Intelligence Collection in the Territorial Sea: Concepts and Complexities

By IndraStra Global Editorial Team

Cover Image Attribute: A file photo of a crewman aboard the Japanese Coast Guard Cutter Mizuho, prepares an HH-65 Dolphin helicopter, from Air Station Barbers Point, Hawaii, to landing on the Mizuho. Source: Coast Guard photo by Petty Officer Jonathan R. Cilley, Nagoya, 16 October 2007, Wikimedia Commons
Cover Image Attribute: A file photo of a crewman aboard the Japanese Coast Guard Cutter Mizuho, prepares an HH-65 Dolphin helicopter, from Air Station Barbers Point, Hawaii, to landing on the Mizuho. Source: Coast Guard photo by Petty Officer Jonathan R. Cilley, Nagoya, 16 October 2007, Wikimedia Commons

States possess a well-established legal competence over their territorial domains, which encompass internal waters, archipelagic waters, and the territorial sea. This realm of control is often called "sovereignty," a term that encapsulates a coastal state's inherent rights and responsibilities within its territory. These rights grant considerable discretion and freedom in managing their land and waters' internal affairs and resources. This authority, known as "imperium," embodies the capacity for governance, administration, and jurisdiction, a prerogative typically regarded as exclusive.


The concept of sovereignty and its exercise within a state's territory have wide-ranging implications, especially when it comes to intelligence collection activities conducted in the territorial sea. This article delves into the intricacies of intelligence collection within this sensitive maritime zone, exploring the legal frameworks, challenges, and the balance between national security imperatives and international norms.



The Territorial Sea and Sovereignty



The territorial sea is integral to a coastal state's sovereignty, extending up to 12 nautical miles (22.2 kilometers) from its baseline. Within this belt of water, the coastal state exercises a high degree of authority, including control over navigation, customs, immigration, and, notably, the regulation of intelligence collection activities.



Illustration's Attributes: UNCLOS Maritime Zones / Source: Byju's

The term "intelligence collection" encompasses a wide range of activities conducted by states to gather information crucial for their national security and strategic interests. These activities can encompass signals intelligence (SIGINT), human intelligence (HUMINT), imagery intelligence (IMINT), and various other methods. However, the question of how far a coastal state's sovereignty extends into the territorial sea concerning intelligence collection is a subject of debate and international legal interpretation.



International Law and Intelligence Collection



International law, primarily the United Nations Convention on the Law of the Sea (UNCLOS), is the cornerstone for regulating activities in the territorial sea. UNCLOS outlines the rights and obligations of coastal states within their territorial sea while also recognizing the principle of innocent passage for foreign vessels.


Under UNCLOS, foreign vessels enjoy the right of innocent passage through the territorial sea, including navigation, overflight, and, by extension, activities not prejudicial to the coastal state's peace, good order, or security. This principle is vital for ensuring the freedom of navigation and maintaining peaceful relations between states.


However, the line between innocent passage and activities that may infringe upon a coastal state's national security interests can be blurred when it comes to intelligence collection. For instance, conducting espionage or military reconnaissance in the territorial sea may not fall within the scope of innocent passage, as these activities are inherently intrusive and may compromise a state's security.



Balancing National Security and International Norms



The balance between a coastal state's national security imperatives and its commitment to international norms is delicate. Coastal states have a legitimate interest in safeguarding their sovereignty, territorial integrity, and national security. Intelligence collection within the territorial sea is integral to protecting these interests.


At the same time, adherence to international law, including UNCLOS, is vital for maintaining peaceful relations among nations. Striking the right balance between intelligence collection and the principles of innocent passage is a complex endeavor that requires careful consideration of national security and international obligations.



Concepts and Complexities



1. The Concept of Innocent Passage


Innocent passage is a concept in international law that allows foreign ships to pass through another state's territorial sea, subject to certain conditions. 

According to the UNCLOS, the innocent passage is defined as "the right of ships to navigate through the territorial sea for the purpose of continuous and expeditious transit, which is not prejudicial to the peace, good order or security of the coastal State". 

However, UNCLOS also prohibits any act aimed at collecting information to prejudice the coastal state's defense or security. This means that while intelligence-gathering activities are not explicitly banned during innocent passage, they must not be aimed at collecting information that could harm the defense or security of the coastal state. 

In practice, this can be a complex issue, as it may be difficult to distinguish between intelligence-gathering activities consistent with innocent passage and those not. For example, passive sensors such as radar and sonar emissions may be essential for safe transit through the territorial sea. Still, they may also be used to learn about the operational forces of the coastal state, which would be inconsistent with innocent passage. 

2. The Concept of Maritime Domain Awareness (MDA)


Maritime Domain Awareness (MDA) refers to the practical understanding of anything associated with the global maritime domain that could impact a country's security, safety, economy, or environment. During innocent passage, vessels are entitled to collect certain operational information to facilitate their transit, which can contribute to MDA. 

According to the article by American scholar and a distinguished professor of public international maritime law James Kraska, ships engaged in innocent passage are entitled to collect information about the maritime environment, including weather and oceanographic characteristics, such as currents and tides, land features, shoals and reefs, other ships in the area, shipping traffic patterns, and harbors and roadsteads, to facilitate their passage. This information can be used to ensure safe navigation and avoid hazards, which is essential for the success of the passage. Ships routinely collect weather and marine environmental data, including navigational hazards, such as territorial features and rocks, low-tide elevations, and submerged features. This information can be used to create nautical charts and other resources that can be used by other ships in the future, contributing to MDA. 

Potential issues with MDA during Innocent Passage

One potential issue with MDA during innocent passage is that the collection of information about the maritime environment could be perceived as a threat to the security of the coastal state. While ships engaged in the innocent passage are entitled to collect certain operational information to facilitate their transit, this information must not be used to gather intelligence that could harm the defense or security of the coastal state.

Another potential issue is that the collection of information about the maritime environment could be used for purposes other than innocent passage. For example, information about shipping traffic patterns and harbors could be used to plan military operations or to support illegal activities such as smuggling or piracy. 

Additionally, collecting information about the maritime environment could be used to assert territorial claims or challenge the coastal state's sovereignty. For example, if a ship gathers information about the location of submerged features or low-tide elevations, this information could support a territorial claim or challenge the coastal state's sovereignty over the area. 

3. Disguised Maritime Boundary Disputes


Disguised maritime boundary disputes refer to disputes over naval boundaries disguised as disagreements over intelligence collection in the territorial sea. In some cases, states may use intelligence collection activities as a pretext to assert territorial claims or to challenge the sovereignty of another state over a particular area of the sea. For example, a state may claim that a foreign ship engaged in intelligence collection activities in its territorial sea when the vessel was engaged in innocent passage and was not collecting intelligence that could harm the defense or security of the coastal state. This claim could be used to assert territorial claims or challenge the foreign state's sovereignty over the area in question. 

Note these kinds of disputes can be challenging to resolve, as they often involve complex legal and political issues. In some cases, states may resort to diplomatic or military measures to assert their claims or defend their sovereignty over a particular sea area. 

4. Non-Innocent Passage in the Territorial Sea


Non-innocent passage in the territorial sea refers to the passage of a foreign ship through the territorial sea of another state in a manner that is not consistent with the principles of innocent course. Non-innocent passage can include activities aimed at collecting information to the prejudice of the defense or security of the coastal state or actions that are otherwise inconsistent with the right of innocent passage. 

Examples of non-innocent passage can include using force against the coastal state, carrying weapons of mass destruction, smuggling of goods or people, or violating environmental or other laws of the coastal state. It can also include activities not explicitly prohibited by UNCLOS but inconsistent with the principles of innocent course, such as using submarines or other underwater vehicles to navigate the territorial sea. Non-innocent passage is not protected by international law and can be subject to enforcement measures by the coastal state, including the use of force in certain circumstances. 

However, the coastal state must ensure that its enforcement measures are proportional to the nature and severity of the non-innocent passage and that they do not harm the safety of navigation or the rights of innocent course of other ships. 

IndraStra Global is now available on
Apple NewsGoogle News, Flipboard, RSS, and Telegram

COPYRIGHT: This article is published under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. https://creativecommons.org/licenses/by-nc-nd/4.0/

REPUBLISH: Republish our articles online or in print for free if you follow these guidelines. https://www.indrastra.com/p/republish-us.html
Name

-51,1,3D Technology,2,5G,10,Abkhazia,2,Abortion Laws,1,Academics,11,Accidents,22,Activism,1,Adani Group,6,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,36,Aerospace,5,Afghanistan,88,Africa,114,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,3,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,83,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,71,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,8,Australia,58,Austria,1,Automation,13,Automotive,133,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Bali,1,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,4,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,105,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,5,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1230,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,56,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Chemistry,1,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,587,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,27,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,45,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,13,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,2,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,17,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Exeperience,1,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,116,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,4,DACA,1,Dagestan,1,DARPA,3,Data,9,Data Analytics,36,Data Center,3,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,2,Digital Economy,11,Digital Marketing,7,Digital Transformation,11,Diplomacy,14,Diplomatic Row,4,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,49,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,4,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,Ebrahim Raisi,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,44,Economy,111,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,58,Education,67,EFTA,1,Egypt,28,Election Disinformation,1,Elections,49,Electric Vehicle,15,Electricity,7,Electronics,9,Emerging Markets,1,Employment,21,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,4,Eulogy,4,Eurasia,3,Euro,6,Europe,15,European Union,236,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1396,Federal Reserve,4,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,60,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,2,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,36,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,23,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gambling,1,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,8,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,10,Georgia,12,Georgian,1,geospatial,9,Geothermal,2,Germany,71,Ghana,3,Gibratar,1,Gig economy,1,Glaciology,1,Global Perception,1,Global Trade,98,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,Government Bond,1,GPS,1,Greater Asia,178,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,2,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,2,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,5,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,77,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,73,India,673,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,28,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,8,Indonesia,21,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,35,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,207,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,92,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Julian Assange,1,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,84,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,3,Lugansk,2,Macedonia,1,Machine Learning,8,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,16,Marijuana,1,Marine Biology,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,30,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medical,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,11,Military Service,2,Military-Industrial Complex,3,Mining,16,Missile Launching Facilities,6,Missile Systems,57,Mobile Apps,3,Mobile Communications,12,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,3,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,16,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Aviation,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1290,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Noble Prize,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,54,North Korea,59,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,6,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,384,Oil Gas,7,Oil Price,74,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,130,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,701,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,182,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,15,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,Preprint,1,President APJ Abdul Kalam,2,Presidential Election,31,Press Release,158,Prison System,1,Privacy,18,Private Equity,3,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,13,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,8,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,4,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,7,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,50,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,25,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,320,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,6,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,401,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,21,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Smartphones,1,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,17,Somalia,5,South Africa,20,South America,48,South Asia,482,South China Sea,36,South East Asia,78,South Korea,64,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Education,1,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,24,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,6,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,34,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,78,Testing,2,Texas,3,Thailand,11,The Middle East,656,Think Tank,317,Tibet,3,TikTok,2,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,21,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,140,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,26,Ummah,1,UNCLOS,7,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,85,United Nations,28,United States,773,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,22,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,20,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,18,Water Politics,8,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,Whales,1,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,2,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,38,World Economy,33,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: Intelligence Collection in the Territorial Sea: Concepts and Complexities
Intelligence Collection in the Territorial Sea: Concepts and Complexities
By IndraStra Global Editorial Team
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz-1LmhW_DD6vRbHzJ6EYFH5vFeEajtDP0eIo4Eyr0QPJGtG6wXl2nmUpL3WYoLqutsv3qJ9U_MKx1Y4mvFQmIM0UbZHxMMD8U1SUFXsI_vUkUGOerZWInyi3_7Zd2SLDKH6wSjMHUjICWxM4Lnst-hjVacRoEI_sDIiZB8MFEiSAOH6VmXxPrixUWKp0/w640-h430/Japanese_Coast_Guard_DVIDS1084425.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz-1LmhW_DD6vRbHzJ6EYFH5vFeEajtDP0eIo4Eyr0QPJGtG6wXl2nmUpL3WYoLqutsv3qJ9U_MKx1Y4mvFQmIM0UbZHxMMD8U1SUFXsI_vUkUGOerZWInyi3_7Zd2SLDKH6wSjMHUjICWxM4Lnst-hjVacRoEI_sDIiZB8MFEiSAOH6VmXxPrixUWKp0/s72-w640-c-h430/Japanese_Coast_Guard_DVIDS1084425.jpg
IndraStra Global
https://www.indrastra.com/2023/09/intelligence-collection-in-territorial.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2023/09/intelligence-collection-in-territorial.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content