Académique Documents
Professionnel Documents
Culture Documents
54-59
ABSTRACT
The work reviews the new challenges posed to both naval and military bases as
they face new and sophisticated scenarios in protecting human, materials and
economic resources in the coastal states. Effective approaches for logistical
equipment mobilization were suggested. Existing transport options available to
the military and naval units were assessed based on hypothetical scenarios
requiring quick interventionism. The logistical requirements of a South Eastern
Military in the area of facility management were analyzed pointing out likely
strengths and weaknesses.
1. INTRODUCTION
The sophisticated nature of crimes in the coastal states has indeed posed new
challenges for both the military and naval units in this region. In reaction to these,
the governments of these States have reacted by providing little logistical
equipment in the area of fleet acquisition to help counter the adverse situation.
Others include the mounting of road blocks at strategic entry and exit points to
these States. In a threatened coastal environment where a war scenario for
instance in the form of foreign aggression is envisaged, the logistical requirement
would go beyond ordinary visible imaginations. In this situation logistical
requirements would be two-fold. The first will concern itself with civilian logistical
requirements for evacuation. The other will affect military logistical requirements
for quick interventionism, offense and counter measure attacks.
st
Proceedings of the National Logistics Conference (1 Nigeria Port Log 2008). 54
Port Technology and Logistics Research, 2008. Vol. 1(1), Pp.54-59
1.2 Objectives
This paper sets out to investigate the logistical needs of both civilian and military
units under different scenarios. A hypothetical threatened coastal environment is
used as a case study.
ii. They may apply the Trojan horse technique by using a fishing trawler, re-
supply ship, tug or similar innocuous-looking vessel to transport weapons
and other battle related material.
iii. They may also resort to vessel hijacking as fund raising exercise to support
campaign of political violence directed toward ethnic or religious designs.
iv. They may decide to scuttle a ship in a narrow SLOG in order to block or
disrupt maritime traffic.
st
Proceedings of the National Logistics Conference (1 Nigeria Port Log 2008). 55
Port Technology and Logistics Research, 2008. Vol. 1(1), Pp.54-59
v. They may opt to hijack an LNG carrier and then detonate it as a floating
weapon, or a collision weapon.
vi. They may also use small or high speed boat to attack an oil tanker or
offshore energy platform in a bid to inflate international petroleum prices,
or cause major oil pollution.
vii. Finally, they may decide to attack a cruise liner or passenger ferry to cause
mass casualties by contaminating the ships food supply, or detonating an
onboard or submersible improvised device (IED), or even by attacking the
vessel with a small attack craft. Greenberg et al., (2006).
The maritime domain has been seen as an area vulnerable to terrorist attack.
Maritime terrorism by definition constitutes of terrorist acts and activities:
3. METHODOLOGY
Vulnerability analysis of the sufficiency of our logistical facilities under different
threat scenarios was carried out. The effects of attacks were graded from minimal
to excessively great consequences. The attack categories under peace time fall
into two groups.
st
Proceedings of the National Logistics Conference (1 Nigeria Port Log 2008). 56
Port Technology and Logistics Research, 2008. Vol. 1(1), Pp.54-59
Under a war scenario the situation might go out of control involving troop attacks,
withdrawals, and massive movement of civilian populations from one city to
another. The effectiveness of Radar countermeasure (RCM) equipment would
come into play. Accurate defection of enemy aircrafts, ships and submarines using
electronic devices, sensors, sonar, magnetometers become compulsory.
4. REPORT OF FINDINGS
During peace time like we have now the attack potentials of militants and pirates
currently disturbing the Niger-Delta coastal environment can be assessed to
constitute of two parts. The first is those attacks targeted against human
resources and those attacks targeted against production and allied facilities. A
security strategy that will deal adequately with the activities of such groups partly
has to do with adequate logistical defense mobilization and partly with increased
government development efforts in the region.
ii. Provision of adequate logistical equipment for defense at both the land, sea
and air modes. Government development efforts viewed as a security
strategy will require creation of efficient accessibility to major living areas in
the region, provision of fresh water via borehole drilling and location of
peace defense centers in the area's most troubled zones.
st
Proceedings of the National Logistics Conference (1 Nigeria Port Log 2008). 57
Port Technology and Logistics Research, 2008. Vol. 1(1), Pp.54-59
5. CONCLUSION
Logistical needs therefore are paramount to a nation's economic and social well
being both at peace time and at war time. The application of scenario analysis
using peace and war time scenario therefore exposes the vulnerability of our
developmental efforts under threat. Such analysis will ensure a development
targeted at full logistical sufficiency for our civilized needs. It also ensures
protection at all times.
st
Proceedings of the National Logistics Conference (1 Nigeria Port Log 2008). 58
Port Technology and Logistics Research, 2008. Vol. 1(1), Pp.54-59
6. REFERENCES
Greenberg et al., (2006). Maritime Terrorism Risk and Liability. RAND Center for
Terrorism Risk Management Policy.
st
Proceedings of the National Logistics Conference (1 Nigeria Port Log 2008). 59