Skip to main content

The Landscape of Maritime Piracy and the Limits of Statistical Prediction

  • Chapter
Conflict and Complexity

Abstract

Maritime piracy has been on the rise for many years. Although public data on piracy attacks and piracy networks is limited, we have attempted to apply some new methodological tools to determine as far as possible the properties of these complex systems. In particular, by employing extremal statistics and following the work of Clauset and Gleditsch on land-based terrorist organizations, we attempt to characterize the relationship between the severity and frequency of maritime piracy attacks. In addition, utilizing social network analysis, we have aimed at accurately visualizing and representing key characteristics of maritime piracy as well as discerning non-obvious or emergent patterns of behavior and organizational structure specific to piracy networks as defined by their geographic location in Appendix I (i.e., West Africa, East Africa, and The Straits of Malacca and Lombok). In Appendix II, we plot the distribution of attacks by region, showing how counter-intuitive the patterns are and how profoundly they differ from the land-based patterns uncovered by Clauset et al. Finally, in Appendix III, Britten Schear reviews the unique historical factors which characterize Somali piracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.00
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The International Maritime Bureau’s Piracy Reporting Center (IMB-PRC), a private organization that monitors piracy incidents all over the world, defines “piracy” as “an act of boarding or attempting to board any ship with the intent to commit theft or any other crime and with the intent or capability to use force in the furtherance of that act” [2].

References

  1. Clauset, A., & Gleditsch, K. S. (2009). The developmental dynamics of terrorist organizations. Retrieved from arXiv:0906.3287v1 [physics.soc-ph]: http://arxiv.org/abs/0906.3287

  2. Abhyankar, J. (2001). Piracy and ship robbery: A growing menace. In H. Ahmad & A. Ogawa (Eds.), Combating piracy (p. 11). Tokyo: The Okazaki Institute.

    Google Scholar 

  3. Moffat, J., & Passman, M. (2004). Metamodels and emergent behaviour in models of conflict. Simulation Modelling Practice and Theory, 12(7–8), 579–590.

    Article  Google Scholar 

  4. Hanneman, R. A., & Riddle, M. (2005). Introduction to social network methods. Riverside: University of California Riverside.

    Google Scholar 

  5. Fellman, P. V. (2011). The complexity of terrorist networks. International Journal of Networking in Virtual Organizations, Inderscience, 8(1–2), 4–14.

    Article  Google Scholar 

  6. Carley, K., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing dynamic covert networks. In Proceedings of the 8th international command and control research and technology symposium, National Defense War College, Washington. http://www.casos.cs.cmu.edu/publications/resources_others/a2c2_carley_2003_destabilizing.pdf

  7. Chalk, P. (2008). The maritime dimension of international security: Terrorism, piracy, and challenges for the United States. The RAND Corporation Monograph Series. http://www.rand.org

  8. McNamara, R. (2012). The United States fought wars against North African pirates in the early 1800s: Thomas Jefferson wouldn’t give in to the Barbary pirates. 19th Century History. http://history1800s.about.com/od/americanwars/tp/barbarywars.htm.

  9. Lunsford, V. (2008). Historical piracy provides lessons for dealing with today’s Somali Pirates. In N. Berlatsky (Ed.), From piracy on the high seas. Farmington Hills: Greenhaven Press, 2010.

    Google Scholar 

  10. Bahadur, J. (2011). The pirates of Somalia: Inside their hidden world. New York: Pantheon Books.

    Google Scholar 

  11. United States Forces, Somalia. (2003). After Action Report and historic overview: The United States Army in Somalia, 1992–1994. Washington, D.C.: Center of Military History.

    Google Scholar 

  12. Subcommittee on Coast Guard and Maritime Transportation. (2011). Assuring the Freedom of Americans on the High Seas: The United States Response to Piracy. U.S. House of Representatives, 15 March 2011.

    Google Scholar 

  13. 13. Phillips, R. (2010). A captain’s duty. New York: Hyperion.

    Google Scholar 

  14. Somalia: Expanding Crisis in the Horn of Africa. (2006). Congressional hearing. Joint hearing before the subcommittee on Africa, global human rights and international operations and the subcommittee on international terrorism and nonproliferation. 109th Congress. 29 June.

    Google Scholar 

  15. IMB Piracy Reporting Center. (2012). http://www.icc-ccs.org/piracy-reporting-centre.

  16. Gettleman, J. (2010). “The Pirates are Winning”, New York review of books. New York Times, 14 October 2010.

    Google Scholar 

  17. Brown, N. (2010). Fighting the hydra: Multinational piracy operations move inshore. International Defense Review, 11 August 2010.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Philip Vos Fellman .

Editor information

Editors and Affiliations

Appendices

Appendix I: Geographic Charts (Figs. 10.8, 10.9, 10.10, and 10.11)

Fig. 10.8
figure 8

Malacca Straits

Fig. 10.9
figure 9

Indonesia

Fig. 10.10
figure 10

Nigeria

Fig. 10.11
figure 11

Somalia

Appendix II: Seasonality of Attacks by Region (Figs. 10.12, 10.13, 10.14)

Fig. 10.12
figure 12

Malacca Straits

Fig. 10.13
figure 13

Indonesia

Fig. 10.14
figure 14

Nigeria

Appendix III: Understanding the Somali Threat

By Britten Schear, American Public University System, School of Global and Security Studies.

Once you have a ship, it’s a win–win situation. We attack many ships every day, but only a few are ever profitable. No one will come to the rescue of a third-world ship with an Indian or African crew, so we release them immediately. But if the ship is from Western country or with valuable cargo like oil, weapons or … then it’s like winning a lottery jackpot. We begin asking a high price and then go down until we agree on a price.

-Somali pirate, interviewed July 28, 2009

(Shachtman, Wired Magazine)

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this chapter

Cite this chapter

Fellman, P.V., Frutos, D., Thanakijsombat, T.“., Teekasap, P., Schear, B. (2015). The Landscape of Maritime Piracy and the Limits of Statistical Prediction. In: Fellman, P., Bar-Yam, Y., Minai, A. (eds) Conflict and Complexity. Understanding Complex Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-1705-1_10

Download citation

Publish with us

Policies and ethics