Maritime Academy, Commodore USR Perera, RSP, USP, psc.
5.
Trinco Dialogue 2013 will have four sessions with two papers in each session. The theme
of Trinco Dialogue 2013 is ―Combating Maritime Disorder in IOR through Collaborative and
Collective Response of Regional Navies‖. The first session of symposium will highlight the GeoStrategic and Geo- Political importance of IOR and Role of SLN in maintaining vigil in the IOR
thus making sea lines of communication safe for seafarers. The second session will cover the
aspects of Applicability of UNCLOS with respect to various maritime issues and various security
challenges and emerging trends in IOR. The third session will focus on the nuances of Maritime
Domain Awareness through collective approach of Regional Navies and Disaster Management
through collective response. Finally the fourth and final session will bring out the importance of
Naval Diplomacy in maritime security and an analysis of existing maritime initiative and way
ahead to achieve better synergy in combating maritime disorder.
3
Trinco Dialogue Maritime Symposium 2013
Editor-In-Chief
Commander (G) MHN Peries,RSP,psc,BSc (DS),MDS
Editor
Commander (IN) A K Singh, psc, MSc (DS), MSc (Telecom)
Editorial Committee
Commander (G) LC Vithanage, RSP,psn, MSc (WS)
Lieutenant Commander (NP) HMPSB Hitinayake
Lieutenant Commander (IT) KGCM Kariyawasam
Lieutenant (IT) AMDE Amarapathi
Graphics Work
LIT DMNS Dissanayaka
Steering Committee
Commodore USR Perera, RSP, USP, psc, MSc (DS)
Captain(C) NPW Amardasa, psc,DIDSS
Commander (G) MHN Peries,RSP,psc,BSc (DS),MDS
Commander (IN) A K Singh, psc, MSc (DS), MSc (Telecom)
Directing Staff Junior Naval Staff College
Commander (G) MHN Peries,RSP,psc,BSc (DS),MDS
Commander (IN) A K Singh, psc, MSc (DS), MSc (Telecom)
Commander (G) LC Vithanage, RSP,psn, MSc (WS)
Lieutenant Commander (L) RRKK Subasinghe,psc
Lieutenant Commander (NP) HMPSB Hitinayaka
4
Trinco Dialogue Maritime Symposium 2013
CONTENTS
Sr No
Description
Page
1.
Opening Remarks
2.
Keynote Address
3.
Concept Paper ―Trinco Dialogue Maritime Symposium 2013‖
4.
Programme ―Trinco Dialogue Maritime Symposium 2013‖
5.
Contributing of Sri Lanka Navy in Maintaining
Maritime Order in IOR
6.
Applicability of UNCLOS in Fighting Maritime Disorders
7.
Current Maritime Security Challenges and Emerging
Threats in IOR
8.
Maritime Domain Awareness in IOR and Collective Response by the
Regional Navies
9.
Disaster Management Through Collaborative Response
10.
Use of Naval Diplomacy and Maritime Security
11.
An Analysis of Existing Maritime Security Initiatives in Indian Ocean
Region and Way Ahead for Better Collective Response
12.
Concept Paper ―Trinco Dialogue 2012‖
13.
Maritime Domain Awareness: way Ahead for Sri Lanka Navy
14.
Integrated Defence Efforts to Enhance National Security
Application of Cloud Computing in Military Context
15.
Exploitation of Modern Communication Technology for
Efficient Management of Defence
16.
Communication Network Influence of Middle East Crisis to the
Indian Ocean Region
17.
Cyber Terrorism and its Implications to Low Intensity Operations Giving
Special Emphasis to Maritime Domain
5
Trinco Dialogue Maritime Symposium 2013
OPENING REMARKS
Commodore USR Perera, RSP, USP, psc, MSc(D&SS)
Commandant, Naval and Maritime Academy
Admiral Rohan Amarasinghe, Commander Eastern Naval Area, Professor Shantha
Hennayake, The Deputy Vice Chancellor of Peradeniya University, The Flag Rank Officers,
Senior Officers, Staff of Naval and Maritime Academy, Officers of JNSC Course No 11, Ladies
and Gentlemen. Good Morning.
It is indeed a great honor and a privilege to be at this podium as the Commandant, of the
Naval and Maritime Academy to welcome you all to the third edition of Maritime Symposium Trinco Dialogue 2013 organized by the JNSC of NMA. This symposium is brain child of the
present Commander of the Navy and on his initiation it was started on 28 November 2011. The
theme of the inaugural Trinco Dialogue was ―Identifying Maritime Challenges through a
Dialogue‖.
The second Trinco Dialogue was conducted on 27 October 2012 and theme of
symposium was ―Collaborative Maritime Security through Modern Technology to face global
issues‖ which was again a very successful event for NMA to be proud of. Apart from
enhancing domain knowledge of the officers and officer under trainees on the various relevant
aspects of maritime issues, one of the aim of these symposium is also to make the under trainees
understand the idea and art of arranging and conducting a symposium of this nature. The
symposium also provides opportunity to young officers in clearing their doubts on the issue of
maritime through discussion, participation and question and answer session.
Now coming to today‘s symposium which has been given theme of ―Combating
Maritime Disorder through Collective and Collaborative Response of Regional Navies‖.
Ladies and Gentlemen, The Indian ocean is the world‘s third largest and is significant in
conjunction East and the west, containing vital sea lanes that help feed some of Asia‘s largest
economies and vital logistic routes to west. Hence, the importance of the Indian Ocean has long
been clear as the powerful countries in the west who initiated their hunt for resources towards the
east by the means of imperialism since even before 14 th century. The sea lanes in the Indian
Ocean are considered among the most strategically important in the world where more than 80
percent of the world‘s seaborne trade in oil transits through Indian Ocean choke points.
Any disruption in traffic flow through these points can have disastourous consequences.
The disruption in energy flows in particular is a considerable security concern for littoral states,
as a majority of their energy lifelines are sea based. Since energy is critical in influencing geopolitical strategies of a nation, any turbulence in its supply has serious security consequences.
6
Trinco Dialogue Maritime Symposium 2013
Not only that Ladies and Gentlemen, It is well known fact that the Indian Ocean Rregion
is witnessing maritime disorders such as proliferation of small arms, piracy, human trafficking,
maritime terrorism and narcotics trafficking which in turn has direct bearing on the stability in
the region and pose great threat to Sea Lines of Communication in IOR.
Human trafficking and drug smuggling are major crimes that should be deterred
decisively in the Indian Ocean region. Human trafficking often take place in the south Asian sub
region where organized groups traffic asylum seekers and illegal immigrants by means of
disguised fishing vessels via Indian ocean in to countries like Australia, Japan and Europe
through Mediterranean sea. The Sri Lanka Navy has many practical experiences in the recent
past in this regard. Drug smuggling originates from countries like Afghanistan and Pakistan
where drug traffickers use modes of sea transport to traffic drug into the sub regions of the
Indian Ocean. Sri Lanka is one of the country affected in this issue as well.
Cooperation in anti-piracy, anti-smuggling, counter action for misappropriation of natural
resources, mutual support in the event of natural disasters and in search and rescue can build the
confidence necessary to forge common understanding and agreement on security and safety of
sea lanes and in the region as well.The past experience has shown that regional bilateral and
multilateral issues have taken priority over meaningful approach towards collective initiative to
mitigate and eliminate maritime disorder in IOR. We are also aware that Indian Ocean Region is
of great importance to Sri Lanka as it assumes important geo-strategic position in IOR.
Ladies and Gentlemen, in this context Sri Lank Navy will have to play a major role with
regards to the security of our ports and harbors and maritime security in the region considering
her strategically high valued position in the Indian Ocean and this could be achieved very
fruitfully through ―Collective and Collaborative Response of Regional Navies‖.Sri Lanka Navy
has been reaching out to the regional countries in the Indian Ocean through Naval Diplomacy in
terms participating in Multilateral Exercises such as Aman and Bilateral Exercise such as
SLINEX and various exchange training progarmmes. Sri Lanka‘s commitments to combat
maritime disorder are well proven by defeating LTTE. Further, initiatives such as Indian Ocean
Naval Symposium, Galle Dialogue and Milan etc provide a meaningful platform to exchange
views on various maritime security issues.
Well, Ladies and Gentlemen to broaden our horizon on various aspects of maritime
disorder and security we have eight speakers today who will be delivering their speech on variety
of Maritime subjects in Trinco Dialogue 2013. I am pleased to inform you that eminent speaker
Professor Shantha K Hennayake, Deputy Vice Chancellor of University of Peradeniya has
consented to be one of our guest speakers today. His vast knowledge on the complex subject of
Geo-politics and Strategy in IOR will definitely be very useful and valuable to all of us. Without
any further ado, may I now request our Chief Guest today, the Commander Eastern Naval Area
to deliver the Key Note address. Thank You.
7
Trinco Dialogue Maritime Symposium 2013
KEYNOTE ADDRESS
Rear Admiral AR Amarasinghe,RSP,USP,psc
Commander Eastern Naval Area
The Commandant Naval and Maritime Academy Commodore USR Perera, flag rank
officers, directing staff NMA, officer under trainees, ladies and gentlemen. The ―Trinco
Dialogue‖ as brought out by the Commandant was an initiative of Commander of the Navy to
provide an opportunity for officers especially young officers to understand the nuances of
maritime issues and also to instill the concept of discussion through seminar like this. Today
seminar which has very apt and relevant theme of ―Combating Maritime Disorder Through
Collaborative and Collective Response by Regional Navies‖.
Indian Ocean is possessed with vast natural resources, mineral, fish, marine products, oil
resource and natural gas. It also provide home to many choke points, such as the Straits of
Hormuz, Straits of Malacca, Lombok and the Sunda Straits. Any disruption in traffic flow
through these points can have devastating consequences. The disruption of energy flows in
particular is a considerable security concern for littoral states, as majority of their energy lifelines
is sea based. Since energy is critical in influencing the geopolitical strategies of a nation, any
turbulence
in its supply has serious security consequences.
The Indian Ocean Region is of great importance to Sri Lanka and it assumes strategic
significance due to the high volume of international trade transiting through the coast of our
nation. The strategic importance of the Indian Ocean and its political sensitivity makes it
necessary for all regional countries to have means of collaborative mechanism to ensure sea lines
of communication is open always and our coasts are safe from untoward activities. Home to a
third of the world‘s population, this politically tumultuous area contains many flash points of
world conflict. This region is witnessing an unprecedented proliferation of small arms, narcotics
trafficking, human smuggling, piracy and maritime terrorism which, in turn threaten the stability
of states and societies.
The regional navies have been engaging with each other in terms of training and naval
diplomacy through port visits but definitely there is lack of coordination when it comes to
synergizing of efforts to counter maritime disorder in IOR. Seminars such as Galle Dialogue,
Indian Ocean Naval Symposium and Milan are few meaningful gathering of representatives of
all the major players, but nothing has moved much in reality. Therefore a lot is needed to be done
through navy to navy cooperation to secure SLOCs and ensure safe and secure IOR through
maritime bonding. The Navy remains a very important instrument of diplomacy for the nation.
The contours of Navy‘s foreign cooperation are shaped by national interests, security
considerations and are in consonance with the foreign policies of the country. Towards this Sri
Lanka Navy envisioned the Galle Dialogue to encourage navies of the Indian Ocean Region to
8
Trinco Dialogue Maritime Symposium 2013
interact with each other and find common solutions to the maritime threats and challenges that
plagued the region. The methodology adopted is to constructively engage one another through
the creation and promotion of regionally relevant mechanisms, events, and activities.
The need of the hour for regional Navies is to proactively embark upon cooperative
programs such as establishing Joint Maritime Centers comprising Navies and Coast Guards at
important ports in IOR. This will enable rapid and coordinated responses to smuggling, piracy,
humanitarian disasters, illegal migration, environmental incidents and Search & Rescue
operations. These are the areas that require cooperation, coordination and would result in
optimum use of resources. These centers may also provide a venue for sharing of intelligence,
sharing of measures to protect ports & harbours.
Sri Lanka‘s fortunate geographic location, spanning the major sea-lanes of the world,
highlights the relevance of its role in ensuring the free flow of oil and commerce from the Gulf to
the Asia-Pacific region. Post eradication of terrorism from our shores, the Sri Lanka Navy can
now be the medium for peace, tranquility and stability in the Indian Ocean Region, across a wide
range of conditions and circumstances that one can envisage in peacetime.
One country can be more powerful in terms of military, wealth or in size. But unless that
country is a strong link in the regional integration process, the mere survival of that country is
questionable. As a region which is fast becoming the attention of the whole world by gradually
taking the center stage of the geopolitics, we can surely improve the regional security
cooperation and coordination of regional institutes. The regional integration need to focus on
building up a cooperative security dialogue and effective apparatus. The Indian Ocean Region
has a bright maritime future, if only we can use the collaborative and collective approach of
Regional Navies to our advantage.
I would like to thank all the participants including invitees from outside organizations for
their valuable presence at this seminar for instilling confidence and courage in the junior officers
who actively participated as part of their training which is organized by Junior Naval Staff
College, NMA.
Finally, I hope that the presentations and discussions that will be deliberated today will
be harbinger in broadening horizon of all audience on the subject of maritime issues and will be
instrumental in building foresight and needs in different level in future. Thank you.
9
Trinco Dialogue Maritime Symposium 2013
CONCEPT PAPER
“TRINCO DIALOGUE MARITIME SYMPOSIUM 2013”
COMBATING MARITIME DISORDER IN IOR THROUGH COLLABORATIVE
AND COLLECTIVE RESPONSE OF REGIONAL NAVIES
1.
With an area of 74 million square kilometres and about 20 per cent of the global ocean,
the Indian Ocean is the third largest ocean after the Pacific and the Atlantic. As it strides the two
bigger oceans, it serves as a natural "passage " for most of the traffic from the Atlantic to the
Pacific and vice versa. Atlantic and the Pacific are "open" oceans however; the Indian Ocean can
only be accessed through several choke points. From the West via Cape of Good Hope and the
Straits of Madagascar and from the North via the Bab-el-Mandeb at the end of the Red Sea and
the Straits of Hormuz at the exit of the Persian Gulf, from the East via the Straits of Malacca, the
Sunda and Lombok.
2.
The Indian Ocean Region is witnessing an unparalleled maritime disorder such as
proliferation of small arms, piracy, human trafficking, maritime terrorism and narcotics
trafficking which in turn threaten the stability in the region and pose great threat to Sea Lines of
Communication in IOR. There has been a steady growth of newer and non-conventional
challenges in recent years. The strategic importance of the Indian Ocean and its political
sensitivity makes it necessary for all regional countries to have a collaborative and collective
response to combat this menace.
3.
However past experience has shown that many regional bilateral/ multilateral issues
posed hindrance to a meaningful approach towards collective initiative to mitigate and eliminate
maritime disorder in IOR. This is because of diverse and challenging internal as well as bilateral
issues such as nationalism, religious rivalries and the after effects of colonisation or competition
for military, strategic, political or economic scenario of the region.
4.
The Indian Ocean region is of great importance to Sri Lanka as it assumes important geostrategic position in IOR. Through Naval diplomacy, Sri Lanka Navy has been reaching out to
the countries in the Indian Ocean. The regional Navies have also off late embarked on a series of
bilateral and multilateral exercises and forging partnerships with countries across IOR. Sri
Lanka‘s commitments to combat maritime disorder are well proven by defeating LTTE. Further,
initiatives such as Indian Ocean Naval Symposium. Galle Dialogue and Milan etc provide a
meaningful platform to exchange views on various maritime security issues. But there are more
to be done to achieve synergy of effort and optimal utilisation of resources within regional
Navies to ensure that Sea Lines of Communication in IOR is unhindered and safe for all and this
call for collaborative and collective response from all regional Navies.
10
Trinco Dialogue Maritime Symposium 2013
PROGRAMME
“TRINCO DIALOGUE MARITIME SYMPOSIUM 2013”
“COMBATING MARITIME DISORDER IN IOR THROUGH COLLABORATIVE AND
COLLECTIVE RESPONSE OF REGIONAL NAVIES”
TIME
0815
0830
ACTIVITY
Arrival of participants
Arrival of Chief Guest and Opening Ceremony
INAUGURAL SESSION
0840
0845
0850
Welcome remarks by Lieutenant Commander (ND) AMBGTM Thilakaratna,
BSN(MW)(Hons)
Opening Remarks by Commandant Naval and Maritime Academy
Commodore, USR Perera, RSP, USP, psc, MSc(D&SS)
Key Note Address by Commander Eastern Naval Area
Rear Admiral, AR Amarsinghe, RSP, USP, psc
SESSION ONE
0900
Introduction of first Moderator
0905
Introduction of first speaker by the Moderator
Moderator: Lieutenant Commander (ND) HMWM Thilakarathne,
BSN(MW)(Hons)
0910
Paper by Professor Shantha K Hennayake
Deputy VC of University of Peradeniya
―Historical Perspective of Geo-Strategic and Geo- Political Importance of IOR‖
0925
Introduction of second speaker by the Moderator
0930
Paper by Lieutenant Commander IG Dharmasiri,BSc(NS)
Student Officer of Junior Naval Staff College
―Contribution of SLN in Maintaining Maritime Order in IOR‖
11
Trinco Dialogue Maritime Symposium 2013
0945
Discussion
0955
Final comments and summary of two papers by first moderator
SESSION TWO
1000
Introduction to second Moderator
1005
Introduction of third speaker by the Moderator
Moderator: Lieutenant Commander (NP)BRSB Gunarathne,BNS (LW)
1010
Paper by Lieutenant Commander (G) JMPS Jayawardana, RSP,BNS
Student Officer of Junior Naval Staff College
―Applicability of UNCLOS in Fighting Maritime Disorders and
Recommendations‖
1025
Introduction of fourth speaker by the Moderator
1030
Paper by Captain(I) HGUD Kumara,USP, psc, BSc(DS)
Head of Training Team (Naval Wing), DSCSC Batalanda
―Current Maritime Security Challenges and Emerging Threats in IOR‖
1045
Discussion
1055
Final comments and summary of two papers by second Moderator
1100
Refreshments
SESSION THREE
1120
Introduction of third moderator
1125
Introduction of fifth speaker by the Moderator
Moderator: Lieutenant Commander (S) LHNS Kumara, BNS,MAC
1130
Paper by Lieutenant (ND)HPK Nanayakkara,RWP,RSP,BSc(DS)
Student Officer of Junior Naval Staff College
―Maritime Domain Awareness in IOR and Collective Response by the Regional
Navies‖
1145
Introduction of sixth speaker by Moderator
12
Trinco Dialogue Maritime Symposium 2013
1150
Paper by Commander (ND) SR Rupasena, RWP,RSP,psc,PG Dip in S&DS, BSc
(DS)
Directing Staff -DSCSC Batalanda
―Disaster Management Through Collaborative Response‖
1205
Discussion
1215
Final comments and summery of two papers by third moderator
SESSION FOUR
1220
Introduction to fourth Moderator
1225
Introduction of seventh speaker by the Moderator
Moderator: Lieutenant Commander(C) JPG Lakshitha
1230
Paper by Commander (G)SP Kathriarachchi,RSP,psc,BSc (DS) (Hons)
Executive Officer, SLN Dockyard, Trincomalee
―Use of Naval Diplomacy and Maritime Security‖
1245
Introduction of eighth speaker by the Moderator
1250
Paper by Lieutenant Commander (CDO) KDR Weerasekara, RSP
Student Officer of Junior Naval Staff College
―An Analysis of Existing Maritime Security Initiatives in IOR and Way Ahead for
Better Collective Response‖
1305
Discussion
1315
Final comments and summary of two papers by second Moderator
1320
Concluding Remarks of ―Trinco Dialogue 2013‖
Commander MHN Peiris,RSP, psc, BSc (DS) Mech Eng, MDS
Deputy Training Commander & Coordinator, Junior Naval Staff Course
1325
―Trinco Dialogue 2013‖ conclude and departure of Chief Guest
13
Trinco Dialogue Maritime Symposium 2013
CONTRIBUTION OF SRI LANKA NAVY IN MAINTAINING
MARITIME ORDER IN IOR
LCdr IG Dharmasiri,BSc(NS) India
Student Officer of 11th JNSC
ABSTRACT
1.
The 21st century is the century of the sea which has become the world‘s second living
domain. Today‘s increasing globalization further highlights the importance of the sea for
mankind‘s survival and development. The Maritime order at sea ensures the safety and security
of shipping and permits countries to pursue their maritime interest and develop their marine
resources in accordance with agreed principles and international law. Threats to maritime order
at sea include piracy, maritime terrorism, illicit trafficking in arms and drugs, human smuggling,
marine pollution, illegal fishing and marine natural hazardous.
2.
In order to maintain the maritime order in IOR it is required to identify the role of the Sri
Lanka Navy. Navy continues to function on a triangular grid with the military role underpinning
two complementary roles - the politico-diplomatic and constabulary. In addition a new role in
terms of the benign application of maritime power has been added as a recognized fourth role.
The role of the Sri Lanka Navy, in this increasingly interdependent and globalized world, will be
as much dictated by internal requirements as it will be, by the compulsions of the outside world.
3.
Port security is one of the most complex things to control and coordinate. Colombo is
handling annually 30.9 million tons of cargo The port‘s capacities are dramatically increasing
with the $1.2 billion expansion project. Sri Lanka Navy is contributing much more to function
effective Coast Guard around the coastal belt. The SLCG in this respect has the much wanted
legal authority through its Act. This legal backbone and authority makes it the only formidable
law enforcement element out at sea who can take actions against those who engages in activities
that harm the marine environment.
4.
Today Sri Lanka Navy is carrying out SAR mission to
rescue disabled fishermen out
at sea. In that case Navy despatch major vessels as well as fast attack crafts in immediate nature
to save their lives. In fact Sri Lanka Navy has rescued not only local fishermen but also foreign
nationals also. Sir Lanka established Maritime Rescue Coordinating Centers to support in SAR
mission in the region. SLN had conducted series of sea borne SAR exercise with regional
Navies, especially Indian, Pakistan, Japanese and Bangladesh Navies. As a recent development
SLN has recovered hundreds of illegal immigrant who were hopeless out at sea due to their
unsecured means for fleeing the country via sea.SLN is part of the entire big operation in the
Indian Ocean nation to look for piracy and SLN is concentrating on certain areas closer to the
western frontier of Sri Lanka.
14
Trinco Dialogue Maritime Symposium 2013
5.
Sri Lanka Navy is most experienced navy in the IOR as far as the fighting against
maritime terrorism is concerned. This enormous experience and strategies are sharing with
regional navies today by training and conducting awareness programs for them. During the
recent past era Sri Lanka Navy arrested over 2,000 illegal immigrants to Australia with the large
number of fishing boats. SLNS intelligence network is doing tremendous contribution to locate
major human smugglers within the country with collaboration with the international community.
6.
Being an island nation there is huge vulnerability to become a platform for the
international drug smugglers at present. Therefore efforts have been taken by the Navy with the
assistance of SLCG to detect such persons in both sea and land. As strategic and geographical
location a major SLOC is running just few miles away from the Southern tip of Sri Lanka. Due
to this inherited opportunity Sri Lanka Navy is extending grand scale
contribution towards
this regards by deploying Naval vessels and craft in Southern sea. Further it is merely fuelled by
providing onboard security teams.
7.
IOR is rich of hydro carbons fossils, natural gasses and variety of mineral resources. The
exploration of sub soil oil and natural gasses is started in Sri Lanka and preliminary studies are
ongoing over Gulf of Mannar region and Southern coastal seas. In that process the Navy is
contributing much on providing resource personnel and seaward security in grand scale.Sri
Lanka need to have a good governance on maritime interests along with effective supervision
and regulation of existing laws and regulations. Monitoring of international shipping in relation
to the law of the sea in wide area of Sri Lankan waters cannot be exercised alone by the SLCG as
a developing body.
8.
The interests of regional states on the ocean increasing due to the world trade
transported by international shipping which forms marine links at global levels. There are
many challenges hindering enhancement of maritime order in the region.The cohesiveness and
mutual understanding with regional Navies and organizations is timely valued and momentous.
Therefore, in order to evaluate the contribution of the Sri Lanka Navy in a local as well as a
global context, a brief examine of the prevailing frame of reference is essential.
15
Trinco Dialogue Maritime Symposium 2013
APPLICABILITY OF UNCLOS IN FIGHTING MARITIME DISORDERS
Lieutenant Commander (C) JMPS Jayawardana, RSP*, BNS
Student Officer of 11th JNSC
ABSTRACT
1.
The role of the sea has never been as important as it is today in all fields of human
activities including fishing, exploitation of mineral resources, transportation, energy production
and environmental protection. It is therefore vital to maintain peace and order on the seas and to
encourage the sustainable development of marine resources for the future of mankind. For the
past thirty years United Nation Conventions on Law of Sea (UNCLOS), which is often referred
to as the ―Constitution of the Sea‖, has been the mainstay in the efforts to achieve these
objectives.
2.
International shipping, trade and communication routes, as well as global peace, are now
under constant threat. As well as piracy and terrorism, the threats from smuggling and illegal
trade in drugs and weapons are also increasing. However, in modern times there has been a
significant geographical expansion, with serious consequences – death, material loss and
environmental pollution. Article 101 of the UN Convention on the Law of the Sea 1982 defines
the ‗piracy‘. In 2007-2008, the region overtook south-east Asia as the main region for piracy,
according to the International Maritime Organization (IMO).
3.
UNCLOS put an end to the legal disorder reigning in respect of the sea. In addition to the
existing maritime zones under national jurisdiction, UNCLOS established new regimes such as
those for straits used for international navigation, archipelagic waters and the exclusive
economic zone, and redefined the continental shelf within and beyond 200 nm. UNCLOS set up
an institutional framework for implementing its provisions. In addition to such existing
institutions as the United Nations, the Specialized Agencies and the International Court of Justice
(―ICJ‖), UNCLOS established the Commission on the Limits of the Continental Shelf, the
International Seabed Authority and International Tribunal Low of Sea (ITLOS) to ensure the
proper interpretation and smooth implementation of its complex provisions.
4.
UNCLOS established an innovative, complex yet flexible system of dispute settlement to
ensure the proper interpretation and efficient application of its provisions based on a delicate
balancing of divergent interests of nations. Part XV of UNCLOS gives States the choice of one
or more compulsory procedures leading to binding decisions; these procedural settings include
Authority and International Tribunal Low of Sea, ICJ and arbitration.
16
Trinco Dialogue Maritime Symposium 2013
5.
The marine pollution regulation and enforcement provisions of the United Nations
Convention on the Law of the Sea will be considered together. Like international law, marine
environmental law which marine pollution is a part of, derives its source from treaties, customs,
general principles of law and judicial decisions although its main source is international
conventions. The UNCLOS 1982 devotes its Part XII entitled, ―International Rules and National
Legislation to Prevent, Reduce, and Control Pollution of Marine Environment‖, to the
protection and preservation of marine environment by regulatory and enforcement measures on
marine pollution although UNCLOS is only one of the Conventions regulating the prevention
and protection of marine environment.
6.
There have been a problem relating the Illegal Unreported and Unregulated fishing
activities all over the world‘s EEZ. To name few, bottom trawling, use of illegal fishing nets and
use of explosives and poisons etc. It‘s the responsibility of the Navy to safe guard fishery wealth
of the country. The object and purpose of article 73, paragraph 2, read in conjunction with
article 292 of the Convention, is to provide the flag State with a mechanism for obtaining the
prompt release of a vessel and crew arrested for alleged fisheries violations by posting a security
of a financial nature whose reasonableness can be assessed in financial terms.
7.
From a Sri Lankan perspective illegal migration is committed mainly for economic
reasons. Terrorists may also be illegally migrating encouraged by their foreign networks and may
also be engaged in trafficking of their cadres across borders. Article 99 of UNCLOS, States that
Prohibition of the transport of slaves.
8.
UNCLOS is a symbol of global cooperation, compromise, and international law that was
more than 20 years in the making. But UNCLOS will need to evolve if it is to meet twenty-firstcentury challenges. In 1982, fishing fleets did not have the technology to trawl the middle of the
oceans. Our understanding of the ocean‘s crucial role in protecting against climate change was in
its infancy. The mineral riches of the ocean were not well understood.
17
Trinco Dialogue Maritime Symposium 2013
CURRENT MARITIME SECURITY CHALLENGES AND EMERGING
THREATS IN IOR
Captain HGUD Kumara,USP,psc,BSc (DS)
Head of Training Team (Naval Wing), DSCSC Batalanda
ABSTRACT
1.
The Indian Ocean has become a key strategic arena in the 21 st century. One reason is the
growth of the Asian economies and their increased need for raw materials, including energy from
the Middle East, to provide for their economic growth. But trade is a two‐ way street and we
have witnessed an increasing flow of Asian labour, capital, and consumer goods, particularly to
the rich countries of the Arabian Peninsula. In addition, the end of the Cold War and ongoing
crises in Iraq and Afghanistan have diminished the importance of the Atlantic Ocean and boosted
the importance of the Indian Ocean as a conduit for Western military supplies.
2.
The Indian Ocean, the third largest ocean in the world occupies approximately 20 percent
of the Earth‘s sea surface, covering a total area of 73.56 million square miles. It is bounded to the
north by the Indian subcontinent; to the west and northwest by the east African coast and
Arabian Peninsula, respectively; to the east by Thailand, the Malay Peninsula, Indonesia, and
Australia; and to the south by the oceanic margin with the Southern Ocean at latitude 60°S, the
northern limit of the area covered by the original Antarctic Treaty (1959). In addition, the Indian
Ocean encompasses several regional seas and sea areas: the Andaman Sea, the Arabian Sea, the
Bay of Bengal, the Great Australian Bight, the Gulf of Aden, the Gulf of Mannar, the Gulf of
Oman, the Laccadive Sea, the Mozambique Channel, the Persian Gulf, and the Red Sea.
3.
Travel across the Indian Ocean and passage from its waters into neighbouring seas is both
facilitated and potentially constrained by chokepoints. The seven key chokepoints in the IOR are
the Mozambique Channel, the Bab el Mandeb, the Suez Canal, the Strait of Hormuz, the
Malacca Straits, the Sunda Strait, and the Lombok Strait.
4.
While the IOR now features more prominently in the geopolitical interests and
commercial calculations of extra-regional powers such as the US, the European Union nations,
Japan, and China, regional states and non-state actors also increasingly influence regional and
global affairs. Indeed, regional developments now reverberate far beyond the Indian Ocean‘s
shores. Overall, the IOR represents the most politically troubled and potentially combustible area
of the world. In the beginning of 2013, a total of 142 political conflicts were recorded in the IOR,
representing more than a third of the 388 conflicts worldwide, including 12 of theworld‘s 20
wars, as well as an additional eight limited wars.
18
Trinco Dialogue Maritime Symposium 2013
5.
As a result, maritime security concerns have become more important. Maritime security
threats in the Indian Ocean ranges from the traditional through to the non-traditional. The
following might be identified as potential threats:
a.
The threat of major intra-state conflict.
b.
Terrorist attack against vulnerable points in the region, particularly offshore oil
and gas installations and other mining infrastructure.
c.
Non-traditional security threats, including the smuggling of people, arms and
drugs, illegal unreported and unregulated (IUU) fishing, and maritime natural disasters.
6.
Major Intra-State Conflict among states, including the major powers, has been eliminated
as a feature of the international system. However, shows of force by rising powers are likely to
become more common as their military capabilities expand. India and China would be the main
powers of concern in this judgment.
7.
Maritime terrorist attacks are a threat across the IOR due to the presence of extremist
groups. The terrorist attack in Mumbai in November 2008 showed the risks of terrorist attack
from the sea if coastal waters are not secure. Attacks on offshore facilities have occurred in the
past. Three offshore Iraqi oil terminals were attacked in the Persian Gulf in 2003 by explosiveladen speedboats are some of the examples.
8.
The security of chokepoints in the region – the Straits of Hormuz, the Bab‐ el‐ Mandeb,
and the Indonesian Straits – has become a matter of great strategic importance for all maritime
powers. Conflict in the Persian Gulf and piracy near Bab‐ el‐ Mandeb, due in part to the failed
state of Somalia, are two issues of concern.
9.
Maritime security issues, including the protection of sea lines of communication
(SLOCs), are paralleled by increasing importance of the broadband communication connections
between Asia, Europe, and the United States that are linked by undersea cables traversing the
Indian Ocean. Ensuring the future security of the sea lines and cable routes has now become an
issue for all the Asian powers. For many decades Britain, and more recently the United States
have taken responsibility for Indian Ocean sea line protection. Now India, Japan, China and
others will have to assess their own growing roles in future SLOC protection.
10.
The formidable expansion of Asian infrastructure projects is a new development that
gives increased importance to the Indian Ocean. New ports, airports, roads, rail systems, and
pipelines now traverse Asia from West to the East and are making access between the landmass
19
Trinco Dialogue Maritime Symposium 2013
of Eurasia and the Indian Ocean littoral much easier. This, in turn, will generate greater
commercial traffic and the possibility for greater strategic competition.
11.
Non-traditional maritime issues in the Indian Ocean region are now on the agenda.
Forced migration due to rising sea levels and polluted sea water is a problem that all Asian
countries have to take seriously in the years ahead if global warming continues. This is paralleled
by growing desertification in East Africa leading to food shortages, which in turn would increase
migration, much of it illegal. And fishery depletion in the Indian Ocean due to poor monitoring
and over‐ fishing has become a serious matter that the international community must address.
12.
Marine natural hazards arise through climate change, tropical storms, tsunamis and
other severe oceanic conditions. Southeast Asia and other parts of the IOR are prone to these
hazards, and scientific findings suggest that the intensity and frequency of disasters arising
from these hazards is increasing.
13.
In order to mitigate the maritime security concerns in the IOR followings are broadly
identified:
a.
Inter-dependence and inter-operability among potential agencies is a crucial
means to ensure the effective use of resources.
b.
In order to effectively exercise authority in the area of jurisdiction by a maritime
force, the necessary legal instruments needs to be in place.
c.
Information sharing among maritime forces have never been this effective since
the model of ReCAAP was established by the South Eastern states to curb the piracy in
the Strait of Malacca. Formation of the Djibouti Code of Conduct (DCoC) states in
January 2009, adopted the ReCAAP model to repress piracy and armed robbery against
ships in the Western Indian Ocean via effective information sharing. Although
information sharing is one vital pillar of the Code, it was the most effective means for
creating maritime domain awareness for most small states.
20
Trinco Dialogue Maritime Symposium 2013
MARITIME DOMAIN AWARENESS IN IOR AND COLLECTIVE RESPONSE BY THE
REGIONAL NAVIES
Lt (ND) HPK Nanayakkara RWP, RSP*, BSc(DS)MTS
Student Officer of 11th JNSC
ABSTRACT
1.
Maritime Domain Awareness is all about generating actionable intelligence, the
cornerstone of successful counterterrorist and maritime law enforcement operations. The
challenges facing Naval and Coast Guard forces have changed dramatically over the past decade
and make the future security environment increasingly complicated and uncertain. That shows
terrorists will exploit access to our open society, economy, and commercial systems to bring
about damaging and potentially catastrophic effects on our homeland.
2.
With a more globally connected economy and our nation‘s continued reliance on the
global maritime environment for trade and commerce, ensuring a safe and secure maritime
environment is critical to national security and economic.
3.
An emerging set of diverse, increasingly networked adversaries pose security challenges
every bit as threatening as if confronted by a peer adversary. Whereas the enemies of yesterday
were predictable, homogeneous, rigid, hierarchical, and resistant to change; today‘s enemies are
dynamic, unpredictable, diverse, fluid, networked and constantly evolving. They benefit from the
many technologies and materials that are readily available for sale on the world‘s illicit markets
to disrupt systems and fabricate weapons of mass destruction (WMD). These enemies do not
operate on conventional battlefields, but thrive in weak states and gray areas where terrorists ride
the back of transnational crime.
4.
To counter the multitude of threats presented by these conditions, we must deny our
adversaries the use and exploitation of the maritime environment, including its transportation
systems. The first step toward enhancing Maritime Security is achieving increased awareness of
activities in the maritime domain.
5.
To achieve increased awareness, the Coast Guard, in partnership with the Navy and other
agencies, is developing an initiative called Maritime Domain Awareness (MDA). The Navy has
achieved MDA for years at the tactical level to dominate areas surrounding Carrier and
Expeditionary Strike Groups, but in the context of the global war on terrorism (GWOT), MDA
takes on a strategic dimension.
6.
MDA is the collection, fusion and dissemination of enormous quantities of data,
intelligence and information, drawn from international coalition partners and forces, and
commercial entities. Eventually, the depth of information collected from these various sources
21
Trinco Dialogue Maritime Symposium 2013
will be weaved together to enrich a comprehensive common operating picture (COP) that is
envisioned to be fully distributed among users with access to data that is appropriately classified.
7.
The purpose of MDA is to generate actionable intelligence. Without actionable
intelligence, counterterrorist or maritime law enforcement operations are seldom fruitful. With it,
the range of options available to Navy and Coast Guard forces expands significantly to permit
much more effective investigation and interdiction of potentially threatening vessels, either
overseas. Additionally, MDA acts as a key enabler for other critical security measures, such as
the Proliferation Security Initiative, Container Security Initiative, counter-narcotic operations,
and anti-piracy patrols. Response options available range from intensified surveillance and
tracking, to Expanded Maritime Intercept Operations (E-MIO), to the application of lethal and
non-lethal force, if necessary.
8.
The Navy and Coast Guard will have defined MDA to be the effective understanding of
anything associated with the global maritime environment that could impact the security, safety,
economy or environment of the country.
9.
The Navy, with its significant maritime intelligence, collection, fusion and dissemination
capabilities, plays a leading role within the Defense Department for developing MDA and
orchestrating the process by which information is shared with coalition partners, and other
agencies and departments of the IOR countries. Sharing information is absolutely essential if this
growing network is to effectively detect, identify and track the most dangerous threats, including
terrorists, WMD, narcotics, piracy, mass migrations, and arms traffickers. Awareness generated
through information sharing will enhance understanding of the global maritime environment,
including adjacent ungoverned areas in which terrorists operate, thereby providing opportunities
to deal with threats as far away from IOR countries.
10.
MDA consists of two key components: information and intelligence. These components
will combine in the COP to create a substantive, layered presentation of the global maritime
environment. Numerous governmental and military organizations already possess a COP of some
sort; however, no one source captures all of the maritime information needed or currently
available.
11.
The challenge will be to effectively integrate and fuse the various inputs to achieve the
synergies offered by a comprehensive situational awareness picture, while being responsive to
the information needs of participating agencies. Through the COP, specialists will eventually be
able to monitor vessels, people, cargo and designated missions, areas of interest within the global
maritime environment, access all relevant databases, and collect, analyze and disseminate
relevant information. Efforts are underway to determine the capabilities existing COPs have to
accomplish these tasks and to assess the complexity of integration. For the foreseeable future,
technological and fiscal constraints will not support global tracking of every vessel, nor would
doing so be useful in of itself. Based on fused data, intelligence and information, the most
22
Trinco Dialogue Maritime Symposium 2013
threatening vessels will receive priority cueing in order to focus our assets in the right areas. As
better, less expensive solutions are developed; we can improve our ability to achieve maritime
transparency.
23
Trinco Dialogue Maritime Symposium 2013
DISASTER MANAGEMENT THROUGH COLLABORATIVE RESPONSE
Cdr(N) SR Rupasena,RWP,RSP,psc,PG Dip in S&DS,BSc (DS)
Directing Staff- DSCSC
ABSTRACT
1.
The Indian Ocean Region (IOR) covers almost one seventh of the earth‘s surface. The
strategic importance of the Indian Ocean (IO) has been discussed in length and it is clearly
evident that the importance is attracting increased attention from world around. The Countries
and Regions in and around the Indian Ocean constitute around 50 states with a total land-area of
33 million sq. km. These states and regions accommodate about 2.6 billion or 39% of the global
population. The Indian Ocean occupies about 20% of the total ocean area of the world which
covers a total of 73,427,000 sq .km of the globe stretching from East-Africa to west-Australia- a
distance of about 6,400km or 4000 miles from west to east and from south Asia to Antarctica in
North-South Orientation. Safety and security of the Indian Ocean and its littoral states remain
critical for economical sustainability of countries and well being of the population due to various
reasons. Among these issues, disasters pose a huge threat to the stability of the region caused by
both on conventional and non-conventional forms. The IOR is often called the ―World‘s Hazard
belt‖ which is subjected to floods, droughts, cyclones, earthquakes, tidal surges, landslides,
tsunamis etc. According to an ESCAP report (UN Economic and Social Commission for Asia
and Pacific) (1995) around 50% of the global natural disasters occurring in this region and these
hazards incorporate mostly the climate and seismic (tectonically) disasters. The IOR has found
many organizations set-up for managing disasters sub-regionally, but yet to realise a
collaborative mechanism for whole region to ensure security of the people, which has become an
important obligation too, as a region.
2.
In addition to the natural disasters discussed above, IOR has been turning out to be
vulnerable to set of added non-traditional adversities. Natural disasters originated from global
climatic changes, threat posed by both nuclear states (India, Pakistan, Iran, etc.) and states
embarking nuclear power in near future (Vietnam, Thailand, Indonesia, Malaysia and
Singapore), disasters associated with main Sea Lanes of the Indian Ocean in consequence to
possible oil spill at mass scale, piracy against Cruise Liners carrying thousands of passengers, as
well as search and rescue operations on distress ships and boats which are carrying passengers or
refugees can simply be expected. These configurations of possibilities posed by traditional and
non-traditional causes claim a comprehensive approach towards mitigation and management of
disasters in the IOR.
3.
The IOR bears great geo-political, geo-economical, geo-strategically as well as geoenvironmental significance and importance. In this Oceanic region eight peripheral subsystems
24
Trinco Dialogue Maritime Symposium 2013
(Indian Ocean sub-systems) have developed. These are : i) South-east Asian, ii) South Asian, iii)
Central Asian, iv) Persian Gulf, v) Horn of Africa vi) Eastern African vii) Southern African, viii)
S.W Indian Ocean Island and ix) Southern Island and EEZ. These sub-systems possess number
of sub regional and pan-regional institutions which have been established to take care of security,
scientific, social and economic affairs in the region including managing emergencies and
disasters. Amongst them number of prominent regional actors engage in disaster managing
activities while global actors like United Nations (UN) and International Committee of Red
Cross (ICRC) too attend in various capacities.
a.
ASEAN (Association of Southeast Asia
b.
SAARC (South Asian Association for Regional Cooperation
c.
APEC (Asia Pacific Economic Cooperation
d.
LAS (League of Arab States
e.
AU (African Union)
f.
UNDRO (United Nations Disaster Relief Organisation) and UNISDR (United
Nations International Strategy for Disaster Reduction)
4.
The increased frequency and wider scope of natural and human made disasters during last
decades, made it clear that traditional emergency, crisis and disaster management tools have
been proved to be inefficient. Many dreary areas of the systems have reflected during the disaster
management processes attained in the fast. Factors of financial crisis, strategic alliances with
super powers/regional powers and national security strategies pose reasonable challenges
towards a common work plan combating emergencies and disasters. There are many
observations can be obtained from recent past where, in-proper approach towards emergency
management shows not only a misuse of resources but also fail to spot opportunities rescuing
affected people.
5.
IOR spreads over a larger area connecting relatively big number of dynamic sub-regions
peripheral to Indian Ocean. Sub-regions possess their own arrangements of managing
emergencies and responding disasters at various levels depending on regional capacities.
Looking at widespread challenges faced by the region it would be an ignorance of opportunity if
the resources are not shared among sub-regions, as well as miscalculating strategic importance
Indian Ocean. This stance demands higher degree of corporation and collaboration among
regional actors on their common endeavors. In this regard, traditional approaches characterized
by many factors need to be replaced by decentralized emergency management system.
Coordinating the diverse capabilities of technology, logistic and human resource of individual
countries and sub-regional institutions in the IOR, it can easily gain superior capacity to face any
eventuality. This change is especially fostered by the need to collaborate during response to, and
recovery from extreme events of catastrophic disasters.
25
Trinco Dialogue Maritime Symposium 2013
USE OF NAVAL DIPLOMACY AND MARITIME SECURITY
Cdr (G) SP Kathriarachchi,psc,BSc(DS) Hons
Executive Officer SLN Dockyard
ABSTRACT
1.
The Indian Ocean comprising the third largest body of waters after the Pacific and
Atlantic is of crucial significance in view of the facts, firstly, that along its littoral it comprises
the largest chunk of the developing or third world countries, and secondly the area is not only
rich in mineral resources but contains within itself so many strategically significant waterways.
Referred to as a ―neglected ocean‖ few years back, the area has now become the hub of world
politics and a cockpit of potential regional and great power conflict. The world order has
changed in a manner where we no longer can confine ourselves only to discuss naval matters, but
about emerging trends in the ocean, within and outside Indian Ocean.
2.
The growing concerns for geo-political stability, preservation of freedom of the seas,
ensuring security in the IOR has embarked the regional navies on an apparently new voyage than
their traditional roles of ―Carrying guns to the sea‖. The concept of Gunboat diplomacy is quite
obsolete as there is no big advantage of such in a markedly asymmetric world order today. We
saw it during the SL war on terror and now in Somalia. The era of using force to tame the
culprits is far gone with dawn of the new trends in preventing the occurrence of war with
diplomatic means such as negotiation, dialogue, partnership, and even to the extent of offering
other aids which are dire needs of the potential aggressors.
3.
Described as the fulcrum of the Indian Ocean, Sri Lanka possesses unrivalled
geographical and other advantages. Sri Lanka Navy has been very keen in maintaining peace and
good order in the IOR especially through diplomatic visits, dialogue, joint training/ exercises and
cooperative response. Sri Lanka‘s geographical situation being located very near to the Indian
peninsula and along the North and South centre line of the Indian Ocean and lying in the East
West trade routes has superimposed more prominence to this Island Nation than its regional
counterparts including the fact that SLNavy‘s victory over the most ferocious and organized
Maritime Terror outfit, the Sea Tigers.
4.
Diplomacy is distinguished from the broader idea of foreign policy in the sense that,
"diplomacy involves means and mechanisms ...(including] the operational techniques whereby
a state pursues its interests beyond its jurisdiction. Naval diplomacy is widely believed to have
26
Trinco Dialogue Maritime Symposium 2013
provided maritime powers with an effective tool of deterrence and coercion. But in the Sri
Lankan context Naval Diplomacy has been a very useful and important tool to handle the foreign
relations of Sri Lanka. SLN is not a very formidable force in the region in terms of its Naval
Capabilities despite the fact that it has compliment relatively larger than many regional navies.
Formed largely on British style with a history of over 60 years SLN has been very instrumental
in preserving or even generation of goodwill between Sri Lanka and other countries especially in
the IOR. The classic example is the winning hearts and minds of the Australian government by
swift and Effective Corporation to curb the illegal migration from SL to Australia. This not only
resulted in getting more naval aides but altered the course of the Australian political opinion with
regard to the Post war allegations against Sri Lanka.
5.
Maritime security is concerned with the prevention of intentional damage through
sabotage, subversion, or terrorism. Hence assurance of safety to maritime elements of a country
from any kind of aforesaid aggressions by a state sponsored or non-state party‘s action is the
main concern for any naval force in the world today. Thus maritime security in the IOR is
complicated due to the vastness of the region, political and economic instability and differences
of the littoral states of the IO and the diversity of non-state actors present in the region at any
given time. Hence a country like Sri Lanka seeks to mitigate the situation by using Naval
Diplomatic means which not only help assure security in the region but also improve multilateral
relationships with the other Indian Ocean nations.
27
Trinco Dialogue Maritime Symposium 2013
AN ANALYSIS OF EXISTING MARITIME SECURITY INITIATIVES IN INDIAN OCEAN
REGION AND WAY AHEAD FOR BETTER COLLECTIVE RESPONSE
LCdr KDR Weerasekara, RSP
Student Officer of 11th JNSC
ABSTRACT
1.
The ocean connects various countries of the world closer together. The development of
nations, the welfare of peoples, and the advance of societies are all closely bound up to oceans
and seas. The current security situation in the maritime domain is generally stable around the
world today, but we are still faced with various maritime security problems of a global nature.
Traditional and non-traditional security threats are interwoven, constantly constituting
challenges, and the situation is far from optimistic. Security mutual-trust is still lacking between
some maritime countries, which has resulted in suspicion and confrontation; Disputes over island
sovereignty and maritime delineation are still lingering; Piracy is far from eradicated, threatening
international shipping safety; Weapons & drugs smuggling, human trafficking and other illegal
activities are rampant, damaging legal orders of the sea; Natural disasters and maritime accidents
are frequent, causing severe casualties and property losses; Marine pollution is serious and the
environment is damaged; Climate change and global warming have resulted in the rise of sea
level, even endangering the existence of some coastal and island countries. The amelioration and
solving of all these issues depends on the concerted efforts of all countries!
2.
The overwhelming majority part of the oceans are public domain in nature. Maintaining
maritime peace, security and stability and promoting its development and prosperity conform to
the common interests of all countries. It is the responsibility of the navy, as the international and
sea-borne armed force, to restrain, reduce and remove maritime security threats and to
effectively respond to maritime security challenges.
3.
In such background, the analysis of this is to justify the necessity of existing maritime
security initiatives with the nations interest and identification appropriate development for the
future. This analysis emphasis that, political will and regional cooperation and work together
with them for better collective response.
28
Trinco Dialogue Maritime Symposium 2013
29
Trinco Dialogue Maritime Symposium 2013
CONCEPT PAPER
“TRINCO DIALOGUE MARITIME SYMPOSIUM 2012”
COLLABORATIVE MARITIME SECURITY THROUGH
MODERN TECHNOLOGY
1.
Post war Sri Lanka is presented with undeniable broader responsibilities of
reconciliation, rehabilitation and economic development. Ironically, despite its overwhelming
military feat over the ―Terrorist outfit LTTE‖, the island nation has been subsequently softened
with a multitude of challenges both locally and internationally.
2.
Security over the global terrorism is not merely a responsibility of a single party or a
nation. Globalization forms free flow of people, goods, capital and idea across borders as well as
terrorism. Sri Lanka being an island nation, geopolitically located in a strategically high valued
position in the Indian Ocean. It is imperative that we maintain the security of our ports, harbours
and sea lines of communications so as to ensure a high level of professionalism is displayed by
the navy countering emerging contemporary maritime threats. Maritime Security must, therefore,
address a broad spectrum of concerns and situations, not only with respect to these friction
points, but also many natural and human threats that we face today. These threats include natural
disasters, climate change, trans-national crime, use of the seas to facilitate proliferation of
weapons of mass destruction, misappropriation of natural resources etc. Recognizing this mass of
challenges at strengthening maritime security, most of the maritime forces believe that new
developing technologies are critical at ensuring the long term safety and of the maritime domain.
3.
Therefore, the way Sri Lanka counter aforesaid issues in the Indian Ocean Region
through regional co-operation and the way we are facing the future with new technology is
paramount important and must address with broad spectrum of concerns.
30
Trinco Dialogue Maritime Symposium 2013
MARITIME DOMAIN AWARENESS: WAY AHEAD FOR SRI LANKA NAVY
Commander (ND) R JOSEPH,
RSP, psc, BSc (DS)
Sri Lanka Coast Guard Department
1.
Year 2009 remain as one of the most important landmarks in our country‘s history. The
defeat of LTTE terrorism and eradication of the ruthless terror outfit from our land and seas even
made history in the world, by becoming the first ever country to successfully defeat a terror
outfit of this nature. The seas around the country as well as the Indian Ocean as whole were
declared free from the LTTE threats and its fear fixation which was capable of painting a
threatening image of Sri Lanka internationally.As at today we do not have an enemy in our
waters who would challenge our capabilities, strengths, weaknesses and even our strategies and
tactics to really measure where we stand in terms of our military readiness.
2.
Despite the fact that we have defeated the LTTE maritime terrorism, the maritime
security aspect in anyway cannot be kept aside assuming that we have total control of our seas.
As the national security of a country is directly linked with the maritime security component, a
greater deal of attention required to be paid in making our seas ‗bullet-proof‘ even for the
slightest security challenge or threat.
3.
In this regard, the Sri Lanka Navy (SLN) has a greater obligation and a role to play in
protecting the seas around us. One looking at the past would argue that the reasons which led to
the development of LTTE terror organization is mainly due to the fact that less concentration and
attention that was given to the importance of ‗maritime security‘. The repercussions of this very
fact were very much visible and we have enough evidence to prove this very fact by simply
looking at the development of the LTTE terror organization in its three decade odd conflict.
4.
One major area which led the LTTE to develop into such a formidable terror outfit is
mainly due to the lack of awareness the country as whole had on our ‗Maritime Domain‘.
31
Trinco Dialogue Maritime Symposium 2013
Understanding the importance of having a greater amount of awareness about our maritime
domain, the SLN did initiate some measures aimed at improving the information gathering in our
waters. These attempts at the initial stages proved to be effective and subsequently the last few
years into the war especially with the LTTE maritime component brought us unprecedented
results in this regard.
5.
The technical knowledge of SLN, R & D projects and assistance from various countries
were some of the key pillars which helped the high ranking decision makers to see the much
important broader strategic maritime picture that was never there. This edge in the technology
that the SLN had during the crucial period of the war gave the whole conflict an unprecedented
advantage over the enemy. The SLN‘s ‗Maritime Domain Awareness‘ (MDA) which started
with mere positioning of Radars on strategically important locations as well as onboard naval
platforms progressed towards enabling the key decision makers to virtually see the ‗Battle
Picture‘ from the Command Operations Centre.
6.
Three years into winning the war, SLN has made significant progress in MDA and
technical experts continue to work in achieving a better MDA in years to come. SLN is presently
working towards establishing a greater information fusion with some of the key sensors such as
Automatic Identification System (AIS), X-Band RADAR, SONAR, Maritime Small Target
Tracker (MSTT), High Frequency Surface Wave Radar (HFSWR), Automatic Vessel Locating
System (AVLS) etc.
7.
Fusion of data that are mainly gathered through AIS and RADAR will result in reducing
the uncertainty and improving the quality of information that SLN receive. Two dimension (2D)
information representation mainly absorbed through AIS and RADAR have been further
developed by the SLN technical professionals to bringing in the three dimensional (3D)
Geographic Information System (GIS) going well beyond the 2D representation which result in
easy interpretation of fused information. Certain components of developments in the field of ‗3D
immersive virtual tele-presence for surveillance, maneuvering and planning‘ has been
successfully tested and proved highly efficient. Expanded, successful mapping of virtual world
with the real world will definitely bring SLN to a considerable status in the field of MDA with
certain other regional countries.
8.
Looking at our present maritime domain, one would see that we today encounter totally
different challenges and threats to that of what we faced before year 2009. Even though these
challenges and threats were present even prior 2009, we either ignored them or paid less
attention as we had a significant issue i.e. the LTTE maritime wing and its operations to be
countered at all cost. The changing maritime nature of our oceans need to be carefully analyzed
and looked in if we are to ensure that our seas are safe and secure. As the Government is
focusing on achieving sustainable development through various development projects and
32
Trinco Dialogue Maritime Symposium 2013
strategies, the importance of our seas have become significant than never before. In the present
context, we need to look beyond terrorism, armed robbery or even piracy.
9.
In this background, certain issues that are either less visible or less important in the
maritime domain has a higher probability of evolving into a greater maritime threat/disaster. An
oil spill from a ship that‘s closer to our shores can create a huge security impact if not contained
professionally and timely. On the same note, a ship that has already entered into our
ports/maritime zones can be practicing various illegal activities endangering our marine
environment. Even though we paid less attention to events of above nature during the time of
conflict, they are fast taking different shapes and emerging as challenges/threats. Impact of such
events can have devastating impacts both long term and short term.
10.
Such threats or challenges takes various forms and needed to be handled effectively if we
are to avoid further propagation which can lead to a dangerous situation. In a rapidly changing
scenario, emerging threats/challenges such as human smuggling, IUU fishing in Sri Lankan
waters, drug trafficking, SAR, marine pollution, protection/preservation marine species and
environment, oil/chemical spills, safety concerns of marine transportation etc. are some of the
key areas where the SLN need to be vigilant. If SLN is to be proactive, we require having a
broader understanding of what is taking place in our seas as well as in our internal waters.
11.
This is where we need to have a different approach towards MDA. Apart from the
developments that has taken place in developing our MDA capabilities and expected future
research work, this paper concentrate mainly on the strategic and tactical aspects that the SLN
need to look in having a near perfect MDA capability. In this context, the future of SLN‘s MDA
necessarily requires looking at some important aspects if we are to be proactive as the first line
of defence. In the MDA initiatives, SLN has a broader role to play apart from its naval role by
formulating the much needed ‗Strategic MDA Plan‘ (SMDAP) which would finally be the
nucleus of the much wanted ‗National Plan towards achieving MDA‘.
12.
The SMDAP will remain as the primary component of a much wanted active layered
maritime defence in depth which will be accomplished by improving our strengths in areas such
as collection, fusion, analyzing, displaying and propagating information and intelligence to
required elements. The SMDAP need to focus on promoting innovativeness in intelligence
collection (including MDA sub layer) and thereby fusion such with technical components. The
SLN will require establishing the ‗National MDA Centre‘ (NMDAC) which serves as the nerve
center of the entire plan.
13.
Achieving near complete awareness of the maritime domain will not be possible through
the available MDA applications. The mere purpose of research work that is being conduct at
present is to reach up the ladder of MDA and seek possibilities of what SLN R & D could come
33
Trinco Dialogue Maritime Symposium 2013
up with in the long run. Apart from what we develop in the MDA field, SLN require successful
integration with latest MDA applications to suite our requirement in the maritime domain. Use of
such latest technologies will maximize the near-real time awareness of the maritime threats that
are emerging in our waters.
14.
As MDA focuses mainly on information sharing, situational awareness and subsequent
planning will require having a Common Operating Picture (COP) established in the SLN which
will at the initial stages aim at sharing information between the key stakeholders in the country.
The subsequent phases will patch the much needed regional initiative and then focused towards
achieving Global Maritime Situational Awareness (GMSA) which is an integral part of MDA.
15.
Effective implementation of this SMDAP will undoubtedly require the sustainable effort
being put in by the SLN itself at the initial stages and assistance of other key stakeholders in the
subsequent phases. In the prevailing maritime environment around the seas of our country as
well as the region, layered defence concept will play a significant role. In this context, MDA will
be one of the leading factors. Apart from our own initiative and tactical innovativeness, if this
plan can be implemented, we could be hopeful of making sure that our seas are being used for
legitimate purposes and that no threat projects from the oceans around us in challenging the
national security.
34
Trinco Dialogue Maritime Symposium 2013
INTEGRATED DEFENCE EFFORTS TO ENHANCE NATIONAL SECURITY
LCdr (G) BARI Abeysekara BSc (NS),
Student Officer of 8th JNSC
INTRODUCTION
1.
The international security environment is dynamic and uncertain, with recurring disputes,
crises, and conflicts in many regions, and endemic conflicts in regions of particular importance
to the security of the Sri Lanka. Challengers and adversaries may be states or groups of states, as
well as non-state groups including terrorist, criminal, ethnic, religious, and special-interest
organizations.
2.
The Armed forces of Sri Lanka also have a long history of unconditional service in
military operations other than war that support broad national objectives including such areas as
participating in humanitarian relief efforts for victims of natural disasters in the Sri Lanka.
National security is among the fundamental national purposes that the Sri Lankan people
embedded in the constitution. Sri Lanka relies on the complementary application of the basic
instruments of national power; diplomatic, economic, informational, and military, for its security.
Under the framework of shared responsibilities set out by the constitution, it establishes specific
policies and strategies in order to preserve its values, to identify its interests, and to assure the
best use of its resources in advancing its interests and defending the security of the republic and
its citizens.
AIM
3.
Aim this paper is to study the salient aspects of integral defence efforts to enhance the
national security of Sri Lanka.
35
Trinco Dialogue Maritime Symposium 2013
PRESENT DAY CHALLENGES TO THE NATIONAL SECURITY
4.
The strategic environment is characterized by uncertainty, complexity, and rapid change
which require persistent engagement. This environment is fluid, with continually changing
alliances, partnerships, and new national and transnational threats constantly appearing and
disappearing.
5.
Firstly, it is imperative that we understand our common enemy which more often than not
will be terrorist groups and international organized crime networks - in other words violent non
state actors. The challenge to nation states being that the violence perpetrated by a majority of
these violent groups amounts to pure terrorism and what makes it frightening is that these violent
factions have greater access to lethal weaponry and advanced off the shelf technologies, than
ever before, giving them a more or less an equal fighting potential in the littoral battle space.
6.
It is generally acknowledged that the approach to national security requires a
comprehensive view of various political, social, economic, technological and strategic aspects.
National security implies not only safeguarding territorial boundaries but also that the nation is
able to build a cohesive, egalitarian, technologically efficient and progressive society with a
good quality of life. Defence policy is a subset of national security policy that concerned with the
protection of the state and its citizens from direct and indirect (proxy) military threats and actions
of other states. In defence planning, the emphasis shifts to national security concerns that are
mainly military in nature.
COMBINED OPERATION CONCEPT TO ADDRESS
THE NATIONAL SECURITY
7.
The nature of the challenges to the country and its interests in the contemporary security
environment demand that the Armed forces operate as a fully integrated joint team in combat and
noncombat operations. These operations often take place with forces of allies and coalition
partners, and with foreign governmental and nongovernmental nonmilitary agencies. The
challenges are best met when the unified action of the armed forces elicits the maximum effect
from the unique but complementary capabilities of each Service and command, and from the
synergy that results from their synchronized and integrated action.
8.
Most major military missions today require the participation of more than one military
service. Therefore, the principal concern now must be centered on what is required by the
defence establishment as a whole to perform a particular mission—not what is required by a
particular Service to perform its individual part of that ‗mission‘. The areas of commonality in
modern weapon systems are immense and growing rapidly. Communications, intelligence
systems, surveillance radars; even traditional equipment such as guns, fuses, ammunition and
36
Trinco Dialogue Maritime Symposium 2013
vehicles are common. Integrated defence planning is necessary in view of escalating costs of
these weapons and equipment.
9.
Security is no longer matter of military force alone, economic and ecological concern,
migration drug trafficking and non-military uses have become more salient in the security
agenda. Therefore, it is imperative to be aware of the potential benefits of civil-military
integration not only address to these issues but also to seek assistance to overcome technological
shortcomings and other problems plaguing its military industrial complex.
10.
Military leaders have fundamental responsibilities in developing national assessments of
the strategic situation. Specifically, in the system of civil-military relations, senior military
leaders provide recommendations on the feasible military options; resources required and
anticipated consequences of military action, and the military requirements for conflict
termination. They also are uniquely responsible for the military components of operation plans
developed in response to decisions prompted by national assessments of the strategic situation.
11.
Effectively integrated joint forces expose no weak points or seams to an adversary, while
they rapidly and efficiently find and engage those adversary weak points and vulnerabilities that
assure mission accomplishment. This does not mean that all forces will be equally represented in
each operation. Joint force commanders may choose the capabilities they need from the air, land,
sea, space, and special operations forces at their disposal.
12.
The solution advocated in this joint operating concept (JOC) involves a significant
cultural change that places greater emphasis on pursuing cooperative security that is balanced
with the need to maintain critical core military competencies. Today, joint actions are practiced
in the preliminary level. The key to enhancing and maintaining joint force effectiveness is the
military leader‘s diligence in studying, applying, teaching, and ultimately preparing joint
doctrine, which provides the foundation for joint warfare.
Integral Defence Planning
13.
Effective cooperative defence planning was not been practicing in Sri Lanka. This has led
to prompt in decision-making and adversely affected the modernization plans of the Services.
The key issues needing immediate attention include; the need for formal prior approval for
defence Plans, better management of the defence revenue and capital acquisition budgets,
streamlining of the defence procurement process and better human resources management. The
Ministry of Defence should appoint a group of eminent experts to study the present defence
planning process, identify the lacunae and grey areas in the process and recommend structural
and procedural changes. The aim should be to streamline defence planning, harmonize it with
37
Trinco Dialogue Maritime Symposium 2013
national development plans, and make the process more responsive in order to deal effectively
with the rapidly changing geo-strategic and regional security environment.
14.
Subjects like surveillance, air defence, electronic warfare, and amphibious operations,
which relate to more than one Service, do not get adequate attention. Integrated planning for
defence is essential for creating balanced force structures and for the successful execution of all
military missions. In fact, it is the most effective manner of ensuring effective defence.
15.
Defence planning should involve the conceptualization of plans and decisions for the
execution of defence policy. Long-term planning for defence is essential for the following
reasons:
a.
The existence of a highly fluid strategic environment, which results in continuous
shifts and changing profiles of threat and power equations.
b.
To ensure judicious allocation of resources and cost effective utilization.
c.
Revolution in Military Affairs (RMA), i.e. advances in technology, which
result in weapons and equipment systems becoming obsolete at a fast rate.
d.
Lead time required to raise and prepare defence units; to produce or acquire
and introduce new weapons and equipment systems.
e.
The changing nature of conflict and reduced reaction time.
f.
Coordination problems between defence, economic, science and technology,
infrastructure and industrial activities, as well as among the Defence Forces.
Joint Military Doctrine
16.
The software of defense, that binds the services together as an integrated fighting force.
Joint doctrine helps to capitalize on the synergistic effects of inter service coordination and
cooperation. Concise expression of how military forces contribute to campaigns, major
operations, battles, and engagements. It should guide to combined actions, rather than hard and
fast rules. Doctrine provides a common frame of reference across the military. It helps
standardize operations, facilitating readiness by establishing common ways of accomplishing
military tasks.
17.
Joint doctrine establishes the guidance on how best to employ national military power to
achieve strategic ends. Joint doctrine captures the fundamental principles that guide the
employment of Sri Lankan military forces in coordinated action toward a common objective.
38
Trinco Dialogue Maritime Symposium 2013
Joint doctrine should also includes terms, tactics, techniques, and procedures. Joint doctrine
provides the basis for education, training, and execution of current joint operations.
18.
Joint doctrine enables the Armed Forces to conduct the most effective joint activities and
unified action. It is based on extant capabilities and incorporates time-tested principles for
successful military action as well as contemporary lessons that together guide aggressive
exploitation of its advantages against adversary vulnerabilities. It does this by promoting a
common perspective from which to plan, train, and conduct military operations in combat and
noncombat situations. It also fundamentally shapes the way the Armed forces think about.
Joint Military Training
19.
Commanders at all echelons are responsible for preparing their command to accomplish
assigned missions. To be successful, we must train our forces, first and foremost, on war
fighting. To keep our war fighting focus sharp, we must use tools, such as the joint training
system to enhance our abilities to respond to the myriad of asymmetrical threats. For example the
Staff college Batalanda and Kothelawala Defence University are being set up to increase
mutuality in strategic thinking, joint resource management.
20.
Following are the key objectives of joint military training:
a.
Continuously improve joint force readiness by integral training aligning joint
training and education capabilities and resources with combatant command operational
needs.
b.
Achieve a training unity of effort across services, agencies, and organizations.
c.
Develop individuals and organizations that think joint intuitively.
d.
Prepare forces for new war fighting concepts and capabilities.
e.
Develop individuals and organizations that improvise and adapt to emerging
challenges.
Situational Awareness
21.
The persistent Intelligence, Surveillance, and Reconnaissance in Joint Integrating
Concept should provide a detailed description of required capabilities that are supportive of the
situational awareness requirements of the Office of the Chief of Defence staff. There is no doubt
that timely intelligence is essential in order to prevent any crime. This is far more important in
39
Trinco Dialogue Maritime Symposium 2013
the maritime domain due to the much wider scope of the maritime trade and other activities at
sea.
22.
Intelligence could be considered as the ultimate deterrent weapon that individual states
and the international community must possess. There should be intelligence gathering, sharing,
and analyzing mechanisms, locally, internationally, or regionally. Efforts must be made to
identify possible terrorist capabilities and share such knowledge with other military forces so as
to make evaluation and identifying vulnerabilities and risks more effective.
23.
Defense Intelligence Organization should consist with highly skilled, agile, and
accountable professionals, military as well as civil, equipped with leading-edge training and
technology, strengthened by partnerships, and able to provide all-source defence intelligence,
whenever and wherever required, in support of the Nation. Obtaining the service of State
Intelligence Service, office of the national intelligence and other intelligence agencies whether
under MOD or not support this understanding by providing integrated, evaluated, analyzed, and
interpreted information concerning what the enemy is doing, is capable of doing, and may do in
the future.
Defence Communication Strategy
24.
The Defence Communications Strategy should aim to capitalize on the effect of our
communication efforts in order to improve understanding and support for Defence and enhance
the reputation of the Armed Forces collectively, each Service individually, the Ministry of
Defence and its various component parts. The strategy supports the Defence Vision by helping to
demonstrate that Defence is essential to the national interest. It should provide an overarching
framework for communications activities setting out what we want to achieve, the priority areas
we need to focus on and who needs to be involved. Other communications strategies in MOD
and the Armed Forces and communications activities across the Department are expected to
align with it. This will be achieved through the following enabling objectives:
a.
A better relationship with key external stakeholders including the national and
regional media.
b.
An outcome based approach and improved coherency of effort across everyone
involved in Defence communications.
c.
A MOD communications organisation to obtain first class reputation in
Defence, the confidence of the Department at all levels.
40
Trinco Dialogue Maritime Symposium 2013
Defence Procurement Procedure
25.
The defence planning process attempts to match the budgetary resources likely to be
made available for the requirement to establish the defence capability necessary to face the
threats and challenges. This exercise is undertaken in two phases:
a.
What should be the proportion allocated to the defence effort as against other
areas of national security concerns and economic growth? In order to minimise
adverse affects of high military expenditure on socio-economic development, it is
necessary to correspond national development planning with defence planning.
b.
Optimisation of allocated resources, i.e. distribution of resources within the
Ministry of Defence (MoD) based on force planning (Force and weapons mix,
command and control, logistics and human resources management) by the Defence
Services to combat current and future threats, defence production and other agencies
concerned. The quantum of indigenous production and the requirements
to
be
procured from outside are decided in this phase. The objective is to achieve
maximum defence capability from the given resources.
26.
Focused logistics should be one of the four pillars of the joint vision of Joint
Commanders that must be accomplished in an efficient and effective manner. Logistical
operational military forces must be organizationally structured with systems that maximize
support capability to the joint and combined future military force.
Disaster Management
27.
Office of Chief of Defence staff is responsible to ensure a coordinated response for all
disaster relief both within and outside the country. This integrates the efforts of the Services and
other allied agencies at crucial junctures of disaster management thus bringing timely assistance
to the affected populace. Shining examples of the quality of efforts are relief operations of post
Tsunami and floods.
Up gradation of the Office of the Chief of Defence Staff
28.
Office of the Chief of Defence Staff should furnish with Joint force commanders assist in
the decision making and execution process. Its sole function is command support, and its only
authority is that which is delegated to it by the commander. The creation of Joint staff
organization should not result in establishing another layer of bureaucracy that denigrates
Service Head Quarters, inhibits competent decision making and hinders effective war fighting.
29. Ministry of Defence (MoD) views OCDS as an overarching extension of the Service
Head Quarters, and to be used as a buffer between the two. OCDS is neither an information
41
Trinco Dialogue Maritime Symposium 2013
gathering agency nor merely rubber stamping proposals emanating from Service HQs. It needs to
be clearly understood that it is to do an in depth analysis of issues referred and otherwise in its
charter and give cogent views on them. The functional relationship between MOD, OCDS and
the Service HQs should be clearly defined.
Civil - Military integration
30.
Elementary issues of national security are determined by the pattern of institutional
interaction between the civil and military components of a nation‘s policy. The regulating of
Civil – Military relations, therefore, lies at the heart of a nation‘s security framework. Nations
which the exact balance in their pattern of Civil – Military relations have a great advantage in
their search for security, with an increased likelihood of reaching the right answers to the
operative issues of state policy.
31.
Conflict between the civil and military components may not always be noticeably visible
but it is the underlying theme across the politico-military histories of nations. In the USA, since
World War II, there have been more than seventy instances of major conflicts between the
civilian and military leadership, each with its own set of drivers and consequences.
32.
Within the MOD and OCDS, authority, responsibility and accountability must be
comprehensively reviewed. Concurrently, substantial delegation of powers and authority to
Service Chiefs must take place – they must be made entirely responsible for operational plans
and equipment, even though with precise budgetary backing as also the authority to contract their
budgets. Having been allowed greater control of their allocated budgets the Service Chiefs must
drive capability planning and determine the best balance between manpower, training, equipment
and support, etc, that are needed to deliver the defence requirement.
CONCLUSION
33.
Implementing this agenda will not be easy. To succeed, we must balance and integrate all
elements of power and update our national security capacity for the 21st century. Our
intelligence and homeland security efforts must be integrated with our national security policies,
and those of our allies and partners.
34.
Sri Lanka have experienced the effects of irregular warfare in her territory as well as the
maritime domain and learnt bitter lessons for over 3 decades. A terrorist group like the LTTE
could not have waged war against the state for three decades, without the sustenance they
received from abroad via the sea. Therefore, it is essential for all stake holders to have the latest
qualitative analysis on the scope and utilization of all aspects of maritime surveillance for
achieving complete domain awareness.
42
Trinco Dialogue Maritime Symposium 2013
35.
Despite the efforts put in by MOD and achievements towards integration in the Armed
Forces during last humanitarian operations, choke points do exist, that impede true integration
from being achieved in the desired manner. The major ones, those that should essentially be
addressed on priority and within an open mind. Structures can only facilitate enforced
development of cooperation and synergy, they cannot remove established mindsets. The first
priority should therefore be to institute processes that assist in dismantling mindsets, only then
would joint structures become meaningful and ‗true jointmanship‘ achieved.
43
Trinco Dialogue Maritime Symposium 2013
APPLICATION OF CLOUD COMPUTING IN MILITARY CONTEXT
Commodore AMSP Alahakoon, USP,psn,
C.Eng, B.Sc(Hons)(WS), MBA(MOT)
Commodore Electrical Department (E)
1.
Cloud computing has been a topic of keen interest in recent years, having been referred to
as "the most promising computational platform" and "the prevailing technique for the next ten
years". (Zaerens, 2011) There has been a lot of discussion as to what new opportunities it can
bring to markets in general and to defence in particular. In this paper I discuss cloud computing
in a military context. First the basics of Cloud Computing is described including its
characteristics, deployment models, risk of cloud computing in Military Context, threats, the
applications in military with conclusion and recommendation.
INTRODUCTION
2.
Cloud computing is a type of computing where massively scalable IT-related capabilities
are provided ―as a service‖ to multiple external users via the Internet or large-scale private
networks that is geographically remote from the consumer. What it offers is a way for users to
increase capabilities, faster and more efficient services without investing in new infrastructure,
training personnel, or buying software licenses, at significantly less cost. Such efficiencies make
cloud computing extremely attractive and 'clouds' are increasingly being used by government
and industry. Traditional server environments pose several challenges: high labour and capital
costs, long development and deployment cycles and quality risks associated with largely manual
processes. Organisations are now finding new ways to meet these challenges using cloud
computing (IBM, 2012). Cloud computing enables computer users to use services without
necessarily understanding the technology or owning the infrastructure. Through the cloud, users
share resources, software, and information on-demand. The closest analogy to cloud computing
is the electricity distribution grid. A power company owns the infrastructure, a distribution
44
Trinco Dialogue Maritime Symposium 2013
company distributes the electricity, and the end user ―consumes‖ it but does not own or operate
the electricity network. User pay for only what it consume and at varied capacities.
CLOUD COMPUTING SERVICE MODELS
3.
Generally there are three cloud computing service models available:
a.
Infrastructure as a Service (IaaS) involves the provision of a virtualised
environment of servers, computer processing, memory, data storage, and network
connectivity. IaaS enables the consumer to run operating systems and software
applications of their choice.
b.
Platform as a Service (PaaS) involves the provision of operating systems and
associated web servers. The consumer uses the service provider's cloud infrastructure to
deploy web applications. The provider controls and maintains the physical computer
hardware, operating systems, and server applications. The consumer controls the software
applications they develop.
c.
Software as a Service (SaaS) Typically the service provider controls and
maintains the physical hardware, operating systems, and software applications. The
consumer has limited control over application and configuration settings specific to the
applications they are using.
CLOUD DEPLOYMENT MODELS
4.
Cloud services may be delivered using one or more of four cloud deployment models or
modes of delivery, each of which carries inherent benefits and risks. :
a.
Public Cloud which involves an organisation using a service provider's cloud
infrastructure that is shared via the internet with many other organisations and
individuals. This generates competitive Economies of Scale but carries inherent security
risks associated with its wide availability. Google, Amazon are Public clouds.
b.
Private Cloud attempts to mimic the delivery model of public cloud service
provider but it does so entirely within the firewall and for the benefit of the consumer,
which is usually a large organisation. This provides many of the advantages of a public
cloud but with greater control and security.
c.
Community Cloud is a private cloud that is shared by several organisations or
government agencies like MOD that have similar needs in terms of data sensitivity and
security. This model provides most of the benefits of a private cloud with additional
economies of scale that make it more cost effective.
45
Trinco Dialogue Maritime Symposium 2013
d.
Hybrid Cloud as the name suggests involves a combination of cloud models. For
example, the organisation could use IT resources from a public cloud to manage nonsensitive data which could be set up to interact with sensitive data stored and processed
on a private cloud.
5.
The mobile and dismounted domains of defence organizations typically use devices that
are light in storage, processing and communication capabilities. therefore cloud processing and
storage is a great advantage, but it is infeasible to rely solely on a central storage system that is
accessible through a network. Such factors influence the degree of benefit and risk involved.
(Cloud computing in Government context, 2011)
6.
As is evident from the description of cloud deployment and service models, there is a
variety of communication and information technology platforms and services on offer. There is
no 'one size fits all'. Services can be tailored to the needs of the consumer according to region,
size of the organisation or business, sector characteristics, workload, demand and security
concerns. Before considering cloud computing as an option, the organisation must assess the
benefits and risks of the various cloud computing options to determine which service is
appropriate for their needs.
KEY CHARACTERISTICS
7.
The key characteristics that users should expect from cloud computing include,
a.
Customer capital expenditure is minimized which lowers barriers to entry, as
infrastructure is owned by the provider and does not need to be purchased for one-time or
infrequent intensive computing tasks.
b.
Device and location independence enables users to access systems regardless of
their location or what device they are using, e.g., PC, mobile. Smartphone, etc
c.
Multi-tenancy enables sharing of resources, and costs, among a large pool of
users.
d.
Centralization of infrastructure in areas with lower costs, e.g., real estate,
electricity, etc.
e.
Peak-load capacity increases where users need not engineer for highest possible
load.
f.
Utilization and efficiency improvements for systems that are often only 10-20%
utilised.
46
Trinco Dialogue Maritime Symposium 2013
g.
etc
On-demand allocation and de-allocation of CPU, storage and network bandwidth,
h.
Performance is monitored and consistent
j.
Reliability is enhanced by way of multiple redundant sites, which makes it
suitable for business continuity and disaster recovery
k.
Scalability meets changing user demands quickly without users having to
engineer for peak loads.
l.
Sustainability is achieved through improved resource utilisation, more efficient
systems, and carbon neutrality. today computers and associated infrastructure are major
consumers of energy.
m.
Security typically improves due to centralization of data, increased securityfocused resources, increased ability to patch and upgrade, increased ability to monitor,
increased ability to encrypt and many other reasons. However, there are concerns about
loss of control over certain sensitive data. When designed in at the beginning, security of
cloud architectures is significantly higher than non-cloud approaches.
RISKS IN MILITARY CONTEXT
8.
Seven security threats posed by cloud computing had been identified:
a.
Abuse and nefarious use of Cloud Computing – The ease of the registration
process for services over the cloud opens up the cloud environment to abuse by
spammers, malicious code authors, and other criminal elements. Solution: strengthen
security of the registration process.
b.
Insecure Application Programming Interfaces – Cloud computing providers
expose a set of software interfaces that customers use to manage and interact with cloud
services. These interfaces can be hacked by unauthorized users. Solution: beef up
authentication and access control to weed out unauthorized users.
c.
Malicious Insiders – The threat posed by a malicious insider is not unique to
cloud computing. However, the threat is amplified by the convergence of IT services and
customers under a single cloud. Solution: enforce strict supply chain management
security and conduct comprehensive background check of cloud employees.
47
Trinco Dialogue Maritime Symposium 2013
d.
Shared Technology Vulnerabilities – Cloud computing providers deliver services
by sharing infrastructure. This opens up the entire system to security breaches. Solution:
implement a defense-in-depth strategy that includes computer, storage, and network
security enforcement and monitoring.
e.
Data Loss/Leakage – The destruction or loss of data, whether accidental or
intentional, poses a grave risk to any network, but the risk increases in the cloud
environment due to the number of interactions. Solution: encrypt data in transit and
implement strong data backup and retention strategies.
f.
Account, Service, and Traffic Hijacking – such as phishing, fraud, and
exploitation of software vulnerabilities, pose risks to any computer system. If attackers
gain access to a cloud environment, they can eavesdrop on cloud users, manipulate data,
return false information, and redirect users to illegitimate sites. Solution: use strong
authentication techniques and unauthorized activity monitoring.
g.
Unknown Risk Profile – The benefit of cloud computing, reducing the costs of
maintaining computer hardware and software, also creates a risk of losing track of the
security ramifications of cloud deployments. Solution: maintain detailed information
about who is sharing the cloud infrastructure, as well as network intrusion logs,
redirection attempts, and other security logs.
APPLICATIONS IN MILITARY
9.
The use of Cloud Computing in the military could be to enhance own efficiencies or for
cooperation with other players. To name a few,
a.
Information superiority is a force multiplier and is crucial to mission success. The
massively scalable IT available through cloud on demand, deployable rapidly, universal
connectivity makes it a real military tool.
b.
Network Centric Warfare, now is a reality at very cheap recurrent cost.
c.
In the near future extensive use of military clouds at the battlefield is predicted.
Integrating cloud computing logic to network centric applications will increase the
flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities.
(Süleyman, Volkan, İbrahim, & Ahmet, 2012) Developing world military too could
harness the Net Centric advantages through Cloud.
48
Trinco Dialogue Maritime Symposium 2013
c.
Military has more understanding on the security of information. Private or Hybrid
Cloud would provide equal amount of security to all Military Data compared to some
information in PCs under the tables without any security.
d.
Commercial Cloud Computing products with appropriate security layers,
encryption could be used for many cheap implementations of HRM, Payroll,
communications functions, Email, Sharing books of reference, logistic management and
even chatting with loved ones deployed in the battlefield. US military uses cloud to
measure regular stress levels of soldiers.
e.
Situational awareness, Maritime awareness and dissemination of information will
be much faster, cheaper and rapidly deployable. A ship would have all the information
required through cloud, when deployed to a corner of the world.
f.
Rapid Deployability and scalability makes cloud a tactical tool in the battle field
for Command and Control.
g.
Traditional Military command-and-control systems have been designed with
proprietary protocols and operated within dedicated networks and computers that make it
extremely difficult to share information among different organizations. Clouds make it
sharable.
h.
With the increase of both state‐sponsored and independent cyber threats, there is a
growing importance of leading a strong and secure presence in cyberspace. Cloud offers
new secure solution for this.
j.
Global financial events are driving a need for continued budgetary constraints in
the Military and stricter financial control. Cloud offers a way in which it acquires,
operates, and manages its IT in order to realize increased efficiency, effectiveness, and
security.
CONCLUSIONS
10.
It is concluded that military clouds will be indispensible component of the future
battlefield. Military clouds have the potential of improving network centric capabilities,
increasing situational awareness at the battlefield and facilitating the information superiority.
11.
Moving the military IT operations to a cloud computing model will not be easy. But the
payoff and direction is clear.
12.
After all the strategic importance of IT has diminished in inverse proportion to the use of
IT, since it is now so commonplace. (Gourley, 2009)
49
Trinco Dialogue Maritime Symposium 2013
RECOMMENDATIONS
13.
The Maritime Security in the Indian Ocean is a joint responsibility with many regional
and extra regional players requiring compatibility, security in sharing information, tactics and
strategic assets. Therefore Sri Lanka Navy has to be proactive in adopting Cloud Computing for
both efficient running her own affairs as well as becoming a partner in maintaining the Global
and Regional Maritime Security.
50
Trinco Dialogue Maritime Symposium 2013
EXPLOITATION OF MODERN COMMUNICATION TECHNOLOGY FOR
EFFICIENT MANAGEMENT OF DEFENCE
COMMUNICATION NETWORK
Lt (N) IP Wijesinghe
Student Officer of 8th JNSC
INTRODUCTION
1.
As defence forces transform themselves into lean mean modern fighting machines,
communication and networking undoubtedly are going to play a very strategic and tactical role
not just in electronic warfare but also in conventional battles and wars. The three wings of the
armed forces – the army, navy and air force need to modernize their communications network by
adopting several new technologies. The US led wars in Afghanistan and Iraq have amply
demonstrated the significance of communication and information technologies in the success of
military campaigns. The Defence Communications Strategy aims to maximise the effect of our
communications efforts in order to improve understanding and support for Defence and enhance
the reputation of the Armed Forces collectively, each Service individually.
2.
Communication is of paramount importance for conduct of any operation by armed
forces whether it military on non- military in nature. It is a tool that provides the commander the
real time information that enables him to take timely and most appropriate decision. There are
plenty of examples across the world, over the years in strategic operations, where, countries have
failed due to the lack of updated, integrated communication during the conduct of joint
operation.
3.
Defence communication network by the nature of its requirements needs continuous
upgrading of its systems with the dynamic nature of the technology. The proper use of
technology and the effective utilization of it will determine advantage in the military scenario.
51
Trinco Dialogue Maritime Symposium 2013
4.
Communication plays a vital role in defence theatre. All the successes and losses totally
depend on communication. Today, communication has transferred its shape from traditional
ways of communication to latest and sophisticated system which provides seamless and secure
network for users. Modern technology helps to invent much user friendly but far more advanced
communication equipment.
AIM
5.
The aim of this paper is to discuss the importance of exploitation of modern
communication technology for efficient management of defence communication network and
suggest recommendations for a robust, seamless and secure defence communication network in
Sri Lanka.
DEFENCE COMMUNICATION NETWORK
6.
The modern Battle-space includes the information space, which has become an
overwhelming factor in the conduct of warfare. Nations today face an additional threat from
extremist elements (both internal and external) using asymmetric operations of attack. This has
increased the need for a more vigorous and operational approach to communications and sharing
of information at a national level for long-term strategic effect. Things that are said or done in
one place have effects elsewhere. Therefore, the need for effective Defence Communication
Network (DCN) is an essential element for a nation to safeguard her territorial integrity.
7.
Battle space transparency demands real time flow of information between various
agencies and units for command to take timely and most appropriate course of action.
Information, simultaneously available from strategic to tactical levels of military operations
affect the conduct of military operations to a degree equal to that of emerging weapons
technologies.
8.
Terror attack in Mumbai on 26 thNovember 2008, is an eye opener to whole world that
dictates that there should be a robust command, control and coordination for effective coastal
security which can only be achieved through unhindered flow of information between the
various stake holders. It is evident that the need for seamless integration and synergy of the three
Services to counter threats to the vast national resources, vulnerable points (VPs), and economic
zones in the country. Integrated and secure communication networks for smooth tri-Service
interaction to encourage a spirit of 'jointmanship' and synergy within the services. The conduct of
humanitarian operation in recent past can be highlighted as a good example for emphasize the
jointmantship among defence forces.
52
Trinco Dialogue Maritime Symposium 2013
9.
In the last one decade, world defence forces have transformed towards the exclusive and
effective use of strategic communications to integrate all instruments of national power:
diplomatic, information, military and economic. An effective Defence Communication Network
(DCN) serves as the key for Command, Control, Communication, Computer, Intelligence,
Surveillance and Reconnaissance (C4ISR). C4ISR is the essence of victory in the war, where
modern technology plays a vital role.
C4ISR in Brief
10.
The command, control, communications, computers, intelligence, surveillance, and
reconnaissance (C4ISR) technologies has become the nerve centre of modern warfighting. This
not only as force multipliers for the military platforms into which they are integrated, but also as
the means to better link different types of forces (air, sea, land). Moreover, they can connect
forces of different nationalities, enabling interoperability and the efficient use of military
resources.
EXISTING DEFENCE COMMUNICATION NETWORK IN SRI LANKA AND ITS
DRAWBACKS
11.
Needless to say that even in our case, the communication has become a vital element in
any armed forces operations. Although we achieved successes during final stages of the
humanitarian operation, still we have failed to develop an effective, integrated and centralized
communication network that provide secure and seamless communication between Army, Navy
Air Force and Police. Reason for this is, mainly due they conduct their operations according to
their own ways, traditions and theories.
12.
If we had effective communication network among tri services at the initial stages itself
of humanitarian operation, we would have saved many lives at the battlefield.
Ex.
Moving of EOSS camera with ground troops
UAV live streaming of video updates for ground troops to make decisions.
Shortcomings of existing DCN
13.
A few notable shortcomings of existing DCN are as shown:
a.
Non availability of common communication channel.
b.
Available equipment are obsolete and less user friendly.
53
Trinco Dialogue Maritime Symposium 2013
c.
Non availability of direct access among tri service at the battlefield and with
police during military operations other than war. (MOOTW)
d.
Due to above fact, it takes lot of time to convey a message for nearby other
service troops.
e.
Even available channels are full of communication traffic all the time.
f.
Different voice procedures practiced by individuals.
g.
Individual attitudes.
h.
Lack of knowledge on the importance of an Integrated Communication Network.
j.
Non availability of centralized communication network among tri services and
police.
k.
Non compatibility of equipment and communication procedures.
EFFECTIVE UTILIZATION OF ELECTROMAGNETIC SPECTRUM (EMS)
14.
Military operations are complicated by increasingly complex demands on the
electromagnetic spectrum (EMS). All modern forces depend on the EMS. The EMS is a physical
medium through which joint forces conduct operations. EMS-dependent devices are used by
both civilian and military organizations and individuals for intelligence; communications;
position, navigation, and timing; sensing; command and control (C2); attack; ranging; chemical,
biological, radiological, and nuclear (CBRN) sensor data collection/transmission; unmanned
aircraft systems (UASs); civil infrastructure; data transmission and information storage and
processing. The importance of the EMS and its relationship to the operational capabilities is the
key focus of joint electromagnetic spectrum management operations (JEMSMO). JEMSMO is a
functional area ultimately responsible for coordinating EMS access among multinational
partners, throughout the operational environment.
15.
The EMS is a physics-based maneuver space essential to control the operational
environment during all military operations. Information and data exchange between platforms
and capabilities will at some point rely on the EMS for transport. This maneuver space is
constrained by both military and civil uses as well as adversary attempts to deny the use of the
EMS, creating a congested and contested environment. This constrains freedom of maneuver to
use all capabilities of friendly forces throughout the operational environment
54
Trinco Dialogue Maritime Symposium 2013
16.
The EMS is a highly regulated and saturated natural resource. The EMS includes the
range of all possible frequencies of electromagnetic (EM) radiation. Frequency refers to the
number of occurrences of a periodic event over time. For radio frequencies (RFs), this is
expressed in cycles per second or Hertz (Hz). Generally, the frequencies between 30 Hz and 300
Gigahertz (GHz) are referred to as the RF spectrum. Illustration of EMS is shown in annexure to
this paper.
LESSONS FROM OTHER COUNTRIES EFFECTIVE DEFENCE COMMUNICATION
NETWORK
17.
Most of the developed countries have been managed their military assets and utilize them
in an effective manner by adapting to a centralized communication network among all battle
units, irrespective of the size.
18.
Having a centralized communication network directly helps joint force commander to
achieve his objectives. In the context of a broader national strategy and in conjunction with other
agencies and organizations as appropriate, will employ the full range of informational and other
capabilities available to the force in an integrated and timely way to:
a.
Identify, segment, study and listen to potential audiences.
b.
Conceive, produce and coordinate signals through both information and actions
designed to affect the perceptions, attitudes, beliefs and thus the behaviors of selected
audiences in ways that support the accomplishment of the mission and promote broader
national and international interests.
c.
Monitor measure and assess the effects of these signals.
d.
Iteratively modify actions and information products based on feedback on the
effects of the signals.
19.
This concept comprises three objectives:
a.
To inform operational decision-making in current and future joint operations.
While the concept‘s primary aim is to influence force planning, it also provides ideas that
could help operational commanders plan and execute joint operations to achieve strategic
communication objectives more effectively with current capabilities.
55
Trinco Dialogue Maritime Symposium 2013
b.
To provide a common intellectual framework for all subsequent force planning
with respect to strategic communication, including:
(1)
Experimentation into future strategic communication methods and
capabilities.
(2)
Identification and implementation of required institutional changes.
(3)
Programmatic, budgetary, organizational and other force planning
decisions.
c.
To provide the conceptual basis for performing a capability-based assessment
(CBA) within the Joint Capabilities Integration and Development System (JCIDS). The
concept will do this by identifying an initial set of required strategic communication
capabilities, with associated tasks and measures, and providing the logical basis for these
capabilities.
EXPLOITATION OF MODERN COMMUNICATION TECHNOLOGY FOR
DEFENCE COMMUNICATION NETWORK IN SRI LANKA
20.
This is the crossing time for Sri Lanka to adopt for an integrated and centralized defence
communication network. This will help armed forces in Sri Lanka in many ways. Not only that,
Sri Lanka as an island nation in the Indian Ocean Region (IOR) has immense responsibility in
global maritime disaster and safety system (GMDSS) and search and rescue (SAR) operations.
By adapting to a centralized communication network, we can achieve:
a.
Easy access to other services with minimum time delay.
b.
Effective coordination at tactical and operational level.
c.
Optimization of manpower and resources.
d.
Ability to minimize losses and damages.
e.
Increased economy of effort.
f.
Facilitate net-centric warfare.
56
Trinco Dialogue Maritime Symposium 2013
g.
Commanders decision can be conveyed to each battle group, even to smallest unit
wherever they are, without delay.
h.
Availability of traffic free common communication channels.
j.
Can achieve a common voice procedure.
k.
Introducing of modern technology will help to change the attitudes of individuals
toward achieve the goal.
l.
As an effective tool during joint operations, during war and peace.
m.
Since, Sri Lanka Navy does not have an integral air wing; it has to have assistance
from Sri Lanka Air Force during SAR and GMDSS operation.
n.
Coordination and communication among tri services and police can be a turning
point at military operations, other than war (MOOTW) such as counter insurgency
operations and aid to civil power during natural devastations.
p.
Ability to par with other nations by having compatible communication equipment
and technology at international arena such as joint exercises.
q.
Ability to launch integrated procurement system.
CONCLUSION
21.
The geostrategic position of our country demands an advance communication system
based on radio and satellite both to meet military and non-military requirements. This includes
GMDSS and SAR operations. Hence, requirement of a sophisticated, expanded and integrated
Defence Communication Network is undeniable for an island nation like Sri Lanka. Existing
communication network are presently working in isolation, with least exploitation of
Electromagnetic spectrum, which is largely and successfully used by the modern communication
applications. It is the transition time for Sri Lanka to break the shackles of communication and
foreseen way ahead to impart available technology for an effective defence communication
network.
57
Trinco Dialogue Maritime Symposium 2013
RECOMMENDATIONS
22.
Considering the above factors and need for a robust, seamless and secure communication
network for our country, suggested recommendations are:
a.
Defence communication network should accommodate with a satellite
communication system covering the Indian Ocean Region, which facilitate obtaining of
real time pictures at any time.
b.
An integrated communication headquarters, which can coordinate and control all
the integral segments of army navy air force police and other concern agencies, which
formulate a common ops room for an operation.
c.
Since navy does not possess an integral air wing and ground deployment,
communication systems should be compatible with the army and air force with
standardised communication applications in tactical deployments with advanced
capabilities in greater bandwidth, so that those can be utilized in joint operations as well
as in routine military applications.
23.
And final words --- The world is shrinking day by day due to technological advancement
in the field of communication which is ever growing. It is the need of hour to be abreast of these
developments and incorporate the changes that are needed for better battle space transparency
and jointmanship in future operations. Communications is weaved into almost everything that we
do in Defence. To be effective we must have a joined up and coherent approach across the
organisation, which is based on a common understanding and which will lead us to success in
future.
58
Trinco Dialogue Maritime Symposium 2013
INFLUENCE OF MIDDLE EAST CRISIS TO THE
INDIAN OCEAN REGION
LCdr CRP Walakuluge,BNS
Student Officer of 8th JNSC
1.
It is quite difficult to disintegrate and alienate a single factor at providing a prelude to
understanding the present unfolding of events in the Middle East and per says its impact to other
regions of the world. The revolutionary waves of the ‗Arab Spring‘ across Middle East have
indeed shaken up the predominantly autocratic Arab states resulting in a new paradigm shift of
geopolitics. Meanwhile, tensions lurk in the Strait of Hormuz as Iran expresses signs of a
probable blockade in response to provocative sanctions by the United States against its oil
exports. Israel‘s aggressive military and political outreach has increased the volatility of the
context and a status of brink of war in the region. Adding more severity to the crisis situation is
the recent burst of global outrage against U.S and its diplomatic offices, subsequent to a youtube
video post- ‗Innocence of Muslims‘.
2.
Hence, the present context of politics and power parity in the Middle East is turning the
region into an inferno, triggering a global energy crisis in the making. Some sense a fear of a
third world or a fourth world war- ‗an Armageddon‘, while others are skeptical of such but non
denies the proposition of the world been starved for it uncompromising greed towards energy
resources.
3.
The qualitative literature research indentifies three vital contexts influencing South Asia:
energy security; the Muslim outcry and the U.S Presidential election. The contextual scenarios
were weighted against its impact to South Asia. Further, the factors were carried out in filtering
the U.S and Arab versions of the two burning scenarios, while providing a more holistic
approach in perceiving the challenges and threats towards the South Asian Region.
59
Trinco Dialogue Maritime Symposium 2013
4.
Energy security is essential for the South Asian region which has promised a robust
economic development centered on the Indian glory. India is the 3 rd largest Iranian oil importer,
amounting to a total of an estimated 15-15.5 million crude oil barrels in 2012. South Asia and
East Asia comprises over 8 million expatriate workers in the Middle East. Overseas remittance
is a major source of income to the South Asian economies and a surge of calamity in the Middle
East would directly present serious impediments to the flow of remittance including the security
and safe repatriation of the workers. Meanwhile, South Asian Muslim populations have been
aggressively participative to the Arab outrage against U.S embassies recently. Interestingly, the
Arab Spring hardly had any reciprocity on the Islamic cultural demographics in South Asia until
the release of the defamatory documentary video ‗Innocence of Muslims‘.
5.
The findings were quite interesting as brought about through the cause effect analysis of
the Middle Eastern events, its precursors, and external and inter regional stakeholders and the
South Asian nation states. Finally, the study provides a genuine solution for the paradox
presented through the Middle East crisis- a deliberate shift of policy and interests towards East.
INTRODUCTION
Understanding the context
6.
Although, Middle East has not been a peaceful place since the WW II the wars that have
been fought with one exception (the Iran- Iraq war) are very small. The wars the world
experienced in the Middle East were short in duration and casualty rates accounted were low. In
contrast Europe has been historically a far more violent place than the Middle East. Hence, the
exaggerated version of an apocalypse resulting in a nuclear war is unlikely to spring from
Middle East. This may seem like an optimistic presumption but the recent fragility of affairs and
recent looming from the European theater suggests that the center of gravity in a future large
scale war would indeed be a location in the West.
7.
In early 70s‘ 1/2 of the world didn‘t essentially use oil (hydrocarbon fuels). The serious
oil consumers were Europe, United States, Canada, Japan and Soviet Russia. But today
everybody, every nation state consumes oil. Two thirds of the global oil reserves are in the
Middle East, basically in the Persian Gulf and that is ten times than any other resources. At
present the region produces a capacity of 50 – 51 million crude oil barrels per day (bb/d).
Demand for energy is in the rise in quantum levels, and is expected to sore to 120 million barrels
per day by 2030 against the current demand of 80 million barrels per day. Any form of
hindrance to the energy supplies from Middle East would ultimately result in a ‗global energy
crisis.
60
Trinco Dialogue Maritime Symposium 2013
8.
The South Asian region is located between two major maritime choke points: Strait of
Hormuz and the Strait of Malacca. The Indian Ocean accounts for the highest tonnage of goods
and energy transportation in the world.
OBJECTIVE
9.
To critically evaluate the Middle East crisis and its significant political, social and
economical impact towards the South Asian region.
CRITICAL ANALYSIS & DISCUSSION
Probable Contextual Impact towards the South Asian Region
IMPACT
SITUATION
CONTEXT
Iranian Nuclear
PppppppPrograIssue
Energy Security
Economical & Political
Muslim Outrage
Arab Spring
Social & Political
US Presidential Election
Election
Geo-political Stability
Political, Economical
& Social
Figure 1: Cause-Effect relation between the Middle East issues and South Asia.
Iranian Nuclear Program & consequences
10.
The sanctions according to United States are designed to persuade Iran to provide access
for the IAEA experts to investigate and clarify what is believed as a secret nuclear weapons
program. As a consequence of the failure of the latest negotiations over Iran‘s nuclear program,
the European Union‘s ban on the importation of Iranian oil took effect on July 1, 2012.
11.
Iran derives more than 50 percent of its government revenue from oil exports, which
declined from about 2.4 million barrels a day in July 2011 to about 1 million barrels in July
2012. Iran can hardly sell its oil because of the embargo. Even countries that don't feel bound to
uphold the sanctions are shying away from deals, because no one wants to insure the oil
shipments.
61
Trinco Dialogue Maritime Symposium 2013
The Paradox of Views
12.
Iran. The U.S backed European Unions decision to impose sanctions on Iranian oil
exportation has provoked the following question: How serious are the Iranians about the
proposed sanctions and possible attack over its civilian nuclear program and what actually is
Iran‘s strategy in the Strait of Hormuz? Preserving the security in the Strait of Hormuz is a
priority of Iran‘s defensive deterrence strategy in the Persian Gulf. Iran‘s policy there will
certainly be a measured and rational one, based on taking full responsibility and considering the
region‘s geopolitical realities. The Strait of Hormuz is one of the most important transit points
for energy shipments in the world, and Iran would not close it unless the country‘s interests are
imperiled. Iran perceives the issue of the Strait within the context of global dynamics. Based on
this strategy and under the hardest economic conditions, Iran would not close the Strait of
Hormuz.
13.
United States.
Binding the interests of the international community as well as
those of regional Arab regimes to the security of the Strait of Hormuz could be a pressure point
on the United States and its Western allies. The U.S and its allies perception towards Iran‘s
power and prowess has led to an intense degree of hostility, deterrence and pre-emption. Iran
and its impact on the Middle Eastern regional balance of power are viewed by the West and
Saudi Sheiks as a grave threat. Washington‘s concept of squeezing a country‘s government by
interfering with its energy policies has a dolorous history seven decades old.
Flashing Fault Lines
14.
Blockade of the Strait of Hormuz. The Strait of Hormuz is a narrow water channel
separating the Arabian Gulf from the Gulf of Oman and the North Arabian Sea. It is about 40
miles wide, and is 21 miles wide at its narrowest point. The strait is the worlds second busiest
international strait. Roughly 40 percent of the world's oil tanker shipments transit the strait daily,
carrying 15.5 million barrels of Saudi, Iraqi, Iranian, Kuwaiti, Bahraini, Qatari and United Arab
Emirates crude oil. The Strait of Hormuz is asserted as the world‘s most important oil choke
point.
15.
Economic experts suggest that oil exports in the Strait of Hormuz will reach 30-34
million barrels per day by 2020, in prelude at suggesting that ensuring the free flow of oil
through the strait will be a major international concern. The majority of oil exports from this
area travel to Asia, United States and Western Europe.
16.
Any sort of blockade in the Strait of Hormuz means that oil transporters will have to seek
longer alternative routes at increased transportation cost. This would inevitable have graver
62
Trinco Dialogue Maritime Symposium 2013
consequences towards the more dependent and fragile South Asian economies with an exception
of India.
17.
Israel‟s Preemptive Strikes Towards Iranian Nuclear Facilities. Iran has earlier
warned that if either the U.S. or Israel attacks, it will target 32 American bases in the Middle
East and close the Strait of Hormuz. This would also unleash the Hezbollah guerillas in Lebanon
with a swarm of rocket and possible missile attacks against Israel and selected U.S bases in the
Middle East. It would extend the military arc of crisis from Iraq to Afghanistan and inevitably
drawing the South Asian region into a quagmire. Al Qaeda, Jihad and many other extremist
fundamentalist terrorist organizations would be drawn to respond towards retaliating possible
U.S – Israel aggression in the Middle East.
Impact & Challenges to the South Asian Region
18.
The impact that would recent upon the South Asian region is multipronged in the event of
a breach of the afore stated fault lines in the Middle East. Thus, the consequences would have
both and economical and political impact on the South Asian region, varying in degree resulting
primarily due the geographical distances from the epicenter of a possible crisis. Afghanistan and
Pakistan would inevitably be drawn towards the issues as Al Qaeda cells would be activating as
recruiting centers for insurgents and terrorists against U.S and its allies in the Middle East.
South Asian security concerns would be intensified as it is expected that regional terrorist
organizations including LeT would seize the opportunity to cause panic and tension in the Indian
mainland. With an exception of Sri Lanka, Maldives and Bhutan the rest of the South Asian
region nations would experience a risk of intensifying security levels.
19.
The economical impact would be catastrophic and visible as the entire region is heavily
dependent on Middle Eastern oil supplies. The situation would result in harsh experiences for
Sri Lanka which is predominantly a buyer of Iranian crude oil. The existing economic fragility
in Sri Lanka would make it more susceptible for the slightest fluctuation in international crude
oil prices. Worst is the situation in concerning that the island nation has only a capacity with
effect to its current demand for a mere three days. This would cause a total blackout paving way
for political and social unrest in the nation.
20.
The economic impact on the region would be similarly felt by all the nations as, South
Asia along with East Asia represents over an excess 8 million migration workers in the Middle
East.
Effect on Remittance flow to South Asia
21.
For South Asian countries, remittances are among the largest and most stable sources of
foreign exchange and their developmental impact have been remarkable. For example, in Nepal
63
Trinco Dialogue Maritime Symposium 2013
national poverty level has come down from 42% to 31% during 1996 to 2004, and to 21% today,
largely on the account of remittances which finance household consumption as well as education
and health expenditures. Nepal, Bangladesh, and Sri Lanka, were among the top 15 remittance
recipients in 2009—with inflows being equivalent to 24% of the GDP in Nepal, 12% in
Bangladesh, 8% in Sri Lanka, 5% in Pakistan and 4% in India.
22.
In order to analyze current dynamics and potential future trends, it may be useful to get a
sense of the profile of migrant labor in each of these countries. (Listed by remittances as a
percentage of GDP):
a.
Nepal - has an estimated 1 million to 1.5 million workers abroad with more than
80% of them going to Qatar, Saudi Arabia, and U.A.E, most of them employed in lowskilled service jobs including as security guards.
b.
Bangladesh - has an estimated 6 million workers aboard, close to 4 percent of the
population. More than 65% of Bangladesh‘s remittances are from Gulf Countries and
over 50% of the departures in 2009 and 2010 were to the U.A.E. Saudi Arabia is the key
source of remittance inflows to Bangladesh; but in the last two years, only 2-3 percent of
the total departures were to Saudi Arabia due to country‘s ―unofficial" freeze on largescale recruitment of unskilled Bangladeshi workers. Overall, majority of Bangladeshis in
the Gulf are employed as unskilled workers, particularly in the construction sector.
c.
Sri Lanka- 86% of total departures in 2009 were to Gulf Countries with Saudi
Arabia being the greatest recipient. Sri Lanka‘s migrant profiles stand out from the rest of
South Asia, as the majority of overseas workers are women at 52% in 2009; 46% of total
workers went abroad as housemaids.
d.
Pakistan - Half of Pakistan‘s remittances come from Saudi Arabia and the U.A.E
with 64% of remittances coming from Gulf Countries overall. Pakistani workers are
predominantly employed in low skilled construction jobs.
e.
India- is one of the largest recipients of remittances with $53.9 billion received in
2009-2010. The country‘s remittance sources and migrant skill levels tend more quite
diverse. Estimates of inflows from Gulf Countries range between 27% (RBI) to 40%
(MOIA) of total remittances.
„Innocence of Muslims‟ and aftermath Context
23.
In the backdrop of the Arab Spring, the release of the trailer ―Innocence of Muslims‖ is
beginning to shape the new global security landscape. While social media fostered the Arab
Spring, replacing long-established dictatorships, as a purveyor of provocation, it enraged
64
Trinco Dialogue Maritime Symposium 2013
Muslims. The trailer sparked anti-US riots and attacks worldwide taking the lives of Muslims
and non-Muslims.
24.
On September 11, 2012, a group of heavily armed men taking cover of the protesters
attacked the US Consulate in Benghazi, Eastern Libya, killing the US Ambassador J Christopher
Stephens and his associates. A female suicide bomber killed 12 including foreigners in Kabul,
the capital of Afghanistan on September 18, 2012. The demonstrations and violence continues.
25.
Al Qaeda and its associated groups were marginalized during the Arab Spring. The very
announcement of the film and the release of the trailer on You-Tube was a great boost of support
for the violent and radical groups. Today, both on-line and off-line, they continue to exploit the
Muslim suffering, resentment, anger at the release of the trailer. Will the continuing reaction to
the trailer negate the potential and promise of stability following the fall of the dictatorships in
the Middle East? Will the strategic culture of Asia, where restrain and quite have been practiced
for centuries, continue to hold?
Cause
26.
An Egyptian Sam Bacile, born Coptic Christian, living in the US wrote and produced
―Innocence of Muslims.‖ The 14 minute video clip was uploaded to YouTube in July 2012,
under the titles ―The Real Life of Muhammad and Muhammad Movie Trailer. On September 9,
2012, Khaled Abdullah, a TV host on al-Nas, an Egyptian channel aired the video prompting
videos dubbed in Arabic uploaded to You-Tube. The demonstrators attacked the US Embassy in
Cairo and tore down the US flag, prompting violence in Libya, Yemen, and elsewhere in the
Middle East, Africa and spreading to other parts of the world.
27.
The anti Islam video claim Islam is a lie and Mohammed was a pedophile. The world
witnessed protests in Afghanistan, Pakistan, Bangladesh, Sri Lanka, Maldives, Philippines,
Thailand, Indonesia, Malaysia, Japan, and Hong Kong; Kenya, Nigeria, Niger, Somalia, Sudan,
Turkey, Algeria Bahrain, Egypt, Libya, Iran, Iraq and Israel, Jordan, Lebanon and Kuwait,
Muritenia, Morroco, and Oman, Palestine, Qatar, Saudi Arabia and Syria Tunisia, UAE
Azerbaijan, Russia, Serbia, Switzerland, Germany, Belgium, Denmark, France, Greece,
Macedonia, Netherlands, Cansada, UK, Although it is too early to conclude, on the face of it, the
trainer may have a greater impact on the wider Muslim World than the Arab Spring.
28.
Away from the glare of the international media, the vast majority of the billion Muslims
worldwide remained peaceful to the trailer ―Innocence of Muslims.‖ A few thousand Muslims
protested and a few hundred committed acts of violence but the mass media focused on the
violence and radicalism.
65
Trinco Dialogue Maritime Symposium 2013
Asian Response
29.
In Asia, where 62% of the Muslims live, the response has been restrained. Asian Muslims
live under the shadow of large Buddhist, Hindu, Christian and other communities. Unlike the
Middle Eastern Muslims, they value moderation, toleration and coexistence. They knew, it is a
film neither produced by the US government nor endorsed by the American people. With the
exception of Muslims in Pakistan and Afghanistan, Asian Muslims abstained from violence
compared to Middle Eastern Muslims.
30.
The Asian reaction to ―Innocence of Muslims‖ and the Arab Spring elicited a mix
reaction in Asia.
31.
The vast majority of the Muslims preferred restrain and democracy to radicalism and
violence. The US was quick to disassociate itself with the film produced by a private individual.
Nonetheless, the perception that the US government was behind it or endorsed the film drove
thousands of Muslims to despair, anger and rage. This misperception continues. To prevent
madness on both sides, the Christian extremists in the US and the Muslim extremists in the
Middle East, the West and the rest of the world needs to reflect on the way forward. America‘s
First Amendment constitutionally guarantees freedom of expression, including offensive speech.
But will the Muslims and the Muslim World respond intelligently and appropriately?
32.
The adverse socio impact this issue would have on the multicultural and diverse
demographics of the South Asian states cannot be denied as this would be a spring board for
many extremist and nationalistic movements.
U.S Presidential Elections
33.
United States of America may be some 11,000km West from the Middle East yet, its
influence in the region is critical. Middle-East and Israel have been the major foreign policy
concern of the U.S over the years. The results of the U.S Presidential elections is a vital
standpoint that would ultimately change the reflection of world geopolitics. Following the third
and final round of the American Presidential debate on 23rd Oct, 2012 the foreign policy
roadmaps of both the Republican and Democratic Parties could be summed-up as follows:
Republicans stresses that, “America has a responsibility and the privilege of helping defend
freedom and promote the principles that make the world more peaceful." Democrats assert that,
"America remains the one indispensable nation. And the world needs a strong America."
34.
Overall, both the foreign policy statements seem much similar in a neutral point of view.
Ironically, it is undeniable that the U.S as a whole does not view in making drastic changes to its
66
Trinco Dialogue Maritime Symposium 2013
foreign outreach in the Middle East, though there are positive gestures for negotiations to be
taken on with Iran.
CONCLUSION
35.
The revolutionary waves of the ‗Arab Spring‘ across Middle East have indeed shaken up
the predominantly autocratic Arab states resulting in a new paradigm shift of geopolitics.
Meanwhile, tensions lurk in the Strait of Hormuz as Iran expresses signs of a probable blockade
in response to provocative sanctions by the United States against its oil exports. Israel‘s
aggressive military and political outreach has increased the volatility of the context and a status
of brink of war in the region.
36.
Hence, the present context of politics and power parity in the Middle East is turning the
region into an inferno, triggering a global energy crisis in the making. The Asian reaction to
―Innocence of Muslims‖ and the Arab Spring elicited a mix reaction in Asia.
37.
Meanwhile, South Asian countries, remittances from workers in the Middle East are
among the largest and most stable sources of foreign exchange in their developmental and thus
any sort of surge of violence in the region would indeed have after shock effects in South Asia.
Amidst, these serious developments Sri Lanka is facing multifaceted challenges in sustaining
much needed crude oil imports for its redeeming economy and maintaining diplomatic relations
with Iran.
38.
Though, Sri Lanka has responded to the U.S - Europe urge in reducing oil imports from
Iran (from 13% t0 10%), its energy security is still in doldrums in an escalation of war or high
intensity in the Middle East. The situation would in quick secessions turn from bad to worse as
opposition political parties are likely to cease the opportunity leading to a social and political
unrest in the country. Hence, Sri Lanka should seek alternative energy supply routes as
possibilities lies in East Asia. Time has come for the island state to reinstate an Eastward base
foreign policy.
67
Trinco Dialogue Maritime Symposium 2013
CYBER TERRORISM AND ITS IMPLICATIONS TO LOW INTENSITY
OPERATIONS GIVING SPECIAL EMPHASIS TO MARITIME DOMAIN
Commander (S) ABRA De Silva,
RSP, psc, MDS
A/CS(SPDC)
―Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.‖
- Shamsuddin Abdul JalilINTRODUCTION
1.
The growing computer technology and their associated networks are propelling the
worked into the information age. Computers may up rise terrorism in the same manner that they
have turn everyday life.
2.
Terrorism in the information age will consist of conventional terrorism, in which classic
weapons (explosives, guns, etc.) will be used to destroy property and kill victims in the physical
world. techno-terrorism, in which classic weapons will be used to destroy infrastructure targets
and cause a disruption in cyberspace; and cyber-terrorism, where new weapons (malicious
software, electromagnetic and microwave weapons) will operate to destroy data in cyberspace to
cause a disruption in the physical world.
3.
Cyber attacks can originate from terrorists, governments, their proxies, and common
hackers. Computers and computer software are increasingly utilized to attack targets with
computer viruses, malware, and other programs or to overload or deface websites. This theatre
includes both an offensive and defensive aspect.
4.
There have been a multitude of offensive efforts to hack into various state systems,
utilities or banks, to affect disruptions in operations, send political messages, or obtain sensitive
68
Trinco Dialogue Maritime Symposium 2013
information. Additionally, individuals and commercial enterprises have been hit by hackers as
have electric utilities.
AIM
5.
The aim of this paper is to analyse the threat of cyber terrorism and its implications to
low intensity operations giving special emphasis to maritime domain.
Categories of Potential Information Age Terrorism
6.
This paper identifies three categories of potential information age terrorism: conventional
terrorism, techno-terrorism, and cyber-terrorism. Conventional terrorism destroys or threatens a
symbolic target of violence in the physical world. Conventional terrorists may use information
warfare tactics to plan and execute these actions more effectively. Techno-terrorism is designed
to have an effect in cyberspace using physical means; this type of terrorism includes bombing
infrastructure targets (power, telecommunications, etc.) to create a disruption in cyberspace.
Techno-terrorists do not utilize physical destruction, such as bombing a power station, to convey
a message. Rather, they rely on the attendant cyberspace disruption to garner publicity for his
cause. Cyber-terrorism is terrorism that operates exclusively in cyberspace. The cyber-terrorist
could utilize an entirely new class of weaponry, possibly including malicious software or
electromagnetic pulse generators, to manipulate or destroy information in cyberspace. Because
cyber-terrorists do not operate using ―conventional" techniques, the lessons learned from
previous counter and anti-terrorism efforts might be of limited value.
What is Cyber Terrorism?
7.
Cyber-terrorism is the use of Internet based attacks in terrorist activities, including acts of
deliberate, large-scale disruption of computer networks, especially of personal computers
attached to the Internet, by the means of tools such as computer viruses.
8.
Cyber terrorism can be defined as electronic attacks from cyberspace from both the
internal and external networks, particularly from the Internet that emanate from various terrorist
sources with different set of motivations and are directed at a particular target. The cyber
terrorists generally perceive their targets to be either high-profile components of a nation‘s
critical infrastructures or business operations. The main objective of these terrorists is to inflict
damage which will either compromise or destruct targets in order to cause major physical and
psychological impacts to them.
69
Trinco Dialogue Maritime Symposium 2013
Cyberspace
9.
Cyberspace is a term coined to capture the essence of "where" computers work. While the
physical components of computers and their networks are necessary for cyberspace to exist, it is
more than merely the sum of these parts. Winn Schwartau defines cyberspace as follows:
‖Cyberspace is that intangible place between computers where information momentarily
exists on its route from one end of the global network to the other. When little Ashley
calls Grandmother, they are speaking in Cyberspace, the place between the phones.
Cyberspace is the ethereal reality, an infinity of electrons speeding down copper or glass
fibers at the speed of light from one point to another. Cyberspace includes the air waves
vibrating with cellular, microwave and satellite communications. According to John
Perry Barlow, cofounder of Electronic Frontier Foundation, Cyberspace is where all of
our money is, except for the cash in our pocket."
10.
The Defence Information Systems Agency, a branch of the Department of Defence
charged with conducting defensive information warfare defines cyberspace as:
―The electronic environment formed by the aggregate of global computing and
telecommunications resources. Cyberspace is a virtual 5th dimension characterized by:
no geographic, national, or temporal boundaries, no ownership, laws, or identity cards. ‖
11.
Cyberspace does not have a physical reality. One cannot physically "enter" cyberspace. It
consists of the "virtual world" through which all electronic transactions take place. It is in this
realm that the cyber -terrorist will operate.
Weapons of the Cyber-terrorist
12.
The weapons of the cyber-terrorist are not designed to kill people or break physical
objects. Rather, they exist exclusively to destroy or modify computer data. The weapons and the
targets are the electrons moving within cyberspace. While it is possible to attack this data
without any human interfaces, the human is usually the weakest link in a computer system. Some
of the mode of operandi is as follows
a.
Pest Programs.
(1)
Trojan horse attacks- implanting malicious code, sending letter bombs.
(2)
Logic bombs-setting time or event bombs.
(3)
Malevolent worms- denying access to distributed resources.
(4)
Virus Attacks- attaching code to programs and replicating it.
b.
Bypasses.
(1)
Back door attacks- using existing flaws in software for exploitation.
(2)
Authorization attacks- password cracking, hacking control files.
(3)
Active Misuse.
70
Trinco Dialogue Maritime Symposium 2013
(4)
(5)
(6)
c.
Creating, modifying, denying service, entering false or misleading data
Incremental attacks- using salami tactics.
Denials of service- launching saturation attacks.
Passive Misuse.
(1)
Browsing- reading and copying with apparent authorization
(2)
Interference, aggregation- exploiting database searches, traffic analysis
Indirect misuse- preparing for subsequent misuses, off-line pre- encryptive
matching, factoring numbers to obtain crypto keys, auto-dialer and voice-mail
scanning.
13.
To achieve these results, the cyber-terrorist cannot use the weapons commonly employed
in conventional terrorism. While a conventional terrorist finds a fertilizer bomb effective in
blowing up a building or other symbolic target, a techno-terrorist will find the same bomb useful
in destroying a critical node in a network to cause disruption.
14.
Several cyber-terrorist weapons can have an impact on the networks of today and
tomorrow:
a.
Viruses. One of the most heralded weapons of a cyber-terrorist or a hacker is
the computers virus. Computer viruses are programs designed to perform actions
not
intended by the operator. These actions include erasing or modifying the data in a
computer's memory or storage with or without malicious intent.
b.
Trojan Horses. The second type of weapon is a Trojan horse. True to its name,
it is a program that does not appear to be destructive but releases a second program
to
perform a task unintended by the system operator. A Trojan horse can be used to install
a password "sniffer" program that collects the passwords of valid users
and
stores
them for later use by an intruder posing as a legitimate user.
c.
Worms.
Worms are programs originally developed to travel through systems
and perform mundane tasks, such as data collection or ensure of old data. While they
can be useful, if mis-programmed or programmed with malicious intent, they can be
extraordinarily destructive. A virus attaches itself to a host program, but a worm is
designed to spread across a computer network independently.
d.
Humans. Computer operators are the vehicles by which viruses, Trojan horses,
and worms are initially programmed and then inserted into computer systems. In
addition to utilizing software attacks on a computer system, a cyber-terrorist or hacker
can attack a computer system through the vulnerability of its operators.
71
Trinco Dialogue Maritime Symposium 2013
e.
Electro-Magnetic Pulse Weapons. While not nearly as widespread as viruses,
there exists a class of weapons that destroy computers and electronics through an
electromagnetic pulse. The capability now exists to generate an instantaneous
electromagnetic pulse that will overload and destroy the sensitive circuitry in
advanced electronics and computer systems without the previously required
detonation of nuclear weapons in the upper atmosphere.
Types of Cyber Terrorism Attack
15.
There are various types of cyber terrorism attack that are deployed by cyber-terrorists.
According to the Center for the Study of Terrorism and Irregular Warfare at the Naval
Postgraduate School in Monterey, California, cyber-terrorism capabilities can be group into three
main categories; ―simple unstructured, ―advance-structured‖ and ―complex-coordinated‖ .
a.
Simple-Unstructured.
The capability to conduct basic hacks against
individual systems using tools created by other people. This type of organization possesses
little target analysis and command and control skills as well as limited learning capability.
b.
Advanced-Structured.
The capability to conduct more sophisticated
attacks against multiple systems or networks and possibly, to modify or create basic
hacking tools. The organization possesses an elementary target analysis and command and
control skills as well as relatively modest learning capability.
c.
Complex-Coordinated.
The capability for coordinated attacks capable of
causing mass-disruptions against integrated and heterogeneous defenses. The terrorists
have the ability to create sophisticated hacking tools. They are also highly capable of
conducting target analysis and command and control. They also possess advanced
organization learning capability. There are five main types of cyber terrorism attack which
are incursion, destruction , disinformation, denial of service and defacement of web sites.
Some of these attacks are more severe than the others and have different objectives. Itis
important for us to recognize the various methods of attack in order to gain a better
understanding on how they can be countered effectively.
d.
Incursion.
These type of attacks are carried out with the purposed of gaining
access or penetrating into computer systems and networks to get or modify information.
This method is very common and widely used with a high success rate. There are many
loop holes existing in insecure computer systems and networks and terrorists can take
advantage to obtain and/or modify vital information which can be used to inflict further
damages to the organization or for personal gain.
72
Trinco Dialogue Maritime Symposium 2013
e.
Destruction. This method of attack is used to intrude into computer systems and
networks with the main purpose of inflicting severe damage or destroying them . The
consequences of such an attack can be disastrous, whereby organizations might be forced
to be out of operations for an undetermined time, depending on the severity of the attacks.
It can prove to be very costly for the affected organizations to get their operations up and
running again and thus it will impact them hard financially and also damage their
reputation.
f.
Disinformation.
This method is used to spread rumors or information that
can have severe impact to a particular target. Regardless of whether the rumors are true or
not, the use of such attacks recklessly can create uncontrollable chaos to the nation or the
organization. This type of attack is quite difficult to contain since it can be done almost
instantly without the need to access the victims computer and network systems.
g.
Denial of Service. Denial of Service attacks or DOS attacks as they are more
widely known are also a common method of attack. The impact of such attacks is felt the
most by ecommerce enabled business that sells products or services online. Public
websites are also sometimes the target of this type of attack by cyber terrorists. The main
objective of DOS attacks is to disable or disrupt the online operations by flooding the
targeted servers with huge number of packets (requests) which would ultimately lead to
the servers being unable to handle normal service requests from legitimate users. The
impact from such attacks can be disastrous from both an economic and social perspective
where it can cause organizations to suffer from massive losses.
h.
Defacement of web sites.
This type of attack is targeted to deface the websites
of the victims. The websites can either be changed totally to include messages from the
cyber terrorists for propaganda or publicity purposes which might cause them to be taken
down or to re-direct the users to other websites which may contain similar messages. The
number of cases of such attacks has dwindled in the past few years thanks to a greater
awareness on the issue. However, a small number of such cases is still happening and thus
proper security measures will need to be taken to try to avoid such embarrassing and
financially disastrous situations from happening again.
What is Techno –Terrorism?
16.
Techno-terrorism is the intermediate step between "conventional" terrorism and "cyberterrorism." The techno-terrorist understands the importance of high technology networks and C2
systems to a "third wave" state. Unlike the cyber-terrorist, the techno-terrorist will target and
attack those systems that exist in the physical world to disrupt cyberspace. Thus, the computer
itself (hardware rather than software) is the target of the techno-terrorist. The techno-terrorist
73
Trinco Dialogue Maritime Symposium 2013
will use "conventional" weapons such as bombs and physical destruction to destroy or disable
those systems that control cyberspace.
Shift Towards Information Warfare Across the Conflict Spectrum
17.
Information warfare tactics are being employed across the spectrum of conflict. The
increasing importance of computers and their attendant networks make them primary targets for
both state sponsored espionage and crime. Terrorists have recognized the value of energy
distribution networks and some computer installations. At the level of insurgency and rebellion,
information warfare tactics have been used to subvert state controls of the media and for
communications between the rebel leadership and their worldwide support base.
The Threat From Hackers Turned Terrorist: Is it real?
18.
Penetration of computer systems is not difficult. Ex;The U.S. Defence Information
Systems Agency undertook a penetration study of Department of Defence computers. In 1994,
the agency attacked 8,932 servers and mainframes. They were able to gain access to 7,860 (88%)
of these systems. Only 319 (4%) of these attacks were detected and only 19 (.2%) of the
successful attacks were ever reported.
19.
The jump from hacker to terrorist is a small one that depends entirely on the hacker's
motivation and intent. While these cases prove that hackers can penetrate systems, it does not
examine the motivation for the hacker. Several studies of the group dynamics and individual
motivations for terrorists have been undertaken to help prevent terrorism. While similar studies
on the "computer underground" have been undertaken, an analysis of how a terrorist organization
might recruit a hacker would be worthwhile. As the world becomes more dependent on
computers, understanding what makes hackers "tick" becomes as important as understanding
what motivates terrorists.
20.
Low Intensity Conflict.
(LIC) is the use of military forces applied selectively and
with restraint to enforce compliance with the policies or objectives of the political body
controlling the military force. The term can be used to describe conflicts where at least one or
both of the opposing parties operate along such lines. Low-Intensity Operations is a military term
for the deployment and use of troops and/or assets in situations other than war. Generally these
operations are against non-state actors and are given terms like counter insurgency, antisubversion, and peacekeeping.
21.
Intelligence gathering is essential to an efficient basis of Low Intensity Conflict
operations. Electronic and signal gathering intelligence, ELINT and SIGINT, proves largely
74
Trinco Dialogue Maritime Symposium 2013
ineffective against low intensity opponents. Low Intensity Conflict generally requires more
hands-on HUMINT methods of information retrieval and to use same on the field of cyberspace.
22.
Maritime Capability of LTTE.
The LTTE‘ had established a naval combat unit
known as the ‗Sea Tigers‘, the LTTE was the only terrorist organisation which exisis in the
world that maintains a shipping network connecting the countries from east to west for the
purpose of both commercial and military interest.
23.
Cyber Terror Capabilities of LTTE.
The Patterns of Global Terrorism
Report 1997 identified the LTTE as being responsible for the first known attack by a ―terrorist
group‖ on a target country‘s computer system, when in August 1997 a group calling itself
―Internet Black Tigers‖ claimed responsibility for ―suicide e-mail bombings‖ aimed at disrupting
the electronic information network/communications systems used by Sri Lanka‘s Missions
abroad. This brazen act of ‗information warfare‘ paralysed the communication systems of most
of Sri Lanka‘s overseas missions. At the time the US said the incident ―did cause us to sit up and
take notice‖ because it was the first of its kind
involving a group branded as a terrorist
organization by Washington, and was a possible ―portent of worse things to come‖.
24.
Further, R.E. Kendall, Secretary General of the Interpol addressing the 14th symposium
on International Terrorism held in Colombo in September 1999, revealed that the LTTE was
among the major terrorist organizations which have websites used not only for propaganda,
communications
and
recruitment,
but
also
for
fund
raising.
25.
Links to Other Terrorist Groups.
The LTTE leader‘s instructions was to its
offices overseas in 2003 included the need to establish and develop relationships with ―other
liberation movements‖ which is suggestive of its continuing desire to maintain linkages with
these groups. There is also published research, which highlights such linkages with other
terrorist organizations such as United Liberation Front of Assam ( ULFA ), the Afghan
Mujahidin, the Kurdish Workers Party (PKK), Abu Sayaf, Moro National Liberation Front
(MNLF) and possibly to the Al-Qaeda. There is also the element of the LTTE contributing to
copy-cat terrorism through its suicide bomb technology, acts of maritime terrorism, and
nascent air strike capability:
a.
Most of the LTTE senior leaders have received specialised training in
countries like Lebanon, Libya in the late 80s and since then the LTTE maintains close
contacts with groups that have similar interests.
b.
It has been suggested that the LTTE established linkages with the Mujahidin
in Afghanistan as far back as 1987, and in 2001 an LTTE delegation travelled to abul
shortly before 9/11.
75
Trinco Dialogue Maritime Symposium 2013
c.
However the LTTE was cautious in maintaining contacts with these militants
following 9/11 attacks for obvious reasons.
d.
India's National Security Adviser M K Narayanan in a speech at th 42nd unich
Conference on Security Policy on 11 February, 2007 has said that both Jihadi movements
and the LTTE were relying heavily on funds from trafficking in narcotics.
e
The London based International Institute for Strategic Studies in its ublication
‗Military Balance 2007‘ goes further and refers to commercial links between the TTE and
the Al-Qaeda.
26.
These actions have rightfully alarmed the intelligence communities across the world,
because given its global outcome through the network of offices, operatives and vessels, the
possibility that the LTTE could offer its services as mercenaries to other groups, should not be
discounted.
ASSESSMENT OF TERRORIST THREAT IN MARITIME DOMAIN
Terrorist Threat Matrix
27.
In context of asymmetric threat, threat matrix evolves around, intention, capabilities of
the adversary and the opportunities available to the groups who carry out attack. The threat
matrix can be visualized from the following diagram of threat Matrix:
Capability
Intention
Ideological disposition
Past Activities
Human
Material
Opportunity
Vulnerability of the targer
Security environment
Composition of the
support
Fig 2 : The Terrorist Threat Matrix
76
Trinco Dialogue Maritime Symposium 2013
Terrorist Attack Characteristics
28.
Terrorist groups may choose any object as target beneficial in pursuit of their goal.
Therefore, it is particularly difficult to formulate attack characteristics of any terrorist group. US
congressional Research service (CRS) expressed a generic guideline of terrorist attack
characteristics in its report to US Congress on 9 January 2007. The maritime attack
characteristics are tabulated in table 1:
Dimensions
Perpetrators
Objectives
Locations
Targets
Tactics
Example Characteristics
* AI Qaeda and affiliates
* Islamic unaffiliated
* Foreign nationalists
* Disgruntled employees
* Other
* Mass casualties
* Port disruption
* Trade disruption
* Environmental damage
* ports
* Foreing trade partners
* Key shipping bottlenecks
*
*
*
*
Military vessel
Cargo vessel
Fuel tankers
Ferries / Cruise ships
*
*
*
*
Port area populations
Ship cannels
Port industrial plants
Offshore platform
*
*
*
*
Explosive in sucide boats
Explosive in light aircraft
Ramming with vessels
Ship-launched missiles
*
*
*
*
*
Underwater swimmers
Unmanned submarine bombs
Exploding fuel tankers
Explosives in cargo ships
WMDs in cargo shis
77
Trinco Dialogue Maritime Symposium 2013
Strategies to Deal with Cyber Terrorism Threats
29.
In order to counter the ill effects of cyber terrorism, strategic plans should be put in place
to ensure the well being of the nation and its citizens. In the followingyparagraphs, the steps that
can be taken by the parties involved to deal with the threats of cyber terrorism effectively will be
discussed.
Pursue and Prosecute the Perpetrators
30.
The parties that have been directly affected from attacks by cyber terrorists should be
more aggressive in pursuing the perpetrators . Even though this exercise might prove to be
costly, it will definitely be to the organization‘s advantage if they are able to identify the
perpetrators and prosecute them to the full extent of the law. If there is an increasing number of
such attackers that can be brought to justice, it might change the general mindset of the cyber
terrorist community and they will need to think long and hard of the consequences of their
actions if they are going to get caught. Thus it might prove to be a good way of decreasing the
number of such attacks in the long run.
Develop Best Security Practices
31.
Organizations should ensure that they develop and deploy a tested set of best security
practices suited specifically for their own operations. These activities will require a lot of
coordinated efforts from all parties in the organization because security procedures should be
followed by every department. The developed list of the best security practices should cover all
the aspects involved in information security. As a starting point, it would be a good idea to adopt
existing international standard guidelines for information security such as ISO17799 or BS7799.
These standards provide the detailed steps that should be taken to secure oganizations from an
information security standpoint. The organizations can later modify or improve on the provided
guidelines and adapt it based on their own operations and needs in order to obtain the best
results.
Be Proactive.
32.
Organizations and the general public should be more proactive in dealing with cyber
terrorism issues by keeping up to date on the latest information related to threats, lnerabilities
and incidents and they should be more committed in improving their information security
posture. By being constantly aware of the various components of cyber terrorism that could
directly affect us, we would be able to be implement stronger security measures that would
reduce the chances of cyber attacks from happening to us. Organizations should always be
looking to improve upon their existing security infrastructure. Organizations should deploy
78
Trinco Dialogue Maritime Symposium 2013
multi-level security architecture instead of the single-tier ones in order to protect themselves
better. Critical activities such as security audits should be performed more often to reduce
redundancies in the security implementation . It should be remembered that security is a
continuous process, not an off the shelf solution. Thus, in my opinion the best way to handle
security is to be proactive about it .
Deploy Vital Security Applications.
33.
The use of security applications such as firewalls, Intrusion Detection Systems (IDS),
anti-virus software and others should be encouraged and in some cases, mandated to ensure
better protection against cyber terrorism. Organizations should deploy both network and hostbased IDS along with other security applications . There should be personnel who are assigned to
record, monitor and report all suspicious activities in the organization‘s network and with the aid
of the latest security systems, all these tasks can be done much faster and simpler. The
prevention and retention of critical information required for forensic analysis should be ensured
in order to facilitate further investigations.
Establish Business Continuity and Disaster Recovery Plans.
34.
It is important that business continuity and disaster recovery plans should be in place in
all organizations. These plans, to be included with incident response activities if not in existence,
should be established and maintained. These plans should be rehearsed and tested at regular
intervals to ensure their effectiveness. The plans that are implemented should involve two main
activities which are repair and restoration . The repair activity should fix the problem in order for
the function to operate normally. The restoration plans should be activated with pre-specified
arrangements with hardware, software and service vendors, emergency services, public utilities
and others.
Cooperation with Various Firms and Working Groups.
35.
Organizations as well as the general public should establish working relationships or
arrangements with public and private bodies that could assist with various issues related to cyber
terrorism. These working groups can assist tremendously in activities such as developing
standard guidelines on improving organizational security, developing disaster recovery plans,
discuss on the emerging and rising issues in cyber terrorism and others. Thus by exchanging
information on such issues on a regular basis, it would create a pool of much
needed experts in the field of cyber terrorism in order to increase resistance in general from such
attacks.
79
Trinco Dialogue Maritime Symposium 2013
Increase Security Awareness.
36.
It is important to increase the awareness on cyber terrorism issues to the masses. By
educating them, they would realize the importance of defending themselves from such attacks
and thus it would assist in developing communities that are more proactive in dealing with
information security issues. Security ftraining programs can assist people to equip themselves
with the right skills and knowledge that are needed to protect their computer and networks
systems effectively.
Stricter Cyber Laws.
37.
The government can assist in controlling cyber terrorism attacks by adopting and revising
new cyber laws that will punish the perpetrators more heavily if they are involved in such
activities. New acts to encourage the development of efficient cyber security practices and to
support the development and permit the use of more effective tools for law enforcement should
be introduced.
Encourage Research And Development.
38.
Organizations especially from the public sector should support research and development
activities of personalized security tools such as firewalls and IDS. The main advantage of
pursuing this approach rather than buying off the shelf product is that it will leave the
perpetrators in the dark over the actual capabilities that the targets possess, and this can be a huge
advantage when dealing with such knowledgeable and experienced attackers.
39.
ISPS CODE ( International Ship And Port Security Code )
a.
Ship Identification number to be permanently marked on vessel‘s hulls
b.
Continuous Synopsis Record (CSR) kept onboard showing vessel history
c.
Ship or port Facility Security Assessment (SSA or PFSA ) ship or port Facility
security plan (SSP or PFSP)
d.
Ship or port Facility security Certificate (SSC or PFSC )
e.
Ship or port Facility security Officer (SSO or PFSO)
f.
Company security Officer
g.
Continuous ship to port security communication link
h.
Training and drills
80
Trinco Dialogue Maritime Symposium 2013
CONCLUSION
40.
Even though the field of cyber terrorism is relatively new to most of us, it has proved to
be a very challenging one. So far, significant progress has been made through industry and
government initiatives in many countries to protect against cyber attacks. It is widely accepted
and well known by everyone that security is not a one-stop solution. Instead it is a continuous
journey that requires everyone involved to be committed to it. The many aspects connected to
cyber terrorism such as understanding the different motivations and types of attack, realizing its
effects on critical infrastructures, businesses and humans, as well as undertaking the sometimes
complex steps to decrease the chances of such attacks from happening makes the task of
protecting against it such an enviable one. However, the implementation of strategic security
measures and improved working relationships among the various bodies including the industry,
the government and the general public provide all of us a strong hope of winning this battle. The
fact of the matter is, cyber terrorism is here to stay and we still have a long way to go in
protecting the nation‘s, businesses‘ and our interests effectively against it. The good news
though, with the various strategic plans in place, we are getting closer to achieving our main
objective which is to have a highly secure and productive working environment.
81
Trinco Dialogue Maritime Symposium 2013