Abstract
Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery.
Similar content being viewed by others
References
Abeyratne R (2009) The responsibility of Somalia for the acts of the Somali pirates. J Transp Secur 2:63–76
Agresti A (2002) Categorical data analysis, 2nd edn. John Wiley & Sons Inc. Series in Probability and Statistics, Hoboken
Bangert Struwe L (2009) For a greater horn of Africa sea patrol—a strategic analysis of the Somali pirate challenge. Danish Institute for Military Studies, Copenhagen
Baniela SI (2010) Piracy at sea: Somalia an area of great concern. J Navig 63:191–206
Beckman RC (2002) Combating piracy and armed robbery against ships in Southeast Asia: the way forward. Ocean Dev Int Law 33:317–341
Beckman RC (2009) The 1988 SUA Convention and 2005 SUA Protocol: tools to combat piracy, armed robbery, and maritime terrorism. In: Herbert-Burns R, Bateman S, Lehr P (eds) Lloyd’s MIU handbook of maritime security. CRC, Boca Raton, pp 187–200
Bendall HB (2010) Cost of piracy: a comparative voyage approach. Marit Econ Logist 12:178–195
Bozkurt MU (2010) Comparison of maritime piracy in Southeast Asia with East Africa and applicability of the counter-piracy measurers taken in Asia to East Africa. Presented at the First Global Conference on Innovation in Marine Technology and the Future of Maritime Transportation, 24–26 November, Istanbul, Turkey.
Bruyneel M (2003) Current reports on piracy by the IMO and the IMB—a comparison. Presented at the People and the Sea II Conference, Centre for Maritime Research (MARE) Conference, 4–6 September, Amsterdam, Netherlands.
Caplan JM, Kennedy LW, Miller J (2011) Risk terrain modeling: brokering criminological theory and GIS methods for crime forecasting. Justice Q 28:360–381
Chalk P (2008) International security: terrorism, piracy, and challenges for the United States. RAND Center for Terrorism Risk Management Policy, Santa Monica
Christiansen AF, Mærli MB (2011) Risk based security assessment methodology. DNV research and innovation position paper—X, Høvik, Norway (Under preparation).
Collet D (2003) Modelling binary data, 2nd edn. Chapman & Hall/CRC, Boca Raton
Collins R, Hassan D (2009) Applications and shortcomings of the law of the sea in combating piracy: a South East Asian perspective. J Marit Law Commer 40:89–113
Drewry Shipping Consultants Ltd.-Drewry (2009) Ship operating costs 2009–2010: annual review and forecast. London, UK
Dagne T (2009) Somalia: current conditions and prospects for a lasting peace. congressional research service report no: RL33911, Washington, DC
Davis WM (2009) Analysis of the strategy to combat maritime piracy. Master Thesis, US Army Command and General Staff College
Dillon D (2005) Maritime piracy: defining the problem. SAIS Rev 25:155–165
Equasis (2010) Ship search. Lisbon. Available via (Accessed 9 July 2010) http://www.equasis.org/EquasisWeb/public/HomePage
Greene WH (2008) Econometric analysis, 6th edn. Pearson Prentice Hall, Upper Saddle River
Hansen SJ (2009) Piracy in the greater Gulf of Aden—myths, misconceptions and remedies. Norwegian Institute for Urban and Regional Research, Report No: NIBR 2009:29, Oslo
Harrell Jr FE (2001) Regression modeling strategies: with applications to linear models, logistic regression, and survival analysis. Springer Series in Statistics, Springer-Verlag New York Inc., USA
Hastings JV (2009) Geographies of state failure and sophistication in maritime piracy hijackings. Polit Geogr 28:213–223
Herbert-Burns R (2007) Compound piracy at sea in the early twenty-first century: a tactical to operational-level perspective on contemporary, multiphase piratical methodology. In: Lehr P (ed) Violence at sea—piracy in the age of global terrorism. Routledge, New York, pp 95–120
Ho J (2009) Combating piracy and armed robbery in Asia: the ReCAAP Information Sharing Centre (ISC). Mar Policy 33:432–434
Hong N, Ng AKY (2010) The international legal instruments in addressing piracy and maritime terrorism: a critical review. Res Transp Econ 27:51–60
IMO (2003) International Ship and Port Facility Security (ISPS) Code and SOLAS Amendments adopted on 12 December 2002. Electronic edition, Sales number: E116E, London
IMO (2009) Piracy and armed robbery against ships—guidance to shipowners and ship operators, shipmasters and crews on preventing and suppressing acts of piracy and armed robbery against ships. London: MSC.1/Circ.1334
IMO (2010a) Code of practice for the investigation of crimes of piracy and armed robbery against ships. London: A 26/Res.1025
IMO (2010b) MSC.4 Reports on piracy and armed robbery against ships. Available via (Accessed 7 July 2010) http://www.imo.org/Facilitation/mainframe.asp?topic_id=1164
Institute of Shipping Economics and Logistics-ISL (2009) Shipping statistics yearbook 2009. Bremen, Germany
International Chamber of Shipping-ICS et al (2010) BMP 3—best management practice version 3: piracy off the coast of Somalia and Arabian Sea area, suggested planning and operational practices for ship operators, and masters of ships transiting the Gulf of Aden and the Arabian Sea. Witherby Seamanship International Ltd., Edinburgh
Jesus HEJL (2003) Protection of foreign ships against piracy and terrorism at sea: legal aspects. Int J Mar Coast Law 18:363–400
Kaye S (2009) Interdiction and boarding of vessels at sea: new developments and old problems. In: Herbert-Burns R, Bateman S, Lehr P (eds) Lloyd’s MIU handbook of maritime security. CRC, Boca Raton, pp 201–213
King RO (2009) Ocean piracy and its impact on insurance. Congressional Research Service Report No: R40081, Washington, DC
Kraska J, Wilson B (2009) Combating pirates of the Gulf of Aden: the Djibouti Code and the Somali coast guard. Ocean Coast Manage 52:516–520
Mak JN (2007) Pirates, renegades, and fishermen: the politics of “sustainable” piracy in the Strait of Malacca. In: Lehr P (ed) Violence at sea—piracy in the age of global terrorism. Routledge, New York, pp 199–223
Mandryk W (2010) Fight against piracy is critical to world trade. Lloyd’s List, Published: 16 December 2010, London. Available via (Accessed 25 January 2011) http://www.lloydslist.com/ll/sector/regulation/article352560.ece
Maritime Security Centre Horn of Africa-MSCHOA (2009) Best Management Practices to Deter Piracy in the Gulf of Aden and off the Coast of Somalia. Version 2, London
Maritime Security Centre Horn of Africa-MSCHOA (2010) EU NAVFOR Somalia. Available via (Accessed 9 July 2010) http://www.mschoa.org/Pages/default.aspx
Matison KS (2009) The big business of maritime piracy and the modern corsair: dead men tell no tales. J Transp Law Logist Policy 76:371–394
Matthews S (2010) First quarter piracy attacks fall. Lloyd’s List, Published: 21 April 2010, London. Available via (Accessed 22 July 2010) http://www.lloydslist.com/ll/sector/ship-operations/article7300.ece
McNicholas M (2008) Maritime security—an introduction. Butterworth-Heinemann Elsevier Inc., Burlington
Mejia Jr MQ, Cariou P, Wolf FC (2010) Piracy in shipping. Laboratoire d’Economie et de Management Nantes-Antlantique (LEMNA) Working Paper 2010/14 EA 4272, Université de Nantes, Nantes, France
Mejia MQ Jr, Cariou P, Wolf FC (2008) Ship piracy: ship type and flag. In: Talley WK (ed) Maritime safety, security and piracy. Informa, London, pp 103–120
Mejia MQ Jr, Cariou P, Wolf FC (2009) Is maritime piracy random? Appl Econ Lett 16:891–895
Mellow J, Schlager MD, Caplan JM (2008) Using GIS to evaluate post-release prisoner services in Newark, New Jersey. J Crim Justice 36:416–425
Mo J (2002) Options to combat maritime piracy in Southeast Asia. Ocean Dev Int Law 33:343–358
Møller B (2009) Piracy, maritime terrorism and naval strategy. Danish Institute for International Studies, DIIS Report No: 2009:02, Copenhagen
Mukundan P (2009) Recent trends on piracy and armed robbery against ships. Presented at the 32nd Asia Pacific Economic Cooperation Transportation Working Group Meeting, 27–30 July, Singapore
Murphy M (2007) Piracy and UNCLOS: does international law help regional states combat piracy? In: Lehr P (ed) Violence at sea—piracy in the age of global terrorism. Routledge, New York, pp 155–182
Oil Companies International Marine Forum-OCIMF (2009) Piracy—the East Africa/Somalia situation: practical measures to avoid, deter or delay piracy attacks. Witherby Seamanship International Ltd., Edinburgh
Ong-Webb GG (2007) Piracy in maritime Asia: current trends. In: Lehr P (ed) Violence at sea—piracy in the age of global terrorism. Routledge, New York, pp 37–93
Osler D (2010a) Global pirate attacks fall 20%. Lloyd’s List, Published: 15 July 2010, London. Available via (Accessed 22 July 2010) http://www.lloydslist.com/ll/sector/ship-operations/article173676.ece
Osler D (2010b) Record ransom paid to free hijacked tankers. Lloyd’s List, Published: 8 November 2010, London. Available via (Accessed 25 November 2010) http://www.lloydslist.com/ll/sector/ship-operations/article349272.ece
Pegg R (2009) Maritime forces and security of merchant shipping in the Mediterranean Sea and Northern Indian Ocean. In: Herbert-Burns R, Bateman S, Lehr P (eds) Lloyd’s MIU handbook of maritime security. CRC, Boca Raton, pp 29–37
Percy S, Shortland A (2009) The pirates of Somalia: coastguards of anarchy. Centre for Economic Development & Institutions (CEDI) Working Paper No. 09–09, Brunel University, London, UK
Percy S, Shortland A (2010) The business of piracy in Somalia. Deutsches Institut für Wirtschaftsforschung (DIW) Discussion Paper 1033, Berlin, Germany
Piazza JA (2008) Incubators of terror: do failed and failing states promote transnational terrorism? Int Stud Q 52:469–488
Ploch L, Blanchard CM, O’Rourke R, Mason RC, King RO (2009) Piracy off the Horn of Africa. Congressional Research Service Report No: R40528, Washington, DC
Rahman C (2007) The international politics of combating piracy in Southeast Asia. In: Lehr P (ed) Violence at sea—piracy in the age of global terrorism. Routledge, New York, pp 183–198
Raymond CZ (2009) Piracy and armed robbery in the Malacca Strait—a problem solved? Naval War Coll Rev 62:31–42
Roach JA (2004) Initiatives to enhance maritime security at sea. Mar Policy 28:41–66
Rosenberg D (2009) The political economy of piracy in the South China Sea. Naval War Coll Rev 62:43–58
Rosenberg D, Chung C (2008) Maritime security in the South China Sea: coordinating coastal and user state priorities. Ocean Dev Int Law 39:51–68
Ryan TP (1997) Modern regression methods. Wiley Series in Probability and Statistics, Wiley, New York
Scheffler A (2010) Piracy—threat or nuisance. Research Division—NATO Defence College, Research Paper No.56, Rome, Italy
Sörenson K (2008) State Failure on the high seas—reviewing the Somali piracy, FOI Somalia Papers: Report 3. Swedish Defense Research Agency Report No: FOI-R—2610—SE, Stockholm
Sullivan AK (2010) Piracy in the Horn of Africa and its effects on the global supply chain. J Transp Secur 3:231–243
Talley WK, Rule EM (2008) Piracy in shipping. In: Talley WK (ed) Maritime safety, security and piracy. Informa, London, pp 89–101
Teo N (2009) Measures for combating piracy and armed robbery against ships in Asia. Presented at the 32nd Asia Pacific Economic Cooperation Transportation Working Group Meeting, 27–30 July, Singapore
United Nations-UN (1982) United Nations Convention on the Law of the Sea (UNCLOS) of 10 December 1982, opened for signature in Montego Bay, Jamaica
Visual Numerics (2006) IMSL™ Fortran Numerical Library Version 6.0. Houston, TX, USA
Weir GE (2009) Fish, family, and profit—piracy and the Horn of Africa. Naval War Coll Rev 62:15–30
Acknowledgements
The work reported in this paper has been carried out under the SECTRONIC project, 7th FP, CP-GA No. 218245, with partial funding from the European Commission as well as the DNV R&I strategic research programmes. The authors would like to thank Anna Ivinska, Ingar Bergh and Tore Longva (DNV) for the data support, Øyvind Endresen, Evangelos Boutsianis and Morten Bremer Mærli (DNV) for their valuable comments. The opinions expressed are those of the authors and should not be construed to represent the views of the SECTRONIC partnership or Det Norske Veritas A/S.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
Rights and permissions
About this article
Cite this article
Psarros, G.A., Christiansen, A.F., Skjong, R. et al. On the success rates of maritime piracy attacks. J Transp Secur 4, 309–335 (2011). https://doi.org/10.1007/s12198-011-0073-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12198-011-0073-4