UAVs To Counter Maritime Piracy

Maritime piracy spiked in many parts of the world in the early 2000s, particularly in oceans with high traffic and relatively long distances being covered by container ships with little or no protection in the open waters.

During the first three quarters of 2017, an estimated 121 incidences of piracy occurred. Incidences of piracy covered such actions as attempted attacks, boardings, shootings, hijackings (and attempts), and citings of suspicious vessels by commercial shipping.

The waters of the Horn of Africa and the Gulf of Eden are well-known when it comes to piracy. Yet 40 percent of all piracy attacks undertaken over the past two decades occurred in Asian waters.

Piracy has become a major security concern in the context of commercial shipping operations taking place from the Andaman Sea to the waters off the northern coast of the Philippines.

In 2016 and 2015, the greatest concentration of piracy, which predominantly included boardings but attacks as well, took place in the SEA region.

Southeast Asia is a “paradise” for pirates because governments have failed to establish early warning systems and thus develop their early warning and response capabilities, while surveillance and control have been falling behind the growing challenge.

In such a setting, the use of unmanned systems, from UAVs to unmanned surface vehicles (USVs), provides a distinctive area of opportunity for states seeking to reduce the threat of piracy toward vital commercial shipping and shipping routes. Relatively cost effective, UAVs are able to surveil extended areas and provide security through continuous reconnaissance.

UAVs have been discussed as possible instruments of anti-piracy for several years as other efforts have proved to be of limited effect. Target hardening, for instance, has played a significant role in reducing the threat of piracy in certain locations, but hardening every potential target comes at a great cost and cannot be treated as a feasible long-term solution in the face of piracy, especially without incorporating the UAV element.

It, therefore, comes as no surprise that commercial shipping companies that rely on the use of strategic choke points and operate in distant locations beyond the reaches of maritime security forces have increasingly turned their attention to UAVs being employed in this domain.

Efforts have been undertaken to incorporate UAVs into anti-piracy missions. The European Union Naval Force’s (EUNAVFOR) Operation Atalanta, the EU’s anti-piracy naval mission off the coast of Somalia, deployed UAVs for intelligence, surveillance, target acquisition, and reconnaissance (ISR) purposes.

Such efforts could be replicated in the SEA maritime domain, and to great effect. Local navies could seek to incorporate UAVs in their ISR, though such efforts do not come without their own set of challenges.

Of the regional navies, Indonesia and Malaysia have the financial, logistical, and operational capabilities to deploy medium-altitude long-endurance (MALE) drones. Smaller units could be used for ISR purposes closer shorelines and for tracking piracy locations, sanctuaries, and raids on safe havens at short distances.

UAVs can provide advanced warning for essential shipping and the movement of much-needed goods in for growing economies and populations. The deployment of these systems can also reduce the burden placed on conventional air forces assigned to anti-piracy duties and as a result reduce the financial burdens that fall on governments.

The United States has increasingly employed its ScanEagle UAV, which is also operated by other partners in the international fight against piracy in the open waters. The MQ-8B Fire Scout (with a unit cost of under $20 million) is another vital instrument incorporated into international efforts to combat piracy.

Northrop Grumman’s Fire Scout, introduced over a decade ago, can complement strike squadrons ready at sea to interdict potential pirates in vital waterways. These are viable solutions for states able to afford and manage intricate systems or that either rely on or work directly with the United States in the maritime security realm.

China’s U650 seaplane drone, which can make water-landings, represents an alternative to the United States’ offerings. The completely unmanned unit, now being mass-produced in Shanghai, is capable of operating for up to 15 hours at travel at a speed in excess of 110 mph.

Research and development in the unmanned realm has shown the potential to spawn a healthy competition between drone states, possibly leading to benefits for others in the commercial maritime realm.

Beyond efforts led by states, the possibility of using private security companies for unmanned surveillance ought to be considered carefully.

Private companies could provide such services in a two-fold system.

The first would be via MALE drones, capable of tracking and surveilling on a broad scale.

The second option comes in the form of deploying armed guards, as is increasingly the custom on international shipping vessels, using small unmanned units.

The use of smaller UAVs by private security companies and contractors would enhance their own ISR capabilities, increase their ability to provide security and could function as early-warning systems for the state.

As UAV costs, small and medium alike, have come down in recent years, it seems increasingly likely that private companies, as non-state security actors, could provide help to fill the security gap when it comes to this vital aspect of the global economy.

At the same time, the wholesale of military UAVs, as enabled by China, has helped SEA military actors acquire their own unmanned aerial capabilities.

A combination of these state actors and non-state, commercial efforts by shipping companies and contractors could provide the aerial surveillance capability needed to reduce the threat of piracy in the waters around SEA and turn the “pirates’ paradise” once more into a safe and secure shipping heaven.

The Diplomat

You Might Also Read: 

Maritime Cybersecurity: No Substitute for Testing:

Mini Drones See in the Dark:

No Need To Shoot Down Drones – Just Hijack Them:

 

 

 

 

« Flying Drones Scan Packages 24/7
5 Cyber Threats Executives Should Understand »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

F-Secure

F-Secure

F-Secure defends enterprises and consumers against everything from opportunistic ransomware infections to advanced cyber attacks.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

KLDiscovery

KLDiscovery

KLDiscovery is a global leader in delivering best-in-class eDiscovery, information governance and data recovery solutions.

CTERA Networks

CTERA Networks

CTERA provides cloud storage solutions that enable service providers and enterprises to launch managed storage, backup, file sharing and mobile collaboration services using a single platform.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

KeyXentic

KeyXentic

KeyXentic Inc. is a professional mobile and data security service provider. We are devoted to design convenient and strong security for user’s data protection and privacy without any compromise.

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.

Instil Software

Instil Software

Instil helps technology brands transform, innovate and disrupt their markets with category-defining software products that challenge us to think, feel and act in new ways.

ThreatMate

ThreatMate

ThreatMate empowers businesses with comprehensive tools to detect, protect, and remediate against cyber threats.

CirrusHQ

CirrusHQ

CirrusHQ are a Specialist AWS Advanced Consulting Partner with a focus on Cloud Management, DevOps, Migration and Consulting Services for the private and public sectors.

DOT Security

DOT Security

DOT Security provides advanced security services for businesses of all sizes.