Welcome back to India Defence Online...If you haven't done so yet, subscribe to the RSS feed as it will save you a lot of time. Thanks for following the site!
The military ties between the Indian and US military continue to become stronger this year , as the Indo-US joint army drills reached a record high and the Indian Navy prepares for the Malabar naval wargames to be held shortly. But currently, India is looking towards the US Navy and its “global submarine rescue fly-away kit service” for the Indian Navy and its sailors.
A similar contract for rescue service was signed with the US more than a decade back. During that time, it was done as a provisional measure till the Indian Navy acquired their own deep submergence rescue vessels (DSRV).
However, the Indian Navy has still not deployed the crucial DSRVs in its fleet and its sailors remain vulnerable to danger in the event of an underwater catastrophe. Hence, it will have to rely on the US Navy and its search and rescue capabilities. As per the agreement, the US navy is supposed to fly either a DSRV or a ‘submarine rescue chamber’ to an Indian port or airport nearest to the mishap site within 72 hours.
Currently, the US and Indian Navy are ready for the annual India-US naval ‘Malabar’ exercise to be held between April 22 to May 2, in Goa. The Malabar exercise will be wargames and joint programmes with Indian and American warships and submarines. These exercises aim to promote ‘interoperability’ between the two navies and the Indian and US navies are deploying four big ships and a submarine each.
The US Chief of Naval Operations Admiral Gary Roughead will hold talks with the Indian Defence Minister A.K.Anthony as he arrives in India just ahead of the Malabar naval programme in India. The issues that will be discussed will include combating terrorism and piracy in the seas as well as the extension of the scope of the “global submarine rescue fly-away kit service” from the US Navy.
No related posts.
Related posts brought to you by Yet Another Related Posts Plugin.
![Reblog this post [with Zemanta]](http://img.zemanta.com/reblog_e.png?x-id=c0049ea6-0668-4a83-bbc8-69683573015c)
