Abstract
The article examines space-time patterns of maritime piracy around the Horn of Africa. Using rational choice theory and optimal foraging theory as the theoretic frame, 6 years of recorded pirate attack data were used to test whether spatial and temporal attack patterns were independent. The results indicate evidence for a communicability of risk; that is, pirate activity clusters in space and time. Incorporating this finding means that forecasting of high-risk areas could be made more effective. The theoretical implication is that pirates’ target selection appears to be consistent with other crime types, such as burglary, car crime and shootings. The results have implications for informing maritime piracy prevention and suppression efforts.
Similar content being viewed by others
Notes
There exists another definition in the literature. The International Maritime Bureau (IMB) defines piracy as ‘the act of boarding any vessel with an intent to commit theft or any other crime, and with an intent or capacity to use force in furtherance of that act’ (ICC International Maritime Bureau, 2011, p. 3). This includes any act of robbery or violence against a ship either docked or steaming. As the focus of the analysis is on pirate activity on the high seas, the IMB definition is not used.
Leeson (2007) provides an interesting micro-economic treatment of the structure, governance and operating practices of pirate gangs.
Puntland, on the northeastern tip of Somalia, is a self-declared autonomous state and widely regarded as the stronghold of pirate gangs.
Due to the extent of the study region, Great Circle distances were calculated rather than Euclidean distance as the former accounts for the curvature of the Earth (which becomes important when the distance between two points is sufficiently large).
Operation ATALANTA (EU-led) commenced on December 2008 and Combined Task Force 151 (US-led) commenced on January 2009.
References
Behlendorf, B., LaFree, G. and Legault, R. (2011) Microcycles of violence: Evidence from terrorist attacks by ETA and the FMLN. Journal of Quantitative Criminology 28 (1): 49–75.
Bendall, H. (2010) Cost of piracy: A comparative voyage approach. Maritime Economics And Logistics 12 (2): 178–195.
Bernasco, W. (2006) Co-offending and the choice of target areas in burglary. Journal of Investigative Psychology and Offender Profiling 3 (3): 139–155.
Bernasco, W. and Block, R. (2009) Where offenders choose to attack: A discrete choice model of robberies in Chicago. Criminology 47 (1): 93–130.
Bernasco, W. and Nieuwbeerta, P. (2005) How do residential burglars select target areas? A new approach to the analysis of criminal location choice. British Journal of Criminology 45 (3): 296–315.
Bowden, A.a. (2010) The Economic Costs of Maritime Piracy. One Earth Future Foundation, Broomfield, CO. Working paper.
Braithwaite, A. and Johnson, S. (2011) Space-time modeling of insurgency and counterinsurgency in Iraq. Journal of Quantitative Criminology 28 (1): 31–48.
Carney, S. (2009) Cutthroat capitalism: An economic analysis of the Somali pirate business model. Wired Magazine, July, http://www.wired.com/politics/security/magazine/17-07/ff_somali_pirates, accessed 16 February 2012.
Chalk, P. (2008) The Maritime Dimension of International Security: Terrorism, Piracy, and Challenges for the United States, Vol. 697. Santa Monica: Rand Corp.
Chalk, P. (2009) Maritime Piracy: Reasons, Dangers and Solutions. DTIC Document. Technical report.
Chalk, P. (2010) Piracy off the horn of Africa: Scope, dimensions, causes and responses. Brown Journal of World Affairs 16 (2): 89–108.
Chaplin, R., Flatley, J. and Smith, K. (2011) Crime in England and Wales 2010/11: Findings from the British Crime Survey and Police Recorded Crime, 1st edn. London: Home Office.
Cornish, D.B. and Clarke, R.V. (2008) The rational choice perspective. In: R. Wortley and L. Mazerolle (eds.) Environmental Criminology and Crime Analysis. Cullompton, UK: Willan Publishing, pp. 21–47.
Cornish, D.B. and Clarke, R.V.G. (1986) Rational choice approaches to crime. In: D.B. Cornish and R.V.G. Clarke (eds.) The Reasoning Criminal: Rational Choice Perspectives on Offending, Chapter 1. New York: Springer-Verlag, pp. 1–16.
Ewence, M. (2011) Tackling the pirates: Turning the tide. The Naval Review 99 (3): 243–245.
Giampaolo, A. and Foster, E. (2011) Changes in Maritime Practice as a Result Of Piracy in the Gulf of Aden. Civil-Military Fusion Centre. Thematic report.
Gilpin, R. (2009) Counting the Costs of Somali Piracy. Washington DC: United States Institute of Peace. Working paper.
Guilfoyle, D. (2010) The laws of war and the fight against Somali piracy: Combatants or criminals? Melbourne Journal of International Law 11 (1): 141.
ICC International Maritime Bureau. (2006) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.
ICC International Maritime Bureau. (2007) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.
ICC International Maritime Bureau. (2008) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.
ICC International Maritime Bureau. (2009) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.
ICC International Maritime Bureau. (2010) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.
ICC International Maritime Bureau. (2011) Piracy and Armed Robbery Against Ships: Annual Report. Essex, UK: International Chamber of Commerce. Technical report.
Johnson, S. and Bowers, K.J. (2004) The stability of space-time clusters of burglary. British Journal of Criminology 44 (1): 55–65.
Johnson, S., Summers, L., Pease, K. and House, B. (2007a) Vehicle crime: Communicating Spatial and Temporal Patterns. UCL Jill Dando Institute of Crime Science. Technical report.
Johnson, S. et al (2007b) Space-time patterns of risk: A cross national assessment of residential burglary victimization. Journal of Quantitative Criminology 23 (3): 201–219.
Johnson, S., Birks, D.J., McLaughlin, L., Bowers, K.J. and Pease, K. (2007c) Prospective Crime Mapping in Operational Context. London, UK: Home Office. Home Office Online Report 19/07.
Johnson, S., Bowers, K., Birks, D. and Pease, K. (2009a) Predictive mapping of crime by promap: Accuracy, units of analysis, and the environmental backcloth. In: D.L. Weisburd, W. Bernasco and G.J.N. Bruinsma (eds.) Putting Crime in Its Place: Units of Analysis in Geographic Criminology. New York: Springer, pp. 171–198.
Johnson, S., Summers, L. and Pease, K. (2009b) Offender as forager? A direct test of the boost account of victimization. Journal of Quantitative Criminology 25 (2): 181–200.
Knox, E.G. and Bartlett, M.S. (1964) The detection of space-time interactions. Journal of the Royal Statistical Society. Series C (Applied Statistics) 13 (1): 25–30.
Kraska, J. and Wilson, B. (2009) The pirates of the Gulf of Aden: The coalition is the strategy. Stanford Journal International Law 45 (2): 243–287.
LaFree, G., Dugan, L., Xie, M. and Singh, P. (2012) Spatial and temporal patterns of terrorist attacks by ETA 1970 to 2007. Journal of Quantitative Criminology 28 (2): 7–29.
Leeson, P. (2007) An-arrgh-chy: The law and economics of pirate organization. Journal of Political Economy 115 (6): 1049–1096.
Little, R.S. (2011) A voyage round middle east unrest and Somali piracy. The Naval Review 99 (3): 236–240.
Min, H. (2011) Modern maritime piracy in supply chain risk management. International Journal of Logistics Systems and Management 10 (1): 122–138.
Myburgh, P. (2002) Categorising horror: Marine insurance coverage and terrorism. Maritime Studies 126: 1–9.
Nincic, D. (2002) Sea lane security and US maritime trade: Chokepoints as scarce resources. In: S.J. Tangredi (ed.) Globalization And Maritime Power, Chapter 8. Washington DC: National Defense University, Institute for National Strategic Studies, pp. 143–170.
Nincic, D. (2005) The challenge of maritime terrorism: Threat identification, WMD and regime response. The Journal of Strategic Studies 28 (4): 619–644.
Nincic, D. (2009) Maritime piracy in Africa: The humanitarian dimension. African Security Studies 18 (3): 1–16.
Pelton, R.Y. (2011) Rich returns for Somali pirates evading capture in Gulf of Aden. Business Week,http://www.businessweek.com/news/2011-05-13/rich-returns-for-somali-pirates-evading-capture-in-gulf-of-aden.html, accessed 21 May 2011.
Percy, S. and Shortland, A. (2009) The Pirates of Somalia: Coastguards of Anarchy. West London: Brunel University. Economics and Finance Working Paper Series 09-42.
Pham, J. (2010) Putting Somali piracy in context. Journal of Contemporary African Studies 28 (3): 325–341.
Pringle, M. (2011) Piracy on the high seas. The Naval Review 99 (3): 246–248.
Ramsey, A. (2011a) Alternative Approaches Land-Based Strategies to Countering Piracy off the Coast of Somalia. Civil-Military Fusion Centre. Thematic report.
Ramsey, A. (2011b) Barriers to Prosecution: The Problem of Piracy. Civil-Military Fusion Centre. Thematic report.
Ratcliffe, J.H. and Rengert, G.F. (2008) Near-repeat patterns in Philadelphia shootings. Security Journal 21 (1–2): 58–76.
Renwick, N. and Abbott, J. (1999) Piratical violence and maritime security in Southeast Asia. Security Dialogue 30 (2): 183–196.
Schofield, C. (2010) Pirates Ahoy! The modern pirate menace off the horn of Africa. Interaction 38 (2): 11.
Shane, J. and Lieberman, C. (2009) Criminological theories and the problems of modern piracy. In: M. Haberfeld and A. von Hassell, (eds.) Maritime Piracy and Maritime Terrorism: The Challenge of Piracy for the 21st Century. Dubuque, IA: Kendall Hunt Publishing Company.
Sterio, M. (2011) The Somali piracy problem: A global puzzle necessitating a global solution. American University Law Review 59 (5): 8.
Sullivan, A. (2010) Piracy in the horn of Africa and its effects on the global supply chain. Journal of Transportation Security 3 (2): 231–243.
Taylor, J. (2004) Crime against Retail and Manufacturing Premises: Findings from the 2002 Commercial Victimisation Survey. Research, Development and Statistics Directorate: Home Office.
Torchia, C. (2009) Pirate attacks go unreported. News24 News Article, 8 July, http://www.news24.com/World/News/Pirate-attacks-go-unreported-20090707, accessed 16 February 2012.
Townsley, M., Homel, R. and Chaseling, J. (2000) Repeat burglary victimisation: Spatial and temporal patterns. Australian and New Zealand Journal of Criminology 33 (1): 37–63.
Townsley, M., Homel, R. and Chaseling, J. (2003) Infectious burglaries. A test of the near repeat hypothesis. British Journal of Criminology 43 (3): 615–633.
Townsley, M., Johnson, S.D. and Ratcliffe, J.H. (2008) Space-time dynamics of insurgent activity in Iraq. Security Journal 21 (3): 139–146.
UK Maritime Trade Operations. (2011) Best Management Practices for Protection against Somalia Based Piracy: Suggested Planning and Operational Practices for Ship Operators, and Masters of Ships Transiting the High Risk Area. Edinburgh, UK: Witherby Publishing Group.
UNESCAP. (2007) Container Traffic Forecast: 2007 Update. United Nations, New York. Economic and Social Commission for Asia and the Pacific Report ST/ESCAP/2484.
UN Security Council. (2008a) Security Council Resolution 1816. S/RES/1816, http://daccess-dds-ny.un.org/doc/UNDOC/GEN/N08/361/77/PDF/N0836177.pdf?OpenElement, accessed 2 November 2012.
UN Security Council. (2008b) Security Council Resolution 1846. S/RES/1846, http://daccess-dds-ny.un.org/doc/UNDOC/GEN/N08/630/29/PDF/N0863029.pdf?OpenElement, accessed 2 November 2012.
UN Security Council. (2008c) Security Council Resolution 1851. S/RES/1851, http://daccess-dds-ny.un.org/doc/UNDOC/GEN/N08/655/01/PDF/N0865501.pdf?OpenElement, accessed 2 November 2012.
Vrey, F. (2010) African maritime security: A time for good order at sea. Australian Journal of Maritime and Ocean Affairs 2 (4): 121–132.
Weisburd, D.L., Bushway, S., Lum, C. and Yang, S.M. (2004) Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle. Criminology 42 (2): 283–322.
Wells, W., Wu, L. and Ye, X. (2012) Patterns of near-repeat gun assaults in Houston. Journal of Research in Crime and Delinquency 49 (2): 186–212.
West, M., Cooper, T. and Kachoyan, B. (2010) AIS analysis in support of counter-piracy operations. Australian Journal of Maritime and Ocean Affairs 2 (4): 110.
Youstin, T., Nobles, M., Ward, J. and Cook, C. (2011) Assessing the generalizability of the near repeat phenomenon. Criminal Justice and Behavior 38 (10): 1042–1063.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Townsley, M., Oliveira, A. Space-time dynamics of maritime piracy. Secur J 28, 217–229 (2015). https://doi.org/10.1057/sj.2012.45
Published:
Issue Date:
DOI: https://doi.org/10.1057/sj.2012.45