{"id":26,"date":"2020-02-10T12:50:45","date_gmt":"2020-02-10T12:50:45","guid":{"rendered":"http:\/\/www.safeseas.net\/evidence\/?p=26"},"modified":"2022-11-01T21:44:22","modified_gmt":"2022-11-01T21:44:22","slug":"piracy","status":"publish","type":"post","link":"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/","title":{"rendered":"Piracy"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"pirint\">Introduction<\/h2>\n\n\n\n<p style=\"font-size:16px\">There is a significant body of work discussing what constitutes contemporary piracy.<span id='easy-footnote-1-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-1-26' title='&lt;a href=&quot;https:\/\/www.hurstpublishers.com\/book\/small-boats-weak-states-dirty-money\/&quot;&gt;Murphy 2008&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09733150903121893&quot;&gt;Chalk 2009&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/book\/27848&quot;&gt;Petrig &amp;amp; Geiss 2011&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.elgaronline.com\/view\/edcoll\/9781849804844\/9781849804844.xml&quot;&gt;Guilfoyle 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/chapter\/10.1007\/978-1-349-67284-4_11&quot;&gt;Beckman &amp;amp; Page 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/18366503.2014.915492&quot;&gt;Amri 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3344053&quot;&gt;Kao 2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/journals.co.za\/doi\/abs\/10.10520\/EJC-139fea25f4&quot;&gt;Otto 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.springerprofessional.de\/en\/maritime-piracy-and-armed-robbery-at-sea\/17915890&quot;&gt;Otto &amp;amp; Jernberg 2020&lt;\/a&gt;; &lt;a href=&quot;https:\/\/oxfordre.com\/view\/10.1093\/acrefore\/9780190228637.001.0001\/acrefore-9780190228637-e-829&quot;&gt;Dua 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;'><sup>1<\/sup><\/a><\/span> Under the UN Convention on the Law of the Sea (UNCLOS), piracy is defined as \u2018illegal acts of violence or detention, or any act of depredation, committed for private ends by the crew or the passengers of a private ship\u2019 against another ship on the high seas.<span id='easy-footnote-2-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-2-26' title='&lt;a href=&quot;https:\/\/www.un.org\/Depts\/los\/piracy\/piracy_legal_framework.htm&quot;&gt;UNCLOS 2010&lt;\/a&gt;'><sup>2<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Two aspects of this definition are noteworthy. The first is the high seas requirement, which means that attacks on ships that take place in spaces other than the high seas (such as the territorial waters of states) do not fall under the UNCLOS piracy definition. Such incidents are referred to as \u2018robbery at sea\u2019 rather than piracy for this reason.<span id='easy-footnote-3-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-3-26' title='&lt;a href=&quot;https:\/\/www.un.org\/Depts\/los\/piracy\/piracy_legal_framework.htm&quot;&gt;UNCLOS 2010&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.recaap.org\/piracy_definitions_and_actions&quot;&gt;ReCAAP n.d.&lt;\/a&gt;'><sup>3<\/sup><\/a><\/span> The distinction is important because of the different legal regimes which apply in each case. Piracy on the high seas falls under UNCLOS provisions, while  robbery in the sovereign waters of states constitutes an offence under the 1988 Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation (SUA Convention), and falls under national legal jurisdictions.<span id='easy-footnote-4-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-4-26' title='&lt;a href=&quot;https:\/\/www.un.org\/Depts\/los\/piracy\/piracy_legal_framework.htm&quot;&gt;UNCLOS 2010&lt;\/a&gt;'><sup>4<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">The second contention centres on the \u2019two-ship\u2019 requirement, which requires that one vessel be attacked or boarded by another to count as piracy under UNCLOS.<span id='easy-footnote-5-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-5-26' title='&lt;a href=&quot;https:\/\/academic.oup.com\/ejil\/article\/20\/2\/399\/500835&quot;&gt;Treves 2009&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.elgaronline.com\/view\/edcoll\/9781849804844\/9781849804844.xml&quot;&gt;Guilfoyle 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/25725084.2020.1788200&quot;&gt;Ahmad 2020&lt;\/a&gt;'><sup>5<\/sup><\/a><\/span> Often anchored ships are attacked by armed robbers using small boats, meeting this requirement, but other incidents may include armed robbery taking place in ports where armed robbers can approach on foot.<span id='easy-footnote-6-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-6-26' title='&lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792680?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;'><sup>6<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Not all organisations follow the UNCLOS definition. For example, the International Maritime Bureau (IMB) defines piracy as \u2018an act of boarding or attempting to board any ship with the apparent intent to commit theft or any other crime and with the apparent intent or capability to use force in the furtherance of that act&#8217;.<span id='easy-footnote-7-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-7-26' title='for discussions, see: &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/26999257#metadata_info_tab_contents&quot;&gt;Dillon 2005&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.abc-clio.com\/products\/a3157c\/&quot;&gt;Kraska 2011&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.routledge.com\/Modern-Maritime-Piracy-Genesis-Evolution-and-Responses\/McCabe\/p\/book\/9780367889005&quot;&gt;McCabe 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;'><sup>7<\/sup><\/a><\/span><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"799\" height=\"532\" src=\"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/09\/12053582166_aec0ef2947_c.jpg\" alt=\"\" class=\"wp-image-544\" srcset=\"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/09\/12053582166_aec0ef2947_c.jpg 799w, https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/09\/12053582166_aec0ef2947_c-300x200.jpg 300w, https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/09\/12053582166_aec0ef2947_c-768x511.jpg 768w, https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/09\/12053582166_aec0ef2947_c-150x100.jpg 150w\" sizes=\"(max-width: 799px) 100vw, 799px\" \/><figcaption><em>On Saturday 18 January 2014, the French EU Naval Force (EU NAVFOR) Somalia Operation Atalanta flagship FS Siroco in cooperation with Japanese assets released the crew of a Dhow that was suspected to have been used as pirate mother-ship. By EUNAVFOR. Attribution-NoDerivs 2.0 Generic (CC BY-ND 2.0)<\/em><\/figcaption><\/figure>\n<\/div>\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Characteristics<\/h2>\n\n\n\n<p style=\"font-size:16px\"><em>Hotspots<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Contemporary piracy has been concentrated in three main regions of the world: the Western Indian Ocean (specifically off the coast of Somalia),<span id='easy-footnote-8-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-8-26' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01402390.2012.750242&quot;&gt;Percy &amp;amp; Shortland 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/ejil\/article\/20\/2\/399\/500835&quot;&gt;Treves 2009&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/jicj\/article-abstract\/10\/4\/749\/809312&quot;&gt;Dua &amp;amp; Menkhaus 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/13523260.2011.590359&quot;&gt;Bueger et al. 2011&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.elgaronline.com\/view\/edcoll\/9781849804844\/9781849804844.00010.xml&quot;&gt;Guilfoyle 2013&lt;\/a&gt;'><sup>8<\/sup><\/a><\/span> the Gulf of Guinea,<span id='easy-footnote-9-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-9-26' title='&lt;a href=&quot;https:\/\/journals.co.za\/doi\/abs\/10.10520\/EJC47514&quot;&gt;Vrey 2009&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/26397818#metadata_info_tab_contents&quot;&gt;Kamal-Deen 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/21520844.2013.862767&quot;&gt;Onuoha 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/18366503.2016.1217377&quot;&gt;Oyewole 2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9781003001324-13\/politics-piracy-numbers-gulf-guinea-case-katja-lindskov-jacobsen&quot;&gt;Jacobsen 2022&lt;\/a&gt;'><sup>9<\/sup><\/a><\/span> and Southeast Asia (specifically off the coast of Indonesia and Philippines).<span id='easy-footnote-10-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-10-26' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/10576109808436055&quot;&gt;Chalk 1997&lt;\/a&gt;; &lt;a href=&quot;https:\/\/muse.jhu.edu\/article\/400076\/summary&quot;&gt;Liss 2003&lt;\/a&gt;; &lt;a href=&quot;https:\/\/bookshop.iseas.edu.sg\/publication\/748&quot;&gt;2010&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9781315545264-7\/piracy-southeast-asia-trends-hot-spots-responses-carolin-lisshttps:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9781315545264-7\/piracy-southeast-asia-trends-hot-spots-responses-carolin-liss&quot;&gt;2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/bookshop.iseas.edu.sg\/publication\/746&quot;&gt;Young 2007&lt;\/a&gt;; &lt;a href=&quot;https:\/\/online.ucpress.edu\/as\/article-abstract\/48\/3\/473\/24196\/Shifting-the-Tides-against-Piracy-in-Southeast&quot;&gt;Bradford 2008&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/00908320290054800&quot;&gt;Beckman 2010&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.ingentaconnect.com\/content\/paaf\/paaf\/2020\/00000093\/00000001\/art00001&quot;&gt;Hastings 2020&lt;\/a&gt;'><sup>10<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">While there have been shifts in the intensity of pirate activities within and between these regions over time,<span id='easy-footnote-11-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-11-26' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/18366503.2018.1444935?journalCode=ramo20&quot;&gt;Jeong 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4110984\/&quot;&gt;Marchione &amp;amp; Johnson 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/26995405#metadata_info_tab_contents&quot;&gt;Nincic 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/24545598#metadata_info_tab_contents&quot;&gt;Daxecker &amp;amp; Prins 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;2021&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jasss.org\/17\/2\/9.html&quot;&gt;Marchione et al. 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/0022343312442520&quot;&gt;Coggins 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.icc-ccs.org\/reports\/2021_Annual_IMB_Piracy_Report.pdf&quot;&gt;IMB 2022&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.recaap.org\/resources\/ck\/files\/reports\/annual\/ReCAAP%20ISC%20Annual%20Report%202021.pdf&quot;&gt;ReCAAP 2022&lt;\/a&gt;'><sup>11<\/sup><\/a><\/span> all three regions share features which make them conducive to pirate activities. These include proximity to busy shipping lanes and\/or choke points, weak governance of long coastlines, and significant socio-economic challenges and\/or political violence.<span id='easy-footnote-12-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-12-26' title='&lt;a href=&quot;https:\/\/books.openedition.org\/irasec\/475?lang=en&quot;&gt;Frecon 2005&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0962629809000511&quot;&gt;Hastings 2009&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.bloomsburycollections.com\/book\/the-new-pirates-modern-global-piracy-from-somalia-to-the-south-china-sea\/index&quot;&gt;Palmer 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/1057610X.2012.684647?journalCode=uter20&quot;&gt;Chalk &amp;amp; Hansen 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/24545598#metadata_info_tab_contents&quot;&gt;Daxecker &amp;amp; Prins 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/24545598#metadata_info_tab_contents&quot;&gt;2015&lt;\/a&gt;&lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;; 2021&lt;\/a&gt;'><sup>12<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Practices<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Pirates and armed robbers commonly use a variety of means to gain entry to vessels. The simplest is to enter on foot when a ship is anchored.<span id='easy-footnote-13-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-13-26' title='&lt;a href=&quot;https:\/\/www.icc-ccs.org\/reports\/2021_Annual_IMB_Piracy_Report.pdf&quot;&gt;IMB 2022&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.recaap.org\/resources\/ck\/files\/reports\/annual\/ReCAAP%20ISC%20Annual%20Report%202021.pdf&quot;&gt;ReCAAP 2022&lt;\/a&gt;'><sup>13<\/sup><\/a><\/span> If close to shore, pirates and armed robbers have been known to use smaller boats that tend to be fast and stealthy.<span id='easy-footnote-14-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-14-26' title='&lt;a href=&quot;https:\/\/books.openedition.org\/irasec\/475?lang=en&quot;&gt;Frecon 2005&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/43819209#metadata_info_tab_contents&quot;&gt;Twyman-Ghoshal &amp;amp; Pierce 2014&lt;\/a&gt;'><sup>14<\/sup><\/a><\/span> Attacks taking place away from the shore require more sophisticated logistics, with larger motherships launching smaller vessels towards the target.<span id='easy-footnote-15-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-15-26' title='&lt;a href=&quot;https:\/\/www.chathamhouse.org\/sites\/default\/files\/public\/Research\/Africa\/1008piracysomalia.pdf&quot;&gt;Middleton 2008&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/1057610X.2012.684650&quot;&gt;Hansen 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09546553.2012.725681&quot;&gt;Soronsen &amp;amp; Widen 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/journals.co.za\/doi\/abs\/10.10520\/EJC136332&quot;&gt;Joubert 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.ingentaconnect.com\/content\/paaf\/paaf\/2020\/00000093\/00000001\/art00001&quot;&gt;Hastings 2020&lt;\/a&gt;'><sup>15<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Targets also differ significantly. Some attacks aim to seize entire ships and crew for the purposes of ransom.<span id='easy-footnote-16-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-16-26' title='&lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1057\/s41284-017-0115-0&quot;&gt;Shane et al. 2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1057\/s41284-017-0115-0&quot;&gt;Upadhyaya 2011&lt;\/a&gt;; &lt;a href=&quot;https:\/\/agris.fao.org\/agris-search\/search.do?recordID=AV2012097154&quot;&gt;Todd 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.cambridge.org\/core\/journals\/comparative-studies-in-society-and-history\/article\/hijacked-piracy-and-economies-of-protection-in-the-western-indian-ocean\/E5C35288523C8AEF97A8D87804837782&quot;&gt;Dua 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0962629821002468&quot;&gt;Gilmer &amp;amp; Dewey 2022&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/10246029.2009.9627538?journalCode=rasr20&quot;&gt;Nincic 2010&lt;\/a&gt;'><sup>16<\/sup><\/a><\/span> Others target cargo or crew valuables, particularly those operating at anchorages where attacks appear to be more opportunistic in nature.<span id='easy-footnote-17-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-17-26' title='&lt;a href=&quot;https:\/\/www.icc-ccs.org\/reports\/2021_Annual_IMB_Piracy_Report.pdf&quot;&gt;IMB 2022&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.recaap.org\/resources\/ck\/files\/reports\/annual\/ReCAAP%20ISC%20Annual%20Report%202021.pdf&quot;&gt;ReCAAP 2022&lt;\/a&gt;'><sup>17<\/sup><\/a><\/span> Oil theft (see <a href=\"https:\/\/www.safeseas.net\/evidence\/2022\/08\/14\/illicit-bunkering\/\">illicit bunkering<\/a> &amp; <a href=\"https:\/\/www.safeseas.net\/evidence\/2022\/08\/13\/fuel-smuggling\/\">fuel smuggling<\/a>) is a common feature of piracy in parts of the world, and particularly in Gulf of Guinea.<span id='easy-footnote-18-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-18-26' title='&lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0030438713000343&quot;&gt;Murphy 2013a&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.elgaronline.com\/view\/edcoll\/9781849804844\/9781849804844.00011.xml&quot;&gt;2013b&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.ingentaconnect.com\/content\/intellect\/pjss\/2014\/00000013\/00000003\/art00006&quot;&gt;Otto 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.africaportal.org\/publications\/maritime-security-in-the-gulf-of-guinea-establishing-law-generating-order\/&quot;&gt;2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/oxfordre.com\/view\/10.1093\/acrefore\/9780190228637.001.0001\/acrefore-9780190228637-e-829&quot;&gt;Dua 2019&lt;\/a&gt;'><sup>18<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Many pirate attacks involve violence. Ursula Daxecker and Brandon Prins in their Maritime Piracy Event and Location Dataset (1993-2016) report that 75% of attacks in Nigerian waters were violent in nature, as were 85% of attacks off the coast of Somalia.<span id='easy-footnote-19-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-19-26' title='&lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;'><sup>19<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Organisation<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Incidents of piracy and armed robbery and sea can vary widely in terms of their levels of organisation. At the lower end of the scale, theft from ships in port may be opportunistic or involve only a small network of local criminals.<span id='easy-footnote-20-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-20-26' title='&lt;a href=&quot;https:\/\/books.openedition.org\/irasec\/475?lang=en&quot;&gt;Frecon 2005&lt;\/a&gt;'><sup>20<\/sup><\/a><\/span> Such attacks may be included in piracy recording statistics, but tend to invoke less significant or urgent responses from law enforcement actors.<\/p>\n\n\n\n<p style=\"font-size:16px\">Pirate attacks that aim to hijack vessels, kidnap crew or steal cargo tend to be more organised. Such activities require planning, discipline, and a strong network of collaborating actors to succeed.<span id='easy-footnote-21-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-21-26' title=' &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/1057610X.2012.684650&quot;&gt;Hansen 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09546553.2012.725681&quot;&gt;Soronsen &amp;amp; Widen 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/journals.co.za\/doi\/abs\/10.10520\/EJC136332&quot;&gt;Joubert 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.ingentaconnect.com\/content\/paaf\/paaf\/2020\/00000093\/00000001\/art00001&quot;&gt;Hastings 2020&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;'><sup>21<\/sup><\/a><\/span> Pirate groups commonly include those who perpetrate the attacks at sea, as well as those engaged in facilitating activities such as looking after hostages, financing, providing inside information on the targets to be attacked, or providing political or legal protection.<span id='easy-footnote-22-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-22-26' title='&lt;a href=&quot;https:\/\/www.openbriefing.org\/docs\/treasuremapped.pdf&quot;&gt;Shortland 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/elibrary.worldbank.org\/doi\/abs\/10.1596\/978-0-8213-9963-7_ch7&quot;&gt;World Bank 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/26466488#metadata_info_tab_contents&quot;&gt;Beloff 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1057\/ejdr.2014.63&quot;&gt;Ivancovich 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/bjc\/article\/54\/5\/741\/360673&quot;&gt;Shortland &amp;amp; VArese 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/27870292#metadata_info_tab_contents&quot;&gt;Murphy 2010&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;; &lt;a href=&quot;https:\/\/econpapers.repec.org\/paper\/diwdiweos\/diweos74.htm&quot;&gt;Groot et al. 2012&lt;\/a&gt;'><sup>22<\/sup><\/a><\/span> These higher-scale attacks generally require some degree of support from coastal communities or local government actors, as well as the presence of an organised black market through which stolen goods can be sold and profits laundered.<span id='easy-footnote-23-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-23-26' title='&lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;'><sup>23<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Root Causes<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Much of the current work on piracy seeks to better understand its root causes, with a focus on socioeconomic conditions and governance issues.<span id='easy-footnote-24-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-24-26' title='&lt;a href=&quot;https:\/\/oxfordre.com\/view\/10.1093\/acrefore\/9780190228637.001.0001\/acrefore-9780190228637-e-829&quot;&gt;Dua 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;; &lt;a href=&quot;https:\/\/econpapers.repec.org\/paper\/diwdiweos\/diweos74.htm&quot;&gt;Groot et al. 2012&lt;\/a&gt;'><sup>24<\/sup><\/a><\/span> Evidence suggests that piracy flourishes in areas that are beset by problems that reduce socioeconomic opportunity.<span id='easy-footnote-25-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-25-26' title='&lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S016578361400143X&quot;&gt;Sumaila &amp;amp; Bawumia 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/journals.plos.org\/plosone\/article?id=10.1371\/journal.pone.0246835&quot;&gt;Desai &amp;amp; Shambaugh&lt;\/a&gt; 2021; &lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;'><sup>25<\/sup><\/a><\/span> Opportunistic piracy, for example, has been linked to declines in fish stocks in countries such as Indonesia. These have impacted fishers\u2019 livelihoods and encouraged them to look for other (in this case illicit) forms of income.<span id='easy-footnote-26-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-26-26' title='&lt;a href=&quot;https:\/\/cimsec.org\/economy-stupid-exploring-indonesias-piracy-problem\/&quot;&gt;Papas 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/24739105#metadata_info_tab_contents&quot;&gt;Axbard 2016&lt;\/a&gt;'><sup>26<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Similar pressures have been associated with more organised forms of piracy too. The rise of Somali piracy in the late 2000s for example has been linked by some to industrial fishing activities (and hazardous waste dumping) by international vessels in Somali waters. Sumaila and Bawumia has argued that this led to the depletion of fish stocks and local economic distress, and provided a recruitment pool for the emergent pirate networks.<span id='easy-footnote-28-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-28-26' title='&lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S016578361400143X&quot;&gt;Sumaila &amp;amp; Bawumia 2014&lt;\/a&gt;; see also&lt;a href=&quot;https:\/\/www.routledge.com\/Violence-at-Sea-Piracy-in-the-Age-of-Global-Terrorism\/Lehr\/p\/book\/9780415505468&quot;&gt; Lehr 2011&lt;\/a&gt;; though this is disputed by some, see&lt;span id=&#039;easy-footnote-27-26&#039; class=&#039;easy-footnote-margin-adjust&#039;&gt;&lt;\/span&gt;&lt;span class=&#039;easy-footnote&#039;&gt;&lt;a href=&#039;https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-27-26&#039; title=&#039;&#039;&gt;&lt;sup&gt;27&lt;\/sup&gt;&lt;\/a&gt;&lt;\/span&gt;&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/03071847.2011.642682&quot;&gt;Hansen 2011&lt;\/a&gt;'><sup>28<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Piracy is also linked to issues of weak governance and development, and particularly states\u2019 capacities and willingness to police their own waters and littoral regions.<span id='easy-footnote-29-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-29-26' title='&lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;'><sup>29<\/sup><\/a><\/span> Piracy is associated with conflict zones and contested peripheral spaces (as is the case in the Philippines),<span id='easy-footnote-30-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-30-26' title='&lt;a href=&quot;https:\/\/www.ingentaconnect.com\/content\/paaf\/paaf\/2020\/00000093\/00000001\/art00001&quot;&gt;Hastings 2020&lt;\/a&gt;; &lt;a href=&quot;https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/0022343316683436&quot;&gt;Daxecker &amp;amp; Prins 2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9781315545264-15\/piracy-maritime-violence-waters-sabah-southern-philippines-carolin-liss&quot;&gt;Liss 2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/bookshop.iseas.edu.sg\/publication\/747&quot;&gt;2017&lt;\/a&gt;'><sup>30<\/sup><\/a><\/span> and also to state collapse (as was the case in Somalia).<span id='easy-footnote-31-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-31-26' title='&lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0962629809000511&quot;&gt;Hastings 2009&lt;\/a&gt;; &lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/vajint50&amp;amp;div=22&amp;amp;id=&amp;amp;page=&quot;&gt;Silva 2009&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/jogss\/article-abstract\/1\/4\/251\/2841147&quot;&gt;Coggins 2016&lt;\/a&gt;'><sup>31<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Research also suggests that a certain minimal threshold of governance and infrastructure is necessary for piracy to flourish, in order to facilitate market access, the processing of stolen cargos\/goods and local protection for criminal activities (i.e. actors who can prevent enforcement against criminals, usually due to corruption)<span id='easy-footnote-32-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-32-26' title='&lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;'><sup>32<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Securitization<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">The United Nations Security Council has repeatedly framed piracy as a threat to international security, primarily due to its disruptive impact on global trade routes (see Impact section below),<span id='easy-footnote-33-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-33-26' title='&lt;a href=&quot;https:\/\/www.securitycouncilreport.org\/un_documents_type\/security-council-resolutions\/?ctype=Piracy&amp;amp;cbtype=piracy&quot;&gt;Security Council Report n.d.&lt;\/a&gt;'><sup>33<\/sup><\/a><\/span> but also because pirate activities have been linked to conflict and terrorism. This high level of securitization has led to significant international naval and other responses discussed in further detail section below.<span id='easy-footnote-34-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-34-26' title='&lt;a href=&quot;https:\/\/www.cambridge.org\/core\/journals\/international-and-comparative-law-quarterly\/article\/abs\/ii-piracy-off-somalia-un-security-council-resolution-1816-and-imo-regional-counterpiracy-efforts\/A7C877DE295732AD8D439457F9AA4978&quot;&gt;Guilfoyle 2008&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/ips\/article\/9\/1\/1\/1842980&quot;&gt;Bueger 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/23340460.2015.960170&quot;&gt;2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9780203111550-13\/security-communities-alliances-macrosecuritization-practices-counter-piracy-governance-christian-bueger-jan-stockbruegger&quot;&gt;Bueger &amp;amp; Stockbruegger 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/13533312.2012.642154&quot;&gt;de Oliveira 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/0967010616665275&quot;&gt;Singh &amp;amp; Bedi 201&lt;\/a&gt;6'><sup>34<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Scope<\/h2>\n\n\n\n<p style=\"font-size:16px\">There is a relatively good understanding about the scope of piracy, as numerous of organisations collate and report this data.<span id='easy-footnote-35-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-35-26' title='&lt;a href=&quot;https:\/\/www.safeseas.net\/new-report-what-do-we-know-about-piracy\/&quot;&gt;Joubert 2020&lt;\/a&gt;'><sup>35<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">This includes actors with a global focus, including the IMB,<span id='easy-footnote-36-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-36-26' title='&lt;a href=&quot;https:\/\/www.icc-ccs.org\/reports\/2021_Annual_IMB_Piracy_Report.pdf&quot;&gt;IMB 2021&lt;\/a&gt;'><sup>36<\/sup><\/a><\/span> the International Maritime Organisation (IMO),<span id='easy-footnote-37-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-37-26' title='&lt;a href=&quot;https:\/\/www.imo.org\/en\/OurWork\/Security\/Pages\/Piracy-Reports-Default.aspx&quot;&gt;IMO n.d.&lt;\/a&gt;'><sup>37<\/sup><\/a><\/span> and the US\u2019s Office of Naval Intelligence.<span id='easy-footnote-38-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-38-26' title='&lt;a href=&quot;https:\/\/www.oni.navy.mil\/ONI-Reports\/Shipping-Threat-Reports\/Worldwide-Threat-to-Shipping\/&quot;&gt;ONI n.d.&lt;\/a&gt;'><sup>38<\/sup><\/a><\/span> The IMB Piracy Reporting Centre for example received 132 incidents of piracy and armed robbery against ships in 2021.<span id='easy-footnote-39-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-39-26' title='&lt;a href=&quot;https:\/\/www.icc-ccs.org\/reports\/2021_Annual_IMB_Piracy_Report.pdf&quot;&gt;IMB 2021&lt;\/a&gt;'><sup>39<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Data is also collected by regional organisations. Examples include the Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in Asia (ReCAAP) and the Information Fusion Centre (IFC) in Southeast Asia,<span id='easy-footnote-40-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-40-26' title='&lt;a href=&quot;https:\/\/www.recaap.org\/alerts&quot;&gt;ReCAAP n.d.&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.ifc.org.sg\/ifc2web\/app_pages\/User\/commonv2\/aboutus.cshtml&quot;&gt;IFC n.d.&lt;\/a&gt;'><sup>40<\/sup><\/a><\/span> the Regional Maritime Information Fusion Centre in the West Indian Ocean,<span id='easy-footnote-41-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-41-26' title='&lt;a href=&quot;http:\/\/crfimmadagascar.org\/&quot;&gt;RMFIC n.d.&lt;\/a&gt;'><sup>41<\/sup><\/a><\/span> and Marine Domain Awareness for Trade in the Gulf of Guinea (MDAT-GoG).<span id='easy-footnote-42-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-42-26' title='&lt;a href=&quot;https:\/\/gog-mdat.org\/&quot;&gt;GOG-MDAT n.d.&lt;\/a&gt;'><sup>42<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">All collate reports and distribute information publicly. Large datasets of pirate activities have been constructed on the basis of this reporting, including the Maritime Piracy Event and Location Dataset which recorded 8,900 piracy events between 1995 and 2017.<span id='easy-footnote-43-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-43-26' title='&lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;'><sup>43<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Despite the relative strength of the data collated and distributed, however, there remain some obstacles to fully understanding the entire scope of piracy. First, pirate incidents may be defined differently between organisations according to the various criteria outlined at the Introduction above. This can lead to discrepancies in reported figures between organisations.<span id='easy-footnote-44-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-44-26' title='&lt;a href=&quot;https:\/\/www.safeseas.net\/new-report-what-do-we-know-about-piracy\/&quot;&gt;Joubert 2020&lt;\/a&gt;'><sup>44<\/sup><\/a><\/span> A second issue is underreporting.<span id='easy-footnote-45-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-45-26' title='&lt;a href=&quot;https:\/\/www.safeseas.net\/new-report-what-do-we-know-about-piracy\/&quot;&gt;Joubert 2020&lt;\/a&gt;'><sup>45<\/sup><\/a><\/span> Third, recorded figures tend to focus primarily on commercial vessels, while attacks on local traffic are less well documented. Conversely, there is the potential for overreporting for fraudulent purposes. <\/p>\n\n\n\n<p style=\"font-size:16px\">Despite issues of accuracy and consistency in mapping rates of piracy, available resources do allow for a reasonable assessment of the fluctuation of incidents. &nbsp;<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Impact<\/h2>\n\n\n\n<p style=\"font-size:16px\">There is a strong body of evidence on the impacts of piracy and armed robbery.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Economic<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Piracy has a negative impact on the global economy in various ways. These include direct costs incurred from hijackings, the theft of cargo, and ransom payments which while direct, can be difficult to quantify due to a lack of transparency.<span id='easy-footnote-46-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-46-26' title='&lt;a href=&quot;https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1111\/roie.12000&quot;&gt;Bensassi &amp;amp; Mart\u00ednez-Zarzoso 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/jeea\/article-abstract\/13\/2\/203\/2319757&quot;&gt;Besley et al. 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1007\/s10290-021-00442-1&quot;&gt;Sandkamp et al. 2022&lt;\/a&gt;'><sup>46<\/sup><\/a><\/span> Indirect costs include those relating to increased insurance rates, the rerouting of vessels, increased ship security, increased fuel costs and cost naval or other security responses.<span id='easy-footnote-47-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-47-26' title='&lt;a href=&quot;https:\/\/apps.dtic.mil\/sti\/citations\/ADA510020&quot;&gt;King 2008&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1057\/mel.2010.1&quot;&gt;Bendall 2010&lt;\/a&gt;; &lt;a href=&quot;https:\/\/jrmi.au.edu\/index.php\/jrmi\/article\/view\/133&quot;&gt;Karpateas 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0308597X1830705X&quot;&gt;Jin et al. 2019&lt;\/a&gt;'><sup>47<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Losses to regional trade can also be significant, as vessels avoid high risk zones, though it is unclear the extent to which these are due to piracy specifically or its facilitating conditions.<span id='easy-footnote-48-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-48-26' title='&lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1007\/s10290-021-00442-1&quot;&gt;Sandkamp et al. 2022&lt;\/a&gt;'><sup>48<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Sociopolitical<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Piracy has social and political consequences, particularly in those areas with high concentrations of pirate activities. Impacts include the furtherance of corruption, weakening governance and even conflict exacerbation.<span id='easy-footnote-49-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-49-26' title='&lt;a href=&quot;https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9780203943489-9\/th-abu-sayyaf-group-th-reat-maritime-piracy-terrorism-rommel-banlaoi&quot;&gt;Banloai 2006&lt;\/a&gt;; &lt;a href=&quot;https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/0022343316683436&quot;&gt;Daxecker &amp;amp; Prins 2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9781315545264-15\/piracy-maritime-violence-waters-sabah-southern-philippines-carolin-liss&quot;&gt;Liss 2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/bookshop.iseas.edu.sg\/publication\/747&quot;&gt;2017&lt;\/a&gt;'><sup>49<\/sup><\/a><\/span> Piracy has been described as a problematic spiral, whereby many of these conditions facilitate piracy but then piracy itself exacerbates those conditions further.<span id='easy-footnote-50-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-50-26' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/vajint50&amp;amp;div=22&amp;amp;id=&amp;amp;page=&quot;&gt;Silva 2009&lt;\/a&gt;; &lt;a href=&quot;https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/0967010616665275&quot;&gt;Singh &amp;amp; Bedi 2016&lt;\/a&gt;'><sup>50<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Well-being<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Finally, piracy poses significant risks of harm to seafarers themselves. Even those who do not suffer attacks have been shown to exhibit higher degrees of anxiety when transiting areas with high incidents of piracy and armed robbery.<span id='easy-footnote-51-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-51-26' title='&lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0308597X17303925&quot;&gt;Seyle 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/bmcpsychology.biomedcentral.com\/articles\/10.1186\/s40359-022-00850-4&quot;&gt;Brooks &amp;amp; Greenberg 2022&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1007\/s12198-021-00239-1&quot;&gt;Caeser et al. 2021&lt;\/a&gt;'><sup>51<\/sup><\/a><\/span> When attacks happen, seafarers can experience physical injury, including systematic torture, or death.<span id='easy-footnote-52-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-52-26' title='&lt;a href=&quot;https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-39620-5_19&quot;&gt;Hurlburt 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/10246029.2009.9627538?journalCode=rasr20&quot;&gt;Nincic 2010&lt;\/a&gt;'><sup>52<\/sup><\/a><\/span> Attacks can lead to high degree of psychological injury, with some seafarers \u2013 particularly those kidnapped and held for long periods \u2013 suffering from Post-Traumatic Stress Disorder (PTSD) and other related psychological disorders.<span id='easy-footnote-53-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-53-26' title='&lt;a href=&quot;https:\/\/www.proquest.com\/openview\/2035e2138ade5b9013f83ad76da47b2d\/1?pq-origsite=gscholar&amp;amp;cbl=18750&amp;amp;diss=y&quot;&gt;Alvarez JR. 2020&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0308597X14000244&quot;&gt;Abila &amp;amp; Tang 2014&lt;\/a&gt;'><sup>53<\/sup><\/a><\/span> For example, in 2011 the average length of detainment for the 1206 captured seafarers was 8 months.<span id='easy-footnote-54-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-54-26' title='&lt;a href=&quot;https:\/\/oneearthfuture.org\/publication\/human-cost-somali-piracy-2011&quot;&gt;Hurlburt 2012&lt;\/a&gt;'><sup>54<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Linkages &amp; Synergies<\/h2>\n\n\n\n<p style=\"font-size:16px\">Piracy is linked to other forms of maritime criminality. Piracy has been seen as caused in part by IUU fishing in some cases, but there are also links between IUU fishers and armed groups engaged in piracy \u2013 with some pirates disguising their motherships as fishing vessels.<span id='easy-footnote-55-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-55-26' title='&lt;a href=&quot;https:\/\/oneearthfuture.org\/publication\/human-cost-somali-piracy-2011&quot;&gt;Hurlburt 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S016578361400143X&quot;&gt;Sumaila &amp;amp; Bawumia 2014&lt;\/a&gt;'><sup>55<\/sup><\/a><\/span> Armed groups engaged in piracy have been linked to smuggling and trafficking, with arms and drugs trafficking, as well as charcoal smuggling, being particularly prevalent off the coast of Somalia.<span id='easy-footnote-56-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-56-26' title='&lt;a href=&quot;https:\/\/globalinitiative.net\/analysis\/somalia_untocwatch\/&quot;&gt;Petrich 2018&lt;\/a&gt;'><sup>56<\/sup><\/a><\/span> Financial flows from ransoms have also been linked to funding these activities.<span id='easy-footnote-57-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-57-26' title='&lt;a href=&quot;https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/0022343316683436&quot;&gt;Daxecker &amp;amp; Prins 2017&lt;\/a&gt;'><sup>57<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Responses<\/h2>\n\n\n\n<p style=\"font-size:16px\"><em>Legal Regimes<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Significant international efforts have been directed towards the clarification of <strong>legal regimes<\/strong> for counterpiracy. As mentioned above, there has been debate around the efficacy of UNCLOS in dealing with piracy, due to the Convention\u2019s emphasis on the high seas criteria.<span id='easy-footnote-58-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-58-26' title='&lt;a href=&quot;https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9780203943489-11\/piracy-unclos-international-law-help-regional-states-combat-piracy-martin-murphy&quot;&gt;Murphy 2006&lt;\/a&gt;; &lt;a href=&quot;https:\/\/compass.onlinelibrary.wiley.com\/doi\/abs\/10.1111\/j.1749-8198.2011.00455.x&quot;&gt;Nymann 2011&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.proquest.com\/openview\/8470c9b5996f51f0dfb401be5c4f80bc\/1?pq-origsite=gscholar&amp;amp;cbl=48186&quot;&gt;Ademuni-Odeke 2019&lt;\/a&gt;'><sup>58<\/sup><\/a><\/span> Bateman for example has argued that UNCLOS made counter-piracy more difficult, due to the introduction of different jurisdictional zones.<span id='easy-footnote-59-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-59-26' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/10163270709464140&quot;&gt;Bateman 2009&lt;\/a&gt;'><sup>59<\/sup><\/a><\/span> This impacted states\u2019 obligations to engage in counter piracy, as well as creating confusion around the right to hot pursuit.<span id='easy-footnote-60-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-60-26' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/10163270709464140&quot;&gt;Bateman 2009&lt;\/a&gt;'><sup>60<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Even so, international legislation has generally coalesced into a common understanding based in UNCLOS, but augmented by approaches from other bodies too. The Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation (SUA), for example, sought to refine the issues of jurisdiction, allowing countries to prosecute pirates who committed acts against a ship flying their flag and allowing for acts within territorial waters to be recognised as piracy.<span id='easy-footnote-61-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-61-26' title='&lt;a href=&quot;https:\/\/treaties.un.org\/doc\/db\/terrorism\/conv8-english.pdf&quot;&gt;UN 1988&lt;\/a&gt;'><sup>61<\/sup><\/a><\/span> It also obliged states to enact domestic laws to address issues of piracy, in an attempt to create some degree of legal standardisation. <\/p>\n\n\n\n<p style=\"font-size:16px\">The counterpiracy legal regime has been refined further in 20 plus resolutions produced by the United Nations, largely in reference to the specific problem of piracy off the coast of Somalia.<span id='easy-footnote-62-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-62-26' title='&lt;a href=&quot;https:\/\/www.securitycouncilreport.org\/un_documents_type\/security-council-resolutions\/?ctype=Piracy&amp;amp;cbtype=piracy&quot;&gt;Security Council Report n.d.&lt;\/a&gt;'><sup>62<\/sup><\/a><\/span> Examples include the legalization of pursuit both into Somali territorial waters and even onto land.<span id='easy-footnote-63-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-63-26' title='&lt;a href=&quot;https:\/\/www.jstor.org\/stable\/20488237?seq=2#metadata_info_tab_contents&quot;&gt;Guilfoyle 2008&lt;\/a&gt;'><sup>63<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">New fora have also been established to<strong> coordinate<\/strong> between different counterpiracy actors and responses. Some of these are focused on naval responses, such as the Shared Awareness and De-confliction (SHADE) mechanism for the Western Indian Ocean, while others have a wider focus.<span id='easy-footnote-64-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-64-26' title='&lt;a href=&quot;https:\/\/www.ceeol.com\/search\/article-detail?id=184219&quot;&gt;Bueger 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10246029.2022.2053556?needAccess=true&quot;&gt;Bueger &amp;amp; Stockbruegger 2022&lt;\/a&gt;'><sup>64<\/sup><\/a><\/span> For example, the Contact Group for Piracy off the Coast of Somalia (CGPCS) was created in 2009 to foster cooperation between international actors and organisations, regional states and other stakeholders such as the shipping industry in the fight against piracy in that region.<span id='easy-footnote-65-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-65-26' title='&lt;a href=&quot;https:\/\/www.ceeol.com\/search\/article-detail?id=184219&quot;&gt;Bueger 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/chapter\/10.1057\/9781137514509_4&quot;&gt;2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10246029.2022.2053556?needAccess=true&quot;&gt;Bueger &amp;amp; Stockbruegger 2022&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/03071847.2016.1253375&quot;&gt;2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/pdf\/resrep07079.5.pdf&quot;&gt;Swarttouw 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1111\/j.1758-5899.2012.00190.x&quot;&gt;Guilfoyle 2013&lt;\/a&gt;'><sup>65<\/sup><\/a><\/span> The Code of Conduct Concerning the Repression of Piracy and Armed Robbery against Ships in the Western Indian Ocean and the Gulf of Aden\u2019 (Djibouti Code of Conduct, DCOC) was also established in 2009 to manage disputes between stakeholders, ensure national compliance with the counterpiracy legal regimes, and to encourage practical measures to protect ships and supress pirate activities.<span id='easy-footnote-66-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-66-26' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/19480881.2018.1467360&quot;&gt;Menzel 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1960173&quot;&gt;Kraska &amp;amp; WIlson 2009&lt;\/a&gt;'><sup>66<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Similar coordination mechanisms have been created in Southeast Asia and the Gulf of Guinea. ReCAAP and the IFC for example focus on facilitating information sharing between actors, including providing piracy incident alerts and guidance for vessels transmitting the region.<span id='easy-footnote-67-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-67-26' title='&lt;a href=&quot;https:\/\/www.jstor.org\/stable\/24916578#metadata_info_tab_contents&quot;&gt;Bueger 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0308597X08001449&quot;&gt;Ho 2009&lt;\/a&gt;'><sup>67<\/sup><\/a><\/span> In the Gulf of Guinea, the Yaounde Code of Conduct fulfils a similar role to both the CGPCS and DCOC in the Western Indian Ocean, on which it was modelled.<span id='easy-footnote-68-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-68-26' title='&lt;a href=&quot;https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9781315111643-19\/security-christian-bueger&quot;&gt;Bueger 2022&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/19480881.2018.1467360&quot;&gt;Menzel 2018&lt;\/a&gt;'><sup>68<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Increasingly, such fora have expanded their activities to issues of maritime security beyond piracy. The DCOC for example introduced the so-called Jeddah Amendment in 2017 to wider their remit to other forms of crime too.<span id='easy-footnote-69-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-69-26' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/19480881.2018.1467360&quot;&gt;Menzel 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1007\/s10609-019-09364-y&quot;&gt;Gikonyo 2019&lt;\/a&gt;'><sup>69<\/sup><\/a><\/span> The CGPCS was renamed as the Contact Group on Maritime Illicit Activities in the Western Indian Ocean (CGMIA-WIO) in 2022 for similar reasons.<span id='easy-footnote-70-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-70-26' title='&lt;a href=&quot;https:\/\/www.safeseas.net\/4-scenarios-for-new-contact-group\/&quot;&gt;Bueger 2022&lt;\/a&gt;'><sup>70<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Multinational Naval Responses<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Perhaps the most high profile international counterpiracy response has been the deployment of <strong>multinational naval forces<\/strong> to police piracy hotspots. Prominent examples include the European Union Naval Force Somalia (EUNAVFOR) Operation Atalanta,<span id='easy-footnote-71-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-71-26' title='&lt;a href=&quot;https:\/\/link.springer.com\/book\/10.1007\/978-3-319-66598-6&quot;&gt;Riddervold 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/09662839.2011.592979&quot;&gt;2011&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/13523260903327741&quot;&gt;Germond &amp;amp; Smith 2009&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1057\/s41295-018-0131-4&quot;&gt;Dombrowska &amp;amp; Reich 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.cambridge.org\/core\/journals\/international-and-comparative-law-quarterly\/article\/abs\/eunavfor-operation-atalanta-off-somalia-the-eu-in-unchartered-legal-waters\/1C7F25F3A116F97A33D7864DD9B52866&quot;&gt;Papastavridis 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/publications.parliament.uk\/pa\/ld201213\/ldselect\/ldeucom\/43\/4302.htm&quot;&gt;EU Committee 2012&lt;\/a&gt;'><sup>71<\/sup><\/a><\/span> the Combined Maritime Forces (CMF),<span id='easy-footnote-72-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-72-26' title='&lt;a href=&quot;https:\/\/combinedmaritimeforces.com\/&quot;&gt;Combined Maritime Forces n.d.&lt;\/a&gt;'><sup>72<\/sup><\/a><\/span> and the Malacca Straits Sea Patrols (MSSP).<span id='easy-footnote-73-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-73-26' title='&lt;a href=&quot;https:\/\/www.routledge.com\/Maritime-Security-and-Indonesia-Cooperation-Interests-and-Strategies\/Febrica\/p\/book\/9781138348219&quot;&gt;Febrica 2015&lt;\/a&gt;; &lt;a href=&quot;https:\/\/brill.com\/view\/journals\/estu\/33\/4\/article-p799_7.xml&quot;&gt;Ikrami 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/epsjournal.org.uk\/index.php\/EPSJ\/article\/view\/101&quot;&gt;Bateman 2009&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/41487398#metadata_info_tab_contents&quot;&gt;Khalid 2009&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/26394205#metadata_info_tab_contents&quot;&gt;Bradford 2005&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.rsis.edu.sg\/wp-content\/uploads\/2016\/04\/CO16091.pdf&quot;&gt;Koh 2016&lt;\/a&gt;'><sup>73<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">These Naval interventions have sometimes been accompanied by the creation and management of new maritime security zones in piracy hotspots where transiting vessels are advised to take extra precautions to guard against pirate attacks. Examples include the Internationally Recommended Transit Corridor (IRTC) in the Gulf of Aden which is patrolled by warships,<span id='easy-footnote-74-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-74-26' title='&lt;a href=&quot;https:\/\/combinedmaritimeforces.com\/maritime-security-transit-corridor-mstc\/&quot;&gt;Combined Maritime Forces n.d.&lt;\/a&gt;'><sup>74<\/sup><\/a><\/span> and the High Risk Areas (HRAs) in the Gulf of Aden and Gulf of Guinea.<span id='easy-footnote-75-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-75-26' title='&lt;a href=&quot;https:\/\/gog-mdat.org\/&quot;&gt;GOG-MDAT n.d.&lt;\/a&gt;'><sup>75<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">There is a large body of work analysing the effectiveness of such missions. Overall, there is a broad consensus that, in combination with other measures, such deployments have been effective in suppressing piracy.<span id='easy-footnote-76-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-76-26' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10246029.2022.2053556?needAccess=true&quot;&gt;Bueger &amp;amp; Stockbruegger 2022&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.rsis.edu.sg\/wp-content\/uploads\/2016\/04\/CO16091.pdf&quot;&gt;Koh 2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/10.1525\/as.2008.48.3.473#metadata_info_tab_contents&quot;&gt;Bradford 2008&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/book\/39743\/chapter-abstract\/339792974?redirectedFrom=fulltext&quot;&gt;Daxecker &amp;amp; Prins 2021&lt;\/a&gt;; for dissent see &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/26397033#metadata_info_tab_contents&quot;&gt;Raymond 2009&lt;\/a&gt; &amp;amp; &lt;a href=&quot;https:\/\/www.hurstpublishers.com\/book\/small-boats-weak-states-dirty-money\/&quot;&gt;Murphy 2008&lt;\/a&gt;'><sup>76<\/sup><\/a><\/span> Even so, some have criticised the expense of these missions, the intentions behind them, and their long-term efficacy given that, on their own, they do little to address the root causes of the problem.<span id='easy-footnote-77-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-77-26' title='&lt;a href=&quot;https:\/\/www.jstor.org\/stable\/26397033#metadata_info_tab_contents&quot;&gt;Raymond 2009; &lt;\/a&gt;&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10246029.2022.2053556?needAccess=true&quot;&gt;Bueger &amp;amp; Stockbruegger 2022&lt;\/a&gt;'><sup>77<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Capacity Building<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Another category of counterpiracy responses comprises <strong>capacity building<\/strong>. Capacity building programmes focus on assisting regional states to strengthen their maritime law enforcement.<span id='easy-footnote-78-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-78-26' title='&lt;a href=&quot;https:\/\/www.safeseas.net\/themes\/best-practice-toolkit\/&quot;&gt;SafeSeas 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/book\/10.1007\/978-3-030-50064-1&quot;&gt;Bueger et al. 2021&lt;\/a&gt;'><sup>78<\/sup><\/a><\/span> Capacity building efforts may focus on the provision of training and material, on the promulgation of best practices through joint exercises and other initiatives, on infrastructure development such as buildings or dock facilities, as well as on shared regional capacities such as maritime domain awareness systems.<span id='easy-footnote-79-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-79-26' title='&lt;a href=&quot;https:\/\/link.springer.com\/book\/10.1007\/978-3-030-50064-1&quot;&gt;Bueger et al. 2021&lt;\/a&gt;'><sup>79<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">More widely, capacity building efforts may include efforts to strengthen criminal justice structures, such as legal regimes and court and prison systems, and even (though more rarely) on coastal community livelihoods and infrastructures in order to address the root causes of piracy.<span id='easy-footnote-80-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-80-26' title='&lt;a href=&quot;https:\/\/www.unodc.org\/pdf\/missions\/pdfPiracy\/Projects\/January2011\/Building_regional_capacity_for_Piracy_Prosecutions.doc&quot;&gt;UNODC 2011&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/10246029.2017.1291441?journalCode=rasr20&quot;&gt;Jacobsen 2017&lt;\/a&gt;'><sup>80<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Many different actors are involved in maritime security capacity building, including international organisations such as the UN Office on Drugs and Crime (UNDOC) &nbsp;and EU, regional organisations such as the CGPCS\/CGMIA-WIO and DCOC, and national states such as the US and UK.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Industry<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">There has also been a diffusion of <strong>counterpiracy best practices<\/strong> on an international level, largely driven by the shipping industry. These are referred to as Best Management Practices (BMP) to deter piracy.<span id='easy-footnote-81-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-81-26' title='&lt;a href=&quot;https:\/\/www.ocimf.org\/publications\/books\/bmp5&quot;&gt;OCIMF 2018&lt;\/a&gt;; see also &lt;a href=&quot;https:\/\/journals.sagepub.com\/doi\/10.1177\/1354066117725155&quot;&gt;Bueger 2017&lt;\/a&gt;'><sup>81<\/sup><\/a><\/span> Issued in collaboration international shipping organisations such as the Baltic and International Maritime Council (BIMCO), the BMP outline a set of measures that ships should have in place to prepare for and react to piracy attacks. These are primarily security focused, including practices such as risk assessments, methods of hardening the ship against attack (for example by instituting passive defence measures such as razor wire), and the heightened surveillance of surrounding waters by crew members.<span id='easy-footnote-82-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-82-26' title='&lt;a href=&quot;https:\/\/www.ocimf.org\/publications\/books\/bmp5&quot;&gt;OCIMF 2018&lt;\/a&gt;'><sup>82<\/sup><\/a><\/span> The BMP also outline recommended reporting mechanisms and distress signal protocols in the event of an attack.<span id='easy-footnote-83-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-83-26' title='&lt;a href=&quot;https:\/\/www.ocimf.org\/publications\/books\/bmp5&quot;&gt;OCIMF 2018&lt;\/a&gt;'><sup>83<\/sup><\/a><\/span><\/p>\n\n\n\n<p style=\"font-size:16px\">Two further measures adopted by some shipping companies have been more controversial: the use of private armed guards on ships, and the payment of ransoms. The employment of private military and security company (PMSC) personnel to guard ships during transit through known pirate waters has become an increasingly common practice.<span id='easy-footnote-84-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-84-26' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/1057610X.2012.684660&quot;&gt;Struwe 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/03071847.2012.733097&quot;&gt;Caldwell 2012&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01436597.2015.1114882&quot;&gt;Affi et al. 2016&lt;\/a&gt;;&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/14781158.2016.1231174&quot;&gt; Staff 2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/10439463.2015.1072180&quot;&gt;Gould 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/book\/10.1007\/978-3-030-50156-3&quot;&gt;Cusumano &amp;amp; Ruzza 2020&lt;\/a&gt;; &lt;a href=&quot;https:\/\/journals.sagepub.com\/doi\/10.1177\/0047117817731804&quot;&gt;2017&lt;\/a&gt;; &lt;a href=&quot;https:\/\/academic.oup.com\/book\/12201\/chapter-abstract\/161653546?redirectedFrom=fulltext&quot;&gt;Ronzitti 2011&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9781315850986-9\/pmscs-maritime-security-anti-piracy-control-carolin-liss&quot;&gt;Liss 2015&lt;\/a&gt;'><sup>84<\/sup><\/a><\/span> Such practices appear to have been successful, with no vessel protected in such away having been successfully pirated.<span id='easy-footnote-85-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-85-26' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01436597.2015.1114882&quot;&gt;Affi et al. 2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1007\/s11166-020-09323-8&quot;&gt;DeAngelo &amp;amp; Smith 2020&lt;\/a&gt;'><sup>85<\/sup><\/a><\/span> <\/p>\n\n\n\n<p style=\"font-size:16px\">However, some have raised ethical concerns around the potential for the disproportionate use of force, the potential displacement of attacks to unprotected vessels, and the potential problems that the presence of so-called floating armouries (established to supply and resupply such activities) may pose.<span id='easy-footnote-86-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-86-26' title='&lt;a href=&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01436597.2015.1114882&quot;&gt;Affi et al. 2016&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/book\/10.1007\/978-3-030-50156-3&quot;&gt;Cusumano &amp;amp; Ruzza 2020&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.cambridge.org\/gb\/academic\/subjects\/politics-international-relations\/international-relations-and-international-organisations\/small-arms-survey-2015-weapons-and-world?format=PB&quot;&gt;Chapsos &amp;amp; Holtom 2015;&lt;\/a&gt; &lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/jtms6&amp;amp;div=17&amp;amp;id=&amp;amp;page=&quot;&gt;Polepalli 2019&lt;\/a&gt;; &lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/geojintl48&amp;amp;div=34&amp;amp;id=&amp;amp;page=&quot;&gt;Wilpon 2017&lt;\/a&gt;'><sup>86<\/sup><\/a><\/span> Ransom payments are controversial because, while they may facilitate the return of crews, some suggest they also serve to encourage further acts of piracy.<span id='easy-footnote-87-26' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#easy-footnote-bottom-87-26' title='&lt;a href=&quot;https:\/\/heinonline.org\/HOL\/LandingPage?handle=hein.journals\/cintl47&amp;amp;div=14&amp;amp;id=&amp;amp;page=&quot;&gt;Dutton &amp;amp; Bellish 2014&lt;\/a&gt;; &lt;a href=&quot;https:\/\/link.springer.com\/article\/10.1057\/s41284-017-0115-0&quot;&gt;Shane et al. 2018&lt;\/a&gt;; &lt;a href=&quot;https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2544491&quot;&gt;Dubners &amp;amp; Chavers 2013&lt;\/a&gt;; &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/41476315#metadata_info_tab_contents&quot;&gt;Lansing &amp;amp; Peterson 2010&lt;\/a&gt;'><sup>87<\/sup><\/a><\/span><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:16px\"><em>Summary<\/em><\/p>\n\n\n\n<p style=\"font-size:16px\">Taken together, these efforts have led to some significant successes in the fight against piracy, particularly in the Western Indian Ocean. Pirate activities off the coast of Somalia have largely been contained since 2013 for example. Elsewhere, regional counterpiracy structures have been strengthened, and successful piracy prosecutions have increased.<\/p>\n\n\n\n<p style=\"font-size:16px\">Even so, it is widely recognised that counterpiracy responses have been more successful in suppressing pirate activities at sea rather than addressing their root causes on land. Concerns remain that in the absence of longer term solutions, the piracy will remain a threat to international shipping and seafarers for some time to come. &nbsp;<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">List of References<\/h2>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction There is a significant body of work discussing what constitutes contemporary piracy. Under the UN Convention on the Law of the Sea (UNCLOS), piracy is defined as \u2018illegal acts of violence or detention, or any act of depredation, committed for private ends by the crew or the passengers of a private ship\u2019 against another ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/\" title=\"read more\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-26","post","type-post","status-publish","format-standard","hentry","category-crimes-against-mobility"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Piracy - Blue Crime: the evidence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Piracy - Blue Crime: the evidence\" \/>\n<meta property=\"og:description\" content=\"Introduction There is a significant body of work discussing what constitutes contemporary piracy. Under the UN Convention on the Law of the Sea (UNCLOS), piracy is defined as \u2018illegal acts of violence or detention, or any act of depredation, committed for private ends by the crew or the passengers of a private ship\u2019 against another ..Read more\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/\" \/>\n<meta property=\"og:site_name\" content=\"Blue Crime: the evidence\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-10T12:50:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-01T21:44:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/09\/12053582166_aec0ef2947_c.jpg\" \/>\n<meta name=\"author\" content=\"Scott Edwards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@safeseas1\" \/>\n<meta name=\"twitter:site\" content=\"@safeseas1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Edwards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/#article\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/\"},\"author\":{\"name\":\"Scott Edwards\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#\\\/schema\\\/person\\\/badfedbf2d4954158ef35ddc418502bd\"},\"headline\":\"Piracy\",\"datePublished\":\"2020-02-10T12:50:45+00:00\",\"dateModified\":\"2022-11-01T21:44:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/\"},\"wordCount\":3657,\"publisher\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#organization\"},\"image\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/12053582166_aec0ef2947_c.jpg\",\"articleSection\":[\"Crimes against mobility\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/\",\"url\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/\",\"name\":\"Piracy - Blue Crime: the evidence\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/12053582166_aec0ef2947_c.jpg\",\"datePublished\":\"2020-02-10T12:50:45+00:00\",\"dateModified\":\"2022-11-01T21:44:22+00:00\",\"breadcrumb\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/12053582166_aec0ef2947_c.jpg\",\"contentUrl\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/12053582166_aec0ef2947_c.jpg\",\"width\":799,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/2020\\\/02\\\/10\\\/piracy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Piracy\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#website\",\"url\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/\",\"name\":\"Blue Crime: the evidence\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#organization\",\"name\":\"Blue Crime: the evidence base of SafeSeas\",\"url\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/cropped-SafeSeas01-768x519-1.png\",\"contentUrl\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/cropped-SafeSeas01-768x519-1.png\",\"width\":553,\"height\":362,\"caption\":\"Blue Crime: the evidence base of SafeSeas\"},\"image\":{\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/safeseas1\"]},{\"@type\":\"Person\",\"@id\":\"http:\\\/\\\/www.safeseas.net\\\/evidence\\\/#\\\/schema\\\/person\\\/badfedbf2d4954158ef35ddc418502bd\",\"name\":\"Scott Edwards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g\",\"caption\":\"Scott Edwards\"},\"url\":\"https:\\\/\\\/www.safeseas.net\\\/evidence\\\/author\\\/expert2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Piracy - Blue Crime: the evidence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/","og_locale":"en_GB","og_type":"article","og_title":"Piracy - Blue Crime: the evidence","og_description":"Introduction There is a significant body of work discussing what constitutes contemporary piracy. Under the UN Convention on the Law of the Sea (UNCLOS), piracy is defined as \u2018illegal acts of violence or detention, or any act of depredation, committed for private ends by the crew or the passengers of a private ship\u2019 against another ..Read more","og_url":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/","og_site_name":"Blue Crime: the evidence","article_published_time":"2020-02-10T12:50:45+00:00","article_modified_time":"2022-11-01T21:44:22+00:00","og_image":[{"url":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/09\/12053582166_aec0ef2947_c.jpg","type":"","width":"","height":""}],"author":"Scott Edwards","twitter_card":"summary_large_image","twitter_creator":"@safeseas1","twitter_site":"@safeseas1","twitter_misc":{"Written by":"Scott Edwards","Estimated reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#article","isPartOf":{"@id":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/"},"author":{"name":"Scott Edwards","@id":"http:\/\/www.safeseas.net\/evidence\/#\/schema\/person\/badfedbf2d4954158ef35ddc418502bd"},"headline":"Piracy","datePublished":"2020-02-10T12:50:45+00:00","dateModified":"2022-11-01T21:44:22+00:00","mainEntityOfPage":{"@id":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/"},"wordCount":3657,"publisher":{"@id":"http:\/\/www.safeseas.net\/evidence\/#organization"},"image":{"@id":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/09\/12053582166_aec0ef2947_c.jpg","articleSection":["Crimes against mobility"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/","url":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/","name":"Piracy - Blue Crime: the evidence","isPartOf":{"@id":"http:\/\/www.safeseas.net\/evidence\/#website"},"primaryImageOfPage":{"@id":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#primaryimage"},"image":{"@id":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/09\/12053582166_aec0ef2947_c.jpg","datePublished":"2020-02-10T12:50:45+00:00","dateModified":"2022-11-01T21:44:22+00:00","breadcrumb":{"@id":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#primaryimage","url":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/09\/12053582166_aec0ef2947_c.jpg","contentUrl":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2022\/09\/12053582166_aec0ef2947_c.jpg","width":799,"height":532},{"@type":"BreadcrumbList","@id":"http:\/\/www.safeseas.net\/evidence\/2020\/02\/10\/piracy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/www.safeseas.net\/evidence\/"},{"@type":"ListItem","position":2,"name":"Piracy"}]},{"@type":"WebSite","@id":"http:\/\/www.safeseas.net\/evidence\/#website","url":"http:\/\/www.safeseas.net\/evidence\/","name":"Blue Crime: the evidence","description":"","publisher":{"@id":"http:\/\/www.safeseas.net\/evidence\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.safeseas.net\/evidence\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"http:\/\/www.safeseas.net\/evidence\/#organization","name":"Blue Crime: the evidence base of SafeSeas","url":"http:\/\/www.safeseas.net\/evidence\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"http:\/\/www.safeseas.net\/evidence\/#\/schema\/logo\/image\/","url":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2020\/02\/cropped-SafeSeas01-768x519-1.png","contentUrl":"https:\/\/www.safeseas.net\/evidence\/wp-content\/uploads\/2020\/02\/cropped-SafeSeas01-768x519-1.png","width":553,"height":362,"caption":"Blue Crime: the evidence base of SafeSeas"},"image":{"@id":"http:\/\/www.safeseas.net\/evidence\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/safeseas1"]},{"@type":"Person","@id":"http:\/\/www.safeseas.net\/evidence\/#\/schema\/person\/badfedbf2d4954158ef35ddc418502bd","name":"Scott Edwards","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c45be993bbc9784712e6eb0cdb36117bba07d54d54ca941b7cbd45e9d4d956b?s=96&d=mm&r=g","caption":"Scott Edwards"},"url":"https:\/\/www.safeseas.net\/evidence\/author\/expert2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/posts\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":70,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/posts\/26\/revisions"}],"predecessor-version":[{"id":1037,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/posts\/26\/revisions\/1037"}],"wp:attachment":[{"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/media?parent=26"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/categories?post=26"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safeseas.net\/evidence\/wp-json\/wp\/v2\/tags?post=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}