Introduction
There is a significant body of work discussing what constitutes contemporary piracy.1 Under the UN Convention on the Law of the Sea (UNCLOS), piracy is defined as ‘illegal acts of violence or detention, or any act of depredation, committed for private ends by the crew or the passengers of a private ship’ against another ship on the high seas.2
Two aspects of this definition are noteworthy. The first is the high seas requirement, which means that attacks on ships that take place in spaces other than the high seas (such as the territorial waters of states) do not fall under the UNCLOS piracy definition. Such incidents are referred to as ‘robbery at sea’ rather than piracy for this reason.3 The distinction is important because of the different legal regimes which apply in each case. Piracy on the high seas falls under UNCLOS provisions, while robbery in the sovereign waters of states constitutes an offence under the 1988 Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation (SUA Convention), and falls under national legal jurisdictions.2
The second contention centres on the ’two-ship’ requirement, which requires that one vessel be attacked or boarded by another to count as piracy under UNCLOS.4 Often anchored ships are attacked by armed robbers using small boats, meeting this requirement, but other incidents may include armed robbery taking place in ports where armed robbers can approach on foot.5
Not all organisations follow the UNCLOS definition. For example, the International Maritime Bureau (IMB) defines piracy as ‘an act of boarding or attempting to board any ship with the apparent intent to commit theft or any other crime and with the apparent intent or capability to use force in the furtherance of that act’.6
Characteristics
Hotspots
Contemporary piracy has been concentrated in three main regions of the world: the Western Indian Ocean (specifically off the coast of Somalia),7 the Gulf of Guinea,8 and Southeast Asia (specifically off the coast of Indonesia and Philippines).9
While there have been shifts in the intensity of pirate activities within and between these regions over time,10 all three regions share features which make them conducive to pirate activities. These include proximity to busy shipping lanes and/or choke points, weak governance of long coastlines, and significant socio-economic challenges and/or political violence.11
Practices
Pirates and armed robbers commonly use a variety of means to gain entry to vessels. The simplest is to enter on foot when a ship is anchored.12 If close to shore, pirates and armed robbers have been known to use smaller boats that tend to be fast and stealthy.13 Attacks taking place away from the shore require more sophisticated logistics, with larger motherships launching smaller vessels towards the target.14
Targets also differ significantly. Some attacks aim to seize entire ships and crew for the purposes of ransom.15 Others target cargo or crew valuables, particularly those operating at anchorages where attacks appear to be more opportunistic in nature.12 Oil theft (see illicit bunkering & fuel smuggling) is a common feature of piracy in parts of the world, and particularly in Gulf of Guinea.16
Many pirate attacks involve violence. Ursula Daxecker and Brandon Prins in their Maritime Piracy Event and Location Dataset (1993-2016) report that 75% of attacks in Nigerian waters were violent in nature, as were 85% of attacks off the coast of Somalia.5
Organisation
Incidents of piracy and armed robbery and sea can vary widely in terms of their levels of organisation. At the lower end of the scale, theft from ships in port may be opportunistic or involve only a small network of local criminals.17 Such attacks may be included in piracy recording statistics, but tend to invoke less significant or urgent responses from law enforcement actors.
Pirate attacks that aim to hijack vessels, kidnap crew or steal cargo tend to be more organised. Such activities require planning, discipline, and a strong network of collaborating actors to succeed.18 Pirate groups commonly include those who perpetrate the attacks at sea, as well as those engaged in facilitating activities such as looking after hostages, financing, providing inside information on the targets to be attacked, or providing political or legal protection.19 These higher-scale attacks generally require some degree of support from coastal communities or local government actors, as well as the presence of an organised black market through which stolen goods can be sold and profits laundered.5
Root Causes
Much of the current work on piracy seeks to better understand its root causes, with a focus on socioeconomic conditions and governance issues.20 Evidence suggests that piracy flourishes in areas that are beset by problems that reduce socioeconomic opportunity.21 Opportunistic piracy, for example, has been linked to declines in fish stocks in countries such as Indonesia. These have impacted fishers’ livelihoods and encouraged them to look for other (in this case illicit) forms of income.22
Similar pressures have been associated with more organised forms of piracy too. The rise of Somali piracy in the late 2000s for example has been linked by some to industrial fishing activities (and hazardous waste dumping) by international vessels in Somali waters. Sumaila and Bawumia has argued that this led to the depletion of fish stocks and local economic distress, and provided a recruitment pool for the emergent pirate networks.24
Piracy is also linked to issues of weak governance and development, and particularly states’ capacities and willingness to police their own waters and littoral regions.5 Piracy is associated with conflict zones and contested peripheral spaces (as is the case in the Philippines),25 and also to state collapse (as was the case in Somalia).26
Research also suggests that a certain minimal threshold of governance and infrastructure is necessary for piracy to flourish, in order to facilitate market access, the processing of stolen cargos/goods and local protection for criminal activities (i.e. actors who can prevent enforcement against criminals, usually due to corruption)5
Securitization
The United Nations Security Council has repeatedly framed piracy as a threat to international security, primarily due to its disruptive impact on global trade routes (see Impact section below),27 but also because pirate activities have been linked to conflict and terrorism. This high level of securitization has led to significant international naval and other responses discussed in further detail section below.28
Scope
There is a relatively good understanding about the scope of piracy, as numerous of organisations collate and report this data.29
This includes actors with a global focus, including the IMB,30 the International Maritime Organisation (IMO),31 and the US’s Office of Naval Intelligence.32 The IMB Piracy Reporting Centre for example received 132 incidents of piracy and armed robbery against ships in 2021.30
Data is also collected by regional organisations. Examples include the Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in Asia (ReCAAP) and the Information Fusion Centre (IFC) in Southeast Asia,33 the Regional Maritime Information Fusion Centre in the West Indian Ocean,34 and Marine Domain Awareness for Trade in the Gulf of Guinea (MDAT-GoG).35
All collate reports and distribute information publicly. Large datasets of pirate activities have been constructed on the basis of this reporting, including the Maritime Piracy Event and Location Dataset which recorded 8,900 piracy events between 1995 and 2017.5
Despite the relative strength of the data collated and distributed, however, there remain some obstacles to fully understanding the entire scope of piracy. First, pirate incidents may be defined differently between organisations according to the various criteria outlined at the Introduction above. This can lead to discrepancies in reported figures between organisations.29 A second issue is underreporting.29 Third, recorded figures tend to focus primarily on commercial vessels, while attacks on local traffic are less well documented. Conversely, there is the potential for overreporting for fraudulent purposes.
Despite issues of accuracy and consistency in mapping rates of piracy, available resources do allow for a reasonable assessment of the fluctuation of incidents.
Impact
There is a strong body of evidence on the impacts of piracy and armed robbery.
Economic
Piracy has a negative impact on the global economy in various ways. These include direct costs incurred from hijackings, the theft of cargo, and ransom payments which while direct, can be difficult to quantify due to a lack of transparency.36 Indirect costs include those relating to increased insurance rates, the rerouting of vessels, increased ship security, increased fuel costs and cost naval or other security responses.37
Losses to regional trade can also be significant, as vessels avoid high risk zones, though it is unclear the extent to which these are due to piracy specifically or its facilitating conditions.38
Sociopolitical
Piracy has social and political consequences, particularly in those areas with high concentrations of pirate activities. Impacts include the furtherance of corruption, weakening governance and even conflict exacerbation.39 Piracy has been described as a problematic spiral, whereby many of these conditions facilitate piracy but then piracy itself exacerbates those conditions further.40
Well-being
Finally, piracy poses significant risks of harm to seafarers themselves. Even those who do not suffer attacks have been shown to exhibit higher degrees of anxiety when transiting areas with high incidents of piracy and armed robbery.41 When attacks happen, seafarers can experience physical injury, including systematic torture, or death.42 Attacks can lead to high degree of psychological injury, with some seafarers – particularly those kidnapped and held for long periods – suffering from Post-Traumatic Stress Disorder (PTSD) and other related psychological disorders.43 For example, in 2011 the average length of detainment for the 1206 captured seafarers was 8 months.44
Linkages & Synergies
Piracy is linked to other forms of maritime criminality. Piracy has been seen as caused in part by IUU fishing in some cases, but there are also links between IUU fishers and armed groups engaged in piracy – with some pirates disguising their motherships as fishing vessels.45 Armed groups engaged in piracy have been linked to smuggling and trafficking, with arms and drugs trafficking, as well as charcoal smuggling, being particularly prevalent off the coast of Somalia.46 Financial flows from ransoms have also been linked to funding these activities.47
Responses
Legal Regimes
Significant international efforts have been directed towards the clarification of legal regimes for counterpiracy. As mentioned above, there has been debate around the efficacy of UNCLOS in dealing with piracy, due to the Convention’s emphasis on the high seas criteria.48 Bateman for example has argued that UNCLOS made counter-piracy more difficult, due to the introduction of different jurisdictional zones.49 This impacted states’ obligations to engage in counter piracy, as well as creating confusion around the right to hot pursuit.49
Even so, international legislation has generally coalesced into a common understanding based in UNCLOS, but augmented by approaches from other bodies too. The Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation (SUA), for example, sought to refine the issues of jurisdiction, allowing countries to prosecute pirates who committed acts against a ship flying their flag and allowing for acts within territorial waters to be recognised as piracy.50 It also obliged states to enact domestic laws to address issues of piracy, in an attempt to create some degree of legal standardisation.
The counterpiracy legal regime has been refined further in 20 plus resolutions produced by the United Nations, largely in reference to the specific problem of piracy off the coast of Somalia.27 Examples include the legalization of pursuit both into Somali territorial waters and even onto land.51
New fora have also been established to coordinate between different counterpiracy actors and responses. Some of these are focused on naval responses, such as the Shared Awareness and De-confliction (SHADE) mechanism for the Western Indian Ocean, while others have a wider focus.52 For example, the Contact Group for Piracy off the Coast of Somalia (CGPCS) was created in 2009 to foster cooperation between international actors and organisations, regional states and other stakeholders such as the shipping industry in the fight against piracy in that region.53 The Code of Conduct Concerning the Repression of Piracy and Armed Robbery against Ships in the Western Indian Ocean and the Gulf of Aden’ (Djibouti Code of Conduct, DCOC) was also established in 2009 to manage disputes between stakeholders, ensure national compliance with the counterpiracy legal regimes, and to encourage practical measures to protect ships and supress pirate activities.54
Similar coordination mechanisms have been created in Southeast Asia and the Gulf of Guinea. ReCAAP and the IFC for example focus on facilitating information sharing between actors, including providing piracy incident alerts and guidance for vessels transmitting the region.55 In the Gulf of Guinea, the Yaounde Code of Conduct fulfils a similar role to both the CGPCS and DCOC in the Western Indian Ocean, on which it was modelled.56
Increasingly, such fora have expanded their activities to issues of maritime security beyond piracy. The DCOC for example introduced the so-called Jeddah Amendment in 2017 to wider their remit to other forms of crime too.57 The CGPCS was renamed as the Contact Group on Maritime Illicit Activities in the Western Indian Ocean (CGMIA-WIO) in 2022 for similar reasons.58
Multinational Naval Responses
Perhaps the most high profile international counterpiracy response has been the deployment of multinational naval forces to police piracy hotspots. Prominent examples include the European Union Naval Force Somalia (EUNAVFOR) Operation Atalanta,59 the Combined Maritime Forces (CMF),60 and the Malacca Straits Sea Patrols (MSSP).61
These Naval interventions have sometimes been accompanied by the creation and management of new maritime security zones in piracy hotspots where transiting vessels are advised to take extra precautions to guard against pirate attacks. Examples include the Internationally Recommended Transit Corridor (IRTC) in the Gulf of Aden which is patrolled by warships,60 and the High Risk Areas (HRAs) in the Gulf of Aden and Gulf of Guinea.35
There is a large body of work analysing the effectiveness of such missions. Overall, there is a broad consensus that, in combination with other measures, such deployments have been effective in suppressing piracy.62 Even so, some have criticised the expense of these missions, the intentions behind them, and their long-term efficacy given that, on their own, they do little to address the root causes of the problem.63
Capacity Building
Another category of counterpiracy responses comprises capacity building. Capacity building programmes focus on assisting regional states to strengthen their maritime law enforcement.64 Capacity building efforts may focus on the provision of training and material, on the promulgation of best practices through joint exercises and other initiatives, on infrastructure development such as buildings or dock facilities, as well as on shared regional capacities such as maritime domain awareness systems.65
More widely, capacity building efforts may include efforts to strengthen criminal justice structures, such as legal regimes and court and prison systems, and even (though more rarely) on coastal community livelihoods and infrastructures in order to address the root causes of piracy.66
Many different actors are involved in maritime security capacity building, including international organisations such as the UN Office on Drugs and Crime (UNDOC) and EU, regional organisations such as the CGPCS/CGMIA-WIO and DCOC, and national states such as the US and UK.
Industry
There has also been a diffusion of counterpiracy best practices on an international level, largely driven by the shipping industry. These are referred to as Best Management Practices (BMP) to deter piracy.67 Issued in collaboration international shipping organisations such as the Baltic and International Maritime Council (BIMCO), the BMP outline a set of measures that ships should have in place to prepare for and react to piracy attacks. These are primarily security focused, including practices such as risk assessments, methods of hardening the ship against attack (for example by instituting passive defence measures such as razor wire), and the heightened surveillance of surrounding waters by crew members.68 The BMP also outline recommended reporting mechanisms and distress signal protocols in the event of an attack.68
Two further measures adopted by some shipping companies have been more controversial: the use of private armed guards on ships, and the payment of ransoms. The employment of private military and security company (PMSC) personnel to guard ships during transit through known pirate waters has become an increasingly common practice.69 Such practices appear to have been successful, with no vessel protected in such away having been successfully pirated.70
However, some have raised ethical concerns around the potential for the disproportionate use of force, the potential displacement of attacks to unprotected vessels, and the potential problems that the presence of so-called floating armouries (established to supply and resupply such activities) may pose.71 Ransom payments are controversial because, while they may facilitate the return of crews, some suggest they also serve to encourage further acts of piracy.72
Summary
Taken together, these efforts have led to some significant successes in the fight against piracy, particularly in the Western Indian Ocean. Pirate activities off the coast of Somalia have largely been contained since 2013 for example. Elsewhere, regional counterpiracy structures have been strengthened, and successful piracy prosecutions have increased.
Even so, it is widely recognised that counterpiracy responses have been more successful in suppressing pirate activities at sea rather than addressing their root causes on land. Concerns remain that in the absence of longer term solutions, the piracy will remain a threat to international shipping and seafarers for some time to come.
List of References
- Murphy 2008; Chalk 2009; Petrig & Geiss 2011; Guilfoyle 2013; Beckman & Page 2014; Amri 2014; Kao 2016; Otto 2018; Otto & Jernberg 2020; Dua 2019; Daxecker & Prins 2021
- UNCLOS 2010
- UNCLOS 2010; ReCAAP n.d.
- Treves 2009; Guilfoyle 2013; Ahmad 2020
- Daxecker & Prins 2021
- for discussions, see: Dillon 2005; Kraska 2011; McCabe 2018; Daxecker & Prins 2021
- Percy & Shortland 2013; Treves 2009; Dua & Menkhaus 2012; Bueger et al. 2011; Guilfoyle 2013
- Vrey 2009; Kamal-Deen 2015; Onuoha 2013; Oyewole 2016; Jacobsen 2022
- Chalk 1997; Liss 2003; 2010; 2016; Young 2007; Bradford 2008; Beckman 2010; Hastings 2020
- Jeong 2018; Marchione & Johnson 2013; Nincic 2013; Daxecker & Prins 2013; 2021; Marchione et al. 2014; Coggins 2012; IMB 2022; ReCAAP 2022
- Frecon 2005; Hastings 2009; Palmer 2014; Chalk & Hansen 2012; Daxecker & Prins 2013; 2015; 2021
- IMB 2022; ReCAAP 2022
- Frecon 2005; Twyman-Ghoshal & Pierce 2014
- Middleton 2008; Hansen 2012; Soronsen & Widen 2013; Joubert 2013; Hastings 2020
- Shane et al. 2017; Upadhyaya 2011; Todd 2013; Dua 2019; Gilmer & Dewey 2022; Nincic 2010
- Murphy 2013a; 2013b; Otto 2014; 2016; Dua 2019
- Frecon 2005
- Hansen 2012; Soronsen & Widen 2013; Joubert 2013; Hastings 2020; Daxecker & Prins 2021
- Shortland 2012; World Bank 2013; Beloff 2013; Ivancovich 2015; Shortland & VArese 2014; Murphy 2010; Daxecker & Prins 2021; Groot et al. 2012
- Dua 2019; Daxecker & Prins 2021; Groot et al. 2012
- Sumaila & Bawumia 2014; Desai & Shambaugh 2021; Daxecker & Prins 2021
- Papas 2014; Axbard 2016
- Sumaila & Bawumia 2014; see also Lehr 2011; though this is disputed by some, see23Hansen 2011
- Hastings 2020; Daxecker & Prins 2017; Liss 2016; 2017
- Hastings 2009; Silva 2009; Coggins 2016
- Security Council Report n.d.
- Guilfoyle 2008; Bueger 2015; 2014; Bueger & Stockbruegger 2012; de Oliveira 2012; Singh & Bedi 2016
- Joubert 2020
- IMB 2021
- IMO n.d.
- ONI n.d.
- ReCAAP n.d.; IFC n.d.
- RMFIC n.d.
- GOG-MDAT n.d.
- Bensassi & Martínez-Zarzoso 2012; Besley et al. 2015; Sandkamp et al. 2022
- King 2008; Bendall 2010; Karpateas 2013; Jin et al. 2019
- Sandkamp et al. 2022
- Banloai 2006; Daxecker & Prins 2017; Liss 2016; 2017
- Silva 2009; Singh & Bedi 2016
- Seyle 2018; Brooks & Greenberg 2022; Caeser et al. 2021
- Hurlburt 2013; Nincic 2010
- Alvarez JR. 2020; Abila & Tang 2014
- Hurlburt 2012
- Hurlburt 2012; Sumaila & Bawumia 2014
- Petrich 2018
- Daxecker & Prins 2017
- Murphy 2006; Nymann 2011; Ademuni-Odeke 2019
- Bateman 2009
- UN 1988
- Guilfoyle 2008
- Bueger 2013; Bueger & Stockbruegger 2022
- Bueger 2013; 2016; Bueger & Stockbruegger 2022; 2016; Swarttouw 2014; Guilfoyle 2013
- Menzel 2018; Kraska & WIlson 2009
- Bueger 2015; Ho 2009
- Bueger 2022; Menzel 2018
- Menzel 2018; Gikonyo 2019
- Bueger 2022
- Riddervold 2014; 2011; Germond & Smith 2009; Dombrowska & Reich 2019; Papastavridis 2015; EU Committee 2012
- Combined Maritime Forces n.d.
- Febrica 2015; Ikrami 2018; Bateman 2009; Khalid 2009; Bradford 2005; Koh 2016
- Bueger & Stockbruegger 2022; Koh 2016; Bradford 2008; Daxecker & Prins 2021; for dissent see Raymond 2009 & Murphy 2008
- Raymond 2009; Bueger & Stockbruegger 2022
- SafeSeas 2018; Bueger et al. 2021
- Bueger et al. 2021
- UNODC 2011; Jacobsen 2017
- OCIMF 2018; see also Bueger 2017
- OCIMF 2018
- Struwe 2012; Caldwell 2012; Affi et al. 2016; Staff 2016; Gould 2014; Cusumano & Ruzza 2020; 2017; Ronzitti 2011; Liss 2015
- Affi et al. 2016; DeAngelo & Smith 2020
- Affi et al. 2016; Cusumano & Ruzza 2020; Chapsos & Holtom 2015; Polepalli 2019; Wilpon 2017
- Dutton & Bellish 2014; Shane et al. 2018; Dubners & Chavers 2013; Lansing & Peterson 2010