Imo Counter Piracy Policy Essay

1733 words - 7 pages

IMO Policy on Repressing of Piracy and Armed Robbery against Ships in the Western Indian Ocean and the Gulf of Aden (Horn of Africa region) Foreword: piracy in the Horn of Africa The United Nations (UN) and in particular the International Maritime Organization (IMO) have assertively tackled piracy since 2006.1 This effort is a response to the escalation of violence and the expansion of Somali piracy in the Horn of Africa, where, since 2004, ships, seafarers and property are constantly threatened by acts of piracy. Pirates are menacing shipping traffic close to vital choke points (Suez Canal, Hormuz Strait), disrupting freedom of navigation and the free movement of goods by sea, as well as ...view middle of the document...

As a result, a robust package of recommendations, “best practice management” rules (BMPs), guidance and regulations followed (see Bibliography and Reference, as well as appendix 2), in order to strengthen and coordinate maritime and international community reaction against Somali pirates. Furthermore, during the last decade, a number of regional roundtables and meetings (attended especially by Horn of Africa countries representatives) have been organized by IMO, with the purpose of nurturing a common awareness of the problem of piracy. In the meanwhile, several IMO missions into Horn of Africa countries contributed to, assessed and evaluated local counter-piracy capabilities. Through this “capacity building” effort, IMO has aimed at putting into practice the signature of local agreements concerning the establishment of counter-piracy procedures. In particular, in January 2009, regional States under IMO guidance have signed a significant agreement. The Djibouti Code of Conduct concerning the Repression of Piracy and Armed Robbery against Ships in the Western Indian Ocean and the Gulf of Aden is aimed at overcoming the growing phenomena of Somali piracy in the Horn of Africa. The parties agreed on collaborating to the maximum extent within the current framework of international laws, aiming at eradicating piracy from the region. Furthermore, within the wider international and maritime arena, IMO policy effort is focused on encouraging Governments to increment their contribution in term of military
1

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
The first UN SC Resolution against Somali piracy has been the UN SC Res.1816 (2008).

"! !

assets to be deployed against piracy, whilst pressure is also brought to bear on the shipping industry in order to be fully compliant with BMPs. Overall IMO policy implementation timeline is detailed in appendix 1. Rationales IMO counter-piracy policy is underpinned by an articulated set of rationales: two stands apart for their significance. In primis, Somali piracy is posing a threat to seafarers. The human cost of piracy, in term of physical and psychological arms to kidnapped seafarers, is impressive. Episodes of violence against seafarers, not only during attacks but also during detention, are more and more frequent: brutalization of hostages is also becoming a routine. Therefore, IMO policy is aiming at reducing the success rate of pirate attacks, thus the number of hostages kidnapped, through the wider implementation by shipping industry of self defense measures and BMPs, which would increment the safety of seafarers sailing the Horn of Africa seas. Secondly, IMO policy is aimed at safeguarding the freedom of navigation and the free flow of commerce in the Horn of Africa. Developing regional agreements on implementation of counter-piracy measures and underpinning the establishment of a more robust legal basis for prosecuting pirates (both at an international and domestic level), IMO...

Other Papers Like Imo Counter Piracy Policy

Case Study

2310 words - 10 pages whole community will have to take reasonable steps to counter balance the effect. Government should take responsibility of preserving living hood rights of instrument players, folk artists and performing artists crossed their peaks. The broadcast groups of television and radio should promote talent hunt program to discourage self made online albums. Broadcasting groups should associate instrument players on salaries for their channels and shows to

Holland Presentation Essay

4752 words - 20 pages contributing to EU peacekeeping forces in Bosnia. In the initial phase of the recent Iraq conflict, the Dutch deployed Patriot missiles to protect NATO ally Turkey, and sent a battalion of troops to Iraq to participate in stabilization operations. The Dutch also support and participate in NATO and EU training efforts in Iraq. They are active participants in the International Security Assistance Force in Afghanistan and in both EU as well as NATO counter-piracy operations.

Mis of Icic Bank

5833 words - 24 pages (Windows XP and Linux) for PC’s. • Windows 2003 server for mainframes. Hardware Resources:- Following hardware resources are required for the functionality of IS and organization: * Personal computers * Canon Document Scanners * HP Printers * Networking cards * Currency counter * Coin counters * HP Digital Scanners * Dell Mainframes 3.2 COMPUTING TYPE:- In ICICI bank, they are using client/server

Principles Of Information Security

3291 words - 14 pages Piracy, copyright infringement Unauthorized access and/or data collection Fire, flood, earthquake, lightning Accidents, employee mistakes, failure to follow policy Blackmail of information disclosure Software controls, physical security Training issues, privacy, lack of effective policy Power and WAN quality of service issues Destruction of systems or information Viruses, worms, macros, denial of service Equipment failure Bugs, code problems

Principles of Information Security

3241 words - 13 pages Threat Example Compromises to intellectual property Piracy, copyright infringement Espionage or trespass Unauthorized access and/or data collection Forces of nature Fire, flood, earthquake, lightning Human error or failure Accidents, employee mistakes, failure to follow policy Information extortion Blackmail of information disclosure Missing, inadequate, or incomplete controls Software controls, physical

Computer System Security

3291 words - 14 pages Piracy, copyright infringement Unauthorized access and/or data collection Fire, flood, earthquake, lightning Accidents, employee mistakes, failure to follow policy Blackmail of information disclosure Software controls, physical security Training issues, privacy, lack of effective policy Power and WAN quality of service issues Destruction of systems or information Viruses, worms, macros, denial of service Equipment failure Bugs, code problems

Freedom And Responsibility

2141 words - 9 pages Built within the Constitution of the United States are specifically defined freedoms that are guaranteed to all citizens. Conversely, with every constitutional freedom there comes a corresponding responsibility. On September 25, 1789, the state legislature’s twelve proposed amendments were transmitted by congress, the first two dealing with congressional representation and congressional pay. The following numbers three through twelve were

Hate Crime Laws

2348 words - 10 pages On June 7, 1998, 49-year-old James Byrd Jr. of Texas accepted a ride from three white men, who then beat him severely, urinated on him, chained him by his ankles to the back of their pick-up truck, dragged him for three miles into the countryside, and dumped his corpse in front of an African-American cemetery (Graczyk). A little over a year later, a jury sentenced ring leader John King to death by lethal injection (“Man Executed for Dragging

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages Rational Emotional Behavior Therapy Case Study of Sarah: A Conceptualization and Treatment Plan Rational emotive behavior therapy, REBT, was developed by Albert Ellis and holds the central belief that the events in our lives do not cause our disturbances but that they are instead caused by our view of the events (Murdock, 2009). Murdock (2009) states that “people are seen as responsible for their behavior” (p. 279) but, because they are

Holidays In Albania

1636 words - 7 pages Have you ever thought about having exciting and incredibly cheap vacations? Albania might be the right choice. According to My Travel Guide, Albania is ranked the fourth among ten places worth visiting in Eastern Europe (“Top 10 Eastern European Destinations”). One can encounter three kinds of vacations in this Mediterranean country: winter, summer, and cultural. The ideal places to spend your winter vacations are the Albanian Alps. They are

A Heart Of Darkness

1748 words - 7 pages In this short story, there are frequent significant subject and ideas that make the story, "A Heart of Darkness," by Joseph Conrad, and haunting novel. The main theme is absolute white power over the natives. The theme validates the corruption, and the dependence caused by the white people as they took over the Congo. White men were giving all the power; they had no self-control, and in the end they did not use wisely. The white men became

Related Essays

Explain And Critically Evaluate The Concept Of “Freedom Of Navigation”

2711 words - 11 pages issues, piracy was one of the important international threats at sea where there is universal jurisdiction. The concept of piracy is best explained in UNCLOS 1982, Art. 101. To prevent this problem “the 24th Assembly adopted a resolution on piracy and armed robbery against ships in waters off the coast of Somalia, to bring to the attention of the United Nations Security Council (UNSC)” (IMO, 2005). The co-operation occurs between Somalia and the

Japan's New National Border Strategy And Maritime Security

5840 words - 24 pages . Though the Anti-Piracy Law was enacted in Japan, the UN Convention on the Law of the Sea permits an “unobstructed right of navigation.” Any ships can, therefore, navigate the high seas freely. Even if ship crews possess weapons, they cannot be punished for that reason per se; the Anti-Piracy Law requires sufficient evidence and appropriate judgment in identifying pirate vessels. National Policy on Marine Development The Japanese government

Geography: Headlines Essay

2997 words - 12 pages conflict * Disagreement on definitions but general consensus that acts of terrorism are unacceptable Criteria ‘Official definitions determine counter-terrorism policy and are often developed to serve it.’ * Violence * Psychological impact and fear * Perpetrated for a political goal * Deliberate targeting of non-combatants * Disguise * Unlawfulness or illegitimacy Yet, “One man’s terrorist is another man’s

One, Two, Three Essay

3176 words - 13 pages July 7, 2012, the US-Philippine Society was launched. It is a non-profit independent organisation tasked for generating awareness about Philippines. in the US. The last board meeting was conducted by the society on January 24, 2013. In its 2013 Special 301 Report, the Office of the United States Trade Representatives wrote "The United States looks to the Philippines to take important steps to address piracy over the internet, in particular with