Abstract
Maritime piracy has been on the rise for many years. Although public data on piracy attacks and piracy networks is limited, we have attempted to apply some new methodological tools to determine as far as possible the properties of these complex systems. In particular, by employing extremal statistics and following the work of Clauset and Gleditsch on land-based terrorist organizations, we attempt to characterize the relationship between the severity and frequency of maritime piracy attacks. In addition, utilizing social network analysis, we have aimed at accurately visualizing and representing key characteristics of maritime piracy as well as discerning non-obvious or emergent patterns of behavior and organizational structure specific to piracy networks as defined by their geographic location in Appendix I (i.e., West Africa, East Africa, and The Straits of Malacca and Lombok). In Appendix II, we plot the distribution of attacks by region, showing how counter-intuitive the patterns are and how profoundly they differ from the land-based patterns uncovered by Clauset et al. Finally, in Appendix III, Britten Schear reviews the unique historical factors which characterize Somali piracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The International Maritime Bureau’s Piracy Reporting Center (IMB-PRC), a private organization that monitors piracy incidents all over the world, defines “piracy” as “an act of boarding or attempting to board any ship with the intent to commit theft or any other crime and with the intent or capability to use force in the furtherance of that act” [2].
References
Clauset, A., & Gleditsch, K. S. (2009). The developmental dynamics of terrorist organizations. Retrieved from arXiv:0906.3287v1 [physics.soc-ph]: http://arxiv.org/abs/0906.3287
Abhyankar, J. (2001). Piracy and ship robbery: A growing menace. In H. Ahmad & A. Ogawa (Eds.), Combating piracy (p. 11). Tokyo: The Okazaki Institute.
Moffat, J., & Passman, M. (2004). Metamodels and emergent behaviour in models of conflict. Simulation Modelling Practice and Theory, 12(7–8), 579–590.
Hanneman, R. A., & Riddle, M. (2005). Introduction to social network methods. Riverside: University of California Riverside.
Fellman, P. V. (2011). The complexity of terrorist networks. International Journal of Networking in Virtual Organizations, Inderscience, 8(1–2), 4–14.
Carley, K., Dombroski, M., Tsvetovat, M., Reminga, J., & Kamneva, N. (2003). Destabilizing dynamic covert networks. In Proceedings of the 8th international command and control research and technology symposium, National Defense War College, Washington. http://www.casos.cs.cmu.edu/publications/resources_others/a2c2_carley_2003_destabilizing.pdf
Chalk, P. (2008). The maritime dimension of international security: Terrorism, piracy, and challenges for the United States. The RAND Corporation Monograph Series. http://www.rand.org
McNamara, R. (2012). The United States fought wars against North African pirates in the early 1800s: Thomas Jefferson wouldn’t give in to the Barbary pirates. 19th Century History. http://history1800s.about.com/od/americanwars/tp/barbarywars.htm.
Lunsford, V. (2008). Historical piracy provides lessons for dealing with today’s Somali Pirates. In N. Berlatsky (Ed.), From piracy on the high seas. Farmington Hills: Greenhaven Press, 2010.
Bahadur, J. (2011). The pirates of Somalia: Inside their hidden world. New York: Pantheon Books.
United States Forces, Somalia. (2003). After Action Report and historic overview: The United States Army in Somalia, 1992–1994. Washington, D.C.: Center of Military History.
Subcommittee on Coast Guard and Maritime Transportation. (2011). Assuring the Freedom of Americans on the High Seas: The United States Response to Piracy. U.S. House of Representatives, 15 March 2011.
13. Phillips, R. (2010). A captain’s duty. New York: Hyperion.
Somalia: Expanding Crisis in the Horn of Africa. (2006). Congressional hearing. Joint hearing before the subcommittee on Africa, global human rights and international operations and the subcommittee on international terrorism and nonproliferation. 109th Congress. 29 June.
IMB Piracy Reporting Center. (2012). http://www.icc-ccs.org/piracy-reporting-centre.
Gettleman, J. (2010). “The Pirates are Winning”, New York review of books. New York Times, 14 October 2010.
Brown, N. (2010). Fighting the hydra: Multinational piracy operations move inshore. International Defense Review, 11 August 2010.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix I: Geographic Charts (Figs. 10.8, 10.9, 10.10, and 10.11)
Appendix II: Seasonality of Attacks by Region (Figs. 10.12, 10.13, 10.14)
Appendix III: Understanding the Somali Threat
By Britten Schear, American Public University System, School of Global and Security Studies.
Once you have a ship, it’s a win–win situation. We attack many ships every day, but only a few are ever profitable. No one will come to the rescue of a third-world ship with an Indian or African crew, so we release them immediately. But if the ship is from Western country or with valuable cargo like oil, weapons or … then it’s like winning a lottery jackpot. We begin asking a high price and then go down until we agree on a price.
-Somali pirate, interviewed July 28, 2009
(Shachtman, Wired Magazine)
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this chapter
Cite this chapter
Fellman, P.V., Frutos, D., Thanakijsombat, T.“., Teekasap, P., Schear, B. (2015). The Landscape of Maritime Piracy and the Limits of Statistical Prediction. In: Fellman, P., Bar-Yam, Y., Minai, A. (eds) Conflict and Complexity. Understanding Complex Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-1705-1_10
Download citation
DOI: https://doi.org/10.1007/978-1-4939-1705-1_10
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-1704-4
Online ISBN: 978-1-4939-1705-1
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)