No CrossRef data available.
Article contents
Rascals, Scoundrels, Villains, and Knaves: The Evolution of the Law of Piracy from Ancient Times to the Present*
Published online by Cambridge University Press: 28 February 2019
Abstract
This paper begins by tracking the history of piracy from Greek and Roman times, to the Golden Age of piracy, into modern day. It also looks at the motivations for becoming a pirate and the “piracy cycle.” The paper then moves into a discussion of how piracy has influenced the law, such as its impact on Universal Jurisdiction and international treaties like the UN Convention on the Law of the Sea; however, a stable definition of what constitutes “piracy” has become troublesome, even with the abundance of legal sources related to the subject. The paper then moves into a discussion of three US court cases dealing with the issue of piracy: the first from the Golden Age of piracy, the second in the early part of this century showing how piracy is not always prosecuted in the traditional sense, and finally with the case of the famous pirate the US Navy SEALS captured during the rescue of Captain Richard Phillips of the Maersk Alabama. Finally, the paper concludes the discussion using the modern day situation of Somalia to show how the “piracy cycle” is still capable of explaining what draws people to piracy, how that particular situation has been combated by the international community, and how neighboring countries, like Kenya, are using their own court systems to the advantage of the rest of the world.
- Type
- Articles
- Information
- Copyright
- Copyright © 2011 by the International Association of Law Libraries.
References
1 Alfred S. Bradford, Flying the Black Flag: A Brief History of Piracy, 33 (2007).Google Scholar
2 Patricia Risso, Cross-Cultural Perceptions of Piracy: Maritime Violence in the Western Indian Ocean and Persian Gulf Region during a Long Eighteenth Century, 12 J. World History 293, 297 (2001). Privateers were another name often used. Privateers were essentially a legalization of piracy, with explicit authorization from their government to attack enemy ships. By authorizing these pirates with “letters of marquee,” they were able to avoid being charged with piracy and its accompanying mandatory life sentence. The most famous privateer was Francis Drake, who after attacking Spanish ships and sharing his profits with Elizabeth I, was knighted. Buccaneers often were pirates who operated in the West Indies, and Corsairs were Muslim or Christian pirates operating in the Mediterranean from the sixteenth through nineteenth centuries. See Piracy: A Brief History of Piracy, Royal Naval Museum Library, http://www.royalnavalmuseum.org/info_sheets_piracy.htm [hereafter Royal Navy].Google Scholar
3 Sayyid Azim, Somali Pirates Appear in Kenyan Court, USA Today, Apr. 23, 2009, http://www.usatoday.com/news/world/2009-04-23-pirates_N.htm.Google Scholar
4 Ancient Pirates: Greek and Roman Pirates, http://www.thewayofthepirates.com/history-of-piracy/ancient-piracy.php [hereinafter Ancient Pirates].Google Scholar
5 Id.Google Scholar
6 Bradford, supra note 1, at 4. Often, pirates found that selling a ships’ crew as slaves or asking for ransom was more lucrative and profitable than the ships’ cargo. Royal Navy, supra note 2.Google Scholar
7 Id. at 24.Google Scholar
8 Ancient Pirates, supra note 4. Caesar eventually got his revenge by killing all of the pirates responsible for his kidnapping.Google Scholar
9 Bradford, supra note 1, at 4.Google Scholar
10 J.L. Anderson, Piracy and World History: An Economic Perspective on Maritime Predation, 6 J. World History 175, 184 (1995).Google Scholar
11 Bradford, supra note 1, at 12.Google Scholar
12 Id. at 4.Google Scholar
13 See generally, id. at 19–24.Google Scholar
14 Ancient Pirates, supra note 4.Google Scholar
15 Risso, supra note 2, at 297.Google Scholar
16 Anderson, supra note 10, at 184.Google Scholar
17 Bradford, supra note 1, at 50.Google Scholar
18 Anderson, supra note 10, at 184.Google Scholar
19 Bradford, supra note 1, at 41. Pompey showed some leniency, giving pirates who surrendered lands. The rest were put to death. Among other nations that also had creative ways of getting rid of their piracy problem included Caesar who slaughtered them; the English who hung the pirates from the main mast; and the French who condemned pirates to the torture of the wheel, a device used to stretch a person until his limbs dislocated, often considered the most gruesome and painful means of medieval torture. Debra Doby, Piracy Jure Gentium: The Jurisdictional Conflict of the High Seas and Territorial Waters, 41 J. Mar. L. & Com. 561, 565–566 (2010).Google Scholar
20 Ancient Pirates, supra note 4.Google Scholar
21 Golden Age of Piracy, http://www.thewayofthepirates.com/history-of-piracy/golde-age-of-piracy.php.Google Scholar
22 Peter T. Leeson, An-arrgh-chy: The Law and Economics of Pirate Organization, 115 J. Political Economy 1049, 1053 (2007).Google Scholar
23 Merriam-Webster Dictionary, Golden Age of Piracy, http://www.thewayofthepirates.com/history-of-piracy/golde-age-of-piracy.php.Google Scholar
24 Golden Age of Piracy, supra note 21.Google Scholar
25 Id. Piracy also held appeal for sailors formerly serving on merchant ships because it allowed them to be free of national laws, were often treated better than they would on merchant or naval ships, and prize money was equally shared. When pirates attacked merchant ships, they often asked the crew of the attacked ships for any volunteers to join the pirates, and many would accept the offer since “life on a merchant ships was often harsh and conditions awful.” Royal Navy, supra note 2.Google Scholar
26 Leeson, supra note 22, at 1054.Google Scholar
27 Golden Age of Piracy, supra note 21.Google Scholar
28 Leeson, supra note 22, at 1053.Google Scholar
29 Bradford, supra note 1, at 85. A boat that had as shallow a depth as possible was often preferred by pirates because it allowed them to navigate in shallow waters and hide in coves and inlets, enabling them to surprise their victims. Schooners, galleys, and junks were the preferred boats, depending on what area of the world the pirates victimized. Royal Navy, supra note 2.Google Scholar
30 Bradford, supra note 1, at 85.Google Scholar
31 Id. at 86. Pirates, as many of us already know, used flags to identify themselves. Originally flown to frighten passing ships, they were blood red to indicate no mercy would be shown and induce the passing ships into surrendering without a fight. Eventually, these flags became call signs, with the most famous of pirate flags being the skull and crossbones, a symbol used in ships’ logs to represent a death on board, was adopted by the Jolly Roger. Royal Navy, supra note 2.Google Scholar
32 Anderson, supra note 10, at 185.Google Scholar
33 Bradford, supra note 1, at 82.Google Scholar
34 Id. at 90. Becoming a pirate did not come without its own rules and laws. Extreme loyalty was expected. Called “going on the account,” once a pirate he was expected to live by the rules of the ship, and breaking them could result in flogging or death. If a pirate stole from his comrades or abandoned them during battle, they would be marooned on a deserted island with only meager supplies, which more often than not resulted in slow starvation if the marooned pirate did not have hunting or fishing skills. Royal Navy, supra note 2.Google Scholar
35 Golden Age of Piracy, supra note 21.Google Scholar
36 Anderson, supra note 10, at 183–4.Google Scholar
37 Thomas W. Gallant, Brigandage, Piracy, Capitalism, and State-Formation: Transnational Crime from a Historical World-Systems Perspective, in States and Illegal Practices 25, 51 (Josiah McC. Heyman, ed., 1999).Google Scholar
38 Id.Google Scholar
39 Anderson, supra note 10, at 195.CrossRefGoogle Scholar
40 Risso, supra note 2, at 297.Google Scholar
41 See generally, Gallant, supra note 37.Google Scholar
42 Id. at 37.Google Scholar
43 Anderson, supra note 10, at 185.Google Scholar
44 Alfred W. McCoy, Requiem for a Drug Lord: State and Commodity in the Career of Khun Sa, in States and Illegal Practices 129, 157 (Josiah McC. Heyman, ed., 1999).Google Scholar
45 Gallant, supra note 37, at 38.Google Scholar
46 Id. at 38–9. In the early nineteenth century, the term “picaroon” developed to describe a person who was both a pirate and a slaver. Royal Navy, supra note 2.Google Scholar
47 Bradford, supra note 1, at 29–30.Google Scholar
48 Anderson, supra note 10, at 188.Google Scholar
49 Gallant, supra note 37, at 39.Google Scholar
50 Id.Google Scholar
51 Bradford, supra note 1, at 3.Google Scholar
52 Gallant, supra note 37, at 40.Google Scholar
53 Id.Google Scholar
54 Bradford, supra note 1, at 41–2.Google Scholar
55 Gallant, supra note 37, at 40.Google Scholar
56 Id. at 39.Google Scholar
57 Id.Google Scholar
58 McCoy, supra note 44, at 130.Google Scholar
59 Gallant, supra note 37, at 46.Google Scholar
60 Id.Google Scholar
61 Organized piracy finally ended around the early nineteenth century when the Barbary Corsairs were defeated in the Mediterranean in 1816 and other states increased patrols conducted by their navies. Privateers still flourished, however, until 1856 when the majority of maritime nations signed the Declaration of Paris outlawing letters of marque. The navies of these countries were responsible for enforcing this law. While piracy has continued, it has never reached the level it was once at. Modern day pirates often still use the same tactics their predecessors used, namely speed and surprise. Royal Navy, supra note 2.Google Scholar
62 United Nations Convention on the Law of the Sea art. 101(a)(i), opened for signature Dec. 10, 1982, 1833 U.N.T.S. 397 (entered into force Nov. 16, 1994) [hereafter UNCLOS].Google Scholar
63 Doby, supra note 19, at 568.Google Scholar
64 Id. at 569.Google Scholar
65 Doby, supra note 19, at 569. An obvious example of this in action is the current situation in Somalia, a coastal state with 3,025 km of coastline and also a failed state, who has no effective police power within its territorial land, let alone the abilities to effectively patrol its territorial waters.Google Scholar
66 United States v. Said, No. 10-CR-57, 2010 WL 3893761, at *1 (E.D. Va. Aug. 17, 2010).Google Scholar
67 Id. at 2.Google Scholar
68 Id. at 4.Google Scholar
69 Id., citing United States v. Smith, 18 U.S. 153, 161–62.Google Scholar
70 Said, supra note 66, at 4.Google Scholar
71 Id. at 5, citing The Ambrose Light, 25 F. 408, 415 (S.D.N.Y. 1885).Google Scholar
72 Discussed in further detail, infra.Google Scholar
73 Said, supra note 66, at 8, citing In re Piracy Jure Gentium, [1934] A.C. 586 (P.C.) 586.Google Scholar
74 Said, supra note 66, at 8.Google Scholar
75 Id. at 9, citing Oppenheim, International Law, §276, 325 (1905).Google Scholar
76 Kenneth C. Randall, Universal Jurisdiction under International Law, 66 Tex. L. Rev. 785, 794–5 (1988).Google Scholar
77 M. Cherif Bassiouni, Universal Jurisdiction for International Crimes: Historical Perspectives and Contemporary Practice, 42 Va. J. Int'l L. 81, 89–90 (2002).Google Scholar
78 Randall, supra note 76, at 785.Google Scholar
79 Bassiouni, supra note 77, at 90.Google Scholar
80 Randall, supra note 76, at 785.Google Scholar
81 Id.Google Scholar
82 Tina Garmon, International Law of the Sea: Reconciling the Law of Piracy and Terrorism in the Wake of September 11th, 27 Tul. Mar. L. J. 257, 260 (2002).Google Scholar
83 Bassiouni, supra note 77, at 82.Google Scholar
84 Jeffrey L. Dunoff et al., International Law: Norms, Actors, Process, 380 (2nd ed., 2006).Google Scholar
85 Id.Google Scholar
86 Randall, supra note 76, at 785.Google Scholar
87 Id. at 788.Google Scholar
88 Bassiouni, supra note 77, at 96.Google Scholar
89 Randall, supra note 76, at 791.Google Scholar
90 Garmon, supra note 82, at 261.Google Scholar
91 Bassiouni, supra note 77, at 108.Google Scholar
92 Id. at 99Google Scholar
93 Randall, supra note 76, at 792.Google Scholar
94 Id.Google Scholar
95 Bassiouni, supra note 77, at 99.Google Scholar
96 Randall, supra note 76, at 792.Google Scholar
97 Id. at 793.Google Scholar
98 John E. Noyes, Essays on Piracy: An Introduction to the International Law of Piracy, 21 Cal. W. Int'l L. J. 105, 113 (1990).Google Scholar
99 Randall, supra note 76, at 793.Google Scholar
100 Id. at 794.Google Scholar
101 Id. at 791.Google Scholar
102 Bassiouni, supra note 77, at 111.Google Scholar
103 Id. at 112.Google Scholar
104 Id. at 107.Google Scholar
105 Randall, supra note 76, at 792.Google Scholar
106 Id.Google Scholar
107 Bassiouni, supra note 77, at 106.Google Scholar
108 Randall, supra note 76, at 795.Google Scholar
109 Id.Google Scholar
110 UNCLOS, supra note 62, art. 101.Google Scholar
111 Id. art. 100.Google Scholar
112 Id. art. 103.Google Scholar
113 Id. art. 105.Google Scholar
114 Id. art. 105.Google Scholar
115 UNCLOS, supra note 62, art. 102.Google Scholar
116 Id. art. 104.Google Scholar
117 Id. art. 106.Google Scholar
118 Id. art. 107.Google Scholar
119 Maritime Space: Maritime Zones and Maritime Delimitations—Status of the Convention and its Implementing Agents, http://www.un.org/Depts/los/LEGISLATIONANDTREATIES/status.htm [hereinafter Maritime Space].Google Scholar
120 Oceans and Law of the Sea—Chronological List of Ratifications of, Accessions and Successions to the Convention and the related Agreements as at 06 November 2009, http://www.un.org/Depts/los/reference_files/chronological-_lists_of_ratifications.htm [hereinafter Oceans and Law of the Sea].Google Scholar
121 Id.Google Scholar
122 Id.Google Scholar
123 Maritime Space, supra note 119.Google Scholar
124 Oceans and Law of the Sea, supra note 120.Google Scholar
125 Maritime Space, supra note 119.Google Scholar
126 Oceans and Law of the Sea, supra note 120.Google Scholar
127 Maritime Space, supra note 119.Google Scholar
128 Oceans and Law of the Sea, supra note 120.Google Scholar
129 Maritime Space, supra note 119.Google Scholar
130 Oceans and Law of the Sea, supra note 120.Google Scholar
131 Garmon, supra note 82, at 258.Google Scholar
132 Randall, supra note 76, at 797.Google Scholar
133 Samuel Pyeatt Menefee, The New “Jamaica Discipline”: Problems with Piracy, Maritime Terrorism and the 1982 Convention on the Law of the Sea, 6 Conn. J. Int'l L. 127, 142 (1990).Google Scholar
134 Noyes, supra note 98, at 108.Google Scholar
135 UNCLOS, supra note 62, art. 100.Google Scholar
136 Noyes, supra note 98, at 108.Google Scholar
137 Menefee, supra note 133, at 146.Google Scholar
138 Randall, supra note 76, at 798.Google Scholar
139 United States v. Smith, 18 U.S. 153, 154 (1820).Google Scholar
140 Id.Google Scholar
141 Id.Google Scholar
142 Id.Google Scholar
143 Id. 18 U.S. at 154–5.Google Scholar
144 Smith, 18 U.S. at 155.CrossRefGoogle Scholar
145 Id. at 154.Google Scholar
146 Noyes, supra note 98, at 117.Google Scholar
147 18 U.S.C. §1651 (1948).Google Scholar
148 U.S. Const. art. I, §8, cl. 10.Google Scholar
149 Smith, 18 U.S. at 156–7.Google Scholar
150 Id. at 158.Google Scholar
151 Id. at 160. With respect to crimes defined by common law, Justice Story mentions murder with “malice aforethought.” Other crimes defined by common law include larceny (see People v. Dumar, 106 N.Y. 502, 508 (1887)), burglary (see Neal Kumar Katyal, Architecture as Crime Control, 111 Yale L.J. 1039, 1126 (2002).), and rape (see Henry F. Fradella, Integrating the Study of Sexuality into the Core Law School Curriculum: Suggestions for Substantive Criminal Law Cases, 57 J. Legal Educ. 60, 71 (2007).), among many other felonies, as well as many criminal defenses.Google Scholar
152 Smith, 18 U.S. at 157.CrossRefGoogle Scholar
153 Id. at 161.Google Scholar
154 Id.Google Scholar
155 Id.Google Scholar
156 Id. at 162.Google Scholar
157 Smith, 18 U.S. at 163 n.h.Google Scholar
158 United States v. Shi, 525 F.3d 709, 718 (9th Cir. 2008).Google Scholar
159 Id.Google Scholar
160 Id.Google Scholar
161 Id.Google Scholar
162 Id.Google Scholar
163 Shi, 525 F.3 d at 719.Google Scholar
164 Id. at 720.Google Scholar
165 18 U.S.C. §2280(a)(1)(A) “Offenses: A person who unlawfully or intentionally seizes or exercises control over a ship by force or threat thereof or any other form of intimidation shall be fined under this title, imprisoned not more than 20 years, or both; and if the death of any person results from conduct prohibited by this paragraph, shall be punished by death or imprisoned for any term of years or for life.”Google Scholar
166 18 U.S.C. §2280(a)(1)(B) “Offenses: A person who unlawfully or intentionally performs an act of violence against a person on board a ship if that act is likely to endanger the safe navigation of that ship shall be fined under this title, imprisoned not more than 20 years, or both; and if the death of any person results from conduct prohibited by this paragraph, shall be punished by death or imprisoned for any term of years or for life.”Google Scholar
167 18 U.S.C. §2280(a)(1).Google Scholar
168 Shi, 525 F.3d at 720.Google Scholar
169 Zou Keyuan, Enforcing the Law of Piracy in the South China Sea, 31 J. Mar. L. & Com. 107, 112 (2000).Google Scholar
170 Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation, opened for signature Mar. 10, 1988, art. 3(1), 1678 U.N.T.S. 221, 27 I.L.M. 668. The language of article 3 is “(1) Any person commits an offence if that person unlawfully and intentionally: (a) seizes or exercises control over a ship by force or threat thereof or any other form of intimidation; or (b) performs an act of violence against a person on board a ship of that act is likely to endanger the safe navigation of that ship; or (c) destroys a ship or causes damage to a ship or to its cargo which is likely to endanger the safer navigation of that ship; or (d) places or causes to be placed on a ship, by any means whatsoever, a device or substance which is likely to destroy that ship, or cause damage to that ship or its cargo which endangers or is likely to endanger the safe navigation of that ship; or (e) destroys or seriously damages maritime navigational facilities or seriously interferes with their operation, if any such act is likely to endanger the safer navigation of a ship; or (f) communicates information which he knows to be false, thereby endangering the safe navigation of a ship; or (g) injures of kills any person, in connection with the commission or attempted commission of any of the offenses set forth in subparagraphs (a) to (f).” This is the exact language codified at 18 U.S.C. 2280(a)(1)(a)-(g).Google Scholar
171 U.S. Const. art. I, §8, cl. 10, “The Congress shall have Power to define and punish Piracies and Felonies committed on the high Seas, and Offenses against the Law of Nations.”Google Scholar
172 Shi, 525 F.3d at 720.Google Scholar
173 U.S. Const. art. I, § 8, cl. 18, “The Congress shall have Power to make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof.”Google Scholar
174 Shi, 525 F.3d at 720.Google Scholar
175 Id. (citing United States v. Smith, 18 U.S. 153, 161 (1820)).Google Scholar
176 Id. at 721.Google Scholar
177 18 U.S.C. §2280(b)(1)(C).Google Scholar
178 See U.S. v. Yousef, 327 F.3d 56, 88–90 (N.Y. 2003) and U.S. v. Yunis, 924 F.2d 1086 (D.C. Cir. 1991).Google Scholar
179 Shi, 525 F.3d at 725.Google Scholar
180 Id. at 725.Google Scholar
181 Id. at 722.Google Scholar
182 Id. at 722.Google Scholar
183 Jeffrey Gettleman, The West Turns to Kenya as Piracy Criminal Court, N.Y. Times, Apr. 24, 2009, at A8.Google Scholar
184 Benjamin Weiser, Pirate Suspect Charged as Adult in New York, N.Y. Times, Apr. 21, 2009, at A1.Google Scholar
185 Piracy, as many hold the image out in their head to be, from its golden days in the 1700 and 1800s came to an end during the Barbary Wars. During this time, many piratical attacks occurred on the northern coast of African, distinctly close to where the attacks on Somalia currently take place. Due to this high frequency of attacks, in 1801, Yussef Karamanli, the ruler of Tripoli, decided the U.S. was not paying enough to ensure safe passage of ships in this area and declared war against Americans. What is ironic is as a result, President Thomas Jefferson deployed the USS Philadelphia, captained by William Bainbridge, the namesake for the ship responsible for the rescue of Captain Phillips. But instead of a heroic result like that with the Maersk Alabama, Bainbridge caused the single greatest pirate disaster in U.S. history by running his ship aground while chasing one of Yusuf's ship, resulting in the captain and all 307 sailors taken prisoner. They were held until Jefferson paid a ransom 19 months later, and Marines and mercenaries arrived on the shores of Tripoli. This Marine victory (known as the First Barbary War) is referenced in their hymn with the line “to the shores of Tripoli.” Patricia Hurtado, Maersk Pirate Escapes Hanging in New York Prosecution (Update 1), Bloomberg, April 29, 2009.Google Scholar
186 Muse was charged with hijacking, hostage-taking, kidnapping, conspiracy, and piracy.Google Scholar
187 Weiser, supra note 184, at A1.Google Scholar
188 Id., at A1.Google Scholar
189 Hurtado, supra note 185.Google Scholar
190 Id.Google Scholar
191 Deb Brunswick, Somali Pirate Sentenced to Nearly 34 Years In Prison, CNN International, February 16, 2011, available at http://edition.cnn.com/2011/CRIME/-02/16/new.york.pirate.sentencing/?hpt=T2.Google Scholar
192 Benjamin Weiser, Leniency of Sentence for Somali Hijacker Is at Issue, New York Times, A24, February 14, 2011, available at http://www.nytimes.com/2011/02-/14/nyregion/14pirate.html?src=twrhp.Google Scholar
193 Hurtado, supra note 185.Google Scholar
194 Patricia Hurtado, Maersk Pirate Abduwali Muse Deserves 27-Year Sentence, His Lawyers Say, Bloomberg, February 2, 2011, available at http://www.bloomberg.com/news/2011-02-02/maersk-pirate-abduwali-muse-deserves-27-year-sentence-his-lawyers-say.html.Google Scholar
195 Weiser, supra note 192.Google Scholar
196 Jerika Richardson, Somali Pirate Asks for Forgiveness, Sentenced to Nearly 34 Years in Prison, ABC News, February 16, 2011, available at http://abcnews.go.com/Blotter/somali-pirate-muse-sentenced-34-years/story?id=12930166.Google Scholar
198 Gannon, supra note 82, at 265.Google Scholar
199 Modern Piracy, supra note 197.Google Scholar
200 Garmon, supra note 82, at 267.Google Scholar
201 Id. at 266.Google Scholar
202 Modern Piracy, supra note 197.Google Scholar
203 VOANews.com, Somali Piracy Exposes Weakness in UN Law of the Sea, Apr. 8, 2009, http://www1.voanews.com/english/news/a-13-2009-04-08-voa67-68785907.html?CFTOKEN=69485145&jsessionid=6630748508e6054c456854303316&CFID=295864252.Google Scholar
204 Eugene Kontorovich, International Legal Responses to Piracy of the Coast of Somalia, ASIL Insights, Feb. 6, 2009, http://www.asil.org/insights090206.cfm.Google Scholar
205 Patrick Lennox, Contemporary Piracy of the Horn of Africa, 5, Canadian Defence & Foreign Affairs Institute, Dec. 2008, available at http://www.bosaso-media.com/images/right_side_ads/Contemporary%20Piracy%20off%20the%20Horn%20of%20Africa.pdf. The only potential ruling regimes since Barre's downfall in 1991 include the Transitional Federal Government (TFG), which was formed in exile under UN-backing and never had any real control over the country, and the Coalition of Islamic Courts (CIC) (also known as the Union of Islamic Courts), which was a collection of Islamic groups similar to the Taliban in Afghanistan. The CIC had a short reign—only six months—and controlled only the southern two-thirds of the country, but during their reign they cracked down severely on pirates, often launching attacks against the pirates at their home bases, resulting in a decrease in pirate attacks off Somalia's coast. Lennox, supra, at 5–6.Google Scholar
206 Id.Google Scholar
207 VOANews.com, supra note 203.Google Scholar
208 Id. This “defensive” piracy was mainly the acts of the Hawiye clan, aimed at unlicensed foreign trawlers and those dumping toxic waste who exploited the absence of a functioning government in Somalia. The Hawiye clan maintained their activities until 2006 when the CIC gained control. At that time, the Darod clan took up the slack left by the Hawiye clan. No Stopping Them, The Economist, Feb 5th–11th 2001, at 69.Google Scholar
209 VOANews.com, supra note 203.Google Scholar
210 Id.Google Scholar
211 Joe Vacarello, U.N. Passes Piracy Pursuit Powers, CNN.com, Jun. 3, 2008, http://www.cnn.com/2008/WORLD/africa/06/02/somalia.piracy/index.html. The average hijacking lasts for 60–80 days, but that is increasing. The longest captives have been held was ten months, while the Taiwanese hostage ship, the Win Far 161, was utilized as a mother ship for the pirates. No Stopping Them, supra note 208, at 70.Google Scholar
212 Kontorovich, supra note 204.Google Scholar
213 VOANews.com, supra note 203. The average ransom paid rose from $1.5 million in 2009 to $3.5 million at the beginning of 2010. The record was $9.5 million for a South Korean tanker after the pirates initially demanded $20 million. No Stopping Them, supra note 208, at 70.Google Scholar
214 MSNBC.com, Seychelles Captures 11 Suspected Pirates, Oct. 10, 2009, http://www.msnbc.msn.com/id/33258302/ns/world_news-africa/.Google Scholar
215 Vacarello, supra note 211.Google Scholar
216 Mary Kimani, Tackling Piracy off African Shores, United Nations Africa Renewal, Jan. 2009, http://www.un.org/ecosocdev/geninfo/afrec/vol22no4/224-piracy.html Google Scholar
217 Kontorovich, supra note 204. As of April 14, 2011, worldwide 156 attacks with 19 total hijackings have been reported in 2011. 107 of those attacks and 17 hijackings, with 309 captives taken, were reported for Somalia alone. Seven deaths have been reported for 2011. In total, Somali pirates currently hold 26 vessels and 532 hostages. Piracy News & Figures, ICC International Maritime Bureau, available at http://www.icc-ccs.org/piracy-reporting-centre/piracynewsafigures (last visited April 18, 2011).Google Scholar
218 Hostage Taking at Sea Rises to Record Levels, Says IMB, ICC International Maritime Bureau, Jan. 17, 2011, available at http://www.icc-ccs.org/news/429-hostage-taking-at-sea-rises-to-record-levels-says-imb. While these figures are the worst on record, it is note-worthy that attacks in the Gulf of Aden have decreased significantly from 2009 to 2010, going from 117 to 53, with the reduction attributed to the naval coalitions that have now been regularly patrolling the area.Google Scholar
219 VOANews.com, supra note 203.Google Scholar
220 Kimani, supra note 216.Google Scholar
221 Kontorovich, supra note 204.Google Scholar
222 Id. While there have been some calls to arms, this has mostly been ruled out because it risks civilian crews will become embroiled in firefights with the pirates. Instead, the naval forces and shipping industry has worked together to develop “best management practices” that detail how ships should prepare their vessels when travelling through the Gulf of Aden. These practices include maintaining a high cruising speed (no ship travelling over 18 knots has ever been successfully boarded by pirates), evasive maneuvers, erecting physical barriers and using hoses and foam cannons when pirates are close. These tactics seem to be working, with three-quarters of attacks ending in failures, whereas in 2008 pirates were successful 50% of the time. No Stopping Them, supra note 208, at 71.Google Scholar
223 Kimani, supra note 216.Google Scholar
224 Robert Murquand, Will Kenya be the Next “Hague “ of the High Seas?, Tri-State Defender, Apr. 16, 2009, http://tri-statedefenderonline.com/articlelive/articles/-3689/1/Will-Kenya-be-tapped-as-the-next-Hague-of-the-high-seas/Page1.html.Google Scholar
225 Mary Kimani, Stopping High Seas Piracy, United Nations Africa Renewal, http://www.un.org/ecosocdev/geninfo/afrec/newrels/piracy-09.html.Google Scholar
226 Sana Aftab Khan, Tackling Piracy in Somali Waters: Rising Attacks Impede Delivery of Humanitarian Assistance, UN Chronicle Online, http://www.un.org/-Pubs/chronicle/2007/webArticles/073107_somalia.htm.Google Scholar
227 Id.Google Scholar
228 Id.Google Scholar
229 Id.Google Scholar
230 Id.Google Scholar
231 Kontorovich, supra note 204.Google Scholar
232 Gettleman, supra note 183, at A8.Google Scholar
233 Kontorovich, supra note 204Google Scholar
234 Id.Google Scholar
235 Id.Google Scholar
236 S.C. Res. 1816 (2008), ¶7(b), S/RES/1816 (2008), adopted by the Security Council at its 5884th meeting on 2 June 2008.Google Scholar
237 Id.Google Scholar
238 Id. at 7(a).Google Scholar
239 Id.Google Scholar
240 Murquand, supra note 224.Google Scholar
241 Vacarello, supra note 211.Google Scholar
242 Id. at 7.Google Scholar
243 S.C. Res. 1851 (2008), S/RES/1851 (2008), adopted by the Security Council at its 6046th meeting on 16 December 2008.Google Scholar
244 VOANews.com, UN Security Council Approves Anti-Piracy Measure, Dec. 16, 2008, http://www1.voanews.com/english/news/a-13-2008-12-16-voa62-66619017.html.Google Scholar
245 Id.Google Scholar
246 S.C. Res. 1838 (2008), S/RES/1838 (2008), adopted by the Security Council at its 5987th meeting on 7 October 2008.Google Scholar
247 S.C. Res. 1844 (2008), S/RES/1844 (2008), adopted by the Security Council at its 6019th meeting on 20 November 2008.Google Scholar
248 S.C. Res. 1846 (2008), S/RES/1846 (2008), adopted by the Security Council at its 6026th meeting on 2 December 2008.Google Scholar
249 Id.Google Scholar
250 S.C. Resolution 1918 (2010), S/RES/1918 (2010), adopted by the Security Council at its 630 1st meeting, on 27 April 2010.Google Scholar
251 S.C. Resolution 1950 (2010), S/RES/1950 (2010), adopted by the Security Council at its 6429th meeting, on 23 November 2010.Google Scholar
252 Kontorovich, supra note 204.Google Scholar
253 Id. Three main naval task forces now operate in the area: Operation Atalanta, the EU contingent; Operation Ocean Shield, the NATO maritime group; and CTF-151, a 25-nation coalition under American command. In addition, many countries have deployed ships under national command, including China, Japan, India, Iran, Russia and Saudi Arabia. These naval forces have been able to help World Food Programme supplies to now get through with fewer attacks (it is estimated these flotillas disrupt around a fifth of the attacks); however, the naval forces have also contributed to the pirates beginning to roam further out using “mother ships.” No Stopping Them, supra note 208, at 70.Google Scholar
254 Kontorovich, supra note 204.Google Scholar
255 Id.Google Scholar
256 Raf Casert, EU, Kenya Agree to Prosecute Pirates, ABC News, Mar. 6, 2009, http://abcnews.go.com/International/wireStory?id=7022616.Google Scholar
257 Gettleman, supra note 183, at A8.Google Scholar
258 VOANews.com, supra note 203.Google Scholar
259 Gettleman, supra note 183, at A8. As an example, the EU has invested around $3 million in Kenya's judicial system, with some of those funds going towards building a special court for piracy trials. However, In September 2010, Kenya announced it was ending the agreement with the EU, accusing it of failing to keep its side of the bargain. No Stopping Them, supra note 208, at 71.Google Scholar
260 VOANews.com, supra note 203.Google Scholar
261 Gettleman, supra note 183, at A8. Kenya is not the only foreign state trying pirates even without a nexus. Other regional countries of note include Tanzania and the Seychelles, but Kenya has experienced the largest influx of piracy trials and convictions. No Stopping Them, supra note 208, at 71.Google Scholar
262 Kontorovich, supra note 204Google Scholar
263 Kayleigh Shebs, EU, Kenya Reach Pirate Prosecution Agreement, Jurist Legal News and Research, Mar. 6, 2009, http://jurist.law.pitt.edu/paperchase/-2009/03/eu-kenya-reach-pirate-prosecution.php.Google Scholar
264 James Thuo Gathii, Jurisdiction to Prosecute Non-National Pirates Captured by Third States Under Kenyan and International Law 4 (March 16, 2009), available at http.//works.bepress.com/cgi/viewcontent.cgi?article=1013&context=james_gathii.CrossRefGoogle Scholar
265 Id.Google Scholar
266 Constitution of Kenya §60(1).Google Scholar
267 Gathii, supra note 264, at 7.Google Scholar
268 Id. at 8.Google Scholar
269 Id. at 9.Google Scholar
270 Azim, supra note 3.Google Scholar
271 Azim, supra note 3.Google Scholar
272 Personal conversation with Professor James Gathii, Albany Law School Oct. 5, 2009 [hereinafter Conversation].Google Scholar
273 Id.Google Scholar
274 VOANews.com, supra note 203.Google Scholar
275 Azim, supra note 3.Google Scholar
276 VOANews.com, supra note 203.Google Scholar
277 See generally, Murquand, supra note 224.Google Scholar
278 Id.Google Scholar
279 Id.Google Scholar
280 Id.Google Scholar
281 Azim, supra note 3.Google Scholar
282 Azim, supra note 3. Some other options are to use the court systems of those countries that initially capture the pirates, often due to the fact that in those specific attacks the citizens of that country are the ones who were threatened. Examples of countries that have done this include the United States and South Korea. Hyung-Jin Kim, 5 Somalis Brought to South Korea on Piracy Charges, Associated Press, Jan. 30, 2011, available at http://www.msnbc.msn.com/id/41337648/ns/world_news-asiapacific/.Google Scholar