Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric...
-
Upload
clara-fowler -
Category
Documents
-
view
219 -
download
0
Transcript of Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric...
![Page 1: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/1.jpg)
Alexandra Sommers
April 20, 2008
![Page 2: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/2.jpg)
Original Research Questions Can Applying Networks Centric
Operation Theory to piracy help the anti-piracy effort?Need an implementing bodyWho are the implementing bodies?
Can utilizing NCO theory help produce a security regime on the seas? And will that help reduce piracy?Who is to implement the law?If caught, what happens next?
![Page 3: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/3.jpg)
Modern Pirate Trends
Pirate attacks peaked in 2003: 445 worldwide
2006: 239 2007: 263 Economic impact from $250 million to
$16 billion
![Page 4: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/4.jpg)
Pirate Attacks 2007
![Page 5: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/5.jpg)
Literature
United NationsInternational Maritime OrganizationUN Conventions on the Laws of the Seas
(UNCOLS)
International Chamber of CommerceInternational Maritime BureauIMB yearly report on maritime piracy
![Page 6: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/6.jpg)
Literature
Catherine Raymond- Zara Jolly Roger with an Uzi Violence at Sea: Piracy in the Age of
Global Terrorism United Nations News Sources Yearly report on piracy Media Organizations
![Page 7: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/7.jpg)
Why?
Why are certain geographic areas more prone to piracy than others?
What can be done in these areas?Maritime security regime is not going to
affect unstable governmentsSecurity regime is not going to affect poor
nationsAssumption: There is less law on the sea…
would more law be helpful?
![Page 8: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/8.jpg)
Why?
Why were attacks geographically specific?
Why were specific types of attacks geographically specific?
Why was nothing being done? Why did the media only focus on
Somalia? There are pirate attacks daily across the globe?
![Page 9: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/9.jpg)
Practical Requirements to Piracy The rewards must be greater than the
risks The geographic area must be one in
which the risk of detection is minimal The geopolitical situation must allow for
safe havens where pirates can hide, seek repairs for ships, obtain supplies, and sell their looted goods
![Page 10: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/10.jpg)
New Questions!
To have piracy in a geographic area, the three conditions must be met…
Therefore, change conditions.First two are most likely to be changedHow to change these conditions?
![Page 11: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/11.jpg)
New Questions! Back to the Beginning… What is piracy? How is it defined?
Piracy as a crime as defined by international law
Piracy as a global security threat
Discourse of piracyMediaAcademiaInternational Legal OrganizationsNation-States legal code
![Page 12: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/12.jpg)
Piracy as a Crimea. “any illegal acts of violence or detention, or any act of
depredation committed for private ends by the crew or passengers of a private ship or a private aircraft, and directedi) On the high seas, against another ship or aircraft, or against
persons or property on board such ship or aircraft.ii) Against a ship, aircraft, persons or property in a place outside
the jurisdiction or any Stateb. Any act of voluntary participation in the operation of a
ship or of an aircraft with knowledge of facts making it a pirate ship or aircraft.
c. Any act inciting or of intentionally facilitating an act described in sub-paragraphs a or b.
(Article 101: United Nations Convention on the Laws of the Seas 1982)
![Page 13: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/13.jpg)
Problems
Piracy as an act committed for private ends
Crime is the jurisdiction of any State if within the 12 nautical mile zone
![Page 14: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/14.jpg)
Security Threats
Humanitarian Threats Environmental Threats Links to Terrorism
![Page 15: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/15.jpg)
Research Question
As presented above, maritime piracy can be viewed from the framework of both international crime and as a security problem. My research question is to understand further the discursive differences in these two frameworks and how the discourse of crime and security have impacted maritime policy in international law
![Page 16: Alexandra Sommers April 20, 2008. Original Research Questions Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?](https://reader036.fdocuments.net/reader036/viewer/2022062518/56649d045503460f949d7249/html5/thumbnails/16.jpg)
Method Critical Geopolitcal Lens of the
discourse of piracyInternational Maritime LawInternational Maritime PolicyInternational Maritime Court CasesStudy of the Language of these casesCase studies of pirate attacks (from a
complied database of pirate attacks) to prove that the definition of piracy needs to be changed because of the new nature of piracy