Skip to main content

How to Thwart Success in Piracy: Core Strategies of Security

  • Chapter
  • First Online:
Piracy at Sea

Part of the book series: WMU Studies in Maritime Affairs ((WMUSTUD,volume 2))

Abstract

Many piracy security experts agree that the level of lethal violence will continue to accelerate resulting in “small wars” on the open sea [Christie C (2011) Piracy likely to escalate into small wars says expert. Maritime Reporter and MarineNews Magazine Online (March 24, 2011). Available online www.marinelink.com/news/escalate-likely-piracy337708.aspx]. If the events begin to resemble “small wars” then new security defenses are needed. Vessel operators can learn from military strategy to adopt company strategies that reduce the ability of pirates to be successful.

In this paper, we draw upon NATO defense strategic initiative framework in proposing a company core strategies model for security against piracy. There are four core strategies in this model:

  1. 1.

    Defense strategies which provide tactics and processes to defend against an attack;

  2. 2.

    Deterrence strategies which provide structures and designs that prevent the taking of a ship under attack;

  3. 3.

    Gaining and using intelligence strategies which buy or invest in knowledge on how to thwart piracy attacks; and

  4. 4.

    Cooperation strategies which sharing tactics, resources, and process across competitors and other companies to collectively thwart attacks.

We evaluate the International Maritime Bureau and Sea Wed data on piracy events for the last 3 years in light of this framework. We test which strategies or which combination is most successful in thwarting success. Findings reveal that adopting the four core strategies model reduces pirate attack success. Further, we also find that deterrence strategies are most consistent and successful in thwarting pirate attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Munns (2004), pp. 10–14; Chalk (2008), pp. 17–19; IMO fights piracy (1993), p. 79.

  2. 2.

    Kraska (2010), pp. 109–119.

  3. 3.

    Vreÿ (2010), pp. 121–132.

  4. 4.

    BMP4 (2011).

  5. 5.

    Bateman (2010), pp. 737–751.

  6. 6.

    Id.

  7. 7.

    “Active Engagement, Modern Defense,” NATO Strategic Concept, adopted 2010, available online: <www.nato.int/srategic-concept/index.html>.

  8. 8.

    Czinkota et al. (2010), pp. 826–843.

  9. 9.

    Murkherjee and Mejia (2005), pp. 33–51. Hereafter cited as “Contemporary Issues in Maritime Security”.

  10. 10.

    Mensah (2005), pp. 1–15.

  11. 11.

    Murkherjee and Mejia (2005), pp. 33–51.

  12. 12.

    Abhyankar (2005), pp. 201–243.

  13. 13.

    Mbiah (2005), pp. 163–199.

  14. 14.

    Murkherjee and Mejia (2005), pp. 33–51.

  15. 15.

    Crenshaw (1988), p. 1.

  16. 16.

    Murkherjee and Mejia (2005), pp. 33–51.

  17. 17.

    Todd (2005), pp. 299–317.

  18. 18.

    Xu (2005), pp. 319–332.

  19. 19.

    Mahmood et al. (2011), pp. 820–848.

  20. 20.

    Mitropoulos (2005), pp. 151–161.

  21. 21.

    Krashka and Wilson (2008), pp. 41–52.

  22. 22.

    Li and Vashchilko (2010), pp. 765–782.

  23. 23.

    Crye (2005), pp. 73–87.

  24. 24.

    Abhyankar (2005), pp. 201–243.

  25. 25.

    Abhyankar (2005), pp. 201–243.

  26. 26.

    Mukherjee and Mustafar (2005), pp. 277–285.

  27. 27.

    Arendt and Engler (2005), pp. 287–298.

  28. 28.

    International Maritime Bureau, Piracy Reporting Centre, available online: <http://www.icc-ccs.org/piracy-reporting-centre>.

  29. 29.

    Id.

  30. 30.

    Menefee (2005), pp. 245–263.

  31. 31.

    Abhyankar (2005), pp. 201–243.

  32. 32.

    IHS Fairplay, Sea-web, IHS Global Limited, available online: <http://www.sea-web.com>.

  33. 33.

    Id.

  34. 34.

    Crye (2005), pp. 73–87.

  35. 35.

    Mukundan (2007), pp. 1–12.

References

  • Abhyankar J (2005) Maritime crime. In: Mejia M (ed) Contemporary issues in maritime security. World Maritime University, Malmö, pp 201–243

    Google Scholar 

  • Arendt F, Engler M (2005) Using electronic seals to enhance maritime security. In: Mejia M (ed) Contemporary issues in maritime security. World Maritime University, Malmö, pp 287–298

    Google Scholar 

  • Bateman S (2010) Maritime piracy in the Indo-Pacific region – ship vulnerability issues. Marit Policy Manag 37(7):737–751

    Article  Google Scholar 

  • BMP4 (2011) BMP4: best management practices for protection against Somalia based piracy. Witherby Publishing Group Ltd., Edinburgh

    Google Scholar 

  • Chalk P (2008) Maritime violence, crime and insecurity. J Int Peace Oper 4(3):17–19

    Google Scholar 

  • Crenshaw M (1988) International terrorism. In: Schlagheck DM (ed) DC Heath and Company, Lexington, p 1

    Google Scholar 

  • Crye MJ (2005) Shipowners perspective on the ISPS Code. In: Mejia M (ed) Contemporary issues in maritime security. World Maritime University, Malmö, pp 73–87

    Google Scholar 

  • Czinkota MR, Knight G, Liesch PW, Steen J (2010) Terrorism and international business: a research agenda. J Int Bus Stud 41:826–843

    Article  Google Scholar 

  • IMO fights piracy (1993) U N Chronicle 30(2):79

    Google Scholar 

  • Krashka J, Wilson B (2008) Fighting pirates: the pen and the sword. World Policy J 25(4):41–52

    Article  Google Scholar 

  • Kraska J (2010) Freakonomics of maritime piracy. Brown J World Aff 16(2):109–119

    Google Scholar 

  • Li Q, Vashchilko T (2010) Dynamic military conflict, security alliances, and bilateral FDI flows. J Int Bus 41:765–782

    Article  Google Scholar 

  • Mahmood IP, Zhu H, Zajac EJ (2011) Where can capabilities come from? Network ties and capability acquisition in business groups. Strateg Manag J 32:820–848

    Article  Google Scholar 

  • Mbiah K (2005) The revision of SUA convention: an update. In: Contemporary issues in maritime security. World Maritime University, Malmö, pp 163–199

    Google Scholar 

  • Menefee SP (2005) Under-reporting of the problems of maritime piracy and terrorism: are we viewing to tip of the iceberg? In: Mejia M (ed) Contemporary issues in maritime security. World Maritime University, Malmö, pp 245–263

    Google Scholar 

  • Mensah TA (2005) The ISPS Code and the international regime to protect maritime security. In: Mejia M (ed) Contemporary issues in maritime security. World Maritime University, Malmö, pp 1–15

    Google Scholar 

  • Mitropoulos E (2005) Maritime security and the IMO. In: Mejia M (ed) Contemporary issues in maritime security. World Maritime University, Malmö, pp 151–161

    Google Scholar 

  • Mukherjee PK, Mustafar AM (2005) The International Ship and Port Facility Security (ISPS) Code and human element issues. In: Mejia M (ed) Contemporary issues in maritime security. World Maritime University, Malmö, pp 277–285

    Google Scholar 

  • Mukundan P (2007) Maritime security and crime: risk and response. In: Mejia M (ed) International symposium on maritime security: stowaways, contraband, and other threats. World Maritime University, Malmö, 2007, pp 1–12

    Google Scholar 

  • Munns DP (2004) Rise in murders, kidnapping at sea makes piracy a top naval priority world wide. Sea Power 47(10):10–14

    Google Scholar 

  • Murkherjee PK, Mejia M (2005) The ISPS Code: legal and ergonomic considerations. In: Mejia M (ed) Contemporary issues in maritime security. International symposium on contemporary issues in maritime security. World Maritime University, Malmö, 2005, pp 33–51

    Google Scholar 

  • Todd P (2005) Private law aspects and commercial concerns associated with emerging issues in maritime security. In: Mejia M (ed) Contemporary issues in maritime security. World Maritime University, Malmö, pp 299–317

    Google Scholar 

  • Vreÿ F (2010) African maritime security: a time for good order at sea. Austr J Marit Ocean Aff 2(4):121–132

    Google Scholar 

  • Xu J (2005) The law and economics of maritime security. In: Mejia M (ed) Contemporary issues in maritime security. World Maritime University, Malmö, pp 319–332

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joan P. Mileski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Mileski, J.P., Mejia, M.Q., Carchidi, A.D. (2013). How to Thwart Success in Piracy: Core Strategies of Security. In: Mejia, Jr., M., Kojima, C., Sawyer, M. (eds) Piracy at Sea. WMU Studies in Maritime Affairs, vol 2. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39620-5_15

Download citation

Publish with us

Policies and ethics