U.S. Navy Diverts Ship to Indian Ocean in Hunt for Malaysian Flight MH370

U.S. Navy photo by Mass Communication Specialist Seaman Apprentice Carla Ocampo

AA Font size + Print

U.S. officials announced Thursday the Navy is shifting its search efforts in Malaysia further westward. By Ben Watson

The search for any sign of missing Malaysian Airlines flight MH370 has expanded to the Indian Ocean and the U.S. is “consulting with international partners about the appropriate assets to deploy,” White House spokesman Jay Carney said Thursday.

Officials at the Pentagon said it would take about 24 hours before the guided-missile destroyer, USS Kidd, arrives in this new area of interest — which they said is located approximately where the Andaman Sea meets the Indian Ocean. A Navy P-3C Orion surveillance plane started combing the waters off western Malaysia in the northern Straits of Malacca and the Andaman Sea as early as Monday, according to the Navy’s 7th Fleet. That search has turned up nothing so far.

The plane’s original flight path led it over the Gulf of Thailand, above portions of Vietnam and the South China Sea before flying over China on its way to Beijing. On Tuesday, new radar information suggested the flight had taken a sudden an inexplicable westward turn hundreds of miles off course for 90 minutes with its transponder turned off. 

The interest Thursday in pivoting naval resources westward from the Gulf of Thailand comes in response to what Carney called “new information that’s not necessarily conclusive, but new information.” Officials told ABC News that a signal from flight MH370 registered on U.S. satellites at least four hours after losing contact with radar early Saturday morning.

The U.S. Navy has three ships in the region, as well as six aircraft designed for reconnaissance and rescue missions. But beginning Friday, the USS Pinckney, also a guided-missile destroyer, will be taking its two Seahawk helicopters and roughly 300 sailors out of the search area for scheduled repairs in Singapore.

The efforts this week have brought together a dozen countries and nearly 80 combined ships and aircraft. Despite numerous false leads and growing Chinese frustration with the Malaysian government, no sign of the plane has been found.

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.