MARITIME PIRACY IN MALACCA STRAIT AND SOUTH CHINA SEA: TESTING THE DETERRENCE AND REACTANCE MODELS BO JIANG Department of Criminology, University of Pennsylvania (August 2013 to May 2014) Department of Criminology and Criminal Justice, University of Maryland (June 2014 - ) KEYWORDS: Southeast Asia, maritime piracy, deterrence, reactance, series hazard model, logistic model ABSTRACT: In this article, I used series hazard modeling and multivariate logistic models to test the relative strengths of deterrence and reactance models for the risk of piracy attacks under a military intervention and several major events. I found significant evidence for the conclusion that the rate of piracy attacks reduced significantly when direct controls are implemented to reduce the environmental opportunities of crime, and when certainty effect becomes stronger. The only exception is when pirates are highly motivated. Also, my results support the reactance perspective when the odds of successful attacks significantly increase after anti-piracy military intervention was introduced. No. of words: 7354 No. of figures: 2 No. of tables: 5 1 INTRODUCTION Of the many piracy prone areas in the world, the two prominent piracy hotspots in Asia are the South China Sea and the Malacca Straits which are contiguous to each another. The South China Sea is bounded on the north by China, on the south by Indonesia, on the east by the Philippine islands, and on the west by the Malay Peninsula and Vietnam. It encompasses an area of around 3.5 million square kilometers, and contains more than 230 scattered islets, reefs, and shoals. It is home to the world’s most perplexing problems of jurisdiction and maritime management. Linking the Indian Ocean with the South China Sea, Malacca Strait is one of the world’s busiest shipping lanes. Its strategic importance lies in it being the shortest trade route between the Indian and the Pacific Ocean. Prior to 2007, Malacca Strait was notorious for being the global hot spot for piracy but with the increase of piracy off the coast of Somalia, it no longer holds that designation. Currently, about 45% of total world trade carried by 70,000 merchant vessels over 300 gross tons ply the South China Sea and about 20,000 oil tankers carrying onethird of the world’s crude oil passes through Malacca Strait annually. Other than commercial vessels, numerous smaller vessels such as barges, fishing boats, and passenger vessels also transit the area. Ships passing at low speed close to shore, with the equivalent of several years’ wages in cash in the ship’s safe and with foreign crews and timetables militating against full reporting of incidents, made them obvious and tempting targets 2 as some of these ships can feed a whole Indonesian village 1. These types of attacks can be conducted by a small group of men or by a ring of people attacking ships on behalf of the entire villages. In these later cases, “whole villages”, located predominantly on remote islands, attack vessels for food, cigarettes, and other small goods. Stuart (2002) noted that while the attack itself is conducted by a small number of able-bodied men from the community, the whole village might share the booty, benefit from the attack, and admire and support the perpetrators. Pervasive poverty, lack of legal employment opportunities combined with the proximity to shipping lines nourished piracy as a ‘thinkable’ alternative way of earning a living (Vagg, 1995). Frecon (2006), who conducted research in the Riau Archipelago and interviewed pirates and members of the community they live in, concludes that locals tolerate piracy as a means to living. Piracy appears almost the “logical choice” for such fishers as they have the necessary maritime skills, local knowledge of the area, and the required equipment, including boats and long knives. The occurrence of piracy trended upward. By 2005, the IMO estimated that pirate attacks in the Malacca Strait accounted for 40% of overall global incidents. Indeed, maritime attacks in the region have caused an estimated annual $3 billion in economic loss. 2 Piracy poses a danger not only to shipping companies for their financial loss but also to the safety of 1.4 million seafarers who are transiting the area. Stanley Weeks notes that “…piracy raises insurance rates, restricts 1 Sethuraman Dinakar and Harry Maurer, “The Jolly Roger Flies High, as Piracy Feeds the Hunger”, Business Week International Edition, 24 May 1999. 2 Brandon, J.J. 2003. Piracy as Terrorism, Journal of Commerce., issue: June 3. 3 free trade, and increases tensions between the affected littoral states, their neighbors and the countries whose flagged ships are attacked or hijacked.” In addition, since the terrorist event of September 2001 in the U.S., security alerts of potential maritime attacks by terrorist groups had been issued. Malacca Strait was added to the “Hull, War, Strikes, Terrorism and Related Perils” list by the Joint War Committee (JWC) in mid 2005 to reflect the possibility of this doomed scenario (Reinhart, 2012). Notwithstanding the numerous literatures on maritime piracy, I was not able to identify any studies of maritime piracy that explicitly examined the deterrence and reactance effects. There is also a lack of prior studies that quantify the effectiveness of anti-piracy measure and policies in the context of regional socioeconomics conditions using statistical tests. Moreover, there is scant literature employing empirical methods in studying the phenomenon of piracy in terms of typology, trend, location, vessel details, modus operandi etc. Most of the prior works on maritime piracy were qualitative and theoretical in their approach, focusing mainly on the historical context (Mueller and Adler, 1985; Eklof, 2006; Elleman et al., 2010); socioeconomic conditions that nourish piracy (Vagg, 1995; Johnson and Valencia, 2005; Young, 2007), the connection between organized crime, terrorists, guerrilla movements and maritime piracy (Chalk, 2000; Ong-Webb, 2006) and responses to piracy (Liss, 2010; Beckman, 2012). Many of the authors conducted field work through interviews with the pirates, officers from the enforcement agencies, crews who are victims of piracy and the village chief where the pirates originate. Although such literatures provided a qualitatively revealing and comprehensive 4 discourse on the retrospect and prospect of maritime piracy, they did not offer systematic statistical tests of their hypothesis. MILITARY INTERVENTION AND MAJOR EVENTS After an extensive literature review, I identified one military intervention and four major events that could potentially have huge impacts on the risk of piracy in Malacca Strait and South China Sea. The military intervention is called MALSINDO (which is an acronym based on the participating countries of MALaysia, SINgapore and InDOnesia). Started in 2004, MALSINDO is by far the most elaborated and extensive effort to combat piracy in the Malacca Strait. It requires “…the navies of the participants to commit five to seven ships to patrol the strait, and to establish a hotline that allowed the commands of the three navies to coordinate operations”. The effort is reinforced by joint aerial surveillance through the ‘Eye in the Sky’ Initiative that involve “regular reconnaissance sorties linked to a web-based information sharing network to allow better information sharing” (Schuman, 2009). Under this framework, patrol vessels from one country are permitted to enter the soverign waters of another country when under hot pursue of a pirate ship. Of the four major events, the first is Cooperation Afloat Readiness and Training (CARAT), which comprises a series of annual bilateral military exercises created in 1995 and conducted by United States Pacific Fleet with Singapore, Thailand, Brunei, Indonesia, the Philippines, Malaysia and Indonesia. During each stop, the U.S. naval forces exercised with the host nation's 5 air, sea and land forces. The second event is the Indonesian Tsunami that occurred on December 26 2004. With a total death toll estimated around 230,000 including 10,000 foreign tourists (mostly Europeans), the event prompted a worldwide humanitarian response. During the search and rescue phase of the relief operations the U.S. Navy dispatched 17 ships including an aircraft carrier, as well as 75 aircrafts including a P-3 patrol aircraft to assist the relief operations. In addition, more than 11,600 military personnels were deployed within one month of the disaster. I included these two events because the sudden influx of U.S. military presence in the regions could potentially have a large deterrence effect on piracy. The third event is the Hainan Incident. On April 1, 2001, a mid-air collision between a United States Navy P-3 signals intelligence aircraft and a People's Liberation Army Navy interceptor fighter jet resulted in an international dispute between the U.S. and China. As tensions mount between US and China and subsequently spill over to other regional states in the South China Sea, heighten sense of mutual distrust and the fear of losing sovereignty over national territory hampered international cooperation. As such, coordinated patrols and cross border hot pursuits of pirate ships were forbidden. When the certainty of apprehension falls, the deterrence perspective predicts that piracy is likely to become more active. The last event is Lebaran (Celebration Day), which takes place during the first three days immediately after Ramadan. Lebaran is the biggest holiday in Malaysia and Indonesia and is one of the largest temporary human migrations globally where workers, particularly unskilled laborers, return to their hometown to celebrate with their families. Thus, during the month of 6 Ramadan pirates might be highly motivated because they needed extra cash to bring home for celebration. The stronger is the drive of the pirates, the more likely piracy will occur. DETERRENCE AND REACTANCE EFFECTS Kenny (1929) summarized that writers such as Beccaria, Blackstone, Romilly, Paley, Feuerbach define deterrence by punishment as a method of retrospective interference after crime occurs; by holding out threats that, whenever a wrong has been actually committed, the wrongdoer shall incur punishment. Punishment is usually concurrent with reinforcement – that is, the behavior which is punished is also rewarded. For example, a pirate attacks a ship for money (reward), for which, if caught, he is placed in prison (punishment). If the strength of the rewarding stimulus is greater than that of the punishing stimulus, the utilitarian pirate will most likely continue to behave in his old way even if punished. The deterrence effect could also be achieved when incapacitation theory (Ehrlich, 1972) is interpreted together with rational choice theory (Becker, 1968). As the perceived probability of apprehension increases, deterrence effect is achieved when utilitarian criminals choose legal avenues of economic gain over illegal ones. To be effective, the punishing stimulus must be unavoidable and in order to do so, apprehension must be certain. Zimring and Hawkins (1973) note that a substantial deterrence effect is achieved when the probability that a particular type of offender will be apprehended is greatly increased. Also, Marvell and Moody (1996) suggest that additional police presence deters crime in this 7 manner by making criminals believe arrests and subsequent sanctions are more likely 3. For piracy, an increase in the presence of the costal enforcement machinery would increase the objective probability of apprehension. Therefore my first deterrence-related hypothesis is: H1: The hazard of piracy attacks is inversely proportional to the objective probability of apprehension. Consistent with Maslow and Murphy’s (1954) theory on motivation, I hypothesize in H2b that deterrence measures operating on potential pirates may be sufficiently influential to deter piracy that is weakly motivated but will fail to deter piracy that is strongly motivated. For certain people in certain situations, the drive toward piracy may be so strong that no threat will stop them. My second deterrence-related hypothesis is: H2: The strength of the drive that motivates piracy has a negative effect on amenability to deterrence. The second decisive factor in crime control is dealing with future consequences of punishment. There is an extensive literature (Braithwaite, 1989, 2005; Dugan et al., 2003; Nevin, 2003; Siqueira and Sandler, 2007; LaFree et al., 2009) concluding that punishment has some undesirable side effects, such as backlash and psychological reactance (Brehm, 1966; Tyler, 1990). The reactance perspective suggests that for a given person at a given time, there is a set of behaviors any one of which he could engage in either at the moment or at some time in the 3 In New York City the rate of street crime decreased after the saturation of a small high crime area with extra police. New York City Police Department, Operation 25 (1955). 8 future. This set may be called the individual’s “Free Behaviors”. For specific behaviors to be free, the individual must have the relevant physical and psychological abilities to engage in them. Given that a person has a set of free behaviors, he will experience reactance whenever any of those behaviors is eliminated or threatened with elimination. The greater is the importance and proportion of the free behaviors which are eliminated or threatened with elimination, the greater will be the magnitude of reactance predicted. I relate the reactance theory to my current focus of piracy through the following hypothesis: H3: Pirates would re-establish their freedom of sea robberies through more aggressive attacks when their free behaviors are threatened with elimination. DATA AND METHOD DATA The analysis is based on 438 and 1678 piracy attacks from 1995 to 2010 in Malacca strait and South China Sea, respectively, drawn from the Piracy and Armed Robbery Reports in the Global Integrated Shipping Information System (GISIS) developed by the International Maritime Organization (IMO). The database was supplemented with Piracy Reports compiled by the IMO. Information provided in the data set included the date of the attack, ship name, ship type, area of the attack, incidence details, consequences for crews, where the incident was reported to and costal state actions. Ancillary data on the GDP, import (cif) and export (fob) values, 9 unemployment rate, inflation rate were obtained from CEIC Data Manager. The number of terrorism incidents was drawn from the Global Terrorism Database (GTD) developed by the National Consortium for the Study of Terrorism and Responses to Terrorism (START). METHOD Following Dugan (2011) 4, I use the series hazard model, which is an extension of the Cox (1972) proportional hazard model, to estimate the impact of the military interventions on the hazard of an additional piracy attacks controlling a set of relevant variables. The hazard model used in the analysis is specified as follows: h(Y) =𝜆𝜆0 (Y) exp (𝛽𝛽1Military Interventions + 𝛽𝛽2Other Events + 𝛽𝛽3Context) where β is a vector of parameters to be estimated, and 𝜆𝜆0 (Y) is the unspecified baseline hazard function. The baseline hazard function corresponds in my case to the probability of pirate attack when all the covariates have values of 0. In this study, I assume the unspecified baseline hazards for Malacca Strait and South China Sea are the same since they are contiguous and share many unobserved characteristics. I will present the estimated coefficients β in each geographical area under the section ‘RESULTS’ before discussing their relevance under the section ‘DISCUSSIONS AND CONCLUSIONS’. 4 Other studies that use the series hazard model include 1) the study of temporal frequency of aerial hijacking (Dugan et. al., 2005), 2) the estimation of the impact of British counterterrorist strategies on political violence in Northern Ireland (LaFree et. al, 2009). 10 “Days Until Next Attack” is the dependent variable used in the series hazard model, which measures time (days) to each event from the time of the previous event. The clock is reset to zero after each attack. In Malacca Strait, the first attack occurred on January 5, 1995 and this date was chosen to be the time origin as it marks the onset of continuous exposure to risk of piracy attack. 5 Next I observe that in Malacca Strait, there are 14 ties and 59 repeated attacks while in South China Sea, there are 114 ties and 320 repeated attacks. For example in South China Sea, attacks occurred on June 1st, 1995, June 2nd, 1995, June 3rd, 1995 and June 4th, 1995, thus giving rise to three ties. In the same geographical area, three repeated attacks occurred on April 11th, 1995. Given that 19% (320/1679) of the attacks in South China Sea are repeated in nature, it is crucial to correct for the dependence among the multiple attacks on the same day. Dependence among observations can be thought of as arising from unobserved heterogeneity. Second attacks tend to be like first attacks because there are unmeasured, stable factors affecting both attacks. For example, repeated attacks occur when the same group of pirates attacks multiple ships of the same type in the same region of the sea using very similar methods in the same day. Therefore, pooling these observations without taking the dependence into account can lead to standard error estimates that are biased downward and test statistics that are biased upwards. 5 This criterion excludes earlier periods, i.e. January 1, 1995 to January 4, 1995, when the hazard is necessarily 0. 11 To correct for dependence among repeated attacks, the Robust Variance Estimator method 6 (rather than the Observed Information Matrix) was used (Allison, 2010). Because observations are correlated, some of the apparent information in the sample is redundant. Therefore, repeated attacks on the same day are given the same Strata id so that the estimation procedure is not ‘fooled’ into thinking that it has more information than it actually does. Consequently, in South China Sea the standard errors are adjusted for 1358 clusters. However, the tradeoff is that when the Robust Variance Estimator method was invoked, the EXACT method could not be used since the partial likelihood function is no longer valid. Ties were thus handled by an approximation proposed by Efron (1977). This tradeoff is justified because in South China Sea ties constitute a much smaller fraction (114/1679) as compared to repeated attacks (320/1679). Table 1 provides the summary statistics of variables included in the analysis. I examine separately all attacks in Malacca Strait from January 1995 to March 2008 and South China Sea from January 1995 to December 2010. The mean number of days between successive attacks is around twelve days in Malacca Strait and four days in South China Sea. <Insert Table 1> MILITARY INTERVENTION 6 It was developed for Cox regression by Lin and Wei (1989) and described in some detail in Therneau and Grambsch (2000). 12 For the list of variables under Military Intervention and Other Events, the dummy variable “1” is coded if the piracy attack occurred during the period and “0” otherwise. Since MALSINDO officially began in July 2004 but was only fully operational with the launch of the Eyes in the Sky in July 2005, the midpoint of those two dates was taken and piracy attacks recorded from January 2005 till the end of the sampling period were coded as “1” and “0” otherwise. According to Table 1, MALSINDO was in effect for about twelve percent and thirty percent of the total attacks in the Malacca Strait and South China Sea, respectively. OTHER EVENTS The start date for CARAT in Malacca Strait is proxy by the CARAT start date in Singapore 7 and the end date is taken to be ten to fourteen days after the start date. In South China Sea, CARAT starts on either May or June each year 8. The end date is taken to be around two months after the start date. Approximately fourteen and seventeen percent of the piracy attacks were perpetuated during the periods of CARAT in Malacca Strait and South China Sea, respectively. The next variable is “Indonesian Tsunami”. Piracy attacks perpetuated in Malacca Strait during the one year period after the tsunami were coded as “1” and “0” otherwise. About four percent of the total attacks were recorded during this period. The second variable “During 7 May 13, 1995; July 13, 1996; July 21, 1997; July 20, 1998; July 12, 1999; July 11, 2000; July 2, 2001; July 2, 2002; July 14, 2003; June 1, 2004; May 31, 2005; May 30, 2006; July 17, 2007 and June 24, 2008 8 The dates are May 12, 1998; June 28, 1999; June 14, 2000; May 17, 2001; May 1, 2002; May 28, 2003; June 12, 2004; June 15, 2005; June 14, 2006; May 12, 2007 and May 3, 2010. 13 Ramadan” is a yearly recurring event 9 and piracy attacks perpetuated during these periods were coded as “1” and “0” otherwise. Lastly, piracy attacks perpetuated within one year of the Hainan Incident were coded as “1” and “0” otherwise. Altogether, they accounted for about nine percent of the total attacks according to Table 1. CONTROL VARIABLES The existence and activities of guerrilla and terrorist groups in Southeast Asia affect piracy in two ways. First, it is believed that members of some of these politically motivated groups conduct pirate attacks to finance their operations. Second, many scholars suggested that pirates may cooperate with, or be of assistance to, terrorist organizations (see Koknar, 2005 and Low, 2008 for a discussion). As expected, the monthly number of piracy attacks is significantly correlated with that of terrorist attacks in Malacca Strait (r=0.196, p=0.013). Therefore in order to maximize confidence in the results, I need to control for changing rates of terrorist related piracy attacks over time. This was done by including the variable “Lagged Regional Terrorist Incidents” which captures the one-month lagged monthly aggregate counts of terrorism incidents that occurred in countries along the Malacca Strait from 1995 to 2008. The littoral countries are 9 In the sampling period from 1995 to 2010, Ramadan began on the following dates: February 1, 1995, January 22, 1996, January 10, 1997, December 31, 1997, December 20, 1998, December 9, 1999, November 28, 2000, November 17, 2001, November 6, 2002, October 27, 2003, October 16, 2004, October 5, 2005, September 24, 2006, September 13, 2007, September 2, 2008, August 22, 2009, August 11, 2010 and lasted for twenty nine or thirty days. 14 Singapore, Malaysia and Indonesia. Lagging the terrorism incidents by one month is crucial to avoid reverse causality. To test the possibility that it was not military interventions and other events but the increased availability of “preys” in the regions that explain the hazard of piracy attacks, I included the variable “Trade”. It captures the cumulative value of trade passing through the Malacca Strait on a quarterly basis for the years 1995 to 2010 10. I included the variable “Regional Military Expenditure” to control for the lower/higher hazards of piracy due to the larger/smaller presence of enforcement at sea. The military expenditure for countries located along the Malacca Strait, i.e. Malaysia, Indonesia and Singapore were added and divided by the sum of the value of GDP in these countries to derive the regional military expenditure as a percentage of GDP. To guard against the possibility that it was the strain/anomie theory that predicted the hazard of piracy attacks rather than military interventions or specific events, I included the control variable “Regional Misery Index”. It was computed as the sum of the unemployment rate and inflation rate in the regions concerned. 10 In the Malacca Strait cumulative trade is measured as the sum of export (fob) from South Korea, Japan, Macau, Hong Kong, China, Taiwan, Vietnam, Philippines, Thailand, Malaysia, Indonesia, Brunei and Singapore to the European Union, plus import (cif) from the European Union to these thirteen Asian countries/territories. The unit of measurement is USD millions. A similar method was used to calculate the value of cumulative trade passing through the South China Sea less Indonesia and Singapore since trades from these two countries do not pass through South China Sea. 15 Lastly, I use the temporal ordering of piracy attacks to create a success density measure. This measure is constructed by taking the current and two previous attacks, and calculating the probability of success for the current and two previous attempts divided by the duration of the current event from the second previous event, weighted by 365 days. A large success density would indicate a high success probability for most of the recent incidents. Lastly, I included a measure of officially reported attacks to account for the momentum of previous attacks. I observed from Table 1 that more than seventy percent of the attacks were reported to the relevant costal authorities. Also, the variables “Tankers”, “Container and Cargo Ships” and “NonCommercial Ships” were included to study the hazards and the likelihood of success against the different types of ships. RESULTS Figure 1 shows four time series illustrating the trends in piracy in the Malacca Strait and South China Sea from 1995 to 2010. Overall, it can be seen that Southeast Asia as a whole has experienced a drop in the number of attacks in recent years. The share of attacks committed in the region fell to approximately 10 percent of the worldwide total in 2009, compared to 18 percent in 2008 and more than 38 percent in 2003. The drop has been especially marked in the Malacca Strait, where there were two incidents in 2009, the same number as in 2008, and a drastic drop compared to the early 2000s (for instance, there were 28 incidents in 2003 and 38 in 2004). As expected, there is a significant correlation between yearly piracy attacks (r=0.664, p=0.007) in Malacca Strait and South China Sea. 16 <Insert Figure 1> The use of both vertical axes in Figure 1 allows the comparison of two trends in one graphic. The left vertical axis shows the number of attacks recorded for each region in a given year while the right vertical axis shows the percentage change of the number of attacks per year. The solid line in Figure 1 shows the trend in the number of attacks in Malacca Strait. For the years 19951998 and 2007-2008, the number of attacks was below the median of seventeen cases. In fact in 2008, only one attack was recorded and there were no further attacks till the end of the sampling period in 2010. The highest number of attacks recorded are in the years 2000 (One hundred and eighteen), 2004 (sixty) and 2004 (fifty-eight). Measured along the right vertical axis, the solid line with circle shows the yearly percentage change in the number of attacks in Malacca Strait. For the years 1997, 2001, 2002, 2005 and 2007 to 2010, the rate of change of attacks was below the average rate of minus thirty seven percent in the sampling period. The lowest rate of change occurred from 2007 to 2009, in which it dropped drastically by ninety two percent and one hundred percent respectively. There was an especially sharp rise in the rate of change of attacks from 1998 to 2000, where it increased by seven hundred and forty percent and one hundred and eighty one percent respectively. Turning over to South China Sea, the dash line in Figure 1 shows the trend in the number of attacks. For the years 1995, 1997, 1998, and 2006 to 2009, the number of attacks was below the median of ninety-eight cases. The region was relatively ‘calm’ during 2006 to 2009, with an average of only around sixty-nine cases. In the opposite end, the region was the most infested 17 with piracy during the period 1999 to 2004, with an average almost twice that of the ‘safest’ period. The peak occurred in the year 2000 with one hundred and forty five attacks recorded during the year. Measured along the right vertical axis, the dash line with cross shows the yearly percentage change in attack in South China Sea. For the years 1997 to 1998, 2001, 2004 to 2006, the rate of change of attacks was below the average rate of one point four percent in the sampling period. During the ‘safest’ period, the rate of change of attacks dropped sharply by twenty five percent, thirteen percent and thirty two percent. On the opposite end, the rate of change of attack reached its peak in the period 1998 to 1999, where there was a sharp increase of forty eight percent. Comparing the two regions, Figure 1 reveals that from 1995 to 1998, Malacca Strait had a lower year on year percentage change compared with South China Sea. From 1999 till the end of the sampling period, the volatility of the percentage change in Malacca Strait is much higher than that of South China Sea. Specifically, both time series peak in the year 1999 but Malacca Strait had a peak value that is about fifteen times larger than that in the South China Sea. SERIES HAZARD MODELS RESULTS <Insert Table 2> <Insert Table 3> 18 Table 2 and 3 shows the series hazard model results in Malacca Strait and South China Sea respectively for all attacks, attacks perpetuated in territorial water, international water and at port. Overall, the results provide strong evidence for the deterrence perspective. In Hypothesis 1, I predict that the hazard of piracy attacks will decrease when the certainty of apprehension increases. Consistent with H1, in Table 3 it is shown that during the period when CARAT takes place every year in South China Sea, the hazard of ships being attacks falls by around 12% 11 and the reduction is more prominent in international water, where ships have 26% lower hazard of being attacked. Secondly, Table 2 shows that ships have a 48% lower hazard of being attacked during the one-year period after the Indonesian Tsunami. The effects of MALSINDO in Malacca Strait also confirm the certainty of apprehension hypothesis H1. Compared with ships that were attacked before the introduction of MALSINDO, ships have 78% lower hazard of being attacked after MALSINDO was introduced. The biggest hazard reduction occurs at territorial water, where ships have nearly 95% lower hazard of being attacked. Next I examined the effects of Hainan Incident in South China Sea. According to Table 3, the hazard of ships being attacked is 43% greater in the one-year spell after the Hainan Incident. Therefore there is significant evidence in both regions to support Hypothesis 1. My second deterrence-related Hypothesis 2 predicts that the strength of the drive that motivates piracy has a negative effect on amenability to deterrence. In support, Table 2 shows that during 11 The hazard ratio is calculated by taking the exponential of the coefficient estimate. 19 Ramadan, ships have 38% greater hazard than non-Ramadan period of being attacked. In particular, piracy at the port area is 4.668 times higher during the month of Ramadan. Under Context, there are several significant results in Table 2 and 3. Firstly, it is shown that the value of trade passing through the Malacca Strait and South China Sea has a neutral impact on the hazard of ships being attacked. Secondly, the fact that every percentage increase in Regional Military Expenditure decreases the hazard of being attack by 71% is also another significant support for H1. The strain/anomie effects are also present since every percentage rise in Regional Misery Index increases the hazard of port piracy by 27%. The next two variables, Success Density and Reported Attack, are benefit related and based on the premise that pirates will be more likely to attempt piracy when the expected benefits of piracy increase. For every reported attack, the hazard of the next attack increases by 37%. My results support the conclusion that new piracy attacks will be more likely shortly after earlier attacks. Moreover, the hazard of a new piracy attack will increase by 1.3% in the Malacca Strait and 1% in the South China Sea when the most recent three attacks were successful and close together. By comparing these two coefficients, contagion effects are found to be driven mainly by all events instead of only successful events. Lastly, it is also noted that the hazard of attack in South China Sea drops by 10% if the ship type is container and cargo ships. However, the effects are reversed in the Malacca Strait, where container and cargo ships have 35% higher hazard. Perhaps this is because container ships need 20 to slow down in the busy but narrow and shallow Malacca Strait to avoid collision, making them vulnerable targets. LOGISTIC MODELS RESULTS The significance of the variable Success Density in Tables 2 and 3 indicate the existence of contagion effect. Given that the frequency of piracy attacks will increase following successful attacks, in this section I use the logistic models estimating success to study the characteristics and determinants of successful attacks. In the logistic regression, the dependent variable is “Success” which is a dummy variable that takes a value of “1” if the attack is successful and “0” otherwise 12. In Table 1, it is shown that approximately fifty four percent and sixty six percent of the attacks in Malacca Strait and South China Sea are successful. Similar to the findings in Figure 1, Figure 2 shows that during the sampling period, the yearly number of successful attacks in Malacca Strait and South China Sea are significantly correlated (r=0.561, p=0.024). According to both Figure 1 and 2, during 1996 to 2001 although there is an increasing number of a piracy attack in South China Sea, the number of those attacks which are successful is in fact declining. And, as we have seen, during the sampling period the volatility of the yearly percentage in both attacks and successful attacks in Malacca Strait is much greater than that of the South China Sea. 12 I use the column “Incident Details” in the data set to track trends in successful and non-successful piracy attacks from 1995 to 2010 in Malacca Strait and South China Sea. I defined success as when the pirates managed to board the ship and escaped with some valuables, managed to kidnap any crew(s) or when the ship is hijacked. 21 <Insert Figure 2> In Table 4 and 5 I report the estimated conditional odds ratio from a logistic regression analysis of variables measuring Military Intervention, Other Events and Context. The odds ratio reported measures the ratio of the odds of an event occurring in the successful group to the odds of it occurring in the non-successful group, holding fixed the values of other variables. All coefficients greater than one are risk factors of piracy attacks. <Insert Table 4> <Insert Table 5> Overall, the logistic model results provide support for the reactance effects. In Hypothesis 3 I examine whether pirates would re-establish their freedom of sea robberies through more aggressive attacks when their free behaviors are threatened with elimination. Indeed as shown in Table 2 and 4, there are significant evidences supporting H3. Although ships have 78% lower hazard of being attacked following the introduction of MALSINDO, the odds that a piracy attack was successful increased by 288.4 percent (388.4-100). Thus, the probability of a successful piracy attack increases from 0.511 to 0.773 13, indicating more aggressive attacks. The next series of findings relate to Other Events. As shown in Table 4, during the month of Ramadan, the odds that a piracy attack in Malacca Strait was successful dropped by 42.5 percent, 13 Calculated by holding all other variables at their mean. 22 indicating that the probability of a successful attack drop from 0.562 to 0.437. This finding is hardly surprising because fasting is obligatory for the Muslim pirates and consequently, attacks are less likely to be successful as they are physically weaker. Under Context, there is significant evidence in Table 4 to support the argument that the value of trade passing through Malacca Strait has no impact on the odds of successful attacks. Next, Tables 4 and 5 provide significant evidence to support Hypothesis 2, where the strength of the drive that motivates piracy has a negative effect on amenability to deterrence. It is shown that when livelihoods in the regions become more miserable, pirates are more motivated to succeed. In particular, for every one percent increase in the Misery Index, the odds of a successful attack increased by 4.90 percent in South China Sea. Strangely, the odds of a successful attack increased by 89.8 percent and 35.9 percent in the Malacca Strait and South China Sea respectively when it was reported to the coastal states. There is significant evidence indicating that non-commercial ships are much more prone to successful attacks as compared to tanker, containers and cargo ships. The odds of mounting a successful attack towards non-commercial ships is approximately 4.66 times (8.49/1.82) more than that of container and cargo ships in the Malacca Strait and twice (2.23/1.15) in South China Sea. The greatest disparity occurs in the international water along Malacca Strait, where noncommercial ships are 5.75 times (13.978/2.429) more likely to be victims of successful attacks as 23 compared to container and cargo ships. This region is the most dangerous ‘hotspot’ of successful attacks, since the odds ratios of successful attacks among all ship types are the highest. DISCUSSION AND CONCLUSIONS In this article, I identified a military intervention and four major events related to piracy and tested their impacts on subsequent attacks from 1995 to 2010. Overall, I conclude that the military intervention and three of the major events produced deterrence effects and reactance effect was observed in the military intervention. First, and most policy relevant, there is strong evidence in the results to support the hypothesis that new piracy attacks are less likely to be undertaken when the certainty of apprehension increases. The reduction in piracy in the Malacca Strait is often attributed to heightened anti-piracy efforts by littoral countries and improved cooperation between them since 2004 (Ong-Webb, 2006; Schuman, 2009). As a result, the military intervention MALSINDO greatly increased the objective probability of piracy apprehension in the Malacca Strait as it provided the means for each coastal state to conduct individual patrols in waters under its own jurisdiction whilst maintaining communications with each other for better coordination in hot pursuits. The results showed that the two major events, CARAT and Indonesian Tsunami, have strong deterrence effects on piracy. In these two events, the dominant presence of the international community, especially US military ships, aircrafts and personnel greatly increased the perceived probability of apprehension. They impose strong direct controls over the 24 environmental conditions in Malacca Strait and South China Sea by greatly increasing the perceived probability of apprehension. Moreover, deterrence effect alone might not fully justify the profound 48% lower hazard of attack along the Malacca Strait during the one-year period after the Indonesian Tsunami. Perhaps an additional effect, the strain/anomie effect, is at work here. It is possible that shortly after the tsunami, many impoverished local fishermen are hired by Non-Profit-Organizations (NGOs) to help out in the rescue operations. Since pervasive poverty is the main driver that pushes local fishermen into becoming common sea robbers to begin with, gainful employment opportunities would have eradicated a huge potential pool of pirates. Conversely, my findings indicate that the hazard of piracy attacks increases when deterrence effects are weaker. The Hainan Incident is a case in point. Without cross border hot pursuits, the objective probability of apprehension is much lower. Thus, the incidence of piracy increases after the Hainan Incident. The second policy relevant conclusion pertains to the determination of the pirates. I found that deterrence measures operating on potential pirates may be sufficiently influential to deter piracy that is weakly motivated but will fail to deter piracy that is strongly motivated. In the Ramadan month piracy is strongly motivated because pirates need extra money to get things ahead of Lebaran as well as to compensate for the loss in ‘income’ during the Lebaran period. 25 The third policy relevant conclusion is that the success of deterrence of piracy in Malacca Strait is undermined by the presence of reactance. While a significant deterrence effect is attributed to MALSINDO, my results indicate an adverse reactance effect to this policy. It could be argued that piracy in Southeast Asia is a form of “Free Behavior” because the impoverished local fishermen have both the relevant physical and psychological abilities to engage in it. Moreover, they know by general custom that, they may engage in it without any moral restraint and sanction. Therefore according to the reactance perspective, when their free behaviors are punished, a hostile, aggressive response on the part of the punished person is created, resulting in the higher probability of success in their next attack. Another significant finding is that the values of trade passing through the two areas have no effect on both the hazard of piracy attacks and the odds of successful attacks. This result could be reconciled by the fact that on one hand, increased trade meant the sheer frequency with which situations present themselves make crime both tempting and easy. On the other hand, increased trade also has a deterrence effect when the increased presence of ships, particularly those travelling in a convoy, prevents pirates from attacking. Both effects could have neutralized each other. There is no significant evidence to show that the existence and activities of guerrilla and terrorist groups in Southeast Asia affects the hazard of piracy in both regions. The pirates seem to be of a very different mindset to terrorists, and many of these pirates may not believe that 26 killing a large number of “innocent” people to further political aims is justifiable. Overall, terrorists, unlike pirates, aim at disrupting society, while criminals, especially organized crime criminals, tend to benefit from current political and economic arrangements. For example, if a major maritime terrorist attack was to occur in the Malacca Strait, the area would be heavily patrolled in the aftermath of the event to prevent further such acts. Subsequently, pirate attacks in these waters would become difficult to conduct, particularly if vessels were forced to choose different transit routes. Strong support exists for the conclusion that military expenditure leads to lower hazard of piracy. Higher military expenditure means greater presence of coastal enforcement. From the deterrence perspective, greater presence of coastal enforcement acts as a form of direct control on piracy as it reduces the environmental opportunities for crime. From the deterrence perspective, the greater presence of costal enforcement would indicate a higher certainty effect, thereby reducing crime. The results also reveal the presence of strain/anomie effects at work in piracy when higher Misery Index leads to greater hazard of being attack and more successful attacks. With the lack of legal employment opportunities and widespread poverty in some communities escalating especially in the aftermath of the 1997 Asian financial crisis, illegal activities are an alternative way to earn a living. As fish stock depletes in the region, some of the more desperate fishers turn to piracy as a source of income in a time of need, while more opportunistic fishers may use it to 27 earn extra cash or to supplement low catches. Unemployed and desperate fishers are also, in some cases, recruited by organized crime gangs to attack or hijack merchant vessels or tugs. For jobless and impoverished fishers, “employment” as a pirate by an organized gang may, therefore, be one of the few options left to earn an income. Lastly, my results indicate that non-commercial ships are much more susceptible to successful attacks than commercial ships. As fish stock depletes in the region, fishing boats need to venture farther into secluded ocean areas in order to increase their catch, thus making them vulnerable preys. Compared to commercial ships, they have lower side walls which make boarding by the pirates easy. They are also rarely equipped with pirate deterrent equipment such as high-pressure water hose or a safe room. Moreover, commercial ships are tracked by the automatic identification system (AIS) while most fishing boats are not. Thus, when commercial ships suddenly stop in their intended course when they encounter pirates, the coastal enforcement agencies would be notified. The lack of these pirate-prevention installations is probably another reason why non-commercial ships appear riskier than commercial ships. One counter-intuitive finding is that when an attack is reported to the coastal state, the probability of the next successful attack increases. This last point highlights one limitation in this study, which is the controversial nature of reporting a pirate attack. There are basically two issues, which are self-selection in reporting and under reporting. In the former case which explains the counter-intuitive finding, only successful attacks are reported because by reporting ship owners could file an official record with the coastal law enforcement which will later be 28 used as evidence to make an insurance claim. Thus, it will be misleading to use such data as the results will be consistently biased upwards. With regards to the problem of under-reporting, it was estimated that fifty per cent of all pirate attacks remain unreported for a variety of reasons. Some ship owners are reluctant to report attacks as they fear an investigation will delay their vessel’s operation, resulting in additional costs. Many also do not want to be branded as unreliable carriers of freight, or fear rising insurance costs. Additionally, attacks on fishing boats and other smaller craft are rarely reported to the IMO. Although this study is a first attempt at applying the deterrence and reactance framework to piracy in Southeast Asia, which is the most “pirate infested” region in the world between 1992 – 2006, much remains unknown in other pirate hotspots of the world. I envision an additional project to study the trends of piracy in the waters of Somalia and the Horn of Africa, which in 2008 has taken over the notorious title from Malacca Strait as a “war-risk” zone given by the Lloyd’s Joint War Committee. As no prior study of which I am aware has collected data and has applied formal statistics tests that compare the deterrence and reactance models, much more research assessing the magnitude of anti-piracy military interventions in the region are needed. 29 REFERENCES Allison, Paul D. 1995. Survival Analysis Using the SAS system: A Practical Guide. Cary, NC: SAS Institute Inc. Allison, Paul D. 2010. Survival Analysis Using SAS system: A Practical Guide, Second Edition. Cary, NC: SAS Institute Inc. Andenaes, Johannes. 1974. Punishment and Deterrence. Ann Arbor: University of Michigan Press. Azrin, N.H.1960. Sequential effects of punishment. Science. 131:605–606. Becker, Gary S. 1968. Crime and punishment: An economic approach. Journal of Political Economy 76: 169–217. Beckman, Robert C. and Roach, Ashley, J. 2012. Piracy and international maritime crimes in ASEAN: prospects for cooperation. Northampton, MA: Edward Elgar. Benson, Bruce L., Iljoong Kim, and David W. Rasmussen. 1994. Estimating deterrence effects: A public choice perspective on the economics of crime literature. Southern Economic Journal 61:160-168. Braithwaite, John. 1989. Crime, Shame and Reintegration. Cambridge, UK: Cambridge University Press Braithwaite, John. 2005. Pre-empting terrorism. Current Issues in Criminal Justice 17(96-114) Brantingham P.L. and Brantingham P.J. 1981. Notes on the geometry of crime, In P.J. Brantingham and P.L. Brantingham (Eds.), Environmental Criminology, Sage Publications, Beverly Hills, CA. Brehm Jack W. 1966. A Theory of Psychological Reactance, Academic Press, New York. Brehm, Stevens Sharon and Brehm Jack W. 1981. Psychological Reactance: A Theory of Freedom and Control. Academic Press. Chalk, Peter. 2000. Non-military security and global order: The impact of extremism, violence and chaos on national and international security. New York: St Martin’s Press. 30 Clarke, Ronald V. and Pat Mayhew.1980. Designing out Crime. London: H.M.S.O. Crowe, T. 2000. Crime Prevention through Environmental Design: Applications of Architectural Design and Space Management Concepts, 2nd Edition. Boston: Butterworth-Heinemann. Cox, D.R. 1972. Regression models and life tables, J.R. Statistical Society, Series B 34(184-220). Dugan, Laura, Nagin, Daniel S., Rosenfeld, Richard. 2003. Exposure reduction or retaliation? The effects of domestic violence resources on intimate partner homicide. Law Society Review 27 (169-198). Dugan, Laura, LaFree, Gary and Piquero, Alex R. 2005. Testing a rational choice of airline hijackings. Criminology 43(1031-1065). Dugan, Laura. 2011. The series hazard model: An alternative to time series for event data. Journal of Quantitative Criminology 27(379-402). Efron, B. (1977). The efficiency of Cox’s likelihood function for censored data. Journal of the American Statistical Association 72(557–565). Ehrlich, Isaac. 1972. The deterrent effect of criminal law enforcement. Journal of Legal Studies 1:259-276. Ehrlich, Isaac.1973. Participation in illegitimate activities: A theoretical and empirical investigation. Journal of Political Economy 81:521-567. Elleman, Bruce A., Forbes, Andrew and Rosenberg, David. 2010. Piracy and maritime crime: historical and modern case studies, Newport, R.I. : Naval War College Press. Eklöf, Stefan. 2006. Pirates in Paradise: A Modern History of Southeast Asia’s Maritime Marauders, Nordic Institute of Asian Studies (NIAS) Press, Copenhagen, Denmark. Farley, M.C.1993. International and Regional Trends in Maritime Piracy, 1989-1993. Naval Postgraduate School. Frecon, Eric. 2006. Piracy and Armed Robbery at Sea Along the Malacca Straits: Initial Impressions from Fieldwork in the Riau Islands, in Graham Gerard Ong-Webb (ed.), Piracy, Maritime Terrorism and Securing the Malacca Straits, Singapore: ISEAS Publishing. 31 Gibbs, Jack P. 1975. Crime, Punishment, and Deterrence. Amsterdam: Elsevier Scientific Publishing. Gottfredson, Michael R. and Travis Hirschi.1990. A General Theory of Crime. Stanford, Calif.: Stanford University Press International Maritime Bureau. 2012. Reports on acts of piracy and armed robbery against ships, London, UK. Jeffery, C. Ray. 1971. Crime Prevention through Environmental Design. Beverly Hills, CA: Sage Publications. Johnson, Derek and Valencia, Mark. 2005. Piracy in Southeast Asia: Status, Issues, and Response, jointly published by International Institute of Asian Studies, The Netherlands and Institute of Southeast Asian Studies, Singapore. Kenny, Courtney Stanhope. 1929. Outlines of criminal law, Cambridge: Cambridge University Press. Koknar, Ali M. 2005. “Corsairs at Starboard: Jihad at Sea”, Journal of Counterterrorism & Homeland Security International, Vol. 11, No. 1, pp36–41. LaFree, Gary, Dugan, Laura and Korte, Raven. 2009. The impact of British counterterrorist strategies on political violence in Northern Ireland: Comparing deterrence and backlash models, Criminology, 47(17-45). Liss, Carolin. 2010. Oceans of crime: Maritime piracy and transnational security in Southeast Asia and Bangladesh. Institute of Southeast Asian Studies, Singapore. Loughran Thomas A., Pogarsky Greg, Piquero Alex R. and Paternoster Raymond. 2012. Reexamining the functional form of the certainty effect in deterrence theory. Justice Quaterly 29: 712-741 Low Desmond.2008. Global Maritime Partnership and the Prospects for Malacca Straits Security. Pointer, Journal of the Singapore Armed Forces, Vol. 34 No. 2 Maslow, A.H. and Murphy, Gardner. 1954. Motivation and personality, New York: Harper & Brothers. 32 Mueller, G.O.W. and Adler, Freda. 1985. Outlaws of the ocean. The complete book of contemporary crime of the high seas, Hearst Marine Books, New York Nagin, Daniel S. 1998. Criminal deterrence research at the outset of the twenty-first Century. In Michael Tonry (ed.), Crime and Justice: A Review of Research, vol. 23. Chicago: University of Chicago Press. Nevin, John A. 2003. Retaliating against terrorists. Behavior and Social Issues 12:109–28. Newman, Oscar. 1972. Defensible space; crime prevention through urban design. The Macmillan, New York. Ong-Webb, Graham Gerard. 2006. Piracy, Maritime Terrorism and Securing the Malacca Straits, jointly published by International Institute of Asian Studies, The Netherlands and Institute of Southeast Asian Studies, Singapore. Paternoster, Raymond.1987. The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues. Justice Quarterly 4: 173–217. Sherman, Lawrence W.1992. Attacking crime: Police and crime control. In Michael Tonry and Norval Morris (eds.), Modem Policing. Chicago: University of Chicago Press. Sherman, Lawrence W.1995. The police. In James Q. Wilson and Joan Petersilia (eds.), Crime. San Francisco: ICS Press. Siqueira Kevin and Sandler Todd. 2007. Terrorist backlash, terrorism mitigation, and policy delegation, Journal of Public Economics, 91(1800-1815). Marvell Thomas B. and Moody Carlisle E. 1996. Specification problems, police levels, and crime rates, Criminology 34(609-646). Reinhart, B. 2012. International Maritime Piracy and Armed Robbery, Civil-Military Fusion Centre. Available at www.cimicweb.org Schuman, Michael. 2009. ‘How to defeat pirates: Success in the Strait,’ Time.com. Available at http://www.time.com/time/world/article/0,8599,1893032,00.html Sparrow, Malcolm K., Mark H. Moore, and David Kennedy. 1990. Beyond 911: A New Era for Policing. New York: Basic Books. 33 Stuart, Robert. 2001. In Search of Pirates: A Modern Day Odyssey in the South China Sea, Edinburgh; Mainstream Publishing Edinburgh LTD. Tyler, Tom R. 1990. Why People Obey the Law: Procedural Justice, Legitimacy, and Compliance. New Haven: Yale University Press. Vagg, Jon. 1995. Rough Seas? Contemporary piracy in South East Asia, British Journal of Criminology, 35(63-80) Young, A. 2007. Contemporary Maritime Piracy in Southeast Asia: History, Causes and Remedies, jointly published by International Institute of Asian Studies, The Netherlands and Institute of Southeast Asian Studies, Singapore. Zimring, Franklin and Gordon Hawkins. 1973. Deterrence. Chicago: University of Chicago Press. 34 800 Figure 1. Piracy Attacks in Malacca Strait and South China Sea, 1995 to 2010. 400 600 200 % change/year 100 -200 0 50 0 19 95 19 96 19 97 19 98 19 99 20 00 20 01 20 02 20 03 20 04 20 05 20 06 20 07 20 08 20 09 20 10 No. of Successful Attacks 150 Year Malacca Strait % change (Malacca Strait) South China Sea % change (South China Sea) 35 Figure 2. Successful Piracy Attacks in Malacca Strait and South China Sea, 1995 to 2010a. 400 200 0 % change/year 80 60 40 20 -200 No. of Successful Attacks 100 19 95 19 96 19 97 19 98 19 99 20 00 20 01 20 02 20 03 20 04 20 05 20 06 20 07 20 08 20 09 20 10 0 Year Malacca Strait % change (Malacca Strait) South China Sea % change (South China Sea) a The attack is defined as successful if the pirates managed to obtain valuables (tins of paints, ropes, ship equipment, crews’ personal belongings, cash on board, etc), crews are wounded or hijacked, or ship is hijacked together with her cargo. 36 Table 1. Descriptive Statistics, Piracy Attacks in Malacca Strait and South China Sea, 1995 to 2010 Malacca Strait South China Sea n=438 n=1678 Standard Minimum Maximum Standard Minimum Maximum Mean Deviation Value Value Mean Deviation Value Value 11.817 22.652 1 289 4.178 4.143 1 37 0.539 0.499 0 1 0.660 0.475 0 1 0.121 0.327 0 1 0.305 0.460 0 1 CARAT 0.144 0.352 0 1 0.174 0.379 0 1 Indonesian Tsunami 0.041 0.199 0 1 During Ramadan 0.108 0.310 0 1 0.089 0.285 0 1 17.477 17.929 0 93 120146.335 54200.197 67595.484 244837.452 Variable Days until next attack Successful Attack Military Intervention MALSINDO Other Events Hainan Incident Context Lagged Regional Terrorist Incidents Regional Trade Regional Military Expenditure Regional Misery Index 3.906 6.535 0 44 115389.474 34090.545 78943.284 241847.020 1.058 0.252 0.792 1.469 1.832 0.116 1.637 2.037 16.717 4.588 10.504 47.178 8.890 2.685 4.159 14.143 (omitted) (omitted) 0 ∞ (omitted) (omitted) 0 ∞ Last Success 0.541 0.499 0 1 0.660 0.474 0 1 Reported Attack 0.757 0.429 0 1 0.715 0.451 0 1 Tankers 0.307 0.462 0 1 0.230 0.421 0 1 Container and Cargo Ships 0.243 0.307 0 1 0.277 0.447 0 1 Non-Commercial Ships 0.270 0.444 0 1 0.159 0.365 0 1 Success Density 37 Table 2. Coefficients and Robust Standard Errors for Series Hazard Models, Piracy Attacks in Malacca Strait, 1995 to 2010 All Territorial Water International Water Port n=428 n=114 n=245 n=68 Coefficient Robust Coefficient Robust Std. Err . Estimates b Std. Err . 0.376 -2.871* 1.279 0.008 0.125 -0.480 0.338 0.146 0.186 -0.659* 0.341 0.923 -0.884† 0.468 0.323* 0.157 -0.335 0.263 0.283 0.192 1.735** 0.638 Lagged Regional Terrorist Incidents 0.002 0.006 -0.018* 0.008 0.007 0.009 0.088** 0.016 Regional Trade 0.000** 0.000 0.000† 0.000 0.000† 0.000 0.000 0.000 Regional Military Expenditure -1.231** 0.330 -2.034** 0.772 -1.552** 0.440 0.654 0.899 Regional Misery Index -0.013 0.013 -0.026 0.019 -0.010 0.014 0.239** 0.074 Estimates a Coefficient Estimates Robust Coefficient Robust Std. Err . Estimates Std. Errd. 0.581 -0.063 0.974 c Military Intervention MALSINDO -1.506** -1.869** Other Events CARAT Indonesian Tsunami During Ramadan 3.121** 0.506† 0.309 -20.161 . Context e Success Density 0.013** 0.001 0.021** 0.005 0.011** 0.001 0.021** 0.004 Reported Attack 0.313** 0.115 0.511* 0.233 0.387* 0.168 0.130 0.371 Tankers 0.096 0.143 0.513 0.352 0.192 0.133 0.382 Container and Cargo Ships Non-Commercial Ships 0.300* -0.204 -0.046 0.140 0.501 0.321 0.269 0.168 0.254 0.466 0.144 0.351 0.327 -0.276 0.187 0.667 0.471 †p≤0.10 *p≤0.05 **p≤0.01, all one-tailed tests a Standard Error adjusted for 377 clusters, bStandard Error adjusted for 106 clusters, cStandard Error adjusted for 217 clusters, dStandard Error adjusted for 66 clusters, e 𝑃𝑃(𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠 𝑓𝑓𝑓𝑓𝑓𝑓 𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐 𝑎𝑎𝑎𝑎𝑎𝑎 𝑡𝑡𝑡𝑡𝑡𝑡 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎) (𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒 𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐 −𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒 𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 )/365 38 Table 3. Coefficients and Robust Standard Errors for Series Hazard Models, Piracy Attacks in South China Sea, 1995 to 2010 All Territorial Water International Water Port n=1669 n=744 n=349 n=569 Coefficient Robust a Coefficient Robust Estimates b Coefficient Robust Coefficient Robust Std. Err . Estimates Std. Errd. c Estimates Std. Err . -0.310* 0.132 -0.377 0.239 -0.858** 0.304 -0.006 0.187 -0.126† 0.065 -0.143 0.100 -0.298* 0.141 -0.045 0.103 Std. Err . Estimates Military Intervention MALSINDO Other Events CARAT Hainan Incident 0.357** 0.098 Lagged Regional Terrorist Incidents 0.001 0.002 Regional Trade 0.000 Regional Military Expenditure 0.529** 0.128 0.480** 0.172 -0.057 0.152 -0.001 0.003 0.004 0.003 0.003 0.003 0.000 0.000 0.000 0.000* 0.000 0.000 0.000 0.500 0.329 0.635 0.483 -0.152 0.649 0.439 0.605 -0.016 0.013 -0.013 0.016 -0.049* 0.024 0.015 0.027 0.001 0.011** 0.001 Context Regional Misery Index e Success Density 0.010** 0.001 0.010** 0.001 0.009** Reported Attack -0.100 0.070 -0.107 0.093 -0.180 0.147 -0.081 0.162 Tankers -0.104† 0.058 -0.107 0.087 -0.092 0.124 -0.146 0.096 Container and Cargo Ships -0.101† 0.062 -0.149† 0.089 -0.109 0.133 -0.060 0.102 Non-Commercial Ships -0.065 0.070 -0.068 0.102 -0.129 0.140 0.050 0.188 †p≤0.10 *p≤0.05 **p≤0.01, all one-tailed tests a Standard Error adjusted for 1358 clusters, bStandard Error adjusted for 664 clusters, cStandard Error adjusted for 312 clusters, dStandard Error adjusted for 511 clusters, e 𝑃𝑃(𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠 𝑓𝑓𝑓𝑓𝑓𝑓 𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐 𝑎𝑎𝑎𝑎𝑎𝑎 𝑡𝑡ℎ𝑟𝑟𝑟𝑟𝑟𝑟 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎) (𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒 𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐 −𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒 𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑡𝑡ℎ𝑖𝑖𝑖𝑖𝑖𝑖 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 )/365 39 Table 4. Odds Ratios and Robust Standard Errors for Logistic Models Estimating Success, Piracy Attacks in Malacca Strait, 1995 to 2010 All Territorial Water International Water Port n=437 n=115 n=250 n=67 Odds Robust Ratio a Std. Err . Odds Robust Ratio b Std. Err . Odds Robust Odds Robust Ratio c Std. Err . Ratio Std. Errd. 5.387 0.404 0.712 Military Intervention MALSINDO 3.884† 2.925 15.501 27.272 5.300† Other Events CARAT 2.128* 0.711 8.413* 7.378 1.857 0.837 0.875 0.741 Indonesian Tsunami 0.493 0.357 1.000 (omitted) 0.365 0.346 1.000 (omitted) During Ramadan 0.585† 0.195 0.985 0.576 0.603 0.278 1.000 (omitted) Lagged Regional Terrorist Incidents 0.986 0.019 0.994 0.033 0.968 0.019 1.015 0.052 Regional Trade 1.000** 0.000 1.000 0.000 1.000** 0.000 1.000 0.000 Regional Military Expenditure 1.907 1.160 3.324 4.117 1.937 1.660 0.326 0.549 Regional Misery Index 1.008 0.020 0.997 0.027 1.017 0.029 1.155† 0.126 Last Success 1.260 0.276 0.789 0.358 1.625 0.487 0.640 0.449 Reported Attack 1.898* 0.535 1.247 0.602 2.064† 0.874 5.308† 5.563 Context Tankers 3.057** 0.957 2.469 1.536 4.063** 1.876 1.224 0.996 Container and Cargo Ships 1.820† 0.605 2.513 1.7804 2.429* 1.089 0.388 0.418 Non-Commercial Ships 8.490** 3.104 8.433** 5.958 13.978** 7.048 2.200 2.391 †p≤0.10 *p≤0.05 **p≤0.01, all one-tailed tests a Standard Error adjusted for 378 clusters, bStandard Error adjusted for 106 clusters, cStandard Error adjusted for 219 clusters, dStandard Error adjusted for 65 clusters 40 Table 5. Odds Ratios and Robust Standard Errors for Logistic Models Estimating Success, Piracy Attacks in South China Sea, 1995 to 2010 All Territorial Water International Water Port n=1677 n=750 n=351 n=574 Odds Robust Ratio a Odds Robust Std. Err . Ratio b Odds Robust Odds Robust Std. Err . Ratio c Std. Err . Ratio Std. Errd. 0.967 0.256 1.912 1.019 0.470 0.275 0.899 0.361 CARAT 1.097 0.153 0.927 0.212 1.820† 0.623 0.834 0.193 Hainan Incident 0.494** 0.089 0.706 0.197 0.205** 0.109 0.429* 0.145 Regional Terrorist Incidents 0.999 0.004 1.002 0.007 1.004 0.008 0.993 0.007 Regional Trade 1.000 0.000 1.000 0.000 1.000 0.000 1.000 0.000 Regional Military Expenditure 1.023 0.154 0.845 0.213 0.579 0.202 1.747† 0.502 Regional Misery Index 1.049* 0.025 1.117** 0.034 0.974 0.049 1.053 0.059 Last Success 1.004 0.111 1.357† 0.222 0.722 0.180 0.762 0.157 Reported Attack 1.359* 0.183 1.244 0.228 2.420** 0.764 0.811 0.245 Tankers 1.192 0.169 1.355 0.302 2.074* 0.648 0.897 0.214 Container and Cargo Ships 1.147 0.154 1.494* 0.301 1.330 0.426 0.954 0.225 Non-Commercial Ships 2.234** 0.391 3.464** 0.912 2.458** 0.808 2.870* 1.480 Military Intervention MALSINDO Other Events Context †p≤0.10 *p≤0.05 **p≤0.01, all one-tailed tests a Standard Error adjusted for 1360 clusters, bStandard Error adjusted for 666 clusters, cStandard Error adjusted for 314 clusters, dStandard Error adjusted for 515 clusters 41
© Copyright 2026 Paperzz