New Security Challenges, Vulnerabilities and Way Ahead
New Security Challenges, Vulnerabilities and Way Ahead
New Security Challenges, Vulnerabilities and Way Ahead
Introduction
emerging threats was the foundational cause for the genesis of Indian Coast Guard
(ICG). This remains the core objective of the ICG and is an endeavour in perpetuity.
2. History bears testimony to the fact that the maritime interest of a nation is an
intrinsic constituent to its wellbeing and progress. The oceans have been umbilicaly
opportunities in the seas, both legitimate and illegitimate. Since the ancient past,
seas have been used for conquest, trade, cultural exchanges etc, whilst the
delinquent have found safe haven and fertile hunting grounds in the oceans and this
between nations. Similarly the diverse geopolitical priorities of nations also find
4. India has abundant maritime resources to be harnessed from its vast maritime
maritime interests. The Indian Ocean Region has been focus of relentless attempts
by various nations to exert their influence and dominate the region. Our maritime
interests are also threatened by entities seeking to clandestinely exploit the maritime
Besides the threats emerging from these deliberate attempts, our maritime interests
need to be protected from the attendant risks associated with bonafide domestic
endeavours. The geopolitical machinations, persistence of the illicit entities and need
to sustain legitimate human activities in the seas, forms a complex and volatile
5. In this milieu, accomplishment of the ICG charter is faced with multiple and
Security Challenges
examined:-
intent which determines direction of the security efforts and therefore can be
comprises of all elements of maritime security which ICG is expected to provide and
which ICG has to deal with. Most of the security challenges are existing and known
viz terrorism, smuggling, arms trafficking etc, while new ones are spawning.
shaped by circumstances.
12. The circumstances can be, change in world order, fluid geopolitical
warfare against India. The global acknowledgement received by Taliban has already
legitimatised the terrorist regime and paves the way for eventual formal recognition
regime is its core strength and hence the group is unlikely to reform. The emergence
of Taliban regime presents multiple options to mentor nations to target India through
with their easy access to funds, equipment, safe haven etc will encourage audacious
operations against Indian security forces. Scores of terrorist groups, especially anti-
India groups, will now gain renewed vigour and support. Their tactics may adopt
5
more brazen methods and may even resort to deliberate confrontation with ICG
units. Besides the traditional threats, the new threats posed by this contemporary
(c) Deliberately entice boarding teams and take them hostage or harm
them.
14. Continental Shelf. The Indian maritime zone is presently till the extremities
of the Indian EEZ and comes under the purview of ICG. The ICG force composition,
surveillance endurance, response strategy etc have been planned as per the existing
expanse of the Indian maritime zones. India has submitted its claim for Continental
Shelf extending beyond the EEZ to the UN Committee on Legal Continental Shelf
(UNCLCS), which on award will further expand the Indian maritime zones. The
significant extension of maritime zone, will require corresponding resources and new
climate change (Min of Earth Sciences, GoI, 2020) which impacts all walks of human
life. The complete repercussions of climate change is still nebulous, however raise of
sea levels, erosion of coastline, effect on marine life, altered patterns of ocean
storms etc have been predicted with certainty. Oceans, the medium in which ICG
operates is set to change significantly due to climate change and ICG will have to
component of its naval power. Chinese Fishing Armed Militia is state trained and has
a history of successfully assisting the PLA Navy to prevail upon its adversaries
(RAND CORP, 2020). The Chinese Distant Water Fishing Fleet(DWF) is a global
delinquent and concern for coastal nations. The Chinese Fishing Militia has played
Fishing Militia is well armed and has used swarming to successfully overwhelm
foreign Coast Guard or Naval units in the South China Sea. Dominance of Indian
Ocean has been a Chinese agenda and its fishing fleet is an useful tool to further the
agenda. China is known to foist false territorial claims through vague historical
accounts and then impose ownership on such territory through its fishing fleets.
(Source : https://ipdefenseforum.com/2021/02/chinas-distant-water-fishing-fleet-
harms-developing-countries-economies-food-security/)
Owning ports in IOR, will allow China some obscure reason to claim territory in the
Indian Ocean eventually. The proliferation of Chinese ports in IOR nations enables
China to dramatically enhance their fishing fleet in the Indian Ocean and also provide
prolonged sustenance to the fishing fleet. The presence of Chinese Fishing Fleet is
7
and in long term to India’s territorial integrity. The techniques employed by Chinese
fishing militia in South China Sea can be replicated in Indian Ocean also against ICG
units and fishermen. ICG presently does not have a firm policy to deter the Chinese
ensures confidentiality, integrity and availability of information (CSRC). ICG units are
repositories of classified data and also generate large volume of data themselves.
The confidentiality, integrity and availability of such data is not only crucial for the
functioning of ICG but also vital to national security. The infirmity of Information
lives has enhanced the quality of life and thereby it has become inseparable.
reaching implications.
includes critical operational information through CSN, SITREPs etc. This data
etc. Presently the data handling mechanism undermines the availability data
information from various sources and archiving it, to be available for analysis
Security Continuum
18. Though the security requirements of ICG are classified in different categories,
they are all interlinked and constitute a Security Continuum. Threats will have
Hence, measures to improve one category of security will also have beneficial
19. The vulnerabilities which exacerbate the new security challenges are the
however it may not be feasible in all the cases. Being conscious of this fact,
20. Need for Tactical Guidance. ICG on-scene commanders have to deal with
each security situation should be shaped on basis of clear guidelines from the apex
level, which will stipulate the parameters of acceptable risk, constraints, restraints
etc. Presently such tactical guidance is not available to guide the response of on-
security implications of the situation. This response discretion may lead to mission
9
etc.
21. Way Ahead. ICG on-scene commanders are confronted with a variety of
situations, wherein all may not be within the unit’s capacity to deal with immediately
or alone. The situations which are to be dealt by an ICG unit, may also require a
reinforcement.
(c) Defining the parameters for acceptable risks, use of force, collateral
damage etc.
22. Mitigating Threat to Own Units. The ICG threat evaluation should factor in
the probability of ICG units being the primary targets at sea. Presently OPV, FPV,
ACV and IB are all interchangeably deployed in the same areas based on their
endurance and irrespective of their self defence capabilities, which varies vastly as
10
per class of ship. The self defence capability of ICG IB/ACV is modest and would be
ineffectual against any directed attack. Attack against warships is not an uncommon
tactic and there are contemporary instances, therefore ICG should guard against it.
23. Way Ahead. Foremost, there should be a realisation that ICG units
deployed alone at sea are vulnerable to attack. The ideal solution would be to equip
units with adequate manpower and self defence systems. However both may not be
threat classification.
to high threat areas may be resorted to. Similar should be the case for ACV
also.
(e) IB should be strictly deployed for only anchorage patrol and low threat
deployed for operations in high/medium threat areas, however only under the
cover of OPV/FPV.
24. Hardening Force Protection. ICG units whilst in harbour are least
prepared for self defence. Hence ICG units should be provided with adequate
protection from threats whilst in harbour. Presently force protection measures for
ships and ACVs in harbour is suboptimal. Berthing of ICG ships in unsecured refit
yards, jetties viz fishing jetty etc is not uncommon. The security perimeter at such
locations is nonexistent and the units are extremely vulnerable to attacks. Due to
manpower constraints, the units by themselves will be not able to protect all its flanks
25. Way Ahead. Utilisation of unprotected jetties, beaching areas etc. should
infrastructure being considered for use by ICG units. Ships berthed in ports have the
inherent protection of the port security. Services of Defence Security Corps should
done for OTM complexes. Technology like CCTV/ Night vision camera, intruder alert
system etc should be employed to augment the unit staff’s capability to detect and
Robust analysis of the data received from continuous maritime surveillance is critical
for trend analysis, threat evaluation, prediction and for optimising asset deployment.
However the data generated from these sources is not being fully leveraged as they
12
incidental and exclusively through human intervention. The human capacity for such
function is limited due to the large volume of data generated from diverse sources
27. Way Ahead. Big Data Analytics is the modern data analysis technology
trend that has capability to handle large volume of complex data. Big Data is
surveillance data generated by ICG resources has all the characteristics of Big Data.
Big Data analytics has found widespread civil and military application. The
connecting all ICG stations are enablers for seamless data exchange and data
analysis. Big Data analytics can be employed to elicit the information buried in the
vast quantity of surveillance data. Hence adoption of Big Data Analytics should be
inevitable and it is essential that ICG units are prepared to handle the challenges.
The core to such preparation is to develop SoPs, carefully accounting for available
manpower, equipment etc in context of the operational situation and then training
personnel to execute the SoP. All armed forces depend on their indigenous training
13
institutions to train its personnel. The ICG academy is in a nascent stage and may
take considerable time to be functionally established. Presently CGTC Kochi and two
CG Workup Teams (East and West) are the only institutions engaged in training. All
the three agencies are operating with modest manpower and limited resources.
CGTC Kochi was established to be a centre of expertise on niche ICG domains and
to impart training on exclusive ICG functions. However, due to the lack of adequate
faculty, it is just a venue where external faculty is invited for almost all subjects.
established standards and SoPs. The capacity of CGWT is also limited due to
manpower constraint. Hence, these ICG institutions have limited capacity to refine
29. Way Ahead. The ICG Academy, once established, will resolve the tactics
development and training issues. However in the interim following measures should
be adopted:-
(a) CGWT
vigorously with GoI. Till then attach an OPV to each CGWT to augment
ships.
(iii) These ships will serve as OST OPV and be deployed only for
OST function.
30. Inadequate Monitoring of Merchant Ships. Post 26/11 attacks the security
commandeered IFB for infiltration. Now ICG efforts are firmly rooted to IFBs and the
threat emanating of commercial ships has been not been consistently addressed.
ICG is not monitoring the commercial shipping traffic, their antecedents and
31. Way Ahead. Culture of boarding merchant ships by ICG units should be
revived. A merchant ship threat matrix should be developed based on the each
ship’s antecedents like flag, crew nationality, owners, charterer, last few ports of call,
history of violation etc. Based on the threat matrix the ships should be monitored and
boarded. A database of the threat matrix should be created for historical correlation.
Fisher folks should be encouraged to report any merchant ship found transacting
with any fishing boat, barge etc. IBs should be routinely deployed for anchorage
patrol and investigating the merchant vessel and other shipping traffic plying near to
VAs/VPs.
15
32. Drone Attacks. The remote control technology has matured rapidly in the
past decade and has been effectively been deployed both during conventional and
sub-conventional warfare. Low cost aerial drones and underwater drones are
commercially available and are easy to use. The remote operated drones can be
deployed at sea from any type of vessel including fishing boats. The remote
controlled drones are a threat to both ICG ships as well as commercial ships at sea.
operation of remote drones, both aerial and underwater, in the entire Indian maritime
zones. This will facilitate ICG units to act against any vessel or off shore installation
operating drone unauthorisedly. Equip all ICG units, both afloat and ashore, with
drone defence systems at the earliest. In the interim, SoPs may be developed to
defend ICG units from drone attacks, which can include following measures:-
Threat Zones, due to the likelihood of adversary planning drone attack being
in these areas as it will facilitate expeditious escape into safe haven post
attack.
(b) ICG Units operating in Drone Threat Zones to assume highest degrees
(c) Personnel to be trained to use ship’s main armament and small arms to
target drones.
boarding with a presumption that confrontation with ICG was not the vessel’s plan.
However the tactic where a vessel entices an ICG boarding team, posing as
considering the increasing audacity of the non-state actors. The temptation to use
such tactic against ICG ships would be also considering the fact that ICG units
35. Way Ahead. Volatile VBSS should be considered as plausible situation and
SoPs may be instituted accordingly. The SoP for Volatile VBSS can include
following:-
plans.
(b) As far as possible conduct VBSS operations only after the subject
vessel leaves High Risk Area and enters in Medium Risk Area.
deliberately remaining in High Risk Area and positioning itself near to escape
routes.
(d) Correlate the vessels credentials and route history for threat analysis.
(h) Follow all precautions of VBSS to prevent the boarding parting from
threat to our maritime security and economic security. The CFM will indulge in
37. Way Ahead. The CFM should be dealt with firmly and constantly thwarted
both by force and regulation. India should strengthen Regional Fishery Management
regulation which authorises use force by ICG and IN ships against CFM, akin to the
Chinese Coast Guard use of force law. Entry of CFM to Indian ports and maritime
end technology gadgets pose grave security threat, especially as ICG units handle
considerable volume and variety of classified information. Such gadgets coupled with
the internet are the prime facilitators for HUMINT and SIGINT. Espionage by a
compromised individual can be easily accomplished in ICG units, due to the routine
39. Way Ahead. As gadgets like smart phones, watches etc have become
essential part of everyday life and the prohibition of gadgets will be ineffectual,
(a) Earmarking specific areas inside the unit where devices are prohibited.
(b) Place such sensitive areas under constant surveillance, viz CCTV etc.
(c) Install mobile phone detectors in such sensitive spaces. Mobile phone
sensitive material to alert concerned authorities in the unit when the chest is
(e) Make provisions for personnel to deposit their gadgets onboard while
(g) Institute strict punishments for violations and give it wide publicity. A
viz climate change, new maritime laws, etc. Any organisation which has clear
understanding of the challenges lying in future only will be able to prepare for future.
All known and plausible future events should be analysed for impacts on ICG. Once
41. Way Ahead. In case of ICG the two impending phenomenon are:-
(a) Climate Change. Climate change is altering the earth and its oceans
irreversibly. Hence ICG has to initiate measures to adapt best to the unfolding
environmental eventuality.
climate change with the help of professional institutions, viz IIT etc. Once such
be initiated. The threats engendered due to climate change are the following:-
close to coast line. The rise in sea levels and coastline erosion will
close to coast/islands etc which are not well surveyed and frequented
by other ships. The climate change will alter sea current patterns,
seabed profile and depths etc. ICG units operating in such areas are to
inventory along with ratio of FPV to OPVs which has better sea
keeping.
viz salinity etc will have definite implication on the materiel maintenance
be evaluated.
of the maritime zones limits and IMBL also. In case such disputes are
42. Continental Shelf. The extend of Indian maritime zone is set to expand
further on award of Continental Shelf extending beyond the EEZ. Protection of the
43. Way Ahead. The strategy for protection of the extended Continental Shelf
will have to be drawn-up in advance by ICG. The need for force accretion, manpower
pursue its mandate in the Continental Shelf also needs to be determined and put in
place.
Conclusion
44. India has to pursue its developmental goals without being overwhelmed by
nation’s progress towards the stated developmental goals. Hence the salience of
45. The Indian Coast Guard has to deal with a constellation of maritime security
challenges within the parameters of constraints and restraints. The maritime security
landscape is characteristically in constant flux and can only be prevailed upon with a
robust strategy. Security strategists need to have a vision which looks over the
horizon without losing sight of the past while being focussed on the present.
46. Our security strategy should be organic, account for all vulnerabilities and
resources.
22
BIBLIOGRAPHY
Min of Earth Sciences, GoI. (2020). Assessment of climate change over the Indian
region: A report .
UNCLCS. (n.d.).
https://www.un.org/depts/los/clcs_new/submissions_files/submission_ind_48_2009.h
tm. Retrieved SEP 2021, from UNCLCS.