Chapter 9: Reshaping maritime security cooperation: the importance of interagency coordination at the national level
Somali piracy takes place in a vast ocean operating space with overlap- ping national authorities, gaps in jurisdiction and the involvement of multiple states and organizations seeking to repress it. In this context, cooperation between states is crucial. Recent efforts to repress piracy also demonstrate that cooperation within each state is equally crucial. Mari- time security operations may involve extensive cooperation and coordination between different governmental agencies if they are to succeed. As discussed in previous chapters, the response to Somali piracy has primarily been a law enforcement effort that brings with it particular challenges for the naval states involved. While the onus of resolving maritime threats traditionally has rested with naval assets, the spectrum of responses now extends into diplomatic, investigative and judicial venues. The intersection of agencies with separate command structures, operating procedures and authorities poses considerable coordination challenges, such as resolving which agency is lead for investigation, where will evidence be stored, where will pirates be detained, which nation will prosecute and where will convicted pirates be confined. In response to these issues, collaborative constructs have emerged that facilitate information sharing and unity of effort. In the United States, a Presidentially-approved plan creates a process for interagency coordination in the response to maritime threats. The Maritime Operational Threat Response (MOTR) Plan has guided US action following piratical attacks against the Maersk Alabama, Magellan Star and Quest, among others. This chapter will explore the MOTR Plan’s origins, its implementation, specific cases and lessons learned.
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.