Piracy

3269 WordsOct 28, 201414 Pages
COMM 340 (03) Team #6 PIRACY: AVOIDING ATTACKS AND MINIMIZING THE IMPACTS Brock Josuttes 11094753 Nathan Keck 11123768 Josh MacGowan 11108277 Brittany Saunders 11099828 Brenley Schaan 11142699 PIRACY: AVOIDING ATTACKS AND MINIMIZING THE IMPACTS 2 TABLE OF CONTENTS Introduction .......................................................................................................................3 Anticipation .......................................................................................................................3 Location Risk ....................................................................................................................4 Northern and Western Indian…show more content…
The target of a seaboard attack is to capture a marine vessel, steal the cargo aboard and take for an end result of a profit. A recent joint study by the International Criminal Police Organization, United Nations Office on Drugs and Crime and the World Bank says that from 2005 until the end of 2012, 179 ships were successfully hijacked off the Horn of Africa, primarily off the coast of Somalia. (Poulton, 2013) With the number of attacks rising, companies that are offering security positions to protect their goods and services travelling overseas are increasing in a parallel motion. The objective of this document is to provide further details regarding the factors of anticipating pirate attacks including location and economic risks of shipping overseas in highly active geographic regions, strategies to prevent the damages and losses, alternative ideas other than researched facts and our recommendations involving all topics above. ANTICIPATION In order to anticipate the risk of piracy attacks, companies must take a multi-faceted research based approach. The keys to effectively anticipating a piracy attack include variables such as: 1. The type of goods being transported and 2. The location risk of the shipments. A major key factor that companies must evaluate is the location risk, as certain locations account for nearly all of the piracy attacks that occur globally. For example, Somalian piracy is unique in
Open Document