Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

Episode 345: Fisheries as a Strategic Maritime Resource

  • Broadcast in Military
  • 0 comments
Sal and EagleOne

Sal and EagleOne

×  

Follow This Show

If you liked this show, you should follow Sal and EagleOne.
h:100043
s:9192377
archived

We live in a crowded world with limited resources. What happens when this meets modern technology's ability to shorten the time/distance equation and increase the ability to know of what lies below the waves?

What complications do we fine when the above two points meet up with the eternal search by growing nations to reach for the seas to support their homeland's growing needs?  

As populations demand more protein in their diets as per capita incomes rise, many nations see the open seas as the best place to fill that demand. With more competing for shrinking resources, can fishing be seen as a security threat? How does it impact coastal states' economic, food, and environmental security? What are the roles of transnational organized crime and state power in this competition. Is international law being strengthened to meet this challenge, or is the challenge undermining the rule of law?  More than last century's quaint "Cod Wars," does this have the potential trigger to broader, more serious conflict?

Our guest to discuss this and more will be Scott Cheney-Peters, LCDR, USNR.

Scott serves as a civil servant at the State Department, and is the founder of the Center for International Maritime Security (CIMSEC).

Scott's active duty service at sea included the USS Fitzgerald (DDG 62) and USS Oak Hill (LSD 41).  His shore duty before leaving active service was in Washington, DC, where he served as the editor of Surface Warfare magazine. 

Scott graduated from Georgetown University with a B.A. in English and Government and holds an M.A. in National Security and Strategic Studies from the U.S. Naval War College. Scott researches issues affecting Asian maritime security and national security applications of emerging technology. 

Comments

 comments