UAVs To Counter Maritime Piracy

Maritime piracy spiked in many parts of the world in the early 2000s, particularly in oceans with high traffic and relatively long distances being covered by container ships with little or no protection in the open waters.

During the first three quarters of 2017, an estimated 121 incidences of piracy occurred. Incidences of piracy covered such actions as attempted attacks, boardings, shootings, hijackings (and attempts), and citings of suspicious vessels by commercial shipping.

The waters of the Horn of Africa and the Gulf of Eden are well-known when it comes to piracy. Yet 40 percent of all piracy attacks undertaken over the past two decades occurred in Asian waters.

Piracy has become a major security concern in the context of commercial shipping operations taking place from the Andaman Sea to the waters off the northern coast of the Philippines.

In 2016 and 2015, the greatest concentration of piracy, which predominantly included boardings but attacks as well, took place in the SEA region.

Southeast Asia is a “paradise” for pirates because governments have failed to establish early warning systems and thus develop their early warning and response capabilities, while surveillance and control have been falling behind the growing challenge.

In such a setting, the use of unmanned systems, from UAVs to unmanned surface vehicles (USVs), provides a distinctive area of opportunity for states seeking to reduce the threat of piracy toward vital commercial shipping and shipping routes. Relatively cost effective, UAVs are able to surveil extended areas and provide security through continuous reconnaissance.

UAVs have been discussed as possible instruments of anti-piracy for several years as other efforts have proved to be of limited effect. Target hardening, for instance, has played a significant role in reducing the threat of piracy in certain locations, but hardening every potential target comes at a great cost and cannot be treated as a feasible long-term solution in the face of piracy, especially without incorporating the UAV element.

It, therefore, comes as no surprise that commercial shipping companies that rely on the use of strategic choke points and operate in distant locations beyond the reaches of maritime security forces have increasingly turned their attention to UAVs being employed in this domain.

Efforts have been undertaken to incorporate UAVs into anti-piracy missions. The European Union Naval Force’s (EUNAVFOR) Operation Atalanta, the EU’s anti-piracy naval mission off the coast of Somalia, deployed UAVs for intelligence, surveillance, target acquisition, and reconnaissance (ISR) purposes.

Such efforts could be replicated in the SEA maritime domain, and to great effect. Local navies could seek to incorporate UAVs in their ISR, though such efforts do not come without their own set of challenges.

Of the regional navies, Indonesia and Malaysia have the financial, logistical, and operational capabilities to deploy medium-altitude long-endurance (MALE) drones. Smaller units could be used for ISR purposes closer shorelines and for tracking piracy locations, sanctuaries, and raids on safe havens at short distances.

UAVs can provide advanced warning for essential shipping and the movement of much-needed goods in for growing economies and populations. The deployment of these systems can also reduce the burden placed on conventional air forces assigned to anti-piracy duties and as a result reduce the financial burdens that fall on governments.

The United States has increasingly employed its ScanEagle UAV, which is also operated by other partners in the international fight against piracy in the open waters. The MQ-8B Fire Scout (with a unit cost of under $20 million) is another vital instrument incorporated into international efforts to combat piracy.

Northrop Grumman’s Fire Scout, introduced over a decade ago, can complement strike squadrons ready at sea to interdict potential pirates in vital waterways. These are viable solutions for states able to afford and manage intricate systems or that either rely on or work directly with the United States in the maritime security realm.

China’s U650 seaplane drone, which can make water-landings, represents an alternative to the United States’ offerings. The completely unmanned unit, now being mass-produced in Shanghai, is capable of operating for up to 15 hours at travel at a speed in excess of 110 mph.

Research and development in the unmanned realm has shown the potential to spawn a healthy competition between drone states, possibly leading to benefits for others in the commercial maritime realm.

Beyond efforts led by states, the possibility of using private security companies for unmanned surveillance ought to be considered carefully.

Private companies could provide such services in a two-fold system.

The first would be via MALE drones, capable of tracking and surveilling on a broad scale.

The second option comes in the form of deploying armed guards, as is increasingly the custom on international shipping vessels, using small unmanned units.

The use of smaller UAVs by private security companies and contractors would enhance their own ISR capabilities, increase their ability to provide security and could function as early-warning systems for the state.

As UAV costs, small and medium alike, have come down in recent years, it seems increasingly likely that private companies, as non-state security actors, could provide help to fill the security gap when it comes to this vital aspect of the global economy.

At the same time, the wholesale of military UAVs, as enabled by China, has helped SEA military actors acquire their own unmanned aerial capabilities.

A combination of these state actors and non-state, commercial efforts by shipping companies and contractors could provide the aerial surveillance capability needed to reduce the threat of piracy in the waters around SEA and turn the “pirates’ paradise” once more into a safe and secure shipping heaven.

The Diplomat

You Might Also Read: 

Maritime Cybersecurity: No Substitute for Testing:

Mini Drones See in the Dark:

No Need To Shoot Down Drones – Just Hijack Them:

 

 

 

 

« Flying Drones Scan Packages 24/7
5 Cyber Threats Executives Should Understand »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Cybertech

Cybertech

Cybertech Conference & Exhibition presents commercial problem solving strategies and solutions for the global cyber threat that meet the diverse challenges for a wide range of sectors.

Science Applications International Corporation (SAIC)

Science Applications International Corporation (SAIC)

SAIC is a premier technology integrator in the technical, engineering, intelligence, and enterprise information technology markets. Services and solutions include Cybersecurity.

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

Edvance

Edvance

Edvance operates a range of cybersecurity businesses including value added cybersecurity solutions distribution, security technology innovation and development, and SaS solution offerings.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

Apptega

Apptega

Apptega is an award-Winning Cybersecurity and Compliance Platform. Our mission is to make cybersecurity and compliance easy for everyone.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

Verichains

Verichains

Verichains Lab is a pioneer and leading APAC blockchain security firm with extensive expertise in the areas of security, cryptography and core blockchain technology.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

endpointX

endpointX

endpointX is a preventative cyber security company. We help companies minimize their risk of breach by improving cyber hygiene.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Incyber

Incyber

Incyber is a fully integrated network and cybersecurity solutions provider contracted to safeguard public and private enterprise, high value data and sensitive industries.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

Diversified Technical Services Inc. (DTSI)

Diversified Technical Services Inc. (DTSI)

DTSI provides a wide range of technology solutions for Federal Agencies, the Department of Defense, and commerical organizations with capabilities including Cyber Security and DevSecOps.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.