Professional Documents
Culture Documents
by
Abstract
Maritime piracy has been on the rise for many years. Although public data on piracy attacks
and piracy networks is limited, we have attempted to apply some new methodological tools to
determine as far as possible, the properties of these complex systems. In particular, by employing
extremal statistics and following the work of Clauset and Gleditsch on land-based terrorist
organizations, we attempt to characterize the relationship between the severity and frequency of
maritime piracy attacks. In addition, utilizing social network analysis, we have aimed at
accurately visualizing and representing key characteristics of maritime piracy as well as
discerning non-obvious or emergent patterns of behavior and organizational structure specific to
piracy networks as defined by their geographic location (i.e., West Africa, East Africa and The
Straits of Malacca and Lombok).
Introduction
With the emergence of new markets and an increasing integration in the world economy,
present more than 80% of world trade is conducted by sea. The Pacific Ocean and the adjacent
seas are historically active maritime trading grounds. The Pacific Ocean links the American and
Asian continents, and much of the world’s shipping passes through the seas of Southeast Asia,
East Asia, and South Asia (Salinas, 2002; Sakhuja, 2005). Oil tankers from the Middle East
travel through the Indian Ocean and enter the Straits of Malacca from the Andaman Sea, and
once past Singapore have the option of turning northward into the South China Sea and onward
to South Chinese ports, or continuing into the Straits of Makassar for access to the open seas of
1
Currently, the most pressing and direct threats to maritime security for ship owners are piracy
and sea robbery. Other crimes such as maritime terrorism and the use of "phantom ships" are far
less common, although still a significant issue. Criminal activity against vessels is typically
treated under the general term "piracy." The International Maritime Bureau’s Piracy Reporting
Center (IMB-PRC), a private organization that monitors piracy incidents all over the world,
defines "piracy" as “an act of boarding or attempting to board any ship with the intent to commit
theft or any other crime and with the intent or capability to use force in the furtherance of that
act” (Abhyankar, 2001) . This definition is useful for operational purposes, particularly in terms
of monitoring the incidence of attacks. For the purposes of this paper, the IMB-PRC definition
of piracy is employed, although more sophisticated screenings of the IMB-PRC data are
possible. Unfortunately much of the data necessary to structure a more sophisticated definition
or to trace a greater degree of residual connections are either fragmented, missing or scattered
across separately compartmented databases, often not just in different organizations and
picture of maritime crime, one major problem is that the IMB definition of piracy is not
recognized by international law. For prosecution purposes it is important to consider the location
of the incident in order that the appropriate legal response can be made. According to
international maritime law, any illegal acts of violence and detention which are committed within
State’s territorial waters are not defined as piracy. This is a general problem with transferring
local or national issues of admiralty law to the international consideraton of terrorism and
terrorist activities. According to the IMB, nearly all illegal acts occur within territorial waters
and thus would not fall under the definition of piracy. Technically, if an attack occurs within the
2
territorial jurisdiction of a state, the event is only classified as piracy if that nation’s penal code
criminalizes it as such.
Piracy and sea robbery may be committed in port while the vessel is berthed, at anchor, or
while it is underway. In this paper, we consider only attacks committed to vessels underway.
While underway, the vessel may be subjected to a short-term seizure lasting a few hours while
the pirates take cargo or belongings; a long-term seizure lasting several days while the cargo is
unloaded at ports selected by the pirate or transferred to another vessel; or a permanent seizure
wherein the vessel could be turned into a "phantom ship". Unfortunately, in the latter two types
of seizures, crews are most likely to be killed, or if they are lucky, set adrift at sea. (Abhyankar,
2001).
Figure 1. shows how the incidence of violent attacks since 2000. A clear increase is observed
for the year 2003. However, the subsequent years show a decline in violence and a resurgence of
3
The degree to which a vessel may be threatened depends on several key factors. The first
problem occurs when there is a high degree of congestion in maritime traffic, which necessarily
limits a vessel’s ability to maneuver to avoid a threatening vessel, or which may provide cover
for the perpetrators’ assaults. The proximity of the vessel to coastal settlements may also be a
factor, as the perpetrators may use the settlements as their base of operations and then disappear
into the local population subsequent to the attack. The lack of visible maritime law enforcement
patrols has also played an important role in the growth of maritime attacks. (Salinas, 2002)
Pirates’ favorite targets are private vessels transporting valuable goods and there are
approximately 50,000 large ships on the seas at all times. Maritime vessels are ‘soft’ targets,
because they are huge, slow moving and difficult to protect. Under current IMO law it is
forbidden for merchantmen to carry firearms for self-protection. Only Russian and Israeli ships
carry guns. Furthermore, efficiency developments in shipping logistics have tended towards the
use of skeleton crews, which then makes ships even more vulnerable to attack. Finally, the newer
Vessel Tracking Information System (VTIS) makes it easier for anyone to discover the precise
Maritime Terrorism
Historically, the world’s oceans have not been a major locus of terrorist activity. Indeed,
according to the RAND Terrorism Database, strikes on maritime targets and assets have
constituted only two percent of all international incidents over the past 30 years. Part of the
reason for this relative paucity of attacks has to do with the fact that many terrorist organizations
4
have neither been located near coastal regions nor possessed of the means to extend their
physical reach beyond purely local theaters of operations. Most importantly, operating at sea
requires terrorists to acquire and develop marine skills, gain access to appropriate assault and
transport vehicles, and to develop the ability to mount and sustain operations from a non-land–
based environment. Limited resources have traditionally prevented most terrorist groups from
Moreover, very few maritime choke points are truly non-substitutable for ocean-bound
freight. Bypassing the Malacca Straits in Southeast Asia, for instance, would require only an
extra three days of steaming, and other than oil and certain perishable goods, most commodities
would not be unduly affected by short delays in delivery. While long-term or widespread
disruption to the global economy is unlikely, it is certainly possible that temporary, localized
fiscal damage could result from an act of terrorism. Finally, the objectives of the two actors
remain entirely distinct. The business of piracy is directly dependent on a thriving and active
global shipping industry and is aimed at profit. In contrast, terrorists, at least in the context of
contemporary jihadist networks, are assumed to be seeking the destruction of the global maritime
trade network as part of their self-defined economic war against the West (Chalk, 2008). At
present, the IMB reports do not include sufficient information for us to plot a nexus between
piracy and terrorism, although it would be desirable to acquire sufficient data to verify suspected
5
IMB Study Data
The IMB-PRC provides a number of services to the maritime industry. They also disseminate
worldwide reports of piracy and sea robbery attacks. Statistics for maritime crime are published
in weekly, quarterly, and annual reports. The reports provide information about the vessels (size,
flagship, attack location), date and time of attack, and a brief description of the attack, which
includes the number of attackers, weapons used, status of the crew and whether the attackers
stole property and belongings. The reports do not provide information about the origin of the
pirates. Despite the lack of specific information regarding the attackers, the data from these
reports can enable the identification of important trends, once the data has been appropriately
sifted and minor, irrelevant or repetitive data has been eliminated from the raw data set.
According to the IMO, it is estimated that piracy incidents are likely under-reported by a
factor of two. Moreover, it is likely that the statistics are subject to distortion as many smaller
attacks go unreported mainly because the increase in insurance premiums often outweighs the
value of the claim for smaller attacks. Reporting a piracy attack is often time-consuming and can
lead to a delay of several days which could cost up to $25,000 per day. Thus, in many cases, it is
The ransacking and robbery of vessels on the high seas or in territorial waters has the
potential to seriously disrupt maritime navigation (especially in instances where vessels run
amok because the crew is kidnapped, detained, or thrown overboard). The IMB describes these
assaults as medium-level armed robbery: violent thefts involving serious injury or murder by
well-organized gangs.
6
The tools of piratical violence have also become more advanced. Pirates now have access to
automatic weapons and advanced communication devices. They monitor radar and radio
transmissions to select their targets and use motorized boats to track them. While the weaponry
has become much more sophisticated, the tactics often remain crude. The aims of piracy have
also changed to a certain extent, entailing a more violent approach. Some pirate operations target
not only the ship’s cash and valuables, but also derive income from kidnapping and from
Pirates usually attempt to board a steaming ship from the stern via fast boat. Large tankers
are easiest to board from the side where the presence of a low freeboard assists intruders. Sea
attacks almost always involve violence or the threat of violence because pirates need to subdue
the ship’s crew to carry out their mission. For this purpose, attacks against large cargo ships are
often undertaken by ten or more pirates. Such attacks also require a high level of capital
investment in arms, training, intelligence and fast boats. Pirates typically select the easiest
available target. In some cases though, the target selection begins onshore, where pirates take
advantage of low dock security and the corruption of port officials. Port workers often act as
informants for ship movements and cargo contents. An inside tip can take a lot of guesswork out
In the present study, we collected the data from the IMO reports from 1998 to 2008. The
reports provide minimal information about the pirates. The description of the attack includes the
number of pirates, the weapons used, i.e. knives, guns, RPG and whether the pirates were
captured or not. Not every attack provides this information. For the most part, the description
indicates that the pirates fled and stole crew’s cash and belongings and/or ship’s stores and
equipment.
7
Methodology
In attempting to provide a more meaningful and nuanced study of maritime piracy than that
available merely from collecting the raw IMB data, we followed the approach to land-based
terrorist organizations, particularly with respect to learning curves, frequency and level of
damaged developed at the Santa Fe Institute by Aaron Clauset (Clauset and Gleditsch 2007;
Clauset and Weigel, 2010) and . By looking at the frequency and severity of the attacks in each
of three distinct regions, we attempt to gain insight into local pirate groups’ organizational
growth and the effects of their total experience on their capacity to inflict damage to their target
High-quality empirical data on maritime piracy groups, such as decision making and
organizational structure are practically non-existent. However, the IMO reports discussed above
provide data on the frequency and the severity of the piracy attacks. A more systematic analysis
can shed new light on which facets of maritime piracy group behavior are predictable and which
are inherently contingent. Each “attempted attack” record includes its calendar date, the severity
of the attacks is described and by refining this data, we have created a scale for measuring the
Description Index
No goods stolen/no injuries to crew 1
Stolen goods(any)/Knives-Guns-RPG 2
Stolen goods (any)/injured crew 3
Stolen goods (any)/Crew killed or missing 4
Hijacked/crew recovered(or crew hostage for ransom) 5
Hijacked/crew killed/missing and ship missing 6
Ship rammed with explosives 7
Table 1. Description of attack and associated intensity of attack Index
8
Since we do not have any information about specific maritime piracy organizations, we
analyze the frequency and severity of the attacks by region or country. For each location, we
quantify the changes in the frequency and severity of the attacks over a 10 year period using a
development curve. The locations we have selected based on the number of attacks are:
Indonesia, Malacca Straits, Somalia and Nigeria. The developmental curve maps the “behavior”
of the attacks in those locations from which we can infer the behavior of the pirate groups in the
particular location. They also provide a common quantitative scale that facilitates the direct
To construct this curve, we plot the behavioral variable, such as the time (in days) between
piracy group in the selected location , indexed by the cumulative number of attempted attacks
on ships underway. Combining the developmental curves of the selected locations produces an
aggregate picture of the behavioral dynamics of each location, and allows us to extract the
The dynamics revelaed by this study suggest several interesting features of maritime piracy
and parallel many of the results discovered by Clauset et al., for land-based terrorist
organizations. With respect to the frequency and severity of attacks over time, these results are
independent of many commonly studied social and political factors, and suggest that there may
be “new” fundamental scientific laws (other than the social and cultural trends tyically studied in
this field) underlying the dynamics of both terrorist and piracy attacks. As recent studies on
9
combat force structure, resilience and breakthrough levels suggest (Moffat and Passman, 2004),
emergent processes and fractal structure may play important roles in processes previously
If one can replace the data smoothing typically implied by linear and multiple regression
analysis with a more complete explanation of dynamical processes, and can supplement cultural
and political analysis with a more complete picture of process dynamics (including invariants),
then one may achieve a better understanding of both land-based terrorism and maritime based
piracy (and terrorism) than is currently available through single-mode analysis. In particular, a
richer set of analytical tools may be helpful in predicting terrorist or piracy behavior when
dealing with unknown, unidentified, or unidentifiable groups and may help to develop a new
approach for dealing with particularly difficult to categorize or difficult to define terrorist and
piracy events.
Visualization of Data
In the present study, we began by applying Social Network Analysis (SNA) to our data in
order to elucidate patterns of behavior among different maritime priacy groups. Network data in
its purest from consists of a square array of measurements which focus on the actors and their
relational properties (particularly network “nodes” and “edges”). The rows of the array are the
cases, or subjects, or observations. The columns of the array are the same set of cases, subjects,
or observations. Each cell of the array describes a relationship between the actors. By comparing
the rows of an array, we can see which actors are similar to the other actors with whom they are
connected by the first actors’ choice (as in a directed graph). By looking at the columns, we can
10
see the relationship between actors on the basis of who is chosen by other actors. These are
useful ways to look at the data because they help to show which actors have similar positions in
the network. A major emphasis of network analysis is seeing how the whole pattern of individual
choices gives rise to more holistic, or emergent patterns. (Hanneman & Riddle, 2005)
Figure 1, shows the network diagram of Locations and Intensity of Attacks (based on the
Index on Table 1.) for the year 2003. The network diagram includes all the attacks that occurred
in the year and all the locations in which attacks took place.
11
Figure 2. Network Diagram representing Location and the type of weapon used in the attack.
Figure 3. Network Diagram representing location and the number of pirates involved in the attacks.
12
Figure 2 amd Figure 3 represent the location and type of weapon used in the attack and the
location and number of pirates involved in the attack, respectively. As compared to the raw data
from the IMB, these network diagrams provide an improved visualization of the 2003 piracy
attacks since the size of the nodes gives as an indication of the intensity of the attack, or the
number of pirates involved in each attack for each location. However, with the current data we
cannot extract more information about the behavior of the pirate organizations using this
methodology.
Conclusion
It appears that the center of gravity of international piracy is continually shifting, but specific
pirate-plagued areas have remained more or less continuously active. According to the IMB,
South East Asian waters are the most intense hot-spots of piracy. The region retains its position
as the most active with regard to attacks on vessels and accounts for more than half of all
reported attacks. The Malacca Straits and the Singapore Straits continue to be among the most
popular locations for piracy. This is largely due to both geographical and operational factors, in
particular, the fact that the area around the straits attracts the heaviest maritime traffic
21st century maritime piracy is a relatively new phenomenon and is not easy to understand or
model. Difficulties in data collection further complicate the task of determining the relationship
between pirate organizations (especially the better organized groups) and international organized
crime or international terrorist groups. Combating maritime piracy is not easy. The problems of
differing resources (human, military, economic, etc.) and priorities create a complex arena in
13
which it is difficult for law enforcement agencies to locate and follow pirates. Meanwhile pirates
exploit maritime limits and borders in order to escape and hide, often leaving behind local coast
14
References
Abhyankar, J. (2001). Piracy and ship robbery: A growing menace. In H. Ahmad, & A. Ogawa,
Combating Piracy (p. 11). Tokyo, Japan: The Okazaki Institute.
Chalk, P. (1999, January-February). Low intensity conflict in South East Asia: Piracy, drug
trafficking and political terrorism. (No. 305/306) , 4.
Clauset, A., & Gleditsch, K. S. (2009, June 17). The developmental dynamics of terrorist
organizations. Retrieved from arXiv:0906.3287v1 [physics.soc-ph]:
http://arxiv.org/abs/0906.3287
Clauset, A., & Wiegel, F.W., (2010) “A generalized aggregation-disintegration model for the
frequency of severe terrorist attacks”, Journal of Conflict Resolution, 54(1), 179-197
Fellman, P. V., Clemens, J. P., Wright, R., Post, J. V., & Dadmun, M. (2006). Disrupting
terrorist networks - a dynamic fitness landscape approach. Inter Journal Complex Systems , 2060
(12).
Galletti, S. C. (2005). Old and new threats: Piracy and maritime terrorism.
http://www.eurocrime.it/, EuroCrime, Florence, Italy.
Hanneman, R. A., & Riddle, M. (2005). Introduction to social network methods. University of
California Riverside.
Newman, M. (2003). The structure and function of complex networks. SIAM Review , 45 , 165-
256.
Olaya, C., & Cruz, J. P. (2008). A system dynamics model for studying the structure of network
marketing organizations. The 2008 International Conference of the System Dynamics Society.
Athens, Greece:
http://www.systemdynamics.org/conferences/2008/proceed/papers/OLAYA411.pdf.
15
Sakhuja, V. (2005). Maritime terrorism and piracy: security challenges in South East Asia.
Society for the Study of Peace and Conflict. www.sspconline.org.
Salinas, C. C. (2002). Improving maritime security in the APEC region: A perspective from the
Federation of ASEAN Shipowners’ Associations (FASA). 3rd APEC Transportation Ministerial
Meeting. Lima, Peru.
Storey, I. (2008). Securing Southeast Asia’s Sea lanes: a work in progress. Asia Policy , Number
6, 95-127.
16