Thwarting Successful Piracy Arielle Carchidi Department of Maritime Administration, Texas A&M University at Galveston Advisor: Dr. Joan Mileski Undergraduate.

Slides:



Advertisements
Similar presentations
| Maritime Protection | | C.P.I |. | Background | M any of the shipping lanes from: The Far East Europe pass through the Gulf of Aden and close to the.
Advertisements

Seminar on Measures to Enhance Maritime Security Brussels, Nov 2009 Threats to Maritime Security Robert Beckman Director, Center for International.
1 U.S. and International Counter-Piracy Efforts: 2010 Update RDML (sel) Fred Kenney Office of Maritime & International Law U.S. Coast Guard.
Roy Paul Programme Manager. UN Secretary General Mr Ban Ki Moon “…let us never forget the detrimental impact of piracy on the innocent.
Piracy in African waters: Maritime Zones and Industries at risk Prof Henri Fouché University of South Africa Camprosa 8-11 November 2011.
WELCOME The U.S. Industrial College of the Armed Forces Minerva Alfonso UK Regional Manager London, 3 May 2007.
Threat of Piracy and Response Initiatives
Maritime security in the context of the 1982 United Nations Convention on the Law of the Sea Presentation to AU Commission Meeting of Experts on Maritime.
OUTLINE Why are measures of crime important? Crime Rates v. Amounts
The Effect of Maritime Piracy on Greek Shipping Samiotis George, Psarrou Vasileia, Pazarzis Michael and Tselentis Vasilis Dept. Maritime Studies, University.
Alexandra Sommers April 20, Original Research Questions  Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?
Burcad Badeed: Somalia’s “Sea Bandits” Power Vacuum or Alternative?
Terrorism in Troubled Waters Texas A&M University Global Issues.
MARITIME SECURITY The Singaporean Experience Catherine Zara Raymond.
PIRACY ! in the 21 st Century. The face of modern piracy.
MEETING THE CHALLENGES FOR GLOBAL SHIPPING
Maritime Piracy Event & Location Data Project Brandon C. Prins – Department of Political Science & Howard Baker Center for Public Policy, University of.
Crime Victims: An Introduction to Victimology Seventh Edition
How the IMO is meeting the challenges of dealing with maritime safety and security – an overview Neil Frank R. Ferrer Ocean Concerns Office Department.
Latin American Panel October 2009 Vina Del Mar, Chile Peter M. Swift.
Leading the way; making a difference Latin American Panel October 31, 2012 UPDATE ON PIRACY Joseph Angelo Deputy Managing Director.
Maritime Piracy TaskForce
Steamship Mutual April 2010 Chris Adams Steamship Mutual Piracy from the P&I Perspective San Francisco 6 th May 2010 Chris Adams Director Steamship Insurance.
Piracy: Common Threat and Cooperative Solutions Rear Admiral T. F. Carney, USN COMPACFLT N5/N8 Plans, Policy and Requirements This Brief is UNCLASSIFIED.
Piracy in Somalia Does tourism stand a chance?. Somalia in Focus Located in Capital Population: Life expectancy is Around 1960, seen as a great example.
Transnational Seaborne Organized Crime Prepared by: Dr. Alec Coutroubis & George Kiourktsoglou, PhD Candidate.
Overview of the global piracy situation Nicolaos L Charalambous Deputy Director (Maritime Security and Facilitation) Maritime Safety Division International.
Modern Maritime Piracy: Countermeasures and Preventive Actions by the Greek Shipping Industry K.Giziakis, K. Bountri Department of Maritime Studies University.
IMPACTS AND CONCERNS Dr K Sumser-Lupson Capt. J Titahena
Crime at Sea and Human Insecurity in Southeast Asia (2)
Alfons Guinier - ECSA V ILLA P IGNATELLI, N APLES M ONDAY, 8 TH O CTOBER 2012 SHIPPING AND THE LAW IN THE RECENT AND CURRENT MARKETS PIRACY.
RAdm Gouveia e Melo PRT Navy
Latin American Panel September, 2010 Lima, Perú PIRACY Peter M. Swift.
Somali Pirates. What is Piracy the act of robbery or criminal violence at sea. This can include acts committed on land, air, or major bodies of water.
1 International Demands on Crime Statistics Geneva, November 3, 2004 Wolfgang Rhomberg UNODC, Research and Analysis Section.
Expert Roundtable on Maritime Security in South East Asia Brussels, 7 May 2011 Maritime Security in the Straits of Malacca & Singapore / Role of Private.
Piracy and Armed Robbery at Sea Causes of Piracy &Counter-Strategies Prof. Dr. Robin Geiß, LL.M. (NYU) Addis Ababa 9 May 2012.
Copyright of Shell International Ltd MARITIME SECURITY, THE CHALLENGES AND EXPECTATIONS OF THE PRIVATE SECTOR Presentation to Egmont – Royal Institute.
Piracy Simon Bennett Secretary, International Chamber of Shipping
Piracy and Other Critical Incidents at Sea – How to Reduce Impact on Mariners? The Mariner’s Viewpoint SOCP Spring Meeting 2013.
- Introduction - Piracy What is piracy ? Who are the pirates? Piracy in Arabian Gulf - Reason for the existence of piracy ( In the past ) Reasons - Reason.
Tel: +44 (0) Fax: +44 (0) Website: www. marineprofessionals.co.uk 4th Floor Lloyd’s.
AN ANCIENT PROFESSION. PIRACY & PHANTOM SHIPS DEFINITIONS MARITIME CRIME PIRACY.
Professor Colon FTC Comparative Criminal Justice Systems / 6 th edition Chapter 2: Domestic Crime, Transnational Crime, and Justice.
Topic 6: Response Groups Promoting Critical Thinking and Thoughtful Discussion Barbary Pirates ©PIH All rights reserved.
Lum Yi Brandon Tan. Spain and Somali pirates Spanish tuna fishing vessel, Alakrana, was seized on October by pirates off the coast of Somali On.
ASIAN PANEL ASIAN PANEL March 2, 2010 UPDATE ON PIRACY JOSEPH ANGELO DEPUTY MANAGING DIRECTOR.
Uncovering the Linkages in Maritime Piracy Networks: Developmental Dynamics and Visualization of Network Data Dinorah Frutos, Thanarerk Thanakijsombat,
24 hour emergency response PIRACY– Current Legal and Practical Considerations October 2012.
Current trends in Somali piracy Dr. Guy Wilson-Roberts, Senior Analyst
Gulf of Aden – Somalia attacks on shipping MV FAINA – 25 Sep 2008 Indian Ocean, 200nms off Somali coast military cargo on board 21 Crew, 3 pirate boats.
Leading the way; making a difference Click to edit Master title style Council Piracy Brief November November Somali Piracy and Gulf of Guinea attacks.
STIMULATING DEVELOPMENT AND GROWTH OF PORTS ALONG THE AFRICAN COASTLINE John Omingo Head of Commercial Shipping Kenya Maritime Authority.
API Tanker Conference Piracy Session May 21, 2012 Provided by: John D. Kimball Blank Rome LLP
THE GEOGRAPHY OF PIRACY. Piracy Pirates Paradise – Inside Somalia’s Suffering Captain Philips trailer.
Lum Yi Brandon Tan. Spain and Somali pirates Spanish tuna fishing vessel, Alakrana, was seized on October by pirates off the coast of Somali On.
Sea Piracy: A South African Perspective Henri Fouche UNISA Institute of Loss Adjustors 17 May 2012 Johannesburg.
 The three areas of concern to IMO, particularly relevant to the situation off Somalia and in the Gulf of Aden, can be summed up as:  the need to protect.
1 PIRACY IN TANZANIA : T O P I C. 2 GROUP Background of the problem and historic overview. 2. The Dilemma of Piracy in Tanzania. 3. Analysis of.
1 Current International Efforts to Combat Maritme Piracy.
9th Annual Colloquium of the IUCN Academy of Environmental Law – South Africa Nengye LIU, PhD Candidate, Faculty of Law, Ghent University Prevention.
Tina. weapon what characteristics do Somali pirates have ?
Maritime Piracy TaskForce
Pirate attacks in the 2016 Nina Dejanović IIIb.
PIRACY IN THE MALACCA & SINGAPORE STRAITS
NPHS 1510 Federal and International
RATIFICATION TO THE HAZARDOUS AND NOXIOUS SUBSTANCE BY SEA CONVENTION 2010 PRESENTATION TO NCOP:SELECT COMMITTEE ON ECONOMIC AND BUSINESS DEVELOPMENT.
PIRACY.
OUTLINE Why are measures of crime important? Crime Rates v. Amounts
Presentation transcript:

Thwarting Successful Piracy Arielle Carchidi Department of Maritime Administration, Texas A&M University at Galveston Advisor: Dr. Joan Mileski Undergraduate Research Introduction and ObjectiveMethodsResults The Piracy Problem References Abhyankar, J. (2005). Maritime Crime. Contemporary Issues in Maritime Security, BMP4: Best Management Practices for Protection against Somalia Based Piracy 2011, (Edinburgh: WitherbyPublishing Group). International Maritime Bureau. (2010). Piracy and Armed Robbery Against Ships. London: International Chamber of Commerce. United Nations. (1982). High Seas. United Nations Convention on the Law of the Sea, 5(1), article 101. Vrëy, F. (2010). African Maritime Security: a time for good order at sea. Australian Journal of Maritime and Ocean Affairs, 2(4), Why is piracy such a big deal? Piracy has real costs including:  Loss of life  Loss of cargo  Loss of vessel  Ransom payments  Rerouting costs  Higher insurance premiums  Increased costs associated with vessel protection (Vr ëy,2010) Model A Model B Under the United Nations Convention of the Law of the Sea, piracy is defined as an illegal act of violence, detention, or depredation committed for private gains against a private ship on the high seas (United Nations, 1982). Because many incidents occur within territorial waters, armed robbery at sea must also be considered. Both kinds of attacks can include armed robbery, hijacking, taking crew hostage, and demanding ransom for the return or persons or property (Abhyankar, 2005). The annual reports published by the International Maritime Bureau indicate an increase in incidents of piracy and armed robbery at sea (IMB, 2010). Figure 2 depicts the trends of actual and attempted attacks from 2006 to Though Somali piracy accounts for a large number of incidents, piracy is a worldwide problem as shown in Figure 3. In recent years, maritime piracy has received more attention from governments, the maritime industry, and the media. Increased incidents of violent attacks, particularly in the Gulf of Aden and the Red Sea, create hazards for seafarers and shipping companies. The maritime industry has issued “Best Management Practices for Protection against Somalia Based Piracy (BMP4) which can be used to prevent piracy worldwide; however, not all practices are implemented, often to the detriment of the vessel under attack. The purpose of this project is to identify what prevents an attack from being successful. Using data from the International Maritime Bureau’s Piracy Reporting Center and the Sea-Web shipping database, a comprehensive list of vessel characteristics, protective strategies with particular emphasis on BMP4, and cooperation with other companies or governments for each reported attack occurring between 2006 and 2011 was compiled. This information determined what relationships exist between the success or failure of an attack with the vessel and the strategies carried out by the crew. The results of this study can be used to protect ships and crewmembers. Fig. 2. The reported number of incidents of piracy and armed robbery at sea are on the increase. In 2010 alone, there were 445 attacks reported to the International Maritime Bureau’s Piracy Reporting Center (IMB, 2010). Fig. 3. This map was published by the International Maritime Bureau to depict the location of each attack in This map indicates that most incidents occur in Southeast Asia, the Red Sea, and off the coast of Somalia, though there are incidents in the Americas as well as the western coast of Africa (IMB, 2010). Using the IMB’s annually published Piracy and Armed Robbery Against Ships and the IHS Fairplay Sea-web shipping database, a list was created documenting the characteristics of each attack. The variables considered are listed to the right. Each variable was selected to test whether a particular type of strategy or vessel characteristic has a significant relationship with any successful outcome for the pirates or robbers. These variables were assigned a dummy value of a “1”, indicating that the tested variable was present, or a “0”, indicating that the tested value was not present. Variables Dependent Variables The dependent variables represent the potential successful outcomes for the pirates: Any “bad” outcome Hostages being taken Property being stolen Ransom being paid Successful escape Independent Variables The independent variables represent the strategies used by the crew and shipping company to prevent an attack from being successful: Defense strategies Deterrence strategies Cooperative strategies Best management practice Control Variables* The control variables represent the characteristics of the vessel under attack: Region Ship movement Type of ship Age of ship Flag of ship Type of attack * The control variables size of ship and type of cargo were eliminated from the model due to collinearity and the control variables size of crew and number of pirates were eliminated from the model due to insufficient information. With the statistical analysis software (SAS), the independent and control variables were tested against the dependent, or “outcome” variables using the equation: Log(pi/1-pi) = log Oi = alpha + Bi(Df) + Bi(Dt) + Bi(COOP) + C +E Terms: Where Oi is the log odds of a bad outcome, Bi(Df), Bi(Dt), and Bi(COOP) are the vectors of the defense, deterrence and cooperative strategies, respectively. C is the control variable and E is the error term. Because “best practices” was found to be collinear with “defense” and “deterrence, two separate studies, Models A and B, were completed in order to test the effectiveness of general defense, deterrence, and cooperative strategies, as well as industry supported BMP. The results for Model A are displayed in Table 1 and the results for Model B are displayed in Table 2. The significance of each relationship is determined at the p <.1 level. Variables with a positive (+) estimate value are shown to be more likely to result in a successful pirate attack. Variables with a negative (-) estimate value are shown to be likely to prevent an attack from being successful. Preventing a general “bad” outcome: Ships using defense and cooperative strategies, or having a Netherlands flag are found less likely to result in a bad outcome. However, older vessels, or vessels in the regions of Southeast Asia, the Americas, and Africa have a higher chance of a negative outcome. Preventing hostages being taken: Ships using deterrence strategies, flagged under Italy or St. Vincent, at berth, or traversing the Indian Ocean are less likely to have pirates take the crew hostage. However, there is a strong relationship between vessels being hijacked and crew being taken hostage. Preventing the need for ransom being payment: Only defense strategies appear helpful in preventing the need for ransom payment. As with hostages, there is a strong relationship between a vessel being hijacked and the need to pay a ransom. Preventing stolen property: Tankers, tugs, LPG tankers, and Danish flagged vessels are more susceptible to theft. Hijacked vessels are considered stolen property, leading to a strong relationship between these variables. However, vessels attacked off of Somalia are less likely to be victims of theft. Preventing the pirates’ escape: Pirates are more likely to escape from older vessels. No strategy or other vessel characteristic seem to prevent a successful escape. As many of the relationships are the similar in Model A as in Model B, only the differences are noted in this section. Preventing a “bad” outcome: Cooperation continued to be method most likely to prevent a bad outcome in general. In this model, supply ships are considered less likely to have a bad outcome. Preventing hostages being taken: The industry adopted best practices appear to have a positive effect in preventing hostages being taken. Preventing stolen property: The industry adopted best practices appear to have a positive effect in preventing hostages property being stolen. This model also shows that supply ships and vessels in the Gulf of Aden or Somali waters are less likely to be victims of theft, and tankers are no longer considered as at-risk. Preventing the pirates’ escape: In this model, no strategy or vessel characteristic appear likely to prevent a pirate from escaping successfully.