Cookies Policy

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.

I accept this policy

Find out more here

Developing Piracy Policy for the National Strategy for Maritime Security

Brill’s MyBook program is exclusively available on BrillOnline Books and Journals. Students and scholars affiliated with an institution that has purchased a Brill E-Book on the BrillOnline platform automatically have access to the MyBook option for the title(s) acquired by the Library. Brill MyBook is a print-on-demand paperback copy which is sold at a favorably uniform low price.

Access this chapter

+ Tax (if applicable)

Chapter Summary

This chapter offers an introduction to world piracy since the beginning of 2001, using the concept of &t;crime clusters &t; to treat major outbreaks of piracy during this time. This has been done by looking at regions which have recorded ten or more incidents in at least two of the last seven years. Ten major areas of contemporary piracy are examined in turn, discussing representative attacks and major incidents. This combination gives an idea of the general modus operandi utilized as well as suggests the potential for major disruptions of maritime commerce. The piracy clusters considered are: (1) the Straits of Malacca, (2) Indonesia, (3) Malaysia, (4) the Philippines, (5) Vietnam, (6) Bangladesh, (7) India, (8) the Horn of Africa, (9) Somalia, and (10) the Niger Delta. The chapter summarizes the current piratical threat and suggests factors which could help predict future piracy hot spots.

Keywords: crime clusters; maritime commerce; modus operandi; piracy; piratical threat



Can't access your account?
  • Tools

  • Add to Favorites
  • Printable version
  • Email this page
  • Recommend to your library

    You must fill out fields marked with: *

    Librarian details
    Your details
    Why are you recommending this title?
    Select reason:
    Legal Challenges in Maritime Security — Recommend this title to your library
  • Export citations
  • Key

  • Full access
  • Open Access
  • Partial/No accessInformation