Somali Piracy: The Rapidly Deteriorating Security Situation In Somalia And The Threat To Us Interests

1957 words - 8 pages

The Rapidly Deteriorating Security Situation in Somalia and the Threat to US Interests
The increasing violence and continued growth of piracy off the coast of Somalia has
threatened international shipping in one of the world’s busiest shipping corridors and raised the awareness of maritime-based Islamist terrorism (Stevenson, 2010). Somali piracy threatens commercial shipping and poses a potentially significant threat to international peace and security. Pirates have threatened and seized many ships, contributing to a rise in shipping costs, insurance premiums, and impeded the delivery of food aid shipments. Controlling piracy should be an utmost priority for United States policymakers.
Somalia is slightly smaller than Texas and approximately the size of Afghanistan with a population of approximately 10 million. It is located on the coast of Africa, east of Ethiopia, bordering the Gulf of Aden and the Indian Ocean (CIA FACTBOOK, 2012). It has recurring seasonal droughts with frequent dust storms over the eastern plains in the summer. The land is flat and tends to flood during the rainy season. The population majority is uneducated and by western standards primarily poor. The main sources of income are derived from exporting livestock, hides, fish, charcoal, and bananas. The average Somali only earns approximately 600.00 American dollars per year (CIA FACTBOOK, 2012). This makes the opportunity of Piracy an extremely lucrative one.
Webster’s dictionary defines piracy as “robbery or illegal violence at sea”. Piracy off the Somali coast has threatened international shipping since the beginning of Somalia's civil war in the early 1990s. The International Maritime Bureau reported only 22 pirate attacks the entire year of 2000 off the east coast of Somalia, rising to 108 in 2008, 216 in 2009, and 218 in 2010, and 275 in 2011. As of the March 2012, 14 vessels and 199 hostages are being held directly due to Somali Pirates (IMCC, 2012). Although the number of events of Somali Pirate associated vessel hijackings appears to be declining, the impact of piracy and cost associated with it are increasing.
The Department of Transportation reported in a case study in 2010 that over 80 percent of international maritime trade moving through the Gulf of Aden is with Europe. Although European economies are currently more directly affected by the attacks, the United States is also affected by piracy. Piracy poses significant burdens on governments and the maritime industry as they take steps to protect themselves from being attacked or hijacked (DOT, nd).
For example, In February 2011, USA Today reported that four American civilian citizens were shot by pirates in the Gulf of Oman. Four U.S warships were deployed and Special Operation Soldiers attempted the evacuation of the hostages but all four were killed after an RPG attack on US vessels and small arms fire were heard. This may have been in retaliation of a court sentence from a New...

Find Another Essay On Somali Piracy: The Rapidly Deteriorating Security Situation in Somalia and the Threat to US Interests

Piracy in Somalia Essay

1223 words - 5 pages zero. In 2013, Somali Pirates failed to collect multi-million dollar ransom payouts because they were unable to hijack large, expensive, cargo-laden ships in the Gulf of Aden (Keating, 2014). Again, in the first and second quarters of 2014 there haven’t been any reports about ransom payments. Stratford Global Security Weekly cites a sharp downward trend with respect to the Piracy off the coast of Somalia. Successful hijackings have decreased

Piracy in Somalia Essay

1324 words - 5 pages . I am going to explain how the piracy in Somalia originated, moved into and has begun to negatively affect the global economy, has caused positive changes in international maritime policies and procedures, and articulate how until the internal conflicts of Somalia are resolved the international community will never see improvement along the coastline and Gulf of Aden. The recent hijackings and subsequent trials of Somali pirates have merely

Piracy in Somalia

1170 words - 5 pages Piracy in Somalia has come about due to years of internal fighting and weakened government. With the overthrow of the president in 1991, Somalia has been a complete anarchy with only the laws of rival clans who have been in power. Though long before that the country has been in constant war between the people of the country because money and food have been always been scarce. Small amounts of money have been made through some exports but the

Death and Dying in the Somali Culture

1344 words - 5 pages may come across in our personal and professional lives. The Somali population has seen a significant rise in the number of individuals that are now living in central Minnesota. Most of the Somali population is of the Islamic faith. I would like to explain some of the differences in the Islamic beliefs and traditions on death and dying, why it is important to know about the differences, and what we can do it help ensure that we do not impede on

The Deteriorating World

975 words - 4 pages countries. Mike Davis, a modern day Marxist and author of “Planet of Slums”, vividly illustrates the great disasters that humans are forced to live with on a day-to-day basis throughout the Third World. The world as we know it is very rapidly deteriorating around us, and Davis explicitly encapsulates the horrendous events taking place within the global arena. Davis begins by highlighting the negative effects of Third World urbanization (p. 14

Cloud Computing Virtualization – A Threat to Security of the System

2040 words - 9 pages security loop hole in the virtualization system is that the communication between two guests is not visible. Setting up virtual IDS and IPS can be helpful. 5. CONCLUSION Security is a core challenge in every system, whether physical or virtualized but virtualization environment is more vulnerable to attacks and no doubt that it is a threat to the entire system. There are many pros and cons of adopting virtualization and if this technology is

Understanding The Somali Culture

2409 words - 10 pages question I asked because it deviated from the research that I had obtained. In my interview I saw a few things that were unique to the situation. For example I learned that with the Ishmael family did not follow the three-name custom. Aadan and Amina did give them first names that were of great meaning but they did not give their kids the second and third names that were traditionally given to Somali children. I had to definitely elaborate on a lot

The Catalysts and Images of Terrorism: National Security Threat

3468 words - 14 pages modern terrorism has learned their lessons from the past and has adapted their techniques in order to achieve their political agenda. Dr. Robert Brathwaite, asserts, “The U.S. National Security establishment currently views terrorism as the single biggest challenge the U.S. faces” (pg. 2). Most policy makers debate over the true definition of terrorism, but many agree on a narrow set of reasons why terrorism poses such a threat. First image

How Priestely Uses the Characters in An Inspector Calls to Show Us the Social and Political Situation in England in 1912

2476 words - 10 pages How Priestely Uses the Characters in An Inspector Calls to Show Us the Social and Political Situation in England in 1912 'An Inspector Calls' is set in 1912 England. The British Empire was very wealthy, successful and powerful however things were beginning to change. J.B.Priestley wrote the play in 1940, reflecting the changes that took place to both the social and political aspects of life in 1912. The Birling household is

Piracy and the Internet

3642 words - 15 pages more machines than the license agreement authorizes. Sometimes, only one copy is purchased. As mentioned before, this does not happen as often as it has before due to the new security features built in to the software, but it is still an occurring problem, hence the creation of the Business Software Alliance (BSA). iv.The BSA: Preventing software piracy A venture among companies in the software and information technology sector, including

A Clockwork Orange compared to the Somali child soldiers

778 words - 4 pages than a fortnight, and in a way, was paid to be given the treatment. In Somalia the kids are given spiked drinks, just like Alex. It is interesting how the Somali kids don’t know that their drinks are spiked whilst Alex deliberately asks to get his milk spiked. The image from the street artist Banksy shows very clearly shows the propaganda we see through the news in Clockwork Orange the people gain their news through the newspaper, the news in the

Similar Essays

Security Interests Of Us Essay

597 words - 3 pages means to reduce the debt load when times are good. This leads to a continued cycle of increased debt over the years the eventually drains the ability of the consumer to borrow money for investment due to fears of a government default, further reducing economic stability . The increasing debt of the US Government is comparable to other failed economies in Greece and Ireland and is the greatest threat to the national interests. The growing debt

Online Piracy: Threat To The Entertainment And Software Business

1597 words - 7 pages Online piracy is being a threat to the business of the music, movie, and software industries. From (n.d.), the definition of piracy is the unauthorized reproduction or use of a copyrighted book, recording, television program, patented invention, trademarked product. The focus of this paper is in the music, software, and e-book industries. Importance of Online Piracy to the Field of International Management The problem with online

The Hybridization Of Security Sector Governance To Peace And State Building In Somalia

2946 words - 12 pages policy choices. The final section provides a conclusions and possible approaches to address the security situation in Somalia. The Somalia Context The accumulation of warlords, Islamist militias and terrorist groups is clearly a threat to domestic stability, regional and global security. After numerous failed attempts of political dialogues, the Transitional Federal Government [TFG] came into existence in 2004. Nevertheless, due to the weak

Cyber Security And The Threat To National Security

1974 words - 8 pages and economic disruption”. (15) These admissions, especially the one of the Defense Department, clearly admit an awareness of a cyberculture threat and the need to take immediate counteractive measures that are critical to maintain our national security. Cyberculture and the inherent threats of cyber-attacks that it presents has also invaded our national institution, the U.S. Chamber of Commerce. A presentation in the U.S. House of