Page 228

REVISTA IEEE 1

224 Revista del Instituto Español de Estudios Estratégicos Núm. 1 / 2013 or Comoros. We have studied each incident one by one, with the aim of obtaining all of the possible information and thus enriching our analysis in this way. We have established 19 categories for this: date of the incident, time, position, geographical region, status of the ship (whether it was sailing, at anchor or moored in port), name of the ship, type of ship, ship ensign, number of launches that attacked the ship and the people who were in each one, weapons that the attackers were carrying, actions taken on board, request for help (to a body, to military forces present, etc.), whether help was received or not, and of what class (a military helicopter, a rescue operation, etc.), whether the pirates opened fire on the ship or the crew, whether there was personal injury or material damage, where the capture of the boat took place, the duration of the attack and, finally, the source that reports it. We have done an initial classification of the records into seven groups, one for each year between 2005 and 2011; a second one for each one of the nine geographical regions in which the Somali pirates operated in these years (Gulf of Aden, Red Sea, Indian Ocean, Somalia, Yemen, Kenya, Tanzania, Seychelles, Oman) and a tenth one called Rest. This one includes more than 50 attacks occurring between 2009 and 2011 in India, Pakistan, the Maldives, Mozambique, Madagascar, Mauritius, Iran, the Comoros, the French territories of Mayotte and Tromelin Island, as well as three incidents that were not reported from the area where they happened. Usually, the sources used report the attacks in UTC time, zero meridian time. The attacks attributed to Somalia pirates between 2005 and 2011 range from the region corresponding to UTC+2, up to UTC+5. We have modified the times of the attacks offered by the different sources, when they have used the UTC format, and converted it into LT (local time), with the idea that reflects the corresponding time zone and so the opportune comparisons can be done in this way. 3. Results 3.1. General panorama According to our data, the evolution of the attacks attributed to Somali pirates between 2005 and 2011 is shown in image 4:


REVISTA IEEE 1
To see the actual publication please follow the link above