Re-Assessment of Acts of Piracy Under Contemporary International

Total Page:16

File Type:pdf, Size:1020Kb

Re-Assessment of Acts of Piracy Under Contemporary International Golden Gate University School of Law GGU Law Digital Commons Theses and Dissertations Student Scholarship 11-30-2017 Re-assessment of Acts of Piracy Under Contemporary International Law With Particular Reference to Activities of Somali Pirates Nutcha Sukhawattanakun Golden Gate University School of Law, [email protected] Follow this and additional works at: https://digitalcommons.law.ggu.edu/theses Part of the International Law Commons, and the Law of the Sea Commons Recommended Citation Sukhawattanakun, Nutcha, "Re-assessment of Acts of Piracy Under Contemporary International Law With Particular Reference to Activities of Somali Pirates" (2017). Theses and Dissertations. 79. https://digitalcommons.law.ggu.edu/theses/79 This Dissertation is brought to you for free and open access by the Student Scholarship at GGU Law Digital Commons. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of GGU Law Digital Commons. For more information, please contact [email protected]. Re-assessment ofActs ofPiracy Under Contemporary International Law with Particular Reference to Activities ofSomali Pirates A Dissertation Submitted To The Committee of International Legal Studies In Candidacy for the Degree Of Scientiae Juridicae Doctor Department oflnternational Legal Studies GOLDEN GATE UNIVERSITY By Nutcha Sukhawattanakun San Francisco, California November 30, 2017 Copyright by Nutcha Sukhawattanakun 2017 i Golden Gate University The Dissertation Committee for Ms. Nutcha Sukhawattanakun Certifies that this is the Approved Version of the Following Dissertation: Re-assessment of Acts of Piracy Under Contemporary International Law With Particular Reference to Activities of Somali Pirates APPROVED BY SUPERVISING COMMITTEE CHAIR: _________________________________________ Professor Dr. Christian N. Okeke ii Re-assessment of Acts of Piracy Under Contemporary International Law with Particular Reference to Activities of Somali Pirates A Dissertation Submitted To The Committee of International Legal Studies In Candidacy for the Degree Of Scientiae Juridicae Doctor Department of International Legal Studies GOLDEN GATE UNIVERSITY By Nutcha Sukhawattanakun San Francisco, California November 30, 2017 iii Dissertation Committee Professor Dr. Christian N. Okeke, (COH) Doctor in de Rechtsgeleerdheid (Amsterdam) Professor of International & Comparative Law; Director, L.L.M. and S.J.D. Programs; Director Sompong Sucharitkhul Center for Advanced International Legal Studies, Golden Gate University School of Law /S/______________________________________________________________ Professor Dr. Ashmeed Ali Adjunct Professor Golden Gate University School of Law /S/_______________________________________________________________ Professor Dr. Chinyere Okpala Chukwuka Adjunct Professor Golden Gate University School of Law /S/__________________________________________________________ iv Abstract In 2008, Somali pirates began increasing their attacks off the East African coast, there- by, forcing ship owners and charterers to seek ways to reduce risk of capture and plun- der, and consequently avoiding the rapidly increasing “exception” insurance premiums for routes like the Gulf of Aden and expanding piracy zone in the Indian Ocean. To date, no ship with armed security has been successfully hijacked. In 2015, pirates claimed over $170 million in ransom money for hijacked vessels and their crews. That figure represents an increase since 2010 when, according to a report by United Nation Office of Drugs and crime (UNODC), ransoms paid amounted to over $110 million. Ransom money is increasingly flowing into the legal financial system, while laundering the proceeds of piracy is causing consumer prices to rise steeply in the Horn of Africa and surrounding areas. According to a review conducted by UNODC, in twenty countries, 1,116 Somali men are currently facing criminal proceedings for pira- cy, while 688 are being handled within the region. This research reveals there is no au- thority in the international system that enforces the law in international waters, nor is there a true legislative organ. All rights and responsibilities of the States and the rules regarding sea piracy that are stipulated in the International Law of the sea is based on the consent and readiness of States. Therefore, identifying issues and formulating law is a time-consuming process. Moreover, this study identifies the legal issues that might prevent a ship owner from recovering its losses to Somali pirates. As a result, international organizations such as the United Nations, the Interna- tional Maritime Organization, have submitted many drafts concerning the codification of the development of International Law regarding piracy acts committed in territorial waters, and the actions under the command of the UN general assembly or naval forces. Furthermore, International Law does not permit extension of those waters beyond 12 v nautical miles, as discussed in the second chapter. The major maritime powers and the coastal States have found a need for a new legal framework concerning the jurisdiction of chase and arrest duty at sea. The maritime powers, for instance, desire a new law that would deal with the use of force on the high seas, while not infringing upon a state's sovereignty. The study establishes reasonable regulations on suppressing piracy and closing legal loopholes through which pirates have managed to elude the law. The cornerstone of regulations to address maritime security is placed in many conventions and agree- ments; for instance, the International Convention, UNCLOS and IMO, which are regu- lations mandated to make trade and travel by sea as safe as possible, extends to mari- time security. Organizations such as the United Nations, or international maritime or- ganization, should respond to threats in two ways; by developing appropriate regula- tions and guidance through its Maritime Safety Committee, and through capacity- building work. These organizations have been addressing maritime piracy for some time and a series of measures, developed in cooperation with member States and the shipping in- dustry, have helped significantly reduce piracy in the troubled spots of the world. Since 2005, regional co-operation has addressed piracy off the coast of Somalia, in the Gulf of Aden and the Indian Ocean, and is currently implementing a strategy for en- hancing maritime security in West and Central Africa. In 2009, the IMO propagated the Djibouti Code of Conduct, and the IMO’s SUA treaties were adopted in 1988, and underwent a comprehensive revision in 2005. These treaties provide an international legal framework to ensure that appropriate action is taken against persons committing unlawful acts against ships. These unlawful acts listed in the treaties include the seizure of ships by force, acts of violence against vi persons on board ships, and placing devices on board a ship that could destroy or dam- age it. This research suggests that the member States of UNCLOS should have agreed to review their national legislation to ensure the existence of laws that criminalize pira- cy and armed robbery against ships. In the case that prosecution is not possible, the code would dictate that States should extradite or hand over the pirates. Furthermore, State parties must agree to cooperate in a manner consistent with the International Law, in the investigation, prosecution and arresting pirates, and with respect to the interdic- tion and seizure of suspected pirate ships. The international community should promote the implementation of the resolutions adopted by the UN Security Council regarding the repression of Somali piracy. Seizure of piracy funding must be available to commit resources to this field, which will undoubtedly lead to successful prosecution and the seizure of funds in juris- dictions outside Somalia as an interim measure while its legal system is strengthened. Piracy-related business currently represents the main income source for much of the coastal communities, without which the communities may become destitute. Efforts must be made to develop an alternative viable economy within Somalia, in addition to interdicting the illegitimate economic system as stated in the final chapter of this work. The heads of state and government in West Africa stressed the importance of political leadership and the coordinating role of regions in combating the increasing threat posed by piracy and other forms of organized maritime crime in the Gulf of Aden. On the other hand, to make efforts more effective, maritime nations need broad- er international support. The commission was tasked to develop a holistic strategic maritime policy framework to guide future actions and cooperation and strengthen col- laboration. Addressing the growing problem of piracy off the coast of Somalia, and im- vii proving the regional capacity to counter-piracy, should be done by developing and en- hancing regional cooperation and coordination, all of which are based on the four pil- lars of Legislation, Training, Capacity Building, and Information Sharing. In this work, I present a range of guidance aimed at addressing maritime securi- ty which concerns Somali piracy and armed robbery against ships; this includes guid- ance to governments, ship owners and ship operators, shipmasters and crews on pre- venting and suppressing piracy and armed robbery against ships; investigation of of- fences and the use of armed personnel should be granted and enacted into law which are binding
Recommended publications
  • MARITIME TERRORISM THREAT in SOUTHEAST ASIA and ITS CHALLENGES by ME6 Joses Yau Meng Wee
    features 32 MARITIME TERRORISM THREAT IN SOUTHEAST ASIA AND ITS CHALLENGES by ME6 Joses Yau Meng Wee Abstract: The threat of terrorism is always present, but the public was only given a wake-up call to the devastating impacts of terrorism after the September 11 attacks in the United States (US). Since then, many countries have stepped up their counter-terrorism efforts and measures. For example, the Association of Southeast Asian Nations (ASEAN) adopted a comprehensive approach to improve the regional security. In this essay, the author examines the terrorism threat in Southeast Asia, exploring the possible scenarios of a maritime terrorist attack in the region and thoroughly assesses the region’s counter-terrorism efforts that have been put in place. The author also introduces an Opportunity, Capability and Intent (OCI) framework as a form of threat assessment, to affirm his stand that the terrorist threat in Southeast Asia is indeed very real. Keywords: Terrorism; Counter-terrorism; Efforts and Measures; Regional Security; Threat Assessment INTRODUCTION This essay seeks to ascertain a common definition of ‘Maritime Terrorism’ and followed on to affirm The September 11 attacks in the US underscored that the terrorism threat in Southeast Asia is real the devastating effects of terrorism to the world. through the use of the Opportunity, Capability and The attacks on USS Cole in 2000, MV Limburg in Intent (OCI) threat assessment framework. Next, 2002, SuperFerry 14 in 2004 and the M Star in 2010 the essay will discuss eight probable scenarios of a are classified as acts of ‘Maritime Terrorism’, a stark maritime terrorist attack in Southeast Asia and attempt reminder that the world’s waterways continue to be to examine the credibility of each scenario.
    [Show full text]
  • Piracy, Illicit Trade, and the Construction of Commercial
    Navigating the Atlantic World: Piracy, Illicit Trade, and the Construction of Commercial Networks, 1650-1791 Dissertation Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the Graduate School of The Ohio State University by Jamie LeAnne Goodall, M.A. Graduate Program in History The Ohio State University 2016 Dissertation Committee: Margaret Newell, Advisor John Brooke David Staley Copyright by Jamie LeAnne Goodall 2016 Abstract This dissertation seeks to move pirates and their economic relationships from the social and legal margins of the Atlantic world to the center of it and integrate them into the broader history of early modern colonization and commerce. In doing so, I examine piracy and illicit activities such as smuggling and shipwrecking through a new lens. They act as a form of economic engagement that could not only be used by empires and colonies as tools of competitive international trade, but also as activities that served to fuel the developing Caribbean-Atlantic economy, in many ways allowing the plantation economy of several Caribbean-Atlantic islands to flourish. Ultimately, in places like Jamaica and Barbados, the success of the plantation economy would eventually displace the opportunistic market of piracy and related activities. Plantations rarely eradicated these economies of opportunity, though, as these islands still served as important commercial hubs: ports loaded, unloaded, and repaired ships, taverns attracted a variety of visitors, and shipwrecking became a regulated form of employment. In places like Tortuga and the Bahamas where agricultural production was not as successful, illicit activities managed to maintain a foothold much longer.
    [Show full text]
  • Rethinking East Mediterranean Security: Powers, Allies & International Law
    Touro Law Review Volume 33 Number 3 Article 10 2017 Rethinking East Mediterranean Security: Powers, Allies & International Law Sami Dogru Herbert Reginbogin Follow this and additional works at: https://digitalcommons.tourolaw.edu/lawreview Part of the International Law Commons Recommended Citation Dogru, Sami and Reginbogin, Herbert (2017) "Rethinking East Mediterranean Security: Powers, Allies & International Law," Touro Law Review: Vol. 33 : No. 3 , Article 10. Available at: https://digitalcommons.tourolaw.edu/lawreview/vol33/iss3/10 This Article is brought to you for free and open access by Digital Commons @ Touro Law Center. It has been accepted for inclusion in Touro Law Review by an authorized editor of Digital Commons @ Touro Law Center. For more information, please contact [email protected]. Dogru and Reginbogin: Rethinking East Mediterranean Security RETHINKING EAST MEDITERRANEAN SECURITY: POWERS, ALLIES & INTERNATIONAL LAW Sami Dogru * Herbert Reginbogin ** Contents Abstract I. Introduction II. Overview to Reduce Tensions in Eastern Mediterranean and Southeast Asia III. The Need for Maritime Delimitation IV. The Laws of Maritime Delimitation V. Tension Rising in the South and East China Seas VI. The Eastern Mediterranean Conundrum of Territorial Disputes VII. Reaction by the Republic of Turkey - Escalation of Tension VIII. Reaction by the Turkish Republic of Northern Cyprus (TRNC)—Escalation of Tension IX. USA, Russia, China, and Turkey’s Shift in Eastern Mediterranean Geopolitics – Rising Tensions X. Case for an Eastern Mediterranean Delimitation Program A.Relevant Area B.Configuration of the Coasts C.Proportionality D.Islands 1.Islands ‘On the Wrong Side’ 2.Island State E. Security and Navigation Factors F.Economic Factors: Joint Maritime Development Regime 1.The Characteristics of a Joint Maritime Development Regime 2.Designing a Joint Development Area 3.Maritime Joint Development Regime XI.
    [Show full text]
  • Freedom of Navigation in the South China Sea a Practical Guide
    Freedom of Navigation in the South China Sea A Practical Guide Eleanor Freund SPECIAL REPORT JUNE 2017 Belfer Center for Science and International Affairs Harvard Kennedy School 79 JFK Street Cambridge, MA 02138 www.belfercenter.org Publication design and illustrations by Andrew Facini Cover photo: United States. Central Intelligence Agency. The Spratly Islands and Paracel Islands. Scale 1:2,000,000. Washington, D.C.: Central Intelligence Agency, 1992. Copyright 2017, President and Fellows of Harvard College Printed in the United States of America Freedom of Navigation in the South China Sea A Practical Guide Eleanor Freund SPECIAL REPORT JUNE 2017 About the Author Eleanor Freund is a Research Assistant at Harvard Kennedy School’s Belfer Center for Science and International Affairs. She studies U.S. foreign policy and security issues, with a focus on U.S.-China relations. Email: [email protected] Acknowledgments The author is grateful to James Kraska, Howard S. Levie Professor of International Law at the U.S. Naval War College, and Julian Ku, Maurice A. Deane Distinguished Professor of Constitutional Law at Hofstra University School of Law, for their thoughtful comments and feedback on the text of this document. All errors or omissions are the author’s own. ii Freedom of Navigation in the South China Sea: A Practical Guide Table of Contents What is the UN Convention on the Law of the Sea (UNCLOS)? ..............1 What are maritime features? ......................................................................1 Why is the distinction between different maritime features important? .................................................................................... 4 What are the territorial sea, the contiguous zone, and the exclusive economic zone? ........................................................... 5 What maritime zones do islands, rocks, and low-tide elevations generate? ....................................................................7 What maritime zones do artificially constructed islands generate? ....
    [Show full text]
  • Foreign Terrorist Organizations
    Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba
    [Show full text]
  • Southampton Student Law Review 2011 Volume 1, Issue 1
    Southampton Student Law Review 2011 volume 1, issue 1 5 Southampton Student Law Review University of Southampton School of Law Published in the United Kingdom By the Southampton Student Law Review School of Law University of Southampton SO17 1BJ In affiliation with the University of Southampton School of Law All rights reserved. Copyright© 2011 University of Southampton. No part of this publication may be reproduced, transmitted, in any form or by any means, electronic, mechanical, recording or otherwise, or stored in any retrieval system of any nature, without the prior, express written permission of the Southampton Student Law Review and the author, to whom all requests to reproduce copyright material should be directed, in writing. The views expressed by the contributors are not necessarily those of the Editors of the Southampton Student Law Review. Whilst every effort has been made to ensure that the information contained in this journal is correct, the Editors do not accept any responsibility for any errors or omissions, or for any resulting consequences. The Editors wish to thank Dr. Oren Ben Dor, Dr. Alun Gibbs and Ms Johanna Hjalmarsson. © 2011 Southampton Student Law Review ISSN 2047 - 1017 This volume should be cited (2011) 1 S.S.L.R. Editorial Board 2011 Editor Harry East Associate Editors Ross W Martin Emma Nottingham Thomas Webber Editorial Board Semande Ayihongbe Aysegul Bugra Dingjing Huang Haedong Jeon Assad Khan Konstantinos Kofopoulos Miao Li Ioanna Magklasi Siven Pillay Rungien Meixian Song Valerio Torti Jingbo Zhang Academic Advisors Dr. Oren Ben Dor Dr. Alun Gibbs Ms Johanna Hjalmarsson The editors wish to thank all members of the University of Southampton School of Law who have helped in the creation of this volume Table of Contents Foreword ............................................................................................................
    [Show full text]
  • Strategic Insights No 10 DRAFT
    Towards a European maritime security policy Wengelin, Mattias Published in: Strategic Insights 2008 Link to publication Citation for published version (APA): Wengelin, M. (2008). Towards a European maritime security policy. Strategic Insights, 6-13. Total number of authors: 1 General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 Risk Intelligence Strategic Insights Global Maritime Security Analysis No 10 - 2008 USCGC Bertholf during sea trials 8 February 2008 (USCG) Content § US Maritime Security Policy Revisited § Towards a European Maritime Security Policy? § The Maritime Operations of the Liberation Tigers of Tamil Eelam (LTTE): The Sea Tigers and Sea Pigeons § Marine Insurance for Piracy or Terrorism – Drawing a line in Water Strategic Insights No.
    [Show full text]
  • Barly Records on Bantu Arvi Hurskainen
    Remota Relata Srudia Orientalia 97, Helsinki 20O3,pp.65-76 Barly Records on Bantu Arvi Hurskainen This article gives a short outline of the early, sometimes controversial, records of Bantu peoples and languages. While the term Bantu has been in use since the mid lgth century, the earliest attempts at describing a Bantu language were made in the lTth century. However, extensive description of the individual Bantu languages started only in the l9th century @oke l96lab; Doke 1967; Wolff 1981: 2l). Scholars have made great efforts in trying to trace the earliest record of the peoples currently known as Bantu. What is considered as proven with considerable certainty is that the first person who brought the term Bantu to the knowledge of scholars of Africa was W. H. L Bleek. When precisely this happened is not fully clear. The year given is sometimes 1856, when he published The lnnguages of Mosambique, oÍ 1869, which is the year of publication of his unfinished, yet great work A Comparative Grammar of South African Languages.In The Languages of Mosambiqu¿ he writes: <<The languages of these vocabularies all belong to that great family which, with the exception of the Hottentot dialects, includes the whole of South Africa, and most of the tongues of Western Africa>. However, in this context he does not mention the name of the language family concemed. Silverstein (1968) pointed out that the first year when the word Bantu is found written by Bleek is 1857. That year Bleek prepared a manuscript Zulu Legends (printed as late as 1952), in which he stated: <<The word 'aBa-ntu' (men, people) means 'Par excellence' individuals of the Kafir race, particularly in opposition to the noun 'aBe-lungu' (white men).
    [Show full text]
  • 2017 National History Bowl National Championships Playoff Round 7
    2017 National History Bowl National Championships Playoff Round 7 Round: Playoffs 7 Supergroup Group Room: Reader: Scorekeep: Team Names, including letter designation if needed, go in the large boxes to the right. TU# Bonus Bonus Points Cumulative Score Bonus Points Cumulative Score 1 Quarter 1 2 Tossups Only 3 4 Put a "10" in the 5 column of the team 6 that answers correctly. 7 Otherwise leave box 8 blank. 9 10 1 Quarter 2 2 Tossups and bonuses 3 Put "10" in the team's 4 column. Otherwise, 5 leave box blank. 6 For bonuses, put "0" or 7 Substitutions allowed between Qtrs all "10" in the bonus 8 column. 9 10 Quarter 3 points points 60 sec. rds - trailing team Lightning Lightning goes first. 10 pts each. Bounceback Bounceback 20 pt bonus for sweep! Total Total 1 Quarter 4 2 Tossups worth 30, 20, or 3 10 points each 4 Put the appropriate 5 number in the column of 6 the team that answers 7 correctly. Otherwise leave 8 box blank. 9 10 Tiebreakers 1 Tiebreak questions Tie Breaker (Sudden are only used 2 have no point value Victory) to determine winner! 3 at all! Final Score NHBB Nationals Bowl 2016-2017 Bowl Playoff Packet 7 Bowl Playoff Packet 7 First Quarter (1) Description acceptable. This event was thought to have occurred in retaliation for the bombing of the perpetrator's Tunisian headquarters in Operation Wooden Leg. Muhammad Zaidan organized this event, which involved the redirection of a vessel to Tartus, Syria. A John Adams opera focusing on this event opens with two choruses of exiles and is named after its only casualty, the 69-year old Leon Klinghoffer.
    [Show full text]
  • BLÜCHER Marine References
    BLÜCHER Marine References Country Project Shipyard Owner Vessel Type Hull no. Year Argentina Frigate Naval Shipyard Frigate Frigate Refitting 2005 Australia Australian Customs and Austal Ships Australian Customs and Border Cape Class Patrol Boat 361 2013 Border Protection Service Protection Service Australia Australian Customs and Austal Ships Australian Customs and Border Cape Class Patrol Boat 362 2013 Border Protection Service Protection Service Australia Australian Customs and Austal Ships Australian Customs and Border Cape Class Patrol Boat 363 2013 Border Protection Service Protection Service Australia Australian Customs and Austal Ships Australian Customs and Border Cape Class Patrol Boat 364 2013 Border Protection Service Protection Service Australia Australian Customs and Austal Ships Australian Customs and Border Cape Class Patrol Boat 365 2014 Border Protection Service Protection Service Australia Australian Customs and Austal Ships Australian Customs and Border Cape Class Patrol Boat 366 2014 Border Protection Service Protection Service Australia Australian Customs and Austal Ships Australian Customs and Border Cape Class Patrol Boat 367 2014 Border Protection Service Protection Service Australia Australian Customs and Austal Ships Australian Customs and Border Cape Class Patrol Boat 368 2014 Border Protection Service Protection Service Australia Australian Defence Civmec/ASC Australian Defence OPV OPV1 2019 Australia Australian Defence - ASC Shipyard Australian Defence Air Warfare Destroyer 2012 AWD Australia Australian Defence - LHD BAE Systems Australian Defence Landing Helicpoter 2012 Dock Australia Dick Smith Tenix Dick Smith Ocean Research Ulysses Blue 2005 Vessel Australia Esso West Tuna Esso Platform 1996 Australia HMAS Arunta BAE Systems Australian Defence ANZAC Frigate ANZAC 2019 Australia Jean de la Valette - Virtu Austal Ships Virtu Ferries High Speed Ferry 248 2010 Ferries Australia RNZN Tenix RNZN Ocean Research 42826 2006 Vessel Australia Taylor Bros.
    [Show full text]
  • The History and Description of Africa and of the Notable Things Therein Contained, Vol
    The history and description of Africa and of the notable things therein contained, Vol. 3 http://www.aluka.org/action/showMetadata?doi=10.5555/AL.CH.DOCUMENT.nuhmafricanus3 Use of the Aluka digital library is subject to Aluka’s Terms and Conditions, available at http://www.aluka.org/page/about/termsConditions.jsp. By using Aluka, you agree that you have read and will abide by the Terms and Conditions. Among other things, the Terms and Conditions provide that the content in the Aluka digital library is only for personal, non-commercial use by authorized users of Aluka in connection with research, scholarship, and education. The content in the Aluka digital library is subject to copyright, with the exception of certain governmental works and very old materials that may be in the public domain under applicable law. Permission must be sought from Aluka and/or the applicable copyright holder in connection with any duplication or distribution of these materials where required by applicable law. Aluka is a not-for-profit initiative dedicated to creating and preserving a digital archive of materials about and from the developing world. For more information about Aluka, please see http://www.aluka.org The history and description of Africa and of the notable things therein contained, Vol. 3 Alternative title The history and description of Africa and of the notable things therein contained Author/Creator Leo Africanus Contributor Pory, John (tr.), Brown, Robert (ed.) Date 1896 Resource type Books Language English, Italian Subject Coverage (spatial) Northern Swahili Coast;Middle Niger, Mali, Timbucktu, Southern Swahili Coast Source Northwestern University Libraries, G161 .H2 Description Written by al-Hassan ibn-Mohammed al-Wezaz al-Fasi, a Muslim, baptised as Giovanni Leone, but better known as Leo Africanus.
    [Show full text]
  • Ye Intruders Beware: Fantastical Pirates in the Golden Age of Illustration
    YE INTRUDERS BEWARE: FANTASTICAL PIRATES IN THE GOLDEN AGE OF ILLUSTRATION Anne M. Loechle Submitted to the faculty of the University Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in the Department of the History of Art Indiana University November 2010 Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Doctoral Committee _________________________________ Chairperson, Sarah Burns, Ph.D. __________________________________ Janet Kennedy, Ph.D. __________________________________ Patrick McNaughton, Ph.D. __________________________________ Beverly Stoeltje, Ph.D. November 9, 2010 ii ©2010 Anne M. Loechle ALL RIGHTS RESERVED iii Acknowledgments I am indebted to many people for the help and encouragement they have given me during the long duration of this project. From academic and financial to editorial and emotional, I was never lacking in support. I am truly thankful, not to mention lucky. Sarah Burns, my advisor and mentor, supported my ideas, cheered my successes, and patiently edited and helped me to revise my failures. I also owe her thanks for encouraging me to pursue an unorthodox topic. From the moment pirates came up during one of our meetings in the spring of 2005, I was hooked. She knew it, and she continuously suggested ways to expand the idea first into an independent study, and then into this dissertation. My dissertation committee – Janet Kennedy, Patrick McNaughton, and Beverly Stoeltje – likewise deserves my thanks for their mentoring and enthusiasm. Other scholars have graciously shared with me their knowledge and input along the way. David M. Lubin read a version of my third chapter and gave me helpful advice, opening up to me new ways of thinking about Howard Pyle in particular.
    [Show full text]