Anti Piracy

In: Social Issues

Submitted By cashelle
Words 9889
Pages 40
BMP3
Best Management Practice 3 Piracy off the Coast of Somalia and Arabian Sea Area
INDIA

MALDIVES

Produced and supported by:

IGP &I

IMB

BIMCO
Somalia

UKMTO

EU NAVFOR

BMP3
Best Management Practices to Deter Piracy off the Coast of Somalia and in the Arabian Sea Area
(Version 3 – June 2010)

Suggested Planning and Operational Practices for Ship Operators, and Masters of Ships Transiting the Gulf of Aden and the Arabian Sea i First Printed June 2010 ISBN 978 1 85609 397 2

Terms of Use The advice and information given in this booklet (“Booklet”) is intended purely as guidance to be used at the user’s own risk. No warranties or representations are given nor is any duty of care or responsibility accepted by the Authors, their membership or employees of any person, firm, corporation or organisation (who or which has been in any way concerned with the furnishing of information or data, the compilation or any translation, publishing, supply of the Booklet) for the accuracy of any information or advice given in the Booklet or any omission from the Booklet or for any consequence whatsoever resulting directly or indirectly from compliance with, adoption of or reliance on guidance contained in the Booklet even if caused by a failure to exercise reasonable care on the part of any of the aforementioned parties.

Printed & bound in Great Britain by Bell & Bain Ltd. Glasgow

Published in 2010 by Witherby Seamanship International Ltd, 4 Dunlop Square, Livingston, Edinburgh, EH54 8SB, Scotland, UK Tel No: +44(0)1506 463 227 Email: info@emailws.com www.witherbyseamanship.com

ii

Contents
Section 1 Section 2 Section 3 Section 4 Section 5 Section 6 Section 7 Section 8 Section 9 Introduction Somali Pirate Activity Risk Assessment Typical Pirate Attacks Implementing BMP Company Planning Masters’ Planning Prior to Transit – Voyage Planning…...

Similar Documents

Piracy

...girl unless she was forced. Pirates often turned to piracy in protest against oppressive conditions at home or on merchant ships. The life of a free unrestrained outlaw is what they sought. While there aren’t very many real pirates left in the world today we do still have a major problem with piracy. Pirates no longer require war ships, daggers or swords just computers and advanced technology. People who rebel against the common laws of our nations and who only care about filling their pockets and about their own well-being. Today’s pirates are pirates of technology, stealing information from cds’, dvds’, blue rays’ and computer software. Easy money with little work and a huge return. We can see movies not yet released, listen to music that hasn’t come available yet and get the latest computer software at half the cost. For some people, these pirates are awesome and saves them a bunch of money they either don’t have or don’t want to spend. Others just consider them thieves. They are stealing information from corporations and movie companies and costing them billions of dollars each year. These are people who cheat the system and should suffer the consequences. Piracy affects all of us. It starts with the movie companies and corporations losing money therefore the artist or creator of the information loses money and that loss is passed down to the average consumer who actually goes to the store to buy a movie or cd. Piracy is quite obviously an accepted method of receiving......

Words: 621 - Pages: 3

Benefits of Piracy - Research Paper

...Internet Piracy has become a hot topic as of late with all the recent cyber security bills being purposed in congress. Many companies that own intellectual property want these bills to pass, this will allow them to better defend their intellectual property against would be pirates. The three benefits to software piracy are the removal or price conscious consumers from the market, showing interest in the product, and give the owner company’s word of mouth advertising. Software piracy is a complicated issue, although the person pirating the piece of software is technically stealing, they are only stealing time and ideas. There is no physical item missing from the creator of the software. Software piracy is the unauthorized copying of computer software. Many countries around the world have copyright laws which apply to software piracy but the extent of enforcement differs. These copyrights usually surpass the practical life of the product (US Government). Today the oldest programs for computers have copyrights will not expire till the year 2030. These programs are forty years old, that’s a sixty year old copyright for a program that is about as useful as an ejector seat on a helicopter. The changes in operating systems, network environments, and user expectations generally make software programs out of date faster than the copyright runs out (Wikipedia). A law that has been proposed is the U.S. Uniform Computer Information Transaction Act (UCITA); this law is very......

Words: 1136 - Pages: 5

Piracy

...Klodd Moore Mr. Vauhn EN 1320 8/7/13 Piracy vs. Copyright Violation The ongoing dispute over illegal Internet-based file sharing between the entertainment and software industries and the vast, online pirating community has been one of the most debated topics. Gripping public attention for the past decades. Napster, a website created by a college dropout became an empire. Used by hundreds of millions of people, that robs billions in revenue each year. Although these rogue websites claimed to only be hosts for illegal file sharing, the United States government took action to eliminate Internet piracy and protect copyright by implementing digital encryption technologies and strict laws that prohibit tampering with these encryptions. The trafficking of copyrighted goods must be put to an end because it promotes illegal transactions of an owner’s intellectual property, causing sales in the entertainment and software industries to plummet and thereby restricts the growth of the economy. Internet piracy is the unlawful reproduction and/or distribution of any copyrighted digital file without the permission from the owner. It is driven by the consumers demand for a desirable product that would otherwise be unobtainable, either because of financial limitations or cultural factors, such as the Chinese culture’s emphasis that the free sharing of knowledge creates and preserves both civilization and traditional values across generations (Lu 310). Consequently, such a mindset that......

Words: 1422 - Pages: 6

Software Piracy

...positive, however; with the increased anonymity and ease of sharing information, piracy has become a very real issue for companies, both in and out of the workplace. Piracy can be segmented into two main industries; the multimedia industry which involves the copying of songs, videos and games, and the software industry which is the copying of software licences. For the purpose of this paper, we will be discussing the implications of software piracy, its effects on everyday businesses, and also briefly cover the effects on the industry itself. We will apply the theoretical framework and specify what this issue means to business managers in a practical setting. History Software Piracy originated in the 1960’s when the CD-RW drive was invented and floppy disks were traded. Since that time, the industry has grown significantly, especially in developing countries, resulting in billions of dollars of lost economic benefits and tax revenue. Prior to the 1980’s, one could pirate software without any legal implications. However, in the late 1970’s, Bill Gates, founder of Microsoft, lobbied for legislation to protect the integrity of software. When an individual or organization purchases software, it is the license to use the software that is purchased, not the software itself. As a result, Software Piracy is now an illegal act in most countries. One of the main advantages of Software Piracy is cost: the software is free or almost free to obtain. In addition, the......

Words: 1911 - Pages: 8

Omalia State Failure, Piracy

...do? &operation=go&searchType=0 &lastSearch=simple&all=on&titleOrStdNo=0042-6571 50TH ANNIVERSARY COMMEMORATIVE ESSAY Somalia: State Failure, Piracy, and the Challenge to International Law MARIO SILVA* Introduction .......................................................................................... I. T he Failed State ......................................................................... A . In General ........................................................................ B. Case Study: Somalia ........................................................ 1. Political Instability in Somalia ............................. 2. Economic Instability in Somalia .......................... 3. Humanitarian Challenges and Societal Instability in Somalia ............................................ II. P iracy ......................................................................................... A . In General ........................................................................ B. International Treaties and International Actions to Halt P iracy ............................................................................... 1. Actions Taken by the United Nations .................. 2. Other Actions Taken by the International C ommunity ........................................................... C. Challenges to Anti-Piracy Actions .................................. Conclusion......

Words: 11276 - Pages: 46

Counterfeiting and Piracy

...What are counterfeiting and piracy? Counterfeiting and piracy are terms used to describe a range of illicit activities linked to intellectual property rights (IPR) infringement. Those are longstanding problems which are growing in scope and magnitude. Quantitative analysis carried out by the OECD indicates that the volume of tangible counterfeit and pirated products in international trade could be up to USD 200 billion. With a figure like this, sales of counterfeit goods world-wide exceed the GDP of approximately 150 States on the planet. This figure does not, however, include counterfeit and pirated products that are produced and consumed domestically, nor does it include the significant volume of pirated digital products that are being distributed via the Internet. If these items were added, the total magnitude of counterfeiting and piracy worldwide could well be several hundred billion dollars more. In spite of all the efforts made up to now, counterfeiting and piracy are a plague that affects practically every economy on the planet and, what is more, they are expanding rapidly via various distribution channels that obviously include the Internet. In 2006, all the records were smashed with more than 250 million counterfeit articles intercepted at European borders, compared with 75 million the previous year. The number of seizures also exploded, increasing from 26,000 to 37,000 from one financial year to the next. Some see the rise in counterfeiting of goods......

Words: 1458 - Pages: 6

Software Piracy

...Copyright and Book Piracy in Pakistan Khalid Mahmood Department of Library & Information Science, University of the Punjab, Lahore Muhammad Ilyas Department of Library & Information Science, University of Balochistan, Quetta Copyright Defined Copyright is a legal term describing rights given to creators for their literary and artistic works. Kinds of works covered by copyright include: literary works such as novels, poems, plays, reference works, newspapers and computer programs; databases; films, musical compositions, and choreography; artistic works such as paintings, drawings, photographs and sculpture; architecture; and advertisements, maps and technical drawings. Legal Definition of Copyright According to The Copyright Ordinance, 1962 The exclusive right to reproduce the work in any material form to publish the work to perform the work in public to produce, reproduce, perform or publish any translation of the work to broadcast the work to make any adaptation of the work Book Piracy Deliberate infringement of copyright on intellectual property and an absolute disregard for ownership or authorship of literary works OR Using another person’s opinion, ideas or works as if they were one’s own and without making any attempt at acknowledging their true source The Berne Convention Adopted by an international conference held in 1886 at Berne, Switzerland 8th amendment in 1979 Salient features: National......

Words: 1254 - Pages: 6

Internet Piracy

...In recent years, internet piracy or "file sharing" of copyrighted material has gained much popularity. It is a topic that has incessantly sparked debate and has even received global attention. Although on the surface the act of file sharing may seem harmless, it is far from it. Each year, film and record production companies as well as software and video game development companies suffer from billions of dollars in lost profits. This loss comes as a direct result of internet piracy. Many agree that file sharing is unethical and consider it to be no different than downright theft. On the other hand, there are those that support file sharing and claim that their actions are easily justified and ethical. This essay will provide a brief overview and history of file sharing, will consider the arguments of each side, and will offer my personal observations and stance on the issue. File sharing, put simply, is the process of making available and distributing files via the internet. Many freely developed applications have been made available that simplify this process, providing the ability to easily search for, download, and upload any piece of digital content imaginable. These applications are commonly referred to as P2P or peer-to-peer applications as they allow individuals (peers) to directly connect with other peers to share files. By themselves, such applications are useless; a central network must be available that allows each peer to see one another. These......

Words: 1482 - Pages: 6

Piracy

...COMM 340 (03) Team #6 PIRACY: AVOIDING ATTACKS AND MINIMIZING THE IMPACTS Brock Josuttes 11094753 Nathan Keck 11123768 Josh MacGowan 11108277 Brittany Saunders 11099828 Brenley Schaan 11142699   PIRACY:  AVOIDING  ATTACKS  AND  MINIMIZING  THE  IMPACTS   2   TABLE OF CONTENTS Introduction .......................................................................................................................3 Anticipation .......................................................................................................................3 Location Risk ....................................................................................................................4 Northern and Western Indian Ocean.............................................................................4 Southeast Asia ..............................................................................................................4 Gulf of Guinea ...............................................................................................................4 Economic Risk ..................................................................................................................5 Prevention of Piracy (Currently Used Methods) ...............................................................5 Security .........................................................................................................................6 Strategic Route Selection ...............

Words: 3256 - Pages: 14

Internet Piracy

...Course Project: Internet Piracy Author Note This paper was prepared for ENG-135 Course Project Abstract Internet Piracy is defined as: Downloading copyrighted material without financial compensation to the copyright holder. The purpose of this paper is to review digital piracy and to present the positive impacts and its benefit it has on businesses,publishers, and producers. Many people think that software piracy is hurting the economy, but this essay will give you reason to believe that this can open up new doors and allow everyone to enjoy content and information that would not have been so easily accessible in the past. Just because some may not make as much profit from this form of obtaining content, others will gain off of it. Piracy is one of the most frequently committed crimes in the world and many people do not even realize it. Although, if you were to look at it in a different perspective, it may not seem like a crime at all. Today 70 percent of online users don’t see illegal downloading as a form of “theft”(Wayne Scholes,2014). Most successful artists or producers make tens of millions of dollars every year. How much is piracy really hurting people? If it were truly hurting anyone then these people would not live in houses larger than the white house. Organizations like the MPAA or The Motion Picture Association of America is an association that represents six major Hollywood studios. These organizations......

Words: 1750 - Pages: 7

Software Piracy

...Software Piracy in Pakistan Piracy is considered to be illegally spreading of anyone’s work. Being an illegal act measures should be taken to ban it and violators should be punished. The history of piracy goes back to the ancient times when people started trading and they were robbed in their ways to the destination. In the 20th century the word piracy was expanded to redistributing, selling or copying of some ones work without one’s consent. With the advancement of technology and individual work, the piracy on individual or company level is also becoming a burning issue. For instance radio piracy consists of unofficial and part-time broadcasting of different channels. Similar is the case of electronic media where stealing and distribution of CDs, DVDs, softwares, soft copies of documents and other stuff has become common. Among these piracies of electronic media, illegal use of softwares is the utmost issue of today’s world of technology. Software piracy is the illegal copying, distribution, unauthorized resale, software counterfeiting and cracking for personal use. It is obviously an illegal act as it is considered as confiscating one’s intellectual property. In software piracy, software is purchased by one person for one single computer or organization & it is then duplicated as backup or given to other people for their personal use. The different types of software piracy include end user piracy, reseller piracy, trade name infringement and internet piracy. These all......

Words: 2501 - Pages: 11

Software Piracy

...Week 1 Assignment Software piracy is the illegal copying, distribution, or use of software. It is such a profitable "business" that it has caught the attention of organized crime groups in a number of countries. When you purchase a commercial software package, an end user license agreement ( EULA) is included to protect that software program from copyright infringement. Typically, the license states that you can install the original copy of software you bought on one computer and that you can make a backup copy in case the original is lost or damaged. You agree to the licensing agreement when you open the software package (this is called a shrink wrap license), when you open the envelope that contains the software disks, or when you install the software. 2 organizations that that work to prevent software piracy is SIIA and FAST. The Software & Information Industry Association (SIIA) is a trade organization for the software and digital content industry. SIIA offers global services in business development, government relations, corporate education, and intellectual property protection to companies. It also advocates a legal and regulatory environment that benefits the entire industry. The Federation Against Software Theft was set up in 1984 by the British Computer Society's Copyright Committee, and was the first software copyright organization in the U.K. Its first action was to raise the awareness of software piracy and to lobby the U.K. Parliament for changes in the......

Words: 490 - Pages: 2

Piracy

...economic issue and how Pfizer Incorporated, as part of the American research-based pharmaceutical industry approached it. The paper examines the history of counterfeiting and reasons why China had become a significant global source for fake products. The author discusses the degree to which illegal counterfeiting of western-made goods is undertaken in China. The paper examines the role of industry, governments and consumers in the trade of goods produced as a result of intellectual property piracy. The author concludes his paper by drawing a parallel between Chinese action in global political matters and its approach to global trade matters. - THIS PAGE INTENTIONALLY LEFT BLANK - TABLE OF CONTENTS ABSTRACT III PREFACE vii PRODUCT COUNTERFEITING IN CHINA AND ONE AMERICAN COMPANY’S RESPONSE 1 Historical synopsis of Chinese – U.S. relations 2 Chinese transition to world economy 3 Pfizer Incorporated 5 The counterfeiting problem 7 Pfizer’s Anti-Counterfeiting Efforts 10 Pfizer’s Road Ahead 14 Other Corporate responses 16 THE Chinese position 18 American governmental efforts 20 chinese intentions 21 ENDNOTES 23 BIBLIOGRAPHY 27 - This Page Intentionally Left Blank - PREFACE As one of seven military officers participating in the Secretary of Defense Corporate Fellows Program (SDCFP) during academic year 2002/3, I have had the tremendous opportunity to participate in the daily operations of......

Words: 8985 - Pages: 36

Piracy

...Piracy- Now a major offense PHI 300 SEC 1 EMPL ID 773958 In America, the RIAA (Recording Industry Association of America) is the trade organization that works to protect intellectual property of artists and music labels. They attempt to prevent piracy of artists’ work by in some cases prosecuting offenders. According to the RIAA, global piracy causes $12.5 billion of economic losses every year, 71060 U.S. jobs lost, a loss of $2.7 billion in workers earnings (RIAA). How exactly then do prosecutors solve this issue? Their answer is to sue for excessive amounts, and even prosecuting to where it can lead up to 5 years in prison. One prime example of this unfair justice is the fairly new case involving Jammie Thomas-Rasset, who illegally downloaded over 1700 songs from a p2p network. It is unethical for such a corporation to incarcerate or even sue for such a misdemeanor offense (Barret, 2010). The evolution of how we obtain music has become easier to the public due to programs that allow people to download single songs or even albums, preventing them from having to leave their homes. Although it may seem effortless, downloading music has some stipulations that go along with how you are receiving the files. Basically what it boils down to is, if you did not pay for it, then it is illegal and considered piracy (RIAA). Illegal actions should be dealt with, but the question is, “Should the RIAA be rewarded such unruly amounts of cash, or better yet send people to jail......

Words: 1326 - Pages: 6

Imo Counter Piracy Policy

...IMO Policy on Repressing of Piracy and Armed Robbery against Ships in the Western Indian Ocean and the Gulf of Aden (Horn of Africa region) Foreword: piracy in the Horn of Africa The United Nations (UN) and in particular the International Maritime Organization (IMO) have assertively tackled piracy since 2006.1 This effort is a response to the escalation of violence and the expansion of Somali piracy in the Horn of Africa, where, since 2004, ships, seafarers and property are constantly threatened by acts of piracy. Pirates are menacing shipping traffic close to vital choke points (Suez Canal, Hormuz Strait), disrupting freedom of navigation and the free movement of goods by sea, as well as jeopardizing regional stability. There is a strong body of evidence that Somali piracy is a tangible threat to the maritime community as a whole: however, IMO response (as a part of International Community action) has been seen as insufficient in order to efficiently fight pirates. This paper underlines positive and negative aspects of IMO counter-piracy policy, drawing the conclusion that despite substantial flaws and lack of pragmatism IMO action provides an essential catalyst able to orchestrate an international, comprehensive response against Horn of Africa piracy. Policy identification and implementation Current IMO counter-piracy policy is underpinned by an articulated set of papers, recommendations and agreements, which has been developed since 1998 and whose roots are even deeper.......

Words: 1715 - Pages: 7

Volkswagen ( VW ) Kever ( Beetle) Cabriolet 1979 black with black top | Tiffany-Ellen Robinson | Dark Tourist