Feeds

Retro piracy - Should the Royal Navy kick arse?

Tackling the freebooters of the 'Gate of Tears'

Reducing security risks from open source software

Analysis As everyone knows, runaway piracy is a terrible threat. Unchecked, pirates might destroy the very business models which underpin much of our economy, bringing legitimate commerce to a halt - with devastating consequences both for those who make things and for those who use them.

That may or may not be true on the internet: but just lately, a headline featuring the word "piracy" has actually been more likely to refer to the hijacking or looting of ships at sea, as in the pre-digital era. Specifically, most of the recent coverage has been focused on modern-day freebooters operating from the lawless coast of Somalia.

Royal Marines on boarding ops in the Gulf of Aden

This is one way of chasing pirates

Just this Tuesday, in fact, Royal Marine Commandos* in seaboats got into a gunfight with the crew of a small pirate dhow which had previously attempted to seize a Danish merchantman not far away. Having been fired on by the foolhardy freebooters as they approached, the Marines killed two of the pirates and the rest surrendered smartly - but this doesn't signal the end of piracy in the area. Indeed, the following day, even as the news of the success broke, a Turkish tanker was seized in the very same waters.

Somali and Yemeni buccaneers are a particular problem for international trade as they are ideally situated to prey on traffic passing through the Bab el Mandeb ("the Gate of Tears") - the narrow strait at the southern end of the Red Sea, which carries all the traffic between the Suez Canal and the Indian Ocean. Wherever there's a maritime chokepoint like that, and a poor or lawless region nearby to act as a safe haven, you get piracy. Another well-known hotspot, for instance, is the Singapore Strait.

So the Bab-el-Mandeb has been a somewhat risky area for peaceful mariners time out of mind, and riskier still since the collapse of any effective government in Somalia. Nowadays piracy off the Somali coast is endemic, with gunmen in speedboats seizing entire ships as often as once a week - then often holding them for ransom in the infamous pirate port of Eyl. (So far there isn't all that much reselling of ships and cargoes, apparently. Ransoms are seen as simpler and more profitable.)

There's been a good deal of arm-waving about all this in the British press lately. For instance, this remarkable effort from Times columnist Libby Purves, headed: "It's time to take on the gangsters of the sea - We run down British naval power at our peril. Without it we would have little food, fuel, or goods - or safety". (Emphasis mine.)

Purves has plainly been having a chat off the record with a serving or former Royal Naval officer or two - as also seemed rather likely in the case of the recent Lloyds List piece which sought to place the blame for the Navy's failure to stamp out piracy in the region on political-correctness-gone-mad at the Foreign Office.

Maximizing your infrastructure through virtualization

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.