22 Jan 2021 | 11:26 AM UTC
Saudi Arabia: Saudi naval forces intercept two WBIEDs in the Red Sea Jan. 22
Saudi naval forces intercept and destroy two suspected Al-Houthi WBIEDs in the southern Red Sea late Jan. 22. Increased security likely.
Event
Saudi naval forces reported that they intercepted and destroyed two waterborne improvised explosive devices (WBIEDs) in the Red Sea, Jan. 22. Though no group has formally claimed responsibility for the attempted attack, Saudi officials have attributed the incident to the Al-Houthi rebels. The Saudi-led coalition frequently accuses the Al-Houthi rebels of using the coastline around Yemen's Al-Hudaydah Port City as a base of operations to launch such attacks. There were no immediate reports of casualties or damage.
Saudi authorities will likely increase naval and aerial surveillance in the coming days. The incident will likely prompt heightened security measures and could possibly disrupt shipping and maritime transport in the area.
Context
Saudi authorities have condemned Al-Houthi activities in the Red Sea as a threat to navigation and global trade. Commercial and military ships have previously come under attack off the coast of Yemen as an extension of the continuing conflict in that country. A large international force composed of EU Naval Force (EU NAVFOR) surface combat vessels, auxiliary ships, and maritime patrol and reconnaissance aircraft, as well as naval assets from a range of countries - including China, India, Japan, South Korea, Saudi Arabia, and Russia - conduct counterpiracy operations in the Arabian Sea, Gulf of Aden, and the southern Red Sea. The presence of international forces has significantly reduced maritime incidents in these areas since the problem peaked in 2011, but the civil war in Yemen has created new security challenges, particularly in the Gulf of Aden, the southern Red Sea, and the heavily trafficked Bab al-Mandab Strait.
Advice
Exercise caution and reconfirm routes with maritime authorities if transiting or shipping freight near the Red Sea.