{"id":4790,"date":"2013-03-13T04:23:34","date_gmt":"2013-03-13T04:23:34","guid":{"rendered":"https:\/\/iissonline.net\/2026\/?p=4790"},"modified":"2013-03-13T04:23:34","modified_gmt":"2013-03-13T04:23:34","slug":"adapting-to-changing-piracy-patterns","status":"publish","type":"post","link":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/","title":{"rendered":"Adapting to changing piracy patterns"},"content":{"rendered":"<p>Adapting to changing piracy patterns 11 Mar 2013 Maritime Security Officers need to be disciplined and able to work in high risk situations Three hundred ships were attacked by pirates in&hellip;<\/p>\n<p>You must be logged in to view this content.<\/p>\n<h3>Click here to <a href=\"\/register\">register<\/a><\/h3>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adapting to changing piracy patterns 11 Mar 2013 Maritime Security Officers need to be disciplined and able to work in high risk situations Three hundred ships were attacked by pirates in&hellip; You must be logged in to view this content. &hellip; <a href=\"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[13,30,39,44],"tags":[54,128,134,137,135],"class_list":["post-4790","post","type-post","status-publish","format-standard","hentry","category-companies","category-maritime","category-piracy","category-shooters","tag-comapnies","tag-maritime","tag-piracy","tag-shooters","tag-somalia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Adapting to changing piracy patterns - Isenberg Institute of Strategic Satire<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adapting to changing piracy patterns - Isenberg Institute of Strategic Satire\" \/>\n<meta property=\"og:description\" content=\"Adapting to changing piracy patterns 11 Mar 2013 Maritime Security Officers need to be disciplined and able to work in high risk situations Three hundred ships were attacked by pirates in&hellip; You must be logged in to view this content. &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/\" \/>\n<meta property=\"og:site_name\" content=\"Isenberg Institute of Strategic Satire\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-13T04:23:34+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.maritimejournal.com\/__data\/assets\/image\/0009\/807741\/varieties\/carousel.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#\\\/schema\\\/person\\\/d9e91fd1a1523b3c7eebbee93de450a1\"},\"headline\":\"Adapting to changing piracy patterns\",\"datePublished\":\"2013-03-13T04:23:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/\"},\"wordCount\":625,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.maritimejournal.com\\\/__data\\\/assets\\\/image\\\/0009\\\/807741\\\/varieties\\\/carousel.jpg\",\"keywords\":[\"Companies\",\"Maritime\",\"Piracy\",\"Shooters\",\"Somalia\"],\"articleSection\":[\"Companies\",\"Maritime\",\"Piracy\",\"Shooters\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/\",\"url\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/\",\"name\":\"Adapting to changing piracy patterns - Isenberg Institute of Strategic Satire\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.maritimejournal.com\\\/__data\\\/assets\\\/image\\\/0009\\\/807741\\\/varieties\\\/carousel.jpg\",\"datePublished\":\"2013-03-13T04:23:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#\\\/schema\\\/person\\\/d9e91fd1a1523b3c7eebbee93de450a1\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.maritimejournal.com\\\/__data\\\/assets\\\/image\\\/0009\\\/807741\\\/varieties\\\/carousel.jpg\",\"contentUrl\":\"http:\\\/\\\/www.maritimejournal.com\\\/__data\\\/assets\\\/image\\\/0009\\\/807741\\\/varieties\\\/carousel.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/adapting-to-changing-piracy-patterns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adapting to changing piracy patterns\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#website\",\"url\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/\",\"name\":\"Isenberg Institute of Strategic Satire\",\"description\":\"Unpacking the Private Military Complex\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/#\\\/schema\\\/person\\\/d9e91fd1a1523b3c7eebbee93de450a1\",\"name\":\"\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g\"},\"url\":\"https:\\\/\\\/iissonline.net\\\/2026\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Adapting to changing piracy patterns - Isenberg Institute of Strategic Satire","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/","og_locale":"en_US","og_type":"article","og_title":"Adapting to changing piracy patterns - Isenberg Institute of Strategic Satire","og_description":"Adapting to changing piracy patterns 11 Mar 2013 Maritime Security Officers need to be disciplined and able to work in high risk situations Three hundred ships were attacked by pirates in&hellip; You must be logged in to view this content. &hellip; Continue reading &rarr;","og_url":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/","og_site_name":"Isenberg Institute of Strategic Satire","article_published_time":"2013-03-13T04:23:34+00:00","og_image":[{"url":"http:\/\/www.maritimejournal.com\/__data\/assets\/image\/0009\/807741\/varieties\/carousel.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/#article","isPartOf":{"@id":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/"},"author":{"name":"","@id":"https:\/\/iissonline.net\/2026\/#\/schema\/person\/d9e91fd1a1523b3c7eebbee93de450a1"},"headline":"Adapting to changing piracy patterns","datePublished":"2013-03-13T04:23:34+00:00","mainEntityOfPage":{"@id":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/"},"wordCount":625,"commentCount":0,"image":{"@id":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/#primaryimage"},"thumbnailUrl":"http:\/\/www.maritimejournal.com\/__data\/assets\/image\/0009\/807741\/varieties\/carousel.jpg","keywords":["Companies","Maritime","Piracy","Shooters","Somalia"],"articleSection":["Companies","Maritime","Piracy","Shooters"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/","url":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/","name":"Adapting to changing piracy patterns - Isenberg Institute of Strategic Satire","isPartOf":{"@id":"https:\/\/iissonline.net\/2026\/#website"},"primaryImageOfPage":{"@id":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/#primaryimage"},"image":{"@id":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/#primaryimage"},"thumbnailUrl":"http:\/\/www.maritimejournal.com\/__data\/assets\/image\/0009\/807741\/varieties\/carousel.jpg","datePublished":"2013-03-13T04:23:34+00:00","author":{"@id":"https:\/\/iissonline.net\/2026\/#\/schema\/person\/d9e91fd1a1523b3c7eebbee93de450a1"},"breadcrumb":{"@id":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/#primaryimage","url":"http:\/\/www.maritimejournal.com\/__data\/assets\/image\/0009\/807741\/varieties\/carousel.jpg","contentUrl":"http:\/\/www.maritimejournal.com\/__data\/assets\/image\/0009\/807741\/varieties\/carousel.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/iissonline.net\/2026\/adapting-to-changing-piracy-patterns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/iissonline.net\/2026\/"},{"@type":"ListItem","position":2,"name":"Adapting to changing piracy patterns"}]},{"@type":"WebSite","@id":"https:\/\/iissonline.net\/2026\/#website","url":"https:\/\/iissonline.net\/2026\/","name":"Isenberg Institute of Strategic Satire","description":"Unpacking the Private Military Complex","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/iissonline.net\/2026\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/iissonline.net\/2026\/#\/schema\/person\/d9e91fd1a1523b3c7eebbee93de450a1","name":"","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5560375f973ec1134100139d0a52efec4a10061bf9bf693121c8bedec08ef8e?s=96&d=mm&r=g"},"url":"https:\/\/iissonline.net\/2026\/author\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/phczRl-1fg","_links":{"self":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/posts\/4790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/comments?post=4790"}],"version-history":[{"count":0,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/posts\/4790\/revisions"}],"wp:attachment":[{"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/media?parent=4790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/categories?post=4790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iissonline.net\/2026\/wp-json\/wp\/v2\/tags?post=4790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}