All posts by Guest Author

Cruisin’ for a Bruisin’

The following article is special to our International Maritime Shipping Week. While we often discuss the threats to maritime shipping, this week looks at dangers arising from such global trade, and possible mitigations.

International Maritime Shipping Week requires us to invert our usual thinking – instead of considering threats to merchant shipping, we look at how supposedly innocuous ships threaten the broader world.

What could be more innocuous than cruise ships?

Hundreds of sun-chasing, fun-seeking tourists accompanied by a staff of well-dressed entertainers, professional food service staff and smiling sailors. Nothing could possibly go wrong…

Before I continue, I should note (in what I’m sure is a standard disclaimer for International Maritime Shipping Week) that cruise ship companies are very professional organizations, and I am in no way impugning their ability to keep passengers and property secure. The scenarios proposed herein are entirely hypothetical.*

Now to business.

Cruise ships are different from all other shipping in one important respect – their passengers. Any plan to use the cruise industry as an avenue of attack should take advantage of this. To ignore the passengers would be to give up a potential asset and also inject too much uncertainty into terrorist planning, since sometimes people stumble onto things unexpectedly(as recent reports suggest may have been the case aboard the Achille Lauro in 1985, when the crew’s inconveniently-timed delivery of complimentary fruit caused the four Palestinian hijackers to improvise actions for which they were ill-prepared, according to The Independent [UK]).

 

Threatened world with Leonardo DiCaprio. World surrendered.
               Threatened world with Leonardo DiCaprio. World surrendered.

One tactic would be to use passengers passively. Packing hundreds or thousands of individuals aboard a ship provides a terrorist his key asymmetric asset – anonymity among the masses. Additionally, a cruise ship brings together large numbers of people who don’t know one another and would have no idea if a particular individual belonged aboard or not. A terrorist can hide in plain sight aboard the ship during transit in a way that wouldn’t be possible aboard a cargo hauler, where any unfamiliar person is immediately apparent. Then, upon arrival at his target port, he can disembark and simply disappear into the country to make mischief. The crew would surely notice a passenger’s absence, but not until all the tourists had been accounted for, and by then the subject would be long gone.

Imagining a more active scenario, passengers could be used as hostages or human shields as cover for some greater plan. Whatever the terrorists may have in mind, authorities will be reluctant to storm aboard the ship when the threat of civilian casualties is high. This may buy enough time for the hijackers to use the cruise ship itself as a weapons platform or as a diversion to enable some other operation to go forward – such as sending operatives ashore in small craft, as in the 2008 Mumbai attack.

More sophisticated, and potentially far more damaging, would be to use the passengers themselves as threat vectors. A terrorist could infect a cruise ship with a slow-acting pathogen, for example. Passengers would walk off the ship unaware of any symptoms and go to their homes all across the country. Only after their trip would the biological weapon begin to manifest itself – and spread. Conceivably this could be done with computer viruses, as well, though it’s not immediately clear why attacking cruise ship passengers as opposed to some other group would be worth the trouble. But where there’s a weakness, someone will exploit it, and the concentrations of people on cruise ships present a juicy target for the initial phase of a “viral” attack.

That said, the most likely malevolent use of a cruise ship is a good, old-fashioned hijacking in the name of propaganda. Cruise ships offer an enormous number of hostages and are media magnets when trouble hits – review the coverage of the Costa Concordia or the Carnival Triumph, turn it up to eleven, and then add the political and diplomatic ramifications that would result. Hijacking a cruise ship may not be innately useful (possible grounds for a later post), but in skilled hands it can cause many global second-order effects far bigger than the fate of one little ship.

You’ll never see “The Love Boat” the same way again.

 *According to CIMSEC’s crack team of attorneys, by using the word “herein,” I’ve given this disclaimer legal weight.

 

LT Matt McLaughlin is a strategic communications consultant and Navy Reservist whose only cruise ship experience is touring Titanic: The Exhibition. The opinions expressed herein do not represent those of the Department of Defense, Department of the Navy or his employer.

Smashing Maritime Ratlines – A Team Sport

The following article is special to our International Maritime Shipping Week. While we often discuss the threats to maritime shipping, this week looks at dangers arising from such global trade, and possible mitigations.

 

A boarding near Cape Verde

U.S. Navy publications often describe the sea as a global commons; the idea being that the oceans represent a resource to be shared for the benefit of all.  The reality, however, is that although the world’s oceans facilitate billions of dollars of legitimate commerce and trade every day, criminal networks, insurgent groups, and transnational terrorist organizations exploit sea lanes for more nefarious ends. The same ports and ocean routes used by sailors for thousands of years also provide today’s afloat highways, over which both legal and illicit cargoes move. These routes – or “ratlines”, when used for illicit traffic – exist amid a complex international patchwork of intertwined economies, diverse cultures, and varying legal authorities and levels of governance.

Disrupting these ratlines requires teamwork and a networked approach.  Accordingly, a number of U.S. government agencies have responsibility of some sort or another for stemming the flow of illegal shipments at sea. Obvious players are Department of Homeland Security organizations, including the U.S. Coast Guard, Immigrations and Customs Enforcement, U.S. Navy, and the U.S. Drug Enforcement Agency. The Human Smuggling and Trafficking Center is a relatively new agency charged by Congress to work against smuggling, illegal trafficking of people against their will, and terrorist travel. Many other agencies play an important role in supporting interdiction efforts with intelligence and law enforcement expertise.
 
Many readers are familiar with the efforts of the Joint Interagency Task Force South, at Naval Air Station Key West, Fla. This long-standing organization consists of several U.S. agencies working with numerous partner nations to counter narcotics trafficking moving through the Caribbean and Eastern Pacific into North America. In addition to this major drug transit zone, lesser-known maritime facilitation routes throughout the world move people, money, and materials illicitly for both financial profit and malign intent.

One example is Islamic foreign fighters who leave their home country and travel over sea, land, and air routes to train and take up arms in conflict zones. The foreign fighter pipeline has supported numerous jihadi battlefields, including Afghanistan, Iraq, Pakistan, Chechnya, Bosnia, Kashmir, Somalia, Yemen, Libya, and Syria. The relatively short ocean crossing connecting Yemen and Somalia, and their long coastlines, has resulted in significant foreign fighter flow between two countries, further destabilizing the region. Estimates of the number of foreigners who traveled in the late 2000s to train and fight with Somalia’s Al Shabaab militant Islamist group range from 200 to more than 1,000. Several of these foreign fighters were westerners from the United States and United Kingdom, including the first known U.S. suicide bomber. The problem garnered significant attention, such that the African Union’s commissioner for peace and security pressed the U.N. Security Council to authorize a naval blockade in order to prevent the entry of foreign fighters into Somalia. 

pic_03A more-obscure maritime ratline involves Afghani hashish and heroin smuggled from Pakistan’s Makran Coast to the Gulf States and East Africa. These smuggling routes reflect a nexus between criminal drug-trafficking and the funding of ongoing conflict and corruption in Afghanistan. In 2009, a U.S. Navy cruiser patrolling in the Gulf of Aden seized a skiff carrying 4 tons of hashish with a street value of $28 million. In all, international naval forces operating in the Indian Ocean seized 53 tons of drugs along the “hashish highway” in 2008 and more than 22 tons during 2009. This success notwithstanding, a lack of maritime patrol and reconnaissance assets combined with lax customs laws, and competing priorities of the various countries involved make narcotics interdiction along these sea routes a challenging proposition.

A different facet of illicit maritime networks is the transport of weapons and bomb-making materials into war zones. This usually involves a combination of legitimate businesses from source countries where electronics or other “dual-use” improvised explosive device (IED) components are produced and witting smugglers, who ship the goods sometimes hidden in legitimate cargoes.

In an operation a few years back (in which this author was personally involved), a non-DOD intelligence tipper on possible maritime facilitation of IED components was passed to a U.S. military special operations task force, which pushed the information to conventional naval forces. The Navy teams interdicted the vessel of interest, boarded it, and conducted an exhaustive search. Though they did not find the incriminating cargo, irregularities in the cargo manifest warranted further investigation. The ship was allowed to proceed to the next port of call where the host nation’s authorities, assisted by U.S. officials, conducted additional inspections. Through these searches the dual-use material was found and host nation authorities seized the cargo, with disruptive effects on the IED network. Moreover, because the effort required coordination between at least five U.S. government agencies, multiple DOD commands, and several countries, valuable lessons were learned that will pave the way for success in future counter-maritime facilitation actions. 

Above all, countering illicit maritime networks requires open and flat communications at multiple levels – both interagency and international. Traditional command-and-control structures that are comfortable to most military operators are not appropriate for an interdiction effort involving multiple agencies and countries. Rather, early and frequent meetings – such as secure teleconferences – will foster an environment of collaboration and coordination.  Because maritime targets are dynamic, rapid dissemination of intelligence and intent is necessary for a successful interdiction. In the above example, only about 12 hours passed between the initial intelligence tipper and the vessel’s identification, boarding, and interdiction. In some cases, the vessel of interest must be intercepted and boarded before it passes into territorial waters. At other times, coordinating for partner nation authorities at the next port of call to inspect the cargo ashore might be more feasible. 

Africa Partnership Station 2012Differing security classifications and communication systems between agencies and countries complicate the flow of information, but these obstacles can be overcome by persistent outreach and liaison. While advances in technology have certainly helped ease information-sharing blockages, it is often viewed as a panacea. Nothing beats the information flow that can be achieved from a closely tied liaison network working towards a common end state. Along these lines, countering illicit maritime facilitation requires a careful balance between various military, agency, and partner-nation equities. Sometimes these equities are competing; in other cases they are complementary. Law enforcement agencies often require that the chain of custody for any evidence seized during a maritime interdiction be carefully preserved in order to build a legal case against an individual facilitator. These efforts are sometimes at odds with the exploitation of a seizure for intelligence purposes and the need to maintain operational security. Meanwhile, a partner nation may see broadcasting the results of a successful interdiction effort through information operations as a way to gain legitimacy in the eyes of its population. Finally, internecine struggles and political friction between various institutions often stifle coordination despite the best efforts and intentions of those involved.

The maritime facilitation networks of criminals and terrorists present serious challenges to the security interests of the United States and friendly governments. Disrupting these ratlines requires a thoughtful and integrated approach by various organizations focusing on all aspects of the interdiction problem: intelligence, legal, diplomatic, and physical.

CDR Chris Rawley serves in the special operations community. He led boarding teams during maritime interception operations against oil smugglers in the Persian Gulf and coordinated operational level maritime interdiction efforts in the Middle East and the Horn of Africa. He is the author of Unconventional Warfare 2.0: A Better Path to Regime Change in the Twenty-First Century and blogs regularly at Information Dissemination. The above opinions are his own.

For more articles in our International Maritime Shipping Week, click here.

Welcome to International Maritime Shipping Week

ContainersYou’re reading this on a screen made in Malaysia, connected to a hard-drive made in Taiwan, supported by a bevy of parts made in China. Sitting here in Bahrain, I’m eating Pistachios grown in California on a ship with British diesels with other like ships brought here on even bigger ships. We take for granted the virtue of global shipping and the ease with which international trade is now executed over the high seas.

Yet as the more nuanced critics of globalization have long pointed out, a network is not inherently good or evil, rather it merely more rapidly facilitates the intent of those that use it. The roads of the Incan Empire not only served to streamline the administration of their realm, but also hasten their destruction. While international shipping has far more check-valves than an open road, and we need not worry about Pizarro’s men pouring out in Seattle’s ports to storm the town hall, we should consider how this intricate seaborne network might cause us harm: from the vulnerabilities of relying on seaborne trade to the instability caused by illicit weapons proliferation to the use of commercial vessels as Trojan horses.

This week, we take a moment away from our Amazon, Best Buy, and Home Depot bounties to consider the defenses necessary to prevent this seaborne boon from becoming a curse. Click here to see the International Maritime Shipping Week contributor line-up.

Matt Hipple is a surface warfare officer in the U.S. Navy.  The opinions and views expressed in this post are his alone and are presented in his personal capacity.  They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.

How Vulnerable are Yemen’s Ports?

Mukalla port in Yemen
Mukalla port in Yemen

Among the aspects of the “thwarted” terrorist Al-Qaeda attacks that authorities in Yemen claim they disrupted on Wednesday were attacks on port facilities and petroleum infrastructure:

“The plot described Wednesday by Rajeh Badi, a spokesman for Prime Minister Mohammed Basindwa, involved seizing control of Mukalla, a vital sea port and capital of the Hadramaut governorate, and Bawzeer, another key port roughly 27 miles from Mukalla. Both ports employ a large number of workers from Western countries.  At the same time, separate groups of militants were to target the Belhaf gas pipeline in Yemen’s southern Shebwa province, as well other gas facilities there, Badi said.”

While Yemen-based attacks at sea such as those against USS COLE (DDG-67) in 2000 and the French tanker LIMBURG in 2002 are better known, Al-Qaeda has has a history of purported planning for attacks against maritime infrastructure on the Arabian peninsula itself.  While there is no evidence that Al-Qaeda has conducted actual maritime attacks from the sea (or attacks on coastal installations) in Saudi Arabia to date, its Saudi branch has attacked coastal oil infrastructure on land, and the Saudi security services claim that they have prevented AQ attacks in the past.

In 2003 Saudi authorities stated that Al-Qaeda cells were planning attacks against the oil facility in Ras Tanurah.  In 2004 they conducted attacks against westerners at oil facilities in Yanbu and Khobar.  In May 2007, Saudi television aired confessions of a captured terrorist who claimed that the February 2006 suicide attack on the Abqaiq oil refinery near Ras Tanurah was ordered by Usama bin Laden.  In November 2007 the Saudi government claimed that they had detained “more than 200 suspected militants, including a cell that had been planning an imminent attack on a support installation in an oil-rich eastern province and others who were attempting to smuggle missiles into the country.”

The validity of Yemeni claims regarding these alleged attack plans remains unclear, but it does seem that land-based attacks against maritime infrastructure could still be a potential course-of-action that Al-Qaeda in the Arabian Peninsula wishes to pursue in the future.

Lieutenant Commander Mark Munson is a Naval Intelligence officer currently serving on the OPNAV staff.  He has previously served at Naval Special Warfare Group FOUR, the Office of Naval Intelligence, and onboard USS Essex (LHD 2).  The views expressed are solely those of the author and do not reflect the official viewpoints or policies of the Department of Defense or the U.S. Government.  You can follow him on Twitter @markbmunson.