Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Case study of piracy
The impact of piracy on society
Case study of piracy
Don’t take our word for it - see why 10 million students trust us with their essay needs.
The Horn of Africa is one of the most important hubs for maritime traffic in the world today. Raw goods, including oil, that are departing the nations of the Arabian Peninsula in the Middle East must pass through this area in route to Europe and the West. Three-fourths of the Earth is covered in water and roughly eighty percent of global economic goods are transported via commercial maritime shippers. The volume of maritime trade is highly congested in this region. Ships must pass through either the Gulf of Aden and ultimately to the Mediterranean or proceed south from the Arabian Sea towards the southern trip of Africa via the Indian Ocean. Piracy in the region has increasing dramatically in the last decade, largely because Somalia and Yemen can be considered failed states. The lack of government involvement in suppressing pirate activities has indirectly allowed them to flourish. The sheer size of the area, roughly two and a half billion square miles, goes predominantly unpatrolled. The scope of the problem piracy poses pales in comparison to the size of the ocean in which they successfully operate.
Discrepancies arise in the strategic analysis of the security threat piracy and terrorism in the Horn of Africa actually poses. The amount of attacks that can be directly attributed to identified terrorist organizations are remarkably few. Nevertheless, piracy against both private and commercial vessels has increased. In 2012, according to the Combined Maritime Forces (CMF), successful pirate seizers of merchant vessels were reduced from thirty-eight to twenty-one. However, the same report shows a near twenty five percent increase in the number of attempted attacks. On its official website, the International Maritime Organiza...
... middle of paper ...
..., 2009)
Michael D. Greenberg, Peter Chalk, Henry H. Willis, Ivan Khilko, Davis S. Ortiz, “Maritime Terrorism: Risk and Liability,” (Santa Monica, CA: RAND Corporation, 2006)
Rohan Gunaratna, “The Threat to the Maritime Domain: How Real is the Terrorist Threat?” in Modern Piracy and Maritime Terrorism: The Challenge of Piracy for the 21st Century, ed. M.R. Haberfield et al. (Dubuque, IA: Kendall Hunt Publishing Company, 2009)
“Piracy and Armed Robbery Against Ships,” The International Maritime Organization, Accessed March 26th, 2014. http://www.imo.org/OurWork/Security/PiracyArmedRobbery/Pages/Default.aspx
“Protecting Ships from Somali Pirates – The Navy vs. Private Security” Ed. Forbes, gCaptain, March 2013. Accessed March 26th, 2014. http://www.forbes.com/sites/gcaptain/2013/03/11/protecting-ships-from-somali-pirates-the-navy-vs-private-security/
Cordingly’s book Under the Black Flag: The Romance and Reality of Life Among the Pirates tells the story of many different pirates of different time periods by the facts. The book uses evidence from first hand sources to combat the image of pirates produced by fictional books, plays, and films. Cordingly explains where the fictional ideas may have come from using the evidence from the past. The stories are retold while still keeping the interest of the audience without having to stray from the factual
Phillips, Richard, and Stephan Talty. A captain's duty: Somali pirates, Navy Seals, and dangerous days at sea. New York: Hyperion, 2010.
This paper describes our nation and the worlds mindset about airline terrorism before 9/11 and airline terrorism today. This remains a very real and deadly subject even though we don’t have as many incidents occurring at this moment in time. Still the potential for countless lives being lost in an aircraft accident from the actions of a terrorist or terrorist organization is still very real and innocent families across this nation and abroad remain the targets. Additionally, it will show that the security measures in place at airports prior to 9/11 were far less adequate, than today, and personnel responsible for airport security at the gates and throughout were either poorly trained or not trained at all when it came to hijackers and terrorist. This paper will also identify the extensive security measures, rules and training that have been put into place, which helped to curtail acts of terrorism onboard airliners.
attacks of terrorist cells, such as al-Qaeda. The strategic location of the base in Djibouti, Africa
As the U.S. maintains focus on the threat of armed conflict and maritime threats in the region, al-Shabaab continues to pose a threat through weapons trade. According to the U.N. Secur...
Being the oldest daughter of a Senior ATF Agent, I have been exposed to domestic terrorism all of my life. My father has investigated thousands of bombings, fires, and explosions for more than twenty years now. Many of these incidents were examples of the terrorism that I speak about. His experiences have taught me countless lessons and informed me of many current events. The information that I have obtained from him is far more valuable than anything that the media could ever possibly convey. Though he is always strictly guarded with the confidences of his profession, he has always provided me with a firsthand knowledge of the impact that domestic terrorism has on the citizens and law enforcement. Through him, I learn the facts of these incidents without the media’s exaggerations. Today I will share with you some of these facts. I will talk to you about the impact that domestic terrorism has on our citizens. These impacts include: the monetary damages that terrorism inflicts, along with the injuries to the victims, the shocking repercussions that are embedded into the minds and souls of the people who come to sort through the rubble to find the survivors and the remaining evidence.
...oups. Ed. Stephen Currie. San Diego: Lucent Books, 2002. 69-83. Lucent Terrorism Library. Gale Virtual Reference Library. Web. 13 Mar. 2014.
Since around the 19th century piracy has declined from great tales of grandeur and adventure, Instead turning to small dingys of african pirates holding up cargo ships in trade routes. In conclusion, although the golden age of piracy has come to an end, the legendary stories of famous, ruthless, and cunning pirates still live on in movies and books reminding us of times where you couldnt go out for a swim without being kidnapped or strung up to the yardarm of a ship!
The Golden Age of Piracy began around 1650, and ended around 1730. Piracy is an act of robbery or criminal violence at sea, but can include acts committed on land, in the air, or in other major bodies of water or on a shore. It does not normally include crimes committed against persons traveling on the same vessel as the criminal. The term has been used throughout history to refer to raids across land borders by non-state agents. A pirate is one who commits robberies at sea, usually without being allotted to do so by any particular nation. The usual crime for piracy can include being hung, or publically executed. Some of the most famous pirates who were killed either because of piracy, or because of natural causes, are Barbarossa, Stede Bonnet, Anne Bonney, Sir Francis Drake, Captain Greaves, William Kidd, Jean Laffite, Sir Henry Morgan, Mary Read, and Giovanni da Verrazano.
Whitten, R ‘Climate Change and National Security’, in Association of the United States Navy. January 2010, viewed 22nd May 2010, .
Modern piracy has touched nearly every corner of the globe and has increased with globalization. The tentacles of piracy now extend from South America to the South China Sea. The greatest numbers of piracy incidents occur along maritime commercial trade routes. Since China dominates the world’s container shipping industry, the South China Sea has become a hotspot for piracy (Kraska 2011). The prominence of cargo activity increases opportunity for pirates and indisputably triggered the sixty- nine incidents of piracy that were reported in 2009 in the South China Sea (Kraska 2011).
These plans are to be used to deter and when responding to a maritime incident (GPO, 2002, p.7). These plans will lay out response procedures, asset availability and locations, policies, and techniques. The premise of this section is to limit the secondary and tertiary effects of a maritime incident in order to limit the economic impacts of such an event. Part of these plans will direct methods to reestablish the flow of commerce to other transportation nodes to limit the detrimental effects the loss of a port would have on the entire economy. The encompassing part of this section is the focus on methods and procedures on how to identify an incident and report it up the echelons of command.
Asymmetrical warfare has become a commonality throughout 20th and 21st century warfare; often, smaller groups use erratic, scattered, and non-linear methods to fight larger and much better equipped adversaries as a way to level out the playing field. Within these often non-linear, yet partially collective entities; to remain successful, it is necessary for each group align itself with a wide array of global funding and supply mechanisms. The three sources utilized: R.J. Godlewski’s journal article, “Financial Counterintelligence: Fractioning the Lifeblood of Asymmetrical Warfare”, the National Anti-Money Laundering report of Tanzania, and the African Poaching Crisis & America’s Responsibility and will present the idea that modern insurgent-based
The report classify the threats into: (1) Piracy and armed robbery, (2) terrorist acts, (3) the illicit trafficking in arms and weapons of mass destruction, (4) the illicit trafficking in narcotics, (5) smuggling and
Piracy is the direct threat to maritime security for ship owners. Other crimes such as maritime terrorism and the use of phantom ships are far less common, although still a significant issue. The International Maritime Bureau’s Piracy Reporting Center (IMB-PRC) defines piracy as “an act of boarding or attempting to board any ship with the intent to commit theft or any other crime and with the intent or capability to use force in the furtherance of that act”.