Abstract
Shipping is the backbone of international trade and oil companies want their oil tankers to arrive safely. The safety and security of international shipping of crucial elements such as oil has always been important aspect in the landscape of piracy. The implications of piracy attacks are linked with loss of cargo or personnel, economic and environmental catastrophe. Despite maritime piracy being a major concern to international trade, no comprehensive study considers the causing factors and spatio-temporal patterns that influence the choice of attack areas. Thus, this research expands our understanding on the areas where piracy mainly occurs, and its underlying causes. To achieve these objectives, AHP and spatio-temporal analysis applied by using data from the National Geospatial-Intelligence Agency. The results indicate that territorial waters are preferable areas; thus, pirates prefer to attack the ships close to the coastline fewer times near ports, and rarely in international waters. This is in line with the spatio-temporal analysis results that show that pirates except for the Arabian sea prefer to hit close to the coastline of countries that face political instability, lack of properly functioning government and extreme poverty. Moreover, pirates in certain areas are influenced by the activity and the information from other pirates, which can be used as tool from the authorities e.g., derive information from pirates that have been arrested. Overall, this study contributes on the literature of maritime piracy, and it could be used to enhance security and build tailored defense strategies in perilous water areas.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Global transportation, particularly sea transportation of crude oil, plays an important role in global oil industry supply chain management. However, maritime transportation can be dangerous e.g., piracy, natural disasters, vessel collisions (Lim et al., 2018). Maritime piracy is a pressing global issue and can be defined as “an act of boarding or attempting to board any ship with the apparent intent to commit theft or any other crime and with the apparent intent or capability to use force in the furtherance of that act” (International Maritime Bureau, 2009, cited in Hassan & Hasan, 2017, pp. 4–5). Despite that the number of worldwide maritime piracy incidents per year declined, it continues to be a threat impacting significantly companies dealing with the production and distribution of oil, leading to several social and political impacts, since oil and all energy, either primary or secondary, sources (e.g. natural gas, renewables, electricity and so on), are important production factors, they are interconnected within our society, and have strong environmental externalities (Agliardi et al., 2019; Alexopoulos, 2017).
195 maritime piracy attacks reported in 2021, and the Gulf of Guinea has been indicated as the world’s most dangerous shipping route (IMB, 2021). One of the most important causes of piracy in this area is the opportunity i.e., favorable geophysical attributes and laws against maritime piracy (Murphy, 2007). For example, the high unemployment rates, inadequate law enforcement, unregulated oil market capacity, corruptible officials, enable pirates in the Gulf of Guinea to move stolen products back onto legitimate markets (European Union, 2020). This area is a transit point in the illicit trade of oil out of Africa that costs annually African countries around $524 million on counter-piracy efforts (Stable Seas, 2021). COVID-19 increased sea-piracy incidents in Nigeria (Gold et al., 2023). Similarly, the Southern Gulf of Mexico has recently received attention as four attacks reported in a span of 11 days in April 2020. The maritime piracy in the Gulf of Mexico and Caribbean can be attributed to a number of factors such as the Covid-19 pandemic, lack of the necessary resources and capabilities to adequately detect and respond to these attacks (Drake, 2021). It is supported that this region will continue to be a hotspot in the future, but more will also emerge. For example, Russia's war in Ukraine that caused the rising of crude oil prices might lead to piracy attacks on tankers in Asia (Concepcion, 2021). All these incidents lead to severe risks in terms of safety, delays and increasing cost (e.g. the insurance cost of oil tankers is rising, cost of the wide range of interventions, such as naval patrols cost of re-routing); currently worldwide is a loss of nearly $25 billion per year (Fan et al., 2022).
Despite the importance of maritime piracy and the rise of the incidents in 2020, it is worth noting that there is not much research in the specific area and there are a few outdated studies concerned with patterns of maritime attacks (Marchione & Johnson, 2013; Townsley & Oliveira, 2015). Moreover, most of the papers focus only on a particular area to trace the evolution of maritime piracy e.g., Nigeria (Otto, 2014) and lacked a holistic view of maritime piracy. Last but not least, despite a few studies identifying the maritime piracy prone areas, but they do not explore the characteristics of the piracy within these vulnerable areas. Therefore, there is a lack of global-based studies that provide a complete overview of maritime incidents, in terms of the hotspot areas, and the characteristics of incidents within the identified areas. In response to this research gap, the aim of this paper is to analyze maritime piracy concentration and hot spot dynamics to better inform piracy prevention and reduction strategies. In this sense, our paper is guided by the following research questions (RQs):
-
RQ1 Where are the hotspots of maritime piracy?
-
RQ2 What are the main causes of maritime piracy?
-
RQ3 Are there any patterns and dependencies in the timing and location of incidents of maritime piracy?
Therefore, this study aims to explore maritime piracy (attempted and completed attacks) with a particular focus on oil tankers rather than vessels carrying other products. This type of commodity is desirable for pirates as it has high value and they can easily sell it on the black market and the ship itself is also valuable (Robitaille et al., 2020).
A hybrid two-phased method applied to answer the above RQs of the study. First, an Analytic hierarchy process (AHP) used in this paper, developed by Saaty in 1977 which is an effective decision-making tool used in complex situations (Pereira & Bamel, 2022), in order to set priorities by developing a weighted multi-criteria model to identify the prominent factors of maritime piracy. This model contains all the influencing factors (i.e., zone, security, time, distance) according to their importance (weighted factor approach).
Moreover, kernel density estimation (KDE) is applied to estimate the concentration of maritime piracy incidents at each grid and visualize it, attempting to identify potential regional patterns. Apart from spatial hotspot identification, in this study the temporal component of piracy events is considered in order to explore whether dynamic causal relationships exist. Last but not least, a joint spatial and temporal analysis is introduced to shed light to underlying common pirate networks or persons.
The recognition of ‘hotspots’ in terms of time and space concentrations will enable the deployment of resources to prevent the generation of piracy attacks. Moreover, the identification and explanation of emerging piracy patterns enable the effective planning of a functional environment in order to minimize the vulnerability of certain locations to maritime piracy. The paper begins by examining the existing literature and methodologies applied to explore maritime piracy. Then Sect. 3 discusses the methods employed by the present study to address the above RQs. Next, the results are presented and discussed in Sects. 4 and 5. The paper concludes with Sect. 7 that entails the conclusions, limitations of the study and opportunities for further research.
2 Literature review
Between 2015 and 2020 most piracy attacks emerged in bulk carriers in March, April, and May in 2015 in Southeast Asian waters (Ece & Kurt, 2021). A recent study also highlighted that pirate attacks on ships are more prone to Southeast Asian and African waters (Nwokedi et al., 2022). Maritime piracy impacts the whole supply chain, and several companies demand assurance of security by identifying the factors that make these ships vulnerable to piracy.
The causes, implications and mitigations strategies of maritime piracy are discussed in the remainder of this section as well as the main methodologies and tools applied in this research field.
2.1 Causes of maritime piracy attacks
There are various root causes of piracy which makes it a multidimensional phenomenon, and each cause are not stand-alone but are interconnected with one another. There are macro-level determinants (e.g. political, economic stability, socioeconomic conditions, geographic location, moral values) and micro-level determinants (e.g., vessel type, size, and voyage) of marine piracy (Jin et al., 2021). For example, Jiang and Lu (2020) developed a probability prediction model based on a Bayesian Network (BN) to investigate the causal factors of piracy in Southeast Asia and found that the main factors are the environment, ship's features and anti-piracy measures. Özdemir and Güneroğlu (2017) applied fuzzy AHP and fuzzy TOPSIS methods and identified the major causing factor of piracy namely economic insufficiency and as less significant factor the geographic location of the canals and straits.
2.2 Maritime piracy implications
Several studies also focused on the implications of maritime piracy. For example, Fu et al. (2010) developed a simulation model to explain the financial implications (e.g., increased cost of insurance, increased costs associated with ships being forced to take alternate routes) on the global shipping industry. Some studies that particularly concentrated on Somali piracy found that piracy led to increased shipping cost and decreased trade volumes (Besley et al., 2015; Burlando et al., 2015). Similar outcomes observed by the study of Bensassi (2012) who supported that hijacking is linked with decrease in exports and Shepard and Pratson (2020) who found that higher pirate attack rate is associated with a 7.5-vessel reduction in tanker traffic. Other studies highlighted that piracy prone waters led decision makers to increase the voyage length in order to avoid high-piracy areas (Dinwoodie et al., 2013; Vespe et al., 2008). Last but not least, a few studies also highlight the impacts on seafarer’s wellbeing and the associated human cost (Abila & Tang, 2014; Seyle et al., 2018).
2.3 Strategies to counteract maritime piracy
Apart from recognizing the oil theft causing factors and its impacts, studies also discussed some of the countermeasures. Romsom (2022) discussed the need for innovative technology, processes, and transnational collaboration that promote and align economic and policy regimes which is in line with other studies (e.g., Osinowo, 2015). Bouejal et al. (2014) implemented a Bayesian network that considers different characteristics e.g., potential target, environmental constraints to identify appropriate countermeasures. Another study applied a Fuzzy AHP and found that international convention and policy, defense strategies when sailing, hardware and software, security plan, response ability, and communication facilities are the main elements that need to be considered to minimize piracy attacks (Tseng et al., 2021). Studies also suggested that anti-piracy operations, regulations and policies as well as coordination at domestic, regional, and international level enable the minimization and control of piratical activities (Ahmad, 2020). The presence of naval bases is crucial in supporting maritime forces combat piracy (Danzell et al., 2023). There is a need to reconsider and improve the legal system for maritime piracy by strengthening the universal jurisdiction (Jin & Techera, 2021). Last but not least, Hasan and Hasan (2017) focused on the Gulf of Guinea and supported the need of exploration of piracy-prone zones, the knowledge of the particular ship types, the economic support particularly of youthful population and information-sharing are some of the strategies that can be utilized to combat piracy.
2.4 Research approach and methodologies used to explore spatial and temporal patterns of maritime pirate attacks
Mathematical and agent-based models have been used to explore spatial and temporal patterns of maritime pirate attacks. Jakob et al. (2010) proposed a spatially explicit agent-based to help the visualization, anticipation and prevention of preventing pirate attacks. Vos Fellman et al. (2015) applied the social network analysis and visualized the maritime attacks by region, and its characteristics. Townsley and Oliveira (2015) utilized the rational choice theory and optimal foraging theory to explore space–time patterns of maritime piracy in Africa and confirmed that pirate activity clusters in space and time. Marchione et al. (2014) developed an agent-based model by focusing on the Gulf of Aden to investigate the geometry of shipping routes, seasonal variation of attacks, and show if the attacks differ by vessel type and state of registration, an approach that followed also by Mejia et al. (2009) who applied econometric analysis.
Tešić (2020) proposed a qualitative approach of computation-with-words approach to track maritime objects and identify attacks and decide on the countermeasures. Jin et al. (2021) classified piracy risk into macro-level and micro-level analyses and employed binary logistic regression model and found that small vessels and open registry vessels are more prone to be targeted by pirates. Desai and Shambaugh (2021) identified a pattern between the fish volumes caught using destructive and high-bycatch methods and piracy by conducting a geographically disaggregated analysis. Ofosu-Boateng (2017) focused particularly on oil maritime piracy. This study developed three models (Ordinal Logistic Regression, Bayesian Network Predictor, and Series Hazard Models) to forecast piracy attacks the next fifteen years in the Gulf of Guinea. Balogun (2018) applied the spectrum-based theory of enterprise, and Porter’s value chain to discuss oil theft, illicit business, and petro-piracy in the Gulf of Guinea.
Most of the studies focus on specific geographical areas (e.g., de Montclos, 2012; Nwalozie, 2020) thus they do not take a holistic approach for identifying global hotspots. Moreover, there are a few studies that rigorously explore in a quantitative way the causes of maritime piracy (Jiang & Lu, 2020; Özdemir & Güneroğlu, 2017). Previously published studies on the subject have been mostly restricted to show the patterns and the existence concentrations of maritime piracy without investigating in detail the determinants of their presence. In this sense, to the best of our knowledge, this study is unique as it explores the maritime piracy concentration by investigating clusters and causes of marine -piracy.
3 Data and empirical methodologies
3.1 Data description
In this study, AHP approach and spatial, temporal, and spatiotemporal analyses are performed, and described in the sub-sections below. This study used the National Geospatial-Intelligence Agency (NGIE) database that registers all the hostile acts worldwide against ships and mariners (NGIE, 2022). The focus of this study was only on attacks against fossil fuel transportation i.e., oil, (liquefied natural gas) LNG, oil products, etc., from 2000 until 2022. In total, 2145 relevant observations are found in the database. Each entry entails: the date, the location (coordinates and naval area), the attacker, the victim, and a description that shows if the hostile act was successful or not and if it took place underway or in position. The methods chosen in this study need the daily or monthly frequency of the incidents. However, the illicit oil flows are not officially recorded in that level of detail, so the current data are not appropriate for systematic analysis. To overcome this challenge, a proxy variable was selected i.e., a variable based on all the hostile acts against tankers because they disrupt directly or implicitly the supply of legitimate oil transportations in favor of illicit oil flows (Hatipoglu et al., 2022). In most cases, delaying fossil fuel transportation was the mildest repercussion, reaching total oil loss in the worst-case scenario.
3.2 AHP methodology
AHP is a widely used multi-criteria analysis method that considers both quantitative and qualitative criteria and helps users make better decisions (Saaty, 1987). This method has been applied in various fields e.g., decision theory, conflict resolution, and neuroscience (Vargas, 1990). The method is a framework in which a problem can be solved based on three principles: decomposition, comparative judgments, and composition. AHP uses the Eigenvalue approach to the pairwise comparisons and allows the user to develop a numeric scale in order to measure the qualitative or quantitative performance of criteria (Vaidya & Kumar, 2006). Table 1 shows the fundamental scale developed by Saaty. This scale explains the way that the criteria will be ranked from 1 to 9 and their interpretation. It should be underlined, that the ranking of the criteria is at the user's discretion, according to the general objective (focus of the problem).
AHP applied in this study to predict the behavior of the pirates/smugglers, which attack the ship, or the tankers carrying oil and then transport those ships to the endpoint. The endpoint i.e., final destination would be a warehouse or a safe port, in which the smugglers can offload the stolen oil and make the transaction with the buyer. The focus of this research is to identify the areas where pirates perform most of their attacks in order to help prosecution authorities enhance the degree of security in these specific regions. Based on previous studies four are the main factors that pirates consider before attacking a ship: (1) Security (i.e., if there are effective security measures for the smugglers or not—existence of prosecuting authorities), (2) Time (i.e., the time that the smugglers need for the operations), (3) Topography/area (e.g., wind, weather, underwater obstacles etc.), and (4) Fuel consumption.
Table 2 shows these criteria with respect to the overall focus of this study based on the numerical scale presented in Tables 1, 3, 4, 5 and 6 show the weights for alternatives, based on each criterion. For example, the topography criterion is considered to be “essential or strong importance” compared to time criterion.
Apart from the aforementioned causes of piracy, it has been supported that in terms of topography there are three areas that pirates/smugglers may prefer to perform their attack. These are: (1) Port areas, congested channels and checkpoints that the ship will pass through. (2) Territorial waters up to 12 nautical miles from the coastal baseline (without the port), (3) International waters which are located more than 12 nautical miles away from the costal baseline (Hastings, 2009). Based on these four criteria, underlying causes of piracy and the application of the AHP method, this study will be able to identify the area achieving the highest score which is the most preferable by pirates/smugglers. The procedure of setting weights in our work, is the one followed by Saaty [ref]. Additionally, the authors mention, that the weights were determined based on arguments and reasonable assumptions, as detailed herein, drawing on literature reports where experts’ opinions have already been taken into account.
A few assumptions made in this AHP application: (1) smugglers attack and seize the whole ship or (2) the oil that is being transferred. Further assumptions also made for the four criteria and discussed below:
-
(1)
Security: It is more secure for the smugglers to seize ships in: (a) territorial waters than in international waters and (b) international waters than in ports. Herein, we assume that it is much more dangerous for the pirates to attack in the ports, since the port authorities are based there. In addition, in territorial waters the ships move slower than in international waters and it is easier for the smugglers to board on it, thus minimizing the danger of engagement, and there is a lower level of security in comparison with international waters (Murphy, 2007).
-
(2)
Time: It is more time-consuming to seize ships in international waters, than in territorial waters and ports as the endpoints (e.g., warehouses etc.) that are needed to transfer the oil are on the land (Hastings, 2009).
-
(3)
Topography: Regarding challenges such as the wind, weather, underwater obstacles etc., it is better for smugglers to attack in the ports or territorial waters than in deep sea. Many incidents take place in or near narrow, congested channels that serve as chokepoints for world commerce, such as the Bab al-Mandab at the southern tip of the Red Sea, and the Phillips and Singapore Straits at the southern terminus of the Strait of Malacca in Southeast Asia. In such places, ships must slow down to navigate through shallow waters and underwater obstacles, and avoid other vessels, leaving them open to attack by land-based pirates (Murphy, 2009).
-
(4)
Fuel consumption: It is cheaper to attack ships near ports than in territorial or international waters because the end point is on land.
3.3 Spatial, temporal, and spatiotemporal analyses
Spatial analysis, a field of science to shed light on patterns and underlying processes of different phenomena in terms of space, includes several tools. In this analysis, we implement kernel estimators and K-means clustering. Both tools use in, at their core, the measure of distance between piracy hits. Their distinct difference lies in using a grid point in the former tool compared to using the entire region of study in the case of K-means. Simply put, kernel estimators output information on the density of events per grid. K-means works supplementarily by clustering these events based on their proximity to the entire area.
Kernel estimators attempt to describe hidden spatial point patterns in terms of their probability density functions p(s) and intensity functions λ(s). The probability density function is defined as the probability of observing a point, or in our case, an event, at a specific location of a study region. In contrast, the intensity function λ(s) is the expected number of events per unit area at this location of the study region. Said that we follow Waller and Gotway (2004), explore the existence of spatial point patterns in our data set N of 2145 point observations, and employ the abovementioned estimates of probability density function p(s) and intensity function λ(s) as follows:
where K (.) is the weight applied to the number of events yi located at our data point si based on the quartic kernel function, sg is the grid point derived from a grid we have generated to cover the area of interest, did is the Euclidean distance between our data point and the grid point, and hg is the kernel’s smoothing factor, i.e., its radius. Ag is the area over which the kernel function is evaluated at grid point sg, and C is a proportionality constant.
Continuing spatial pattern exploration, we employ a K-means clustering of our events. We use the default Euclidean distance as a similarity measure, calculated in kilometers from each hostility's latitude and longitude coordinates. We partition our events into ten sets to minimize the within-cluster variance. The selection was based on the visualization of these events on the world map. It was observed that piracy incidents are mainly located in three areas: (1) on the west coast of Africa off Nigeria and Cameron (AREA I), (2) between the east coast of Africa and West India (AREA II), and (3) the broader region of Indonesia (AREA III). Considering some apparent congregating of events in the area east of Africa, a total number of ten clusters is a good selection for our analysis.
In this part an attempt was made to explore if pirates, e.g., from AREAi, are affected by the activity of the pirates from AREAj, or in other words, if information concerning the attacks from one area is traveling to the other areas, triggering a sequence of attacks or events in the specific location. To examine this, we carefully select standard and time-varying Granger causality tests based on the type of our data and employ them in a pair-wise mode in the three-time series with events corresponding to the three areas described above. Granger causality is a statistical concept of causality that tests if the presence of a time series improves the prediction of another one and not the physical causality of a proven relationship between a cause and its effect. This explains why a two-way causality might be found, in contrast to the strict one-way physical causal relationship. We use Granger causality to study socioeconomic variables and phenomena where no fundamental or classical theory exists. We first run the usual descriptive statistics and the empirical (cumulative distribution function) CDFs of these three-time series of events and then employ a set of unit roots tests to assess the order of their integration, which is a prerequisite for the next step of our temporal analysis. For robustness, we use the tests of Dickey, Fuller with GLS detrending (DF-GLS), of Phillips-Perron (PP), of Kwiatkowski, Phillips, Schmidt, and Shin (KPSS), of Ng and Perron (NP), and of Hylleberg, Engle, Granger, and Yoo. For the tests DF, PP, NP, and HEGY, the null hypothesis is non-stationarity; for the KPSS, the null hypothesis is that of stationarity. Depending on the stationarity results of our time series, we apply, in pairs, either the classic Granger causality test (Granger, 1969 and 1988) or the Toda-Yamamoto test (1995) as follows.
where yt, β and εt are n-dimensional column vectors and \({A}_{k}\) is an n × n matrix of parameters for lag k. The error or stochastic disturbance term is introduced to account for any sources of uncertainty or variability that independent variables cannot explain. It surrogates all variables that are omitted in the model. In our case, given the pair-wise mode, n equals to two; thus, the former equation can be written in matrix notation, using the standard bivariate VAR(m), as follows:
where \(y_{t} = \left[ {y_{1t} y_{2t} } \right]^{\prime }\)
The null hypothesis of no Granger causality from variable \({y}_{i} to {y}_{j}\) is then H0: Ri→j·vec(П), where Ri→j is the coefficient restriction matrix and vec(П) is the row vectorization of Π. The model notation for Toda-Yamamoto is the same but form, which is replaced by \(m^{\prime}\) = m + d, with d standing for the additional lags for the maximum order of integration.
Although these causality tests are attractive because they do not need guidance from economic theory or for the use of simple reduced-form VAR models, and in the case of the Toda-Yamamoto test, for its basis on standard asymptotic distribution regardless of the size of integration and cointegrating properties, still they face issues regarding structural stability (Psaradakis et al., 2005; Swanson, 1998). To overcome this, we apply time-varying Granger causality tests with three recursive testing algorithms, namely the forward expanding (FE) window, the rolling (RO) window, and the recursive evolving (RE) window (Phillips et al., 2015; Shi et al., 2018, 2020). If we consider a sample of T + 1 observations {y0, y1, …, yT}, a number w, satisfying 0 < w < 1, and Tw = integer (T·w) then the time-varying Wald statistic, \({WS}_{w1,w}\) is computed over the subsample \(\left\{ {y_{{T_{w1} }} , \ldots ,y_{{T_{w} }} } \right\}\). In the FE algorithm, a series of Wald-test statistics \({WS}_{w1,w}\) are estimated, with w1 = 0 and\(w \in [{w}_{min}, 1]\), in the RO algorithm, the statistic is being estimated in a rolling window of constant size, running all the samples, and in the RE algorithm, we obtain test statistics for any subsample having the size \({T}_{{w}_{min}}\) or larger in a repeated procedure, providing a common end point of all the subsamples. All the obtained values of the Wald-Test statistic are compared with the 90th and 95th percentiles of bootstrap statistics explained in the works of Shi et al. (2018, 2020).
An additional hypothesis tested in this paper is about if the pirates from an area have underlying relationships or are known with the other pirates of the same location or are there multiple different networks within an area that operate independently. The question is of high importance. If pirates belong to or use, more or less, the same networks and people, then it would be more efficient to control these areas first since capturing one pirate in this area could bring another to light with fewer resources, effort, and time. We accept that, if pirates belong or use the same networks, then we should have frequent hits that are close in time and space. To examine this hypothesis, we applied Tobler’s concept of spatial autocorrelation, which in Tobler’s words, says that “Everything is related to everything else, but near things are more related than distant things” (Tobler, 1970), and use the global index of spatial autocorrelation of Moran’s I (Boots & Tiefelsdorf, 2000). Nevertheless. this index alone cannot give a straightforward answer to our research question. Hence, we include the time dimension\({tn}_{i}\), which we call it “time-neighboring”, as the variable of interest in the Moran’s index I. This value is no other than the average time interval between the eventt-1 and eventt,, and eventt and eventt+1,:
events \((t+1) \& (t-1)\) are the immediate following and preceding events from event \((t)\), from all the \({i}^{th}\) events of the same area.
Low values suggest events close in dates, while the opposite is true for high values.
In general terms, there are four steps when computing a global index of spatial autocorrelation:
-
(a)
Set the variable of interest to be examined for spatial correlation, in our case it is the time-neighboring variable \({tn}_{i}\),.
-
(b)
Compute the similarity level, \({s}_{ij}\), between all possible location pairs \((i,j)\). Our pairs are in coordinates of longitude and latitude.
-
(c)
Apply appropriate weights, by multiplying variables of similarity level \({s}_{ij}\), and of spatial proximity, \({w}_{ij}\).
-
(d)
Sum up all the products of the former step and divide it by a constant that stands for proportionality.
In our case the Moran’s index becomes as follows (Moran, 1948):
where the similarity variable \({s}_{ij}\) is the \(\left( {tn_{i} - \overline{tn} } \right)\left( {tn_{j} - \overline{tn} } \right)\) and the proximity variable \({w}_{ij}\) is calculated, as follows:
where \({d}_{i,j}\) denotes the Euclidean distance, lb is the lower bound of the specified distance band, ub is the upper bound of the specified distance band.
Based on the steps described above and on the interpretation of Moran’s I index, we can make the following hypothesis:
-
Null Hypothesis, Ho: Time neighboring has no spatial pattern (spatial randomness)
-
Alternative Hypothesis, Ha (with Z-score > 0): High and Low values of Time-neighboring are more spatially clustered than would be expected with spatial randomness.
-
Alternative Hypothesis, Ha (with Z-score < 0): High and Low values of Time-neighboring are more spatially dispersed than would be expected with spatial randomness.
Our research question could be answered in positive, in the case of significant p-values with positive Z-score. In this case, among others, we could infer that there are events clustered with low values of time-neighboring, or in other words, we have events close enough in time and space that might be attributed to having common or even the same networks or persons.
4 Results and discussion
4.1 AHP findings
AHP method was applied by creating four tables, each for every abovementioned criterion to find the best alternative that satisfies the criteria (Saaty, 1987). For example, regarding the security criterion, smugglers will consider attacking near ports as the degree of security is high while the opposite is true, for territorial waters. Therefore, a higher score will be given to the area of the territorial waters than the ports, under the security criterion. In the same way, we repeat the procedure for the other three criteria (i.e., Time, Topography and Fuel Consumption). The results -indicatively- for security criterion are presented in Table 3.
According to Table 3, we obtain for the vector of relative weights: (Security, Topography, Time, Fuel Consumption) = (0.643, 0.056, 0.179, 0,122) with a CI = 0.0547 < 0.10, which is accepted according to the literature (Saaty, 1987).
Then, we repeat the same procedure for the principal eigenvector for the other alternatives, based on the rest of the criteria. We can realize that under security criterion, the smugglers will think probably to attack in territorial waters and not in international waters or near ports. As we mentioned above, there is enhanced security near the ports due to port authorities which is deterring smugglers to attack the ships. The overall weights occurring for the three alternatives strategies under the criterion “Security” are the following:
Consecutively, the local derived scales for the three other criteria are the following:
Finally, based on the above information we multiply the two matrices below to find the final weight for each alternative according to the AHP analysis.
Based on the above calculations, the second alternative- the territorial waters-, is the most preferred strategy with the highest score of 0.558. Therefore, most of the times the smugglers prefer to attack in territorial waters, fewer times near ports, and rarely in international waters. This is in line with other studies, as there is no great effect of piracy in international waters, after analyzing real life events. Finally, it is essential to mention that our analysis with the use of AHP method is not limited to specific places or countries, but it takes a holistic perspective.
4.2 Spatio-temporal data analysis
On spatial pattern recognition, Figs. 1 and 2 show the kernel estimates of the probability density of events for areas II and III and area I, respectively. The quartic kernel function has been used with the minimum (weighted) number of data points as the kernel bandwidth method.
The mapped, in Figs. 1 and 2, probabilities of the events suggest that pirates prefer to hit close to the coastline, except for the Arabian sea (the only open sea). Also, pirates prefer the coasts of countries ranked low in surveillance or control from government forces, and in general, underdeveloped countries or face wars, riots etc. Next, in Fig. 3, we see the K-means clustering of the events. Area II has the most clusters, four out of ten, followed by area III with three clusters, and area I with two clusters. Cluster 6 is on the coasts of south and central America and does not belong to any of the three areas.
The monthly attacks on tankers, their statistics, and their empirical CDFs, are shown in Fig. 4, Table 1 and Fig. 5 respectively.
As shown in Fig. 4, area II has two spikes of incidents around 2008 and 2010. Two tips also appear in area III, around 2010 and 2013, while for area I, a slightly increasing trend is recorded from 2000 until 2020.
The three areas of study exhibit different similarities and dissimilarities, making a precise match among them not straightforward. As shown in Fig. 5, the cumulative probability of two attacks per month is 0.6 for areas I and II, while area III is at six attacks per month. On the contrary, the asymptotic limit of the unit of the three CDFs suggests similar behaviors only for areas II and III, with approximately 12 attacks per month. In contrast, this is reached at half monthly episodes in area I.
The unit root test results in Table 5 answer in the negative in stationarity, except for area I, where the KPSS test reject’s the null hypothesis of stationarity.
Given the stationarity results, we implement the standard Granger causality test for areas II and III and the augmented Toda-Yamamoto test for the pairs, including area I. As shown in Table 6, the causality results suggest causality running only from area III to area I, for a significance level of 10%. No other causal relationships exist.
Although the Granger causality test is a helpful tool for detecting dependencies among time series, it may be fragile when different periods are examined just as with other structural stability issues. To address this issue, robust causality tests have been introduced, using time-varying methods and estimations (Rossi & Wang, 2019; Phillips et al., 2015; Shi et al., 2018, 2020). In Table 7 and Fig. 6 that follow, we show the time-varying Granger causality tests based on Shi et al. (2018, 2020).
The results in Table 7, for the entire sample, show that we fail to reject the null hypothesis of no causal relationship from area I to area III and vice versa and from area III to area II, when the FE recursive algorithm is used. A causal relationship exists in all other pairs in the three main areas (I, II and III), regardless of the algorithm used. Nevertheless, as shown in Fig. 6, these results show strong instability. In most cases, the produced series of Wald statistics exceed or fall behind the critical values depending on the time window and the recursive algorithm. Based on the 90th and 95th significance percentiles, shown in the dotted lines in Fig. 6, we see in detail in which time windows a causal relationship exists, that is when the test statistics of FE, RO and RE exceed these lines. Hence, if all algorithms and time windows are taken into account (see Fig. 6), causality exists only from area I to area II in the first 100 months (based on the three Wald statistics of FE, RO and RE), from area III to area II after the 200th month (based on RE algorithm), and from area I to area III, roughly, before the 100th month and after the 200th month (based on RO and RE algorithms).
Table 8 presents the results of the global index of spatial autocorrelation, Moran’s I, using the time-neighboring concept as the variable of interest (Tables 9, 10 and 11).
All areas have strong positive values of Z-scores and reject the null hypothesis of spatial randomness. In other words, it might be argued that in each of the three areas, pirates use the same or related networks or persons for their attacks since there are clusters where attacks happened to close to each other in space and time terms.
5 Conclusions
Maritime piracy is a great concern as it affects not only the vessel and cargo but also leads to delays of ships and other socioeconomic impacts. Oil tanker companies try to reroute their ships or invest in security e.g. armed guards, water cannons. Despite the urgency of mitigation practices and the need to handle the piracy incidents systematically, only a few studies have been conducted that discuss the regularities in patterns of attacks and entail a spatio-temporal analysis to support decision-making towards piracy and interventions.
In this two-level analysis, AHP method applied first, to explore the causing factors and the most highly vulnerable areas of piracy. Various factors in the past have been identified as enablers of these incidents such as increased volume and value of a cargo, technological advances, and political instability (Min, 2011). Here, the focus was on the following criteria: zone, security, time, distance. It is found that most of the times smugglers prefer to attack ships in territorial waters rather in international waters. Thus, effective regional strategies and policies should be implemented to add more resources (e.g., sufficient resources for responding to emergencies, navy patrol protection) in the port and territorial areas.
In the second level, the spatiotemporal analysis suggests that there are specific clusters, namely on the west coast of Africa of Nigeria and Cameron (Area I), between the east coast of Africa and West India (Area II), and the broader region of Indonesia (Area III), where most attacks occur. Based on these areas it can be observed that pirates often prefer attacks close to the coastlines of underdeveloped countries or have no robust democracies. This is in line with the findings from the study of Desai (2021) who conducted a geographically disaggregated analysis. The challenges for combating maritime piracy derive from the lack of robust legal and institutional mechanism mostly at the domestic level (Ahmad, 2020). Local governments and multinational oil companies need to support and offer economic opportunities for coastal communities there.
Based on Fig. 4, we can see a that there is an increase of incidents of piracy and armed robbery against ships in Area II and Area III during 2008–2012 and 2010–2016 respectively. According to Oyewole (2016), in some of these areas there were more dedicated efforts that brought good governance and transparency and support these regions thus minimized the incidents. Therefore, it is really important each of these areas to implement their own national maritime security policies and strategies. These strategies and policies should be linked with financial, social, and political support that will strengthen the relevant institutions and enforcement mechanisms. Unfortunately, there would be some difficulties to implement them in some areas e.g., in Somalia due to low governance indicators (Alsawalqa & Venter, 2022). There is no pattern of the incidents in Area I but we can see that is on the rise. Apart from corruption, unemployment, the topography of this areas enables pirates to conceal ships, boats and stolen commodities in Nigeria’s coast i.e., inlets, rivers, and mangroves (Mishra, 2019).
Also, it is found that pirates in area II are influenced by the activity and the information coming from the pirates of areas I and III, suggesting a priority to control these two areas first. In addition, in all areas, the hypothesis of shared networks and persons from pirates has been verified, encouraging authorities to derive as much information as possible from pirates that have been arrested. Thus, these affected areas need to share information about these incidents on their coastlines and their neighbors.
This is in line with work from Phayal et al. (2022) that the likelihood of piracy in territorial waters is low when there is more security cooperation among bordering states. Thus, there is a need for stronger collaboration from policy perspective among EU, Asian, and African states.
The contributions of this study are three-fold. First, a two-step approach namely AHP method and spatiotemporal analysis applied to assess maritime piracy risks, until now there are only a few studies that investigated the causes of maritime piracy in a quantitative way. Second, this study took a holistic approach for identifying global hotspots, and third previous studies did not explore in detail the determinants of their presence. Last but not least, some interesting findings revealed that can help various stakeholders to apply more efficient and effective anti-piracy strategies. Even though this study explored and answered three important questions regarding causing factors, and hotspots of maritime piracy, future work may contain further analysis of policies that need to be developed and how to handle piracy in specific geographical areas, thus how interventions against maritime piracy may differ according to regions. Moreover, future studies could evaluate the costs of maritime security of conservation initiatives.
Data availability
The analyzed data during the current study are available in the National Geospatial-Intelligence Agency repository.
Change history
12 May 2023
A Correction to this paper has been published: https://doi.org/10.1007/s10479-023-05375-6
References
Abila, S., & Tang, L. (2014). Trauma, post-trauma, and support in the shipping industry: The experience of Filipino seafarers after pirate attacks. Marine Policy, 46, 132–136.
Agliardi, E., Alexopoulos, T., & Cech, C. (2019). On the relationship between GHGs and global temperature anomalies: Multi-level rolling analysis and copula calibration. Environmental and Resource Economics, 72(1), 109–133. https://doi.org/10.1007/s10640-018-0259-3
Ahmad, M. (2020). Maritime piracy operations: Some legal issues. Journal of International Maritime Safety, Environmental Affairs, and Shipping, 4, 62–69.
Alexopoulos, T. A. (2017). The growing importance of natural gas as a predictor for retail electricity prices in US. Energy, 137, 219–233. https://doi.org/10.1016/j.energy.2017.07.002
Alsawalqa, R. O., & Venter, D. (2022). Piracy and maritime security in the north-western Indian ocean: From the gulf of oman to the waters off the somali coast. Insight on Africa, 14(1), 88–103.
Balogun, A. (2018). Crude oil theft, petro-piracy and illegal trade in fuel: An enterprise-value chain perspective of energy-maritime crime in the Gulf of Guinea. PhD thesis, Lancaster University.
Bensassi, S., & Martínez-Zarzoso, I. (2012). How costly is modern maritime piracy to the international community? Review of International Economics, 20(5), 869–883.
Besley, T., Fetzer, T., & Mueller, H. (2015). The welfare cost of lawlessness: Evidence from somali piracy. Journal of the European Economic Association, 13(2), 203–239.
Boots, B., & Tiefelsdorf, M. (2000). Global and local spatial autocorrelation in bounded regular tessellations. Journal of Geographical Systems, 2(4), 319–348.
Bouejal, A., Chaze, X., Guarnieri, F., & Napoli, A. (2014). A Bayesian network to manage risks of maritime piracy against offshore oil fields. Safety Science, 68, 222–230.
Burlando, A., Cristea, A., & Lee, L. (2015). The trade consequences of maritime insecurity: Evidence from somali piracy. Review of International Economics, 23, 525–557.
Concepcion, J. (2021). Rising oil price may fuel piracy attacks on tankers in Asia. Retrieved June 10, 2022 from, https://lloydslist.maritimeintelligence.informa.com/LL1140094/Rising-oil-price-may-fuel-piracy-attacks-on-tankers-in-Asia
Danzell, O., Mauslein, J., & Avelar, J. (2023). Managing threats on the high seas: The role of naval bases on reducing maritime piracy. Armed Forces & Society, 49(1), 179–200.
de Montclos, M. P. (2012). Maritime piracy in Nigeria: Old wine in new bottles? Studies in Conflict & Terrorism, 35(7–8), 531–541.
Desai, R. M., & Shambaugh, G. E. (2021). Measuring the global impact of destructive and illegal fishing on maritime piracy: A spatial analysis. PLoS ONE, 16(2), e0246835.
Dinwoodie, J., Tuck, S., & Rigot-Müller, P. (2013). Maritime oil freight flows to 2050: Delphi perceptions of maritime specialists. Energy Policy, 63, 53–561.
Drake, E. (2021). Maritime insecurity in the Gulf of Mexico: piracy and the pandemic. Retrieved June 06, 2021, from, https://insights.s-rminform.com/maritime-insecurity-in-the-gulf-of-mexico
Ece, N. J., & Kurt, H. (2021). Analysis of maritime piracy by using qualitative methods. Mersin University Journal of Maritime Faculty, 3, 37–50.
European Union. (2020). Piracy in the Gulf of Guinea EU and international action. Retrieved June 06, 2021, from, https://www.europarl.europa.eu/RegData/etudes/BRIE/2020/649333/EPRS_BRI(2020)649333_EN.pdf
Fan, H., Lu, J., & Chang, Z. (2022). A risk-based game theory model of navy and pirate behaviors. Ocean & Coastal Management, 25, 106200.
Fellman, P. V., Frutos, D., Thanakijsombat, T., Teekasap, P., & Schear, B. (2015). The landscape of maritime piracy and the limits of statistical prediction. In P. Fellman, Y. Bar-Yam, & A. Minai (Eds.), Conflict and complexity. Understanding complex systems. Springer.
Fu, X., Ng, A. K., & Lau, Y. Y. (2010). The impacts of maritime piracy on global economic development: The case of Somalia. Maritime Policy and Management, 37(7), 677–697.
Gold, A., Phayal, A., & Prins, B. (2023). The unexpected consequences of the COVID-19 pandemic on maritime crime: Evidence from Indonesia and Nigeria. International Area Studies Review, 1–17.
Granger, C. W. J. (1969). Investigating causal relations by econometric models and crossspectral methods. Econometrica, 37, 424–438. https://doi.org/10.2307/1912791.
Granger C. W. J. (1988). Some recent development in a concept of causality. Journal of Econometrics, 39, 199–211. https://doi.org/10.1016/0304-4076(88)90045-0.
Hassan, D., & Hasan, S. (2017). Origion, development and evolution of maritime piracy: A historical analysis. International Journal of Law, Crime and Justice, 49, 1–9.
Hastings, J. V. (2009). Geographies of state failure and sophistication in maritime piracy hijackings. Political Geography, 28(4), 213–223.
Hatipoglu, E., Al-Suwailem, M., Muhsen, A. R., & Al Muhanna, S. (2022). Contextualizing uncontrolled oil trade flows: A novel categorization. Energy Reports, 8, 4622–4632.
International Maritime Bureau (IMB) (2021). ICC-IMB piracy and armed robbery against ships report. Retrieved June 10, 2021, from https://www.icc-ccs.org/reports/2020_Annual_Piracy_Report.pdf
Jakob, M., Vaněk, O., Urban, Š., Benda, P., & Pěchouček, M. (2010). Agentc: agent-based testbed for adversarial modeling and reasoning in the maritime domain. In Proceedings of the 9th international conference on autonomous agents and multiagent systems (Vol. 1, pp. 1641–1642).
Jiang, M., & Lu, Z. (2020). The analysis of maritime piracy occurred in Southeast Asia by using Bayesian network. Transportation Research Part E: Logistics and Transportation Review, 139, 101965.
Jin, J., & Techera, E. (2021). Strengthening universal jurisdiction for maritime piracy trials to enhance a sustainable anti-piracy legal system for community interests. Sustainability, 13(13), 7268.
Lim, G. J., Cho, J., Bora, S., Biobaku, T., & Parsaei, H. (2018). Models and computational algorithms for maritime risk analysis: A review. Annals of Operations Research, 271, 765–786.
Marchione, E., & Johnson, S. D. (2013). Spatial, temporal and spatio-temporal patterns of maritime piracy. Journal of Research in Crime and Delinquency, 50(4), 504–524.
Marchione, E., Johnson, S., & Wilson, A. (2014). Modelling maritime piracy: A spatial approach. Journal of Artificial Societies and Social Simulation, 17(2), 9.
Mejia, M. Q., Cariou, P., & Wolff, F.-C. (2009). Is maritime piracy random? Applied Economics Letters, 16(9), 891–895.
Min, H. (2011). The interpretation of statistical maps. Journal of the Royal Statistical Society, Series B, 10, 243–251.
Min, H. (2011). Modern maritime piracy in supply chain risk management. International Journal of Logistics Systems and Management, 10(1), 122–138.
Mishra, A. (2019). India-Africa maritime cooperation: The case of Western Indian Ocean. ORF Occasional Paper No. 221, November 2019, Observer Research Foundation.
Murphy, M. N. (2007). Small boats, weak states and dirty money: contemporary pi-racy and maritime terrorism’s threat to international security. Doctoral dissertation, Reading University.
Murphy, M. (2009). Small boat, weak states dirty money: Piracy and maritime terrorism in the Modern world. Columbia University Press.
NGIE. (2022). Maritime safety products and services. Retrieved 2 June 2022, from https://msi.nga.mil/NGAPortal/MSI.portal
Nwalozie, C. J. (2020). Exploring contemporary sea piracy in Nigeria, the Niger delta and the gulf of guinea. Journal of Transportation Security, 13, 159–178.
Nwokedi, T., Anyanwu, J., Eko-Rapheaels, M., Obasi, C., Akpufu, I. D., & Ogola, D. B. (2022). Probability theory analysis of maritime piracy and the implications for maritime security governance. JEMS Maritime Sci., 10(2), 133–143.
Ofosu-Boateng, N. R. L. (2017). A models approach to analyzing and forecasting oil and piracy in the gulf of guinea. Open Journal of Social Sciences, 5, 84–112.
Osinowo, A. (2015). Combating piracy in the gulf of guinea. Retrieved June 10, 2021, from https://apps.dtic.mil/sti/citations/ADA618297
Otto, L. (2014). The evolution of maritime piracy in Nigeria. Portuguese Journal of Social Science, 13(3), 313–329.
Oyewole, S. (2016). Suppressing maritime piracy in the Gulf of Guinea: The prospects and challenges of the regional players. Australian Journal of Maritime & Ocean Affairs, 8(2), 132–146.
Özdemir, Ü., & Güneroğlu, A. (2017). Quantitative analysis of the world sea piracy by fuzzy AHP and fuzzy TOPSIS methodologies. International Journal of Transport Economics, 44, 427–448.
Pereira, V., & Bamel, U. (2022). Charting the managerial and theoretical evolutionary path of AHP using thematic and systematic review: A decadal (2012–2021) study. Annals of Operations Research.
Phayal, A., Gold, A., & Prins, B. (2022). Interstate hostility and maritime crime: Evidence from South East Asia. Marine Policy, 143, 105134.
Phillips, P. C. B., Shi, S., & Yu, J. (2015). Testing for multiple bubbles: Historical episodes of exuberance and collapse in the S&P 500. International Economic Review, 56(4), 1043–1077.
Psaradakis, Z., Ravn, M. O., & Sola, M. (2005). Markov switching causality and the money output relationship. Journal of Applied Econometrics, 20(5), 665–683.
Robitaille, M.-C. (2020). Maritime piracy and international trade. Defence and Peace Economics, 31(8), 957–974.
Romsom, E. (2022). Countering global oil theft: Responses and solutions, WIDER Working Paper, No. 2022/35, ISBN 978-92-9267-166-2, The United Nations University World Institute for Development Economics Research (UNU-WIDER).
Rossi, B., & Wang, Y. (2019). Vector autoregressive-based Granger causality test in the presence of instabilities. The Stata Journal: Promoting Communications on Statistics and Stata, 19(4), 883–899.
Saaty, R. W. (1987). The analytic hierarchy process—What it is and how it is used. Mathematical Modelling, 9(3–5), 161–176.
Seas, S. (2021). Pirates of the gulf of guinea: A cost analysis for coastal states. Retrieved June 10, 2021, from https://www.stableseas.org/post/pirates-of-the-gulf-of-guinea-a-cost-analysis-for-coastal-states
Seyle, D. C., Fernandez, K. G., Dimitrevich, A., & Bahri, C. (2018). The long-term impact of maritime piracy on seafarers’ behavioral health and work decisions. Marine Policy, 87, 23–28.
Shepard, J., & Pratson, L. (2020). Maritime piracy in the Strait of Hormuz and implications of energy export security. Energy Policy, 140, 111379.
Shi, S., Hurn, S., & Phillips, P. C. B. (2020). Causal change detection in possibly integrated systems: Revisiting the money-income relationship. Journal of Financial Econometrics, 18(1), 158–180.
Shi, S., Phillips, P. C. B., & Hurn, S. (2018). Change detection and the causal impact of the yield curve. Journal of Time Series Analysis, 39(6), 966–987.
Swanson, N. R. (1998). Money and output viewed through a rolling window. Journal of Monetary Economics, 41(3), 455–474.
Tešić, J., Tamir, D., Neumann, S., Rishe, N., & Kandel, A. (2020). Computing with words in maritime piracy and attack detection systems, augmented cognition. In Human cognition and behavior: 14th international conference, AC 2020, held as part of the 22nd HCI international conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings, Part II (pp. 434–444).
Tobler, W. R. (1970). A computer movie simulating urban growth in the Detroit region. Economic Geography, 46, 234–240.
Toda, H. Y., & Yamamoto, T. (1995). Statistical inference in vector autoregressions with possibly integrated processes. Journal of Econometrics, 66(1–2), 225–250.
Townsley, M., & Oliveira. A. (2015). Space-time dynamics of maritime piracy. Security Journal, 28(3), 217–229.
Tseng, P.-S., Her, Z., & Pilcher, N. (2021). Piracy defense strategies for shipping companies and ships: A mixed empirical approach. Maritime Transport Research, 2, 100020.
Vaidya, O. S., & Kumar, S. (2006). Analytic hierarchy process: An overview of applications. European Journal of Operational Research, 169(1), 1–29.
Vargas, L. (1990). An overview of the analytic hierarchy process and its applications. European Journal of Operational Research, 48, 2–8.
Vespe, M., Sciotti, M., Burro, F., Battistello, G., & Sorge, S. (2008). Maritime multi-sensor data association based on geographic and navigational knowledge. 2008 IEEE Radar Conference, Rome, pp. 1–6. https://doi.org/10.1109/RADAR.2008.4720782
Waller, L. A., & Gotway, C. A. (2004). Applied spatial statistics for public health data. Wiley.
Funding
No funding was received to assist with the preparation of this manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The Authors declare that there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Tsioufis, M., Fytopoulos, A., Kalaitzi, D. et al. Discovering maritime-piracy hotspots: a study based on AHP and spatio-temporal analysis. Ann Oper Res 335, 861–883 (2024). https://doi.org/10.1007/s10479-023-05352-z
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10479-023-05352-z