‘Terrorism’ as a Central Theme in the Evolution of Maritime Operations Law Since 11 September 2011

Part of the Yearbook of International Humanitarian Law book series (YIHL, volume 14)


As D.P O’Connell noted in a seminal 1970 article (‘International Law of Contemporary Naval Operations’) and in his equally seminal 1975 book The Influence of Law on Sea Power, maritime operations law is a constantly evolving discipline in both theory and practice—with law often lagging practice by a noticeable margin. One consequence of the (then) ‘Dreadnought era’ focus of much of the law of naval warfare was that ‘[I]f international law appears to the naval officer a tangle of uncertainties in which he is likely to be ensnared, the technology of naval warfare induces in the legal theorists perplexity and dismay’. However, for all of the sometimes haphazard and ‘catch-up’ nature of the relationship between law and practice in maritime operations, there are clearly a number of fundamental, normative, defining themes which have tended to play the dominant role in shaping and informing the evolution of maritime operations law over the last several decades (or, indeed, centuries).


Terrorist Group International Maritime Organisation Legal Response Universal Jurisdiction Maritime Transport 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Ahlstrom C (2005) The proliferation security initiative: international law aspects of the statement of interdiction principles SIPRI Yearbook 2005: armaments, disarmament and international security, p 741Google Scholar
  2. Allison G (2001) Could worse be yet to come? The Economist (1 November 2001). Available at http://www.economist.com/node/842483. Accessed 30 Dec 2011
  3. Arms Control Association (2003) Interdiction initiative participants agree on ends, differ on means, Arms Control Today (November 2003). Available at http://www.armscontrol.org/act/2003_11/PSI. Accessed 30 Dec 2011
  4. Australian Government—Department of Infrastructure and Transport (2010) International Ship and Port Facility Security Code (ISPS Code), last updated 13 October 2010. Available at http://www.infrastructure.gov.au/transport/security/maritime/isps/index.aspx. Accessed 30 Dec 2011
  5. Bateman S (2007) Outlook: the new threat of maritime terrorism. In: Lehr P (ed) Violence at sea—piracy in the age of global terrorism. Routledge, New YorkGoogle Scholar
  6. BBC News (2006) Israel imposes Lebanon blockade, BBC News (13 July 2006). Available at http://news.bbc.co.uk/2/hi/5175160.stm. Accessed 30 Dec 2011
  7. Belcher E (2011) The proliferation security initiative: lessons for using nonbinding agreements, international institutions and global governance program working paper No. 6, Council on Foreign Relations July 2011. Available at http://www.i.cfr.org/content/publications/…/IIGG_WorkingPaper6_PSI.pdf. Accessed 30 Dec 2011
  8. Bright M et al (2001) Hunt for 20 terror ships: the armada of terror, The Observer (23 December 2001). Available at http://www.guardian.co.uk/world/2001/dec/23/september11.terrorism1. Accessed 30 Dec 2011
  9. Byers M (2004) Policing the high seas: the proliferation security initiative. Am J Int Law 98(3):526Google Scholar
  10. Council on Foreign Relations (2006) Backgrounder: targets for terrorism: ports (January 2006). Available at http://www.cfr.org/port-security/targets-terrorism-ports/p10215. Accessed 30 Dec 2011
  11. Doswald-Beck L et al (1995) San Remo Manual on international law applicable to armed conflicts at sea. Cambridge University Press/International Institute of International Humanitarian Law, CambridgeGoogle Scholar
  12. The Economist (2001) America the unready. The Economist, 20 December 2001. http://www.economist.com/node/917304. Accessed 30 Dec 2011
  13. Forbes A (2003) International shipping trends and vulnerabilities. Maritime Studies 132:21Google Scholar
  14. Frittelli JF (2003) CRS Report for Congress—Port and Maritime Security: Background and Issues for Congress (5 December 2003). Available at http://www.homelandsecurityus.net/ports%20and%20maritime%20terrorism/Maritime%20crs_report_for_congress.htm. Accessed 30 Dec 2011
  15. Frittelli JF (2005) CRS Report for Congress—Port and Maritime Security: background and issues for Congress (27 May 2005). Available at http://www.fas.org/sgp/crs/homesec/RL31733.pdf. Accessed 30 Dec 2011
  16. Garmon T (2002) International law of the sea: reconciling the law of piracy and terrorism in the wake of September 11th. Tulane Maritime Law J 27:257Google Scholar
  17. Greenberg MD et al (2006) Maritime terrorism: risk and liability. RAND Centre for Terrorism Risk Management Policy, RAND Corporation. Available at http://www.rand.org/pubs/monographs/2006/RAND_MG520.pdf. Accessed 30 Dec 2011
  18. The Guardian (2010) China-Japan sea dispute escalates as Beijing demands fisherman’s release’, The Guardian (10 September 2010). Available at http://www.guardian.co.uk/world/2010/sep/10/china-japan-diaoyu-senkaku-dispute. Accessed 30 Dec 2011
  19. Guilfoyle D (2005) The proliferation security initiative: interdicting vessels in international waters to prevent the spread of weapons of mass destruction. Melb Univ Law Rev 29:733Google Scholar
  20. Gvosdev NK, Cipriano AA (2002) Is privateering the answer to terrorism? History News Network (29 July 2002). Available at http://hnn.us/articles/881.html. Accessed 30 Dec 2011
  21. Indian Navy, Operation Cactus—1988. Available at http://indiannavy.nic.in/cactus.htm. Accessed 30 Dec 2011
  22. Jacques R et al (2006) Maritime operational zones. International Law Department, US Naval War CollegeGoogle Scholar
  23. Jesus JL (2003) Protection of foreign ships against piracy and terrorism at sea: legal aspects. Int J Marine Coastal Law 18(3):363Google Scholar
  24. Joint Civilian-Military Investigation Group, Investigation Report on the Sinking of ROKS Cheonan (20 May 2010). Available at http://www.globalsecurity.org/jhtml/jframe.html#http://www.globalsecurity.org/military/library/report/2010/100520_jcmig-roks-cheonan/100520_jcmig-roks-cheonan.pdf. Accessed 30 Dec 2011
  25. Kaye S (2005) The proliferation security initiative in the maritime domain. Israel Yearb Hum Rights 35:205Google Scholar
  26. Kaye S (2007) Threats from the global commons: problems of jurisdiction and enforcement. Melb J Int Law 8:185Google Scholar
  27. Klein N (2006) Legal limitations on ensuring Australia’s maritime security. Melb J Int Law 7(2):306Google Scholar
  28. Klein N (2011) Maritime security and the law of the sea. Oxford University Press, OxfordGoogle Scholar
  29. Luft G, Korin A (2004) Terrorism goes to sea. Foreign Affairs, November/December 2004. Available at http://www.foreignaffairs.com/articles/60266/gal-luft-and-anne-korin/terrorism-goes-to-sea. Accessed 30 Dec 2011
  30. McGrath C (2004) Government boosts maritime security, ABC News (15 December 2004). Available at http://www.abc.net.au/pm/content/2004/s1266082.htm. Accessed 30 Dec 2011
  31. McNaught F (2005) Effectiveness of the International Ship and Port Facility Security (ISPS) Code in addressing the maritime security threat, Geddes Papers 2005. Available at http://www.defence.gov.au/ADC/docs/Publications/Geddes%20Papers%202005/89939%20Defence%209.pdf. Accessed 30 Dec 2011
  32. O’Connell DP (1970) International law of contemporary naval operations. Br Yearb Int Law 44:20Google Scholar
  33. O’Connell DP (1975) The influence of law on sea power. Naval Institute Press, AnnapolisGoogle Scholar
  34. Office of the Coordinator for Counter Terrorism Report (2002) Middle east overview: patterns of global terrorism (21 May 2002). http://www.state.gov/s/ct/rls/crt/2001/html/10247.htm. Accessed 30 Dec 2011
  35. Ong GG (2004) Ships can be dangerous too: coupling piracy and maritime terrorism in Southeast Asia’s maritime security framework, Institute of Southeast Asia studies working paper: International Politics and Security Issues Series No. 1. Available at http://www.asia-studies.com/ISEASips.html. Accessed 30 Dec 2011
  36. Rahman M (2008) Witnesses describe mumbai attackers’ arrival by sea. The Guardian (27 November 2008). Available at http://www.guardian.co.uk/world/2008/nov/27/mumbai-terror-attacks-terrorism-boats. Accessed 30 Dec 2011
  37. Rakshak B (2011) Operation CACTUS: India’s Airlift into the Indian Ocean. Available at http://www.bharat-rakshak.com/IAF/History/1988Cactus/index.html. Accessed 30 Dec 2011
  38. Richardson M (2004) Growing vulnerability of seaports from terror attacks. Yale Global Online, 5 March 2004. http://yaleglobal.yale.edu/content/growing-vulnerability-seaports-terror-attacks. Accessed 30 Dec 2011
  39. Sakhuja V (2002) Contemporary piracy, terrorism and disorder at sea: challenges for sea-lane security in the indian ocean. Marit Stud 127:1Google Scholar
  40. Schoen JW (2004) Ships and ports are terrorism’s new frontier. MSNBC News, 21 June 2004. http://www.msnbc.msn.com/id/5069435/ns/business-world_business/t/ships-ports-are-terrorisms-new-frontier/. Accessed 30 Dec 2011
  41. Sechrest LJ (2001) Privateering and national defence: naval warfare for private profit, independent institute working paper no. 41 (September 2001). Available at http://www.independent.org/pdf/working_papers/41_privateering.pdf. Accessed 30 Dec 2011
  42. Song Y-H (2004) An overview of regional responses in the Asia-Pacific to the PSI’. Marit Stud 135:1Google Scholar
  43. Stephenson A (2004) This is not a drill: how a gulf crisis unfolded, Sydney Morning Herald (11 September 2004). Available at http://www.smh.com.au/articles/2004/09/10/1094789687650.html?from=moreStories. Accessed 30 Dec 2011
  44. The Turkel Commission (2011) The public commission to examine the maritime incident of 31 May 2010 Report Part 1 (January 2011). Available at http://www.turkel-committee.gov.il/files/wordocs//8707200211english.pdf. Accessed 30 Dec 2011
  45. Rothwell DR, Stephens T (2010) The international law of the sea. Hart Publishing, OxfordGoogle Scholar
  46. US Department of Defence (2001) USS Cole Commission Report (Unclassified Version) (9 January 2001). http://www.fas.org/irp/threat/cole.pdf. Accessed 30 Dec 2011
  47. US Department of Homeland Security—Policy (2004) Secure seas, open ports (21 June 2004). Available at http://www.dhs.gov/xlibrary/assets/DHSPortSecurityFactSheet-062104.pdf. Accessed 30 Dec 2011
  48. US Department of the Navy (2004) Report on the 24 April 2004 attacks on Iraqi oil platforms in the Northern Arabian Gulf (16 July 2004). Available at http://www.history.navy.mil/shiphist/f/pc-10/2004.pdf. Accessed 30 Dec 2011
  49. US Department of State (2003) Fact sheet—proliferation security initiative: Statement of Interdiction Principles (4 September 2003). Available at http://www.state.gov/t/isn/c27726.htm
  50. US General Accounting Office—Reports (2002) Combating terrorism: actions needed to improve force protection for DOD deployments through domestic seaports, October 2002. Available at http://www.gao.gov/new.items/d0315.pdf. Accessed 30 Dec 2011
  51. US General Accounting Office—Testimony (2002) Container security: current efforts to detect nuclear materials, new initiatives, and challenges (18 November 2002). Available at http://www.gao.gov/new.items/d03297t.pdf. Accessed 30 Dec 2011
  52. US Government Accountability Office (2010) Maritime Security: DHS progress and challenges in key areas of port security (21 July 2010). Available at http://www.gao.gov/new.items/d10940t.pdf. Accessed 30 Dec 2011
  53. World Net Daily (2004) Terror threat swells at sea. World Net Daily (8 June 2004). Available at http://www.wnd.com/?pageId=24966. Accessed 30 Dec 2011.
  54. Young A, Valencia MJ (2003) Piracy, terrorism threats overlap, The Washington Times (7 July 2003). Available at http://www.washingtontimes.com/news/2003/jul/6/20030706-104801-9949r/?page=1. Accessed 30 Dec 2011

Copyright information

© T.M.C. Asser Press, The Hague, and the author(s) 2012

Authors and Affiliations

  1. 1.Australian National UniversityCanberraAustralia

Personalised recommendations