Skip to main content

Advertisement

Log in

Who are sea cutthroats? A typological analysis of pirates

  • Published:
Crime, Law and Social Change Aims and scope Submit manuscript

Abstract

In North America and Europe, numerous books, articles, and monographs on pirates have been published in the past three decades. Although these publications do provide readers valuable information about piratical activities around the world, few of these contain a categorization of pirates. The purpose of this paper is to develop a typology for historical and modern pirates. This taxonomy is composed of three factors: position of state managers, ideology, and continuity of piracy. Each of these factors is divided into two levels: state-supporting vs. non state-supporting for stance of state managers; distinctiveness vs. indistinctiveness for ideology, and professional vs. amateur for continuity of piracy. Based upon these different levels, the author of this paper argues that pirates can be conceptually categorized as SDP, SDA, SIP, SIA, NDP, NDA, NIP, and NIA types. This typology will allow researchers of pirates to distinguish between sea bandits around the world.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. This focus can be seen from the bibliography section of the book Pirates [16].

  2. Obviously, numerous pirates “specializing” in robbery and other violent crimes can be considered as sea bandits. However, viewing pirates as desperados identical with sea robbers/bandits will surely downplay the heterogeneity of pirates. One example of this is that during the years of American civil war, some privateers were also revolutionaries ([14]: 65-78). Such privateers, despite their frequent involvements in robbery, smuggling, and other illegal activities, undoubtedly cannot be simply seen as sea robbers.

  3. From the perspective of methodology, using this approach to study pirate history is problematic because such a history involves environmental factors and problems which cannot be recapitulated by personal lives and individual decisions.

  4. Although new technologies are extremely important in fighting pirates, the emergence of newly-invented “weapons” may let the public assume that piratical activities can be rooted out by technological innovations. This assumption perhaps is too idealistic because the appearance of piracy, almost without exceptions, is related to social structural factors, such as economic underdevelopment, civil war, and/or institutionalized corruption. Such factors, just like chronic diseases, are hard to eradicate and will last for years.

  5. In this regard, some criminological theories (e.g., the rational choice, social disorganization, subculture, differential association, and control theories) may help researchers explain the etiology of piratical acts. However, given that maritime environment is entirely different from that of land, this application might be limited, if not inadequate.

  6. The chief reason why these three variables were selected in this paper is that they are “cultural universals” in pirateology. In other words, most literature on pirates reveal that piratical acts are related to one or some of these variables. Based on these connections, the author of this article will use these globally applicable factors to distinguish between pirates. What should be emphasized is that there are many indicators that can be selected to operationalize these three variables. One of the possibilities is suggested as follows:

    1. a.

      position of state managers in the course of piracy can be determined by poverty rates, unemployment rates, rates of economic growth, and level of international conflict.

    2. b.

      ideology can be any political philosophy supported by a government (or a minority group) and has the function of mobilizing the public.

    3. c.

      continuity of piracy can be measured by the number and size of public groups which attempt to challenge or wipe out established institutions.

    Since this paper centers on the creation of conceptual models for piracy, it is beyond the range of this article to quantify or to evaluate the appropriateness of such indicators.

  7. In this paper, state managers refer to those persons who are responsible for the task of state-construction. State-construction includes two interrelated dimensions: the creation of a new country and the expansion of state power.

  8. One of the representative works that overlooks the role of the Continental Navy in the Revolutionary War of America is 1776 [46]. In this book, almost no pages contain information about the functions and “contributions” of the Continental Navy. Mevers [45] also indicates that the “American navy of the Revolution has received the studied attention of only a comparatively few historians.”

  9. In addition to ideology, material rewards seemed to play a key role in American privateering as well. As Bradford [9] argues: “Although many cited patriotic motives, profits were at least as strong an incentive.”

  10. Greenfeld [26] argues that the emergence and development of mercantilism in Europe should be examined in the context of nationalism. Although her argument is plausible, it is beyond the scope of this paper to summarize and review her causal model.

  11. According to Marks [44], the Dutch were “the first Europeans to apply vast amounts of capital to their trading enterprises in both Asia and the Americas.”

  12. According to Tang [66], the Dutch, Portuguese, and Spanish merchants of the 16th and 17th centuries usually would earn huge profits if they could obtain Chinese commodities (especially lacquer ware, silk fabrics, and porcelain) and sell those “goodies” in Europe. This prospect of obtaining extravagant profits perhaps was the main reason why the Dutch, Portuguese, and Spanish were enthusiastic to establish formal commercial ties with the Ming China.

  13. This policy, after the Qing dynasty was created in 1644, evolved into the coastal evacuation policy in 1661 ([66]: 224). The new policy not only banned coastal Chinese from contacting with Westerners, it also ordered coastal people to move 10 miles inland. Numerous people lost their homes/jobs, became bankrupt, or even died because of this radical policy ([66]: 224).

  14. One of the typical examples of this is that in 1601, a Portuguese carrack carrying lacquer ware, silk textiles, and earthenware from China was seized by a Dutch fleet. The Dutch sent the spoils back to Amsterdam for auction. The capital secured from that auction, to everyone’s surprise, exceeded half of the whole funds used to establish the Dutch East India Company ([66]: 51).

  15. On of the major factors that would lead emperors of the Ming China to enforce strictly the seclusion policy was the continuous struggle between conservative and liberal officials in the Court. More specifically, when conservative officials, who opposed international trade, gained the upper hand, then all channels of foreign trade (including illegal ones) would be severed.

  16. Better known to Westerners as Andrea Dittis, Li Dan was one of the pioneering Chinese merchants who created the trade networks among the Chinese, the Japanese, the Dutch, and the English in the late 1500s and early 1600s ([65]: 93–95, [66]: 71–73, [67]:199–201).

  17. Some people believe that Li Dan was Iquan’s adoptive father or godfather. No matter which one is correct, the relationship between these two persons must be very close.

  18. Due to the seclusion policy, people like Li Dan were viewed by the Ming government as smugglers. Since it was impossible to ask the authorities to provide protection for sea transportation, Li could only use private force to defend his vessels.

  19. From the perspective of international law, viewing robbery and other aggressive acts perpetrated by state managers (including law enforcement agents) at sea as piracy is inappropriate because it will cause international arguments or even wars (see [58]). Although international law professionals argue that piracy must be limited to private behaviors, following a politically correct definition, however, is not the major concern of this paper. With this in mind, all predatory acts committed by authority figures at sea are still regarded as piracy in this article.

  20. One of the best examples is that in October 25, 2005, one Taiwanese fishing vessel operating in the international waters near Chi Chi Jima (the Father Island) was assaulted by a patrol boat of the Fisheries Agency of Japan. See “Ri Ben Shui Chan Ting Xun Luo Chuan Zhui Zhu Qu Gan Tai Wan Yu Chuan, Yi Qi Dan Gong Ji [A patrol boat of the Fisheries Agency of Japan chased and attacked, by paintballs, a Taiwanese fishing vessel],” at www.xinhuanet.com, October 27, 2005.

  21. Abuza [1] provides the following information to show the popular sense of injustice among the Acehnese:

    The Acehnese do have legitimate grievances, especially regarding revenue sharing. For example, in the 1990s only 7 percent of Aceh’s revenues stayed in the province and all revenue from Indonesia’s oil and gas production went directly to the central government. Aceh’s gas exports in 1998 were worth $1.3 billion, though it got almost none of that revenue.

  22. For the chronology of the development of Free Aceh Movement, see Ta Hai Xiao (Rhythms Monthly, [56]: 50–51).

  23. This event is called the Marco Polo Bridge Incident. For a detailed history about the Marco Polo Bridge Incident and the occurrence of the Sino-Japan War, see Hsu [30].

  24. These Japanese-controlled areas can be seen in a map provided by Hsu [30].

  25. The etiology and dynamics of the civil war in Somalia are discussed in detail by Peterson [55].

References

  1. Abuza, Z. (2003). Militant islam in southeast asia: Crucible of terror. Boulder: Lynne Rienner Publishers.

    Google Scholar 

  2. Anderson, J. L. (2001). Piracy and World History: An Economic Perspective on Maritime Predation. In C. R. Pennell (Ed.), Bandits at sea: A pirates reader (pp. 82–106). New York: New York University.

    Google Scholar 

  3. Andrade, T. (2005). Pirates, Pelts, and Promises: The Sino-Dutch Colony of Seventeenth-Century Taiwan and the Aboriginal Village of Favorolang. The Journal of Asian Studies, 64(2), 295–321.

    Google Scholar 

  4. Bailyn, B. (1967). The ideological origins of the American revolution. Cambridge: The Belknap Press of Harvard University Press.

    Google Scholar 

  5. Bannon, I. & Collier, P. (eds). (2003). Natural resources and violent conflict: Options and actions. Washington D.C.: World Bank.

    Google Scholar 

  6. Breverton, T. (2006). The pirate dictionary. Gretna: Pelican Publishing Company.

    Google Scholar 

  7. Botjer, G. F. (1979). A short history of Nationalist China, 1919–1949. New York: G. P. Putman’s Sons.

    Google Scholar 

  8. Bradford, J. C. (1984). The navies of the American revolution. In K. J. Hagan (Ed.), In peace and war: Interpretations of American Naval history, 1775–1984 (2nd ed., pp. 3–26). Westport: Greenwood.

    Google Scholar 

  9. Bradford, J. C. (1996). French and American privateers. In D. Cordingly (Ed.), Pirates: Terror on the high seas—from the Caribbean to the South China Sea (pp. 164–187). Altanta: Turner Publishing, Inc.

    Google Scholar 

  10. Burnett, J. S. (2002). Dangerous waters: Modern piracy and terror on the high seas. New York: Dutton.

    Google Scholar 

  11. Carter, D. L. (1997). Transnational organized crime: Emerging trends in entrepreneurial crime. In P. J. Ryan & G. E. Rush (Eds.), Understanding organized crime in global perspective: A reader (pp. 131–148). Thousand Oaks: Sage Publications.

    Google Scholar 

  12. Chalk, P. (2000). Non-military security and global order: The impact of extremism, violence and chaos on national and international security. New York: St. Martin’s Press, LLC.

    Google Scholar 

  13. Chen, J. (2006). The Emerging Nexus between Piracy and Maritime Terrorism in Southeast Asia Waters: A Case Study on the Gerakan Aceh Merdeka (GAM). In P. Lehr (Ed.), Violence at sea: Piracy in the age of global terrorism (pp. 139–154). New York: Routledge.

    Google Scholar 

  14. Coggins, J. (2002). Ships and seamen of the American revolution. Mineola: Dover Publications, Inc.

    Google Scholar 

  15. Cordingly, D. & Falconer, J. (1992). Pirates: Fact & fiction. New York: Abbeville Publishing Group.

    Google Scholar 

  16. Cordingly, D. (ed). (1996). Pirates: Terror on the high sea—from the Caribbean to the South China Sea. Atlanta: Turner Publishing, Inc.

    Google Scholar 

  17. Cordingly, D. (1997). Under the Black Flag: The romance and the reality of life among the pirates. San Diego: A Harvest Book.

    Google Scholar 

  18. Cordingly, D. (2001). Women sailors and sailors’ women: An untold maritime history. New York: Random House Trade Paperbacks.

    Google Scholar 

  19. Davis, W. C. (2005). The pirates Laffite: The treacherous world of the corsairs of the gulf. Orlando: Harcourt, Inc.

    Google Scholar 

  20. Defoe, D. (1999). In M. Schonhorn (Ed.), A general history of the pyrates. Mineola: Dover Publications, Inc.

    Google Scholar 

  21. Dubner, B. H. (1980). The law of international sea piracy. The Hague: Martinus Nijhoff Publishers.

    Google Scholar 

  22. Ellms, C. (2002). The pirates own books. New York: Book-of-the-Month Club.

    Google Scholar 

  23. Gerhard, P. (1990). Pirates of the Pacific, 1575–1742. Lincoln: University of Nebraska Press.

    Google Scholar 

  24. Gottschalk, J. A. & Flanagan, B. P. (2000). Jolly Roger with an Uzi: The rise and threat of modern piracy. Annapolis: Naval Institute Press.

    Google Scholar 

  25. Gray, J., Monday, M., & Stubblefield, G. (1999). Maritime terror: Protecting yourselves, your vessel, and your crew against piracy. Boulder: Sycamore Island Books.

    Google Scholar 

  26. Greenfeld, L. (2003). The spirit of capitalism: Nationalism and economic growth. Cambridge: Harvard University Press.

    Google Scholar 

  27. Hazlewood, N. (2004). The queen’s slave trader: John Hawkyns, Elizabeth I, and the trafficking in human souls. New York: William Morrow.

    Google Scholar 

  28. Hooglund, E. (1993). Government and Politics. In H. C. Metz (Ed.), Somalia: A country study (pp. 151–178). Washington: U.S. Government Printing Office.

    Google Scholar 

  29. Hopfel, F. & Angermaier, C. (2004). Adjudicating international crimes. In P. Reichel (Ed.), Handbook of transnational crime & justice (pp. 310–345). Thousand Oaks: Sage Publications.

    Google Scholar 

  30. Hsu, I. C. Y. (2000). The rise of modern China (6th ed.). New York: Oxford University Press.

    Google Scholar 

  31. Huang, H. L. (2007). Who are pirates? An examination of the typologies and social attributes of East Asian and Southeast Asian pirates based on the piratical activities in the South China Sea in the past five decades. Hong Kong Journal of Social Sciences, 32, 87–112.

    Google Scholar 

  32. Huang, S. F. (1999). Guo Ji Fa Shang Hai Dao Xing Wei Zhi Yan Jiu—Jian Lun Nan Hai Hai Dao Wen Ti [A research on piratical activities from the perspective of international law—including the piratical issues of South China Sea]. Taipei: Master’s thesis, Department of Diplomacy, National Chengchi University.

    Google Scholar 

  33. Johnson, D. & Valencia, M. (eds). (2005). Piracy in Southeast Asia: Status, issues, and responses. Singapore: ISEAS Publications.

    Google Scholar 

  34. Johnson, D., Pladdet, E., & Valencia, M. (2005). Introduction: Research on Southeast Asian piracy. In D. Johnson & M. Valencia (Eds.), Piracy in Southeast Asia: Status, issues, and responses (pp. ix–xx). Singapore: ISEAS Publications.

    Google Scholar 

  35. Kelsey, H. (1998). Sir Francis Drake: The Queen’s pirate. New Haven: Yale University Press.

    Google Scholar 

  36. Klare, M. T. (2001). Resource wars: The new landscape of global conflict. New York: Metropolitan Books.

    Google Scholar 

  37. Konstam, A. (1999). The history of pirates. New York: The Lyons Press.

    Google Scholar 

  38. Konstam, A. (2007). Scourge of the seas: Buccaneers, pirates and privateers. New York: Osprey Publishing.

    Google Scholar 

  39. Konstam, A. & Kean, R. M. (2007). Pirates: Predators of the seas. New York: Skyhorse Publishing, Inc.

    Google Scholar 

  40. Lehr, P. & Lehmann, H. (2006). Somalia—Pirates’ new paradise. In P. Lehr (Ed.), Violence at sea: Piracy in the age of global terrorism (pp. 1–22). New York: Routledge.

    Google Scholar 

  41. Lewis, J. E. (ed). (2006). The mammoth book of pirates. New York: Carroll & Graf Publishers.

    Google Scholar 

  42. Li, S. W. (2005). Mo Yin Chuan Nao, Fan Kong Xin Ke Ji [The magic sound that can penetrate through brain—the new technology of counter-terrorism]. China Times Weekly, 1452, 56. 58.

    Google Scholar 

  43. Little, B. (2007). The sea rover’s practice: Pirate tactics and techniques, 1630–1730. Dulles: Potomac Books, Inc.

    Google Scholar 

  44. Marks, R. B. (2007). The origins of the modern world: A global and ecological narrative from the fifteenth to the twenty-first century. Lanham: Rowman & Littlefield Publishers, Inc.

    Google Scholar 

  45. Mevers, F. C. (1977). Naval policy of the continental congress. In Naval History Division of Department of the Navy (Ed.), Maritime dimensions of the American revolution (pp. 3–11). Washington, D.C: Government Printing Office.

    Google Scholar 

  46. McCullough, D. (2006). 1776. New York: Simon & Schuster Paperbacks.

    Google Scholar 

  47. Mueller, G. O. W. (1999). Transnational crime: An experience in uncertainties. In S. Einstein & M. Amir (Eds.), Organized crime: Uncertainties and dilemmas (pp. 3–18). Chicago: Office of International Criminal Justice.

    Google Scholar 

  48. Mueller, G. O. W. & Adler, F. (1985). Outlaws of the ocean: The complete book of contemporary crime on the high seas. New York: Hearst Marine Books.

    Google Scholar 

  49. Murphy, M. (2006). Piracy and UNCLOS: Does international law help regional states combat piracy? In P. Lehr (Ed.), Violence at sea: Piracy in the age of global terrorism (pp. 155–182). New York: Routledge.

    Google Scholar 

  50. Murphy, M. N. (2008). Small boats, weak states, dirty money: Piracy and maritime terrorism in the modern world. New York: Columbia University Press.

    Google Scholar 

  51. Murray, D. H. (1987). Pirates of the south china coast, 1790–1810. Stanford: Stanford University Press.

    Google Scholar 

  52. Parry, D. (2006). Blackbeard: The real pirate of the Caribbean. New York: Thunder’s Mouth Press.

    Google Scholar 

  53. Pavalko, R. M. (2000). Risky business: America’s fascination with gambling. Belmont: Wadsworth/Thomson Learning.

    Google Scholar 

  54. Pennell, C. R. (ed). (2001). Bandits at sea: A pirate reader. New York: New York University Press.

    Google Scholar 

  55. Peterson, S. (2000). Me against my brother: At war in Somalia, Sudan, and Rwanda. New York: Routledge.

    Google Scholar 

  56. Rhythms Monthly (ed). (2005). Ta Hai Xiao: Hui Mie Yu Chong Sheng [The tsunami: destruction and reconstruction]. Taipei: Rhythms Monthly.

    Google Scholar 

  57. Ritchie, R. C. (1986). Captain Kidd and the War against the pirates. Cambridge: Harvard University Press.

    Google Scholar 

  58. Rubin, A. P. (1988). The law of piracy. Newport: Naval War College Press.

    Google Scholar 

  59. Sakhuja, V. (2006). Sea piracy in South Asia. In P. Lehr (Ed.), Violence at sea: Piracy in the age of global terrorism (pp. 23–36). New York: Routledge.

    Google Scholar 

  60. Saxon, L. (1989). Lafitte: The pirates. Gretna: Pelican Publishing Company.

    Google Scholar 

  61. Scott, J. C. (1985). Weapons of the weak: Everyday forms of peasant resistance. New Haven: Yale University Press.

    Google Scholar 

  62. Seitz, D. C. (2002). Under the black flag: Exploits of the most notorious pirates. Mineola: Dover Publications, Inc.

    Google Scholar 

  63. Slomanson, W. R. (2003). Fundamental perspectives on international law (4th ed.). Belmont: Wadsworth/Thomson Learning.

    Google Scholar 

  64. So, K. W. (1975). Japanese piracy in Ming China during the 16th century. Lansing: Michigan State University.

    Google Scholar 

  65. Tang, J. T. (2001). Da Hang Hai Shi Dai De Tai Wan [Taiwan in the age of exploration]. Taipei: Fruition Publishing.

    Google Scholar 

  66. Tang, J. T. (2002). Kai Qi Tai Wan Di I Ren: Zheng Zhi-Long [The first person who developed Taiwan: Nicolas Iquan]. Taipei: Fruition Publishing.

    Google Scholar 

  67. Tang, J. T. (2005). Min Nan Ren De Hai Shang Shi Ji [Beyond the China Seas—the seafaring history of the Minnanese]. Taipei: Fruition Publishing.

    Google Scholar 

  68. Taylor, J. G. (2003). Indonesia: Peoples and Histories. New Haven: Yale University Press.

    Google Scholar 

  69. Tien, N., Phuc, D., & Thuy, V. T. (1981). Pirates on the gulf of Siam: Reports from the Vietnamese boat people living in the refugee camp in Songkhla-Thailand (2nd ed.). San Diego: Boat People S.O.S. Committee.

    Google Scholar 

  70. Vo, N. M. (2006). The Vietnamese boat people, 1954 and 1975–1992. Jefferson: McFarland & Company, Inc., Publishers.

    Google Scholar 

  71. Wakeman, F., Jr. (1996). The Shanghai Badlands: Wartime terrorism and urban crime, 1937–1941. New York: Cambridge University Press.

    Google Scholar 

  72. Wakeman, F., Jr. (2003). Spymaster: Dai Li and the Chinese secret service. Berkeley & Los Angeles: University of California Press.

    Google Scholar 

  73. Young, A. J. (2005). Roots of contemporary maritime piracy in Southeast Asia. In D. Johnson & M. Valencia (Eds.), Piracy in Southeast Asia: Status, issues, and responses (pp. 1–33). Singapore: ISEAS publications.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hua-Lun Huang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huang, HL. Who are sea cutthroats? A typological analysis of pirates. Crime Law Soc Change 53, 277–298 (2010). https://doi.org/10.1007/s10611-009-9225-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10611-009-9225-x

Keywords

Navigation