416
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Frogmen and pirates: the utility of special operations forces for small states against for-profit, illicit networks

ORCID Icon
Pages 292-311 | Received 13 Aug 2020, Accepted 22 Apr 2021, Published online: 06 May 2021

References

  • Affi, L., A. A. Elmi, W. Knight, and A. Said Mohamed. 2016. “Countering Piracy through Private Security in the Horn of Africa: Prospects and Pitfalls.” Third World Quarterly 37 (5): 934–950. doi:10.1080/01436597.2015.1114882.
  • Ball, R. 2011. “The Strategic Utility of New Zealand Special Forces.” Small Wars and Insurgencies 22 (1): 119–141. doi:10.1080/09592318.2011.546594.
  • Bridger, J. M. 2013. “The Rise and Fall of Somalia’s Pirate King.” Foreign Policy, November 2013. https://foreignpolicy.com/2013/11/04/the-rise-and-fall-of-somalias-pirate-king/
  • Bueger, C. 2015. “Learning from Piracy: Future Challenges of Maritime Security Governance.” Global Affairs 1 (1): 33–42. doi:10.1080/23340460.2015.960170.
  • Bueger, C. 2018. “Territory, Authority, Expertise: Global Governance and the Counter-Piracy Assemblage.” European Journal of International Relations 24 (3): 614–637. doi:10.1177/1354066117725155.
  • Byman, D., and I. A. Merritt. 2018. “The New American Way of War: Special Operations Forces in the War on Terrorism.” The Washington Quarterly 41 (2): 79–93. doi:10.1080/0163660X.2018.1484226.
  • Casal,J., Clement,V. W. C.; Esen,F., Fernando,F. M. U., Gorrissen, C., Kisaka, G. L., Lamair, D., Levine, T. A., Roos,P. R., Stephenson,K. M., Yikona, S. .2013. Pirate Trails: Tracking the Illicit Financial Flows from Pirate Activities off the Horn of Africa. Washington D.C.: World Bank.
  • Danish Ministry of Foreign Affairs. 2021. “Denmark Deploys a Vessel Contribution in order to Fight the Pirates in the Gulf of Guinea.” March 16. https://um.dk/en/news/newsdisplaypage/?newsid=6da331b4-b01c-4781-857f-6aa2ab42ee12
  • Duijn, P. A. C., V. Kashirin, and P. M. A. Sloot. 2015. “The Relative Ineffectiveness of Criminal Network Disruption.” Nature Scientific Reports 4 (1): 1–15.
  • Eriksson, G., U. Pettersson, and U. Molin. 2017. “Introduction.” In Special Operations from a Small State Perspective: Future Security Challenges, edited by Eriksson, G. and U. Pettersson. Cham: Palgrave Macmillan.
  • Felbab-Brown, V. 2017. “Organized Crime, Illicit Economies, Civil Violence & International Order: More Complex Than You Think.” Daedalus 146 (4): 98–111. doi:10.1162/DAED_a_00462.
  • Finlan, A. 2008. Special Forces, Strategy and the War on Terror: Warfare by Other Means. London: Routledge.
  • Finlan, A. 2019. “A Dangerous Pathway? Toward A Theory of Special Forces.” Comparative Strategy 38 (4): 255–275. doi:10.1080/01495933.2019.1633181.
  • Gebhard, C., and S. J. Smith. 2015. “The Two Faces of EU–NATO Cooperation: Counter-piracy Operations off the Somali Coast.” Cooperation and Conflict 50 (1): 107–127. doi:10.1177/0010836714532917.
  • Gray, C. S. 1999. Explorations in Strategy. Westport: Praeger Publishers.
  • Grimeland, T., and O. Van Der Veen 2016. “Maritime SOF in the Littorals: Theoretical Principles for Successful Littoral Special Operations”. Master thesis, Monterey: Naval Postgraduate School.
  • Henningsen, T. B. 2019. “Dare to Know: The Problem of Overcoming Information Asymmetry for Special Operations Forces in Military Assistance Operations.” Special Operations Journal 5 (2): 162–178. doi:10.1080/23296151.2019.1671097.
  • International Maritime Organization. 2021. IMO Urges Action to Deter Piracy in Gulf of Guinea. February 14, https://www.imo.org/en/MediaCentre/PressBriefings/pages/03-piracy-Gulf-of-Guinea.aspx
  • Jacobsen, K. L., and J. Larsen. 2019. “Piracy Studies Coming of Age: A Window on the Making of Maritime Intervention Actors.” International Affairs 95 (5): 1037–1054. doi:10.1093/ia/iiz099.
  • Jordan, J. 2014. “Attacking the Leader, Missing the Mark.” International Security 38 (4): 7–38. doi:10.1162/ISEC_a_00157.
  • Kiras, J. D. 2006. Special Operations and Strategy: From World War II to the War on Terrorism. London: Routledge.
  • Lamb, C., and D. Tucker. 2007. United States Special Operations Forces. New York: Columbia University Press.
  • Larsen, J., and C. Nissen. 2017. Learning from Danish Counter-piracy off the Coast of Somalia. Copenhagen: Danish Institute for International Studies.
  • Leslau, O. 2010. “Worth the Bother? Israeli Experience and the Utility of Special Operations Forces.” Contemporary Security Policy 31 (3): 509–530. doi:10.1080/13523260.2010.521703.
  • McChrystal, S. 2013. My Share of the Task: A Memoir. New York: Penguin.
  • McCormick, T. 2015. “Exclusive: U.S. Operates Drones from Secret Bases in Somalia.” Foreign Policy. https://foreignpolicy.com/2015/07/02/exclusive-u-s-operates-drones-from-secret-bases-in-somalia-special-operations-jsoc-black-hawk-down/
  • McKnight, T. 2012. Pirate Alley: Commanding Task Force 151 Off Somalia. Annapolis: Naval Institute Press.
  • Modigs, R. 2017. “The Utility of Special Operations in Small States.” In Special Operations from a Small State Perspective, edited by Eriksson, G. and U. Pettersson, 43–64. Cham: Palgrave Macmillan.
  • Morcos, P. 2021. A Transatlantic Approach to Address Growing Maritime Insecurity in the Gulf of Guinea. Washington D.C.: Center for Strategic & International Studies. https://www.csis.org/analysis/transatlantic-approach-address-growing-maritime-insecurity-gulf-guinea
  • Morselli, C., M. Turcotte, and V. Tenti. 2011. “The Mobility of Criminal Groups.” Global Crime 12 (3): 165–188. doi:10.1080/17440572.2011.589593.
  • Murphy, M. 2012. CIWAG Maritime Irregular Warfare Studies 5. https://digital-commons.usnwc.edu/ciwag-case-studies/11
  • Murphy, M. N. 2016. “Piracy off the Somali Coast: Is There Light at the End of the Tunnel?” In Routledge Handbook of Naval Strategy and Security, edited by Krause, J. and S. Bruns.239–250. Abingdon: Taylor and Francis.
  • North Atlantic Treaty Organization. 2013. Allied Joint Doctrine for Special Operations. Brussels: NATO standardization agency.
  • North Atlantic Treaty Organization. 2021. Participating Forces in Ocean Shield. https://mc.nato.int/missions/operation-ocean-shield/participating-forces
  • Pelton, R. Y. 2020. SomaliaReport. “Weekly Piracy Report. 2020.” http://www.piracyreport.com/
  • Percy, S., and A. Shortland. 2013. “The Business of Piracy in Somalia.” Journal of Strategic Studies 36 (4): 541–578. doi:10.1080/01402390.2012.750242.
  • Peter, T. 2011. “Somali Pirates Lose Battle to South Korean Commandos, but Who’s Winning War?” Christian Science Monitor. 21 January 2011. https://www.csmonitor.com/World/terrorism-security/2011/0121/Somali-pirates-lose-battle-to-South-Korean-commandos-but-who-s-winning-war
  • Phillips, S. G. 2019. “Making Al-Qa’ida Legible: Counter-Terrorism and the Reproduction of Terrorism.” European Journal of International Relations 25 (4): 1132–1156. doi:10.1177/1354066119837335.
  • Rice, X., 2011. “Somali Pirates Should Face Special Courts, Says UN Envoy.” The Guardian, 26 January 2011. https://www.theguardian.com/world/2011/jan/26/somali-pirates-jack-lang-report
  • Rivera, M. T., S. B. Soderstrom, and B. Uzzi. 2010. “Dynamics of Dyads in Social Networks: Assortative, Relational, and Proximity Mechanisms.” Annual Review of Sociology 36 (1): 91–115. doi:10.1146/annurev.soc.34.040507.134743.
  • Roehrig, T. 2012. “South Korea’s Counterpiracy Operations in the Gulf of Aden.” In Global Korea: South Korea’s Contributions to International Security, edited by Bruce, S., J. Hemmings, B. Y. Hwang, T. Roehrig, and S. A. Snyder.28-44. New York: Council of Foreign Relations.
  • Saradzhyan, S. 2010. “The Dynamics of Russia’s Response to the Piracy Threat.” Connections 9 (3): 19–44.
  • Shamir, E., and E. Ben-Ari. 2018. “The Rise of Special Operations Forces: Generalized Specialization, Boundary Spanning and Military Autonomy.” Journal of Strategic Studies 41 (3): 335–371. doi:10.1080/01402390.2016.1209656.
  • Shortland, A. 2015. “Can We Stop Talking about Somali Piracy Now? A Personal Review of Somali Piracy Studies.” Peace Economics, Peace Science and Public Policy 21 (4): 419–431. doi:10.1515/peps-2015-0018.
  • Shortland, A. 2019. Kidnap - inside the Ransom Business. Oxford: Oxford University Press.
  • Shortland, A., and F. Varese. 2014. “The Protector’s Choice: An Application of Protection Theory to Somali Piracy.” British Journal of Criminology 54 (5): 741–764. doi:10.1093/bjc/azu046.
  • Smed, U. T., and A. Wivel. 2017. “Vulnerability without Capabilities? Small State Strategy and the International Counter-Piracy Agenda.” European Security 26 (1): 79–98. doi:10.1080/09662839.2016.1265941.
  • Sörenson, K., and J. J. Widen. 2014. “Irregular Warfare and Tactical Changes: The Case of Somali Piracy.” Terrorism and Political Violence 26 (3): 399–418. doi:10.1080/09546553.2012.725681.
  • Spiegel International. 2009. German Elite Troop Abandons Plan to Free Pirate Hostages. May 4, 2009. https://www.spiegel.de/international/germany/mission-impossible-german-elite-troop-abandons-plan-to-free-pirate-hostages-a-622766.html
  • Svendsen, A. D. M. 2014. “Sharpening SOF Tools, Their Strategic Use and Direction: Optimising the Command of Special Operations amid Wider Contemporary Defence Transformation and Military Cuts.” Defence Studies 14 (3): 284–309. doi:10.1080/14702436.2014.890341.
  • The Bureau of Investigative Journalism. 2021. Somalia: Reported US Covert Actions 2001–2016. 23 March 2021, https://www.thebureauinvestigates.com/drone-war/data/somalia-reported-us-covert-actions-2001-2017
  • Walsh, J. I. 2018. “The Rise of Targeted Killing.” Journal of Strategic Studies 41 (1–2): 143–159. doi:10.1080/01402390.2017.1393035.
  • Westberg, A. B. 2016. “Anti-piracy in a Sea of Predation: The Interaction of Navies, Fishermen and Pirates off the Coast of Somalia.” Journal of the Indian Ocean Region 12 (2): 209–226. doi:10.1080/19480881.2015.1090157.
  • Westberg, A. B. 2019. “Maritime Predation off the Horn of Africa: Introducing Somali Piracy Dataset, 1991–2019 - Version 4.0. Edited from Volume 1.0” in Princes of Predation, Thieves of Disorder - A Study of Somali Piracy, 1991–2015. PhD dissertation, Odense: University of Southern Denmark.
  • Wey, A. L. K. 2014. “Principles of Special Operations: Learning from Sun Tzu and Frontinus.” Comparative Strategy 33 (2): 131–144. doi:10.1080/01495933.2014.897119.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.