The Pirates of Somalia
Page 26
* * *
At a chaotic guardhouse at Bossaso airstrip, scurrying travellers clamoured for boarding passes from a few overburdened officials. Upon handing over my passport I learned that, on my way into Somalia, the customs agent had scribbled the incorrect exit date on my visa stamp. Now, an official informed me that I had been in the country illegally for the past ten days and would be required to pay a fine of $200. I had spent the last of my US dollars on the wages of my bodyguards, Said and Abdirashid, and had no money for my exit ransom. Colonel Omar was stuck with the bill; he fixed me with one of his menacing glances, as if deciding whether he should arrest me, let me go, or shoot me. Beyond the chain-link fence separating the parking lot from the sand-covered airstrip, a mob was pressing around the gangway; the plane was starting to board. I left the Colonel grumbling at me and shouting at the official, and made my way onto the runway, past a solitary guard who made no motion to check my passport.
The Ilyushin Il-18 turboprop was Soviet-made, the seat fabric torn and seatbelts broken, but it was larger and seemingly sturdier than the rattletrap Antonov that had brought me into Somalia. I left Puntland decidedly less apprehensive than I had first arrived.
For me, Somalia will always be a land of adventure, my memories of it forged in a mixture of adrenaline and wonder. In the span of a few weeks, I had gone from writing marketing reports to tracking down pirates in one of the world’s most dangerous countries, under the protection of a man I had never before met. The romanticism of the journey was intoxicating.
Like their seventeenth-century forebears, the Somali pirates were outnumbered and outgunned, yet dared to challenge the might of the world’s navies, casting themselves as heroic defenders of their seas against the forces of foreign exploitation. It was hard not to feel some slight admiration for their reckless courage, regardless of the iniquity of its ends. In reality, the pirates more resembled self-interested, amoral, and often barbaric gangsters than principled crusaders, as any hostage seafarer could attest to. “It is when the pirates count their booty,” author William Bolitho once wrote, “that they become mere thieves.”6
As the plane gained altitude, Bossaso shrank to a pale yellow smudge in the side window. A pair of Australian cameramen chatted loudly in the seats in front of me. Far below, the Gulf of Aden stretched to the horizon, blue and unbroken.
Appendix 1
Simplified Somali Clan Tree
*Considered by some to be a sub-group of the Dir.
Appendix 2
The Victoria Gang
IN CHAPTER 14, WE LOOKED AT THE FEATURES OF THE VICTORIA that made her a tempting target. But what of her captors? How did Computer’s organization measure up to a typical pirate gang? Stig Jarle Hansen’s extensive research into the organization and operational methods of pirate groups allows us to establish a comparative framework with which to place the Victoria gang in perspective.1 I will examine seven criteria in turn:
Size
Investment structure
Cost structure
Attack strategy
Technology
Role of the diaspora
Other
1. SIZE
According to Hansen, “an average group tends to consist of around 12 to 35 individuals.” At 35 members, Computer’s organization was large, though still smaller than the top-tier operations, such as the hundreds-strong consortium of gangs involved in the Faina hijacking.
2. INVESTMENT STRUCTURE
Venture Capital
Hansen describes three methods of capital financing for pirate operations, which I label the “single investor,” “co-operative,” and “private equity” investment models. Under the single investor model, one man—often a local businessman—funds the entire operation, from the boats to the guns and the communication equipment. The cooperative, on the other hand, involves a number of equal shareholders joining together, each bringing his own guns and food (though the boat is owned by a specific member of the group). Finally, the private equity model consists of an individual who first raises capital from a number of willing investors, then proceeds to organize and direct the mission (like Afweyne, in the early days).
The Victoria gang operated under the single investor model, with Computer supplying the entire start-up capital and hence claiming a large slice of the company’s revenues. “In Puntland,” Hansen writes, “local researchers have identified 51 investors, mid-level businessmen mostly from the clans of the respective pirate group.” Computer’s name is probably on that list—particularly if, as suggested in Chapter 14, he is a known Puntland government fugitive.
Payroll
The majority of pirate gangs work on straight commission, a system Hansen playfully labels “no prey, no pay.” Their paycheques, in other words, are contingent on the successful capture and ransoming of a suitable vessel. This commission structure was clearly employed by Computer’s group; without the Victoria, the gang members’ remuneration would have consisted of nothing more than a one-way pleasure cruise in the Gulf of Aden.
3. COST STRUCTURE
Start-up Costs
According to Hansen, the cost of financing a pirate operation ranges from $300 to as high as $30,000. At almost $50,000, Computer’s initial capital outlay was off Hansen’s scale. To blame for his extravagant bill were the dual heavy-duty outboard motors he outfitted to the back of his unusually large attack boat; at 350 horsepower, they were among the most powerful and expensive available.
Operating Expenses
Operating expenses for a typical pirate group, Hansen writes, might run “as low as $100 per day.” At an estimated $3,000 per day, Computer’s gang spent money at a rate several orders of magnitude higher. In their love of deficit spending, however, Computer’s gang was typical. Hansen writes that a hijacked ship is often maintained on credit, and there is no doubt that this was the case with Computer’s operation.
4. ATTACK STRATEGY
Number of Attack Craft
The most common pirate attack strategy, Hansen argues, involves two skiffs (each typically holding five or six pirates), with one covering the other as its occupants attempt to scale the target vessel. Deploying one turbo-charged attack craft carrying nine hijackers, Computer’s modus operandi was atypical. Putting all your pirates in one boat has its perils; if, for instance, the Victoria crew had put up any resistance—such as blasting the would-be boarders with deck hoses—the absence of cover fire might have proved problematic. However, such a strategy also had several advantages: a more comfortable standard of living, additional room to store food and fuel, and more convincing fisherman camouflage.
Solitary Boarder
According to Hansen, standard operating procedure for a pirate boarding dictates that one lone man scale the sides of the target vessel before all others; in the words of Bossaso-based pirate “Red Beard”: “One man goes first and that man gives information back to us and we all board the ship then.” In this respect, the Victoria gang followed the industry norm; their trailblazer, of course, was Mohamed Abdi.
“Attack” and “Hold” Teams
“The groups are often, but not always, divided into an attack team and hold team,” writes Hansen. This attacker/holder dichotomy was certainly an organizational feature of Computer’s group. The attackers, like an entitled officer corps, enjoyed a higher status than the holders, and greater flexibility when it came to taking shore leave. Furthermore, the “three leaders” identified by hostage Traian Mihai all came from the attacker caste, and each attacker received a significantly higher payout than the holders.
5. TECHNOLOGY
Though Computer’s psychic directions undoubtedly gave the Victoria hijackers a unique advantage over other pirate groups, a sceptic might wonder if they had any additional help from modern technology. Hansen notes that pirates often possess such gadgets as night vision goggles, satellite telecommunications systems, and occasionally automatic identification systems that allow them to read the transponders of passing vessels.
Added to this list should be basic marine navigation devices, such as GPS and radar systems.
There is no evidence to suggest that the Victoria hijackers possessed any of these accoutrements. The Victoria was carrying a cargo of rice, and was not the kind of glamorous prize about which a pirate would brag to his friends at the local khat suq. (Romanian media sources went so far as to report that the pirates may have mistaken the Victoria for an oil transport.2) Regardless, Computer’s group would probably not have targeted the Victoria if they had been able to read transponders or had detailed intelligence on vessel itineraries. Indeed, given the pirates’ utter lack of understanding of the Victoria’s radar display (as humorously recounted by Mihai), their attack craft almost certainly did not possess a marine radar system.
The more likely scenario is that the Victoria found them. With limited range and navigational technologies, the pirates were content to float in the IRTC and await a target of opportunity, like patient fishermen waiting for a nibble. In some respects, Levenescu may have been correct when he scornfully claimed that the IRTC had made the pirates’ job easier: though they faced a higher risk of death or capture, the transit corridor saved them the trouble of deciding where to hunt.
Another hypothetical indicator of a sophisticated pirate gang is the practice of gathering intelligence (cargo, itineraries, insurance details) on potential targets, either through “spotters”—informants located in major ports—or through membership in an online maritime tracking service, such as Lloyd’s Marine Intelligence Unit. For the same rationale as discussed above, there is little reason to think the Victoria hijackers made use of either of these resources.
In all probability, their most sophisticated technology was their own eyes, which would have proved quite capable of detecting the Victoria—and her telltale deck cranes—at a distance of ten kilometres.
6. ROLE OF THE DIASPORA
There has been much discussion in the media regarding the supposed transnational criminal networks controlling Somali pirate gangs from behind the scenes. As with many such myths, the drive for a good story often overwhelms the facts.
Though the existence of a transnational criminal conspiracy is highly overstated, the true level of the Somali diaspora’s involvement in piracy is less certain, and Hansen’s research does not help resolve the ambiguity. One of his pirate interviewees claimed that Somali expats from Kenya, Ethiopia, and the Gulf states sometimes provide technology such as goggles and telecommunications systems, as well as their translation services, but only rarely contribute money.
Like the clan networks within the country, the Somali diaspora is extremely integrated and close-knit, with Somali expats constantly moving in and out of Somalia even as they carry on normal lives in their adoptive homelands. The support provided by the diaspora—remittances, access to markets, business connections, and professional advice—is absolutely essential to making life inside Somalia liveable. “Pirate entrepreneurs” will seek to access these resources in the same way as legitimate local businessmen, but this is no more transnational crime than the foreign brother of a US citizen helping him to cheat on his income taxes.
The only known affiliation the Victoria gang had to the diaspora was through Loyan, their interpreter (Mihai told us that Loyan had studied in India for at least five years, which meant he must have held foreign citizenship, as it is virtually impossible to travel on a Somali passport). Men such as Loyan—English-speaking opportunists taking extended vacations in their homeland—are the real face of the so-called transnational criminal empire of Somali piracy.
7. OTHER
The Yemen Connection
Pirate attacks on Yemeni fishing ships, which are then converted for use as pirate motherships, have been well documented, and there are some indications that the Victoria gang may have been guilty of a double hijacking, the first involving a Yemeni vessel.
According to Hussein Hersi, his cousins left Somalia in two small attack skiffs, but both Matei Levenescu and Traian Mihai reported being attacked by one boat between ten and twelve metres in length. Is it possible that the Victoria hijackers departed Somalia in smaller skiffs, and then proceeded to hijack a Yemeni dhow somewhere in the Gulf of Aden, abandoning the vessel’s previous occupants in their skiffs?
“The Somali side of the Gulf is too well patrolled by foreign warships,” Hersi told me, “and the commercial ships stay two or three hundred miles away from the Yemeni coast. So the pirates go over to the Yemeni side; they pretend to be Yemeni fishermen, but at night they attack the actual Yemenis and capture their fishing dhows. “They’re always changing tactics, you know. The warships go this way, the pirates go the other,” he said, motioning in two directions with his hand.
It was not clear if Hersi was referring to his cousins’ gang in particular, or to the practices of Gulf of Aden pirates in general. But the dimensions of the attack ship described by Levenescu and Mihai fit the proportions of a small Yemeni dhow; and the fact that the Victoria was captured only 120 kilometres south of the Yemeni coast confirms that the pirates had been operating from the Yemeni side of the Gulf of Aden, and had quite possibly hidden from coalition forces by pretending to be Yemeni fishermen.
On the other hand, Computer’s psychic timeline, as reported by Hersi, allowed only eight hours between launching the mission and encountering the Victoria. If so, the pirates would have barely had enough time to reach Yemeni waters and hijack the dhow before meeting the Victoria (at a top speed of twenty knots, the hijackers would have needed almost seven hours just to reach the position where they encountered the Victoria).
Relationship with the Puntland Authorities
No blanket statement can define the “typical relationship” between pirate gangs and the Puntland government forces, which has ranged from direct armed confrontation to allegations of complicity and outright involvement. As evidence of possible corruption, Hansen cites Boyah’s statement that 30 per cent of ransom money goes to bribes (in my view an absurd claim, which Boyah has since retracted on multiple occasions). But another of Hansen’s interviews suggests a more evasive strategy: “We usually hide ourselves and put the ship we capture in (sic) far from the shore and move from place to place when we see [the Puntland police] around,” said a pirate named Sultan.
Their actions show that the Victoria gang came closer to adopting the latter approach, as illustrated from their flight from Eyl upon my arrival with government forces. Though Levenescu suggested that the purpose of their departure was to harvest drinking water, the timing of the trip may have been influenced by the sudden appearance of uniformed government soldiers in Eyl, several of them closely related to President Farole himself.
Finally, by electing to spend its money on soldiers’ uniforms rather than on bribes, the gang coped with the Puntland authorities through subterfuge rather than confrontation or negotiation. One must wonder if even this minimalist effort was necessary; when I was in Eyl I saw no local authorities worth bribing, and no military presence other than my own escort.
Appendix 3
Piracy Timeline
1991: The Somali state collapses as rebel factions descend on the capital, Mogadishu. President Mohamed Siad Barre flees the country.
JANUARY 12, 1991: In the first recorded piracy incident in modern Somalia, the cargo ship MV Naviluck is boarded by bandits off Puntland’s coast. Part of the crew is taken ashore and executed, while the boat is ransacked and subsequently set ablaze.
OCTOBER 1993: US efforts to arrest warlord Mohamed Farah Aidid lead to the infamous “Black Hawk Down” incident, in which eighteen US Army Rangers are killed by Somali militants.
MARCH 1995: The last UN peacekeeping forces withdraw from Somalia, leaving the country in a state of protracted civil conflict.
MAY 5, 1998: A pan-clan conference held in Garowe proclaims the creation of Puntland State of Somalia. Garowe is chosen as the region’s capital.
NOVEMBER 1999: Hart Security, a British private security firm, signs a co
ntract to provide coast guard services in Puntland. The company operates there until 2002, when it is replaced by the Somali-Canadian Coast Guard (SomCan).
APRIL–MAY 2000: The Transitional National Government (TNG) is formed at the Somali National Peace Conference, held in Djibouti.
NOVEMBER 2001: The election of Jama Ali Jama to the Puntland presidency sparks a brief civil conflict when Abdullahi Yusuf Ahmed refuses to step down. Six months later, Yusuf emerges victorious.
MAY 2002: The Somali-Canadian Coast Guard (SomCan), owned by a group of Toronto-based Somali businessmen, assumes coast guard duties in Puntland. The government dismisses the company in March 2005 after SomCan marines hijack a Thai fishing boat.
OCTOBER 10, 2004: The TNG is reconstituted as the Transitional Federal Government (TFG), and Abdullahi Yusuf is elected president. Shortly thereafter, General Mohamud Muse Hersi takes over the Puntland presidency.
DECEMBER 26, 2004: The Indian Ocean tsunami, one of the worst natural disasters in recorded history, strikes the eastern coast of Somalia, causing devastation in Eyl and other waterside towns. Dozens of submerged toxic waste canisters wash ashore, revealing the extent of illegal dumping in Somali waters.