Trinco Dialogue Maritime Symposium 2013 - NMA
Transcription
Trinco Dialogue Maritime Symposium 2013 - NMA
1 Trinco Dialogue Maritime Symposium 2013 FOREWORD 1. The Trinco Dialogue is an annual Maritime Symposium conducted by Naval and Maritime Academy, Trincomalee. The inaugural session of Trinco Dialogue was conducted by the Junior Naval Staff College on 28 November 2011 under the astute guidance of Commandant Naval and Maritime Academy and on the initiative of the then Commander Eastern Naval Area and present Commander of the Navy, Vice Admiral Jayanath Kolambage, RSP, VSV, USP, RCDS, psc. The aim of this annual symposium is to impart knowledge on various relevant and contemporary maritime and military subjects to large Naval audience especially officers under trainees and also provide opportunity to officers and Student officers of JNSC to broaden their horizon on relevant topics through participation in symposium. The theme of the first symposium was ―Identifying Maritime Challenges Through a Dialogue and the second Trinco Dialogue was conducted on 27 October 2012 with the theme of ―Collaborative Maritime Security through Modern Technology‖. 2. Total six papers were presented in Trinco Dialogue 2012. Two papers were presented in the first session of symposium namely ―Maritime Domain Awareness‖ by Commander R Joseph, RSP, psc, BSC (DS), Sri Lanka Coast Guard and ―Integrated Defence Effort to Enhance National Security‖ by Lieutenant Commander BARI Abeysekara Student Officer 8th JNSC. Both the speakers set the tone of the Symposium and generated lot of discussions that was evident through question and answer session. Thereafter the second session imparted an in-depth knowledge on the topics of ―Application of Cloud Computing in Military Context‖ and ―Exploitation of Modern Communication Technology for Effective Management of Defence Communication Network‖ presented by Commodore AMPS Alahkoon, USP, psn, MBA (MofT), Dockyard Superintendent of Department of Electrical and Lieutenant IP Wijesinghe, Student Officer 8th JNSC respectively. The endeavour of both the speakers was to highlight the revolution in military affairs and importance of technology in modern warfare. The third session had two very informative topics ― Influence of Middle East Crisis to Indian Ocean Region‖ and Cyber Terrorism- Its Implications on Low Intensity Conflict Operations‖ presented by Lieutenant Commander CRP Walakuluge Student Officer of 8th Jnsc and Commander(S) ABRA De Silva, RSP, psc, MDS, Acting CS(SPDC) and ILMS Coordinator respectively. 3. The opening remarks of Trinco Dialogue 2012 was made by the Commandant Naval and Maritime Academy Commodore USR Perera, RSP,USP,psc, MSc (D&SS). The key note was delivered by the Chief Guest of the event, Commander Eastern Naval Area Rear Admiral RC Wijegunaratne, WV, RWP, RSP, USP, NDC, psn, M Phil (D&SS). The Admiral highlighted the importance of Maritime Domain Awareness and brought out the geo-strategic significance and role of Sri Lanka Navy in IOR. The Chief Guest also appreciated the effort put in by JNSC and Naval and Maritime Academy towards proficient conduct of Trinco Dialogue 2012. The 2 Trinco Dialogue Maritime Symposium 2013 concluding remark of the symposium was delivered by the then JNSC Coordinator Captain (I) HGUD Kumara, USP, psc, B Sc (DS). 4. Under the able guidance of the Commandant Naval and Maritime Academy, the Directing Staff of Junior Naval Staff College once again will be conducting the third Trinco Dialogue 2013 which is scheduled to be held on 07th January 2014 at Admiral Wasantha Karannagoda Auditorium, Eastern Naval Command, Trincomalee. The Commander Eastern Naval Area Rear Admiral AR Amarsinghe, RSP, USP, psc will be the Chief Guest. He will also deliver the key note address following the opening remarks by the Commandant Naval and Maritime Academy, Commodore USR Perera, RSP, USP, psc. 5. Trinco Dialogue 2013 will have four sessions with two papers in each session. The theme of Trinco Dialogue 2013 is ―Combating Maritime Disorder in IOR through Collaborative and Collective Response of Regional Navies‖. The first session of symposium will highlight the GeoStrategic and Geo- Political importance of IOR and Role of SLN in maintaining vigil in the IOR thus making sea lines of communication safe for seafarers. The second session will cover the aspects of Applicability of UNCLOS with respect to various maritime issues and various security challenges and emerging trends in IOR. The third session will focus on the nuances of Maritime Domain Awareness through collective approach of Regional Navies and Disaster Management through collective response. Finally the fourth and final session will bring out the importance of Naval Diplomacy in maritime security and an analysis of existing maritime initiative and way ahead to achieve better synergy in combating maritime disorder. 3 Trinco Dialogue Maritime Symposium 2013 Editor-In-Chief Commander (G) MHN Peries,RSP,psc,BSc (DS),MDS Editor Commander (IN) A K Singh, psc, MSc (DS), MSc (Telecom) Editorial Committee Commander (G) LC Vithanage, RSP,psn, MSc (WS) Lieutenant Commander (NP) HMPSB Hitinayake Lieutenant Commander (IT) KGCM Kariyawasam Lieutenant (IT) AMDE Amarapathi Graphics Work LIT DMNS Dissanayaka Steering Committee Commodore USR Perera, RSP, USP, psc, MSc (DS) Captain(C) NPW Amardasa, psc,DIDSS Commander (G) MHN Peries,RSP,psc,BSc (DS),MDS Commander (IN) A K Singh, psc, MSc (DS), MSc (Telecom) Directing Staff Junior Naval Staff College Commander (G) MHN Peries,RSP,psc,BSc (DS),MDS Commander (IN) A K Singh, psc, MSc (DS), MSc (Telecom) Commander (G) LC Vithanage, RSP,psn, MSc (WS) Lieutenant Commander (L) RRKK Subasinghe,psc Lieutenant Commander (NP) HMPSB Hitinayaka 4 Trinco Dialogue Maritime Symposium 2013 CONTENTS Sr No Description Page 1. Opening Remarks 2. Keynote Address 3. Concept Paper ―Trinco Dialogue Maritime Symposium 2013‖ 4. Programme ―Trinco Dialogue Maritime Symposium 2013‖ 5. Contributing of Sri Lanka Navy in Maintaining Maritime Order in IOR 6. Applicability of UNCLOS in Fighting Maritime Disorders 7. Current Maritime Security Challenges and Emerging Threats in IOR 8. Maritime Domain Awareness in IOR and Collective Response by the Regional Navies 9. Disaster Management Through Collaborative Response 10. Use of Naval Diplomacy and Maritime Security 11. An Analysis of Existing Maritime Security Initiatives in Indian Ocean Region and Way Ahead for Better Collective Response 12. Concept Paper ―Trinco Dialogue 2012‖ 13. Maritime Domain Awareness: way Ahead for Sri Lanka Navy 14. Integrated Defence Efforts to Enhance National Security Application of Cloud Computing in Military Context 15. Exploitation of Modern Communication Technology for Efficient Management of Defence 16. Communication Network Influence of Middle East Crisis to the Indian Ocean Region 17. Cyber Terrorism and its Implications to Low Intensity Operations Giving Special Emphasis to Maritime Domain 5 Trinco Dialogue Maritime Symposium 2013 OPENING REMARKS Commodore USR Perera, RSP, USP, psc, MSc(D&SS) Commandant, Naval and Maritime Academy Admiral Rohan Amarasinghe, Commander Eastern Naval Area, Professor Shantha Hennayake, The Deputy Vice Chancellor of Peradeniya University, The Flag Rank Officers, Senior Officers, Staff of Naval and Maritime Academy, Officers of JNSC Course No 11, Ladies and Gentlemen. Good Morning. It is indeed a great honor and a privilege to be at this podium as the Commandant, of the Naval and Maritime Academy to welcome you all to the third edition of Maritime Symposium Trinco Dialogue 2013 organized by the JNSC of NMA. This symposium is brain child of the present Commander of the Navy and on his initiation it was started on 28 November 2011. The theme of the inaugural Trinco Dialogue was ―Identifying Maritime Challenges through a Dialogue‖. The second Trinco Dialogue was conducted on 27 October 2012 and theme of symposium was ―Collaborative Maritime Security through Modern Technology to face global issues‖ which was again a very successful event for NMA to be proud of. Apart from enhancing domain knowledge of the officers and officer under trainees on the various relevant aspects of maritime issues, one of the aim of these symposium is also to make the under trainees understand the idea and art of arranging and conducting a symposium of this nature. The symposium also provides opportunity to young officers in clearing their doubts on the issue of maritime through discussion, participation and question and answer session. Now coming to today‘s symposium which has been given theme of ―Combating Maritime Disorder through Collective and Collaborative Response of Regional Navies‖. Ladies and Gentlemen, The Indian ocean is the world‘s third largest and is significant in conjunction East and the west, containing vital sea lanes that help feed some of Asia‘s largest economies and vital logistic routes to west. Hence, the importance of the Indian Ocean has long been clear as the powerful countries in the west who initiated their hunt for resources towards the east by the means of imperialism since even before 14 th century. The sea lanes in the Indian Ocean are considered among the most strategically important in the world where more than 80 percent of the world‘s seaborne trade in oil transits through Indian Ocean choke points. Any disruption in traffic flow through these points can have disastourous consequences. The disruption in energy flows in particular is a considerable security concern for littoral states, as a majority of their energy lifelines are sea based. Since energy is critical in influencing geopolitical strategies of a nation, any turbulence in its supply has serious security consequences. 6 Trinco Dialogue Maritime Symposium 2013 Not only that Ladies and Gentlemen, It is well known fact that the Indian Ocean Rregion is witnessing maritime disorders such as proliferation of small arms, piracy, human trafficking, maritime terrorism and narcotics trafficking which in turn has direct bearing on the stability in the region and pose great threat to Sea Lines of Communication in IOR. Human trafficking and drug smuggling are major crimes that should be deterred decisively in the Indian Ocean region. Human trafficking often take place in the south Asian sub region where organized groups traffic asylum seekers and illegal immigrants by means of disguised fishing vessels via Indian ocean in to countries like Australia, Japan and Europe through Mediterranean sea. The Sri Lanka Navy has many practical experiences in the recent past in this regard. Drug smuggling originates from countries like Afghanistan and Pakistan where drug traffickers use modes of sea transport to traffic drug into the sub regions of the Indian Ocean. Sri Lanka is one of the country affected in this issue as well. Cooperation in anti-piracy, anti-smuggling, counter action for misappropriation of natural resources, mutual support in the event of natural disasters and in search and rescue can build the confidence necessary to forge common understanding and agreement on security and safety of sea lanes and in the region as well.The past experience has shown that regional bilateral and multilateral issues have taken priority over meaningful approach towards collective initiative to mitigate and eliminate maritime disorder in IOR. We are also aware that Indian Ocean Region is of great importance to Sri Lanka as it assumes important geo-strategic position in IOR. Ladies and Gentlemen, in this context Sri Lank Navy will have to play a major role with regards to the security of our ports and harbors and maritime security in the region considering her strategically high valued position in the Indian Ocean and this could be achieved very fruitfully through ―Collective and Collaborative Response of Regional Navies‖.Sri Lanka Navy has been reaching out to the regional countries in the Indian Ocean through Naval Diplomacy in terms participating in Multilateral Exercises such as Aman and Bilateral Exercise such as SLINEX and various exchange training progarmmes. Sri Lanka‘s commitments to combat maritime disorder are well proven by defeating LTTE. Further, initiatives such as Indian Ocean Naval Symposium, Galle Dialogue and Milan etc provide a meaningful platform to exchange views on various maritime security issues. Well, Ladies and Gentlemen to broaden our horizon on various aspects of maritime disorder and security we have eight speakers today who will be delivering their speech on variety of Maritime subjects in Trinco Dialogue 2013. I am pleased to inform you that eminent speaker Professor Shantha K Hennayake, Deputy Vice Chancellor of University of Peradeniya has consented to be one of our guest speakers today. His vast knowledge on the complex subject of Geo-politics and Strategy in IOR will definitely be very useful and valuable to all of us. Without any further ado, may I now request our Chief Guest today, the Commander Eastern Naval Area to deliver the Key Note address. Thank You. 7 Trinco Dialogue Maritime Symposium 2013 KEYNOTE ADDRESS Rear Admiral AR Amarasinghe,RSP,USP,psc Commander Eastern Naval Area The Commandant Naval and Maritime Academy Commodore USR Perera, flag rank officers, directing staff NMA, officer under trainees, ladies and gentlemen. The ―Trinco Dialogue‖ as brought out by the Commandant was an initiative of Commander of the Navy to provide an opportunity for officers especially young officers to understand the nuances of maritime issues and also to instill the concept of discussion through seminar like this. Today seminar which has very apt and relevant theme of ―Combating Maritime Disorder Through Collaborative and Collective Response by Regional Navies‖. Indian Ocean is possessed with vast natural resources, mineral, fish, marine products, oil resource and natural gas. It also provide home to many choke points, such as the Straits of Hormuz, Straits of Malacca, Lombok and the Sunda Straits. Any disruption in traffic flow through these points can have devastating consequences. The disruption of energy flows in particular is a considerable security concern for littoral states, as majority of their energy lifelines is sea based. Since energy is critical in influencing the geopolitical strategies of a nation, any turbulence in its supply has serious security consequences. The Indian Ocean Region is of great importance to Sri Lanka and it assumes strategic significance due to the high volume of international trade transiting through the coast of our nation. The strategic importance of the Indian Ocean and its political sensitivity makes it necessary for all regional countries to have means of collaborative mechanism to ensure sea lines of communication is open always and our coasts are safe from untoward activities. Home to a third of the world‘s population, this politically tumultuous area contains many flash points of world conflict. This region is witnessing an unprecedented proliferation of small arms, narcotics trafficking, human smuggling, piracy and maritime terrorism which, in turn threaten the stability of states and societies. The regional navies have been engaging with each other in terms of training and naval diplomacy through port visits but definitely there is lack of coordination when it comes to synergizing of efforts to counter maritime disorder in IOR. Seminars such as Galle Dialogue, Indian Ocean Naval Symposium and Milan are few meaningful gathering of representatives of all the major players, but nothing has moved much in reality. Therefore a lot is needed to be done through navy to navy cooperation to secure SLOCs and ensure safe and secure IOR through maritime bonding. The Navy remains a very important instrument of diplomacy for the nation. The contours of Navy‘s foreign cooperation are shaped by national interests, security considerations and are in consonance with the foreign policies of the country. Towards this Sri Lanka Navy envisioned the Galle Dialogue to encourage navies of the Indian Ocean Region to 8 Trinco Dialogue Maritime Symposium 2013 interact with each other and find common solutions to the maritime threats and challenges that plagued the region. The methodology adopted is to constructively engage one another through the creation and promotion of regionally relevant mechanisms, events, and activities. The need of the hour for regional Navies is to proactively embark upon cooperative programs such as establishing Joint Maritime Centers comprising Navies and Coast Guards at important ports in IOR. This will enable rapid and coordinated responses to smuggling, piracy, humanitarian disasters, illegal migration, environmental incidents and Search & Rescue operations. These are the areas that require cooperation, coordination and would result in optimum use of resources. These centers may also provide a venue for sharing of intelligence, sharing of measures to protect ports & harbours. Sri Lanka‘s fortunate geographic location, spanning the major sea-lanes of the world, highlights the relevance of its role in ensuring the free flow of oil and commerce from the Gulf to the Asia-Pacific region. Post eradication of terrorism from our shores, the Sri Lanka Navy can now be the medium for peace, tranquility and stability in the Indian Ocean Region, across a wide range of conditions and circumstances that one can envisage in peacetime. One country can be more powerful in terms of military, wealth or in size. But unless that country is a strong link in the regional integration process, the mere survival of that country is questionable. As a region which is fast becoming the attention of the whole world by gradually taking the center stage of the geopolitics, we can surely improve the regional security cooperation and coordination of regional institutes. The regional integration need to focus on building up a cooperative security dialogue and effective apparatus. The Indian Ocean Region has a bright maritime future, if only we can use the collaborative and collective approach of Regional Navies to our advantage. I would like to thank all the participants including invitees from outside organizations for their valuable presence at this seminar for instilling confidence and courage in the junior officers who actively participated as part of their training which is organized by Junior Naval Staff College, NMA. Finally, I hope that the presentations and discussions that will be deliberated today will be harbinger in broadening horizon of all audience on the subject of maritime issues and will be instrumental in building foresight and needs in different level in future. Thank you. 9 Trinco Dialogue Maritime Symposium 2013 CONCEPT PAPER “TRINCO DIALOGUE MARITIME SYMPOSIUM 2013” COMBATING MARITIME DISORDER IN IOR THROUGH COLLABORATIVE AND COLLECTIVE RESPONSE OF REGIONAL NAVIES 1. With an area of 74 million square kilometres and about 20 per cent of the global ocean, the Indian Ocean is the third largest ocean after the Pacific and the Atlantic. As it strides the two bigger oceans, it serves as a natural "passage " for most of the traffic from the Atlantic to the Pacific and vice versa. Atlantic and the Pacific are "open" oceans however; the Indian Ocean can only be accessed through several choke points. From the West via Cape of Good Hope and the Straits of Madagascar and from the North via the Bab-el-Mandeb at the end of the Red Sea and the Straits of Hormuz at the exit of the Persian Gulf, from the East via the Straits of Malacca, the Sunda and Lombok. 2. The Indian Ocean Region is witnessing an unparalleled maritime disorder such as proliferation of small arms, piracy, human trafficking, maritime terrorism and narcotics trafficking which in turn threaten the stability in the region and pose great threat to Sea Lines of Communication in IOR. There has been a steady growth of newer and non-conventional challenges in recent years. The strategic importance of the Indian Ocean and its political sensitivity makes it necessary for all regional countries to have a collaborative and collective response to combat this menace. 3. However past experience has shown that many regional bilateral/ multilateral issues posed hindrance to a meaningful approach towards collective initiative to mitigate and eliminate maritime disorder in IOR. This is because of diverse and challenging internal as well as bilateral issues such as nationalism, religious rivalries and the after effects of colonisation or competition for military, strategic, political or economic scenario of the region. 4. The Indian Ocean region is of great importance to Sri Lanka as it assumes important geostrategic position in IOR. Through Naval diplomacy, Sri Lanka Navy has been reaching out to the countries in the Indian Ocean. The regional Navies have also off late embarked on a series of bilateral and multilateral exercises and forging partnerships with countries across IOR. Sri Lanka‘s commitments to combat maritime disorder are well proven by defeating LTTE. Further, initiatives such as Indian Ocean Naval Symposium. Galle Dialogue and Milan etc provide a meaningful platform to exchange views on various maritime security issues. But there are more to be done to achieve synergy of effort and optimal utilisation of resources within regional Navies to ensure that Sea Lines of Communication in IOR is unhindered and safe for all and this call for collaborative and collective response from all regional Navies. 10 Trinco Dialogue Maritime Symposium 2013 PROGRAMME “TRINCO DIALOGUE MARITIME SYMPOSIUM 2013” “COMBATING MARITIME DISORDER IN IOR THROUGH COLLABORATIVE AND COLLECTIVE RESPONSE OF REGIONAL NAVIES” TIME 0815 0830 ACTIVITY Arrival of participants Arrival of Chief Guest and Opening Ceremony INAUGURAL SESSION 0840 0845 0850 Welcome remarks by Lieutenant Commander (ND) AMBGTM Thilakaratna, BSN(MW)(Hons) Opening Remarks by Commandant Naval and Maritime Academy Commodore, USR Perera, RSP, USP, psc, MSc(D&SS) Key Note Address by Commander Eastern Naval Area Rear Admiral, AR Amarsinghe, RSP, USP, psc SESSION ONE 0900 Introduction of first Moderator 0905 Introduction of first speaker by the Moderator Moderator: Lieutenant Commander (ND) HMWM Thilakarathne, BSN(MW)(Hons) 0910 Paper by Professor Shantha K Hennayake Deputy VC of University of Peradeniya ―Historical Perspective of Geo-Strategic and Geo- Political Importance of IOR‖ 0925 Introduction of second speaker by the Moderator 0930 Paper by Lieutenant Commander IG Dharmasiri,BSc(NS) Student Officer of Junior Naval Staff College ―Contribution of SLN in Maintaining Maritime Order in IOR‖ 11 Trinco Dialogue Maritime Symposium 2013 0945 Discussion 0955 Final comments and summary of two papers by first moderator SESSION TWO 1000 Introduction to second Moderator 1005 Introduction of third speaker by the Moderator Moderator: Lieutenant Commander (NP)BRSB Gunarathne,BNS (LW) 1010 Paper by Lieutenant Commander (G) JMPS Jayawardana, RSP,BNS Student Officer of Junior Naval Staff College ―Applicability of UNCLOS in Fighting Maritime Disorders and Recommendations‖ 1025 Introduction of fourth speaker by the Moderator 1030 Paper by Captain(I) HGUD Kumara,USP, psc, BSc(DS) Head of Training Team (Naval Wing), DSCSC Batalanda ―Current Maritime Security Challenges and Emerging Threats in IOR‖ 1045 Discussion 1055 Final comments and summary of two papers by second Moderator 1100 Refreshments SESSION THREE 1120 Introduction of third moderator 1125 Introduction of fifth speaker by the Moderator Moderator: Lieutenant Commander (S) LHNS Kumara, BNS,MAC 1130 Paper by Lieutenant (ND)HPK Nanayakkara,RWP,RSP,BSc(DS) Student Officer of Junior Naval Staff College ―Maritime Domain Awareness in IOR and Collective Response by the Regional Navies‖ 1145 Introduction of sixth speaker by Moderator 12 Trinco Dialogue Maritime Symposium 2013 1150 Paper by Commander (ND) SR Rupasena, RWP,RSP,psc,PG Dip in S&DS, BSc (DS) Directing Staff -DSCSC Batalanda ―Disaster Management Through Collaborative Response‖ 1205 Discussion 1215 Final comments and summery of two papers by third moderator SESSION FOUR 1220 Introduction to fourth Moderator 1225 Introduction of seventh speaker by the Moderator Moderator: Lieutenant Commander(C) JPG Lakshitha 1230 Paper by Commander (G)SP Kathriarachchi,RSP,psc,BSc (DS) (Hons) Executive Officer, SLN Dockyard, Trincomalee ―Use of Naval Diplomacy and Maritime Security‖ 1245 Introduction of eighth speaker by the Moderator 1250 Paper by Lieutenant Commander (CDO) KDR Weerasekara, RSP Student Officer of Junior Naval Staff College ―An Analysis of Existing Maritime Security Initiatives in IOR and Way Ahead for Better Collective Response‖ 1305 Discussion 1315 Final comments and summary of two papers by second Moderator 1320 Concluding Remarks of ―Trinco Dialogue 2013‖ Commander MHN Peiris,RSP, psc, BSc (DS) Mech Eng, MDS Deputy Training Commander & Coordinator, Junior Naval Staff Course 1325 ―Trinco Dialogue 2013‖ conclude and departure of Chief Guest 13 Trinco Dialogue Maritime Symposium 2013 CONTRIBUTION OF SRI LANKA NAVY IN MAINTAINING MARITIME ORDER IN IOR LCdr IG Dharmasiri,BSc(NS) India Student Officer of 11th JNSC ABSTRACT 1. The 21st century is the century of the sea which has become the world‘s second living domain. Today‘s increasing globalization further highlights the importance of the sea for mankind‘s survival and development. The Maritime order at sea ensures the safety and security of shipping and permits countries to pursue their maritime interest and develop their marine resources in accordance with agreed principles and international law. Threats to maritime order at sea include piracy, maritime terrorism, illicit trafficking in arms and drugs, human smuggling, marine pollution, illegal fishing and marine natural hazardous. 2. In order to maintain the maritime order in IOR it is required to identify the role of the Sri Lanka Navy. Navy continues to function on a triangular grid with the military role underpinning two complementary roles - the politico-diplomatic and constabulary. In addition a new role in terms of the benign application of maritime power has been added as a recognized fourth role. The role of the Sri Lanka Navy, in this increasingly interdependent and globalized world, will be as much dictated by internal requirements as it will be, by the compulsions of the outside world. 3. Port security is one of the most complex things to control and coordinate. Colombo is handling annually 30.9 million tons of cargo The port‘s capacities are dramatically increasing with the $1.2 billion expansion project. Sri Lanka Navy is contributing much more to function effective Coast Guard around the coastal belt. The SLCG in this respect has the much wanted legal authority through its Act. This legal backbone and authority makes it the only formidable law enforcement element out at sea who can take actions against those who engages in activities that harm the marine environment. 4. Today Sri Lanka Navy is carrying out SAR mission to rescue disabled fishermen out at sea. In that case Navy despatch major vessels as well as fast attack crafts in immediate nature to save their lives. In fact Sri Lanka Navy has rescued not only local fishermen but also foreign nationals also. Sir Lanka established Maritime Rescue Coordinating Centers to support in SAR mission in the region. SLN had conducted series of sea borne SAR exercise with regional Navies, especially Indian, Pakistan, Japanese and Bangladesh Navies. As a recent development SLN has recovered hundreds of illegal immigrant who were hopeless out at sea due to their unsecured means for fleeing the country via sea.SLN is part of the entire big operation in the Indian Ocean nation to look for piracy and SLN is concentrating on certain areas closer to the western frontier of Sri Lanka. 14 Trinco Dialogue Maritime Symposium 2013 5. Sri Lanka Navy is most experienced navy in the IOR as far as the fighting against maritime terrorism is concerned. This enormous experience and strategies are sharing with regional navies today by training and conducting awareness programs for them. During the recent past era Sri Lanka Navy arrested over 2,000 illegal immigrants to Australia with the large number of fishing boats. SLNS intelligence network is doing tremendous contribution to locate major human smugglers within the country with collaboration with the international community. 6. Being an island nation there is huge vulnerability to become a platform for the international drug smugglers at present. Therefore efforts have been taken by the Navy with the assistance of SLCG to detect such persons in both sea and land. As strategic and geographical location a major SLOC is running just few miles away from the Southern tip of Sri Lanka. Due to this inherited opportunity Sri Lanka Navy is extending grand scale contribution towards this regards by deploying Naval vessels and craft in Southern sea. Further it is merely fuelled by providing onboard security teams. 7. IOR is rich of hydro carbons fossils, natural gasses and variety of mineral resources. The exploration of sub soil oil and natural gasses is started in Sri Lanka and preliminary studies are ongoing over Gulf of Mannar region and Southern coastal seas. In that process the Navy is contributing much on providing resource personnel and seaward security in grand scale.Sri Lanka need to have a good governance on maritime interests along with effective supervision and regulation of existing laws and regulations. Monitoring of international shipping in relation to the law of the sea in wide area of Sri Lankan waters cannot be exercised alone by the SLCG as a developing body. 8. The interests of regional states on the ocean increasing due to the world trade transported by international shipping which forms marine links at global levels. There are many challenges hindering enhancement of maritime order in the region.The cohesiveness and mutual understanding with regional Navies and organizations is timely valued and momentous. Therefore, in order to evaluate the contribution of the Sri Lanka Navy in a local as well as a global context, a brief examine of the prevailing frame of reference is essential. 15 Trinco Dialogue Maritime Symposium 2013 APPLICABILITY OF UNCLOS IN FIGHTING MARITIME DISORDERS Lieutenant Commander (C) JMPS Jayawardana, RSP*, BNS Student Officer of 11th JNSC ABSTRACT 1. The role of the sea has never been as important as it is today in all fields of human activities including fishing, exploitation of mineral resources, transportation, energy production and environmental protection. It is therefore vital to maintain peace and order on the seas and to encourage the sustainable development of marine resources for the future of mankind. For the past thirty years United Nation Conventions on Law of Sea (UNCLOS), which is often referred to as the ―Constitution of the Sea‖, has been the mainstay in the efforts to achieve these objectives. 2. International shipping, trade and communication routes, as well as global peace, are now under constant threat. As well as piracy and terrorism, the threats from smuggling and illegal trade in drugs and weapons are also increasing. However, in modern times there has been a significant geographical expansion, with serious consequences – death, material loss and environmental pollution. Article 101 of the UN Convention on the Law of the Sea 1982 defines the ‗piracy‘. In 2007-2008, the region overtook south-east Asia as the main region for piracy, according to the International Maritime Organization (IMO). 3. UNCLOS put an end to the legal disorder reigning in respect of the sea. In addition to the existing maritime zones under national jurisdiction, UNCLOS established new regimes such as those for straits used for international navigation, archipelagic waters and the exclusive economic zone, and redefined the continental shelf within and beyond 200 nm. UNCLOS set up an institutional framework for implementing its provisions. In addition to such existing institutions as the United Nations, the Specialized Agencies and the International Court of Justice (―ICJ‖), UNCLOS established the Commission on the Limits of the Continental Shelf, the International Seabed Authority and International Tribunal Low of Sea (ITLOS) to ensure the proper interpretation and smooth implementation of its complex provisions. 4. UNCLOS established an innovative, complex yet flexible system of dispute settlement to ensure the proper interpretation and efficient application of its provisions based on a delicate balancing of divergent interests of nations. Part XV of UNCLOS gives States the choice of one or more compulsory procedures leading to binding decisions; these procedural settings include Authority and International Tribunal Low of Sea, ICJ and arbitration. 16 Trinco Dialogue Maritime Symposium 2013 5. The marine pollution regulation and enforcement provisions of the United Nations Convention on the Law of the Sea will be considered together. Like international law, marine environmental law which marine pollution is a part of, derives its source from treaties, customs, general principles of law and judicial decisions although its main source is international conventions. The UNCLOS 1982 devotes its Part XII entitled, ―International Rules and National Legislation to Prevent, Reduce, and Control Pollution of Marine Environment‖, to the protection and preservation of marine environment by regulatory and enforcement measures on marine pollution although UNCLOS is only one of the Conventions regulating the prevention and protection of marine environment. 6. There have been a problem relating the Illegal Unreported and Unregulated fishing activities all over the world‘s EEZ. To name few, bottom trawling, use of illegal fishing nets and use of explosives and poisons etc. It‘s the responsibility of the Navy to safe guard fishery wealth of the country. The object and purpose of article 73, paragraph 2, read in conjunction with article 292 of the Convention, is to provide the flag State with a mechanism for obtaining the prompt release of a vessel and crew arrested for alleged fisheries violations by posting a security of a financial nature whose reasonableness can be assessed in financial terms. 7. From a Sri Lankan perspective illegal migration is committed mainly for economic reasons. Terrorists may also be illegally migrating encouraged by their foreign networks and may also be engaged in trafficking of their cadres across borders. Article 99 of UNCLOS, States that Prohibition of the transport of slaves. 8. UNCLOS is a symbol of global cooperation, compromise, and international law that was more than 20 years in the making. But UNCLOS will need to evolve if it is to meet twenty-firstcentury challenges. In 1982, fishing fleets did not have the technology to trawl the middle of the oceans. Our understanding of the ocean‘s crucial role in protecting against climate change was in its infancy. The mineral riches of the ocean were not well understood. 17 Trinco Dialogue Maritime Symposium 2013 CURRENT MARITIME SECURITY CHALLENGES AND EMERGING THREATS IN IOR Captain HGUD Kumara,USP,psc,BSc (DS) Head of Training Team (Naval Wing), DSCSC Batalanda ABSTRACT 1. The Indian Ocean has become a key strategic arena in the 21 st century. One reason is the growth of the Asian economies and their increased need for raw materials, including energy from the Middle East, to provide for their economic growth. But trade is a two‐ way street and we have witnessed an increasing flow of Asian labour, capital, and consumer goods, particularly to the rich countries of the Arabian Peninsula. In addition, the end of the Cold War and ongoing crises in Iraq and Afghanistan have diminished the importance of the Atlantic Ocean and boosted the importance of the Indian Ocean as a conduit for Western military supplies. 2. The Indian Ocean, the third largest ocean in the world occupies approximately 20 percent of the Earth‘s sea surface, covering a total area of 73.56 million square miles. It is bounded to the north by the Indian subcontinent; to the west and northwest by the east African coast and Arabian Peninsula, respectively; to the east by Thailand, the Malay Peninsula, Indonesia, and Australia; and to the south by the oceanic margin with the Southern Ocean at latitude 60°S, the northern limit of the area covered by the original Antarctic Treaty (1959). In addition, the Indian Ocean encompasses several regional seas and sea areas: the Andaman Sea, the Arabian Sea, the Bay of Bengal, the Great Australian Bight, the Gulf of Aden, the Gulf of Mannar, the Gulf of Oman, the Laccadive Sea, the Mozambique Channel, the Persian Gulf, and the Red Sea. 3. Travel across the Indian Ocean and passage from its waters into neighbouring seas is both facilitated and potentially constrained by chokepoints. The seven key chokepoints in the IOR are the Mozambique Channel, the Bab el Mandeb, the Suez Canal, the Strait of Hormuz, the Malacca Straits, the Sunda Strait, and the Lombok Strait. 4. While the IOR now features more prominently in the geopolitical interests and commercial calculations of extra-regional powers such as the US, the European Union nations, Japan, and China, regional states and non-state actors also increasingly influence regional and global affairs. Indeed, regional developments now reverberate far beyond the Indian Ocean‘s shores. Overall, the IOR represents the most politically troubled and potentially combustible area of the world. In the beginning of 2013, a total of 142 political conflicts were recorded in the IOR, representing more than a third of the 388 conflicts worldwide, including 12 of theworld‘s 20 wars, as well as an additional eight limited wars. 18 Trinco Dialogue Maritime Symposium 2013 5. As a result, maritime security concerns have become more important. Maritime security threats in the Indian Ocean ranges from the traditional through to the non-traditional. The following might be identified as potential threats: a. The threat of major intra-state conflict. b. Terrorist attack against vulnerable points in the region, particularly offshore oil and gas installations and other mining infrastructure. c. Non-traditional security threats, including the smuggling of people, arms and drugs, illegal unreported and unregulated (IUU) fishing, and maritime natural disasters. 6. Major Intra-State Conflict among states, including the major powers, has been eliminated as a feature of the international system. However, shows of force by rising powers are likely to become more common as their military capabilities expand. India and China would be the main powers of concern in this judgment. 7. Maritime terrorist attacks are a threat across the IOR due to the presence of extremist groups. The terrorist attack in Mumbai in November 2008 showed the risks of terrorist attack from the sea if coastal waters are not secure. Attacks on offshore facilities have occurred in the past. Three offshore Iraqi oil terminals were attacked in the Persian Gulf in 2003 by explosiveladen speedboats are some of the examples. 8. The security of chokepoints in the region – the Straits of Hormuz, the Bab‐ el‐ Mandeb, and the Indonesian Straits – has become a matter of great strategic importance for all maritime powers. Conflict in the Persian Gulf and piracy near Bab‐ el‐ Mandeb, due in part to the failed state of Somalia, are two issues of concern. 9. Maritime security issues, including the protection of sea lines of communication (SLOCs), are paralleled by increasing importance of the broadband communication connections between Asia, Europe, and the United States that are linked by undersea cables traversing the Indian Ocean. Ensuring the future security of the sea lines and cable routes has now become an issue for all the Asian powers. For many decades Britain, and more recently the United States have taken responsibility for Indian Ocean sea line protection. Now India, Japan, China and others will have to assess their own growing roles in future SLOC protection. 10. The formidable expansion of Asian infrastructure projects is a new development that gives increased importance to the Indian Ocean. New ports, airports, roads, rail systems, and pipelines now traverse Asia from West to the East and are making access between the landmass 19 Trinco Dialogue Maritime Symposium 2013 of Eurasia and the Indian Ocean littoral much easier. This, in turn, will generate greater commercial traffic and the possibility for greater strategic competition. 11. Non-traditional maritime issues in the Indian Ocean region are now on the agenda. Forced migration due to rising sea levels and polluted sea water is a problem that all Asian countries have to take seriously in the years ahead if global warming continues. This is paralleled by growing desertification in East Africa leading to food shortages, which in turn would increase migration, much of it illegal. And fishery depletion in the Indian Ocean due to poor monitoring and over‐ fishing has become a serious matter that the international community must address. 12. Marine natural hazards arise through climate change, tropical storms, tsunamis and other severe oceanic conditions. Southeast Asia and other parts of the IOR are prone to these hazards, and scientific findings suggest that the intensity and frequency of disasters arising from these hazards is increasing. 13. In order to mitigate the maritime security concerns in the IOR followings are broadly identified: a. Inter-dependence and inter-operability among potential agencies is a crucial means to ensure the effective use of resources. b. In order to effectively exercise authority in the area of jurisdiction by a maritime force, the necessary legal instruments needs to be in place. c. Information sharing among maritime forces have never been this effective since the model of ReCAAP was established by the South Eastern states to curb the piracy in the Strait of Malacca. Formation of the Djibouti Code of Conduct (DCoC) states in January 2009, adopted the ReCAAP model to repress piracy and armed robbery against ships in the Western Indian Ocean via effective information sharing. Although information sharing is one vital pillar of the Code, it was the most effective means for creating maritime domain awareness for most small states. 20 Trinco Dialogue Maritime Symposium 2013 MARITIME DOMAIN AWARENESS IN IOR AND COLLECTIVE RESPONSE BY THE REGIONAL NAVIES Lt (ND) HPK Nanayakkara RWP, RSP*, BSc(DS)MTS Student Officer of 11th JNSC ABSTRACT 1. Maritime Domain Awareness is all about generating actionable intelligence, the cornerstone of successful counterterrorist and maritime law enforcement operations. The challenges facing Naval and Coast Guard forces have changed dramatically over the past decade and make the future security environment increasingly complicated and uncertain. That shows terrorists will exploit access to our open society, economy, and commercial systems to bring about damaging and potentially catastrophic effects on our homeland. 2. With a more globally connected economy and our nation‘s continued reliance on the global maritime environment for trade and commerce, ensuring a safe and secure maritime environment is critical to national security and economic. 3. An emerging set of diverse, increasingly networked adversaries pose security challenges every bit as threatening as if confronted by a peer adversary. Whereas the enemies of yesterday were predictable, homogeneous, rigid, hierarchical, and resistant to change; today‘s enemies are dynamic, unpredictable, diverse, fluid, networked and constantly evolving. They benefit from the many technologies and materials that are readily available for sale on the world‘s illicit markets to disrupt systems and fabricate weapons of mass destruction (WMD). These enemies do not operate on conventional battlefields, but thrive in weak states and gray areas where terrorists ride the back of transnational crime. 4. To counter the multitude of threats presented by these conditions, we must deny our adversaries the use and exploitation of the maritime environment, including its transportation systems. The first step toward enhancing Maritime Security is achieving increased awareness of activities in the maritime domain. 5. To achieve increased awareness, the Coast Guard, in partnership with the Navy and other agencies, is developing an initiative called Maritime Domain Awareness (MDA). The Navy has achieved MDA for years at the tactical level to dominate areas surrounding Carrier and Expeditionary Strike Groups, but in the context of the global war on terrorism (GWOT), MDA takes on a strategic dimension. 6. MDA is the collection, fusion and dissemination of enormous quantities of data, intelligence and information, drawn from international coalition partners and forces, and commercial entities. Eventually, the depth of information collected from these various sources 21 Trinco Dialogue Maritime Symposium 2013 will be weaved together to enrich a comprehensive common operating picture (COP) that is envisioned to be fully distributed among users with access to data that is appropriately classified. 7. The purpose of MDA is to generate actionable intelligence. Without actionable intelligence, counterterrorist or maritime law enforcement operations are seldom fruitful. With it, the range of options available to Navy and Coast Guard forces expands significantly to permit much more effective investigation and interdiction of potentially threatening vessels, either overseas. Additionally, MDA acts as a key enabler for other critical security measures, such as the Proliferation Security Initiative, Container Security Initiative, counter-narcotic operations, and anti-piracy patrols. Response options available range from intensified surveillance and tracking, to Expanded Maritime Intercept Operations (E-MIO), to the application of lethal and non-lethal force, if necessary. 8. The Navy and Coast Guard will have defined MDA to be the effective understanding of anything associated with the global maritime environment that could impact the security, safety, economy or environment of the country. 9. The Navy, with its significant maritime intelligence, collection, fusion and dissemination capabilities, plays a leading role within the Defense Department for developing MDA and orchestrating the process by which information is shared with coalition partners, and other agencies and departments of the IOR countries. Sharing information is absolutely essential if this growing network is to effectively detect, identify and track the most dangerous threats, including terrorists, WMD, narcotics, piracy, mass migrations, and arms traffickers. Awareness generated through information sharing will enhance understanding of the global maritime environment, including adjacent ungoverned areas in which terrorists operate, thereby providing opportunities to deal with threats as far away from IOR countries. 10. MDA consists of two key components: information and intelligence. These components will combine in the COP to create a substantive, layered presentation of the global maritime environment. Numerous governmental and military organizations already possess a COP of some sort; however, no one source captures all of the maritime information needed or currently available. 11. The challenge will be to effectively integrate and fuse the various inputs to achieve the synergies offered by a comprehensive situational awareness picture, while being responsive to the information needs of participating agencies. Through the COP, specialists will eventually be able to monitor vessels, people, cargo and designated missions, areas of interest within the global maritime environment, access all relevant databases, and collect, analyze and disseminate relevant information. Efforts are underway to determine the capabilities existing COPs have to accomplish these tasks and to assess the complexity of integration. For the foreseeable future, technological and fiscal constraints will not support global tracking of every vessel, nor would doing so be useful in of itself. Based on fused data, intelligence and information, the most 22 Trinco Dialogue Maritime Symposium 2013 threatening vessels will receive priority cueing in order to focus our assets in the right areas. As better, less expensive solutions are developed; we can improve our ability to achieve maritime transparency. 23 Trinco Dialogue Maritime Symposium 2013 DISASTER MANAGEMENT THROUGH COLLABORATIVE RESPONSE Cdr(N) SR Rupasena,RWP,RSP,psc,PG Dip in S&DS,BSc (DS) Directing Staff- DSCSC ABSTRACT 1. The Indian Ocean Region (IOR) covers almost one seventh of the earth‘s surface. The strategic importance of the Indian Ocean (IO) has been discussed in length and it is clearly evident that the importance is attracting increased attention from world around. The Countries and Regions in and around the Indian Ocean constitute around 50 states with a total land-area of 33 million sq. km. These states and regions accommodate about 2.6 billion or 39% of the global population. The Indian Ocean occupies about 20% of the total ocean area of the world which covers a total of 73,427,000 sq .km of the globe stretching from East-Africa to west-Australia- a distance of about 6,400km or 4000 miles from west to east and from south Asia to Antarctica in North-South Orientation. Safety and security of the Indian Ocean and its littoral states remain critical for economical sustainability of countries and well being of the population due to various reasons. Among these issues, disasters pose a huge threat to the stability of the region caused by both on conventional and non-conventional forms. The IOR is often called the ―World‘s Hazard belt‖ which is subjected to floods, droughts, cyclones, earthquakes, tidal surges, landslides, tsunamis etc. According to an ESCAP report (UN Economic and Social Commission for Asia and Pacific) (1995) around 50% of the global natural disasters occurring in this region and these hazards incorporate mostly the climate and seismic (tectonically) disasters. The IOR has found many organizations set-up for managing disasters sub-regionally, but yet to realise a collaborative mechanism for whole region to ensure security of the people, which has become an important obligation too, as a region. 2. In addition to the natural disasters discussed above, IOR has been turning out to be vulnerable to set of added non-traditional adversities. Natural disasters originated from global climatic changes, threat posed by both nuclear states (India, Pakistan, Iran, etc.) and states embarking nuclear power in near future (Vietnam, Thailand, Indonesia, Malaysia and Singapore), disasters associated with main Sea Lanes of the Indian Ocean in consequence to possible oil spill at mass scale, piracy against Cruise Liners carrying thousands of passengers, as well as search and rescue operations on distress ships and boats which are carrying passengers or refugees can simply be expected. These configurations of possibilities posed by traditional and non-traditional causes claim a comprehensive approach towards mitigation and management of disasters in the IOR. 3. The IOR bears great geo-political, geo-economical, geo-strategically as well as geoenvironmental significance and importance. In this Oceanic region eight peripheral subsystems 24 Trinco Dialogue Maritime Symposium 2013 (Indian Ocean sub-systems) have developed. These are : i) South-east Asian, ii) South Asian, iii) Central Asian, iv) Persian Gulf, v) Horn of Africa vi) Eastern African vii) Southern African, viii) S.W Indian Ocean Island and ix) Southern Island and EEZ. These sub-systems possess number of sub regional and pan-regional institutions which have been established to take care of security, scientific, social and economic affairs in the region including managing emergencies and disasters. Amongst them number of prominent regional actors engage in disaster managing activities while global actors like United Nations (UN) and International Committee of Red Cross (ICRC) too attend in various capacities. a. ASEAN (Association of Southeast Asia b. SAARC (South Asian Association for Regional Cooperation c. APEC (Asia Pacific Economic Cooperation d. LAS (League of Arab States e. AU (African Union) f. UNDRO (United Nations Disaster Relief Organisation) and UNISDR (United Nations International Strategy for Disaster Reduction) 4. The increased frequency and wider scope of natural and human made disasters during last decades, made it clear that traditional emergency, crisis and disaster management tools have been proved to be inefficient. Many dreary areas of the systems have reflected during the disaster management processes attained in the fast. Factors of financial crisis, strategic alliances with super powers/regional powers and national security strategies pose reasonable challenges towards a common work plan combating emergencies and disasters. There are many observations can be obtained from recent past where, in-proper approach towards emergency management shows not only a misuse of resources but also fail to spot opportunities rescuing affected people. 5. IOR spreads over a larger area connecting relatively big number of dynamic sub-regions peripheral to Indian Ocean. Sub-regions possess their own arrangements of managing emergencies and responding disasters at various levels depending on regional capacities. Looking at widespread challenges faced by the region it would be an ignorance of opportunity if the resources are not shared among sub-regions, as well as miscalculating strategic importance Indian Ocean. This stance demands higher degree of corporation and collaboration among regional actors on their common endeavors. In this regard, traditional approaches characterized by many factors need to be replaced by decentralized emergency management system. Coordinating the diverse capabilities of technology, logistic and human resource of individual countries and sub-regional institutions in the IOR, it can easily gain superior capacity to face any eventuality. This change is especially fostered by the need to collaborate during response to, and recovery from extreme events of catastrophic disasters. 25 Trinco Dialogue Maritime Symposium 2013 USE OF NAVAL DIPLOMACY AND MARITIME SECURITY Cdr (G) SP Kathriarachchi,psc,BSc(DS) Hons Executive Officer SLN Dockyard ABSTRACT 1. The Indian Ocean comprising the third largest body of waters after the Pacific and Atlantic is of crucial significance in view of the facts, firstly, that along its littoral it comprises the largest chunk of the developing or third world countries, and secondly the area is not only rich in mineral resources but contains within itself so many strategically significant waterways. Referred to as a ―neglected ocean‖ few years back, the area has now become the hub of world politics and a cockpit of potential regional and great power conflict. The world order has changed in a manner where we no longer can confine ourselves only to discuss naval matters, but about emerging trends in the ocean, within and outside Indian Ocean. 2. The growing concerns for geo-political stability, preservation of freedom of the seas, ensuring security in the IOR has embarked the regional navies on an apparently new voyage than their traditional roles of ―Carrying guns to the sea‖. The concept of Gunboat diplomacy is quite obsolete as there is no big advantage of such in a markedly asymmetric world order today. We saw it during the SL war on terror and now in Somalia. The era of using force to tame the culprits is far gone with dawn of the new trends in preventing the occurrence of war with diplomatic means such as negotiation, dialogue, partnership, and even to the extent of offering other aids which are dire needs of the potential aggressors. 3. Described as the fulcrum of the Indian Ocean, Sri Lanka possesses unrivalled geographical and other advantages. Sri Lanka Navy has been very keen in maintaining peace and good order in the IOR especially through diplomatic visits, dialogue, joint training/ exercises and cooperative response. Sri Lanka‘s geographical situation being located very near to the Indian peninsula and along the North and South centre line of the Indian Ocean and lying in the East West trade routes has superimposed more prominence to this Island Nation than its regional counterparts including the fact that SLNavy‘s victory over the most ferocious and organized Maritime Terror outfit, the Sea Tigers. 4. Diplomacy is distinguished from the broader idea of foreign policy in the sense that, "diplomacy involves means and mechanisms ...(including] the operational techniques whereby a state pursues its interests beyond its jurisdiction. Naval diplomacy is widely believed to have 26 Trinco Dialogue Maritime Symposium 2013 provided maritime powers with an effective tool of deterrence and coercion. But in the Sri Lankan context Naval Diplomacy has been a very useful and important tool to handle the foreign relations of Sri Lanka. SLN is not a very formidable force in the region in terms of its Naval Capabilities despite the fact that it has compliment relatively larger than many regional navies. Formed largely on British style with a history of over 60 years SLN has been very instrumental in preserving or even generation of goodwill between Sri Lanka and other countries especially in the IOR. The classic example is the winning hearts and minds of the Australian government by swift and Effective Corporation to curb the illegal migration from SL to Australia. This not only resulted in getting more naval aides but altered the course of the Australian political opinion with regard to the Post war allegations against Sri Lanka. 5. Maritime security is concerned with the prevention of intentional damage through sabotage, subversion, or terrorism. Hence assurance of safety to maritime elements of a country from any kind of aforesaid aggressions by a state sponsored or non-state party‘s action is the main concern for any naval force in the world today. Thus maritime security in the IOR is complicated due to the vastness of the region, political and economic instability and differences of the littoral states of the IO and the diversity of non-state actors present in the region at any given time. Hence a country like Sri Lanka seeks to mitigate the situation by using Naval Diplomatic means which not only help assure security in the region but also improve multilateral relationships with the other Indian Ocean nations. 27 Trinco Dialogue Maritime Symposium 2013 AN ANALYSIS OF EXISTING MARITIME SECURITY INITIATIVES IN INDIAN OCEAN REGION AND WAY AHEAD FOR BETTER COLLECTIVE RESPONSE LCdr KDR Weerasekara, RSP Student Officer of 11th JNSC ABSTRACT 1. The ocean connects various countries of the world closer together. The development of nations, the welfare of peoples, and the advance of societies are all closely bound up to oceans and seas. The current security situation in the maritime domain is generally stable around the world today, but we are still faced with various maritime security problems of a global nature. Traditional and non-traditional security threats are interwoven, constantly constituting challenges, and the situation is far from optimistic. Security mutual-trust is still lacking between some maritime countries, which has resulted in suspicion and confrontation; Disputes over island sovereignty and maritime delineation are still lingering; Piracy is far from eradicated, threatening international shipping safety; Weapons & drugs smuggling, human trafficking and other illegal activities are rampant, damaging legal orders of the sea; Natural disasters and maritime accidents are frequent, causing severe casualties and property losses; Marine pollution is serious and the environment is damaged; Climate change and global warming have resulted in the rise of sea level, even endangering the existence of some coastal and island countries. The amelioration and solving of all these issues depends on the concerted efforts of all countries! 2. The overwhelming majority part of the oceans are public domain in nature. Maintaining maritime peace, security and stability and promoting its development and prosperity conform to the common interests of all countries. It is the responsibility of the navy, as the international and sea-borne armed force, to restrain, reduce and remove maritime security threats and to effectively respond to maritime security challenges. 3. In such background, the analysis of this is to justify the necessity of existing maritime security initiatives with the nations interest and identification appropriate development for the future. This analysis emphasis that, political will and regional cooperation and work together with them for better collective response. 28 Trinco Dialogue Maritime Symposium 2013 29 Trinco Dialogue Maritime Symposium 2013 CONCEPT PAPER “TRINCO DIALOGUE MARITIME SYMPOSIUM 2012” COLLABORATIVE MARITIME SECURITY THROUGH MODERN TECHNOLOGY 1. Post war Sri Lanka is presented with undeniable broader responsibilities of reconciliation, rehabilitation and economic development. Ironically, despite its overwhelming military feat over the ―Terrorist outfit LTTE‖, the island nation has been subsequently softened with a multitude of challenges both locally and internationally. 2. Security over the global terrorism is not merely a responsibility of a single party or a nation. Globalization forms free flow of people, goods, capital and idea across borders as well as terrorism. Sri Lanka being an island nation, geopolitically located in a strategically high valued position in the Indian Ocean. It is imperative that we maintain the security of our ports, harbours and sea lines of communications so as to ensure a high level of professionalism is displayed by the navy countering emerging contemporary maritime threats. Maritime Security must, therefore, address a broad spectrum of concerns and situations, not only with respect to these friction points, but also many natural and human threats that we face today. These threats include natural disasters, climate change, trans-national crime, use of the seas to facilitate proliferation of weapons of mass destruction, misappropriation of natural resources etc. Recognizing this mass of challenges at strengthening maritime security, most of the maritime forces believe that new developing technologies are critical at ensuring the long term safety and of the maritime domain. 3. Therefore, the way Sri Lanka counter aforesaid issues in the Indian Ocean Region through regional co-operation and the way we are facing the future with new technology is paramount important and must address with broad spectrum of concerns. 30 Trinco Dialogue Maritime Symposium 2013 MARITIME DOMAIN AWARENESS: WAY AHEAD FOR SRI LANKA NAVY Commander (ND) R JOSEPH, RSP, psc, BSc (DS) Sri Lanka Coast Guard Department 1. Year 2009 remain as one of the most important landmarks in our country‘s history. The defeat of LTTE terrorism and eradication of the ruthless terror outfit from our land and seas even made history in the world, by becoming the first ever country to successfully defeat a terror outfit of this nature. The seas around the country as well as the Indian Ocean as whole were declared free from the LTTE threats and its fear fixation which was capable of painting a threatening image of Sri Lanka internationally.As at today we do not have an enemy in our waters who would challenge our capabilities, strengths, weaknesses and even our strategies and tactics to really measure where we stand in terms of our military readiness. 2. Despite the fact that we have defeated the LTTE maritime terrorism, the maritime security aspect in anyway cannot be kept aside assuming that we have total control of our seas. As the national security of a country is directly linked with the maritime security component, a greater deal of attention required to be paid in making our seas ‗bullet-proof‘ even for the slightest security challenge or threat. 3. In this regard, the Sri Lanka Navy (SLN) has a greater obligation and a role to play in protecting the seas around us. One looking at the past would argue that the reasons which led to the development of LTTE terror organization is mainly due to the fact that less concentration and attention that was given to the importance of ‗maritime security‘. The repercussions of this very fact were very much visible and we have enough evidence to prove this very fact by simply looking at the development of the LTTE terror organization in its three decade odd conflict. 4. One major area which led the LTTE to develop into such a formidable terror outfit is mainly due to the lack of awareness the country as whole had on our ‗Maritime Domain‘. 31 Trinco Dialogue Maritime Symposium 2013 Understanding the importance of having a greater amount of awareness about our maritime domain, the SLN did initiate some measures aimed at improving the information gathering in our waters. These attempts at the initial stages proved to be effective and subsequently the last few years into the war especially with the LTTE maritime component brought us unprecedented results in this regard. 5. The technical knowledge of SLN, R & D projects and assistance from various countries were some of the key pillars which helped the high ranking decision makers to see the much important broader strategic maritime picture that was never there. This edge in the technology that the SLN had during the crucial period of the war gave the whole conflict an unprecedented advantage over the enemy. The SLN‘s ‗Maritime Domain Awareness‘ (MDA) which started with mere positioning of Radars on strategically important locations as well as onboard naval platforms progressed towards enabling the key decision makers to virtually see the ‗Battle Picture‘ from the Command Operations Centre. 6. Three years into winning the war, SLN has made significant progress in MDA and technical experts continue to work in achieving a better MDA in years to come. SLN is presently working towards establishing a greater information fusion with some of the key sensors such as Automatic Identification System (AIS), X-Band RADAR, SONAR, Maritime Small Target Tracker (MSTT), High Frequency Surface Wave Radar (HFSWR), Automatic Vessel Locating System (AVLS) etc. 7. Fusion of data that are mainly gathered through AIS and RADAR will result in reducing the uncertainty and improving the quality of information that SLN receive. Two dimension (2D) information representation mainly absorbed through AIS and RADAR have been further developed by the SLN technical professionals to bringing in the three dimensional (3D) Geographic Information System (GIS) going well beyond the 2D representation which result in easy interpretation of fused information. Certain components of developments in the field of ‗3D immersive virtual tele-presence for surveillance, maneuvering and planning‘ has been successfully tested and proved highly efficient. Expanded, successful mapping of virtual world with the real world will definitely bring SLN to a considerable status in the field of MDA with certain other regional countries. 8. Looking at our present maritime domain, one would see that we today encounter totally different challenges and threats to that of what we faced before year 2009. Even though these challenges and threats were present even prior 2009, we either ignored them or paid less attention as we had a significant issue i.e. the LTTE maritime wing and its operations to be countered at all cost. The changing maritime nature of our oceans need to be carefully analyzed and looked in if we are to ensure that our seas are safe and secure. As the Government is focusing on achieving sustainable development through various development projects and 32 Trinco Dialogue Maritime Symposium 2013 strategies, the importance of our seas have become significant than never before. In the present context, we need to look beyond terrorism, armed robbery or even piracy. 9. In this background, certain issues that are either less visible or less important in the maritime domain has a higher probability of evolving into a greater maritime threat/disaster. An oil spill from a ship that‘s closer to our shores can create a huge security impact if not contained professionally and timely. On the same note, a ship that has already entered into our ports/maritime zones can be practicing various illegal activities endangering our marine environment. Even though we paid less attention to events of above nature during the time of conflict, they are fast taking different shapes and emerging as challenges/threats. Impact of such events can have devastating impacts both long term and short term. 10. Such threats or challenges takes various forms and needed to be handled effectively if we are to avoid further propagation which can lead to a dangerous situation. In a rapidly changing scenario, emerging threats/challenges such as human smuggling, IUU fishing in Sri Lankan waters, drug trafficking, SAR, marine pollution, protection/preservation marine species and environment, oil/chemical spills, safety concerns of marine transportation etc. are some of the key areas where the SLN need to be vigilant. If SLN is to be proactive, we require having a broader understanding of what is taking place in our seas as well as in our internal waters. 11. This is where we need to have a different approach towards MDA. Apart from the developments that has taken place in developing our MDA capabilities and expected future research work, this paper concentrate mainly on the strategic and tactical aspects that the SLN need to look in having a near perfect MDA capability. In this context, the future of SLN‘s MDA necessarily requires looking at some important aspects if we are to be proactive as the first line of defence. In the MDA initiatives, SLN has a broader role to play apart from its naval role by formulating the much needed ‗Strategic MDA Plan‘ (SMDAP) which would finally be the nucleus of the much wanted ‗National Plan towards achieving MDA‘. 12. The SMDAP will remain as the primary component of a much wanted active layered maritime defence in depth which will be accomplished by improving our strengths in areas such as collection, fusion, analyzing, displaying and propagating information and intelligence to required elements. The SMDAP need to focus on promoting innovativeness in intelligence collection (including MDA sub layer) and thereby fusion such with technical components. The SLN will require establishing the ‗National MDA Centre‘ (NMDAC) which serves as the nerve center of the entire plan. 13. Achieving near complete awareness of the maritime domain will not be possible through the available MDA applications. The mere purpose of research work that is being conduct at present is to reach up the ladder of MDA and seek possibilities of what SLN R & D could come 33 Trinco Dialogue Maritime Symposium 2013 up with in the long run. Apart from what we develop in the MDA field, SLN require successful integration with latest MDA applications to suite our requirement in the maritime domain. Use of such latest technologies will maximize the near-real time awareness of the maritime threats that are emerging in our waters. 14. As MDA focuses mainly on information sharing, situational awareness and subsequent planning will require having a Common Operating Picture (COP) established in the SLN which will at the initial stages aim at sharing information between the key stakeholders in the country. The subsequent phases will patch the much needed regional initiative and then focused towards achieving Global Maritime Situational Awareness (GMSA) which is an integral part of MDA. 15. Effective implementation of this SMDAP will undoubtedly require the sustainable effort being put in by the SLN itself at the initial stages and assistance of other key stakeholders in the subsequent phases. In the prevailing maritime environment around the seas of our country as well as the region, layered defence concept will play a significant role. In this context, MDA will be one of the leading factors. Apart from our own initiative and tactical innovativeness, if this plan can be implemented, we could be hopeful of making sure that our seas are being used for legitimate purposes and that no threat projects from the oceans around us in challenging the national security. 34 Trinco Dialogue Maritime Symposium 2013 INTEGRATED DEFENCE EFFORTS TO ENHANCE NATIONAL SECURITY LCdr (G) BARI Abeysekara BSc (NS), Student Officer of 8th JNSC INTRODUCTION 1. The international security environment is dynamic and uncertain, with recurring disputes, crises, and conflicts in many regions, and endemic conflicts in regions of particular importance to the security of the Sri Lanka. Challengers and adversaries may be states or groups of states, as well as non-state groups including terrorist, criminal, ethnic, religious, and special-interest organizations. 2. The Armed forces of Sri Lanka also have a long history of unconditional service in military operations other than war that support broad national objectives including such areas as participating in humanitarian relief efforts for victims of natural disasters in the Sri Lanka. National security is among the fundamental national purposes that the Sri Lankan people embedded in the constitution. Sri Lanka relies on the complementary application of the basic instruments of national power; diplomatic, economic, informational, and military, for its security. Under the framework of shared responsibilities set out by the constitution, it establishes specific policies and strategies in order to preserve its values, to identify its interests, and to assure the best use of its resources in advancing its interests and defending the security of the republic and its citizens. AIM 3. Aim this paper is to study the salient aspects of integral defence efforts to enhance the national security of Sri Lanka. 35 Trinco Dialogue Maritime Symposium 2013 PRESENT DAY CHALLENGES TO THE NATIONAL SECURITY 4. The strategic environment is characterized by uncertainty, complexity, and rapid change which require persistent engagement. This environment is fluid, with continually changing alliances, partnerships, and new national and transnational threats constantly appearing and disappearing. 5. Firstly, it is imperative that we understand our common enemy which more often than not will be terrorist groups and international organized crime networks - in other words violent non state actors. The challenge to nation states being that the violence perpetrated by a majority of these violent groups amounts to pure terrorism and what makes it frightening is that these violent factions have greater access to lethal weaponry and advanced off the shelf technologies, than ever before, giving them a more or less an equal fighting potential in the littoral battle space. 6. It is generally acknowledged that the approach to national security requires a comprehensive view of various political, social, economic, technological and strategic aspects. National security implies not only safeguarding territorial boundaries but also that the nation is able to build a cohesive, egalitarian, technologically efficient and progressive society with a good quality of life. Defence policy is a subset of national security policy that concerned with the protection of the state and its citizens from direct and indirect (proxy) military threats and actions of other states. In defence planning, the emphasis shifts to national security concerns that are mainly military in nature. COMBINED OPERATION CONCEPT TO ADDRESS THE NATIONAL SECURITY 7. The nature of the challenges to the country and its interests in the contemporary security environment demand that the Armed forces operate as a fully integrated joint team in combat and noncombat operations. These operations often take place with forces of allies and coalition partners, and with foreign governmental and nongovernmental nonmilitary agencies. The challenges are best met when the unified action of the armed forces elicits the maximum effect from the unique but complementary capabilities of each Service and command, and from the synergy that results from their synchronized and integrated action. 8. Most major military missions today require the participation of more than one military service. Therefore, the principal concern now must be centered on what is required by the defence establishment as a whole to perform a particular mission—not what is required by a particular Service to perform its individual part of that ‗mission‘. The areas of commonality in modern weapon systems are immense and growing rapidly. Communications, intelligence systems, surveillance radars; even traditional equipment such as guns, fuses, ammunition and 36 Trinco Dialogue Maritime Symposium 2013 vehicles are common. Integrated defence planning is necessary in view of escalating costs of these weapons and equipment. 9. Security is no longer matter of military force alone, economic and ecological concern, migration drug trafficking and non-military uses have become more salient in the security agenda. Therefore, it is imperative to be aware of the potential benefits of civil-military integration not only address to these issues but also to seek assistance to overcome technological shortcomings and other problems plaguing its military industrial complex. 10. Military leaders have fundamental responsibilities in developing national assessments of the strategic situation. Specifically, in the system of civil-military relations, senior military leaders provide recommendations on the feasible military options; resources required and anticipated consequences of military action, and the military requirements for conflict termination. They also are uniquely responsible for the military components of operation plans developed in response to decisions prompted by national assessments of the strategic situation. 11. Effectively integrated joint forces expose no weak points or seams to an adversary, while they rapidly and efficiently find and engage those adversary weak points and vulnerabilities that assure mission accomplishment. This does not mean that all forces will be equally represented in each operation. Joint force commanders may choose the capabilities they need from the air, land, sea, space, and special operations forces at their disposal. 12. The solution advocated in this joint operating concept (JOC) involves a significant cultural change that places greater emphasis on pursuing cooperative security that is balanced with the need to maintain critical core military competencies. Today, joint actions are practiced in the preliminary level. The key to enhancing and maintaining joint force effectiveness is the military leader‘s diligence in studying, applying, teaching, and ultimately preparing joint doctrine, which provides the foundation for joint warfare. Integral Defence Planning 13. Effective cooperative defence planning was not been practicing in Sri Lanka. This has led to prompt in decision-making and adversely affected the modernization plans of the Services. The key issues needing immediate attention include; the need for formal prior approval for defence Plans, better management of the defence revenue and capital acquisition budgets, streamlining of the defence procurement process and better human resources management. The Ministry of Defence should appoint a group of eminent experts to study the present defence planning process, identify the lacunae and grey areas in the process and recommend structural and procedural changes. The aim should be to streamline defence planning, harmonize it with 37 Trinco Dialogue Maritime Symposium 2013 national development plans, and make the process more responsive in order to deal effectively with the rapidly changing geo-strategic and regional security environment. 14. Subjects like surveillance, air defence, electronic warfare, and amphibious operations, which relate to more than one Service, do not get adequate attention. Integrated planning for defence is essential for creating balanced force structures and for the successful execution of all military missions. In fact, it is the most effective manner of ensuring effective defence. 15. Defence planning should involve the conceptualization of plans and decisions for the execution of defence policy. Long-term planning for defence is essential for the following reasons: a. The existence of a highly fluid strategic environment, which results in continuous shifts and changing profiles of threat and power equations. b. To ensure judicious allocation of resources and cost effective utilization. c. Revolution in Military Affairs (RMA), i.e. advances in technology, which result in weapons and equipment systems becoming obsolete at a fast rate. d. Lead time required to raise and prepare defence units; to produce or acquire and introduce new weapons and equipment systems. e. The changing nature of conflict and reduced reaction time. f. Coordination problems between defence, economic, science and technology, infrastructure and industrial activities, as well as among the Defence Forces. Joint Military Doctrine 16. The software of defense, that binds the services together as an integrated fighting force. Joint doctrine helps to capitalize on the synergistic effects of inter service coordination and cooperation. Concise expression of how military forces contribute to campaigns, major operations, battles, and engagements. It should guide to combined actions, rather than hard and fast rules. Doctrine provides a common frame of reference across the military. It helps standardize operations, facilitating readiness by establishing common ways of accomplishing military tasks. 17. Joint doctrine establishes the guidance on how best to employ national military power to achieve strategic ends. Joint doctrine captures the fundamental principles that guide the employment of Sri Lankan military forces in coordinated action toward a common objective. 38 Trinco Dialogue Maritime Symposium 2013 Joint doctrine should also includes terms, tactics, techniques, and procedures. Joint doctrine provides the basis for education, training, and execution of current joint operations. 18. Joint doctrine enables the Armed Forces to conduct the most effective joint activities and unified action. It is based on extant capabilities and incorporates time-tested principles for successful military action as well as contemporary lessons that together guide aggressive exploitation of its advantages against adversary vulnerabilities. It does this by promoting a common perspective from which to plan, train, and conduct military operations in combat and noncombat situations. It also fundamentally shapes the way the Armed forces think about. Joint Military Training 19. Commanders at all echelons are responsible for preparing their command to accomplish assigned missions. To be successful, we must train our forces, first and foremost, on war fighting. To keep our war fighting focus sharp, we must use tools, such as the joint training system to enhance our abilities to respond to the myriad of asymmetrical threats. For example the Staff college Batalanda and Kothelawala Defence University are being set up to increase mutuality in strategic thinking, joint resource management. 20. Following are the key objectives of joint military training: a. Continuously improve joint force readiness by integral training aligning joint training and education capabilities and resources with combatant command operational needs. b. Achieve a training unity of effort across services, agencies, and organizations. c. Develop individuals and organizations that think joint intuitively. d. Prepare forces for new war fighting concepts and capabilities. e. Develop individuals and organizations that improvise and adapt to emerging challenges. Situational Awareness 21. The persistent Intelligence, Surveillance, and Reconnaissance in Joint Integrating Concept should provide a detailed description of required capabilities that are supportive of the situational awareness requirements of the Office of the Chief of Defence staff. There is no doubt that timely intelligence is essential in order to prevent any crime. This is far more important in 39 Trinco Dialogue Maritime Symposium 2013 the maritime domain due to the much wider scope of the maritime trade and other activities at sea. 22. Intelligence could be considered as the ultimate deterrent weapon that individual states and the international community must possess. There should be intelligence gathering, sharing, and analyzing mechanisms, locally, internationally, or regionally. Efforts must be made to identify possible terrorist capabilities and share such knowledge with other military forces so as to make evaluation and identifying vulnerabilities and risks more effective. 23. Defense Intelligence Organization should consist with highly skilled, agile, and accountable professionals, military as well as civil, equipped with leading-edge training and technology, strengthened by partnerships, and able to provide all-source defence intelligence, whenever and wherever required, in support of the Nation. Obtaining the service of State Intelligence Service, office of the national intelligence and other intelligence agencies whether under MOD or not support this understanding by providing integrated, evaluated, analyzed, and interpreted information concerning what the enemy is doing, is capable of doing, and may do in the future. Defence Communication Strategy 24. The Defence Communications Strategy should aim to capitalize on the effect of our communication efforts in order to improve understanding and support for Defence and enhance the reputation of the Armed Forces collectively, each Service individually, the Ministry of Defence and its various component parts. The strategy supports the Defence Vision by helping to demonstrate that Defence is essential to the national interest. It should provide an overarching framework for communications activities setting out what we want to achieve, the priority areas we need to focus on and who needs to be involved. Other communications strategies in MOD and the Armed Forces and communications activities across the Department are expected to align with it. This will be achieved through the following enabling objectives: a. A better relationship with key external stakeholders including the national and regional media. b. An outcome based approach and improved coherency of effort across everyone involved in Defence communications. c. A MOD communications organisation to obtain first class reputation in Defence, the confidence of the Department at all levels. 40 Trinco Dialogue Maritime Symposium 2013 Defence Procurement Procedure 25. The defence planning process attempts to match the budgetary resources likely to be made available for the requirement to establish the defence capability necessary to face the threats and challenges. This exercise is undertaken in two phases: a. What should be the proportion allocated to the defence effort as against other areas of national security concerns and economic growth? In order to minimise adverse affects of high military expenditure on socio-economic development, it is necessary to correspond national development planning with defence planning. b. Optimisation of allocated resources, i.e. distribution of resources within the Ministry of Defence (MoD) based on force planning (Force and weapons mix, command and control, logistics and human resources management) by the Defence Services to combat current and future threats, defence production and other agencies concerned. The quantum of indigenous production and the requirements to be procured from outside are decided in this phase. The objective is to achieve maximum defence capability from the given resources. 26. Focused logistics should be one of the four pillars of the joint vision of Joint Commanders that must be accomplished in an efficient and effective manner. Logistical operational military forces must be organizationally structured with systems that maximize support capability to the joint and combined future military force. Disaster Management 27. Office of Chief of Defence staff is responsible to ensure a coordinated response for all disaster relief both within and outside the country. This integrates the efforts of the Services and other allied agencies at crucial junctures of disaster management thus bringing timely assistance to the affected populace. Shining examples of the quality of efforts are relief operations of post Tsunami and floods. Up gradation of the Office of the Chief of Defence Staff 28. Office of the Chief of Defence Staff should furnish with Joint force commanders assist in the decision making and execution process. Its sole function is command support, and its only authority is that which is delegated to it by the commander. The creation of Joint staff organization should not result in establishing another layer of bureaucracy that denigrates Service Head Quarters, inhibits competent decision making and hinders effective war fighting. 29. Ministry of Defence (MoD) views OCDS as an overarching extension of the Service Head Quarters, and to be used as a buffer between the two. OCDS is neither an information 41 Trinco Dialogue Maritime Symposium 2013 gathering agency nor merely rubber stamping proposals emanating from Service HQs. It needs to be clearly understood that it is to do an in depth analysis of issues referred and otherwise in its charter and give cogent views on them. The functional relationship between MOD, OCDS and the Service HQs should be clearly defined. Civil - Military integration 30. Elementary issues of national security are determined by the pattern of institutional interaction between the civil and military components of a nation‘s policy. The regulating of Civil – Military relations, therefore, lies at the heart of a nation‘s security framework. Nations which the exact balance in their pattern of Civil – Military relations have a great advantage in their search for security, with an increased likelihood of reaching the right answers to the operative issues of state policy. 31. Conflict between the civil and military components may not always be noticeably visible but it is the underlying theme across the politico-military histories of nations. In the USA, since World War II, there have been more than seventy instances of major conflicts between the civilian and military leadership, each with its own set of drivers and consequences. 32. Within the MOD and OCDS, authority, responsibility and accountability must be comprehensively reviewed. Concurrently, substantial delegation of powers and authority to Service Chiefs must take place – they must be made entirely responsible for operational plans and equipment, even though with precise budgetary backing as also the authority to contract their budgets. Having been allowed greater control of their allocated budgets the Service Chiefs must drive capability planning and determine the best balance between manpower, training, equipment and support, etc, that are needed to deliver the defence requirement. CONCLUSION 33. Implementing this agenda will not be easy. To succeed, we must balance and integrate all elements of power and update our national security capacity for the 21st century. Our intelligence and homeland security efforts must be integrated with our national security policies, and those of our allies and partners. 34. Sri Lanka have experienced the effects of irregular warfare in her territory as well as the maritime domain and learnt bitter lessons for over 3 decades. A terrorist group like the LTTE could not have waged war against the state for three decades, without the sustenance they received from abroad via the sea. Therefore, it is essential for all stake holders to have the latest qualitative analysis on the scope and utilization of all aspects of maritime surveillance for achieving complete domain awareness. 42 Trinco Dialogue Maritime Symposium 2013 35. Despite the efforts put in by MOD and achievements towards integration in the Armed Forces during last humanitarian operations, choke points do exist, that impede true integration from being achieved in the desired manner. The major ones, those that should essentially be addressed on priority and within an open mind. Structures can only facilitate enforced development of cooperation and synergy, they cannot remove established mindsets. The first priority should therefore be to institute processes that assist in dismantling mindsets, only then would joint structures become meaningful and ‗true jointmanship‘ achieved. 43 Trinco Dialogue Maritime Symposium 2013 APPLICATION OF CLOUD COMPUTING IN MILITARY CONTEXT Commodore AMSP Alahakoon, USP,psn, C.Eng, B.Sc(Hons)(WS), MBA(MOT) Commodore Electrical Department (E) 1. Cloud computing has been a topic of keen interest in recent years, having been referred to as "the most promising computational platform" and "the prevailing technique for the next ten years". (Zaerens, 2011) There has been a lot of discussion as to what new opportunities it can bring to markets in general and to defence in particular. In this paper I discuss cloud computing in a military context. First the basics of Cloud Computing is described including its characteristics, deployment models, risk of cloud computing in Military Context, threats, the applications in military with conclusion and recommendation. INTRODUCTION 2. Cloud computing is a type of computing where massively scalable IT-related capabilities are provided ―as a service‖ to multiple external users via the Internet or large-scale private networks that is geographically remote from the consumer. What it offers is a way for users to increase capabilities, faster and more efficient services without investing in new infrastructure, training personnel, or buying software licenses, at significantly less cost. Such efficiencies make cloud computing extremely attractive and 'clouds' are increasingly being used by government and industry. Traditional server environments pose several challenges: high labour and capital costs, long development and deployment cycles and quality risks associated with largely manual processes. Organisations are now finding new ways to meet these challenges using cloud computing (IBM, 2012). Cloud computing enables computer users to use services without necessarily understanding the technology or owning the infrastructure. Through the cloud, users share resources, software, and information on-demand. The closest analogy to cloud computing is the electricity distribution grid. A power company owns the infrastructure, a distribution 44 Trinco Dialogue Maritime Symposium 2013 company distributes the electricity, and the end user ―consumes‖ it but does not own or operate the electricity network. User pay for only what it consume and at varied capacities. CLOUD COMPUTING SERVICE MODELS 3. Generally there are three cloud computing service models available: a. Infrastructure as a Service (IaaS) involves the provision of a virtualised environment of servers, computer processing, memory, data storage, and network connectivity. IaaS enables the consumer to run operating systems and software applications of their choice. b. Platform as a Service (PaaS) involves the provision of operating systems and associated web servers. The consumer uses the service provider's cloud infrastructure to deploy web applications. The provider controls and maintains the physical computer hardware, operating systems, and server applications. The consumer controls the software applications they develop. c. Software as a Service (SaaS) Typically the service provider controls and maintains the physical hardware, operating systems, and software applications. The consumer has limited control over application and configuration settings specific to the applications they are using. CLOUD DEPLOYMENT MODELS 4. Cloud services may be delivered using one or more of four cloud deployment models or modes of delivery, each of which carries inherent benefits and risks. : a. Public Cloud which involves an organisation using a service provider's cloud infrastructure that is shared via the internet with many other organisations and individuals. This generates competitive Economies of Scale but carries inherent security risks associated with its wide availability. Google, Amazon are Public clouds. b. Private Cloud attempts to mimic the delivery model of public cloud service provider but it does so entirely within the firewall and for the benefit of the consumer, which is usually a large organisation. This provides many of the advantages of a public cloud but with greater control and security. c. Community Cloud is a private cloud that is shared by several organisations or government agencies like MOD that have similar needs in terms of data sensitivity and security. This model provides most of the benefits of a private cloud with additional economies of scale that make it more cost effective. 45 Trinco Dialogue Maritime Symposium 2013 d. Hybrid Cloud as the name suggests involves a combination of cloud models. For example, the organisation could use IT resources from a public cloud to manage nonsensitive data which could be set up to interact with sensitive data stored and processed on a private cloud. 5. The mobile and dismounted domains of defence organizations typically use devices that are light in storage, processing and communication capabilities. therefore cloud processing and storage is a great advantage, but it is infeasible to rely solely on a central storage system that is accessible through a network. Such factors influence the degree of benefit and risk involved. (Cloud computing in Government context, 2011) 6. As is evident from the description of cloud deployment and service models, there is a variety of communication and information technology platforms and services on offer. There is no 'one size fits all'. Services can be tailored to the needs of the consumer according to region, size of the organisation or business, sector characteristics, workload, demand and security concerns. Before considering cloud computing as an option, the organisation must assess the benefits and risks of the various cloud computing options to determine which service is appropriate for their needs. KEY CHARACTERISTICS 7. The key characteristics that users should expect from cloud computing include, a. Customer capital expenditure is minimized which lowers barriers to entry, as infrastructure is owned by the provider and does not need to be purchased for one-time or infrequent intensive computing tasks. b. Device and location independence enables users to access systems regardless of their location or what device they are using, e.g., PC, mobile. Smartphone, etc c. Multi-tenancy enables sharing of resources, and costs, among a large pool of users. d. Centralization of infrastructure in areas with lower costs, e.g., real estate, electricity, etc. e. Peak-load capacity increases where users need not engineer for highest possible load. f. Utilization and efficiency improvements for systems that are often only 10-20% utilised. 46 Trinco Dialogue Maritime Symposium 2013 g. etc On-demand allocation and de-allocation of CPU, storage and network bandwidth, h. Performance is monitored and consistent j. Reliability is enhanced by way of multiple redundant sites, which makes it suitable for business continuity and disaster recovery k. Scalability meets changing user demands quickly without users having to engineer for peak loads. l. Sustainability is achieved through improved resource utilisation, more efficient systems, and carbon neutrality. today computers and associated infrastructure are major consumers of energy. m. Security typically improves due to centralization of data, increased securityfocused resources, increased ability to patch and upgrade, increased ability to monitor, increased ability to encrypt and many other reasons. However, there are concerns about loss of control over certain sensitive data. When designed in at the beginning, security of cloud architectures is significantly higher than non-cloud approaches. RISKS IN MILITARY CONTEXT 8. Seven security threats posed by cloud computing had been identified: a. Abuse and nefarious use of Cloud Computing – The ease of the registration process for services over the cloud opens up the cloud environment to abuse by spammers, malicious code authors, and other criminal elements. Solution: strengthen security of the registration process. b. Insecure Application Programming Interfaces – Cloud computing providers expose a set of software interfaces that customers use to manage and interact with cloud services. These interfaces can be hacked by unauthorized users. Solution: beef up authentication and access control to weed out unauthorized users. c. Malicious Insiders – The threat posed by a malicious insider is not unique to cloud computing. However, the threat is amplified by the convergence of IT services and customers under a single cloud. Solution: enforce strict supply chain management security and conduct comprehensive background check of cloud employees. 47 Trinco Dialogue Maritime Symposium 2013 d. Shared Technology Vulnerabilities – Cloud computing providers deliver services by sharing infrastructure. This opens up the entire system to security breaches. Solution: implement a defense-in-depth strategy that includes computer, storage, and network security enforcement and monitoring. e. Data Loss/Leakage – The destruction or loss of data, whether accidental or intentional, poses a grave risk to any network, but the risk increases in the cloud environment due to the number of interactions. Solution: encrypt data in transit and implement strong data backup and retention strategies. f. Account, Service, and Traffic Hijacking – such as phishing, fraud, and exploitation of software vulnerabilities, pose risks to any computer system. If attackers gain access to a cloud environment, they can eavesdrop on cloud users, manipulate data, return false information, and redirect users to illegitimate sites. Solution: use strong authentication techniques and unauthorized activity monitoring. g. Unknown Risk Profile – The benefit of cloud computing, reducing the costs of maintaining computer hardware and software, also creates a risk of losing track of the security ramifications of cloud deployments. Solution: maintain detailed information about who is sharing the cloud infrastructure, as well as network intrusion logs, redirection attempts, and other security logs. APPLICATIONS IN MILITARY 9. The use of Cloud Computing in the military could be to enhance own efficiencies or for cooperation with other players. To name a few, a. Information superiority is a force multiplier and is crucial to mission success. The massively scalable IT available through cloud on demand, deployable rapidly, universal connectivity makes it a real military tool. b. Network Centric Warfare, now is a reality at very cheap recurrent cost. c. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to network centric applications will increase the flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities. (Süleyman, Volkan, İbrahim, & Ahmet, 2012) Developing world military too could harness the Net Centric advantages through Cloud. 48 Trinco Dialogue Maritime Symposium 2013 c. Military has more understanding on the security of information. Private or Hybrid Cloud would provide equal amount of security to all Military Data compared to some information in PCs under the tables without any security. d. Commercial Cloud Computing products with appropriate security layers, encryption could be used for many cheap implementations of HRM, Payroll, communications functions, Email, Sharing books of reference, logistic management and even chatting with loved ones deployed in the battlefield. US military uses cloud to measure regular stress levels of soldiers. e. Situational awareness, Maritime awareness and dissemination of information will be much faster, cheaper and rapidly deployable. A ship would have all the information required through cloud, when deployed to a corner of the world. f. Rapid Deployability and scalability makes cloud a tactical tool in the battle field for Command and Control. g. Traditional Military command-and-control systems have been designed with proprietary protocols and operated within dedicated networks and computers that make it extremely difficult to share information among different organizations. Clouds make it sharable. h. With the increase of both state‐sponsored and independent cyber threats, there is a growing importance of leading a strong and secure presence in cyberspace. Cloud offers new secure solution for this. j. Global financial events are driving a need for continued budgetary constraints in the Military and stricter financial control. Cloud offers a way in which it acquires, operates, and manages its IT in order to realize increased efficiency, effectiveness, and security. CONCLUSIONS 10. It is concluded that military clouds will be indispensible component of the future battlefield. Military clouds have the potential of improving network centric capabilities, increasing situational awareness at the battlefield and facilitating the information superiority. 11. Moving the military IT operations to a cloud computing model will not be easy. But the payoff and direction is clear. 12. After all the strategic importance of IT has diminished in inverse proportion to the use of IT, since it is now so commonplace. (Gourley, 2009) 49 Trinco Dialogue Maritime Symposium 2013 RECOMMENDATIONS 13. The Maritime Security in the Indian Ocean is a joint responsibility with many regional and extra regional players requiring compatibility, security in sharing information, tactics and strategic assets. Therefore Sri Lanka Navy has to be proactive in adopting Cloud Computing for both efficient running her own affairs as well as becoming a partner in maintaining the Global and Regional Maritime Security. 50 Trinco Dialogue Maritime Symposium 2013 EXPLOITATION OF MODERN COMMUNICATION TECHNOLOGY FOR EFFICIENT MANAGEMENT OF DEFENCE COMMUNICATION NETWORK Lt (N) IP Wijesinghe Student Officer of 8th JNSC INTRODUCTION 1. As defence forces transform themselves into lean mean modern fighting machines, communication and networking undoubtedly are going to play a very strategic and tactical role not just in electronic warfare but also in conventional battles and wars. The three wings of the armed forces – the army, navy and air force need to modernize their communications network by adopting several new technologies. The US led wars in Afghanistan and Iraq have amply demonstrated the significance of communication and information technologies in the success of military campaigns. The Defence Communications Strategy aims to maximise the effect of our communications efforts in order to improve understanding and support for Defence and enhance the reputation of the Armed Forces collectively, each Service individually. 2. Communication is of paramount importance for conduct of any operation by armed forces whether it military on non- military in nature. It is a tool that provides the commander the real time information that enables him to take timely and most appropriate decision. There are plenty of examples across the world, over the years in strategic operations, where, countries have failed due to the lack of updated, integrated communication during the conduct of joint operation. 3. Defence communication network by the nature of its requirements needs continuous upgrading of its systems with the dynamic nature of the technology. The proper use of technology and the effective utilization of it will determine advantage in the military scenario. 51 Trinco Dialogue Maritime Symposium 2013 4. Communication plays a vital role in defence theatre. All the successes and losses totally depend on communication. Today, communication has transferred its shape from traditional ways of communication to latest and sophisticated system which provides seamless and secure network for users. Modern technology helps to invent much user friendly but far more advanced communication equipment. AIM 5. The aim of this paper is to discuss the importance of exploitation of modern communication technology for efficient management of defence communication network and suggest recommendations for a robust, seamless and secure defence communication network in Sri Lanka. DEFENCE COMMUNICATION NETWORK 6. The modern Battle-space includes the information space, which has become an overwhelming factor in the conduct of warfare. Nations today face an additional threat from extremist elements (both internal and external) using asymmetric operations of attack. This has increased the need for a more vigorous and operational approach to communications and sharing of information at a national level for long-term strategic effect. Things that are said or done in one place have effects elsewhere. Therefore, the need for effective Defence Communication Network (DCN) is an essential element for a nation to safeguard her territorial integrity. 7. Battle space transparency demands real time flow of information between various agencies and units for command to take timely and most appropriate course of action. Information, simultaneously available from strategic to tactical levels of military operations affect the conduct of military operations to a degree equal to that of emerging weapons technologies. 8. Terror attack in Mumbai on 26 thNovember 2008, is an eye opener to whole world that dictates that there should be a robust command, control and coordination for effective coastal security which can only be achieved through unhindered flow of information between the various stake holders. It is evident that the need for seamless integration and synergy of the three Services to counter threats to the vast national resources, vulnerable points (VPs), and economic zones in the country. Integrated and secure communication networks for smooth tri-Service interaction to encourage a spirit of 'jointmanship' and synergy within the services. The conduct of humanitarian operation in recent past can be highlighted as a good example for emphasize the jointmantship among defence forces. 52 Trinco Dialogue Maritime Symposium 2013 9. In the last one decade, world defence forces have transformed towards the exclusive and effective use of strategic communications to integrate all instruments of national power: diplomatic, information, military and economic. An effective Defence Communication Network (DCN) serves as the key for Command, Control, Communication, Computer, Intelligence, Surveillance and Reconnaissance (C4ISR). C4ISR is the essence of victory in the war, where modern technology plays a vital role. C4ISR in Brief 10. The command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) technologies has become the nerve centre of modern warfighting. This not only as force multipliers for the military platforms into which they are integrated, but also as the means to better link different types of forces (air, sea, land). Moreover, they can connect forces of different nationalities, enabling interoperability and the efficient use of military resources. EXISTING DEFENCE COMMUNICATION NETWORK IN SRI LANKA AND ITS DRAWBACKS 11. Needless to say that even in our case, the communication has become a vital element in any armed forces operations. Although we achieved successes during final stages of the humanitarian operation, still we have failed to develop an effective, integrated and centralized communication network that provide secure and seamless communication between Army, Navy Air Force and Police. Reason for this is, mainly due they conduct their operations according to their own ways, traditions and theories. 12. If we had effective communication network among tri services at the initial stages itself of humanitarian operation, we would have saved many lives at the battlefield. Ex. Moving of EOSS camera with ground troops UAV live streaming of video updates for ground troops to make decisions. Shortcomings of existing DCN 13. A few notable shortcomings of existing DCN are as shown: a. Non availability of common communication channel. b. Available equipment are obsolete and less user friendly. 53 Trinco Dialogue Maritime Symposium 2013 c. Non availability of direct access among tri service at the battlefield and with police during military operations other than war. (MOOTW) d. Due to above fact, it takes lot of time to convey a message for nearby other service troops. e. Even available channels are full of communication traffic all the time. f. Different voice procedures practiced by individuals. g. Individual attitudes. h. Lack of knowledge on the importance of an Integrated Communication Network. j. Non availability of centralized communication network among tri services and police. k. Non compatibility of equipment and communication procedures. EFFECTIVE UTILIZATION OF ELECTROMAGNETIC SPECTRUM (EMS) 14. Military operations are complicated by increasingly complex demands on the electromagnetic spectrum (EMS). All modern forces depend on the EMS. The EMS is a physical medium through which joint forces conduct operations. EMS-dependent devices are used by both civilian and military organizations and individuals for intelligence; communications; position, navigation, and timing; sensing; command and control (C2); attack; ranging; chemical, biological, radiological, and nuclear (CBRN) sensor data collection/transmission; unmanned aircraft systems (UASs); civil infrastructure; data transmission and information storage and processing. The importance of the EMS and its relationship to the operational capabilities is the key focus of joint electromagnetic spectrum management operations (JEMSMO). JEMSMO is a functional area ultimately responsible for coordinating EMS access among multinational partners, throughout the operational environment. 15. The EMS is a physics-based maneuver space essential to control the operational environment during all military operations. Information and data exchange between platforms and capabilities will at some point rely on the EMS for transport. This maneuver space is constrained by both military and civil uses as well as adversary attempts to deny the use of the EMS, creating a congested and contested environment. This constrains freedom of maneuver to use all capabilities of friendly forces throughout the operational environment 54 Trinco Dialogue Maritime Symposium 2013 16. The EMS is a highly regulated and saturated natural resource. The EMS includes the range of all possible frequencies of electromagnetic (EM) radiation. Frequency refers to the number of occurrences of a periodic event over time. For radio frequencies (RFs), this is expressed in cycles per second or Hertz (Hz). Generally, the frequencies between 30 Hz and 300 Gigahertz (GHz) are referred to as the RF spectrum. Illustration of EMS is shown in annexure to this paper. LESSONS FROM OTHER COUNTRIES EFFECTIVE DEFENCE COMMUNICATION NETWORK 17. Most of the developed countries have been managed their military assets and utilize them in an effective manner by adapting to a centralized communication network among all battle units, irrespective of the size. 18. Having a centralized communication network directly helps joint force commander to achieve his objectives. In the context of a broader national strategy and in conjunction with other agencies and organizations as appropriate, will employ the full range of informational and other capabilities available to the force in an integrated and timely way to: a. Identify, segment, study and listen to potential audiences. b. Conceive, produce and coordinate signals through both information and actions designed to affect the perceptions, attitudes, beliefs and thus the behaviors of selected audiences in ways that support the accomplishment of the mission and promote broader national and international interests. c. Monitor measure and assess the effects of these signals. d. Iteratively modify actions and information products based on feedback on the effects of the signals. 19. This concept comprises three objectives: a. To inform operational decision-making in current and future joint operations. While the concept‘s primary aim is to influence force planning, it also provides ideas that could help operational commanders plan and execute joint operations to achieve strategic communication objectives more effectively with current capabilities. 55 Trinco Dialogue Maritime Symposium 2013 b. To provide a common intellectual framework for all subsequent force planning with respect to strategic communication, including: (1) Experimentation into future strategic communication methods and capabilities. (2) Identification and implementation of required institutional changes. (3) Programmatic, budgetary, organizational and other force planning decisions. c. To provide the conceptual basis for performing a capability-based assessment (CBA) within the Joint Capabilities Integration and Development System (JCIDS). The concept will do this by identifying an initial set of required strategic communication capabilities, with associated tasks and measures, and providing the logical basis for these capabilities. EXPLOITATION OF MODERN COMMUNICATION TECHNOLOGY FOR DEFENCE COMMUNICATION NETWORK IN SRI LANKA 20. This is the crossing time for Sri Lanka to adopt for an integrated and centralized defence communication network. This will help armed forces in Sri Lanka in many ways. Not only that, Sri Lanka as an island nation in the Indian Ocean Region (IOR) has immense responsibility in global maritime disaster and safety system (GMDSS) and search and rescue (SAR) operations. By adapting to a centralized communication network, we can achieve: a. Easy access to other services with minimum time delay. b. Effective coordination at tactical and operational level. c. Optimization of manpower and resources. d. Ability to minimize losses and damages. e. Increased economy of effort. f. Facilitate net-centric warfare. 56 Trinco Dialogue Maritime Symposium 2013 g. Commanders decision can be conveyed to each battle group, even to smallest unit wherever they are, without delay. h. Availability of traffic free common communication channels. j. Can achieve a common voice procedure. k. Introducing of modern technology will help to change the attitudes of individuals toward achieve the goal. l. As an effective tool during joint operations, during war and peace. m. Since, Sri Lanka Navy does not have an integral air wing; it has to have assistance from Sri Lanka Air Force during SAR and GMDSS operation. n. Coordination and communication among tri services and police can be a turning point at military operations, other than war (MOOTW) such as counter insurgency operations and aid to civil power during natural devastations. p. Ability to par with other nations by having compatible communication equipment and technology at international arena such as joint exercises. q. Ability to launch integrated procurement system. CONCLUSION 21. The geostrategic position of our country demands an advance communication system based on radio and satellite both to meet military and non-military requirements. This includes GMDSS and SAR operations. Hence, requirement of a sophisticated, expanded and integrated Defence Communication Network is undeniable for an island nation like Sri Lanka. Existing communication network are presently working in isolation, with least exploitation of Electromagnetic spectrum, which is largely and successfully used by the modern communication applications. It is the transition time for Sri Lanka to break the shackles of communication and foreseen way ahead to impart available technology for an effective defence communication network. 57 Trinco Dialogue Maritime Symposium 2013 RECOMMENDATIONS 22. Considering the above factors and need for a robust, seamless and secure communication network for our country, suggested recommendations are: a. Defence communication network should accommodate with a satellite communication system covering the Indian Ocean Region, which facilitate obtaining of real time pictures at any time. b. An integrated communication headquarters, which can coordinate and control all the integral segments of army navy air force police and other concern agencies, which formulate a common ops room for an operation. c. Since navy does not possess an integral air wing and ground deployment, communication systems should be compatible with the army and air force with standardised communication applications in tactical deployments with advanced capabilities in greater bandwidth, so that those can be utilized in joint operations as well as in routine military applications. 23. And final words --- The world is shrinking day by day due to technological advancement in the field of communication which is ever growing. It is the need of hour to be abreast of these developments and incorporate the changes that are needed for better battle space transparency and jointmanship in future operations. Communications is weaved into almost everything that we do in Defence. To be effective we must have a joined up and coherent approach across the organisation, which is based on a common understanding and which will lead us to success in future. 58 Trinco Dialogue Maritime Symposium 2013 INFLUENCE OF MIDDLE EAST CRISIS TO THE INDIAN OCEAN REGION LCdr CRP Walakuluge,BNS Student Officer of 8th JNSC 1. It is quite difficult to disintegrate and alienate a single factor at providing a prelude to understanding the present unfolding of events in the Middle East and per says its impact to other regions of the world. The revolutionary waves of the ‗Arab Spring‘ across Middle East have indeed shaken up the predominantly autocratic Arab states resulting in a new paradigm shift of geopolitics. Meanwhile, tensions lurk in the Strait of Hormuz as Iran expresses signs of a probable blockade in response to provocative sanctions by the United States against its oil exports. Israel‘s aggressive military and political outreach has increased the volatility of the context and a status of brink of war in the region. Adding more severity to the crisis situation is the recent burst of global outrage against U.S and its diplomatic offices, subsequent to a youtube video post- ‗Innocence of Muslims‘. 2. Hence, the present context of politics and power parity in the Middle East is turning the region into an inferno, triggering a global energy crisis in the making. Some sense a fear of a third world or a fourth world war- ‗an Armageddon‘, while others are skeptical of such but non denies the proposition of the world been starved for it uncompromising greed towards energy resources. 3. The qualitative literature research indentifies three vital contexts influencing South Asia: energy security; the Muslim outcry and the U.S Presidential election. The contextual scenarios were weighted against its impact to South Asia. Further, the factors were carried out in filtering the U.S and Arab versions of the two burning scenarios, while providing a more holistic approach in perceiving the challenges and threats towards the South Asian Region. 59 Trinco Dialogue Maritime Symposium 2013 4. Energy security is essential for the South Asian region which has promised a robust economic development centered on the Indian glory. India is the 3 rd largest Iranian oil importer, amounting to a total of an estimated 15-15.5 million crude oil barrels in 2012. South Asia and East Asia comprises over 8 million expatriate workers in the Middle East. Overseas remittance is a major source of income to the South Asian economies and a surge of calamity in the Middle East would directly present serious impediments to the flow of remittance including the security and safe repatriation of the workers. Meanwhile, South Asian Muslim populations have been aggressively participative to the Arab outrage against U.S embassies recently. Interestingly, the Arab Spring hardly had any reciprocity on the Islamic cultural demographics in South Asia until the release of the defamatory documentary video ‗Innocence of Muslims‘. 5. The findings were quite interesting as brought about through the cause effect analysis of the Middle Eastern events, its precursors, and external and inter regional stakeholders and the South Asian nation states. Finally, the study provides a genuine solution for the paradox presented through the Middle East crisis- a deliberate shift of policy and interests towards East. INTRODUCTION Understanding the context 6. Although, Middle East has not been a peaceful place since the WW II the wars that have been fought with one exception (the Iran- Iraq war) are very small. The wars the world experienced in the Middle East were short in duration and casualty rates accounted were low. In contrast Europe has been historically a far more violent place than the Middle East. Hence, the exaggerated version of an apocalypse resulting in a nuclear war is unlikely to spring from Middle East. This may seem like an optimistic presumption but the recent fragility of affairs and recent looming from the European theater suggests that the center of gravity in a future large scale war would indeed be a location in the West. 7. In early 70s‘ 1/2 of the world didn‘t essentially use oil (hydrocarbon fuels). The serious oil consumers were Europe, United States, Canada, Japan and Soviet Russia. But today everybody, every nation state consumes oil. Two thirds of the global oil reserves are in the Middle East, basically in the Persian Gulf and that is ten times than any other resources. At present the region produces a capacity of 50 – 51 million crude oil barrels per day (bb/d). Demand for energy is in the rise in quantum levels, and is expected to sore to 120 million barrels per day by 2030 against the current demand of 80 million barrels per day. Any form of hindrance to the energy supplies from Middle East would ultimately result in a ‗global energy crisis. 60 Trinco Dialogue Maritime Symposium 2013 8. The South Asian region is located between two major maritime choke points: Strait of Hormuz and the Strait of Malacca. The Indian Ocean accounts for the highest tonnage of goods and energy transportation in the world. OBJECTIVE 9. To critically evaluate the Middle East crisis and its significant political, social and economical impact towards the South Asian region. CRITICAL ANALYSIS & DISCUSSION Probable Contextual Impact towards the South Asian Region IMPACT SITUATION CONTEXT Iranian Nuclear PppppppPrograIssue Energy Security Economical & Political Muslim Outrage Arab Spring Social & Political US Presidential Election Election Geo-political Stability Political, Economical & Social Figure 1: Cause-Effect relation between the Middle East issues and South Asia. Iranian Nuclear Program & consequences 10. The sanctions according to United States are designed to persuade Iran to provide access for the IAEA experts to investigate and clarify what is believed as a secret nuclear weapons program. As a consequence of the failure of the latest negotiations over Iran‘s nuclear program, the European Union‘s ban on the importation of Iranian oil took effect on July 1, 2012. 11. Iran derives more than 50 percent of its government revenue from oil exports, which declined from about 2.4 million barrels a day in July 2011 to about 1 million barrels in July 2012. Iran can hardly sell its oil because of the embargo. Even countries that don't feel bound to uphold the sanctions are shying away from deals, because no one wants to insure the oil shipments. 61 Trinco Dialogue Maritime Symposium 2013 The Paradox of Views 12. Iran. The U.S backed European Unions decision to impose sanctions on Iranian oil exportation has provoked the following question: How serious are the Iranians about the proposed sanctions and possible attack over its civilian nuclear program and what actually is Iran‘s strategy in the Strait of Hormuz? Preserving the security in the Strait of Hormuz is a priority of Iran‘s defensive deterrence strategy in the Persian Gulf. Iran‘s policy there will certainly be a measured and rational one, based on taking full responsibility and considering the region‘s geopolitical realities. The Strait of Hormuz is one of the most important transit points for energy shipments in the world, and Iran would not close it unless the country‘s interests are imperiled. Iran perceives the issue of the Strait within the context of global dynamics. Based on this strategy and under the hardest economic conditions, Iran would not close the Strait of Hormuz. 13. United States. Binding the interests of the international community as well as those of regional Arab regimes to the security of the Strait of Hormuz could be a pressure point on the United States and its Western allies. The U.S and its allies perception towards Iran‘s power and prowess has led to an intense degree of hostility, deterrence and pre-emption. Iran and its impact on the Middle Eastern regional balance of power are viewed by the West and Saudi Sheiks as a grave threat. Washington‘s concept of squeezing a country‘s government by interfering with its energy policies has a dolorous history seven decades old. Flashing Fault Lines 14. Blockade of the Strait of Hormuz. The Strait of Hormuz is a narrow water channel separating the Arabian Gulf from the Gulf of Oman and the North Arabian Sea. It is about 40 miles wide, and is 21 miles wide at its narrowest point. The strait is the worlds second busiest international strait. Roughly 40 percent of the world's oil tanker shipments transit the strait daily, carrying 15.5 million barrels of Saudi, Iraqi, Iranian, Kuwaiti, Bahraini, Qatari and United Arab Emirates crude oil. The Strait of Hormuz is asserted as the world‘s most important oil choke point. 15. Economic experts suggest that oil exports in the Strait of Hormuz will reach 30-34 million barrels per day by 2020, in prelude at suggesting that ensuring the free flow of oil through the strait will be a major international concern. The majority of oil exports from this area travel to Asia, United States and Western Europe. 16. Any sort of blockade in the Strait of Hormuz means that oil transporters will have to seek longer alternative routes at increased transportation cost. This would inevitable have graver 62 Trinco Dialogue Maritime Symposium 2013 consequences towards the more dependent and fragile South Asian economies with an exception of India. 17. Israel‟s Preemptive Strikes Towards Iranian Nuclear Facilities. Iran has earlier warned that if either the U.S. or Israel attacks, it will target 32 American bases in the Middle East and close the Strait of Hormuz. This would also unleash the Hezbollah guerillas in Lebanon with a swarm of rocket and possible missile attacks against Israel and selected U.S bases in the Middle East. It would extend the military arc of crisis from Iraq to Afghanistan and inevitably drawing the South Asian region into a quagmire. Al Qaeda, Jihad and many other extremist fundamentalist terrorist organizations would be drawn to respond towards retaliating possible U.S – Israel aggression in the Middle East. Impact & Challenges to the South Asian Region 18. The impact that would recent upon the South Asian region is multipronged in the event of a breach of the afore stated fault lines in the Middle East. Thus, the consequences would have both and economical and political impact on the South Asian region, varying in degree resulting primarily due the geographical distances from the epicenter of a possible crisis. Afghanistan and Pakistan would inevitably be drawn towards the issues as Al Qaeda cells would be activating as recruiting centers for insurgents and terrorists against U.S and its allies in the Middle East. South Asian security concerns would be intensified as it is expected that regional terrorist organizations including LeT would seize the opportunity to cause panic and tension in the Indian mainland. With an exception of Sri Lanka, Maldives and Bhutan the rest of the South Asian region nations would experience a risk of intensifying security levels. 19. The economical impact would be catastrophic and visible as the entire region is heavily dependent on Middle Eastern oil supplies. The situation would result in harsh experiences for Sri Lanka which is predominantly a buyer of Iranian crude oil. The existing economic fragility in Sri Lanka would make it more susceptible for the slightest fluctuation in international crude oil prices. Worst is the situation in concerning that the island nation has only a capacity with effect to its current demand for a mere three days. This would cause a total blackout paving way for political and social unrest in the nation. 20. The economic impact on the region would be similarly felt by all the nations as, South Asia along with East Asia represents over an excess 8 million migration workers in the Middle East. Effect on Remittance flow to South Asia 21. For South Asian countries, remittances are among the largest and most stable sources of foreign exchange and their developmental impact have been remarkable. For example, in Nepal 63 Trinco Dialogue Maritime Symposium 2013 national poverty level has come down from 42% to 31% during 1996 to 2004, and to 21% today, largely on the account of remittances which finance household consumption as well as education and health expenditures. Nepal, Bangladesh, and Sri Lanka, were among the top 15 remittance recipients in 2009—with inflows being equivalent to 24% of the GDP in Nepal, 12% in Bangladesh, 8% in Sri Lanka, 5% in Pakistan and 4% in India. 22. In order to analyze current dynamics and potential future trends, it may be useful to get a sense of the profile of migrant labor in each of these countries. (Listed by remittances as a percentage of GDP): a. Nepal - has an estimated 1 million to 1.5 million workers abroad with more than 80% of them going to Qatar, Saudi Arabia, and U.A.E, most of them employed in lowskilled service jobs including as security guards. b. Bangladesh - has an estimated 6 million workers aboard, close to 4 percent of the population. More than 65% of Bangladesh‘s remittances are from Gulf Countries and over 50% of the departures in 2009 and 2010 were to the U.A.E. Saudi Arabia is the key source of remittance inflows to Bangladesh; but in the last two years, only 2-3 percent of the total departures were to Saudi Arabia due to country‘s ―unofficial" freeze on largescale recruitment of unskilled Bangladeshi workers. Overall, majority of Bangladeshis in the Gulf are employed as unskilled workers, particularly in the construction sector. c. Sri Lanka- 86% of total departures in 2009 were to Gulf Countries with Saudi Arabia being the greatest recipient. Sri Lanka‘s migrant profiles stand out from the rest of South Asia, as the majority of overseas workers are women at 52% in 2009; 46% of total workers went abroad as housemaids. d. Pakistan - Half of Pakistan‘s remittances come from Saudi Arabia and the U.A.E with 64% of remittances coming from Gulf Countries overall. Pakistani workers are predominantly employed in low skilled construction jobs. e. India- is one of the largest recipients of remittances with $53.9 billion received in 2009-2010. The country‘s remittance sources and migrant skill levels tend more quite diverse. Estimates of inflows from Gulf Countries range between 27% (RBI) to 40% (MOIA) of total remittances. „Innocence of Muslims‟ and aftermath Context 23. In the backdrop of the Arab Spring, the release of the trailer ―Innocence of Muslims‖ is beginning to shape the new global security landscape. While social media fostered the Arab Spring, replacing long-established dictatorships, as a purveyor of provocation, it enraged 64 Trinco Dialogue Maritime Symposium 2013 Muslims. The trailer sparked anti-US riots and attacks worldwide taking the lives of Muslims and non-Muslims. 24. On September 11, 2012, a group of heavily armed men taking cover of the protesters attacked the US Consulate in Benghazi, Eastern Libya, killing the US Ambassador J Christopher Stephens and his associates. A female suicide bomber killed 12 including foreigners in Kabul, the capital of Afghanistan on September 18, 2012. The demonstrations and violence continues. 25. Al Qaeda and its associated groups were marginalized during the Arab Spring. The very announcement of the film and the release of the trailer on You-Tube was a great boost of support for the violent and radical groups. Today, both on-line and off-line, they continue to exploit the Muslim suffering, resentment, anger at the release of the trailer. Will the continuing reaction to the trailer negate the potential and promise of stability following the fall of the dictatorships in the Middle East? Will the strategic culture of Asia, where restrain and quite have been practiced for centuries, continue to hold? Cause 26. An Egyptian Sam Bacile, born Coptic Christian, living in the US wrote and produced ―Innocence of Muslims.‖ The 14 minute video clip was uploaded to YouTube in July 2012, under the titles ―The Real Life of Muhammad and Muhammad Movie Trailer. On September 9, 2012, Khaled Abdullah, a TV host on al-Nas, an Egyptian channel aired the video prompting videos dubbed in Arabic uploaded to You-Tube. The demonstrators attacked the US Embassy in Cairo and tore down the US flag, prompting violence in Libya, Yemen, and elsewhere in the Middle East, Africa and spreading to other parts of the world. 27. The anti Islam video claim Islam is a lie and Mohammed was a pedophile. The world witnessed protests in Afghanistan, Pakistan, Bangladesh, Sri Lanka, Maldives, Philippines, Thailand, Indonesia, Malaysia, Japan, and Hong Kong; Kenya, Nigeria, Niger, Somalia, Sudan, Turkey, Algeria Bahrain, Egypt, Libya, Iran, Iraq and Israel, Jordan, Lebanon and Kuwait, Muritenia, Morroco, and Oman, Palestine, Qatar, Saudi Arabia and Syria Tunisia, UAE Azerbaijan, Russia, Serbia, Switzerland, Germany, Belgium, Denmark, France, Greece, Macedonia, Netherlands, Cansada, UK, Although it is too early to conclude, on the face of it, the trainer may have a greater impact on the wider Muslim World than the Arab Spring. 28. Away from the glare of the international media, the vast majority of the billion Muslims worldwide remained peaceful to the trailer ―Innocence of Muslims.‖ A few thousand Muslims protested and a few hundred committed acts of violence but the mass media focused on the violence and radicalism. 65 Trinco Dialogue Maritime Symposium 2013 Asian Response 29. In Asia, where 62% of the Muslims live, the response has been restrained. Asian Muslims live under the shadow of large Buddhist, Hindu, Christian and other communities. Unlike the Middle Eastern Muslims, they value moderation, toleration and coexistence. They knew, it is a film neither produced by the US government nor endorsed by the American people. With the exception of Muslims in Pakistan and Afghanistan, Asian Muslims abstained from violence compared to Middle Eastern Muslims. 30. The Asian reaction to ―Innocence of Muslims‖ and the Arab Spring elicited a mix reaction in Asia. 31. The vast majority of the Muslims preferred restrain and democracy to radicalism and violence. The US was quick to disassociate itself with the film produced by a private individual. Nonetheless, the perception that the US government was behind it or endorsed the film drove thousands of Muslims to despair, anger and rage. This misperception continues. To prevent madness on both sides, the Christian extremists in the US and the Muslim extremists in the Middle East, the West and the rest of the world needs to reflect on the way forward. America‘s First Amendment constitutionally guarantees freedom of expression, including offensive speech. But will the Muslims and the Muslim World respond intelligently and appropriately? 32. The adverse socio impact this issue would have on the multicultural and diverse demographics of the South Asian states cannot be denied as this would be a spring board for many extremist and nationalistic movements. U.S Presidential Elections 33. United States of America may be some 11,000km West from the Middle East yet, its influence in the region is critical. Middle-East and Israel have been the major foreign policy concern of the U.S over the years. The results of the U.S Presidential elections is a vital standpoint that would ultimately change the reflection of world geopolitics. Following the third and final round of the American Presidential debate on 23rd Oct, 2012 the foreign policy roadmaps of both the Republican and Democratic Parties could be summed-up as follows: Republicans stresses that, “America has a responsibility and the privilege of helping defend freedom and promote the principles that make the world more peaceful." Democrats assert that, "America remains the one indispensable nation. And the world needs a strong America." 34. Overall, both the foreign policy statements seem much similar in a neutral point of view. Ironically, it is undeniable that the U.S as a whole does not view in making drastic changes to its 66 Trinco Dialogue Maritime Symposium 2013 foreign outreach in the Middle East, though there are positive gestures for negotiations to be taken on with Iran. CONCLUSION 35. The revolutionary waves of the ‗Arab Spring‘ across Middle East have indeed shaken up the predominantly autocratic Arab states resulting in a new paradigm shift of geopolitics. Meanwhile, tensions lurk in the Strait of Hormuz as Iran expresses signs of a probable blockade in response to provocative sanctions by the United States against its oil exports. Israel‘s aggressive military and political outreach has increased the volatility of the context and a status of brink of war in the region. 36. Hence, the present context of politics and power parity in the Middle East is turning the region into an inferno, triggering a global energy crisis in the making. The Asian reaction to ―Innocence of Muslims‖ and the Arab Spring elicited a mix reaction in Asia. 37. Meanwhile, South Asian countries, remittances from workers in the Middle East are among the largest and most stable sources of foreign exchange in their developmental and thus any sort of surge of violence in the region would indeed have after shock effects in South Asia. Amidst, these serious developments Sri Lanka is facing multifaceted challenges in sustaining much needed crude oil imports for its redeeming economy and maintaining diplomatic relations with Iran. 38. Though, Sri Lanka has responded to the U.S - Europe urge in reducing oil imports from Iran (from 13% t0 10%), its energy security is still in doldrums in an escalation of war or high intensity in the Middle East. The situation would in quick secessions turn from bad to worse as opposition political parties are likely to cease the opportunity leading to a social and political unrest in the country. Hence, Sri Lanka should seek alternative energy supply routes as possibilities lies in East Asia. Time has come for the island state to reinstate an Eastward base foreign policy. 67 Trinco Dialogue Maritime Symposium 2013 CYBER TERRORISM AND ITS IMPLICATIONS TO LOW INTENSITY OPERATIONS GIVING SPECIAL EMPHASIS TO MARITIME DOMAIN Commander (S) ABRA De Silva, RSP, psc, MDS A/CS(SPDC) ―Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.‖ - Shamsuddin Abdul JalilINTRODUCTION 1. The growing computer technology and their associated networks are propelling the worked into the information age. Computers may up rise terrorism in the same manner that they have turn everyday life. 2. Terrorism in the information age will consist of conventional terrorism, in which classic weapons (explosives, guns, etc.) will be used to destroy property and kill victims in the physical world. techno-terrorism, in which classic weapons will be used to destroy infrastructure targets and cause a disruption in cyberspace; and cyber-terrorism, where new weapons (malicious software, electromagnetic and microwave weapons) will operate to destroy data in cyberspace to cause a disruption in the physical world. 3. Cyber attacks can originate from terrorists, governments, their proxies, and common hackers. Computers and computer software are increasingly utilized to attack targets with computer viruses, malware, and other programs or to overload or deface websites. This theatre includes both an offensive and defensive aspect. 4. There have been a multitude of offensive efforts to hack into various state systems, utilities or banks, to affect disruptions in operations, send political messages, or obtain sensitive 68 Trinco Dialogue Maritime Symposium 2013 information. Additionally, individuals and commercial enterprises have been hit by hackers as have electric utilities. AIM 5. The aim of this paper is to analyse the threat of cyber terrorism and its implications to low intensity operations giving special emphasis to maritime domain. Categories of Potential Information Age Terrorism 6. This paper identifies three categories of potential information age terrorism: conventional terrorism, techno-terrorism, and cyber-terrorism. Conventional terrorism destroys or threatens a symbolic target of violence in the physical world. Conventional terrorists may use information warfare tactics to plan and execute these actions more effectively. Techno-terrorism is designed to have an effect in cyberspace using physical means; this type of terrorism includes bombing infrastructure targets (power, telecommunications, etc.) to create a disruption in cyberspace. Techno-terrorists do not utilize physical destruction, such as bombing a power station, to convey a message. Rather, they rely on the attendant cyberspace disruption to garner publicity for his cause. Cyber-terrorism is terrorism that operates exclusively in cyberspace. The cyber-terrorist could utilize an entirely new class of weaponry, possibly including malicious software or electromagnetic pulse generators, to manipulate or destroy information in cyberspace. Because cyber-terrorists do not operate using ―conventional" techniques, the lessons learned from previous counter and anti-terrorism efforts might be of limited value. What is Cyber Terrorism? 7. Cyber-terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. 8. Cyber terrorism can be defined as electronic attacks from cyberspace from both the internal and external networks, particularly from the Internet that emanate from various terrorist sources with different set of motivations and are directed at a particular target. The cyber terrorists generally perceive their targets to be either high-profile components of a nation‘s critical infrastructures or business operations. The main objective of these terrorists is to inflict damage which will either compromise or destruct targets in order to cause major physical and psychological impacts to them. 69 Trinco Dialogue Maritime Symposium 2013 Cyberspace 9. Cyberspace is a term coined to capture the essence of "where" computers work. While the physical components of computers and their networks are necessary for cyberspace to exist, it is more than merely the sum of these parts. Winn Schwartau defines cyberspace as follows: ‖Cyberspace is that intangible place between computers where information momentarily exists on its route from one end of the global network to the other. When little Ashley calls Grandmother, they are speaking in Cyberspace, the place between the phones. Cyberspace is the ethereal reality, an infinity of electrons speeding down copper or glass fibers at the speed of light from one point to another. Cyberspace includes the air waves vibrating with cellular, microwave and satellite communications. According to John Perry Barlow, cofounder of Electronic Frontier Foundation, Cyberspace is where all of our money is, except for the cash in our pocket." 10. The Defence Information Systems Agency, a branch of the Department of Defence charged with conducting defensive information warfare defines cyberspace as: ―The electronic environment formed by the aggregate of global computing and telecommunications resources. Cyberspace is a virtual 5th dimension characterized by: no geographic, national, or temporal boundaries, no ownership, laws, or identity cards. ‖ 11. Cyberspace does not have a physical reality. One cannot physically "enter" cyberspace. It consists of the "virtual world" through which all electronic transactions take place. It is in this realm that the cyber -terrorist will operate. Weapons of the Cyber-terrorist 12. The weapons of the cyber-terrorist are not designed to kill people or break physical objects. Rather, they exist exclusively to destroy or modify computer data. The weapons and the targets are the electrons moving within cyberspace. While it is possible to attack this data without any human interfaces, the human is usually the weakest link in a computer system. Some of the mode of operandi is as follows a. Pest Programs. (1) Trojan horse attacks- implanting malicious code, sending letter bombs. (2) Logic bombs-setting time or event bombs. (3) Malevolent worms- denying access to distributed resources. (4) Virus Attacks- attaching code to programs and replicating it. b. Bypasses. (1) Back door attacks- using existing flaws in software for exploitation. (2) Authorization attacks- password cracking, hacking control files. (3) Active Misuse. 70 Trinco Dialogue Maritime Symposium 2013 (4) (5) (6) c. Creating, modifying, denying service, entering false or misleading data Incremental attacks- using salami tactics. Denials of service- launching saturation attacks. Passive Misuse. (1) Browsing- reading and copying with apparent authorization (2) Interference, aggregation- exploiting database searches, traffic analysis Indirect misuse- preparing for subsequent misuses, off-line pre- encryptive matching, factoring numbers to obtain crypto keys, auto-dialer and voice-mail scanning. 13. To achieve these results, the cyber-terrorist cannot use the weapons commonly employed in conventional terrorism. While a conventional terrorist finds a fertilizer bomb effective in blowing up a building or other symbolic target, a techno-terrorist will find the same bomb useful in destroying a critical node in a network to cause disruption. 14. Several cyber-terrorist weapons can have an impact on the networks of today and tomorrow: a. Viruses. One of the most heralded weapons of a cyber-terrorist or a hacker is the computers virus. Computer viruses are programs designed to perform actions not intended by the operator. These actions include erasing or modifying the data in a computer's memory or storage with or without malicious intent. b. Trojan Horses. The second type of weapon is a Trojan horse. True to its name, it is a program that does not appear to be destructive but releases a second program to perform a task unintended by the system operator. A Trojan horse can be used to install a password "sniffer" program that collects the passwords of valid users and stores them for later use by an intruder posing as a legitimate user. c. Worms. Worms are programs originally developed to travel through systems and perform mundane tasks, such as data collection or ensure of old data. While they can be useful, if mis-programmed or programmed with malicious intent, they can be extraordinarily destructive. A virus attaches itself to a host program, but a worm is designed to spread across a computer network independently. d. Humans. Computer operators are the vehicles by which viruses, Trojan horses, and worms are initially programmed and then inserted into computer systems. In addition to utilizing software attacks on a computer system, a cyber-terrorist or hacker can attack a computer system through the vulnerability of its operators. 71 Trinco Dialogue Maritime Symposium 2013 e. Electro-Magnetic Pulse Weapons. While not nearly as widespread as viruses, there exists a class of weapons that destroy computers and electronics through an electromagnetic pulse. The capability now exists to generate an instantaneous electromagnetic pulse that will overload and destroy the sensitive circuitry in advanced electronics and computer systems without the previously required detonation of nuclear weapons in the upper atmosphere. Types of Cyber Terrorism Attack 15. There are various types of cyber terrorism attack that are deployed by cyber-terrorists. According to the Center for the Study of Terrorism and Irregular Warfare at the Naval Postgraduate School in Monterey, California, cyber-terrorism capabilities can be group into three main categories; ―simple unstructured, ―advance-structured‖ and ―complex-coordinated‖ . a. Simple-Unstructured. The capability to conduct basic hacks against individual systems using tools created by other people. This type of organization possesses little target analysis and command and control skills as well as limited learning capability. b. Advanced-Structured. The capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking tools. The organization possesses an elementary target analysis and command and control skills as well as relatively modest learning capability. c. Complex-Coordinated. The capability for coordinated attacks capable of causing mass-disruptions against integrated and heterogeneous defenses. The terrorists have the ability to create sophisticated hacking tools. They are also highly capable of conducting target analysis and command and control. They also possess advanced organization learning capability. There are five main types of cyber terrorism attack which are incursion, destruction , disinformation, denial of service and defacement of web sites. Some of these attacks are more severe than the others and have different objectives. Itis important for us to recognize the various methods of attack in order to gain a better understanding on how they can be countered effectively. d. Incursion. These type of attacks are carried out with the purposed of gaining access or penetrating into computer systems and networks to get or modify information. This method is very common and widely used with a high success rate. There are many loop holes existing in insecure computer systems and networks and terrorists can take advantage to obtain and/or modify vital information which can be used to inflict further damages to the organization or for personal gain. 72 Trinco Dialogue Maritime Symposium 2013 e. Destruction. This method of attack is used to intrude into computer systems and networks with the main purpose of inflicting severe damage or destroying them . The consequences of such an attack can be disastrous, whereby organizations might be forced to be out of operations for an undetermined time, depending on the severity of the attacks. It can prove to be very costly for the affected organizations to get their operations up and running again and thus it will impact them hard financially and also damage their reputation. f. Disinformation. This method is used to spread rumors or information that can have severe impact to a particular target. Regardless of whether the rumors are true or not, the use of such attacks recklessly can create uncontrollable chaos to the nation or the organization. This type of attack is quite difficult to contain since it can be done almost instantly without the need to access the victims computer and network systems. g. Denial of Service. Denial of Service attacks or DOS attacks as they are more widely known are also a common method of attack. The impact of such attacks is felt the most by ecommerce enabled business that sells products or services online. Public websites are also sometimes the target of this type of attack by cyber terrorists. The main objective of DOS attacks is to disable or disrupt the online operations by flooding the targeted servers with huge number of packets (requests) which would ultimately lead to the servers being unable to handle normal service requests from legitimate users. The impact from such attacks can be disastrous from both an economic and social perspective where it can cause organizations to suffer from massive losses. h. Defacement of web sites. This type of attack is targeted to deface the websites of the victims. The websites can either be changed totally to include messages from the cyber terrorists for propaganda or publicity purposes which might cause them to be taken down or to re-direct the users to other websites which may contain similar messages. The number of cases of such attacks has dwindled in the past few years thanks to a greater awareness on the issue. However, a small number of such cases is still happening and thus proper security measures will need to be taken to try to avoid such embarrassing and financially disastrous situations from happening again. What is Techno –Terrorism? 16. Techno-terrorism is the intermediate step between "conventional" terrorism and "cyberterrorism." The techno-terrorist understands the importance of high technology networks and C2 systems to a "third wave" state. Unlike the cyber-terrorist, the techno-terrorist will target and attack those systems that exist in the physical world to disrupt cyberspace. Thus, the computer itself (hardware rather than software) is the target of the techno-terrorist. The techno-terrorist 73 Trinco Dialogue Maritime Symposium 2013 will use "conventional" weapons such as bombs and physical destruction to destroy or disable those systems that control cyberspace. Shift Towards Information Warfare Across the Conflict Spectrum 17. Information warfare tactics are being employed across the spectrum of conflict. The increasing importance of computers and their attendant networks make them primary targets for both state sponsored espionage and crime. Terrorists have recognized the value of energy distribution networks and some computer installations. At the level of insurgency and rebellion, information warfare tactics have been used to subvert state controls of the media and for communications between the rebel leadership and their worldwide support base. The Threat From Hackers Turned Terrorist: Is it real? 18. Penetration of computer systems is not difficult. Ex;The U.S. Defence Information Systems Agency undertook a penetration study of Department of Defence computers. In 1994, the agency attacked 8,932 servers and mainframes. They were able to gain access to 7,860 (88%) of these systems. Only 319 (4%) of these attacks were detected and only 19 (.2%) of the successful attacks were ever reported. 19. The jump from hacker to terrorist is a small one that depends entirely on the hacker's motivation and intent. While these cases prove that hackers can penetrate systems, it does not examine the motivation for the hacker. Several studies of the group dynamics and individual motivations for terrorists have been undertaken to help prevent terrorism. While similar studies on the "computer underground" have been undertaken, an analysis of how a terrorist organization might recruit a hacker would be worthwhile. As the world becomes more dependent on computers, understanding what makes hackers "tick" becomes as important as understanding what motivates terrorists. 20. Low Intensity Conflict. (LIC) is the use of military forces applied selectively and with restraint to enforce compliance with the policies or objectives of the political body controlling the military force. The term can be used to describe conflicts where at least one or both of the opposing parties operate along such lines. Low-Intensity Operations is a military term for the deployment and use of troops and/or assets in situations other than war. Generally these operations are against non-state actors and are given terms like counter insurgency, antisubversion, and peacekeeping. 21. Intelligence gathering is essential to an efficient basis of Low Intensity Conflict operations. Electronic and signal gathering intelligence, ELINT and SIGINT, proves largely 74 Trinco Dialogue Maritime Symposium 2013 ineffective against low intensity opponents. Low Intensity Conflict generally requires more hands-on HUMINT methods of information retrieval and to use same on the field of cyberspace. 22. Maritime Capability of LTTE. The LTTE‘ had established a naval combat unit known as the ‗Sea Tigers‘, the LTTE was the only terrorist organisation which exisis in the world that maintains a shipping network connecting the countries from east to west for the purpose of both commercial and military interest. 23. Cyber Terror Capabilities of LTTE. The Patterns of Global Terrorism Report 1997 identified the LTTE as being responsible for the first known attack by a ―terrorist group‖ on a target country‘s computer system, when in August 1997 a group calling itself ―Internet Black Tigers‖ claimed responsibility for ―suicide e-mail bombings‖ aimed at disrupting the electronic information network/communications systems used by Sri Lanka‘s Missions abroad. This brazen act of ‗information warfare‘ paralysed the communication systems of most of Sri Lanka‘s overseas missions. At the time the US said the incident ―did cause us to sit up and take notice‖ because it was the first of its kind involving a group branded as a terrorist organization by Washington, and was a possible ―portent of worse things to come‖. 24. Further, R.E. Kendall, Secretary General of the Interpol addressing the 14th symposium on International Terrorism held in Colombo in September 1999, revealed that the LTTE was among the major terrorist organizations which have websites used not only for propaganda, communications and recruitment, but also for fund raising. 25. Links to Other Terrorist Groups. The LTTE leader‘s instructions was to its offices overseas in 2003 included the need to establish and develop relationships with ―other liberation movements‖ which is suggestive of its continuing desire to maintain linkages with these groups. There is also published research, which highlights such linkages with other terrorist organizations such as United Liberation Front of Assam ( ULFA ), the Afghan Mujahidin, the Kurdish Workers Party (PKK), Abu Sayaf, Moro National Liberation Front (MNLF) and possibly to the Al-Qaeda. There is also the element of the LTTE contributing to copy-cat terrorism through its suicide bomb technology, acts of maritime terrorism, and nascent air strike capability: a. Most of the LTTE senior leaders have received specialised training in countries like Lebanon, Libya in the late 80s and since then the LTTE maintains close contacts with groups that have similar interests. b. It has been suggested that the LTTE established linkages with the Mujahidin in Afghanistan as far back as 1987, and in 2001 an LTTE delegation travelled to abul shortly before 9/11. 75 Trinco Dialogue Maritime Symposium 2013 c. However the LTTE was cautious in maintaining contacts with these militants following 9/11 attacks for obvious reasons. d. India's National Security Adviser M K Narayanan in a speech at th 42nd unich Conference on Security Policy on 11 February, 2007 has said that both Jihadi movements and the LTTE were relying heavily on funds from trafficking in narcotics. e The London based International Institute for Strategic Studies in its ublication ‗Military Balance 2007‘ goes further and refers to commercial links between the TTE and the Al-Qaeda. 26. These actions have rightfully alarmed the intelligence communities across the world, because given its global outcome through the network of offices, operatives and vessels, the possibility that the LTTE could offer its services as mercenaries to other groups, should not be discounted. ASSESSMENT OF TERRORIST THREAT IN MARITIME DOMAIN Terrorist Threat Matrix 27. In context of asymmetric threat, threat matrix evolves around, intention, capabilities of the adversary and the opportunities available to the groups who carry out attack. The threat matrix can be visualized from the following diagram of threat Matrix: Capability Intention Ideological disposition Past Activities Human Material Opportunity Vulnerability of the targer Security environment Composition of the support Fig 2 : The Terrorist Threat Matrix 76 Trinco Dialogue Maritime Symposium 2013 Terrorist Attack Characteristics 28. Terrorist groups may choose any object as target beneficial in pursuit of their goal. Therefore, it is particularly difficult to formulate attack characteristics of any terrorist group. US congressional Research service (CRS) expressed a generic guideline of terrorist attack characteristics in its report to US Congress on 9 January 2007. The maritime attack characteristics are tabulated in table 1: Dimensions Perpetrators Objectives Locations Targets Tactics Example Characteristics * AI Qaeda and affiliates * Islamic unaffiliated * Foreign nationalists * Disgruntled employees * Other * Mass casualties * Port disruption * Trade disruption * Environmental damage * ports * Foreing trade partners * Key shipping bottlenecks * * * * Military vessel Cargo vessel Fuel tankers Ferries / Cruise ships * * * * Port area populations Ship cannels Port industrial plants Offshore platform * * * * Explosive in sucide boats Explosive in light aircraft Ramming with vessels Ship-launched missiles * * * * * Underwater swimmers Unmanned submarine bombs Exploding fuel tankers Explosives in cargo ships WMDs in cargo shis 77 Trinco Dialogue Maritime Symposium 2013 Strategies to Deal with Cyber Terrorism Threats 29. In order to counter the ill effects of cyber terrorism, strategic plans should be put in place to ensure the well being of the nation and its citizens. In the followingyparagraphs, the steps that can be taken by the parties involved to deal with the threats of cyber terrorism effectively will be discussed. Pursue and Prosecute the Perpetrators 30. The parties that have been directly affected from attacks by cyber terrorists should be more aggressive in pursuing the perpetrators . Even though this exercise might prove to be costly, it will definitely be to the organization‘s advantage if they are able to identify the perpetrators and prosecute them to the full extent of the law. If there is an increasing number of such attackers that can be brought to justice, it might change the general mindset of the cyber terrorist community and they will need to think long and hard of the consequences of their actions if they are going to get caught. Thus it might prove to be a good way of decreasing the number of such attacks in the long run. Develop Best Security Practices 31. Organizations should ensure that they develop and deploy a tested set of best security practices suited specifically for their own operations. These activities will require a lot of coordinated efforts from all parties in the organization because security procedures should be followed by every department. The developed list of the best security practices should cover all the aspects involved in information security. As a starting point, it would be a good idea to adopt existing international standard guidelines for information security such as ISO17799 or BS7799. These standards provide the detailed steps that should be taken to secure oganizations from an information security standpoint. The organizations can later modify or improve on the provided guidelines and adapt it based on their own operations and needs in order to obtain the best results. Be Proactive. 32. Organizations and the general public should be more proactive in dealing with cyber terrorism issues by keeping up to date on the latest information related to threats, lnerabilities and incidents and they should be more committed in improving their information security posture. By being constantly aware of the various components of cyber terrorism that could directly affect us, we would be able to be implement stronger security measures that would reduce the chances of cyber attacks from happening to us. Organizations should always be looking to improve upon their existing security infrastructure. Organizations should deploy 78 Trinco Dialogue Maritime Symposium 2013 multi-level security architecture instead of the single-tier ones in order to protect themselves better. Critical activities such as security audits should be performed more often to reduce redundancies in the security implementation . It should be remembered that security is a continuous process, not an off the shelf solution. Thus, in my opinion the best way to handle security is to be proactive about it . Deploy Vital Security Applications. 33. The use of security applications such as firewalls, Intrusion Detection Systems (IDS), anti-virus software and others should be encouraged and in some cases, mandated to ensure better protection against cyber terrorism. Organizations should deploy both network and hostbased IDS along with other security applications . There should be personnel who are assigned to record, monitor and report all suspicious activities in the organization‘s network and with the aid of the latest security systems, all these tasks can be done much faster and simpler. The prevention and retention of critical information required for forensic analysis should be ensured in order to facilitate further investigations. Establish Business Continuity and Disaster Recovery Plans. 34. It is important that business continuity and disaster recovery plans should be in place in all organizations. These plans, to be included with incident response activities if not in existence, should be established and maintained. These plans should be rehearsed and tested at regular intervals to ensure their effectiveness. The plans that are implemented should involve two main activities which are repair and restoration . The repair activity should fix the problem in order for the function to operate normally. The restoration plans should be activated with pre-specified arrangements with hardware, software and service vendors, emergency services, public utilities and others. Cooperation with Various Firms and Working Groups. 35. Organizations as well as the general public should establish working relationships or arrangements with public and private bodies that could assist with various issues related to cyber terrorism. These working groups can assist tremendously in activities such as developing standard guidelines on improving organizational security, developing disaster recovery plans, discuss on the emerging and rising issues in cyber terrorism and others. Thus by exchanging information on such issues on a regular basis, it would create a pool of much needed experts in the field of cyber terrorism in order to increase resistance in general from such attacks. 79 Trinco Dialogue Maritime Symposium 2013 Increase Security Awareness. 36. It is important to increase the awareness on cyber terrorism issues to the masses. By educating them, they would realize the importance of defending themselves from such attacks and thus it would assist in developing communities that are more proactive in dealing with information security issues. Security ftraining programs can assist people to equip themselves with the right skills and knowledge that are needed to protect their computer and networks systems effectively. Stricter Cyber Laws. 37. The government can assist in controlling cyber terrorism attacks by adopting and revising new cyber laws that will punish the perpetrators more heavily if they are involved in such activities. New acts to encourage the development of efficient cyber security practices and to support the development and permit the use of more effective tools for law enforcement should be introduced. Encourage Research And Development. 38. Organizations especially from the public sector should support research and development activities of personalized security tools such as firewalls and IDS. The main advantage of pursuing this approach rather than buying off the shelf product is that it will leave the perpetrators in the dark over the actual capabilities that the targets possess, and this can be a huge advantage when dealing with such knowledgeable and experienced attackers. 39. ISPS CODE ( International Ship And Port Security Code ) a. Ship Identification number to be permanently marked on vessel‘s hulls b. Continuous Synopsis Record (CSR) kept onboard showing vessel history c. Ship or port Facility Security Assessment (SSA or PFSA ) ship or port Facility security plan (SSP or PFSP) d. Ship or port Facility security Certificate (SSC or PFSC ) e. Ship or port Facility security Officer (SSO or PFSO) f. Company security Officer g. Continuous ship to port security communication link h. Training and drills 80 Trinco Dialogue Maritime Symposium 2013 CONCLUSION 40. Even though the field of cyber terrorism is relatively new to most of us, it has proved to be a very challenging one. So far, significant progress has been made through industry and government initiatives in many countries to protect against cyber attacks. It is widely accepted and well known by everyone that security is not a one-stop solution. Instead it is a continuous journey that requires everyone involved to be committed to it. The many aspects connected to cyber terrorism such as understanding the different motivations and types of attack, realizing its effects on critical infrastructures, businesses and humans, as well as undertaking the sometimes complex steps to decrease the chances of such attacks from happening makes the task of protecting against it such an enviable one. However, the implementation of strategic security measures and improved working relationships among the various bodies including the industry, the government and the general public provide all of us a strong hope of winning this battle. The fact of the matter is, cyber terrorism is here to stay and we still have a long way to go in protecting the nation‘s, businesses‘ and our interests effectively against it. The good news though, with the various strategic plans in place, we are getting closer to achieving our main objective which is to have a highly secure and productive working environment. 81 Trinco Dialogue Maritime Symposium 2013