Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-m6dg7 Total loading time: 0 Render date: 2024-11-18T08:20:11.262Z Has data issue: false hasContentIssue false

3 - The Fishing Industry

from Part II - The Sea

Published online by Cambridge University Press:  21 October 2015

Edited by
Get access

Summary

We are now suffering the consequences of overfishing … It should be understood that the livelihood of our families is at stake. When the stomach is empty, anything can happen.

Member of Consumer Association of Penang

INTRODUCTION

On 2 February 2005, a fleet of trawlers fishing near Pulau Jerajak in the Malacca Strait (see Map 2.2 in Chapter 2) was attacked by twelve pirates who approached their victims under the classic pretext of wanting to trade fish with the trawlers. The perpetrators, armed with M-16 rifles, boarded three of the fishing vessels and stole the catch, documents, and equipment from the trawlers. They also kidnapped ten fishers and brought them to Aceh, Indonesia. Negotiations with the owner of the trawlers ensued and the hostages were eventually released after a ransom of RM150,000 (US$41,100) was paid. Such attacks are not unusual and occur because the pirates can approach their victims by pretending to be interested in trading with the fishers directly at sea. Fish trade at sea takes place in some ocean areas where catches have become sparse and fishers buy or barter valuable fish from their, often foreign, counterparts to supplement their own catches and secure sufficient income and livelihood.

This chapter is concerned with the sea as a source of livelihood for fishers in Southeast Asia and Bangladesh. While the first two chapters have shown that different types of pirate attacks occur in Southeast Asia and Bangladesh, this chapter and the remainder of the book explain why these different types of attacks occur in this region, allowing further insights into the nature of individual attacks and the working practices and motivations of pirates. This investigation is tied to the central argument of this study, namely that piracy can be understood as both a sign and a reflection of security threats and bureaucratic loopholes, as well as of other political, social, and economic developments undermining security.

Type
Chapter
Information
Oceans of Crime
Maritime Piracy and Transnational Security in Southeast Asia and Bangladesh
, pp. 99 - 134
Publisher: ISEAS–Yusof Ishak Institute
Print publication year: 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×