Skip to main content

Maritime Security and Transformations in Global Governance

  • Chapter
  • First Online:
Security Privatization
  • 730 Accesses

Abstract

In a short period of time stretching from 2010 to 2012, international guidance was issued, industry guidelines were re-written, and national laws were changed for the purposes of enhancing maritime security through armed private security provision. Having previously been shunned by ship-owners and national government alike, armed private security contractors are today considered legitimate security providers on board ships transiting piracy-infested waters. Recognizing the global shift in practice and perception, the chapter analyses the global governance arrangement surrounding the resort to armed private security in the maritime domain for the purpose of casting new light on private and public governance capacities. By doing so, the chapter also challenges implicit perceptions of maritime governance as distinct from land-based governance. In the maritime governance arrangement under scrutiny, public actors neither row nor steer; rather, they facilitate security governance by carving out privileged spheres for commercial industries through their convening capacities, regulatory infrastructure and legitimizing role. The facilitation by public actors of private actors in the governance arrangement surrounding private maritime security denotes both an active and passive reaction to changes in the globalized security environment in order remain relevant in contemporary security politics, also referred to as the ’globalization paradox’. The findings highlight the truly global impact of evolving governance dynamics, and the changing relationship between private and public governors.

The article was originally published while the author was affiliated with Aarhus University, Department of Political Science. The article reflects the opinions of the author and does not represent NOKUT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    It is important to stress that the use of armed guards is not a new feature in the maritime industry. However, the official recognition of the practice is new (Roundtable of International Shipping Associations 2011), and this very recognition and following legalization created a measurable increase in the number of armed transits as documented by Dutton (2013, p. 108). It is difficult, however, to say exactly how widespread the practice was before the 2010–2012 official recognition (see Cullen 2012).

  2. 2.

    For comprehensive overview of flag-state regulations, see the overview provided by the ICS (2013).

References

  • Aarstad, Å. K. (2016). Who governs Norwegian maritime security? Public facilitation of private security in a fragmented security environment. Cooperation and Conflict. doi:10.1177/0010836716652425.

    Google Scholar 

  • Abrahamsen, R., & Williams, M. C. (2007). Security the city: Private security companies and non-state authority in global governance. International Relations, 21(2), 237–253.

    Article  Google Scholar 

  • Abrahamsen, R., & Williams, M. C. (2009). Security beyond the state: Global security assemblages in international politics. International Political Sociology, 3, 1–17.

    Article  Google Scholar 

  • Abrahamsen, R., & Williams, M. C. (2011). Security beyond the state. Cambridge: Cambridge University Press.

    Google Scholar 

  • Aegis. (2015). Services – aegis maritime. Accessed December 01, 2014, from http://www.aegisworld.com/service/maritime/

  • Agnew, A. (1994). The territorial trap: The geographical assumptions of international relations theory. Review of International Political Economy, 1(1), 53–80.

    Article  Google Scholar 

  • Avant, D. D., Finnemore, M., & Sell, S. K. (2010). Who governs the globe? New York: Cambridge University Press.

    Book  Google Scholar 

  • Barrows, S. (2009). Racing to the Top…at Last: The regulation of safety in shipping. In W. Mattli & N. Woods (Eds.), The politics of global regulation (pp. 189–210). Princeton: Princeton University Press.

    Google Scholar 

  • Behr, H. (2008). Deterritorialisation and the transformation of statehood: The paradox of globalisation. Geopolitics, 13(2), 359–382.

    Article  Google Scholar 

  • Berndtsson, J., & Stern, M. (2011). Private security and the public-private divide: Contested lines of distinction and modes of governance in the Stockholm-Arlanda security assemblage. International Political Sociology, 5, 408–425.

    Article  Google Scholar 

  • Berube, C., & Cullen, P. (Eds.). (2012). Maritime private security. Market responses to piracy, terrorism, and waterborne security risks in the 21st century. London: Routledge.

    Google Scholar 

  • Best, J., & Gheciu, A. (Eds.). (2014). The return of the public in global governance. New York: Cambridge University Press.

    Google Scholar 

  • Best Management Practice 3. (2010). Best management practice 3. Piracy off the coast of Somali and Arabian Sea area. Version 3, June 2010. Edinburgh: Witherby Seamanship International Ltd..

    Google Scholar 

  • Best Management Practice 4. (2011). Best management practices for protection against Somali based piracy. Version 4, August 2011. Edinburgh: Witherby Seamanship International Ltd..

    Google Scholar 

  • Bieling, H.-J.. (2007). On the other side of the coin: Conceptualizing the relationship between business and the state in the age of globalisation. Business and Politics, 9(3), article 5.

    Google Scholar 

  • Brown, J. (2012, September). Pirates and privateers: Managing the Indian oceans private security Boom. Lowy Institute for International Policy. Accessed October 5, 2014, from http://www.lowyinstitute.org/files/brown_pirates_and_privateers_web.pdf

  • Bueger, C. (2015). What is maritime security? Marine Policy, 53, 159–164.

    Article  Google Scholar 

  • Carmola, C. (2010). Private military companies and new wars: Risk, law & ethnics. London: Routledge.

    Google Scholar 

  • Colás, A., & Mabee, B. (2010). The flow and ebb of private seaborn violence in global politics: Lessons from the Atlantic World, 1689–1815. In A. Colás & B. Mabee (Eds.), Mercenaries, pirates, bandits and empires: Private violence in historical context (pp. 83–106). New York: Columbia University Press.

    Google Scholar 

  • Cook, P. (2014). SAMI - The security association for maritime industries. Interview, 2(09), 14.

    Google Scholar 

  • Cowen, D. (2014). The deadly life of logistics. Minneapolis: University of Minnesota Press.

    Book  Google Scholar 

  • Cullen, P. (2012). Surveying the market in maritime private security services. In C. Berube & P. Cullen (Eds.), Maritime private security. Market responses to piracy, terrorism, and waterborne security risks in the 21st century (pp. 25–37). London: Routledge.

    Google Scholar 

  • Cutler, C. A. (1997). Artifice, ideology, and paradox: The public/private distinction in international trade law. Review of International Political Economy, 4(2), 261–285.

    Article  Google Scholar 

  • Cutler, C. A. (1999). Private authority in international trade relations: The case of maritime transport. In C. A. Cutler, V. Haufler, & T. Porter (Eds.), Private authority and international affairs (pp. 283–332). Albany: State University of New York Press.

    Google Scholar 

  • Cutler, C. A. (2003). Private power and global authority. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Dupont, B. (2004). Security in the age of networks. Policing & Society, 14(1), 76–91.

    Article  Google Scholar 

  • Dutton, Y. (2013). Gunslingers on the high seas: A call for regulation. Duke Journal of Comparative & International Law, 24(1), 107–160.

    Google Scholar 

  • Florquin, N. (2012). Escalation at sea: Somali piracy and private security companies. In Small Arms Survey (Ed.), Small arms survey 2012: Moving targets (pp. 190–217). Cambridge: Cambridge University Press.

    Google Scholar 

  • Gibson, P. (2014). SCEG - The security in complex environments group. Interview, 1(09), 14.

    Google Scholar 

  • Green, J. F. (2014). Rethinking private authority: Agents and entrepreneurs in global governance. Princeton: Princeton University Press.

    Google Scholar 

  • Grewal, T. (2008). International ship safety regulations. In W. Talley (Ed.), Maritime safety, security and piracy. London: Informa Law.

    Google Scholar 

  • Guzzini, S., & Neumann, I. (Eds.). (2012). The diffusion of power in global governance. Basingstoke: Palgrave Macmillan.

    Google Scholar 

  • Hall, R. B., & Biersteker, T. J. (Eds.). (2002). The emergence of private authority in global governance. Cambridge: Cambridge University Press.

    Google Scholar 

  • Hansen, S. J. (2012). The evolution of best management practices in the civil maritime sector. Studies in Conflict & Terrorism, 35(7–8), 562–569.

    Article  Google Scholar 

  • Hirst, O., & Thompson, G. (1992). The problem of “globalization”: International economic relations, national conomic management and the formation of trading locks. Economy and Society, 21, 357–396.

    Article  Google Scholar 

  • Hönke, J. (2013). Transnational companies and security governance: Hybrid practices in a postcolonial world. London and New York: Routledge.

    Google Scholar 

  • ICS—International Chamber of Shipping. (2013). Comparison of flag state laws on armed guards and arms on board. Accessed January 10, 2015, from http://www.ics-shipping.org/docs/default-source/Piracy-Docs/comparison-of-flag-state-laws-on-armed-guards-and-arms-on-board3F9814DED68F.pdf?sfvrsn=0

  • IMB—International Maritime Bureau. (2007). Piracy and armed robbery against ships, report for the period 1 January–31 December 2006. London: ICC International Maritime Bureau. Accessed October 31, 2014, from https://www.icc-ccs.org/piracy-reporting-centre/request-piracy-report

  • IMB—International Maritime Bureau. (2012). Piracy and armed robbery against ships, report for the period 1 January–31 December 2011. London: ICC International Maritime Bureau. Accessed October 31, 2014, from https://www.icc-ccs.org/piracy-reporting-centre/request-piracy-report

  • IMO—International Maritime Organization. (2011). Interim recommendations for port and coastal states regarding the use of privately contracted armed security personnel on board ships in the high risk area. IMO Doc.MSC.1/Circ.1408. London: IMO.

    Google Scholar 

  • IMO—International Maritime Organization. (2012a). Interim guidance to private maritime security companies providing privately contracted armed security personnel on board ships in the high risk area. IMO Doc.MSC.1/Circ.1443. London: IMO.

    Google Scholar 

  • IMO—International Maritime Organization. (2012b). Revised interim guidance for flag states regarding the use of privately contracted armed security personnel on board ships in the high risk area. IMO Doc.MSC.1/Circ.1406/Rev.2. London: IMO.

    Google Scholar 

  • IMO—International Maritime Organization. (2012c). Revised interim guidance to ship owners, ship operators and ship masters on the use of privately contracted armed security personnel on board ships in the high risk area. IMO Doc. MSC.1/Circ.1405/Rev2. London: IMO.

    Google Scholar 

  • IMO—International Maritime Organization. (2015). Private armed security. Accessed December 30, 2015, from http://www.imo.org/en/OurWork/Security/PiracyArmedRobbery/Pages/Private-Armed-Security.aspx

  • International Transport Federation. (2015). Defining FOCs and the problems they pose. Accessed January 3, 2015, from http://www.itfseafarers.org/defining-focs.cfm

  • ISO—International Organization for Standardization. (2013). Ships and marine technology – Guidelines for private maritime security companies (PMSC) providing privately contracted armed security personnel (PCASP) onboard ships (and pro forma contract), ISO/PAS 28007. Geneva: ISO.

    Google Scholar 

  • Jessop, B. (2002). Globalization and the national state. In S. Aaronowitz & P. Bratsis (Eds.), Paradigm lost: State theory reconsidered (pp. 185–220). Minneapolis: University of Minnesota Press.

    Google Scholar 

  • JWC—Joint War Committee. (2010, December 16). Increased range of Somali-based piracy. JW2010/009. Accessed January 3, 2015, from http://www.lmalloyds.com/LMA/CMDownload.aspx?ContentKey=2e87ba17-4c5f-4318-aaa2-9b0011b7e86c&ContentItemKey=a80d3f67-9693-4d7b-9247-3eedfa741d46

  • Klinkenberg, I. K. (2013). Pirates versus private security companies – A road to safety or insecurity at sea. Unpublished MA dissertation. Department of Nograric, Norwegian University of Life Sciences.

    Google Scholar 

  • Kraska, J. (2013). International and comparative regulation of private maritime security companies employed in counter-piracy. In D. Guildfoyle (Ed.), Modern piracy: Legal challenges and responses (pp. 19–249). Cheltenham: Edward Elgar Publishing Limited.

    Google Scholar 

  • Leander, A. (2010). Practices (Re)producing orders: Understanding the role of business in global security governance. In M. Ougaard (Ed.), Business and global governance (pp. 57–78). Abingdon: Routledge.

    Google Scholar 

  • Leira, H., & de Carvalho, B. (2010). Privateers of the North Sea: At worlds end. In A. Colás & B. Mabee (Eds.), Mercenaries, pirates, bandits and empires: Private violence in historical context (pp. 55–82). New York: Columbia University Press.

    Google Scholar 

  • Liss, C. (2009). Privatization of maritime security in Southeast Asia. In T. Jäger & G. Kümmel (Eds.), Private military and security companies: Chances, problems, pitfalls and prospects. Wiesbaden: Springer.

    Google Scholar 

  • Lloyd’s Register LRQA. (2014). Your guide to implementing ISO/PAS 28007. Coventry: Lloyd’s Register Quality Assurance Limited.

    Google Scholar 

  • Loader, I., & Walker, N. (2007). Civilizing security. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Lobo-Guerrero, L. (2008). “Pirates,” stewards, and the securitization of global circulation. International Political Sociology, 2(3), 219–235.

    Article  Google Scholar 

  • Mabee, B. (2003). Security studies and the ‘Security State’: Security provision in historical context. International Relations, 17(2), 135–151.

    Article  Google Scholar 

  • Miller, J. (2009). Piracy causes changes in routes, insurance. The Wall Street Journal, 9 April.

    Google Scholar 

  • MSC—Maritime Safety Committee. (2011). Report of the maritime safety committee on its eighty-ninth session. MSC 89/25, 27.05.11. London: IMO.

    Google Scholar 

  • MSC—Maritime Safety Committee. (2012). Guidance for private maritime security companies agreed by IMO’s Maritime Safety Committee. Briefing: 17, 25.05.12. Accessed January 20, 2015, from http://www.imo.org/MediaCentre/PressBriefings/Pages/17-msc-90-piracy.aspx#.VMv8EC4YG5I

  • MSC—Maritime Safety Committee. (2014, November 26). Report of the maritime safety committee on its ninety-fourth session. MSC 94/21. London: IMO.

    Google Scholar 

  • Murphy, M. (2009). Small boats, weak states, dirty money: Piracy and maritime terrorism in the modern world. London: Hurst and Company.

    Google Scholar 

  • Oliveira, G. C. (2013). ‘New Wars’ at sea: A critical transformative approach to the political economy of Somali piracy. Security Dialogue, 44(1), 3–18.

    Article  Google Scholar 

  • Owens, P. (2008). Distinctions, distinctions: ‘Public’ and ‘private’ force. International Affairs, 84(2), 977–990.

    Article  Google Scholar 

  • Petrig, A. (2014). Human rights and law enforcement at sea: Arrest, detention and transfer of piracy suspects. Leiden: Koninklijke Brill.

    Google Scholar 

  • Pfeifer, S. (2009, April 21). Aegis sets sights on foiling pirates off Somali coast. Financial Times.

    Google Scholar 

  • Pittney, J. J., Jr., & Levin, J. C. (2013). Private anti-piracy navies: How warships for hire are changing maritime security. Lanham: Lexington Books.

    Google Scholar 

  • Pristrom, S., Li, K. X., Yang, Z., & Wang, J. (2013). A study of maritime security and piracy. Maritime Policy & Management, 40(7), 675–693.

    Article  Google Scholar 

  • Pristrom, S. & Madsen, H. (2014, September 1) IMO – The international maritime organization. Interview.

    Google Scholar 

  • Ritchie, R. C. (1997). Government measures against piracy and privateering in the Atlantic area, 1750–1850. In D. J. Starkey, E. S. van Eyck van Heslinga, & J. A. de Moor (Eds.), Pirates and privateers: New perspectives on the war on trade in the eighteenth and nineteenth centuries. Exeter: University of Exeter Press.

    Google Scholar 

  • Roundtable of International Shipping Associations. (2011). Letter for secretary-general Ban Ki-Moon. Accessed November 28, 2014, from https://www.bimco.org/~/media/About/Press/2011/Letter_to_Ban_Ki-Moon_-_Piracy.ashx

  • Safety4Sea. (2011). Industry guidelines regarding the use of private maritime security contractors, May 20, 2011. Accessed April 20, 2015, from http://www.safety4sea.com/industry-guidelines-regarding-the-use-of-private-maritime-security-contractors--4073

  • Salter, M. (Ed.). (2009). Politics at the airport. Minneapolis: University of Minnesota Press.

    Google Scholar 

  • SAMI—Security Association for the Maritime Industries. (2014). The evolution of the security association for the maritime industry (SAMI) and piracy in the Indian Ocean. Lessons from Piracy. Accessed September 10, 2014, from http://www.lessonsfrompiracy.net/files/2014/06/DRAFT-The-Evolution-of-the-Security-Association-for-the-Maritime-Industry-8-May-14.pdf

  • Sassen, S. (2003). Globalization or denationalization. Review of International Political Economy, 10(1), 1–22.

    Article  Google Scholar 

  • Sassen, S. (2006). Territory, authority, rights: From medieval to global assemblages. Princeton: Princeton University Press.

    Google Scholar 

  • SCEG—Security in Complex Environments Group. (2015). Accredited certification for PSC1/ISO 18788 and ISO 28007. Accessed August 5, 2014, from https://www.adsgroup.org.uk/pages/95837038.asp

  • Schouten, P. (2014). Security as controversy: Reassembling security at Amsterdam airport. Security Dialogue, 45(1), 23–42.

    Article  Google Scholar 

  • Siebels, D. (2014). International standards for the private security industry. The RUSI Journal, 159(5), 76–83.

    Article  Google Scholar 

  • Stawpert, J. (2014, October 02). ICS – The international chamber of shipping. Interview.

    Google Scholar 

  • Steinberg, P. (2001). The social construction of the ocean. Cambridge: Cambridge University Press.

    Google Scholar 

  • Steinberg, P. (2009). Sovereignty, territory, and the mapping of mobility: A view from the outside. Annals of the Association of American Geographers, 99(3), 467–495.

    Article  Google Scholar 

  • Struett, M., Carlson, J. D., & Nance, M. (Eds.). (2013). Maritime piracy and the construction of global governance. New York and London: Routledge.

    Google Scholar 

  • Thompson, J. (1994). Mercenaries pirates and sovereigns. Princeton: Princeton University Press.

    Google Scholar 

  • Van Hespen, I. (2014). Protecting merchant ships from maritime piracy by privately contracted armed security personnel: A comparative analysis of flag stat legislation and port and coastal state requirements. Journal of Maritime Law & Commerce, 45(3), 361–400.

    Google Scholar 

  • Walker, R. B. J. (1993). Inside/Outside: International relations as political theory. Cambridge: Cambridge University Press.

    Google Scholar 

  • Williams, M. C. (2010). The public, the private and the evolution of security studies. Security Dialogue, 41(6), 1–8.

    Article  Google Scholar 

  • Wood, J., & Shearing, C. D. (2006). Imagining security. Devon: Willan Publishing.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Åsne Kalland Aarstad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Aarstad, Å.K. (2018). Maritime Security and Transformations in Global Governance. In: Bures, O., Carrapico, H. (eds) Security Privatization. Springer, Cham. https://doi.org/10.1007/978-3-319-63010-6_4

Download citation

Publish with us

Policies and ethics