Skip to main content
Log in

Space-time dynamics of maritime piracy

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

The article examines space-time patterns of maritime piracy around the Horn of Africa. Using rational choice theory and optimal foraging theory as the theoretic frame, 6 years of recorded pirate attack data were used to test whether spatial and temporal attack patterns were independent. The results indicate evidence for a communicability of risk; that is, pirate activity clusters in space and time. Incorporating this finding means that forecasting of high-risk areas could be made more effective. The theoretical implication is that pirates’ target selection appears to be consistent with other crime types, such as burglary, car crime and shootings. The results have implications for informing maritime piracy prevention and suppression efforts.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5

Similar content being viewed by others

Notes

  1. There exists another definition in the literature. The International Maritime Bureau (IMB) defines piracy as ‘the act of boarding any vessel with an intent to commit theft or any other crime, and with an intent or capacity to use force in furtherance of that act’ (ICC International Maritime Bureau, 2011, p. 3). This includes any act of robbery or violence against a ship either docked or steaming. As the focus of the analysis is on pirate activity on the high seas, the IMB definition is not used.

  2. Leeson (2007) provides an interesting micro-economic treatment of the structure, governance and operating practices of pirate gangs.

  3. Puntland, on the northeastern tip of Somalia, is a self-declared autonomous state and widely regarded as the stronghold of pirate gangs.

  4. Due to the extent of the study region, Great Circle distances were calculated rather than Euclidean distance as the former accounts for the curvature of the Earth (which becomes important when the distance between two points is sufficiently large).

  5. Operation ATALANTA (EU-led) commenced on December 2008 and Combined Task Force 151 (US-led) commenced on January 2009.

References

  • Behlendorf, B., LaFree, G. and Legault, R. (2011) Microcycles of violence: Evidence from terrorist attacks by ETA and the FMLN. Journal of Quantitative Criminology 28 (1): 49–75.

    Article  Google Scholar 

  • Bendall, H. (2010) Cost of piracy: A comparative voyage approach. Maritime Economics And Logistics 12 (2): 178–195.

    Article  Google Scholar 

  • Bernasco, W. (2006) Co-offending and the choice of target areas in burglary. Journal of Investigative Psychology and Offender Profiling 3 (3): 139–155.

    Article  Google Scholar 

  • Bernasco, W. and Block, R. (2009) Where offenders choose to attack: A discrete choice model of robberies in Chicago. Criminology 47 (1): 93–130.

    Article  Google Scholar 

  • Bernasco, W. and Nieuwbeerta, P. (2005) How do residential burglars select target areas? A new approach to the analysis of criminal location choice. British Journal of Criminology 45 (3): 296–315.

    Article  Google Scholar 

  • Bowden, A.a. (2010) The Economic Costs of Maritime Piracy. One Earth Future Foundation, Broomfield, CO. Working paper.

  • Braithwaite, A. and Johnson, S. (2011) Space-time modeling of insurgency and counterinsurgency in Iraq. Journal of Quantitative Criminology 28 (1): 31–48.

    Article  Google Scholar 

  • Carney, S. (2009) Cutthroat capitalism: An economic analysis of the Somali pirate business model. Wired Magazine, July, http://www.wired.com/politics/security/magazine/17-07/ff_somali_pirates, accessed 16 February 2012.

  • Chalk, P. (2008) The Maritime Dimension of International Security: Terrorism, Piracy, and Challenges for the United States, Vol. 697. Santa Monica: Rand Corp.

    Google Scholar 

  • Chalk, P. (2009) Maritime Piracy: Reasons, Dangers and Solutions. DTIC Document. Technical report.

  • Chalk, P. (2010) Piracy off the horn of Africa: Scope, dimensions, causes and responses. Brown Journal of World Affairs 16 (2): 89–108.

    Google Scholar 

  • Chaplin, R., Flatley, J. and Smith, K. (2011) Crime in England and Wales 2010/11: Findings from the British Crime Survey and Police Recorded Crime, 1st edn. London: Home Office.

    Google Scholar 

  • Cornish, D.B. and Clarke, R.V. (2008) The rational choice perspective. In: R. Wortley and L. Mazerolle (eds.) Environmental Criminology and Crime Analysis. Cullompton, UK: Willan Publishing, pp. 21–47.

    Google Scholar 

  • Cornish, D.B. and Clarke, R.V.G. (1986) Rational choice approaches to crime. In: D.B. Cornish and R.V.G. Clarke (eds.) The Reasoning Criminal: Rational Choice Perspectives on Offending, Chapter 1. New York: Springer-Verlag, pp. 1–16.

    Chapter  Google Scholar 

  • Ewence, M. (2011) Tackling the pirates: Turning the tide. The Naval Review 99 (3): 243–245.

    Google Scholar 

  • Giampaolo, A. and Foster, E. (2011) Changes in Maritime Practice as a Result Of Piracy in the Gulf of Aden. Civil-Military Fusion Centre. Thematic report.

  • Gilpin, R. (2009) Counting the Costs of Somali Piracy. Washington DC: United States Institute of Peace. Working paper.

  • Guilfoyle, D. (2010) The laws of war and the fight against Somali piracy: Combatants or criminals? Melbourne Journal of International Law 11 (1): 141.

    Google Scholar 

  • ICC International Maritime Bureau. (2006) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.

  • ICC International Maritime Bureau. (2007) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.

  • ICC International Maritime Bureau. (2008) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.

  • ICC International Maritime Bureau. (2009) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.

  • ICC International Maritime Bureau. (2010) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.

  • ICC International Maritime Bureau. (2011) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.

  • Johnson, S. and Bowers, K.J. (2004) The stability of space-time clusters of burglary. British Journal of Criminology 44 (1): 55–65.

    Article  Google Scholar 

  • Johnson, S., Summers, L., Pease, K. and House, B. (2007a) Vehicle crime: Communicating Spatial and Temporal Patterns. UCL Jill Dando Institute of Crime Science. Technical report.

  • Johnson, S. et al (2007b) Space-time patterns of risk: A cross national assessment of residential burglary victimization. Journal of Quantitative Criminology 23 (3): 201–219.

    Article  Google Scholar 

  • Johnson, S., Birks, D.J., McLaughlin, L., Bowers, K.J. and Pease, K. (2007c) Prospective Crime Mapping in Operational Context. London, UK: Home Office. Home Office Online Report 19/07.

  • Johnson, S., Bowers, K., Birks, D. and Pease, K. (2009a) Predictive mapping of crime by promap: Accuracy, units of analysis, and the environmental backcloth. In: D.L. Weisburd, W. Bernasco and G.J.N. Bruinsma (eds.) Putting Crime in Its Place: Units of Analysis in Geographic Criminology. New York: Springer, pp. 171–198.

    Chapter  Google Scholar 

  • Johnson, S., Summers, L. and Pease, K. (2009b) Offender as forager? A direct test of the boost account of victimization. Journal of Quantitative Criminology 25 (2): 181–200.

    Article  Google Scholar 

  • Knox, E.G. and Bartlett, M.S. (1964) The detection of space-time interactions. Journal of the Royal Statistical Society. Series C (Applied Statistics) 13 (1): 25–30.

    Google Scholar 

  • Kraska, J. and Wilson, B. (2009) The pirates of the Gulf of Aden: The coalition is the strategy. Stanford Journal International Law 45 (2): 243–287.

    Google Scholar 

  • LaFree, G., Dugan, L., Xie, M. and Singh, P. (2012) Spatial and temporal patterns of terrorist attacks by ETA 1970 to 2007. Journal of Quantitative Criminology 28 (2): 7–29.

    Article  Google Scholar 

  • Leeson, P. (2007) An-arrgh-chy: The law and economics of pirate organization. Journal of Political Economy 115 (6): 1049–1096.

    Article  Google Scholar 

  • Little, R.S. (2011) A voyage round middle east unrest and Somali piracy. The Naval Review 99 (3): 236–240.

    Google Scholar 

  • Min, H. (2011) Modern maritime piracy in supply chain risk management. International Journal of Logistics Systems and Management 10 (1): 122–138.

    Article  Google Scholar 

  • Myburgh, P. (2002) Categorising horror: Marine insurance coverage and terrorism. Maritime Studies 126: 1–9.

    Google Scholar 

  • Nincic, D. (2002) Sea lane security and US maritime trade: Chokepoints as scarce resources. In: S.J. Tangredi (ed.) Globalization And Maritime Power, Chapter 8. Washington DC: National Defense University, Institute for National Strategic Studies, pp. 143–170.

    Google Scholar 

  • Nincic, D. (2005) The challenge of maritime terrorism: Threat identification, WMD and regime response. The Journal of Strategic Studies 28 (4): 619–644.

    Article  Google Scholar 

  • Nincic, D. (2009) Maritime piracy in Africa: The humanitarian dimension. African Security Studies 18 (3): 1–16.

    Article  Google Scholar 

  • Pelton, R.Y. (2011) Rich returns for Somali pirates evading capture in Gulf of Aden. Business Week,http://www.businessweek.com/news/2011-05-13/rich-returns-for-somali-pirates-evading-capture-in-gulf-of-aden.html, accessed 21 May 2011.

  • Percy, S. and Shortland, A. (2009) The Pirates of Somalia: Coastguards of Anarchy. West London: Brunel University. Economics and Finance Working Paper Series 09-42.

  • Pham, J. (2010) Putting Somali piracy in context. Journal of Contemporary African Studies 28 (3): 325–341.

    Article  Google Scholar 

  • Pringle, M. (2011) Piracy on the high seas. The Naval Review 99 (3): 246–248.

    Google Scholar 

  • Ramsey, A. (2011a) Alternative Approaches Land-Based Strategies to Countering Piracy off the Coast of Somalia. Civil-Military Fusion Centre. Thematic report.

  • Ramsey, A. (2011b) Barriers to Prosecution: The Problem of Piracy. Civil-Military Fusion Centre. Thematic report.

  • Ratcliffe, J.H. and Rengert, G.F. (2008) Near-repeat patterns in Philadelphia shootings. Security Journal 21 (1–2): 58–76.

    Article  Google Scholar 

  • Renwick, N. and Abbott, J. (1999) Piratical violence and maritime security in Southeast Asia. Security Dialogue 30 (2): 183–196.

    Article  Google Scholar 

  • Schofield, C. (2010) Pirates Ahoy! The modern pirate menace off the horn of Africa. Interaction 38 (2): 11.

    Google Scholar 

  • Shane, J. and Lieberman, C. (2009) Criminological theories and the problems of modern piracy. In: M. Haberfeld and A. von Hassell, (eds.) Maritime Piracy and Maritime Terrorism: The Challenge of Piracy for the 21st Century. Dubuque, IA: Kendall Hunt Publishing Company.

    Google Scholar 

  • Sterio, M. (2011) The Somali piracy problem: A global puzzle necessitating a global solution. American University Law Review 59 (5): 8.

    Google Scholar 

  • Sullivan, A. (2010) Piracy in the horn of Africa and its effects on the global supply chain. Journal of Transportation Security 3 (2): 231–243.

    Article  Google Scholar 

  • Taylor, J. (2004) Crime against Retail and Manufacturing Premises: Findings from the 2002 Commercial Victimisation Survey. Research, Development and Statistics Directorate: Home Office.

  • Torchia, C. (2009) Pirate attacks go unreported. News24 News Article, 8 July, http://www.news24.com/World/News/Pirate-attacks-go-unreported-20090707, accessed 16 February 2012.

  • Townsley, M., Homel, R. and Chaseling, J. (2000) Repeat burglary victimisation: Spatial and temporal patterns. Australian and New Zealand Journal of Criminology 33 (1): 37–63.

    Article  Google Scholar 

  • Townsley, M., Homel, R. and Chaseling, J. (2003) Infectious burglaries. A test of the near repeat hypothesis. British Journal of Criminology 43 (3): 615–633.

    Article  Google Scholar 

  • Townsley, M., Johnson, S.D. and Ratcliffe, J.H. (2008) Space-time dynamics of insurgent activity in Iraq. Security Journal 21 (3): 139–146.

    Article  Google Scholar 

  • UK Maritime Trade Operations. (2011) Best Management Practices for Protection against Somalia Based Piracy: Suggested Planning and Operational Practices for Ship Operators, and Masters of Ships Transiting the High Risk Area. Edinburgh, UK: Witherby Publishing Group.

  • UNESCAP. (2007) Container Traffic Forecast: 2007 Update. United Nations, New York. Economic and Social Commission for Asia and the Pacific Report ST/ESCAP/2484.

  • UN Security Council. (2008a) Security Council Resolution 1816. S/RES/1816, http://daccess-dds-ny.un.org/doc/UNDOC/GEN/N08/361/77/PDF/N0836177.pdf?OpenElement, accessed 2 November 2012.

  • UN Security Council. (2008b) Security Council Resolution 1846. S/RES/1846, http://daccess-dds-ny.un.org/doc/UNDOC/GEN/N08/630/29/PDF/N0863029.pdf?OpenElement, accessed 2 November 2012.

  • UN Security Council. (2008c) Security Council Resolution 1851. S/RES/1851, http://daccess-dds-ny.un.org/doc/UNDOC/GEN/N08/655/01/PDF/N0865501.pdf?OpenElement, accessed 2 November 2012.

  • Vrey, F. (2010) African maritime security: A time for good order at sea. Australian Journal of Maritime and Ocean Affairs 2 (4): 121–132.

    Article  Google Scholar 

  • Weisburd, D.L., Bushway, S., Lum, C. and Yang, S.M. (2004) Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle. Criminology 42 (2): 283–322.

    Article  Google Scholar 

  • Wells, W., Wu, L. and Ye, X. (2012) Patterns of near-repeat gun assaults in Houston. Journal of Research in Crime and Delinquency 49 (2): 186–212.

    Article  Google Scholar 

  • West, M., Cooper, T. and Kachoyan, B. (2010) AIS analysis in support of counter-piracy operations. Australian Journal of Maritime and Ocean Affairs 2 (4): 110.

    Article  Google Scholar 

  • Youstin, T., Nobles, M., Ward, J. and Cook, C. (2011) Assessing the generalizability of the near repeat phenomenon. Criminal Justice and Behavior 38 (10): 1042–1063.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Townsley, M., Oliveira, A. Space-time dynamics of maritime piracy. Secur J 28, 217–229 (2015). https://doi.org/10.1057/sj.2012.45

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2012.45

Keywords

Navigation