Piracy in Somalia: an Economic Analysis of RPG-Equipped Swashbuckling

Piracy in Somalia: an Economic Analysis of RPG-Equipped Swashbuckling

Piracy in Somalia: An Economic Analysis of RPG-Equipped Swashbuckling Charles Leung An honors thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science Leonard N. Stern School of Business New York University May 2010 Marti G. Subrahmanyam Lawrence J. White Charles E. Merrill Professor of Finance Arthur E. Imperatore Professor of Economics Faculty Advisor Thesis Advisor TABLE OF CONTENTS ABSTRACT ................................................................................................................ 3 A SHORT NOTE ON SWASHBUCKLING .......................................................................... 3 ACKNOWLEDGEMENTS .............................................................................................. 4 A TALE OF SWASHBUCKLING IN THE MODERN AGE ........................................................ 5 Resurgence .................................................................................................................................. 5 Motives ........................................................................................................................................ 5 Piracy Tactics .............................................................................................................................. 5 Defensive Tactics ......................................................................................................................... 6 International Responses ............................................................................................................. 6 Lack of Punitive Options ......................................................................................................... 6 Insurance ......................................................................................................................................7 DATA SOURCES ......................................................................................................... 8 Data Collection ............................................................................................................................ 8 Outliers .................................................................................................................................... 8 Data Fidelity ............................................................................................................................ 9 Variables ..................................................................................................................................... 11 Measured Variables ................................................................................................................ 11 Proxy Variables ....................................................................................................................... 11 Dummy Variables ................................................................................................................... 12 Correlated Variables ............................................................................................................... 12 Descriptive Statistics .............................................................................................................. 13 Statistical Model ......................................................................................................................... 13 Two-Stage Least Squares Model ............................................................................................ 14 RESULTS ................................................................................................................. 15 2SLS Model ................................................................................................................................ 15 Ln(Ransom) ............................................................................................................................ 15 Ln(Days) ................................................................................................................................. 16 A Discussion of the Recurisivity of Ransom and Days Held .................................................. 17 OLS Model .................................................................................................................................. 18 CONCLUSIONS ......................................................................................................... 19 AREAS FOR FURTHER RESEARCH .............................................................................. 20 WORKS CITED ......................................................................................................... 21 APPENDIX ............................................................................................................... 22 1) Proxy and Dummy Variables ................................................................................................. 22 2) Human Development Index Value by Country..................................................................... 23 3) Table of Correlations ............................................................................................................. 24 4) Source Data ........................................................................................................................... 25 2 ABSTRACT Piracy is not a recent phenomenon; present since man took to the seas, piracy has always been an issue for seafarers. While it has faded from our zeitgeist over the past century, piracy has never been eradicated, but instead has been pushed to the few remaining lawless patches of the oceans. In 2008, the sea saw the return of a particularly brazen form of piracy as the confluence of a fractionalized Somali state, heavily trafficked shipping routes, and the lack of alternative economic opportunities led pirate gangs to capture and hold for ransom a record 42 ships. Conventional wisdom suggests that the payment of ransoms funds pirates’ equipment upgrades, encourages future attacks and increases future ransom demands. Nonetheless, faced with limited and inferior alternatives, ship owners overwhelmingly agree to pay ransoms. This thesis aims to determine the predictive factors that can help explain ransom amounts and the length of ship’s captivity. Sourced from international piracy reports and news articles, the data set consists of 41 ship hijackings attributed to Somali pirates between 2008 and 2009. The results show that ransoms are not random nor is their amount solely determined by the negotiating skills of the pirates and the ship owners. Instead there are six variables that affect ransom amounts and the length of captivity. There are three significant variables which effect a positive increase in the ransom amount: an increase in the length of captivity, an increase in the number of crew taken hostage, and the owner’s government’s policy of paying ransoms. There are four significant variables which effect a decrease in the length of captivity: an increase in the development level of the country of ownership, an increase in the development level of the crew’s home country, the ship being a tanker, and the owner’s government’s policy of paying ransoms. Given these results, owners and government can take specific actions to minimize ransom amounts. Additionally, if pirates aim to maximize profit, the data present some conclusions about which ships they should target and the most effective strategy after capturing a ship. Given the lack of negotiating power, there is not much owners can do except negotiate in good faith and aim to pay a fair ransom quickly. The data suggest that governments can ensure better outcomes (faster releases and lower ransoms) by publicly stating a policy of negotiating with pirates. Finally, pirates can maximize their profits by finding the ideal target for hijacking and by choosing how much to delay negotiations. The ideal target is a tanker owned by a company in a developed country, with a large crew from developed countries. When the owner has sufficient financial resources, pirates who aim to maximize profits will hold the ship captive for longer periods. The results of this thesis are rather discouraging to governments and owners seeking better outcomes as they have very little ability to influence ransom amounts or the length of captivity. Because owners do not have any viable options except to pay the ransom quickly, owners and governments should focus on reducing the number of hijackings. However, with limited defenses on the seas, increasing pirate capabilities, a small naval protection force and the vastness of the ocean, piracy will only occur more frequently until a land-based solution is developed. A SHORT NOTE ON SWASHBUCKLING As swashbuckling is rather an unusual term, I thought an explanation of the term would prove useful. As defined by the Oxford English Dictionary, a swashbuckler is “a swaggering bravo or ruffian; a noisy braggadocio.” That definition led me to look up the meaning of ruffian, which the OED defines as a “man of a low and brutal character; one habitually given to acts of violence or crime; a cut-throat villain.” 3 ACKNOWLEDGEMENTS My thesis has been a long and arduous journey. There are a few people who helped me immeasurably and I would like to acknowledge their support. Firstly, I would like to thank Professor Lawrence White. He agreed to take me on as his advisee in November and I appreciate all his time, advice and support over the past six months. He was constantly reassuring—even when it appeared to me that I was hopelessly off-track,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    25 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us