The piracy and armed robbery (PAR) situation in the Straits of Malacca and Singapore (SOMS) was reportedly under control from 2017 to 2018. The Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in Asia (ReCAAP) Information Sharing Centre (ISC) recorded eight cases in 2018 compared to nine cases in 2017.[i] ReCAAP ISC attributed the improvement to the counter-piracy measures by the shipping industry and law enforcement agencies. Similarly, the International Maritime Bureau (IMB), in its 2018 annual report, cited the same measures to explain the improvement in SOMS.
However, recent cases suggest that the PAR situation in SOMS, especially along the Singapore Strait, is not under control. ReCAAP in January 2020 reported that there is a significant increase in cases since October 2019.[ii] From January to May 2021, the 15 cases that occurred along the Singapore Strait accounted more than 50% of cases in Asia (28 cases).[iii] In July 2021, the IMB highlighted the Singapore Strait as an area of concern.[iv] The perpetrators remain at large, and there are concerns that the prolonged COVID-19 pandemic affects economies of coastal communities, hence creating conditions for PAR to thrive.[v]
Figure 1: Map of the Straits of Malacca and Singapore
Source: Maritime Port Authority of Singapore
Why is PAR a persistent problem in SOMS? This paper examines the issue by providing a historical appreciation of SOMS and interrogating why the notion of “control” is problematic. It implies causation between counter-piracy measures and the underlying structural causes of PAR. Instead, the problem waxes and wane as a function of counter-piracy measures on the one hand and pull and push factors of the PAR business on the other hand.
A WATERWAY OF GLOBAL IMPORTANCE
SOMS is a crucial waterway in Southeast Asia (SEA) that serves as a “global shipping superhighway” and accounts for “a third of the world’s marine commerce.”[vi] The 16th-century Portuguese voyager Tome Pines recorded the historical importance of SOMS to global trade during the early age of European colonialism in his book “The Suma Oriental.” He wrote that “whoever is lord of Malacca has his hand on the throat of Venice.” In modern times, former Chinese president Hu Jintao in 2003 recognised the strategic importance of SOMS – “Malacca Dilemma” – to the economic growth of China.[vii]
Figure 2: Map illustrates a higher level of maritime activities in SOM vis-à-vis SEA
Source: live map from www.marinetraffice.com
PAR in SOMS is a maritime security concern for Singapore, given its plans to boost its economy. Singapore’s Tuas Mega Port is scheduled to be ready in 2040. Furthermore, a bustling maritime zone could inadvertently make SOMS a target-rich environment.[viii] An increase in shipping activities could create more opportunities for PAR.[ix] PAR in SOMS is also a concern to the Iskandar Development Region in Southern Johor, Malaysia, where the Port of Tanjung Pelepas and Johor Port are central to the region’s expansion. For the Riau Islands, Indonesia, shipping is crucial to the province’s free trade zone (FTZ).
PAR is SOMS could have wider implications for the region. The possible nexus between sea piracy and maritime terrorism is one of the primary maritime security issues for Singapore and other littoral states in Southeast Asia. The former President of Singapore, Dr Tony Tan Keng Yam, mentioned this point during his speech in 2004 when he was the Deputy Prime Minister and Coordinating Minister for Security and Defence.[x]
Figure 3: Map illustrates the high level of maritime activities in the Singapore Strait and near the Riau Islands province in which Batam is a known pirate hotspot
Source: live map from www.marinetraffice.com
HISTORY INDICATES ENDURING UNDERLYING CAUSES
Historical records show that PAR has been a maritime security problem in SOMS since the 14th century when seaborne trade increased. Given the situation, the Ming Dynasty despatched the famous Admiral Zheng He to battle the pirates.[xi] The historical trend up to the mid-2000s in which coastal states had to implement a raft of counter-piracy measures such as the Malacca Straits Patrol (MSP) indicates that PAR in SOMS is endemic.
Most of the cases in SOMS from 2017 to 2018 occurred along the Singapore Strait, and this pattern continues into 2021.[xii] From January to April 2021, the 12 cases that happened along the Singapore Strait accounted for 50% of cases in Asia.[xiii] These cases correspond to the geographical trend over the past decade. Pirates have been shifting more activities from the Malacca Strait to the Singapore Strait and nearby South China Sea (SCS) instead of relinquishing a life of crime.[xiv]
PAR activities could shift to areas, which the pirates perceive as having lesser counter-piracy patrols. Whenever cases were low, it is possible that pirate activities were still ongoing but below a certain threshold of violence and economic loss. This strategy could help pirates circumvent counter-piracy measures. Anthropological factors such as the “generational shift among the pirates” and the state of the relationship between pirates and criminal syndicates may also partially explain the geographical shift in PAR activities.[xv]
In sum, PAR is “immensely adaptive to changing situations”, and any “control” that counter-piracy measures have is temporary in the long run.[xvi] Conventional security/naval measures in counter-piracy have more impact on the symptoms or tactical aspects than the underlying structural causes that make PAR endemic.
LIMITATIONS OF CASE STATISTICS
Statistics are often used to demonstrate whether the PAR situation is under control or not, but this method has its limitations. Cases may either be over-reported or under-reported.[xvii]
Cases may be under-reported among the shipping communities because the victims are concerned that investigations could disrupt the ship’s schedule and commercial reputation, raising insurance premiums. Victims may not be overly worried if the economic loss is low, and the business could absorb it. The crew are generally unharmed as the pirates used minimal violence to avoid the attention of maritime security agencies. Some victims may not report cases to avoid the attention of governments if their ships are involved in unlawful activities. The activities include forced labour, smuggling, illegal, unreported and unregulated (IUU) fishing.
Victims from coastal communities who operate small fishing and trading boats may not report cases if they distrust local authorities. Some local authorities could be complicit in PAR activities or lack enforcement capabilities. Also, they fear retaliation as the pirates may come from nearby communities or the same islands such as Riau and have links to criminal groups on land. According to the IMB, statistics rarely capture cases involving fishing boats.[xviii] Therefore, while official statistics may paint the picture that the PAR situation is under control, the reality on the ground may be different.
Cases may also be over-reported due to possible insurance fraud or victims reporting more petty thefts and failed PAR attempts.[xix] These cases could have gone unreported in the past to avoid the hassle of making reports. Furthermore, some victims may be more likely to report cases when their awareness of reporting channels is higher following maritime security organisations’ publicity campaigns.
In sum, statistical analysis may not always reflect the actual magnitude of the situation and how it affects different sections of the diverse maritime world – shipping and coastal communities. The situation may be under control for the shipping communities. However, the threat level for coastal communities may continue to be on the high side.
INSIGHTS FROM CASE PATTERNS
Scrutinising patterns in PAR cases instead of statistics only could provide a better situational assessment in terms of economic loss, level of violence used, the profile of pirates, types of ships targeted, who are the owners of the ships, whether the targeted ships were underway or at anchorages, time of the incident, etc. PAR cases should also be analysed alongside other maritime crimes. The overall maritime crime situation may continue to be of concern even if the PAR situation appears to be statistically under control.
Fewer PAR cases may not mean an improvement if perpetrators shift from petty thefts (ReCAAP CAT4 incident) to incidents that involve more violence and economic loss (ReCAAP CAT3 incident). In such a scenario, the pirates are less opportunistic but more organised in target selection, material and other backend support. Instead of the situation under control, the PAR network (e.g. better pirate leaders and recruiters, support from corrupt officials, ready buyers for stolen cargo, etc.) is evolving, therefore, enabling pirates to shift to higher risk but higher reward activities. Counter-piracy measures such as the Malacca Straits Sea Patrol (MSSP) would be insufficient as they could only “control” PAR at sea but not the chain of illicit activities on land that makes the crime possible.[xx] Maritime security agencies should always bear in mind that “all maritime piracy begins and ends on land.”[xxi]
In SOMS, data analytics by ReCAAP suggest that the trend of PAR cases is consistent over the past decade in terms of economic loss and level of violence.[xxii] However, more cases are happening at the Singapore Strait. Several factors may explain this geographic shift. Firstly, the counter-piracy measures along the Malacca Strait may be forcing pirates to “change jobs” to other maritime crimes and shift their operations to the Singapore Strait. Secondly, pirates may be adjusting their strategies to capitalise on better criminal opportunities arising from the growing shipping traffic at the Singapore Strait. Thirdly, it is plausible that more Indonesians in the Riau Islands resort to crime as the province’s economy, particularly Batam, has declined over the past few years and resulted in empty shipyards and rising unemployment.[xxiii]
In this regard, a ReCAAP report stated that the arrests of pirates in 2018 included two masterminds in Batam, a known “pirate haven.”[xxiv] Research unveiled that some Indonesians in the Riau Islands who work as fishermen, boat operators or migrated to Batam from other parts of Indonesia might resort to PAR when in financial desperation.[xxv] Indeed, one measure of whether PAR is under control is to examine if PAR “is still viable for traditional maritime peoples” when “in times of economic hardship.”[xxvi]
Fewer PAR cases may also not mean a real improvement if circumstances make it less risky or more lucrative for pirates and potential pirates to participate in other maritime crimes such as smuggling, IUU fishing and illegal migration. For example, the eight recorded cases in SOMS in 2010 created the perception that PAR there was under control. However, research unveiled that other criminal activities in SOMS “continued unencumbered.”[xxvii]
The number of PAR cases in SOMS for 2016 to 2018 is lower compared to the period of 2011 to 2015. However, the United Nations Office of Drugs and Crime (UNODC) in 2018 reported that the Malacca Strait continues to be a regular human smuggling route for Indonesians travelling illegally to Malaysia.[xxviii] Furthermore, Indonesian and Malaysian authorities reported a shift in the “pattern of drug smuggling” in SEA, given a “high number of drug smuggling attempts” thwarted at the Malaccan Strait.[xxix] Local smugglers are believed to be involved in the short legs of the smuggling operations. As circumstances change, these smugglers may shift or revert to PAR to maintain their earnings with ease as PAR, and other maritime crimes require the same skillsets and tools.
In sum, fewer PAR cases may not be due to the situation being under control but suggests a plausible interaction with other illicit activities at sea.[xxx] PAR statistics are unable to show how pirates are adapting their strategies to “operate within the layers of international policing and surveillance strategies.”[xxxi]
PIRATES’ INFLUENCE OVER PAR SITUATION
The notion that counter-piracy measures could categorically “control” the PAR situation is problematic. It overlooks the fact that the underlying causes of the persistence of PAR have social, economic, environmental and political roots, which such measures have limited control over.[xxxii] The endemic nature of PAR in SOMS suggests that these underlying causes sustain the pirates’ strategies in the maritime world.
The pirates may be “business as usual” despite existing counter-piracy measures as they could adapt their strategies to stay ahead of challenges to their trade. Furthermore, maritime security agencies have to restrict counter-piracy measures due to sovereignty concerns of coastal states. For example, naval patrols remain coordinated instead of joint, leaving gaps at seas, particularly areas where maritime boundaries are unclear, which pirates could exploit to escape hot pursuit. Geopolitical issues create a trust deficit that prevents coastal states from progressing from strategic cooperation (e.g. “talk shops” and capacity building) to substantive operational cooperation among themselves and with other maritime states such as the United States and Japan.[xxxiii] Intelligence sharing may not be optimal as countries such as Indonesia fear that it could reveal “blind spots in intelligence gathering” and that ports in Singapore and Malaysia would benefit disproportionately from Indonesia’s monitoring of shipping lanes.[xxxiv]
Pirates, however, do not frame their activities according to territorial boundaries and the associated restrictions to operations. Instead, they frame their activities according to “targets, objectives and outcomes”, which influence their modus operandi.[xxxv] Research shows that there are three types of PAR from the perspective of pirates who operate in SOMS.
Firstly, “shopping” is a form of simple, opportunistic or hit-and-run case. Pirates would watch the waterways of SOMS from their villages and strike when they feel that the time, target (ship) and environmental conditions are right. Cases of “shopping” may evade detection, and pirate gangs may elude enforcement actions due to several reasons. Pirate gangs could have bribed the local authorities to “look the other way.” The pirates may gain the acquiescence of the coastal communities by portraying themselves as “Robin Hood” and channelling some of the criminal gains to local needs. These local needs include maintaining village mosques, helping locals with medical costs and even donations to political campaigns. Pirates may also dissuade their victims (e.g. ship’s crew) from reporting the cases to the local authorities. They would limit their use of force as long as the victims do not put up a fight. These reasons suggest that pirates do have some control of the PAR situation by sustaining the sentiments among coastal communities that PAR is “culturally thinkable.” Also, the pirates appear to maintain some tacit agreement with victims. The latter would not resist and report cases to the authorities as long as the former limits the use of force and economic loss.[xxxvi]
Secondly, “black business” is a form of professional theft that typically involves the illicit ship-to-ship transfer of fuel or products and the involvement of insiders. This theft is less risky as compared to “shopping” and more likely to evade counter-piracy measures. The lucrative nature of this crime stems from pirates having the resources and connections to bribe local authorities into reducing patrols in the areas that “black business’ activities happen. “Black business” is possible as pirates work with the “networks of corruption on land as well as at sea” and the transnational network of criminal syndicates. These syndicates facilitate the planning and preparation of PAR activities and disposal of stolen fuel and products.[xxxvii]
Pirates could gain the cooperation of insiders – such as crewmembers – in exchange for money because the “Open Register” in the flag state regime is lacking in terms of enforcing “welfare, training and payment of seafarers.”[xxxviii] Furthermore, the lack of training also begs the question of whether the International Ship and Port facility code (ISPS) has “degenerated into a box-ticking exercise” for some ships and particularly on the code’s requirement for “training drills and exercise on ship security.”[xxxix]
“Black business” is a good PAR model. Although the economic loss is higher than “shopping”, violence is unnecessary. The economic loss is within the “margins of error” in product quantities that companies would write off typically as part of the standard accounting process. These reasons mean that “black business” is essentially under-reported and create the impression that local authorities are categorically in control of the situation.[xl] There were arrests of pirates involved in “black business”, but they could also influence the situation by moderating their activities when prices of fuel and commodities are low.[xli]
Thirdly, “perompakan/bajak laut” is a form of PAR that is more violent and resembles the typical imagery of a pirate attack. It involves either the temporary hijacking of a ship to steal its fuel and cargo or the permanent hijacking of a ship to transform it into a phantom ship. The surge in “perompakan/bajak laut” cases in the early 2000s resulted in the implementation of various counter-piracy measures such as Operation MALSINDO.[xlii] Given the risks of interdiction, pirates who wish to continue with their criminal profession, either full time or to supplement their day jobs, have possibly shifted to less risky forms of PAR – “shopping” and “black business.” “Perompakan/bajak laut” could nevertheless increase if there is increasing competition among pirates for targets for “shopping” and “black business.”
However, it is in the interest of the pirate community to keep “perompakan/bajak laut” cases low. This form of PAR is extremely high risk and less sustainable than “shopping” and “black business.” According to some pirates operating in SOMS, PAR activities that are too aggressive and similar to the “Somali business model” are “bad for business.” They attract too much attention from local authorities of coastal states and security forces of maritime states.[xliii] Pirates may also try to evade attention when committing “perompakan/bajak laut” by targeting ships, which are involved in illicit activities and, in particular, “black business.” This scenario is possible if accomplices whom the pirates engage to provide “security overwatch” for “black business” are also involved in providing similar services for “perompakan/bajak laut.”[xliv] Essentially, pirates have their sources of intelligence from within the criminal fraternity.
While maritime security agencies use counter-piracy measures to control the PAR situation, pirates also seek to influence the situation. They would want to ensure that the environment remains favourable for the piracy business in the long run. In terms of strategic thinking, pirates perceive counter-piracy measures as operational obstacles. They seek to overcome the obstacles by adjusting internal factors such as their “targets, objectives and outcomes” and adapting to external, pull and push factors such as economic conditions and commodity prices.
In sum, while statistics may suggest that PAR is under control, it may be “business as usual” for the pirates, as research has suggested. This scenario stems from the possibility that pirates continue to remain active in sea-related illicit activities – which counter-piracy measures may not address – to maintain some influence in the shipping and coastal communities.
Media reports often cite counter-piracy measures such as coordinated patrols as the reason for fewer PAR cases in SOMS. Statistics that show fewer PAR cases are usually the primary indicator for the effectiveness of these measures in controlling the situation. However, the reality is that PAR is a persistent problem in SOMS.
The reliance on statistics only can be problematic as it overlooks historical trends and qualitative aspects such as patterns in cases. Furthermore, the “control” of the PAR situation, like a coin, has two sides. On the one side, counter-piracy measures address the symptoms and tactical aspects rather than the underlying causes of PAR. On the other side, these enduring underlying causes sustain the pirates’ strategies in the maritime world. Economic hardships resulting from prolonged COVID-19 pandemic could aggravate these underlying structural causes.[xlv]
To conclude, the PAR situation in SOMS is complex. It entails the interplay between conventional security (symptoms and tactical aspects) and human security (underlying structural causes) factors. The persistence of PAR in SOMS is both a function of counter-piracy measures and the substitution of PAR with viable cultural and economic alternatives for coastal communities in the Riau Islands and along SOMS.
[i] Lim Min Zhang, “Less piracy, armed robbery in Asia waters but vigilance still key.” The Straits Times, January 17, 2019. https://www.straitstimes.com/singapore/less-piracy-armed-robbery-in-asia-waters-but-vigilance-still-key
[ii] ReCAAP, “Monthly Report: Piracy and Armed Robbery against Ships in Asia,” Regional Cooperation Agreement on Combating Piracy and Armed Robbery, January 2020, https://www.recaap.org/resources/ck/files/reports/monthly/2021/ReCAAP%20ISC%20May%202021%20Report.pdf, pp. 8 -11
[iii] ReCAAP, “Monthly Report: Piracy and Armed Robbery against Ships in Asia,” Regional Cooperation Agreement on Combating Piracy and Armed Robbery, May 2021, https://www.recaap.org/resources/ck/files/reports/monthly/2021/ReCAAP%20ISC%20Report%20for%20April%202021.pdf, pp. 9 – 12
[iv] Dale Wainwright, “Piracy at ’27-year low’ but risk remains, warns IMB,” TradeWinds, July 13, 2021, https://www.tradewindsnews.com/casualties/piracy-at-27-year-low-but-risk-remains-warns-imb/2-1-1039215
[v] Ian Storey, “Will Covid-19 Trigger a Tsunami of Maritime Crime in Southeast Asia?” Fulcrum, August 06, 2020, https://www.iseas.edu.sg/media/commentaries/will-covid-19-trigger-a-tsunami-of-maritime-crime-in-southeast-asia/
[vi] Adam McCauley, “The Most Dangerous Waters in the World.” TIME, September 22, 2014. http://time.com/piracy-southeast-asia-malacca-strait/
[vii] Malcolm Davis, “China’s ‘Malacca Dilemma’ and the future of the PLA.” Asia Dialogue, November 21, 2014. http://theasiadialogue.com/2014/11/21/chinas-malacca-dilemma-and-the-future-of-the-pla/
[viii] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, p. 123
[ix] Bruce A. Ellermen, Andrew Forbes and David Rosenberg, Piracy and Maritime Crime: Historical and Modern Case Studies. Newport: Naval War College, 2011, p. 81
[x] “Speech by Dr Tony Tan Keng Yam, Deputy Prime Minister and Co-ordinating Minister for Security and Defence at the 2004 IDSS Maritime Security Conference held on Thursday, 20 May 2004 at 9.00 am at Marina Mandarin Hotel,” MCI Singapore, May 20, 2004
[xi] Graham Gerard Ong-Webb, Piracy, Maritime Terrorism, and Securing the Malaccan Straits. Singapore: ISEAS Publishing, 2006, p. 225
[xii] ReCAAP, “ReCAAP ISC Weekly Report: 5-11 Mar 19.” ReCAAP Information Sharing Centre, March 11, 2019. http://www.recaap.org/resources/ck/files/reports/weekly/2019/ReCAAP%20ISC%20Weekly%20Report%20(5-11%20Mar%2019).pdf
[xiii] ReCAAP, “Monthly Report: Piracy and Armed Robbery against Ships in Asia,” Regional Cooperation Agreement on Combating Piracy and Armed Robbery, April 2021, pp. 9 – 12, https://www.recaap.org/resources/ck/files/reports/monthly/2021/ReCAAP%20ISC%20Report%20for%20April%202021.pdf
[xiv] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, p. 12
[xv] Stefan Eklof, Pirates in Paradise: A Modern History of Southeast Asia’s Maritime Marauders. Copenhagen: NIAS Press, 2006, p. 51
[xvi] Derek Johnson and Mark Valencia (Eds.), Piracy in Southeast Asia: Status, Issues and Responses. Singapore: ISEAS Publications, 2005, p. 24
[xvii] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, pp. 16 – 18
[xviii] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, p. 2
[xix] Euan Graham, “Syphoning Confidence: Piracy and Fuel Theft in Southeast Asia.” RSIS Commentary, November 18, 2014. https://www.rsis.edu.sg/wp-content/uploads/2014/11/CO14227.pdf
[xx] Karsten Von Hoesslin, “The Economics of Piracy in Southeast Asia.” Global Initiative against Transnational Organized Crime, May 2016, p. 21
[xxi] Bruce A Ellermen, Andrew Forbes and David Rosenberg, Piracy and Maritime Crime: Historical and Modern Case Studies. Newport: Naval War College, 2011, p. 81
[xxii] ReCAAP. (2018). “Annual Report 2018: Piracy and Armed Robbery Against Ships in Asia.” ReCAAP Information Sharing Centre, December 31, 2018. http://www.recaap.org/resources/ck/files/reports/annual/ReCAAP%20ISC%20Annual%20Report%202018.pdf, pp. 50 -55
[xxiii] Francis E. Hutchison and Siwage D. Negara, “Batam’s Emerging Digital Economy: Prospects and Challenges.” ISEAS Yusof Ishak, April 10, 2019. https://www.iseas.edu.sg/images/pdf/ISEAS_Perspective_2019_25.pdf, p. 3
[xxiv] Eric Frecon, “Beyond the Sea: Fighting Piracy in Southeast Asia.” RSIS Commentary, December 21, 2009. https://www.rsis.edu.sg/rsis-publication/rsis/co09128-beyond-the-sea-fighting-piracy-in-southeast-asia/#.YMgYDvLivIU
[xxv] Eric Frecon, “Pirates with black magic attack shipping in Indonesian waters.” The Conversation, April 27, 2018. http://theconversation.com/pirates-with-black-magic-attack-shipping-in-indonesian-waters-94106
[xxvi] Bruce A Ellermen, Andrew Forbes and David Rosenberg, Piracy and Maritime Crime: Historical and Modern Case Studies. Newport: Naval War College, 2011, p. 82
[xxvii] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, p.122
[xxviii] UNODC, “Global Study on Smuggling of Migrants 2018.” United Nations Office on Drugs and Crime, June 2018. https://www.unodc.org/documents/data-and-analysis/glosom/GLOSOM_2018_web_small.pdf, p.127
[xxix] Apriadi Gunawan, “Malacca Strait remains prone to transnational crimes.” The Jakarta Post, December 05, 2018. https://www.thejakartapost.com/seasia/2018/12/05/malacca-strait-remains-prone-to-transnational-crimes.html
[xxx] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, p.169
[xxxi] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, p.122
[xxxii] Derek Johnson and Mark Valencia (Eds.), Piracy in Southeast Asia: Status, Issues and Responses. Singapore: ISEAS Publications, 2005, pp. 25 and 126
[xxxiii] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, pp. 170 – 171
[xxxiv] Karsten Von Hoesslin, “The Economics of Piracy in Southeast Asia.” Global Initiative against Transnational Organized Crime, May 2016, p. 20
[xxxv] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, p. 124
[xxxvi] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, pp. 124 – 126
[xxxvii] Karsten Von Hoesslin, “The Economics of Piracy in Southeast Asia.” Global Initiative against Transnational Organized Crime, May 2016, pp. 11, 15 and 21
[xxxviii] Carolin Liss, “The Roots of Piracy in Southeast Asia”, Nautilus Institute, October 22, 2007. https://nautilus.org/apsnet/the-roots-of-piracy-in-southeast-asia/, p. 5
[xxxix] Derek Johnson and Mark Valencia (Eds.), Piracy in Southeast Asia: Status, Issues and Responses. Singapore: ISEAS Publications, 2005, p. 37
[xl] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, pp. 126, 127 and 169
[xli] Karsten Von Hoesslin, “The Economics of Piracy in Southeast Asia.” Global Initiative against Transnational Organized Crime, May 2016, pp. 20 – 21
[xlii] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, p. 128
[xliii] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, p. 124
[xliv] Liss and Biggs (Eds.), Piracy in Southeast Asia: Trends, Hot Spots and Responses. New York, NY: Routledge, 2017, p. 129
[xlv] CNA, “Sea robbery incidents in Singapore Strait rise again in 2020,” Channel News Asia, January 15, 2021, https://www.channelnewsasia.com/news/singapore/singapore-strait-sea-robbery-piracy-13966858
The New World Order: The conspiracy theory and the power of the Internet
“The Illuminati, a mysterious international organisation made up of the world’s top political and social elites, controls the workings of the entire world behind the scenes”. This is the world’s most famous conspiracy theory about the New World Order.
For hundreds of years, legends about the Illuminati have been spread and many people currently believe that the Illuminati still exist. It is believed that the Illuminati operate in various fields such as global politics, military affairs, finance and mass media and control the historical process of the entire world.
The ultimate goal is to establish a New World Order. Nobody can prove it, but many people believe it. This is the greatest paradox about conspiracy theories.
In the 2009 film, Angels and Demons – based on Dan Brown’s best seller of the same name about Professor Langdon, played by Tom Hanks – the story of the Illuminati, who supposedly originated in Europe during the Age of Enlightenment, was recalled. There were physicists, mathematicians and astronomers who questioned the “erroneous teachings” of the authority of the Holy See and dedicated themselves to the scientific field of the search for truth.
Eventually, the Illuminati were forced to become a clandestine organisation and have continued to recruit members for hundreds of years to this day. In Angels and Demons, the historical facts are clearly questionable, and the movie appeared after the great economic crisis of 2007-2008.
The New World Order conspiracy theory has been circulating for a long time and is full of mysterious theories that, however, convince many people who are powerless and dissatisfied with the current state of the world.
The Illuminati, who advocate the establishment of a New World Order through the planning of a series of political and financial events (the financial tsunami of 2007-2008 is said to have been planned by the Illuminati), attempt to influence the course of world history, and ultimately establish an authoritarian world government.
Supporters of the New World Order theory believe that even the powerful US government is now just a puppet government. While another “shadow government” made up of a few people makes decisions that will change the fate of the planet.
You might think that all of the above is just crackpot theories. Many people, however, believe this is true. According to a 2013 poll conducted by the Public Policy Polling Foundation, 28% of US voters believe that the New World Order is actually taking hold.
Brian L. Keeley, a professor of philosophy at Pitts College who devotes himself to the study of modern conspiracy theories, believes that an important feature of conspiracy theorists is that they cite some trivial and overlooked incidents and then propose a perfect explanation compared to an embarrassed official response. The reason why the conspiracy theory explanation can be widely disseminated is that it has no argumentation process to deny. It is just a judgement that jumps directly from hypothesis to conclusion. In the argumentation process, it is only a subjective interpretation of the event.
Nevertheless, for the public that does not fully understand the incident, the conspiracy theory provides an “explanation” for the unknown part of the said incident, and this “explanation” cannot be denied (because its very existence is not corroborated by real arguments and facts). It is therefore recognised as a valid argument by many people.
For example, no one has substantial evidence to prove that the Illuminati actually exist, but no one can prove that the Illuminati are purely fictitious. Therefore, you cannot deny their existence because their existence is “perfection without evidence”.
Columnist Martha Gill wrote in The Guardian on the subject, describing the Illuminati as the most enduring conspiracy theory organisation in world history.
“Conspiracy theories relating to the 1969 moon landing mission, the Kennedy assassination, the 9/11 attacks, etc., are all limited to a specific time and place. But conspiracy theories supporting the existence of the Illuminati can connect them. Anything about these connections, however, is difficult to prove”. In other words, the supporters of conspiracy theories may have common imagination and attribute everything to this organisation, so that every irrational phenomenon in the world can be explained.
Although no one can prove the real existence of the Illuminati, there is actually an alleged “global shadow government” in the world whose name is the Bilderberg Group. The Bilderberg Group holds an annual world-class private meeting and participants include elites from all walks of society such as government, business, media, science and technology.
Known as the “World’s Most Mysterious Conference”, the Bilderberg Group invites various famous political and economic figures to participate in its meetings every year.
Prince Bernhard van Lippe-Biesterfeld (1911-2004) held the first meeting in 1954. As the venue for the meeting was the Bilderberg Hotel in Oosterbeek, that name was used as the name of the group.
The existence of the Bilderberg Group is not a secret, but the content of the topics discussed at the Conferences is absolutely confidential and mainstream media cannot report on the content of the meetings.
The Bilderberg Group issues a press release every year to introduce the Conference participants and the outline of the topics discussed. Over the years, participants have come from many places, including Prince Philip of Edinburgh (1921-2021) of the British Royal Family, Crown Prince Charles, former British Prime Ministers, French President Macron, German Chancellor Merkel, former US Presidents Bush and Clinton, and even Bill Gates and other Internet giants. There were also Italians, as reported years ago in a newspaper of our country.
The 2018 Conference was held in Turin, Italy, in June. According to the description on the Bilderberg Group’s official website, the main topics included European populism, the development of artificial intelligence, quantum computer technology and the “post-truth” era. Obviously the actual content and results of the meeting’s discussion have never been reported.
Therefore, the Bilderberg Group has naturally become a locus where conspiracy theorists want to draw material. They describe the Bilderberg Group as true evidence of the theory that a very small number of elites controls the world, and the participants are planning a New World Order.
On the subject of strange things, let us give some examples. In June 2018, the British Royal Family was also caught up in conspiracy theories. When Prince Harry and his wife Meghan attended a show, they were caught on camera motionless, like two stiff and dull robots. Later related clips went viral on the Internet and netizens were in an uproar: many people believed that the distinguished members of the Royal Family were actually robots developed by high technology.
However, the management of the London museum, Madame Tussauds, later explained the mystery by stating that Harry and Meghan were only played by two actors who wore extremely high-realism wax masks on their faces – all to promote an exhibition of wax statues – and inadvertently caused an uproar.
In that short video, Harry and Meghan did not change their facial appearance and their expressions were stiff just like robots. Consequently, conspiracy theorists used this as evidence that they were robots secretly built by the British Royal Family.
This argument is an extension of the ‘trivial evidence’ mentioned above. The argument proponents ignore any argumentation process and directly draw the final conclusion through the above stated “trivial evidence”. This conclusion is highly topical and quite appealing. With the fast spread of the Internet, the “quick truth” will naturally be recognised and sought after by many people.
I think many people still remember the “Mandela effect” that spread wildly across the Internet in the early years as a false memory. The name “Mandela effect” is believed to have come from Fiona Broome, a self-described “paranormal consultant”, who created a website called the “Mandela effect”. Supporters of the ‘Mandela effect’ claim to “remember” that former South African President Mandela died in prison in the 1980s. But in reality, after being released from prison, Mandela served as President of South Africa from 1994 to 1999 and died in December 2013.
So why should anyone believe this seemingly absurd statement? The Internet has become a support platform for a lot of false content, fake news, as well as unreasonableness and lack of justification. When someone shared that ‘false memory’ with others on the Internet, many people believed it to be true, and even suddenly recalled having that memory: “Mandela died in prison that year”.
As a result, lies inconsistent with facts continue to spread. The lie is repeated thousands of times and many people consider it to be the truth: this learning phase is the first misleading rule on the Internet.
In the Internet era, multidimensional and multiplatform features have generated a number of online “malignancies” of conspiracy theories. Moreover, their dissemination ability is not limited to “believers” only. Since online social media provide a widespread and wide dissemination platform, one passes it onto ten people, ten spread it to a hundred, a hundred to a thousand, and so it goes on in geometric fashion, thus turning a ‘hot’ topic on the Internet into an absolute truth. Those who want to believe are naturally prepared and willing to do so. Moreover, these false opinions on the Internet may even have an impact on the real world.
For example, at the political level, everyone can now comment and participate in the online arena. For politicians to get the right to speak and set the agenda, the key is to rely on the public’s direction on the Internet. The Internet discourse has become the dominant factor of the political storytelling, and not vice versa. The characteristics of social networks are precisely the breeding ground for conspiracy theories.
The Internet is easy to spread among the public and it is exactly the breeding ground for conspiracy theories.
Nowadays, conspiracy theories are enough to influence politics and even political developments. A specific conspiracy theory gains a number of supporters through the Internet that promotes it to become a highly debated topic among the public. Consequently, it enters the real political arena coming from the virtual community and its influence can change the direction of governmental decisions.
Looking at it from another perspective, when conspiracy theories are put on the Internet and continue to proliferate – regardless of whether the Illuminati exist or not – they are enough to establish a New World Order. The real-world public opinions, as well as the composition of opinions and the basis of social discussions are changed, and thus world’s countries, politics and rulers are affected.
USA and Australia Worry About Cyber Attacks from China Amidst Pegasus Spyware
Pegasus Spyware Scandal has shaken whole India and several other countries. What will be its fallout no one knows as we know only tip of iceberg. Amidst Pegasus Spyware Scandal USA and Australia both have shown serious concerns about Cyber Attacks on US and Australian interests. Both say that China is hub of malware software and both face millions of such attacks daily.
I am trying to understand why a software is needed to spy on a particular individual when all calls, messages, data, emails are easily accessible from server. In most of cases these servers are located in USA and some cases these are located in host country. In certain sensitive cases Government Agencies have their own server like Central Intelligence Agency and hundreds of other agencies and military establishment world over including India. Now point is who installs those servers.
A couple of years back I had talked to Mr Mike Molloy who is Chief Executive Officer of Orion Global Technologies previously known as Orion SAS. He had explained me how his company installs servers in host countries on request of private or gov bodies. He talks about contract and trust. That means even when a company or Gov buys a server or software for designated uses the “Secrecy” Factor remain on discretion of company which has supplied server or software.
Now if all data, e-mail, chat, messages, calls are accessible to Gov as per law and technology (Through Server all components of Communication are accessible and thats why me and you see start seeing call recording of a person even after many years later), I am unable to understand why a Gov will be needing a software to Spy on any one.
Now coming to where Australia and USA wants to carry the whole debate.
Australian Foreign Minister Sen Marise Payne said, “Australian Government joins international partners in expressing serious concerns about malicious cyber activities by China’s Ministry of State Security.
“In consultation with our partners, the Australian Government has determined that China’s Ministry of State Security exploited vulnerabilities in the Microsoft Exchange software to affect thousands of computers and networks worldwide, including in Australia. These actions have undermined international stability and security by opening the door to a range of other actors, including cybercriminals, who continue to exploit this vulnerability for illicit gain”, She further added.
She opined, ”The Australian Government is also seriously concerned about reports from our international partners that China’s Ministry of State Security is engaging contract hackers who have carried out cyber-enabled intellectual property theft for personal gain and to provide commercial advantage to the Chinese Government”.
She warned China by saying, “Australia calls on all countries – including China – to act responsibly in cyberspace. China must adhere to the commitments it has made in the G20, and bilaterally, to refrain from cyber-enabled theft of intellectual property, trade secrets and confidential business information with the intent of obtaining competitive advantage”.
On other hand USA’s The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released a Cybersecurity Advisory on Chinese State-Sponsored Cyber Operations. National Security Advisor said, ”Chinese state-sponsored cyber activity poses a major threat to U.S. and allied systems. These actors aggressively target political, economic, military, educational, and critical infrastructure personnel and organizations to access valuable, sensitive data. These cyber operations support China’s long-term economic and military objectives”.
The information in this advisory builds on NSA’s previous release “Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities.” The NSA, CISA, and FBI recommended mitigations empower our customers to reduce the risk of Chinese malicious cyber activity, and increase the defensive posture of their critical networks.
Afghan issue can not be understood from the simplistic lens of geopolitical blocs
Authors: Tridivesh Singh Maini and Varundeep Singh*
On July 14, 2021 a terror attack was carried out in Khyber Pakhtunkhwa (KPK) province in which a number of Chinese engineers, working on the Dasu hydropower project (a project which is part of the China Pakistan Economic Corridor) were killed. The attack predictably evinced a strong response from China. The Chinese foreign minister, Wang Yi speaking before a Shanghai Cooperation Organisation (SCO) Foreign Minister’s meeting asked the Taliban to disassociate itself from ‘terrorist elements’ and in a meeting with Pakistan Foreign Minister, Shah Mehmood Qureshi, asked Pakistan to bring the perpetrators to book. Earlier in April 2021, a car bomb attack took place at Serena hotel in Quetta which was hosting China’s Ambassador to Pakistan (four people were killed and twelve were injured)
Wang Yi significantly praised the Ashraf Ghani government, for its attempts towards building national unity and providing effective governance. Beijing clearly realizes that its economic investments in the country as well as big ticket infrastructural projects can not remain safe if there is no security. Afghanistan also criticized Pakistan for its role in sending 10000 Jihadis to Taliban, this is important in the context of the region’s geopolitics.
Like all other countries, Beijing and Islamabad, would have expected uncertainty after the US withdrawal of troops but perhaps over estimated their capabilities in dealing with the turbulence which had been predicted by many.
Importance of Chinese Foreign Minister’s statements
Wang Yi’s statements are important because days earlier a Taliban spokesman, Suhail Shaheen had praised China and welcomed its role in the country’s reconstruction. He had also assured China that those involved in the insurgency in Xinjiang would not be given refuge in Afghanistan (one of China’s major concerns has been the support provided by Taliban to the East Turkmenistan movement)
While Beijing may have opened back channels with the Taliban and realized that it needs to adapt to the changing geopolitics, recent developments would have increased its skepticism vis-à-vis the Taliban. On the other hand, Russia has been more favorable towards the Taliban. Russia’s Deputy Chief of Mission in India, Roman Babushkin argued that the Taliban are a reality which needs to be accepted, and also that any military activities without a political process are insufficient.
Babushkin did make the point that for successful negotiations, Taliban needed to end violence.
‘that Taliban should deal with the problem of terrorism and other related issues in order to become legitimate, in order to [get] delisted [at the UN Security Council], in order to go ahead with the future Afghanistan and creation of the inclusive government
It would be pertinent to point out, that Zamir Kabulov, Russian President’s Afghanistan envoy went a step further and said that the Afghan government was not doing enough to make talks with Taliban a success.
China’s statements subtle warning to the Taliban, indicating its reservations, and praise of Ghani indicate a possibility of greater understanding between Washington and Beijing (even though Beijing has repeatedly attributed the current troubles in Afghanistan to Washington’s decision to withdraw troops).
Can US and China find common ground
It remains to be seen if Biden who has exhibited dexterity on a number of complex issues reaches out to Xi Jinping to find common ground with regard to Afghanistan. Significantly, while US-Turkey relations had witnessed a downward trajectory and Biden has been critical of Turkish President Recep Tayyip Erdogan’s authoritarian tendencies and Human rights record, both leaders met on the sidelines of the NATO Summit in June 2021. During the meeting Turkey agreed to secure Kabul Airport. US National Security Advisor Jake Sullivan while commenting on Turkey’s assurance said
‘The clear commitment from the leaders was established that Turkey would play a lead role in securing Hamid Karzai International Airport, and we are now working through how to execute to get to that,’
Taliban earlier this week warned Turkey of ‘consequences’ if the Middle Eastern nation increased its troop presence in Afghanistan.
Russia’s statements with regard to the Taliban indicate that it is not totally on the same page as China (its prior experience in Afghanistan has made it more cautious and circumspect), and that the Afghan issue can not be understood from the simplistic lens of geo-political blocs and traditional lenses. All major stakeholders in Afghanistan, both within the region and outside, seem to be understandably befuddled by the turn of events. It is not just the US, but even China which would be worried not just from an economic stand point but the overall security implications of the turmoil in Afghanistan. The terror attack in KPK indicates that other CPEC related projects could also face threats from militant groups. Beijing would thus need to be quick to react to the overtures from the Taliban in order to secure its economic assets and lives of Chinese workers in neighbouring Pakistan.
It is especially important for Washington, Beijing and other important stakeholders in the region to work together for dealing with the near term turbulence as well as long term challenges Afghanistan is likely to face.
*Varundeep Singh is an Independent Policy Analyst.
IRENA Outlines Action Agenda on Offshore Renewables for G20
Boosting offshore renewables will accelerate the energy transition and allow G20 countries to build a resilient and sustainable energy system,...
Commission overhauls anti-money laundering and countering the financing of terrorism rules
The European Commission has today presented an ambitious package of legislative proposals to strengthen the EU’s anti-money laundering and countering...
Empowering “Smart Cities” toward net zero emissions
The world’s cities can play a central role to accelerate progress towards clean, low-carbon, resilient and inclusive energy systems. This...
Crime of Ecocide: Greening the International Criminal Law
In June 2021, an Independent Expert Panel under the aegis of Stop Ecocide Foundation presented a newly-drafted definition for the...
Indictment of Trump associate threatens UAE lobbying success
This month’s indictment of a billionaire, one-time advisor and close associate of former US President Donald J. Trump, on charges...
Climate change could spark floods in world’s largest desert lake
For years it appeared as though Lake Turkana, which sits in an arid part of northern Kenya, was drying up....
Sweden: Invest in skills and the digital economy to bolster the recovery from COVID-19
Sweden’s economy is on the road to recovery from the shock of the COVID-19 crisis, yet risks remain. Moving ahead...
Intelligence3 days ago
USA and Australia Worry About Cyber Attacks from China Amidst Pegasus Spyware
Middle East2 days ago
A New Era in US-Jordan Relations
Development2 days ago
10 new cities chosen for World Economic Forum circular economy initiative
Europe3 days ago
NATO’s Cypriot Trick
Economy3 days ago
The EU wants to cut emissions, Bulgaria and Eastern Europe will bear the price
Americas2 days ago
Sea Breeze 2021: U.S. is worryingly heading closer to conflict with Russia in the Black Sea
Green Planet3 days ago
Reusing 10% Will Stop Almost Half of Plastic Waste From Entering the Ocean
Central Asia2 days ago
Power without Soft Power: China’s Outreach to Central Asia