{"id":7955,"date":"2013-03-27T03:53:33","date_gmt":"2013-03-27T03:53:33","guid":{"rendered":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/?p=7955"},"modified":"2015-03-04T03:59:57","modified_gmt":"2015-03-04T03:59:57","slug":"prosecuting-pirates-the-contact-group-on-piracy-off-the-coast-of-somalia-governance-and-international-law","status":"publish","type":"post","link":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/2013\/03\/27\/prosecuting-pirates-the-contact-group-on-piracy-off-the-coast-of-somalia-governance-and-international-law\/","title":{"rendered":"Prosecuting Pirates: The Contact Group on Piracy Off the Coast of Somalia, Governance and International Law"},"content":{"rendered":"<p>This paper authored by Douglas Guilfoyle was originally published in 2013 in the <a href=\"http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1758-5899.2012.00190.x\" target=\"_blank\">journal\u00a0Global Policy 4 (1): 73\u201379. <\/a>Drawing on a reflection of his own participation in Working Group 2 of the CGPCS Guilfoyle discusses the decentralised nature of\u00a0the response to Somali piracy and the role of WG2\u00a0as a mechanism for\u00a0coordinating piracy prosecutions. The article\u00a0reviews the applicable international law and available options. It suggests that WG2 has had a discernible influence in promoting the decentralised use of national courts over the creation of a stand-alone international piracy court. It then reflects on WG2 as an example of a \u2018new governance\u2019 coordination mechanism.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This paper authored by Douglas Guilfoyle was originally published in 2013 in the journal\u00a0Global Policy 4 (1): 73\u201379. Drawing on a reflection of his own participation in Working Group 2 of the CGPCS Guilfoyle discusses the decentralised nature of\u00a0the response &hellip; <a href=\"https:\/\/sites.cardiff.ac.uk\/piracylessons\/2013\/03\/27\/prosecuting-pirates-the-contact-group-on-piracy-off-the-coast-of-somalia-governance-and-international-law\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":310,"featured_media":7956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-7955","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-reflections"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/sites.cardiff.ac.uk\/piracylessons\/files\/2015\/03\/Douglas_Guilfoyle_07.jpg?fit=333%2C500&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4C7f9-24j","meta_box":[],"_links":{"self":[{"href":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/posts\/7955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/users\/310"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/comments?post=7955"}],"version-history":[{"count":1,"href":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/posts\/7955\/revisions"}],"predecessor-version":[{"id":7957,"href":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/posts\/7955\/revisions\/7957"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/media\/7956"}],"wp:attachment":[{"href":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/media?parent=7955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/categories?post=7955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/tags?post=7955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}