In this Book

ISEAS–Yusof Ishak Institute
buy this book Buy This Book in Print
summary
Southeast Asia and Bangladesh are at present global hot spots of pirate attacks on merchant vessels and fishing boats. This book explains why, and in what form, piracy still exists. It offers an integrated analysis of the root causes of piracy, linking declining fish stocks, organized crime networks, radical politically motivated groups, the use of flags of convenience, the lack of state control over national territory, and the activities of private security companies, and identifies their wider security implications.

Table of Contents

  1. Cover
  2. restricted access Download |
  1. Title Page, Copyright
  2. restricted access Download |
  1. Contents
  2. p. vii
  3. restricted access Download |
  1. Maps, Tables, and Photos
  2. pp. xi-xiv
  3. restricted access Download |
  1. List of Abbreviations
  2. pp. xv-xvi
  3. restricted access Download |
  1. Acknowledgements
  2. pp. xvii-xviii
  3. restricted access Download |
  1. Introduction
  2. pp. 1-18
  3. restricted access Download |
  1. PART I: CONTEMPORARY PIRACY IN SOUTHEAST ASIA AND BANGLADESH
  2. pp. 19-20
  1. 1. Pirate Attacks on Merchant Vessels in Southeast Asia and Bangladesh, 1980-2006
  2. pp. 21-54
  3. restricted access Download |
  1. 2. Piracy and Fishers: Attacks on Small Craft in Southeast Asia and Bangladesh
  2. pp. 55-96
  3. restricted access Download |
  1. PART II: THE SEA
  2. pp. 97-98
  1. 3. The Fishing Industry
  2. pp. 99-134
  3. restricted access Download |
  1. 4. Merchant Shipping
  2. pp. 135-170
  3. restricted access Download |
  1. PART III: THE DARK SIDE
  2. pp. 171-172
  1. 5. Organized Crime
  2. pp. 173-219
  3. restricted access Download |
  1. 6. Terrorist and Guerrilla Movements
  2. pp. 220-264
  3. restricted access Download |
  1. PART IV: COUNTER-FORCES
  2. pp. 265-266
  1. 7. State Responses to Piracy
  2. pp. 267-320
  3. restricted access Download |
  1. 8. Privatizing the Fight against Piracy
  2. pp. 321-358
  3. restricted access Download |
  1. Conclusion
  2. pp. 359-362
  3. restricted access Download |
  1. Appendix 1
  2. pp. 363-365
  3. restricted access Download |
  1. Appendix 2
  2. pp. 366-368
  3. restricted access Download |
  1. Bibliography
  2. pp. 369-406
  3. restricted access Download |
  1. Index
  2. pp. 407-425
  3. restricted access Download |
  1. About the Author
  2. p. 426
  3. restricted access Download |
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.