Tag Archives: Terrorism

Re-Post: Al Shabaab Is Only the Beginning

As Boko Haram declares its own caliphate, we re-post this article from 7 OCT 2013.

On the Run, or Running Somewhere New?

After the massacre at Westgate, many American media outlets acted as if they were only hearing Al-Shabaab’s name for the first time. This is only the tip of the US Medias Fifth-Estate-Failure iceberg. While incidents may be reported in part and parcel, the staggering scale of militant Islam goes disturbingly unreported. While many of these movements remain separate to a point, the geographic and communicative proximity provided by globalization serves as a catalyst for a horrifying potential collective even more monstrous than anything we could imagine in Afghanistan.

Globalization of De-development

Yellow: Attacks Red: Open Extremist Conflict Orange: Getting Close Skull: Who do you Think?
Yellow: Attacks
Red: Open Extremist Conflict
Orange: Getting Close
Skull: Who do you Think?

ADM Stravridis pegged this problem squarely on the head when he brought up convergence, that globalization is merely a tool. What can be used to organize communities and build stable growing economies can also help coordinate civilization’s detractors. To spread our gaze further than the recent events in Libya and Somalia, Boko Haram fights a war against the Nigerian government; this is spreading into Niger, Camaroon, and Chad through a porous border. Its militants have also been found in in Mali, where they fought and trained with both Movement for Oneness and Jihad in West Africa (MOJWA) and Al-Qaeda in the Islamic Maghreb(AQIM) (MOJWA’s former parent organization). There, they fight an open war with the government. MOJWA meanwhile is also fighting in Niger. In one case, even more with al Mua’qi’oon Biddam in revenge for an AQIM leader killed by the French and Chadians in Mali. While the forces of globalization may allow nice things like the Star Alliance global airline network, it can also be harnessed to create this jihadist hydra.

With Somalia’s conflict spreading beyond its borders in the east and the coalition of chaos in the west, the center is not holding either. The Central Africa Republic sits in the middle, with potential militant Islamic rebels causing mayhem throughout the country after a successful coup… not that their neighbor is doing much better. Oh, did we mention Egypt too? No? Well… I’ll stop before I’ve totally crushed my own spirits. The tendrils of many different militant groups, often associated with, facilitated by, or directly franchised by Al Qaeda grow close together in a vast body of uncontrolled spaces.

Why the Navy?

So, it’s African Navies week, and I’ve yet to get to maritime security. You’d be correct to assume that, as with Somalia, these problems don’t have primarily naval solutions… but effective maritime security will help prevent the growth of the power vacuum and encourage shore-side virtuous cycles.

The critical importance of maritime security is both pushing back the lawlessness and increasing entry costs for illicit actors. Lawlessness builds vacuums of civil order or undergrounds paths for militant Islam to enter either the money or idea markets. Islamic Militancy isn’t just sporadic and spontaneous violence; it’s also a massive logistics and patronage system that funds militants and creates in-roads into local communities. Where al-Shabaab can utilize the Ivory trade along with the LRA (wouldn’t that be a lovely marriage of convenience), who is to say Boko-haram couldn’t find in-roads into the multi-billion dollar oil-theft market, cocaine trade, or the full-on theft of motor vessels for movement of arms, persons, or stolen goods, let alone the Nigerian piracy enterprise which now even exceeds that of Somalia. Law enforcement needs a “last line of defense.” As stolen ships, goods, and persons leave the shore, the maritime presence is that final check of a state’s strength of institutions. This not only sweeps back this vast illegal enterprise, but also makes it harder later to re-enter the market.

That strength has a virtuous effect, since a rising tide lifts all boats. The improvement of civil society is not completed one institution at a time. Professional courts require professional police require professional elected officials, etc… etc… etc… Improvements to navies and coast guards help improve other portions of military and law enforcement infrastructure. Especially as such lucrative opportunities arise as crime’s payout and connections increase, closing such temptations through capabilities and professionalism is important.

Bottom Line

Africa is critically important to future global security. Despite its great economic growth, improving institutions, and growing innovation, the forces of terrorism so long reported “on the run” are growing and connecting at an alarming rate, even in places some thought secure. In such a vast countryside with at minimum half-dozen Afghanistan-sized poorly controlled areas, rolling back this development is of deadly importance. Maritime security, while not the primary arena, will help stay the spread of the lawless vacuum in which militancy thrives and help improve surrounding institutions to further minimize that vacuum ashore.

Matt Hipple is the Director of Online Content for the Center for International Maritime Security. The opinions and views expressed do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy..

The Mumbai Attack: Terrorism from the Sea

This is an article in our first “Non Navies” Series.

Nearly six years ago, Pakistani terrorists from Lashkar-e-Taiba (LeT, meaning Army of the Righteous) launched a sophisticated raid on the Indian port of Mumbai. Ten LeT operatives held the city captive from 26-29 November 2008, killing 164 people and injuring more than 300 others. Fascinating in its counterterrorism aspects, the Mumbai attack is particularly noteworthy for those of us in maritime professions because of how they got there: by sea. LeT highlighted in detail how an irregular organization can circumvent landward control measures by turning to the maritime environment.

A pre-26/11 U.S. Department of State fact sheet on Lashkar-e-Taiba.
A pre-26/11 U.S. Department of State fact sheet on Lashkar-e-Taiba.

Violent extremist organizations (VEOs) such as LeT succeed in irregular warfare by going where government authority is absent or insufficient. The Indo-Pak coast is no exception. The expansive region has supported the livelihood of fishermen and merchants for centuries, making it a permeable environment where minimal government presence was (and remains) tolerant of transient craft. Such an environment offers myriad advantages compared to overland routes where government checkpoints and patrols are far more rigorous. VEOs continue to pursue these overland routes for infiltration or smuggling, but LeT minimized the chance of their high-stakes attack being interdicted by Indian authorities when they chose to come by sea.

The raid itself wasn’t the first iteration of LeT’s maritime infiltration. For example, in late-2006/ early-2007 eight operatives rendezvoused at sea with Indian LeT members aboard an unidentified fishing vessel and returned with them to reconnoiter Mumbai. This gave them ample opportunity to assess the coastal pattern of life, including security presence and traffic density, as well as to gather imagery of everything from landing sites to target location from the perspective of the raiding party. Once ashore they split into two-man teams, just as the raiding party would do, observing the area by travelling from safehouse to safehouse. They were not discovered during the seaborne infiltration nor during the reconnaissance of Mumbai. However, two of the eight were arrested in March 2007 by the Jammu & Kashmir police (Jammu & Kashmir being a state in northern India). During interrogation the two suspects gave specific information about their infiltration of Mumbai as well as LeT’s desire to use the sea as a routine ingress. Neither this shot-across-the-bow nor corroborating intelligence provided by U.S. and Indian agencies proved sufficient to energize India’s maritime security agencies.

After more than a year of training on the Mangla Dam reservoir in Kashmir, the raiding party departed Karachi on 21 November 2008 aboard motor vessel HUSSEINI. They spotted the Indian fishing vessel KUBER two days later in Pakistani waters. Though their plan had been to hijack a Mumbai-based craft in Indian waters, KUBER’s Indian registry enticed them to seize it as an early opportunity. They were able to come alongside, possibly by feigning distress, and quickly commandeeredthe fishing boat. The raiding party embarked KUBER and transferred all of her crew except the master to HUSSEINI. The raiders started towards Mumbai after the equipment was moved aboard and HUSSEINI returned to Karachi. The four fishermen taken from KUBER were executed, their bodies left adrift on the sea.

The transit to Mumbai was filled with map reconnaissance, table-top rehearsals, equipment prep, as well as probable comms checks and intel updates from LeT’s ad hoc operations center in Pakistan. KUBER arrived off the coast of Mumbai unscathed and unaddressed by maritime authorities on the evening of 26 November. The master was bound and his throat slit. The raiding party assembled their inflatable Gemini boats (counts vary from one to three), transferred their equipment and began the 4 NM insert under cover of darkness. KUBER was left adrift with a GPS, satellite phone, and other materials that would prove instrumental in developing the backstory during the subsequent investigation.

It’s unknown where the inflatable craft parted company (assuming there was more than one), but multiple beach landing sites were used. In the truest sense of camouflage, the boat(s) were not colored black and green to blend into the night, but bright yellow to blend

One of the boats used by LeT to insert into Mumbai.
One of the boats used by LeT to insert into Mumbai.

into the menagerie of local craft- undoubtedly a result of the early reconnaissance. At one site the operatives cheerfully claimed to be college students. At the other site they responded gruffly to locals, telling them to mind their own business, possibly even displaying their weapons. They continued unhindered in both cases, abandoned their craft on the beach, and shortly thereafter waltzed into history as executioners in a horrific raid.

To recap: LeT reconnoitered by sea, trained on Pakistan’s inland waterways, departed a major sea port (Karachi), hijacked a fishing vessel illegally operating in Pakistani waters/EEZ, transited unmolested across 500 NM of Indo-Pak littorals, amphibiously inserted into the Mumbai metropolis unchallenged, and came ashore unnoticed save for a handful of local fishermen accustomed to illicit maritime activity.

LeT violated the Indo-Pak littorals with impunity and conducted a raid heralded as a wake up call for maritime terrorism. This raid indeed required a great deal of competence, but VEOs embracing riverine or littoral waters as a maneuver space should not have come as any surprise. Then and now, the Niger River Delta and the Gulf of Guinea were abused by criminal organizations on a daily basis; Philippine waters were plagued by Abu Sayyaf; Colombian Riverines routinely battled the FARC and AUF; and in the U.S.’s backyard were organizations trafficking drugs, money, and violence through the Caribbean, Western Pacific, and Rio Grande. Oceans and waterways are indeed the vital connective tissue of the world, but they are open for both legitimate and illegitimate business alike.

So how do nations prevent VEOs from gaining an advantage in the maritime domain? First, by viewing the fight against irregular enemies as more than a footnote to the Mahanian themes used to define influential maritime powers. Thirteen years of war in Iraq and Afghanistan have taught our landward compatriots a valuable lesson: maneuver warfare is on the back-burner and irregular adversaries are in. The world’s maritime agencies must adapt that lesson themselves or risk learning its reality firsthand in the aftermath of attacks like Mumbai, the USS COLE, or SUPERFERRY 14.

One way of adapting that lesson would be borrowing two key themes from counterinsurgency: presence and engagement. Simply put, government authority must be present to win. That’s easier said than done when talking about enormous littoral and riverine areas. The key must then be cooperation. Within a country, that means developing a culture of partnership amongst government agencies (e.g. Customs, Coast Guard, local law enforcement) to supplement each other’s presence and intelligence efforts. No one agency can be everywhere, but a network of agencies can cover waterspace far more effectively. That cooperation and partnership must also be extended across national borders since, as we have seen, VEOs are not bound by such borders. Here we can find a blend of Mahanian themes and irregular fights- countries who can project seapower beyond their local shores can train and enable

U.S. Navy Riverines discuss tactics with their Colombian counterparts using a hasty terrain model.
U.S. Navy Riverines discuss tactics with their Colombian counterparts using a hasty terrain model.

the local seapower partner nations, thereby strengthening both. But they must have the right tools (i.e., riverine and littoral units) with the mindset for the job, neither of which can be best employed until irregular warfare moves beyond its footnote status.

Next, local maritime communities must be engaged. The fishing and merchant culture which was mentioned earlier as giving rise to the permeable maritime environment may be the best asset for monitoring it. These tradesmen have numerous networks, both formal and informal, that if partnered with or sourced by human intelligence professionals may reveal nefarious activity (e.g., combat training on Mangla reservoir or strangers who are out of place in Mumbai). Additionally, reliable engagement builds trust, which in turn builds security by aligning the interests of local communities and lawful government for mutual benefit. If the government is the trusted partner of the community, then this is precisely anathema to the VEOs which wish to destablize the community or exploit the disconnect from government to conceal their operations.

VEOs and irregular warfare in the maritime domain are not up-and-coming prospects, they have been here for some time. High-visibility attacks such as the Mumbai raid bring them to the foreground every so often, but after the 24-hour news cycle returns to mundane matters these VEOs continue to skillfully exploit the world’s waterways. There is, frankly, nothing new about what has been said here. But for the time being, these suggestions bear reiterating so we can fuel the discussion and move the ball forward.

Alan Cummings is a 2007 graduate of Jacksonville University. He served previously as a surface warfare officer aboard a destroyer, embedded with a USMC infantry battalion, and as a Riverine Detachment OIC. The views expressed here are his own and in no way reflect the official position of the U.S. Navy. 

The ISPS-Code and Maritime Terrorism

By Lars H. Bergqvist

As a response to the 9/11 attacks, the International Ship and Port Security code (ISPS) came in to force 1st July 2004. Thus, 10 years have passed, since merchant ships in international trade and the ports they are calling, were required to be certified to a certain security standard.

Background

Most legislation in the maritime world is initiated by some kind of maritime disaster or accident. The Titanic catastrophe, where many passengers and crew members perished due to the fact that there were not enough lifeboats, gave birth to international safety regulations.(1) The MARPOL-convention came in to force a few years after a serious oil pollution, caused by the grounding of the tanker Torrey Canyon on rocks near the Isles of Scilly.(2) Further, despite proper rules and regulations, a very high number of accidents caused the International Maritime Organization (IMO) to implement the International Safety Management Code (ISM).(3)

Contrary to previous conventions and codes, the creation of the ISPS-code was caused by a disaster that happened ashore, when hijacked aircrafts on the 11th of September 2001 flew into the twin towers of the World Trade Center, destroyed part of Pentagon and crashed on a field in Pennsylvania.

In peace time, to facilitate trade, merchant ships have traditionally been entering territorial waters and ports without much hindrance. The embarkation of port authorities, with clearance and free pratique granted has occurred once the ship was alongside a berth or at a customary anchorage.

With such an easy access to seaports, security experts were of the opinion that merchant ships could be used as a tool by terrorists. Different scenarios were developed, where merchant ships were means of transportation of terrorists and their weapons, or that the ship in its own right was a weapon. An example given was the risk of gas ships being hijacked and blown up in busy seaports.

Urgently, legislation was needed to protect both merchant ships and seaports.

Implementation

At a Conference of Contracting Governments to the International Convention for the Safety of Life at Sea (SOLAS), held at IMO headquarters in December 2002, The International Ship and Port Facility Security Code was adopted.

A code written and adopted, just in little more than one year after 9/11, must have been some kind of record. The time period from adoption to enforcement was also very short, only 18 months had passed when the Code came into force on the 1st of July 2004.

During that one and a half year some 50,000 ships were certified, and hundreds of thousands of seafarers and office personnel were educated for their new roles as Ship Security Officers (SSO) and Company Security Officers (CSO). An equally daunting task, port facilities on all continents, with personnel, should be certified and educated.

However, extraordinary times demand extraordinary measures and with a concerted effort from all stake holders in the shipping industry, the ISPS-code was properly enforced.(4)

What is maritime security?

Maritime security has always been a part of commercial shipping. Piracy is as old as shipping itself and stowaways is hardly a new problem either. During wars, the merchant marine has been an integral part of the war effort, being a vital support line for warring nations in need of weapons, food, oil and other commodities.(5)

Thus, war, piracy and stowaways are threats that the shipping industry has been dealing with for a long time. Administrations and ship owners´ associations have for decades been issuing regulations and instructions in an attempt to assist seafarers to deal with the perils.

For example, during the cold war, all Swedish ships were by the Swedish Maritime Administration issued with an instruction about how to act during crisis and war.

Some 30 years ago, with the appearance of modern piracy, the International Maritime Organization(6) and the International Chamber of Shipping(7) issued guidelines.

In 1957, an international convention relating to stowaways was adopted, although not yet in force (8), and there are policies issued about how to deal with stowaways.(9)

However, any specific instructions, how to protect a ship against terrorists, prior to the ISPS-code, were never issued. The Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation, which was agreed upon after the spectacular hijacking of Achille Lauro, was only addressing punishment of acts that could threaten the safety of maritime navigation.(10)

Maritime terrorism before ISPS-code (before 1 July 2004)

The Council for Security Cooperation in the Asia Pacific(11) has offered an extensive definition for maritime terrorism:

“…the undertaking of terrorist acts and activities within the maritime environment, using or against vessels or fixed platforms at sea or in port, or against any one of their passengers or personnel, against coastal facilities or settlements, including tourist resorts, port areas and port towns or cities.”

Similar to the ISPS-code, not only ships are considered as objects for maritime terrorism, but also port facilities.

Maritime terrorism is not rampant, nevertheless there have been a steady flow of incidents during the last 50 years. The Global Terrorism Database (GTD) at the University of Maryland(12) is an open-source database on global terrorist incidents (including maritime), covering events from 1970 through 2012.

From 11th June to 1970 to 1st July 2004, there were 212 maritime terrorism incidents. However, most of those incidents were on rather low level, like the incident with GTD ID: 200112120005; “12/12/2001: Members of People’s Revolutionary Army (ERP) set up an illegal checkpoint along the Cauca River near Magangue, Sucre, Colombia. The rebels stopped a canoe traveling along the river and abducted nine of the passengers. Three people were released the next day. Specific motive is unknown.”

Still there are some significant incidents that got an extensive media coverage.

–          Santa Maria: The hijacking of the Portuguese passenger ship Santa Maria is considered to be first case of maritime terrorism. On January 22, 1961, 24 leftist Portuguese terrorists hijacked the luxury cruise liner. The ship was carrying 600 passengers and a crew of 300. The would-be hijackers embarked the vessel as passengers at the port of La Guairá in Venezuela and on the Dutch island of Curacao, with weapons hidden in their suitcases. The terrorists took over command of the vessel, but eventually surrendered when they were given political asylum in Brazil.(13)

–          Sounion: A few years prior to the outbreak of the civil war in Lebanon, in March 1973 the Greek passenger ship Sounion sunk in the port of Beirut. A limpet mine was attached to the ship`s hull by Palestinian terrorists while ship was in dock, with the aim of blowing up the ship once at sea. Due to the interference of a Swedish undercover agent based in Lebanon, the departure was delayed, passengers could disembark and the ship sunk while still alongside the berth.(14)

–          Shadow V; A fishing boat owned by the former First Sealord and last Viceroy of India, Lord Mountbatten. In September 1979, while onboard the boat in waters near his summer home on Ireland, a bomb planted by the Irish Republican Army exploded and killed him.

 –          Rainbow Warrior; A Greenpeace ship sunk by the French foreign intelligence service in the port of Auckland, New Zealand, July 1985. Not an act of terrorism as such, but two French secret service agents was found guilty and sentenced to ten years in prison by the New Zealand court of law.

–          Achille Lauro; InOctober 1985,the passenger ship while on a cruise in the Mediterranean, was hijacked by four terrorists from Palestine Liberation Front, off the coast of Egypt. After only two days of negotiation, but after they had killed an elderly American passenger, the hijackers gave up when they were promised political asylum in Tunisia. However, justice was swift, as US warplanes forced the Egyptian airliner carrying the hijackers to land in Italy.

As a result of the hijacking, the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation (SUA) was developed and adopted.

–          The Tanker War; With something that can be refer to as state terrorism, both sides attacked shipping in the Persian Gulf, mainly tankers, during the Iran-Iraq war between 1980 and 1988. According to sources more than 400 seamen were killed and 340 ships were attacked, during the conflict.(15),(16)

–          The Tamil Tigers; During the civil war between the Sri Lankan government and the Liberation Tigers of Tamil Eelam, the latter was involved in maritime terrorism with its Sea Tigers brigade. The brigade was accused of hijacking several vessels in waters off the coast of Sri Lanka, including Irish Mona (in August 1995), Princess Wave (in August 1996), Athena (in May 1997), Misen (in July 1997), Morong Bong (in July 1997), MV Cordiality (in Sept 1997) and Princess Kash (in August 1998).(17) One spectacular act of maritime terrorism was the suicide attack on the tanker Silk Pride. (18)

–          USS Cole; Although a warship, the modus operandi used by the attackers was kind of a harbinger, when in October 2000, a small craft laden with explosive commanded by Al Qaeda suicide bombers hit the US Navy destroyer. The attack killed 17 sailors and wounded another 42.

–          M/T Limburg; In October 2002, the French owned crude oil carrier was attacked when approaching an offshore terminal off the coast of Yemen. An explosive-laden boat rammed the hull of the tanker, causing an explosion followed by fire.(19)

 –          Superferry 14; Regrettably, the ferries of the Philippines have a very bad safety record. Also, the maritime security record has been tarnished. The February 2004 terrorist attack on

Superferry 14 caused the death of 116 persons.(20) Suicide bombers from the Al Qaeda linked

Abu Sayyaf group, using a boat loaded with explosives, were the perpetrators.

Maritime terrorism after ISPS-code (after 1st July 2004)

Supporters of the ISPS-code may argue that the code has been successful since there have been no serious maritime terrorist attacks since the implementation.

Detractors may argue that the code did not help much in protecting seafarers against the menace of modern day piracy.

Whatever opinion someone may have, the code was developed to protect the international community against terrorism, and as such it has been a success. Piracy and terrorism are different crimes, needing different approaches. And, according to conventional wisdom, the link between terrorist and pirates is very weak.

Although a positive impact on the security situation by the Code, there have been some serious incidents.

–          Don Ramon; The second maritime terrorist attack by Abu Sayyaf took place in August 2005 onboard the passenger ship Don Ramon in Filipino waters. Terrorist had placed a timed bomb beneath gas cylinders in the ship`s galley, causing the ship to sink and wounding 30 passengers.(21)

 

–          M Star; In July 2010, the Japanese owned very large crude oil carrier experienced an explosion when transiting the Strait of Hormuz. Although no craft was sighted, the explosion made a large dent in the hull, parts of accommodation were slightly damaged and one crewmember was injured. After two days, the terrorist group Brigades of Abdullah Azzam claimed responsibility.(22)

–          Yemen, level 3; In August 2013, due to a high level of activity by Al Qaeda affiliated groups in Yemen, the Government of United Kingdom raised the ISPS security level to level 3 for British flagged ships in Yemeni territorial waters. A serious situation indeed, since an elevation to level 3 was unprecedented since the ISPS code was introduced in 2004.(23)

 

–          Cosco Asia; In September 2013, while on transit in the Suez Canal, the Chinese owned container vessel under the flag of Panama, was hit by a rocket propelled grenade. The ship sustained only minor damages, and there were no casualties. An Islamist group named Al-Furqan claimed responsibility for the attack.(24) Although a minor attack, it was of great concern for the Egyptian government, due to the economic importance of the Canal. To increase security, a protective wall along the Canal is in the process of being constructed.(25)

The future of the code

Like with all new regulations, ISPS-code was initially met with some skepticism from the end users, i.e. the seafarers. However, the code is now an accepted part of shipping, and the advantages are being appreciated.

Obviously, the code can be modified to the better, by catering more for the threat of piracy and stowaways that are much more of real threats than terrorism.

IMO has listed some of the remaining challenges; (26)

  1. Lack of national legislation/guidelines on ISPS code implementation.
  2. ISPS code as a mean to address all maritime security threats.
  3. Deciding on an appropriate risk assessments methodology.
  4. Dissemination of good practices on port facility security.
  5. Who audits the auditor?
  6. Ships` encountering difficulties after calling a high-risk port.

Lars H. Bergqvist is a Swedish master mariner and a reserve officer in the Royal Swedish Navy.

Footnotes

  1. http://www.imo.org/KnowledgeCentre/ReferencesAndArchives/HistoryofSOLAS/Pages/default.aspx
  2. http://www.imo.org/KnowledgeCentre/ReferencesAndArchives/HistoryofMARPOL/Pages/default.aspx
  3. http://www.admiraltylawguide.com/conven/ismcode1993.html
  4. http://www.imo.org/ourwork/security/instruments/pages/ispscode.aspx
  5. Sometimes referred to as “The Fourth Service”.
  6. Resolution A.545(13), “Measures to prevent acts of piracy and armed robbery against ships.” http://www.imo.org/blast/blastDataHelper.asp?data_id=22356&filename=A545(13).pdf
  7. International Shipping Federation/International Chamber of Shipping published in 1986 the first edition of “Pirates and Armed Robbers: A Master’s Guide.”
  8. International Convention Relating to Stowaways 1957 (“Brussels Convention”).
  9. http://www.itfseafarers.org/files/seealsodocs/453/Stowaways.pdf
  10. http://www.imo.org/About/Conventions/ListOfConventions/Pages/SUA-Treaties.aspx
  11. http://www.cscap.org/
  12. http://www.start.umd.edu/gtd/
  13. http://www.maritimeprofessional.com/Blogs/Maritime-Musings/December-2011/Hijacking-of-the-SS-Santa-Maria.aspx
  14. http://jcpa.org/article/mikael-tossavainen-on-theyll-die-anyway-ten-years-in-the-swedish-intelligence-service/
  15. war http://www.amazon.com/Tanker-Wars-Iran-Iraq-1980-1988-International/dp/186064032X
  16. http://csis.org/files/media/csis/pubs/9005lessonsiraniraqii-chap14.pdf
  17. Dr Vijay Sakhuja, South Asia Analysis group, SEA PIRACY IN SOUTH ASIA
  18. http://edition.cnn.com/2001/WORLD/asiapcf/south/10/30/slanka.tiger.attack/
  19. http://www.globalsecurity.org/security/profiles/limburg_oil_tanker_attacked.htm
  20. http://www.hrw.org/reports/2007/philippines0707/background/2.htm#_Toc168986107
  21. http://www.kcl.ac.uk/sspp/departments/dsd/research/researchgroups/corbett/corbettpaper8.pdf
  22. http://www.theguardian.com/world/2010/aug/06/japanese-oil-tanker-terrorist-explosives
  23. http://www.rederi.no/nrweb/cms.nsf/($all)/AE4BD4693E6CD476C1257BC00026E77C?OpenDocument&qnfl=Nrprint
  24. http://news.usni.org/2013/09/05/video-terrorists-rocket-commercial-ship-suez-canal
  25. http://www.skuld.com/topics/voyage–port-risks/port-news/africa/egypt-construction-of-security-wall-along-the-suez-canal/
  26. http://www.seasecurity.org/wp-content/uploads/IMO-Presentation-SAMI-PORT-SECURITY.pdf

 

 

 

 

Reconsidering the Imminence Requirement in a Post-9/11 World

THIS ARTICLE WAS ORIGINALLY PRINTED ON APR 4, 2013 AND IS BEING RE-PRINTED FOR “CHALLENGES OF INTELLIGENCE COLLECTION WEEK.”

AbbottabadOne of the most vexing questions in international law is determining under what circumstances a state may lawfully use military force against another state or non-state actor. The U.N. Charter takes a very conservative approach: use of force, according to Article 51, is authorized “if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security.”1 The international community has long since abandoned the notion that a state must wait until it is actually under attack before it can employ military force. Instead, the concept of “imminence” has been read into Article 51. Daniel Webster famously articulated this rule after the so-called Caroline case: preemptive force can be used only if there is “a necessity of self-defence, instant, overwhelming, leaving no choice of means, and no moment of deliberation.”2 But even this more deferential rule has proven unworkable in the age of modern warfare. Modern military technology and techniques allow aggressors to launch devastating attacks without significant notice. Additionally, terrorist groups have become increasingly sophisticated in both their tactics and capability to evade detection. To combat these threats, states often gather intelligence that must be acted on in a matter of hours, and special forces are prepared to respond to threats on extremely short notice. For example, President Obama ordered U.S. Navy SEALS to attack a compound in Abbottabad, Pakistan that was believed to be housing Al Qaida leader Osama Bin Laden. Although the operation turned out to be a major success, Obama later explained that his advisors were only 55% confident that Bin Laden was in the compound.3 Of course, there was no suggestion that Bin Laden was planning an imminent attack on the United States, or even that he would soon relocate to a new hideout. The time-sensitive nature of the intelligence and the enormous stakes, however, justified the use of military force without any delay to collect more detailed intelligence or seek the aid of the Pakistani government. The Abbottabad raid is an example of how the traditional notion of imminence must be adapted to meet the needs of the Global War on Terror. This post seeks to explain why such a shift is needed and suggests a framework for evaluating the use of military force when a threat is not imminent in the traditional sense.

Changing Nature of Threats

The notion of imminence is an intuitive concept for most people. The requirement is familiar from domestic criminal law, which allows a person to use deadly force in self-defense if he believes such force is “immediately necessary for the purpose of protecting himself against the use of unlawful force….”4 The imminence requirement is also consistent with the predominant view of international relations, enshrined in Article 2(4) of the U.N. Charter, that states are to refrain from using force against another state unless authorized by international law.5 This rule, although a good starting point, is strained by the realities of the current international system.

The imminence requirement developed in a time when military conflict occurred almost exclusively between sovereign nations. It was relatively simple to detect a neighbor amassing conventional forces along your border or positioning naval forces off your shore. It also developed in a time when wars were fought by conventional means: by soldiers on battlefields. The need for imminence applied only in deciding to initiate military force. Once two states were at war, there was generally no requirement of imminence before engaging enemy forces.6 The rise of non-state terrorist groups has altered this dynamic in two important ways. First, terrorist groups have developed tactics that are difficult to anticipate. If states wait until a terrorist attack is imminent, they may be unable to prevent a catastrophe and may have difficulty attributing blame after the fact. Second, because terrorist groups are non-state actors, it is often unclear who is a combatant that may be targeted and who is merely a bystander or sympathizer.

Despite the difficulties of applying the imminence requirement in a post 9/11 world, the Obama administration has continued to acknowledge a need for imminence when using military force against members of Al Qaida and other terrorist groups. In a Department of Justice white paper the Obama administration concluded that deadly force could be used against an American citizen abroad if that citizen “poses an imminent threat of violent attack against the United States” and capture is infeasible.7 In a 2011 address, John Brennan, who at the time was President Obama’s Homeland Security Advisor, remarked that imminence would continue to play an important role in constraining America’s use of military force to conform to international law. Importantly, he qualified his support by stating: “a more flexible understanding of ‘imminence’ may be appropriate when dealing with terrorist groups, in part because threats posed by non-state actors do not present themselves in the ways that evidenced imminence in more traditional conflicts.”8 Articulating this new approach to imminence will be an important foreign policy challenge as the U.S. continues to prosecute the war or terror. The U.S. must develop a conception of imminence that both maintains the legitimacy of our military actions under international law and allows us to act preemptively against terrorist attacks.

Additional Factors to Consider

Altering the criteria for the lawful use of military force is a delicate task. Taken to an extreme, a more flexible rule could stipulate that force is appropriate whenever the potential benefits of a military operation outweigh the potential costs.9 This is the decision-making process envisioned by proponents of International Realism. States, as rational actors, would take any action in which the expected benefit exceeded the expected cost. Because, in the realists’ view, the international system is anarchic, there are no extra-national rules that govern when use of force is appropriate. The views of realists, however, have been largely rejected by the United States. If force is used in an unbounded manner, we risk losing legitimacy with the international community. Instead, the new paradigm must incorporate additional factors while still limiting the use of force by imposing legal constraints.

In a 2012 speech Attorney General Eric Holder suggested a new framework for determining which threats are imminent. When considering use of force against a terrorist target, the United States would consider the window of opportunity to act, the possible harm that missing the window would cause to civilians, and the likelihood of heading off future disastrous attacks against the United States.10 This framework is a step in the right direction. The primary shortcoming of the traditional imminence doctrine is that it fails to adequately consider the potential cost of failing to act. The magnitude of a potential threat is an important consideration in deciding when preemption is justified. It is appropriate to preempt a nascent nuclear attack at a much earlier stage than would be appropriate for an attack using conventional weapon. Considering the window of opportunity allows decision makers to weigh the risks of inaction. A related concept is the so-called “zone of immunity.” This term was coined by Israeli Defense Minister Ehud Barak, and refers to a situation in which failure to take prompt military action will result in the enemy being immune from future attack.11 For example, Barak argued that after a certain point, Iran’s nuclear program would be sufficiently safeguarded that no aerial strike could disable it. When there is potential for a zone of immunity, the relevant question should not be when an attack is imminent, but when immunity is imminent. This flexibility does not mean that force can be used without limits. As Attorney General Holder explained, the use of force is always constrained by four fundamental principles: necessity, distinction, proportionality, and humanity.12 With these limitations intact, it is appropriate to consider the window of opportunity, zone of immunity, and the magnitude of harm that a successful terrorist attack would occasion.

Using Technology to Develop New Standards

Technology has profoundly affected the manner in which states react to threats to their national security. Its effect on the imminence standard is mixed. Some technologies have made it easier to collect and act on intelligence, thus expanding the window of opportunity to preempt terrorist attacks. For example, the use of satellite surveillance and unmanned aerial vehicles (UAVs, or “drones”) allows U.S. forces to track, observe, and engage individual terrorists remotely and without putting American service members in harm’s way.13 The ability to gather intelligence remotely and project power rapidly over long distances permits the United States to wait longer before initiating an attack because terrorist operations can be detected at earlier stages and individuals can be engaged on short notice by UAVs. In this sense, new technologies make the imminence standard more demanding. But technology can also compress the timeframe available for decision-making. For example, the decision to freeze financial assets of suspected terrorists must be made quickly and without notice due to the possibility the assets will be electronically transferred.14 Similarly, the advent of cyber-terrorism means terrorist groups can launch attacks on American infrastructure or financial institutions with no notice.15 These developments require the relaxation of the imminence requirement. Perhaps most importantly, technology can aid in decision-making by evaluating the imminence of potential attacks. Sophisticated computer programs can aid in weighing the risks and benefits of using force. In the near future, we may be able to develop systems that can gather intelligence, decide whether an imminent threat exists, and employ deadly force to eliminate the threat.16 Whether this type of technology can be used more widely will depend on whether it can incorporate the legal and ethical rules discussed in this article.

Conclusion

Developing a modern definition of imminence is an important and challenging goal for policy makers. Imminence is a concept that resists a strict legal definition and is better suited for practical determinations. In 2010, Nasser Al-Aulaqi filed a lawsuit in federal court seeking to prevent the U.S. government from killing his son, Anwar Al-Aulaqi, who had allegedly been placed on the U.S. government’s “kill list.”17 Al-Aulaqi wanted a court order stating that his son could be killed only if the government could show that he “presents a concrete, specific, and imminent threat….”18 The court held that it could not issue such an order because it was a political question: “the imminence requirement of [the plaintiff’s] legal standard would render any real-time judicial review of targeting decisions infeasible.”19 Despite being difficult for courts to apply, the administration should seek to develop a definition of imminence that will serve as a guide for future military actions against suspected terrorists. In doing so, it can provide the flexibility needed to respond to evolving threats while maintaining the respect of the international community.

George Fleming is a law student at Harvard Law School and former surface warfare officer in the U.S. Navy.

—————————————————————————————————————————

1. U.N. Charter art. 51 (emphasis added).
2. Daniel Webster, The Papers of Daniel Webster: Diplomatic Papers: Volume 1, 1841-1843, 62 (Kenneth E. Shewmaker & Anita McGurn eds., Dartmouth Publishing Group, 1983).
3. “Obama on bin Laden: The Full “60 Minutes” Interview” (May 2, 2011), available at http://www.cbsnews.com/8301-504803_162-20060530-10391709.html.
4. Model Penal Code § 3.04(1) (1962) (emphasis added).
5. See U.N. Charter art. 2, para. 4 (“All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purposes of the United Nations.”). This understanding is at odds with the international realism school of thought. Under that theory, states use military force as a means of advancing their interests in an anarchic system. See generally Kenneth Waltz, Theory of International Politics (1979).
6. For example, during World War II, American fighters targeted and destroyed an aircraft carrying a Japanese official who planned the attack on Pear Harbor. See Harold Hongju Koh, Legal Advisor, U.S. Department of State, Keynote Address at the Annual Meeting of the American Society of International Law: The Obama Administration and International Law (Mar. 25, 2010). See also U.S. Army Field Manual, 27-10, The Law of Land Warfare, ¶ 31 (1956) (authorizing attacks on individual officers).
7. Department of Justice White Paper, Lawfulness of a Lethal Operation Directed Against a U.S. Citizen Who Is a Senior Operational Leader of Al-Qa’ida or an Associated Force (2013).
8. John Brennan, Assistant to the President for Homeland Sec. & Counterterrorism, Keynote Address at the HLS-Brookings Program on Law and Security (Sep. 16, 2011).
9. A very simple formula would compare (probability of success × benefits of success) with (probability of failure × cost of failure) + (cost of inaction).
10. Eric Holder, Attorney General, U.S. Department of Justice, Speech at Northwestern University School of Law (Mar. 5, 2012).
11. Mark Landler & David Sanger, U.S. and Israel Split on Speed of Iran Threat, N.Y. Times, Feb. 8, 2012.
12. See Holder speech, supra note 10.
13. See generally Jane Mayer, The Predator War, New Yorker, Oct. 26, 2009.
14. See, e.g., Exec. Order No. 13,382, 70 C.F.R. 38567 (2005).
15. See generally Matthew C. Waxman, “Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4), 36 Yale J. Int’l Law. 421 (2011).
16. See, e.g., Kenneth Anderson & Matthew Waxman, “Law and Ethics for Robot Soldier,” Policy Review, 176 (Dec. 1, 2012). An example of this type of technology is the Navy’s AEGIS Combat System
17. Al Aulaqi v. Obama, 727 F. Supp. 2d 1 (2010). Anwar Al-Aulaqi was killed by an American UAV in 2011.
18. Id.
19. Id. at 72 (internal quotation marks omitted).