Navy admiral urges diligence in fight against pirates

The U.S. Navy admiral responsible for countering the pirates operating from Somalia said Wednesday that the expanding threat should be addressed with the same rigor applied to counterterrorism.

That's particularly true when it comes to tracing the millions of dollars being paid to ransom captured sailors.

Vice Adm. Mark Fox said he had no "explicit intelligence" that the al-Qaida-connected al Shaba terrorists, who control most of Somalia, are benefiting from the ransom money, but noted that, "I'm loath to hope that there's not" a link.

Fox noted that "millions of dollars are being pumped into the potentially lawless society in Somalia," but the pirates who capture the ships receive only thousands of dollars from the ransoms paid by ship owners.

"We have not used the same level of rigor in terms of following the money in the counter-piracy effort as we have in counter-terror," Fox told a Defense Writers Group breakfast.

He said he has urged an extensive intelligence effort to see if there are links between the ransom money and al Shaba.

"If you lump them completely together, that changes your approach."

Fox, the commander of U.S. Naval Forces Central Command and Fifth Fleet, said the United States and most of the nations cooperating in fighting piracy have used what he termed "the Western approach" to dealing with the ship hijacking, by primarily focusing on the safety of the crew members.

Because of that, with only a few exceptions, force was not used to recover pirated ships. U.S. Navy SEALs killed three pirates who were holding the captain of the Maersk Alabama hostage in 2009, and last year Marines raided the Magellan Star to capture the pirates and rescue the crew. Last week, South Korean commandos recovered a pirated ship, killing most of the pirates.

Fox said he cannot "take off the table" the use of force to resolve a hostage situation.

The admiral said the pirates' increasing use of larger hijacked vessels as "mother ships" to carry the small boats used to raid ships "is a potential game-changer" in the piracy problem.

The Somali pirates initially used skiffs that could not operate in bad weather or go very far offshore. Most of the early pirate attacks were in the nearby Gulf of Aden, the busy shipping route from the Suez Canal and Red Sea into the Indian Ocean. International naval patrols concentrating on that route have virtually eliminated hijackings in the Gulf, he said.

But by using the larger ships, the pirates now are capturing merchant ships more than 1,000 miles away, Fox said. "They are going where we're not," he said.

Because of that far-reaching activity, the number of seamen held hostage by the pirates has jumped from about 350 to 750 since he took command in the summer.

Although international forces "are constantly reassessing" their operations, Fox said, there is no single military solution to the piracy problem. He noted the recent United Nations report urging an international legal framework to deal with the problem, including where captured pirates can be tried.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.


When you download a report, your information may be shared with the underwriters of that document.