Modern Piracy: Regional Cooperative Security: Southeast Asia and the Middle

Total Page:16

File Type:pdf, Size:1020Kb

Modern Piracy: Regional Cooperative Security: Southeast Asia and the Middle AN ABSTRACT OF THE THESIS OF Adam K Christensen for the degree of Master of Arts in Interdisciplinary Studies in Political Science, History, and Anthropology presented on May 12, 2011. Title: Modern Piracy: Regional Cooperative Security: Southeast Asia and the Middle East Abstract approved: ______________________________________________________ David A. Bernell Over the past ten years, reports of piracy and other forms of maritime violence have been dramatically on the rise. As these reports increase, so too does international attention toward how to solve this. This thesis examines the development of cooperative maritime security efforts in both Southeast Asia and the Middle East, paying particular attention to the Horn of Africa and Gulf of Aden region, as they pertain to turning the tide of violence in their respective maritime domains. Recent regional efforts to combat maritime security threats in the Gulf of Aden, and maritime piracy in particular, have drawn comparisons to similar efforts undertaken in the Straits of Malacca in the early parts of the past decade. However, such comparisons fail to address the unique nature of the politics and history of security cooperation in the Horn of Africa, particularly the way states in the region tend to rely upon external security support from more powerful nations, such as the United States and Japan. Additionally, often times these experts fail to discuss the cultural idiosyncrasies of the various nations. Despite some similarities shared between the two regions, the states of the Horn of Africa must deal with issues of prioritization, regional animosities, and external dependence before they can attempt to develop cooperative maritime security arrangements akin to those existing in Southeast Asia. Success will require a concerted effort by states in the region and realization by the United States of its role in supporting effective security cooperation in the region. ©Copyright by Adam K Christensen May 12, 2011 All Rights Reserved Modern Piracy: Regional Cooperative Security: Southeast Asia and the Middle East by Adam K Christensen A THESIS submitted to Oregon State University in partial fulfillment of the requirements for the degree of Master of Arts in Interdisciplinary Studies Presented May 12, 2011 Commencement June 2011 Master of Arts in Interdisciplinary Studies thesis of Adam K Christensen presented on May 12, 2011. APPROVED: ________________________________________________________________ Major Professor, representing Political Science ________________________________________________________________ Director of Interdisciplinary Studies Program ________________________________________________________________ Dean of the Graduate School I understand that my thesis will become part of the permanent collection of Oregon State University libraries. My signature below authorizes release of my thesis to any reader upon request. ________________________________________________________________ Adam K Christensen, Author ACKNOWLEDGMENTS I have so many people to thank for their efforts during this long and arduous process. First and foremost I‘d like to thank my wife Mehgan, without whom none of this would have been possible. Your encouragement and support throughout this entire process has been instrumental in my finally finishing. I couldn‘t have done it without you. Captain Campbell, Commander Volpe, thank you for helping me to manage my schedule to help fit this time consuming degree program in on top of maintaining my job within the unit. To the students of the Naval Reserve Officers Training Corps thank you for listening, many of you have helped me bounce ideas time and time again, and I‘m sure many of you have heard far more about piracy then you ever wished to. To Dr. Bernell thank you so much for everything you have done, your knowledge and assistance has been crucial to my success to date. No matter what happened I could always count on you for guidance or a swift kick when need be. Lastly to Dr‘s. Hamblin and McMurray, thank you for always being there for me, guiding me when I needed it or just being a sounding board, I couldn‘t have gotten here without your help and guidance. TABLE OF CONTENTS Page I. Introduction ............................................................................................................................. 1 Problem: .................................................................................................................................... 4 What can be done: ....................................................................................................................... 7 Importance: .................................................................................................................................. 8 II. Literature Review ................................................................................................................... 12 Chapter Introduction: ................................................................................................................ 12 The Quest for Answers Begins: .................................................................................................. 13 The Theory of Cooperative Security: ......................................................................................... 15 The “Model” of Southeast Asia: ................................................................................................. 19 Security Cooperation in the Middle East: .................................................................................. 29 Response to the Obstacles: ........................................................................................................ 34 Chapter Summary: ..................................................................................................................... 35 III. Piracy in Southeast Asia ..................................................................................................... 36 Chapter Introduction: ................................................................................................................ 36 History of Piracy in Southeast Asia: ........................................................................................... 37 Unilateral Efforts at Counter-piracy: .......................................................................................... 40 Singapore: .............................................................................................................................. 42 Malaysia: ................................................................................................................................ 44 Indonesia: ............................................................................................................................... 47 Bilateral Cooperation and National Sovereignty: ...................................................................... 50 The Role of Foreign Government Interaction: ........................................................................... 53 1. Japan .............................................................................................................................. 54 2. The United States of America: .......................................................................................... 54 Regional Response to Increased International Attention .......................................................... 55 Multilateral Maritime Security Cooperation: ............................................................................ 57 1. Malacca Straits Coordinated Patrols (MALSINDO) ........................................................ 58 2. ReCAAP and the Information Sharing Center ................................................................ 58 3. Joint Coordinating Council – MALSINDO Revamped: .................................................... 60 Chapter Summary: ..................................................................................................................... 62 IV. Counter-piracy in the Horn of Africa and Gulf of Aden ..................................................... 66 Chapter Introduction: ................................................................................................................ 66 Unilateral Efforts at Counter-Piracy: .......................................................................................... 67 1. Somaliland .......................................................................................................................... 68 2. Puntland ............................................................................................................................. 69 4. Transitional Federal Government of Somalia ................................................................ 72 5. Yemen ............................................................................................................................ 74 Bilateral Cooperation in the Gulf of Aden: ................................................................................ 77 International Attempts at Regional Maritime Security: ............................................................ 80 2. North Atlantic Treaty Organization (NATO): .................................................................. 83 3. U.S. Responses and Combined Task Force 151 (CTF-151): ................................................ 84 4. United Nation Contact Group on Piracy off Somalia (CGPCS): .......................................... 86 5. Additional International Actions: ......................................................................................
Recommended publications
  • Sophie and the Pirates a Buccaneering Story by Gay H
    Were there real pirates? Why do pirates wear eye patches and gold earrings? How do designers use math to get a boat in the theatre and pirate clothes that fit? Find out in this Study Guide For All Patrons About the Story and the Play’s Author/Director 1-2 Going from Page to Stage 2-4 Themes to Discuss & Write About 5-6 Did you know??? 6 Theatre Etiquette 11 Performance Evaluation 12 Especially for K-5 Patrons Land HO! Mapping Skills 7 Three GOLD Teeth MATH 8 For Middle School Patrons The Pirate Code (writing) 9 Deep Sea Math 10 Information to Grow Students’ Understanding & Appreciation of Sophie and the Pirates a buccaneering story by Gay H. Hammond A Pirates Life for me? People are fascinated with pirates. There are and built it up to over 1,000 ships and over LOTS of books and movies about pirates, and 80,000 men who terrorized the South China Sea. you probably know people who have dressed While she didn’t follow the laws of the land, she up like pirates for Halloween -- or maybe it was created strict rules for her ships, and anyone who YOU who donned a sword and eyepatch? broke her law was decapitated. (yikes!) In truth, pirates In the early 1880s, Scotish writer Robert Louis were REAL Stevenson used his imagination to write a bad guys who fictional adventure story about pirates: Treasure were violent Island. His book became VERY popular and robbers; they created lots of the ideas about pirates that are didn’t abide not based in truth (like treasure maps, peg legs by the law and and parrots!).
    [Show full text]
  • A Pirate's Life for Me
    A Pirate’s Life for Me 1| Page April 13th Kutztown University of Pennsylvania Table of Contents Staff Introductions…………………………………………………………………………………..……....3-4 Crisis Overview………………………………………………………………………………………......…...5 Pirate History………………………………..……………………………………………….…………....….6-10 Features of the Caribbean……………...…………………………………………….……………....….11-13 Dangers of the Sea………………………………………………………………………………….………..13-14 Character List…………………….…………………………………………………………….…...…….......14-24 Citations/Resources………..…………………………………………………………………..…………...25-26 Disclaimers…………….…………………………………………………………...………………………......26-27 2| Page Staff Introductions Head Crisis Staff - Sarah Hlay Dear Delegates, Hello and welcome to the “It’s A Pirate’s Life For Me” Committee! I am very excited to have all of you as a part of my committee to learn and explore the era that is the Golden Era of Piracy. My name is Sarah Hlay and I will be your Crisis Director for this committee. I am a junior at Kutztown University and this is my fourth semester as a part of Kutztown Model UN. This is my second Kumunc but first time running my own crisis. I am excited for you all to be part of my first crisis and to use creative problem solving together over the course of our committee. Pirate history is something that has always fascinated me and is a topic I enjoy learning more about each day. I’m excited to share my love and knowledge of this topic within one of the best eras that have existed. I hope to learn as much from me as I will from you. At Kutztown, I am studying Art Education and although I am not part of the Political Science department does not mean that debating and creative thinking is something I’m passionate about.
    [Show full text]
  • Aircraft Collection
    A, AIR & SPA ID SE CE MU REP SEU INT M AIRCRAFT COLLECTION From the Avenger torpedo bomber, a stalwart from Intrepid’s World War II service, to the A-12, the spy plane from the Cold War, this collection reflects some of the GREATEST ACHIEVEMENTS IN MILITARY AVIATION. Photo: Liam Marshall TABLE OF CONTENTS Bombers / Attack Fighters Multirole Helicopters Reconnaissance / Surveillance Trainers OV-101 Enterprise Concorde Aircraft Restoration Hangar Photo: Liam Marshall BOMBERS/ATTACK The basic mission of the aircraft carrier is to project the U.S. Navy’s military strength far beyond our shores. These warships are primarily deployed to deter aggression and protect American strategic interests. Should deterrence fail, the carrier’s bombers and attack aircraft engage in vital operations to support other forces. The collection includes the 1940-designed Grumman TBM Avenger of World War II. Also on display is the Douglas A-1 Skyraider, a true workhorse of the 1950s and ‘60s, as well as the Douglas A-4 Skyhawk and Grumman A-6 Intruder, stalwarts of the Vietnam War. Photo: Collection of the Intrepid Sea, Air & Space Museum GRUMMAN / EASTERNGRUMMAN AIRCRAFT AVENGER TBM-3E GRUMMAN/EASTERN AIRCRAFT TBM-3E AVENGER TORPEDO BOMBER First flown in 1941 and introduced operationally in June 1942, the Avenger became the U.S. Navy’s standard torpedo bomber throughout World War II, with more than 9,836 constructed. Originally built as the TBF by Grumman Aircraft Engineering Corporation, they were affectionately nicknamed “Turkeys” for their somewhat ungainly appearance. Bomber Torpedo In 1943 Grumman was tasked to build the F6F Hellcat fighter for the Navy.
    [Show full text]
  • A Study in Maritime Piracy
    A Study in Maritime Piracy A Report Submitted to the Faculty Of the WORCESTER POLYTECHNIC INSTITUTE In partial fulfillment of the requirements for the Degrees of Bachelor of Science By Laura Barry Benjamin Staver Major: Economic Science Major: System Dynamics MQP MQP Advised by Professor Oleg Pavlov May 7th, 2009 Abstract This MQP evaluated four policies aiming to eliminate piracy off the Somali coast. The rise in piracy caused global concern; in 2009, more than 20 warships from several nations were deployed on anti-piracy missions. The Pirate Fisherman Model was built using system dynamics, and allowed for simulating, testing, and comparison of the four policies. ii Table of Contents Chapter 1: Introduction ............................................................................................................................... 1 Chapter 2: Background ................................................................................................................................ 2 2.1 History of Piracy ................................................................................................................................. 2 2.1.1 Additional terms .......................................................................................................................... 2 2.1.2 Famous pirates ............................................................................................................................ 3 2.2 Modern Piracy ...................................................................................................................................
    [Show full text]
  • Boredom Busters Bitez – Perfect Pirates
    Issue 10 BCFL Children’s Services April 8, 2020 PERFECT PIRATES Today’s theme is all about pirates! Pirates lived life on the open seas with their mateys. They sailed their ships and had lots of adventures! Pirates attacked other pirates for their treasures. And some pirates even took each others ships! They traveled sea to sea with odd pets like parrots, ferrets, and more. Pirates were not to be messed with. Today’s fun includes a puzzle to decode a pirate’s hidden message, an activity to make your own treasure map, and an activity to write your own pirate tale! Blackbeard’s Message Ahoy Matey! Pirates had lots of secrets. Pirates wrote in code to make sure their messages couldn’t be read by any landlubbers. Use the pirate code below to decipher the hidden message! KEY A E G H I M N O R S T U V W Pirate Treasure Hunt Pirates kept their treasures in safe places. That way their treasures couldn’t be stolen! Pirates usually kept their treasures on secret islands, in secret caves, and in hidden chests. No pirate could ever be too careful! Sometimes pirates were too careful and they forgot where they hid their treasures! That is why they needed treasure clues. Pirates also gave their matey’s clues so they could find the treasure too! Use the instructions below to create your own treasure hunt. 1. Take your treasure and hide it in your tip top secret treasure spot. You can put your treasure in a box before hiding it in your spot.
    [Show full text]
  • Download the New Sea of Thieves Player Guide Here
    new PLAYER GUIDE Version 1.0 15/06/2020 contents Welcome Aboard! 3 The Bare Bones 4 The Pirate Code 5 Adventure or Arena 6 Keyboard and Controller Defaults 7 Game Goals and Objectives 9 Life at Sea 12 Life on Land 15 Life in The Arena 18 A World of Real Players 19 Finding a Crew to Sail With 20 Updates, Events and Awards 21 Streams of Thieves 22 Frequently Asked Questions 23 Creating a Safe Space for Play 24 Sea of Thieves ® 2 New Player Guide That said, this isn’t a strategy guide or a user manual. Discovery, experimentation and learning through interactions with other welcome players are important aspects of Sea of Thieves and we don’t want to spoil all the surprises that lie ahead. The more you cut loose and cast off your inhibitions, the more aboard fun you’ll have. We also know how eager you’ll be to dive in and get started on that journey, so if you Thanks for joining the pirate paradise that simply can’t wait to raise anchor and plunge is Sea of Thieves! It’s great to welcome you to the community, and we look forward to into the unknown, we’ll start with a quick seeing you on the seas for many hours of checklist of the bare-bones essentials. Of plundering and adventure. course, if something in particular piques your interest before you start playing, you’ll be able to learn more about it in the rest of the Sea of Thieves gives you the freedom to guide.
    [Show full text]
  • US Navy Program Guide 2012
    U.S. NAVY PROGRAM GUIDE 2012 U.S. NAVY PROGRAM GUIDE 2012 FOREWORD The U.S. Navy is the world’s preeminent cal change continues in the Arab world. Nations like Iran maritime force. Our fleet operates forward every day, and North Korea continue to pursue nuclear capabilities, providing America offshore options to deter conflict and while rising powers are rapidly modernizing their militar- advance our national interests in an era of uncertainty. ies and investing in capabilities to deny freedom of action As it has for more than 200 years, our Navy remains ready on the sea, in the air and in cyberspace. To ensure we are for today’s challenges. Our fleet continues to deliver cred- prepared to meet our missions, I will continue to focus on ible capability for deterrence, sea control, and power pro- my three main priorities: 1) Remain ready to meet current jection to prevent and contain conflict and to fight and challenges, today; 2) Build a relevant and capable future win our nation’s wars. We protect the interconnected sys- force; and 3) Enable and support our Sailors, Navy Civil- tems of trade, information, and security that enable our ians, and their Families. Most importantly, we will ensure nation’s economic prosperity while ensuring operational we do not create a “hollow force” unable to do the mission access for the Joint force to the maritime domain and the due to shortfalls in maintenance, personnel, or training. littorals. These are fiscally challenging times. We will pursue these Our Navy is integral to combat, counter-terrorism, and priorities effectively and efficiently, innovating to maxi- crisis response.
    [Show full text]
  • Going on the Account: Examining Golden Age Pirates As a Distinct
    GOING ON THE ACCOUNT: EXAMINING GOLDEN AGE PIRATES AS A DISTINCT CULTURE THROUGH ARTIFACT PATTERNING by Courtney E. Page December, 2014 Director of Thesis: Dr. Charles R. Ewen Major Department: Anthropology Pirates of the Golden Age (1650-1726) have become the stuff of legend. The way they looked and acted has been variously recorded through the centuries, slowly morphing them into the pirates of today’s fiction. Yet, many of the behaviors that create these images do not preserve in the archaeological environment and are just not good indicators of a pirate. Piracy is an illegal act and as a physical activity, does not survive directly in the archaeological record, making it difficult to study pirates as a distinct maritime culture. This thesis examines the use of artifact patterning to illuminate behavioral differences between pirates and other sailors. A framework for a model reflecting the patterns of artifacts found on pirate shipwrecks is presented. Artifacts from two early eighteenth century British pirate wrecks, Queen Anne’s Revenge (1718) and Whydah (1717) were categorized into five groups reflecting behavior onboard the ship, and frequencies for each group within each assemblage were obtained. The same was done for a British Naval vessel, HMS Invincible (1758), and a merchant vessel, the slaver Henrietta Marie (1699) for comparative purposes. There are not enough data at this time to predict a “pirate pattern” for identifying pirates archaeologically, and many uncontrollable factors negatively impact the data that are available, making a study of artifact frequencies difficult. This research does, however, help to reveal avenues of further study for describing this intriguing sub-culture.
    [Show full text]
  • Navy Force Structure and Shipbuilding Plans: Background and Issues for Congress
    Navy Force Structure and Shipbuilding Plans: Background and Issues for Congress (name redacted) Specialist in Naval Affairs December 22, 2017 Congressional Research Service 7-.... www.crs.gov RL32665 Navy Force Structure and Shipbuilding Plans: Background and Issues for Congress Summary The current and planned size and composition of the Navy, the rate of Navy ship procurement, and the prospective affordability of the Navy’s shipbuilding plans have been oversight matters for the congressional defense committees for many years. The Navy’s proposed FY2018 budget, as amended on May 24, 2017, requests the procurement of nine new ships, including one Gerald R. Ford (CVN-78) class aircraft carrier, two Virginia-class attack submarines, two DDG-51 class destroyers, two Littoral Combat Ships (LCSs), one TAO-205 class oiler, and one towing, salvage, and rescue ship. On December 15, 2016, the Navy released a new force-structure goal that calls for achieving and maintaining a fleet of 355 ships of certain types and numbers. Key points about this new 355-ship force-level goal include the following: The 355-ship force-level goal is the result of a Force Structure Assessment (FSA) conducted by the Navy in 2016. The Navy conducts an FSA every few years, as circumstances require, to determine its force-structure goal. The new 355-ship force-level goal replaces a 308-ship force-level goal that the Navy released in March 2015. The actual size of the Navy in recent years has generally been between 270 and 290 ships. The figure of 355 ships appears close to an objective of building toward a fleet of 350 ships that was announced by the Trump campaign organization during the 2016 presidential election campaign.
    [Show full text]
  • Treasure Island
    DTHE LOSR ALAMOSE NATIONALAM BANK POPEJOYCA SCHOOLTIMETCH SERIESE TEACHINGR GUIDES Treasure Island Dreamcatchers Teaching Guides align with Presented by The Panto Company USA the Common Core State Standards and New Tuesday, March 20, 2018 Mexico State Learning Standards. Grades: 3 - 7 Grades: Standards No thief, however skillful, can rob one of knowledge, and that is why knowledge is the Addressed By best and safest treasure to acquire.” Attending the - L. FRANK BAUM, AUTHOR OF THE WIZARD OF OZ Performance ‘‘ NMCCSS SYNOPSIS ELA-Literacy.SL.2 Treasure Island is one of the most famous adventure stories in English literature and is noted for its atmosphere, characters, and action. It is one of the most frequently dramatized of all novels. Its influence is enormous on popular perceptions of pirates, New Mexico including treasure maps marked with an “X,” schooners, the Black Spot, tropical Content islands, and one-legged seamen bearing parrots on their shoulders. Standards: Fine Arts/Theatre: Content Treasure Island is a quest story. Jim Hawkins, the hero, goes on a journey to a Standards 3 & 5 strange and dangerous place in pursuit of something valuable. On the surface, it is the treasure buried on the island, but it is also the process of coming-of-age and determining one’s own moral compass. Other themes in the story include the search for a heroic role model, escapism (from poverty, one’s limitations, geography), and greed. The story, set in the mid-eighteenth century, is mainly narrated by a young boy named Jim Hawkins. An old sailor comes to stay at the seaside inn owned by Jim’s parents.
    [Show full text]
  • Inspector General, Dod Oversight of the Naval Audit Service Audit of the Fiscal Year 1996 Navy General Fund (Report No
    I OFFICE OF THE INSPECTOR GENERAL INSPECTOR GENERAL, DOD, OVERSIGHT OF THE NAVAL AUDIT SERVICE AUDIT OF THE FISCAL YEAR 1996 NAVY GENERAL FUND Report No. 97-124 April 10, 1997 Department of Defense Additional Copies To obtain additional copies of this audit report, contact the Secondary Reports Distribution Unit of the Analysis, Planning, and Technical Support Directorate at (703) 604-8937 (DSN 664-8937) or FAX (703) 604-8932. Suggestions for Future Audits To suggest ideas for or to request future audits, contact the Planning and Coordination Branch of the Analysis, Planning, and Technical Support Directorate at (703) 604-8939 (DSN 664-8939) or FAX (703) 604-8932. Ideas and requests can also be mailed to: OAIG-AUD (ATTN: APTS Audit Suggestions) Inspector General, Department of Defense 400 Army Navy Drive (Room 801) Arlington, VA 22202-2884 Defense Hotline To report fraud, waste, or abuse, contact the Defense Hotline by calling (800) 424-9098; by sending e-mail to [email protected]; or by writing to the Defense Hotline, The Pentagon, Washington, DC 20301-1900. The identity of each writer and ,caller is fully protected. INSPECTOR GENERAL DEPARTMENT OF DEFENSE 400 ARMY NAVY DRIVE ARLINGTON, VIRGINIA 22202-2884 April 10, 1997 MEMORANDUM FOR UNDER SECRETARY OF DEFENSE (COMPTROLLER) AND CHIEF FINANCIAL OFFICER DIRECTOR, DEFENSE FINANCE AND ACCOUNTING SERVICE SUBJECT: Audit Report on Inspector General, DoD Oversight of the Naval Audit Service Audit of the Fiscal Year 1996 Navy General Fund (Report No. 97-124) We are providing this audit report for your information and use and for transmittal to the Director, Office of Management and Budget.
    [Show full text]
  • Flying the Black Flag: Golden Age of Piracy Deconstructed Joe D
    Flying the Black Flag: Golden Age of Piracy Deconstructed Joe D. Beranek History 489: Research Seminar Fall 2018 Copyright for this work is owned by the author. This digital version is published by McIntyre Library, University of Wisconsin Eau Claire with the consent of the author. Contents Figures Page iii Abstract iv Introduction: A Pirate’s Life for Me 1 Historiography: The Pirate Code 3 Understanding the Rise of the Golden Age: The Edge of the Map 7 Culture and Politics of Golden Age Pirates: Rise of the Buccaneer 11 European Response to Piracy: On the Hunt 16 Blackbeard as a Case Study: Man, Myth, and Legend 22 Conclusion: Sailing Into the Sunset 24 Bibliography 26 ii Figures Figure 1: A map detailing the trade routes of individual goods sent back to their European powers. 9 iii Abstract Piracy during the Golden Age has often been fantasized about through many forms of popular culture. The time period has been fictionalized and glorified by contemporary society, oftentimes weaving together factual accounts of the men and women who had a role in the Golden Age with dramatized fiction to provide us the tales of the swashbucklers we know today. What this research paper aims to do is to provide a factual account of what being a pirate in the Golden Age was truly like, while debunking the myths and legends that surround this era of maritime history. iv Introduction: A Pirate’s Life For Me The King and his men stole the Queen from her bed and bound her in her bones the seas be ours and by the powers where we will we'll roam Yo ho, all hands Hoist the colors high Heave ho, thieves and beggars Never shall we die Now some have died and some are alive and others sail on sea with the keys to the cage and the Devil to pay we lay to Fiddler's Green.
    [Show full text]