UAVs To Counter Maritime Piracy

Maritime piracy spiked in many parts of the world in the early 2000s, particularly in oceans with high traffic and relatively long distances being covered by container ships with little or no protection in the open waters.

During the first three quarters of 2017, an estimated 121 incidences of piracy occurred. Incidences of piracy covered such actions as attempted attacks, boardings, shootings, hijackings (and attempts), and citings of suspicious vessels by commercial shipping.

The waters of the Horn of Africa and the Gulf of Eden are well-known when it comes to piracy. Yet 40 percent of all piracy attacks undertaken over the past two decades occurred in Asian waters.

Piracy has become a major security concern in the context of commercial shipping operations taking place from the Andaman Sea to the waters off the northern coast of the Philippines.

In 2016 and 2015, the greatest concentration of piracy, which predominantly included boardings but attacks as well, took place in the SEA region.

Southeast Asia is a “paradise” for pirates because governments have failed to establish early warning systems and thus develop their early warning and response capabilities, while surveillance and control have been falling behind the growing challenge.

In such a setting, the use of unmanned systems, from UAVs to unmanned surface vehicles (USVs), provides a distinctive area of opportunity for states seeking to reduce the threat of piracy toward vital commercial shipping and shipping routes. Relatively cost effective, UAVs are able to surveil extended areas and provide security through continuous reconnaissance.

UAVs have been discussed as possible instruments of anti-piracy for several years as other efforts have proved to be of limited effect. Target hardening, for instance, has played a significant role in reducing the threat of piracy in certain locations, but hardening every potential target comes at a great cost and cannot be treated as a feasible long-term solution in the face of piracy, especially without incorporating the UAV element.

It, therefore, comes as no surprise that commercial shipping companies that rely on the use of strategic choke points and operate in distant locations beyond the reaches of maritime security forces have increasingly turned their attention to UAVs being employed in this domain.

Efforts have been undertaken to incorporate UAVs into anti-piracy missions. The European Union Naval Force’s (EUNAVFOR) Operation Atalanta, the EU’s anti-piracy naval mission off the coast of Somalia, deployed UAVs for intelligence, surveillance, target acquisition, and reconnaissance (ISR) purposes.

Such efforts could be replicated in the SEA maritime domain, and to great effect. Local navies could seek to incorporate UAVs in their ISR, though such efforts do not come without their own set of challenges.

Of the regional navies, Indonesia and Malaysia have the financial, logistical, and operational capabilities to deploy medium-altitude long-endurance (MALE) drones. Smaller units could be used for ISR purposes closer shorelines and for tracking piracy locations, sanctuaries, and raids on safe havens at short distances.

UAVs can provide advanced warning for essential shipping and the movement of much-needed goods in for growing economies and populations. The deployment of these systems can also reduce the burden placed on conventional air forces assigned to anti-piracy duties and as a result reduce the financial burdens that fall on governments.

The United States has increasingly employed its ScanEagle UAV, which is also operated by other partners in the international fight against piracy in the open waters. The MQ-8B Fire Scout (with a unit cost of under $20 million) is another vital instrument incorporated into international efforts to combat piracy.

Northrop Grumman’s Fire Scout, introduced over a decade ago, can complement strike squadrons ready at sea to interdict potential pirates in vital waterways. These are viable solutions for states able to afford and manage intricate systems or that either rely on or work directly with the United States in the maritime security realm.

China’s U650 seaplane drone, which can make water-landings, represents an alternative to the United States’ offerings. The completely unmanned unit, now being mass-produced in Shanghai, is capable of operating for up to 15 hours at travel at a speed in excess of 110 mph.

Research and development in the unmanned realm has shown the potential to spawn a healthy competition between drone states, possibly leading to benefits for others in the commercial maritime realm.

Beyond efforts led by states, the possibility of using private security companies for unmanned surveillance ought to be considered carefully.

Private companies could provide such services in a two-fold system.

The first would be via MALE drones, capable of tracking and surveilling on a broad scale.

The second option comes in the form of deploying armed guards, as is increasingly the custom on international shipping vessels, using small unmanned units.

The use of smaller UAVs by private security companies and contractors would enhance their own ISR capabilities, increase their ability to provide security and could function as early-warning systems for the state.

As UAV costs, small and medium alike, have come down in recent years, it seems increasingly likely that private companies, as non-state security actors, could provide help to fill the security gap when it comes to this vital aspect of the global economy.

At the same time, the wholesale of military UAVs, as enabled by China, has helped SEA military actors acquire their own unmanned aerial capabilities.

A combination of these state actors and non-state, commercial efforts by shipping companies and contractors could provide the aerial surveillance capability needed to reduce the threat of piracy in the waters around SEA and turn the “pirates’ paradise” once more into a safe and secure shipping heaven.

The Diplomat

You Might Also Read: 

Maritime Cybersecurity: No Substitute for Testing:

Mini Drones See in the Dark:

No Need To Shoot Down Drones – Just Hijack Them:

 

 

 

 

« Flying Drones Scan Packages 24/7
5 Cyber Threats Executives Should Understand »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Kirkland & Ellis

Kirkland & Ellis

Kirkland & Ellis LLP is an international law firm with offices in the USA, Europe and Asia. Practice areas include Data Security & Privacy.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

ZyberSafe

ZyberSafe

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center is a not-for-profit organization focused on regional cybersecurity excellence and readiness, with a special emphasis on the maritime community.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

Intrinsyc Technologies

Intrinsyc Technologies

Intrinsyc provides product development services and Edge Computing modules that are helping to take the Internet of Things products to the next level.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

Stone Forest IT (SFIT)

Stone Forest IT (SFIT)

Stone Forest IT specialises in providing advisory, implementation and managed services for IT infrastructure, IT security solutions, business applications (ERP and CRM) and business analytical tools.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.