Skip to main content

Maritime Terrorism: Governance and Non-State Actors

  • Chapter
The Transnational Governance of Violence and Crime

Part of the book series: Governance and Limited Statehood ((GLS))

  • 489 Accesses

Abstract

The terror network Al Qaeda has repeatedly threatened attacks in the Arabian Sea, the Persian Gulf, and the Gulf of Aden. It also supposedly supports a training program specifically designed to prepare their operatives for carrying out attacks on warships, cargo, and cruise ships as well as to block oil trade routes (AFP 2010, CNA 2010, Reuters 2010, USA Today 2011). In response to these threats Western intelligence agencies have called on Gulf States to increase security measures aboard ships, in particular oil and gas tankers. Given the enormous importance of maritime trade, there are significant concerns as to the ramifications of a possible attack. There are a few well-known examples of maritime terrorism: the hijacking of the Italian cruise ship Achille Lauro by the Palestine Liberation Front in 1985; the Al Qaeda attacks on the USS Cole in 2000 and the French oil tanker Limburg two years later; and the bomb explosion on the Filipino Superferry 14 in 2004 perpetrated by Abu Sayyaf. One can assume that due to the low frequency of maritime terrorism that it would not be a priority to allocate resources to defend against them. However, the frequency of attacks, which in 1968–2010 numbered in the hundreds (Schneider 2011), does highlight the relevance of this field. On the other hand, in comparison to the total number of terrorist incidents in the same period, instances of maritime terrorism are relatively small and therefore less alarming.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • African Partnership Station US African Command Fact Sheet, http://www.africom.mil/fetch Binary.asp?pdfID=20091019122718, last access 3 July 2012.

  • AFP (2010) ‘Western Intel Warns Gulf States of Qaeda Attacks: Report’, http://www.google.com/hostednews/afp/article/ALeqM5giFz8SbH7-rzSAV_Y-Pjby-wwYfw, last access 15 January 2013.

  • S. Bateman (2006) ‘Assessing the Threat of Maritime Terrorism: Issues for the Asia-Pacific Region’, Security Challenges, 2(3), 77–91.

    Google Scholar 

  • A. Bürgin (2012) ‘Spanish Maritime Security Governance’, Journal of the Indian Ocean Region, 2/2012, 2012–127.

    Google Scholar 

  • B. Buzan, O. Waever and J. de Wilde (1998) Security: a New Framework for Analysis (Boulder, CO: Lynne Rienner Pub).

    Google Scholar 

  • G. Bush (2003) ‘Remarks by the President to the People of Poland’, 31 May 2003, http://georgewbush-whitehouse.archives.gov/news/releases/2003/05/20030531-3.html (online available), last access 15 January 2013.

  • CNA (2010) ‘Al-Qaeda Threat Adds to Shipping Concerns in Gulf of Aden’, http://www.cnaeurope.com/fr-fr/News/Pages/IndustryNewsDetails.aspx?newID=72c7b5af-de02-4514-958f-5e2d89321043&CategoryID=438026075&itle=Al-Qaeda%20threat%20adds%20to%20shipping%20concerns%20in%20Gulf%20of%20Aden, last access 15 January 2013.

  • Combined Maritime Forces (2012) ‘Combined Maritime Forces’, http://www.cusnc.navy.mil/cmf/cmf_command.html (online available), last access 15 January 2013.

  • Combined Task Force (CTF) 150 (2012), http://www.cusnc.navy.mil/cmf/150/ index.html (online available), last access 15 January 2013.

  • Combined Task Force (CTF) 152 (2012), http://www.cusnc.navy.mil/cmf/152/ index.html (online available), last access 15 January 2013.

  • C. Daase (2011) ‘Sicherheitskultur — Ein Konzept zur interdisziplinären Erforschung politischen und sozialen Wandels’, Security and Peace, 29(2), 59–65.

    Google Scholar 

  • C. Daase (2002) ‘Internationale Risikopolitik. Ein Forschungsprogramm für den sicherheitspolitischen Paradigmenwechsel’ in C. Daase, S. Feske and I. Peters (eds) Internationale Risikopolitik. Der Umgang mit neuen Gefahren in den internationalen Beziehungen (Baden-Baden: Nomos), pp. 9–36.

    Google Scholar 

  • Department of the Navy, Highlights of the Department of the Navy FY 2011 Budget, February 2010, S. 1–5, http://www.finance.hq.navy.mil/FMB/11pres/ Highlights_book.pdf, last accessed on 18 November 2010.

  • Department of the Navy, Highlights of the Department of the Navy FY (2011) ‘Budget, February 2010’, pp. 1–5. http://www.finance.hq.navy.mil/FMB/11pres/Highlights_book.pdf (online available), last access 15 January 2013.

  • European Commission (2004) ‘Regulation No 725/2004 of the European Parliament and of the Council of 31 March 2004 on Enhancing Ship and Port Facility Security’, amended on 21 January 2009, http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:029:0053:0054:EN:PDF (online available), last access 15 January 2013.

  • European Commission (2007) ‘Authorised Economic Operators — Guidelines’, http://ec.europa.eu/ecip/documents/who_is/aeo_guidelines_en.pdf (online available), p.19, last access 15 January 2013.

  • German Foreign Ministry (2003) ‘Statement of Interdiction Principles’, http://www.auswaertiges-amt.de/cae/servlet/contentblob/350778/publicationFile/4187/PSI-InterdictionPrinciples.pdf (online available), last access 14 January 2013.

  • Global Security Newswire (2010) ‘GAO Seeks More Thorough Testing of Cargo Security Tech’, 03.09.2010, http://www.nti.org/gsn/article/gao-seeks-more-thorough-testing-of-cargo-security-tech/ (online available), last access 15 January 2013.

  • M.D. Greenberg, P. Chalk, H.H. Willis, I. Khilko and D.S. Ortiz (2006) Maritime Terrorism. Risk and Liability (Santa Monica: RAND Center for Terrorism Risk Management Policy), http://www.rand.org/content/dam/rand/pubs/ monographs/2006/RAND_MG520.pdf (online available), last access 15 January 2013.

    Google Scholar 

  • R. Gunaratna (2003) Terrorism in the Asia Pacific: Threat and Response (Singapore: Times Academic Press).

    Google Scholar 

  • ICC International Maritime Bureau (2012) ‘Piracy and Armed Robbery Against Ships — Report for the Period 1 January — 31 December 2011’, London.

    Google Scholar 

  • ICC-International Maritime Bureau/Oceans Beyond Piracy (ICC/OBP) (2012) ‘The Human Cost of Somali Piracy 2011’, 22 June 2012, http://oceansbeyondpiracy.org/sites/default/files/hcop_2011.pdf (online available), last access 11 January 2013.

  • International Maritime Organisation (IMO) (2002) ‘Maritime Security Measures Take Shape at IMO’, http://www.imo.org/blast/mainframe.asp?topic_id=583& doc_id=2435 (online available), last access 15 January 2013.

  • ISPS Code 2003 Edition (2003) ‘International Ship & Port Facility Security Code and SOLAS Amendments 2002’, http://www.imo.org/safety/mainframe.asp?topic_id=897#what (online available), last access 15 January 2013.

  • U. Jenisch (2010) ‘Piraterie/Terrorismus — Passagierschifffahrt und Terrorismus — Eine unterschatzte Gefahr’, Marine Forum, 5/2010, 2010–4.

    Google Scholar 

  • J. Lewis and P. Maxon (2010) ‘The Proliferation Security Initiative’, Disarmament Forum, 2/2010, 2010–35.

    Google Scholar 

  • K. Petretto (2011) ‘Diebstahl, Raub und erpresserische Geiselnahme im maritimen Raum: Eine Analyse zeitgenössischer Piraterie’, PiraT Arbeitspapier zur maritimen Sicherheit, Nr. 8, http://www.maritimesecurity.eu/fileadmin/content/news_events/workingpaper/PiraT_Arbeitspapier_Nr8_2011_Petretto.pdf (online available), last access 15 January 2013.

  • C. Rahman (2008) ‘The Global Maritime Partnership Initiative. Implications for the Royal Australian Navy’, Papers in Australian Maritime Affairs, No. 24,.

    Google Scholar 

  • Reuters (2010) ‘Yemen al Qaeda Urges Jihad, Wants Red Sea Blocked’, http://www.reuters.com/article/2010/02/08/us-yemen-idUSTRE6173II20100208, last access 11 January 2013.

  • SAFE Framework of Standards of WTO, June 2007, f (online available), 14 January 2013.

    Google Scholar 

  • A.P. Schmid (2011) ‘The Definition of Terrorism’, in A.P. Schmid (ed.) The Routledge Handbook of Terrorism Research (London and New York: Routledge), pp. 39–157.

    Google Scholar 

  • J. Schmid and P. Schneider (2011) ‘Terrorismus: Eine Herausforderung für Strategie und Legitimität’, Aus Politik und Zeitgeschichte, 27, 14–8, http://www.bpb.de/publikationen/XH5AAT,0,0,Strategien_zur_Bek%E4mpfung_von_Terrorakteuren_und_Aufst%E4ndischen.html#art0 (online available), last access 15 January 2013.

    Google Scholar 

  • P. Schneider (2011) ‘Maritimer Terrorismus: Tätergruppen und Anschlagstypen — Eine empirisch-analytische Bestandsaufnahme’, PiraT-Arbeitspapier zur Maritimen Sicherheit, Nr. 13, Hamburg, http://www.maritimesecurity.eu/fileadmin/content/news_events/workingpaper/PiraT_Arbeitspapier_Nr13_2011_ Schneider.pdf (online available), last access 11 January 2013.

  • P. Schneider (2012) ‘Maritime Security Governance: A German Perspective’, Journal of the Indian Ocean Region, 2/2012, 2012–142.

    Google Scholar 

  • M. Stehr (2004) Piraterie und Terror auf See. Bewaffnete Konflikte nach dem Ende des Ost-West-Konfliktes (Berlin: Köster).

    Google Scholar 

  • USA Today (2011) ‘Oil Tanker Hijacks Easy, Attacks Complex’, http://www.usatoday.com/news/world/2011-05-21-terror-plot-oil-tankers_n.htm, last access 11 January 2013.

  • US Customs and Border Protection (CBP) (2010a) ‘Container Security Initiative Strategic Plan 2006–2011’, http://epic.org/privacy/surveillance/spotlight/1006/ csiplan.pdf (online available), last access 15 January 2013.

  • US Customs and Border Protection (CBP) (2010b) ‘Container Security Initia-tive Fact Sheet’, http://www.cbp.gov/linkhandler/cgov/trade/cargo_security/ csi/csi_factsheet_2011.ctt/csi_factsheet_2011.pdf (online available), last access 11 January 2013.

  • US Customs and Border Protection (CBP) (2011) ‘Container Security Initiative — Operational Ports...’, http://www.cbp.gov/linkhandler/cgov/trade/cargo_security/csi/csi_ports2011.ctt/csi_ports_2011.pdf (online available), last access 3 July 2012.

  • US Customs and Border Protection (CBP) (2012) ‘C-TPAT: Program Overview’, http://www.cbp.gov/linkhandler/cgov/trade/cargo_security/ctpat/ctpat_program_information/what_is_ctpat/ctpat_overview.ctt/ctpat_overview.pdf (online available), last access 15 January 2013

  • US Department of State (2012) ‘Proliferation Security Initiative Participants’, http://www.state.gov/t/isn/c27732.htm (online available), last access 15 January 2013.

  • US Navy (2007) ‘A Cooperative Strategy for 21st Century Seapower’, http://www.navy.mil/maritime/Maritimestrategy.pdf (online available), last access 15 January 2013.

  • US Navy (2009) ‘New Counter-Piracy Task Force Established’, http://www.navy.mil/search/display.asp?story_id=41687 (online available), last access 15 January 2013.

  • World Customs Organization (2007) ‘WCO Safe Framework of Stan-dards’, http://www.internationaltransportforum.org/Proceedings/Border2009/09Piraux2.pdf (online available), last access 15 January 2013.

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2013 Patricia Schneider

About this chapter

Cite this chapter

Schneider, P. (2013). Maritime Terrorism: Governance and Non-State Actors. In: Jakobi, A.P., Wolf, K.D. (eds) The Transnational Governance of Violence and Crime. Governance and Limited Statehood. Palgrave Macmillan, London. https://doi.org/10.1057/9781137334428_9

Download citation

Publish with us

Policies and ethics