China’s Air Defence Identification Zone: At Variance with the Principle of Adherence

This article was first published on the Institute for Peace and Conflict Studies website in December 2013.

By

Vice Admiral (Retd.) Shankar

Keywords: Air Defense Identification Zone (ADIZ), East China Sea, Exclusive Economic Zones (EEZ), Rise of Chinese Hegemony, “Line of Actual Control”

An Air Defense Identification Zone (ADIZ) is space over land or water within which identification, location, and routing of aircrafts are controlled. It is enforced by a state in the interest of security and safety. While ADIZs usually extend into what is universally acknowledged to be international airspace, even by the countries that maintain them, they in no way confer sovereignty. Its extent is determined by the reaction time to respond to foreign and possibly hostile aircrafts. The authority to establish an ADIZ is not given by any international treaty nor prohibited by international law and is not regulated by any international body. The first ADIZ was established by the United States soon after World War II. As surveillance technologies improved, the scramble for security reached a frenzied peak during the early stages of the Cold War when the fear of a sneak nuclear airborne first strike was a strategic fixation amongst protagonists. The extent of paranoia is exemplified by the American ADIZ off Southern California that stretches more than 400 nautical miles out to sea. Air defence zones should not be confused with information structures which are used to manage air traffic worldwide.

Several countries currently maintain ADIZs including Norway, Britain, USA, Canada, Japan, Pakistan, India, South Korea, Taiwan and China. Three conventional criteria preside over such zones, these are: the Zone cover undisputed territory, Zones do not apply to foreign aircraft not intending to enter territorial airspace, Zones do not overlap. Since states have the right to regulate air traffic only over their land, countries are not legally obliged to comply with another States ADIZ requirements in international airspace, but commercial traffic tend to do so because of the promise of security and safety.

So, on 23 November 2013, why did China establish its East China Sea ADIZ? Despite the knowledge that the central three criteria were breached, it covered the disputed Islands of Senkaku/Diaoyu; the Zone solicited information even if the foreign aircraft had no intentions of entering China’s territorial air space; and intriguingly, the new Zone intruded and overlapped the Japanese and Korean ADIZs. It also, cannot be coincidental that the inexact vesica piscis formed by the intersection of the Japan and China ADIZ along with the intersection of their disputed  Exclusive Economic Zones (EEZ) are centred on the Chunxiao gas fields (originally disputed but since 2008 overseen by a shaky joint development programme).

This discourse considers the three reasons that China’s establishment have fielded in vindication of their East China Sea ADIZ. First, the Surprise Attack Anxiety.  Surprise may be an essential feature of the “Principles of War”, and theoretical savvy suggest that the danger of a surprise attack is highest when one party to a conflict considers war inevitable and thinks that getting in the first blow would deliver a decisive military advantage; but, the reality is entirely in variance. For State initiated offensive military acts and follow up actions cannot today be masked, primarily because contemporary surveillance systems are designed to effectively discriminate hostile preparations and intrusions. Such technical measures are well known to China and appropriate devices are in place. ADIZs on the other hand are founded on the assumption of adherence and therefore in a state of war or military hostilities, it is inconceivable that one of the antagonists is going to adhere to the niceties of safety obligations. Tensions are undoubtedly high in the East China Sea region at the moment, but this is not Cold War. No country wants to target the heart of the global economy. The surprise attack formulation as articulated by China’s defence ministry is therefore on thin ice and has left China’s ADIZ more a question mark as to what their strategic intent is.

Second, the rationale that it is illicit trafficking of man, material and narcotics that is the object of the Zone is ludicrous since the region is neither a significant drug route nor is it a cognizable unlawful human trafficking corridor. Also the presence of multiple and overlapping maritime disputes and claims in area contributes to a surfeit of  zealous policing agencies which makes the trafficking theory implausible.

Third, the suggestion that the Zone was motivated by a desire to reduce the risk of midair collisions is hardly tenable since the most acute peril that airmen face is when there is duality of control without clear and unambiguous responsibility and power to regulate traffic. The underlying problem is not commercial air traffic, which is already under efficient regulation in the East China Sea, but the movement of military flights which have no obligation to abdicate control to the Zonal controller whilst in international airspace. Proclaiming the ADIZ and declaring the right to “emergency defensive measures”, it has put pressure on China to intercept foreign military flights increasing the risk of accidents. The move up an escalatory ladder jumped a few rungs when military aircraft from the US, Japan and South Korea challenged the ADIZ.

It is evident that China’s ADIZ neither qualifies the 3- conventional criteria test nor does their logic have any prospect of acceptance. It has, however roused a dangerous dilemma for there now exists a real possibility that a commercial plane in the area could receive conflicting instructions and face hazardous consequences. The Zone has also lowered the threshold for armed incidents. Which brings us back to our original question of why the Zone? History has repeatedly shown that the rise of a new hegemon is marked by resistance to the status-quo. China’s ADIZ in the East China Sea must be seen as a manifestation of its growing assertiveness. From the Indian perspective, planners must be prepared to confront similar proclamations over the Line of Actual Control particularly in the Arunachal sector. The riposte lies in defying any such unilateral decree.

Tactical Nuclear Weapons: A Step Closer to the Abyss

by

Vice Admiral (retd.) Vijay Shankar

This article was first published by the Institute for Peace and Conflict StudiesNew Delhi, On November 30th, 2013.

Keywords: Tactical Nuclear Weapons, South Asian Nuclear Doctrine, NATO Paradigm, Nasr, India-Pakistan LoC

The Futility of Tactical Nuclear Weapons

        In March 2013 a workshop was conducted under the aegis of the Naval Post Graduate School in Monterey, CA. It sought to examine the escalation dynamics in a South Asian crisis under a nuclear overhang. A scrutiny of the scenario suggested that a vertical escalatory spiral was central to the paradigm and therefore, intrinsic to its anatomy was an inexorable traction to extremes. First blood had been drawn by a  Pakistan State sponsored terror attack, it targeted leadership at a very large public gathering leading to extensive casualties; in most strategic lexicons this is an act of war. The demands of the Indian side, unfortunately, were given short shrift. Had some movement been made towards apprehending and handing over the terrorists, the situation could have been defused.

        Accordingly, a swift punitive military thrust was launched by Indian forces across the LoC and a Maritime Exclusion Zone was decreed. Forces primarily used were the less intrusive Air and Sea arms. This in turn escalated to action that was not restricted to the LoC. The introduction of tactical nuclear weapons (TNWs) into the battle area attained inevitability. To Indian Leadership the question posed was how would offensive Indian forces respond? In the event a deliberate decision was made to search out and strike the nuclear tipped Nasr batteries as with other tactical artillery pieces without discrimination; and should a nuclear Nasr launch occur on Indian Forces it would be regarded as a First Strike and India would reserve the right to launch massive retaliatory strikes to the dictates of her Nuclear Doctrine. The adversary balked from deploying TNWs.

What is it all about? The Essence of Stability

      Marshall Ferdinand Foch, one of the lesser of the meat grinding generals of the First World War when faced with the bewildering nature of the larger strategic situation is said to have countered with a fundamental question, De quoi s’agit-il?  – What is it all about? Indeed this poser if understood and answered in the context of nuclear stability would bring us to the complexities that face nations with the coming of a weapon that can obliterate the very purpose of warfare; in the circumstance the separation of the conventional from the nuclear is a logical severance. A major divergence from the Two-Bloc-Nuclear-Face-Off of the past is nuclear multilateralism. In this altered plurality the true enemy is the dynamic that rocks the equilibrium.

       The essence of stability is to find agreement on three foundational truths. Firstly, technology, while it provides for modernization it invites covertness whereas its impact demands transparency. Secondly, that the army in Pakistan is the real power centre, and therefore for India to engage an enfeebled civilian leadership is self defeating. Thirdly, TNWs make for a dangerously unconvincing deterrent correlation.

         Why would a nation turn its back on the prudence of the past six decades and deliberately reduce the nuclear threshold through the introduction of TNWs and in a situation of mortal internal collapse, invite the increasing probability of the breakdown of nuclear deterrence? After all it was the Pak foreign Minister Mr. Aga Shahi in dialogue with the American Secretary of State in 1979 who suggested that the “value of nuclear weapons lies in its possession and not in its use”. TNWs are marked by several features that prop up the illusion of control and the misguided belief that the adversary would, for some reason, abjure the opportunity to escalate response. Its deployment will attract pre emptive suppressive action and doctrine for employment follows conventional field axioms with the risk of accidental, unauthorized or mistaken use.  It therefore promotes only one cause and that is the Pakistani military establishment’s hold on that hapless state. Recognizing the politics of the South Asian region and the emasculated nature of civilian leadership in Pakistan; the dangers of adding nuclear violence to military perfidy, as recent proliferatory history and Jihadist terror acts have shown, is more than just a reality.

The NATO Paradigm

      Pakistan in defense of TNWs often cites the NATO analogy. However, by the 1980s NATO was doctrinally imbued with the idea of the irrelevance of nuclear weapons against less than existential threats. With this conviction, both Britain and France perceived the use of nuclear weapons (of any yield) as a failure of deterrence and therefore not a realistic alternative to conventional forces. Employment of TNWs through the doctrine of ‘flexible response’ did not provide the lever to control the escalatory ladder. The strategy, even in concept lacked conviction for limited nuclear war is a contradiction in terms.

The Burden of God’s Gift

      The South Asian nuclear imbroglio is evolving under circumstances that are unique. A shared antagonistic history; geographic contiguity; a political and structural contradiction between a centralized de facto military leadership and a democratic dispensation; a yawning economic gap; and, awkwardly a self ordained military that (mis)perceives in antagonism an existential peril and a reason for self perpetuation. India also views the complicity of China in the Pakistan nuclear weapons programme as suggestive of doctrinal links that permit a ‘Janus’ faced approach to the latter’s  no first use posture.

      Pakistan contends that the articulation of a nuclear doctrine is unnecessary for the purpose of establishing deterrence.  Unfortunately, a nation that announced its nuclear weapon status and views it as “God’s gift”  must also realize that a deterrent relationship is essentially about mutual knowledge of purpose. Ambiguities, deception and carousing with non state actors can only serve to obfuscate.

The Challenge: Contending with Pakistan’s Perspective

     The impending introduction of a sea-based deterrent into the Indian arsenal, rather than being seen as an element of stability that will enhance credibility of the second strike, is perceived through a curious logic as an asymmetric trend that somehow adversely impacts crisis stability.  Given the opacity of Pakistan’s strategic nuclear underpinnings, descent to TNWs and duplicity of policies, it has become increasingly prickly for India to either understand nuclear thinking in Islamabad or to find coherence between a mania for parity, the rush for stockpiling fissile material and the loosening of controls over nuclear weapons.

       More puzzling is the strategic notion that the perceived conventional imbalance between the two countries may be countered by Pakistan exercising one of two options: firstly, secure an assured second-strike capability; secondly, place the arsenal on ‘hair trigger alert’ and then the argument goes, introduce TNWs as “another layer of deterrence” designed to apply brakes on India’s military doctrine of Cold Start (ala NATO’s discredited formulation). As Feroz Khan posits, “Pakistan’s flight-testing of the short-range, nuclear-capable rocket system Hatf-9 (Nasr), was introduced to add ‘deterrence value’ to Pakistan’s force posture.” The author in a bizarre contradictory temper adds “due to the proximity of targets, short flight times and the technical challenges of assuring information accuracy, the likelihood of inadvertence is high.” He further holds that “…central command and control will become untenable and the ‘Nasr’ with its marked footprint will attract punishing pre-emptive conventional attack. Thus, battlefield nuclear weapons such as Hatf-9 will pose a ‘use it or lose it’ choice, precipitating a nuclear exchange that may not be intended.”  The unbiased political examiner is left bewildered that if such be the imbalances in the power matrix, then why does Pakistan not seek rapprochement as a priority of their military, economic and political policies? The answer perhaps lies in asking, “Who stands to gain in this power play?”

Conclusion: The Quest for a Response 

       Pakistan espouses an opaque deterrent under military control steered by a doctrine obscure in form, seeped in ambiguity and guided by a military strategy that finds unity with non-state actors. The introduction of TNWs exacerbates credibility of control. It does not take a great deal of intellectual exertions to declare whose case lowering of the nuclear threshold promotes. Two options present themselves to the Indian planner; firstly to generate specialised forces that continuously track and mark TNWs and incorporates an airborne conventional capability to neutralise them. The second option is a soft one that aims at dispelling the veil of opacity that surrounds the nuclear deterrent. What may have impact is a combination of the two.

       Nietzsche astutely warned that “And if thou gaze long into an abyss, the abyss will also gaze into thee”. Thus far nuclear relations in the region have been bedeviled by a persistent effort to combat the monsters that the shroud of covertness has cast; it has left us the unenviable task of out staring an abyss. Nietzsche in the circumstance would have advised an assault on the first causes – dispel opacity and engage the military through dialogue and from a position of total preparedness.

Coastal Security: To Keep the Homeland out of Harm’s Way

By

Vice Admiral (retd) Vijay Shankar

Abstract

Coastal Security is a harmonious extension of state policy whose purpose is protection against ingress of inimical man and material. Its progression is managed by unified control driven by global sharing of information, surveillance and a comprehensive interdiction system. The litmus test to ascertain credibility of the system lies firstly, in the extent to which we have a cohesive unified strategy in place and developed a joint surveillance and pre-emption capability; and secondly, whether we have made the local seas present an insuperable obstacle to every foe that seeks to penetrate. The Fortress of Murud Janjira did precisely so.

Keywords: Coastal Security, 26/11 Mumbai Terror Attacks, Nuclear Trafficking, Anti-terror legislation, Operational plans and communication, Murud Janjira.

Download full article here: Shankar_Coastal Security  

Excerpts

The Legend of Murud Janjeera

A little more than a nautical mile west of the coastal fishing village of Rajapuri in the Raigad district of Maharashtra stands the imposing Island fortress of Murud Janjeera. Built in 1490 by the local fishing community to ward off pirates, captured and enlarged by the Siddi mercenary Commander of the Ahmadnagar kings, the now brooding stone citadel was amongst the largest of that era. Repeatedly laid siege to by the Dutch, Portuguese, Marathas and the East India Company; its 19 bastions, 572 cannons and forty feet walls remained defiant and impregnable through history.[i] It was not till 1776, when the now independent Siddi’s led by Siddi Sat were defeated by the Marathas led by Chimnaji the brother of Peshwa Baji Rao I in the Battle of Riwas, that the unassailable fortress lost its doughty distinction. As a part of the battle reparations the Siddis were confined to this citadel. The immediate up shot was that the strategic significance of the fortress was annulled and the balance of sea power in the region disrupted. The legend will not be complete without deducing a theoretical abstraction that “the Fort, its eminence abroad and the resolve within had made the local seas present an insuperable physical obstacle to every foe that sought to penetrate”.

A Theory for Coastal Security           

As with any endeavour before we start upon an enquiry into coastal security in India, we seek a road map which will indicate to us at a glance what exactly are the waters we have to cover and what are its leading characteristics which determine its nature and general form so as to arrive at practical conclusions. The maritime domain is of such complexity that beyond the territorial waters of a state,[ii] only conventions exist to regulate, seize, search or even monitor the activities of vessels.[iii] Measures taken to sequester or impose control in international waters are normally unilateral and, predictably, run contrary to partisan interpretations of these conventions. Put pithily, what works on the high seas is that “might gives right”. Within the territorial seas what prevails are the laws of the State, to be put into operation by a plethora of disparate yet distinct agencies of government. But the predicament is that the medium that pervades does not tolerate distinction; both the high seas and the coast are washed by the same waters. So it scarcely needs saying that a segregated approach to providing comprehensive security across a fused medium is condemned to failure.

The second insidious feature that dominates the coastal arena is the effects of globalization and its hand-maidens the free flow of ideas, material and personnel. In addition to releasing entrepreneurial creativity and generating wealth it confers upon small groups’ disproportionate destructive and disruptive power. Access to this power and mobilizing it across the waters for illicit use involves exploiting the malgovernance of the High Seas and the fragmented nature of control within the Territorial Sea. A modus operandi which leaves frustratingly tiny footprints. The narrative of the assault on Mumbai on 26 November 2008 (26/11) and its chronology is well documented. What is not so well known is the evolution of the operational plan and the tell-tales that this process may have left for a discerning unified establishment to perceive and act upon.

Coastal security is firstly, about protection of the State from terrorists, non state actors and other dangerous people with violent intent (hereafter collectively referred to as terrorists) gaining access to the mainland using the sea route; and secondly, preventing the ingress of illicit hazardous material across territorial seas on to our shores. The fortifying process essentially begins with access to global information webs, establishment of wide area surveillance and intelligence networks and a three dimensional air-sea-land interdiction system. A pre requisite is for Command and Control of the entire process and the forces involved coming under a unified head irrespective of the Ministry of origin or the administrative department to which assets belong. Pursuits of diplomacy are obliged at all times be in harmony with the process.

So we arrive at our theory that Coastal Security is a harmonious extension of state policy whose purpose is protection against ingress of inimical man and material and its progression is managed by unified control driven by global sharing of information, surveillance and a comprehensive interdiction system. The American PATRIOT Act of 2001 provides a prototypical expansion of the Theory.[iv]

Sculpting the Approach: 26/11 as the Paradigm

Having now come upon a theory, it will be appropriate to fashion an exemplar and establish fundamental precepts that go into developing a counter to infiltration, penetration or assault plan in order to validate our theory. The events leading up to 26/11 provides a prime example of what could have gone into the planning and preparation of the assault founded on facts that are today available in the public domain. For it is out of such an analysis, that will emerge an approach to protect the State from the seaward ingress of inimical forces and illicit materials. It will also throw the spotlight on footprints and tell tales that our own intelligence and surveillance must stalk, and so also help define a strategy in order to defend and respond as we deter.

At the outset three assumptions are necessary. Firstly, for hostile ingress of any nature there are five essential steps that would have to be gone through by the perpetrators:

  • Planning and Reconnaissance
  •  Generation of an Operational Plan and Communications
  •  Logistics and Preparation
  •  Recruitment and Training
  •  Execution

Based on the extent to which the run up to the event can be reconstructed, experience tells us that these five steps, which may be called the Hostile Ingress and Terrorist Strike Process (HITSP), could be spaced over anywhere up to 18 months with Reconnaissance and the Provision of Logistics taking the bulk of time. Also, Planning is an individualistic activity restricted to a few and maybe conducted at a location distant from the target. The Second assumption is that between ‘hard’ and ‘soft’ targets, there are no surprise targets and the Third assumption is that ‘wild cat’ unplanned assaults do not give the desired destructive benefit to the assailants.

A Footprint Matrix has been constructed below (Figure 1) with the 5-step HITSP as augments marked by red stars (Planning and Reconnaissance have been separated). On the X-axis the ‘Persistence’ of a footprint is graded on a scale of 1 to 5, while on the Y-axis, ‘Detectability’ is also graded on the same scale. The notional size of the footprint is determined in terms of these two factors, both of which are more cognitive than absolute. The smallest footprint is the least detectable and of least persistence, graded at (1, 1) and the most prominent at (5, 5).

Fig 1: The Detectability & Persistence Footprint Matrix[v] 

 Source: Author 

Slide1

The matrix tells us the areas we need to concentrate on in order to achieve the elusive goal of deterring, defending and responding to terrorist acts. As will be noted, four zones have been established, these are the Opaque Zone, the Transitory Zone, the Transparent Zone and the Murky Zone. The Process has been assessed for Persistence and Detectability levels and plotted within the four zones, which to the planner provide areas of focus. Obviously, when we deal with the Transitory Zone and the Murky Zone, the returns for effort are extremely small yet they provide early warning. Often due to long gestation periods and a high false alarm probability, the difficulties associated with maintaining prolonged states of vigil may cause the guard to drop, and vital footprints to be lost in a mass of information. These, therefore, are Zones well suited for electronic surveillance and computer aided collation, analysis and dissemination.

The Transitory Zone provides opportunities that are not present in the other quadrants, primarily because the period of reconnaissance, while sporadic, has not only to be comprehensive but at some stage must involve the leading protagonists, some of whom maybe quite alien to the area of operation (Abu Ismail, of 26/11 notoriety, hailed from Dera Ismail Khan in the North West Frontier province is a case in point). The Reconnaissance stage is an activity conducted very early in the plan and as in any operational plan, the scope for errors are the maximum at this stage and therefore surveillance that is kept by way of civil measures would in all probabilities record  footprints. The fact that David Headley (alias Daood Gilani, a Lashkar-e-Tayyiba (LeT) operative) had been a regular visitor to Mumbai since early 2008 is symptomatic of such tell-tales.

When confronted with the Murky Zone one sees a picture and a pattern that in hindsight is 6/6 and yet Persistence in the Murky Zone of the operational plan is most significant and therefore, had the fact that the Master of Kuber, Sri Amar Singh Solanki been profiled after his incarceration in Pakistan, so also the movements of Kuber kept track of, 26/11 could well have been nipped during the execution phase. Intelligence, however sketchy, provided on 18th November 2008, indicated the What, Where and When components (nautical parlance) that is, the position of the mother vessel and time; both parameters provided the basis for mounting scouting operations, yet this was not done on grounds that intelligence was not “actionable”. Consequently in the absence of deployed forces either at the point of divergence or convergence Kuber had a free run. Also, the most vulnerable period of movement from sea to shore observed by local fishermen at Colaba and reported to the police ought to have been given the due import that it deserved.

The Opaque Zone if exploited, gives us the maximum benefit for it not only deters attack but action in this zone is pre-emptive in nature; it demands comprehensive knowledge of, and information on man and material that potentially could be used for a strike. This must be backed by all-embracing intelligence networks, field operatives and most importantly, the will to take anticipatory action before a potential incident. Here we must also understand that such pre-emptive actions may have ramifications of an international nature and the State must be disposed to take that risk. Investments in the Opaque Zone will have to be based on steps initiated on a multilateral basis and through ruthless elimination of potential personnel who could pose a hazard. The complexities of operating in the Opaque Zone is there for a planner to see, it poses great challenges, it will demand heavy investments of both man and finances and will yield the best rewards.

Moving into the Transparent Zone, while both Persistence and Detectability are high, they necessitate an internal scheme that is not only comprehensive but transcends the travails of Centre-State relations, ill-defined demarcation between agencies and most significantly, the resolve to cut across boundaries that have been drawn for administrative rather than operational purposes. The movement of logistics, creation of safe havens, handling munitions and that too with great discretion is no simple task.  It is perhaps for this reason that the sea-route with back-up operating in international waters, can by the very nature of the medium, avoid check-posts and regulatory mechanisms that one finds on land. Of course the disadvantages are equally irksome since the environment is hostile, probability of failure due to a variety of reasons is ever present and movement from sea to shore is relatively slow and a vulnerable period. The Transparent Zone provides for not only early warning but exposes the militant operation over both space and time. Logistics and Preparation is neither momentary nor is it undetectable since it involves creation of safe havens, movement of munitions, hazardous material and hit personnel close to the target area. And yet their exposure is subject to the weakest link and least attended virtue of the defensive shield; that of municipal regulation, citizenry awareness and unrelenting deployment of patrols and scouts. The vulnerability of the execution phase lies in the fact that it conforms to a rigid plan; while in most terrorist strikes there is an element of flexibility, exercising the flexibility option would normally result in failure of the strike or marginal success. And therefore the very rigidity of the execution phase provides opportunity to detect and respond.

In the absence of a general theory of terrorism on account of its many roots, motivations, manifestations and intent it is a priori impossible. However, at the heart of terrorist activity lie two critical characteristics; firstly a total disregard to legality of method and secondly it is inspired by a sustained programme of large scale planned and premeditated violence. Intelligence gathering and analysis targeting events related to these two characteristics consequently plays a pivotal role in putting in place counters. It is this relationship in the intelligence scheme that will discern actionable intelligence from a mass of information.

[…]

Conclusion                                                                                                      

Our review of the current state of the coastal defence scheme and the security it provides would appear to project a disjointed image of a contrivance that depends more on a massed approach to security through the induction of numbers (in terms of human resources as well as surveillance means). While it is true that there is logic in numbers, yet the adversary is one who has perfected the art of visualising the cracks in the system. Obviously with more disparate elements involved, more cracks are there to slip in between. On 26/11, ten men with small arms came in two inflatable boats and held our financial capital to ransom for sixty hours.  The mayhem in terms of loss of lives apart, the Mumbai Stock Exchange closed down for the same period resulting in trading disruption of close to USD 9 billion per day. And this is the essence of the disproportionality that has been conferred. ‘Mass’ pitted against ‘Knowledge’ invariably results in victory to the latter.

The covenant between religion and the terrorist is a volatile one. It is neither appeased by bargains nor is it broken by modernity. Indeed it has fused the ideology that drives them with the source of their being (this may explain the suicide bomber). Under these conditions the only route that can succeed is the promise of failure for which, the answer lies in adopting a unified strategy both in form and content. The Footprint Matrix provides an instrument to channelize national effort. We concentrate on any one Zone at the peril of missing out on the others. Persistence is the key and adoption of large scale electronic means for profiling, surveilling, collating and analyses is a necessity.

The nuclear dimension is potentially, the most destructive present danger. While a nuclear strike may present a very complex planning task, our adversaries have shown themselves to be up to the most challenging, the most improbable and yes, the most diabolic. The establishments’ facility to deter, defend and respond will test its will to the extreme.

There appears to be an absence of a guiding national strategy and a coalescing doctrine which seeks to marshal all disparate resources controlled by State and Centre under integrated Command. If our primary strategic goal is to protect against dangerous people and the ingress of illicit hazardous material then this goal must serve to transform the existing organizational and material structures. The litmus test to ascertain credibility lies firstly, in the extent to which we have a cohesive unified strategy in place and developed a joint surveillance and pre-emption capability. And secondly, as the Fortress of Murud Janjira did, have we made the local seas present an insuperable obstacle to every foe that seeks to penetrate? Clearly the answers on both counts must remain in the negative.


End Notes

[i] Hoiberg, Dale & Ramchandani, Students’ Britannica India. Publishers Popular Prakashan 2000, p 403. http://www.maharashtratourism.gov.in/MTDC/HTML/MaharashtraTourism/Forts

[ii] Territorial Seas were first defined in the 18th century as 3 nautical miles, the maximum range of a cannon shot. A workable formula was found by Cornelius Bynkershoek in his De dominio maris (1702), restricting maritime dominion to the actual distance within which cannon range could effectively protect it. This became universally adopted and developed into the three-mile limit.

[iii] See United Nations Convention on the Laws of the Sea (UNCLOS) 1982. The Convention on the High Seas is an international treaty created to codify the rules of international law relating to the high seas, otherwise known as international waters. The treaty was one of four treaties created at the United Nations Conference on the Law of the Sea (UNCLOS I). The treaty was signed 29 April 1958 and entered into force 30 September 1962. As of 2013, the treaty had been ratified by 63 states. Oceans, seas, and waters outside of national jurisdiction are also referred to as the high seas or, in Latin, mare liberum (meaning free seas).

[iv] A public law in the USA enacted in October 2001, Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT Act) to deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and for other purposes.

[v] The matrix was first presented by the Author at “The Seminar on Coastal Security” hosted by the National Maritime Foundation, New Delhi, in November 2009.