Uncovering the Linkages in Maritime Piracy Networks: Developmental Dynamics and Visualization of Network Data Dinorah Frutos, Thanarerk Thanakijsombat,

Slides:



Advertisements
Similar presentations
Seminar on Measures to Enhance Maritime Security Brussels, Nov 2009 Threats to Maritime Security Robert Beckman Director, Center for International.
Advertisements

Transport EU Maritime Security Policy and legislation Christian DUPONT Deputy Head of Unit for Maritime & Land Transport Security DG Mobility and Transport.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
MARITIME SECURITY IN THE MALACCA STRAITS: An Overview of the Challenges Catherine Zara Raymond.
Piracy in African waters: Maritime Zones and Industries at risk Prof Henri Fouché University of South Africa Camprosa 8-11 November 2011.
SAFETY AND SECURITY IN THE MALACCA AND SINGAPORE STRAITS Sam Bateman (Maritime Security Programme, Institute of Defence and Strategic Studies, Singapore)
A GLOBAL NETWORK of random sources shows deviations linked with events that affect millions of people. The results challenge common ideas about.
WELCOME The U.S. Industrial College of the Armed Forces Minerva Alfonso UK Regional Manager London, 3 May 2007.
Thwarting Successful Piracy Arielle Carchidi Department of Maritime Administration, Texas A&M University at Galveston Advisor: Dr. Joan Mileski Undergraduate.
Chapter 13: Inference for Distributions of Categorical Data
The Effect of Maritime Piracy on Greek Shipping Samiotis George, Psarrou Vasileia, Pazarzis Michael and Tselentis Vasilis Dept. Maritime Studies, University.
Alexandra Sommers April 20, Original Research Questions  Can Applying Networks Centric Operation Theory to piracy help the anti- piracy effort?
Dr. Brandon C. Prins Department of Political Science University of Tennessee-Knoxville The Continuing Threat of Maritime Piracy in Sub-Saharan Africa Funding.
Correlation and Autocorrelation
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Basic Research Methodologies
Basic Research Methodologies Psych 231: Research Methods in Psychology.
Maritime Piracy Event & Location Data Project Brandon C. Prins – Department of Political Science & Howard Baker Center for Public Policy, University of.
Scientific Knowledge and Technological Advance
Latin American Panel October 2009 Vina Del Mar, Chile Peter M. Swift.
Leading the way; making a difference Latin American Panel October 31, 2012 UPDATE ON PIRACY Joseph Angelo Deputy Managing Director.
Objective Vulnerability Assessment Risks for Unauthorized Disclosure of Patient Information Farrokh Alemi, PhD.
Modern Maritime Piracy: Countermeasures and Preventive Actions by the Greek Shipping Industry K.Giziakis, K. Bountri Department of Maritime Studies University.
10 IMSC, August 2007, Beijing Page 1 Consistency of observed trends in northern Europe with regional climate change projections Jonas Bhend 1 and.
Correlation.
Crime at Sea and Human Insecurity in Southeast Asia (2)
Violence against aid workers and the operational response Humanitarian Outcomes Presentation for ICVA: 1 February 2010.
Alfons Guinier - ECSA V ILLA P IGNATELLI, N APLES M ONDAY, 8 TH O CTOBER 2012 SHIPPING AND THE LAW IN THE RECENT AND CURRENT MARKETS PIRACY.
Passive Investors and Managed Money in Commodity Futures Part 2: Liquidity Prepared for: The CME Group Prepared by: October, 2008.
The Use of Funnel Plots & Multi- Year Cumulative Data to Track Hospital Performance Herbert MA, Hamman BH, Roper KL, Ring WS, Edgerton JR, Texas Quality.
The crew of the hijacked Ukrainian merchant vessel MV Faina stand on the deck, under the watch of armed Somali pirates on November 9 after a US Navy request.
Instrumentation (cont.) February 28 Note: Measurement Plan Due Next Week.
Latin American Panel September, 2010 Lima, Perú PIRACY Peter M. Swift.
Somali Pirates. What is Piracy the act of robbery or criminal violence at sea. This can include acts committed on land, air, or major bodies of water.
Group Quantitative Designs First, let us consider how one chooses a design. There is no easy formula for choice of design. The choice of a design should.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Security Monitoring Model and Network for Regional Supply Chain with a particular focus on food security Kevin Lu P.R. China 33rd APEC Transportation Working.
Copyright of Shell International Ltd MARITIME SECURITY, THE CHALLENGES AND EXPECTATIONS OF THE PRIVATE SECTOR Presentation to Egmont – Royal Institute.
Piracy Simon Bennett Secretary, International Chamber of Shipping
Forensic Victimology 2nd Edition Chapter Twelve: Workplace Violence.
Marketing Research Aaker, Kumar, Day and Leone Tenth Edition Instructor’s Presentation Slides 1.
Hypothesis Testing An understanding of the method of hypothesis testing is essential for understanding how both the natural and social sciences advance.
Non-Experimental designs
So, what’s the “point” to all of this?….
Final Project : 460 VALLEY CRIMES. Chontanat Suwan Geography 460 : Spatial Analysis Prof. Steven Graves, Ph.D.
1 Fourth IAP Meeting February ° Extreme Event: Winter US Tornado Outbreak --- Attribution challenge °2007 US Annual Precipitation Extremes ---
Cryptography and Network Security Sixth Edition by William Stallings.
Gulf of Aden – Somalia attacks on shipping MV FAINA – 25 Sep 2008 Indian Ocean, 200nms off Somali coast military cargo on board 21 Crew, 3 pirate boats.
Spatial Smoothing and Multiple Comparisons Correction for Dummies Alexa Morcom, Matthew Brett Acknowledgements.
STATISTICS STATISTICS Numerical data. How Do We Make Sense of the Data? descriptively Researchers use statistics for two major purposes: (1) descriptively.
Discuss how researchers analyze data obtained in observational research.
Sea Piracy: A South African Perspective Henri Fouche UNISA Institute of Loss Adjustors 17 May 2012 Johannesburg.
WHAT IS BEING A PIRATE? Legal privateering v. illegal piracy Piracy began soon after people first used water to carry trade goods from one place to another.
1 PIRACY IN TANZANIA : T O P I C. 2 GROUP Background of the problem and historic overview. 2. The Dilemma of Piracy in Tanzania. 3. Analysis of.
1 Current International Efforts to Combat Maritme Piracy.
Stephanie Godfrey, Andrew Sih, C. Michael Bull
Maritime Security as an Integral Part of an
GIS use in Tracking Pirate Activity
Maritime Piracy TaskForce
Making Use of Associations Tests
PIRACY IN THE MALACCA & SINGAPORE STRAITS
NPHS 1510 Federal and International
The Global Consciousness Project
Wingnuts, Cones and Forks
Chapter 13: Inference for Distributions of Categorical Data
Gathering and Organizing Data
Volume 19, Issue 5, Pages (May 2017)
Non-Experimental designs
Presentation transcript:

Uncovering the Linkages in Maritime Piracy Networks: Developmental Dynamics and Visualization of Network Data Dinorah Frutos, Thanarerk Thanakijsombat, Philip V. Fellman, & Pard Teekasap Southern New Hampshire University International Business Modeling Laboratory

Nature and Severity of the Threat Pirate Attacks are Largely Confined to 4 Major Areas

Piracy is Increasing In 2009, maritime piracy reached its highest level since the IMB's Piracy Reporting Center began tracking piracy incidents in 1992, surpassing levels from 2008, which was the previous record year. Of the forty-nine successful hijackings in 2008, forty-two occurred off the coast of Somalia, including the capture of an oil supertanker, the Sirius Star.highest level In 2009, that number rose to forty-seven, despite reduced global shipping and a multi-country naval military force aimed at stemming piracy in the region. Overall attacks off the coast of Somalia represented about half of all maritime piracy globally according to the IMB. Though Somalia gets the lion's share of attention on global piracy, the IMB says incidents off the coast of Nigeria, which largely involve robberies rather than hijackings, were more likely to include violence against the crew than anywhere else in the world in In other areas of the world, including Indonesia, piracy dropped.half of all maritime piracymore likely to include violence

Historical Attacks on Vessels Underway

Attack Detail

Methodology: Initial Approach - Social Network Analysis Data Visualization based on arrays of network nodes and vertices Differentiation between small world and random networks “Cleaning up” IMO raw data to eliminate data points below the threshold of interest. Development of a seven point ordinal scale for severity of attacks.

Total Density = Two-Mode Network: Time and Location of Maritime Piracy attacks in 1998

Two-Mode Network: Time and Location of Maritime Piracy attacks in 2003 Total Density =

Two-Mode Network: Time and Location of Maritime Piracy attacks for 2008 (October) Total Density =

Maritime Piracy Severity Index

Small World Networks: Formal Definitions (Clustering Coefficients) From Some Considerations on Six Degrees of Separation from A Theoretical Point of View Norihito Toyota arXiv.org > physics > arXiv: Norihito Toyota arXiv.orgphysics

Output of Network Analysis for the Connection Between Location and Intensity of Piracy Attacks

Output of Network Analysis for the Connection Between Location and Weapon Type Employed in Piracy Attacks

Output of Network Analysis for the Connection Between Location and Number of Pirates Engaged in the Attack

Limitations of the Study Difficult to determine whether piracy in fact connects significantly with terrorism outside a formal legal definition (Maritime Terrorism – Risk and Liability, Rand Corp. 2006) Increase In Piracy And Terrorism At Sea; Little Evidence Supports Fear That The Two Crimes Are Merging: The Maritime Dimension of International Security Terrorism, Piracy, and Challenges for the United States (Rand Corp Piracy Is Terrorism, Published: Dec December 5, 2008 AT FIRST GLANCE, THE CORRELATION BETWEEN PIRACY AND TERRORISM seems a stretch. Yet much of the basis of this skepticism can be traced to romantic and inaccurate notions about piracy. An examination of the actual history of the crime reveals startling, even astonishing, parallels to contemporary international terrorism. Viewed in its proper historical context, piracy emerges as a clear and powerful precedent.

Ideal Comparative Methodology: The Developmental Dynamics of Terrorist Organizations Aaron Clauset and Kristian Skrede Gleditsch The Santa Fe Institute This study employs open source data on frequency and severity of terrorist attacks Worldwide database of 3,143 fatal attacks Calendar Date, Severity and Name of Organization if known (341 Organizations Identified) The study quantifies the frequency and severity of a group’s attacks over its lifetime using a normalized development curve.

Terrorist Attacks – Developmental Curves for Individual Organizations: Cumulative Frequency Increases

Land-Based Terrorist Events: Expected Intensity Does Not Increase over time -- Cumulative Damage is only a product of the overall number of incidents, not of increasing severity Observed vs. Expected Severity Cumulative Severity of Events

Comparative Findings Between Patterns of Maritime Piracy and Land Based Terrorism Because we don’t have clear group identifiers as do Clauset and Gleditsch we segmented our data into the four main clusters of activity. While they observed a developmental curve in the activity of land-based terrorist organizations with respect to frequency of attacks, our analysis of the data did not find a similar curve for frequency and both groups failed to exhibit such a curve for intensity of attacks.

Intensity of Attacks (Number of Attacks) Based on Intensity of Attack Index

Somalia ( ) Cumulative Number of Attacks on Vessels Underway ∆t (days)

Malacca Straits ( ) Cumulative Number of Attacks on Vessels Underway ∆t (days)

Indonesia ( ) ∆t (days) Cumulative Number of Attacks on Vessels Underway

Nigeria ( ) Cumulative Number of Attacks on Vessels Underway ∆t (days)

Piracy Follows Seasonal Patterns However, for each region, there is a seasonality pattern based on the frequency of the attacks The following charts show the longitudinal data for the seasonal frequency of attacks for Somalia, Malacca Straits, Indonesia, and Nigeria.

Somalia

Malacca Straits

Indonesia

Nigeria

Conclusion It is difficult to make strong inferences about the behavior of piracy organizations, even using advanced tools of statistical physics similar to those used to model sunspot activity. The observed behavioral regularities still require additional research.