International security organisations against transnational organised crime: Europol’s Operation Venetic

International security organisations against transnational organised crime: Europol’s Operation Venetic

Introduction

Over the past two decades transnational organised crime (TOC) has proliferated worldwide, and now represents a significant challenge to national and international security organisations. Surpassing borders, organised crime does not only undermine the economic development of societies but it also puts at risk peace, health, security and human rights. TOC groups operating in different countries have been known to engage in an array of unlawful acts, including drug trafficking, migrant smuggling, intellectual property theft, extortion, corruption, firearms trafficking, human trafficking, money laundering, wildlife smuggling, illegal gambling, counterfeit goods, and cybercrime (FBI, 2021). Certainly, cross-border alliances and strategic collaborations between criminals operating in different parts of the world are not in itself new phenomena. Nonetheless, economic growth, increasingly liberal nature of international trade, technological advancements in communication, transportation and distribution as well as the easing of cross-border restrictions have all given an unprecedented opportunity to organised crime groups (OCGs) to increase the magnitude and sophistication of their crimes (Albanese and Reichel, 2013). In the process, these changes also strengthened the capacity of TOC groups to challenge and cause damage to the interests of nation-states. In response to the illicit consequences of globalisation, a multitude of regional and international organisations, such as Europol, Ameripol or Afripol, were established across the globe to coordinate actions taken against cross-border crimes. Even though these organisations have at their disposal considerable financial resources, cutting-edge technology, and access to intelligence from their member countries, TOC groups continue to adapt their activities and structures to new conditions (e.g., as in the case of the COVID-19 pandemic), posing a constant challenge to the functioning of economic, political, and social systems.

Grounded in empirical data, this paper will aim to explore why contemporary international security organisations struggle a great deal with preventing TOC. Firstly, a review of literature, key concepts and definitions will be conducted. This will mainly consist in analysis of notions developed by the

English School scholars (i.e., international society and institutions) and examination of the role of international organisations. Subsequently, there will be an overview of Europol’s activities and a unique operation that the agency has been recently involved in. Then, the main part will focus specifically on demonstrating why combating TOC is such a major challenge to international organisations. In fact, the issue will be looked at from three different perspectives, namely: 1) the significance of shared norms among actors involved in tackling TOC, 2) barriers to cooperation among member states and their impact on the effectiveness of international organisations in combating cross-border crimes, and 3) constant evolvement of TOC calls into question the relevance of security agencies. Finally, there will be a conclusion with the key points developed throughout the text.

Literature review

International Society

The idea of international society is broadly attributed to the English School scholars who despite formal anarchy of the system of international politics identified some level of predictability stemming from states’ common interests. As concisely put by Bull (2002, p. 13), international society ”exists when a group of states, conscious of certain common interests and common values, form a society in the sense that they conceive themselves to be bound by a common set of rules in their relations with one another, and share in the working of common institutions”. In other words, international society consists in creation and maintenance of shared norms, standards, and practices. Despite being critiqued by some scholars for its alleged Eurocentric nature and for presenting the diffusion international society institutions as a necessarily positive process (Suzuki, 2009), the concept has also been applied to different regions across the globe, e.g., Africa (Tan Shek Yan, 2013), or Southeast Asia (Quayle, 2013).

In his comprehensive work, Buzan (2015) demonstrates how the theoretical approaches developed by the English School enrich the analysis of international security. He shows, for instance, how different combinations of institutions of international society (e.g., sovereignty, international law, democracy, and territoriality) contribute to shaping and influencing the agenda of contemporary

international security (Buzan, 2015, p. 7-8). It seems crucial to point out that there is a distinction, according to which there exist primary and secondary institutions. Primary institutions, as explained by Buzan, are fundamental ”patterns of shared practices rooted in values held commonly by members of interstate societies, and embodying a mix of norms, rules, and principles”, whereas secondary institutions are specifically and deliberately designed by states to achieve shared goals (Buzan, 2004, pp. 164-170). In fact, the deeper and more rooted principles and practices of primary institutions are reflected, supported, and reproduced by secondary institutions. Nonetheless, while primary institutions are durable, they are certainly not permanent and are subjects to constant evolution (Holsti, 2004). Examples of contemporary international primary and secondary institutions can be seen in table 1.

Table 1. Examples of contemporary international institutions

Primary institutionsSecondary institutions
SovereigntyUN General Assembly, ICJ, ICC
Balance of powerNATO, UN Security Council
EqualityUNHCR
TradeWTO, IMF
Environmental stewardshipCITES, the Kyoto treaty

Source: Buzan, B. (2002) The Primary Institutions of International Society, BISA Conference, London.

Since TOC is an international phenomenon, it negatively affects both domestic and international security, in the process, it can endanger various principles of primary institutions, such as democracy, accountability, international law, and states’ sovereignty. Hence, secondary institutions grounded in the primary ones are established to attempt to oppose destabilising effects of cross- border crimes and to maintain common norms, values, and rules.

The role of international organisations

Several scholars have highlighted that while secondary institutions, such as regimes and international organisations, constitute a particularly noteworthy area of research, the English School has to a large extent neglected the phenomenon of secondary institutions, devoting them scant attention and ”seeing them as mere materialisations of primary institutions” (Spandler, 2015). As concluded by Buzan (2009, pp. 43-44):

”academic division of labour […] between primary and secondary institutional study has been clear. But this division of labour has gone too far, with neither English school writers nor liberal institutionalists and regime theorists bothering to think about how the level of institutions that they study related to the other. Secondary institutions do not define international societies, but they do matter, not least as expression of, and possibly benchmarks for, primary institutions.”

Indeed, secondary institutions are essential for international society since they express, specify, or at times even change, ”constitutive principles and practices of primary institutions”. Thus, they contribute to fulfilling the common interests of nation-states (Ibrahim, 2018). Archer (2001, p. 33) defined an international organisation as:

”a formal, continuous structure established by agreement between members (governmental and/or non-governmental) from two or more sovereign states with the aim of pursuing the common interest of the membership”.

According to Reinecke (1998), international organisations have been central players in developing ‘global public policy’. They are instrumental in pushing forward certain items on the agenda, moblising members to set common objectives, and coordinating and monitoring actions taken by member states (Rittberger and Zangl 2006; Karns, Mingst and Stiles 2015). Furthermore, they serve as platforms and communication channels, giving state representatives opportunity to discuss policies and spread their views and ideas (Jakobi, 2009). Consequently, by bringing

different actors together, international organisations contribute to increasing interaction between member states. Importantly, Jakobi (2009, p. 4-5) noted that international organisations have at their disposal certain governance instruments that allow them to influence policy making and states’ behaviour, such as standard setting, discursive dissemination, coordinative functions, financial means, and technical assistance. It must be noted, however, that international organisations may have different means at hand (e.g., OECD does not have financing capacities), or that distinct instruments may be applied depending on context (Jakobi, 2009).

A considerable body of scholarship has focused on the efficiency of international organisations involved in the security sector, such as the UN Security Council, the EU and NATO. Some scholars looked at their design or institutional constraints that can limit international organisations’ potential to fulfill assigned functions (e.g., Coglianese, 2000; Andersen, 2010), whereas others concentrated on analysing the concept of legitimacy and legitimation strategies in relation to international organisations (e.g., Wheeler, 2000; Tallberg and Zürn, 2019; Binder and Heupel, 2021). Cooperation among member states and its impact on the functioning of international security organisations has also drawn attention of some scholars (e.g., Brady, 2008). Upon providing necessary context, this paper will explore some of the above mentioned concepts in relation to the case study.

Operation Venetic

Headquartered in The Hague, Europol, the ’European Police Office’, is crucial to EU’s efforts to defeat threats such as TOC, terrorism, and other organised and serious forms of crime (Europol, 2021a). Since its establishment in 1999, Europol has been engaged in intelligence gathering and analysis, facilitating information exchange, coordination of member states’ operational activities, and participating in the Joint Investigation Teams (JITs) (OJEU, 2002; Bureš, 2016; European Parliament, 2021). Broadly speaking, Europol serves to provide assistance, tools, guidance and information to member states in order to strengthen the EU’s cooperation in detecting and prevent ing different forms of major criminal threats. In addition, there are several strategic and bilateral cooperation agreements in place between Europol and third parties, e.g., with the United Nations Office on Drugs and Crime, Interpol, and several non-EU states (Kaunert, 2010, p. 655).

It is worth mentioning that Europol has no direct power to launch independent investigations, nor does it have the authority to make arrests, hence, it should not be regarded as an executive police force. According to Stergioulis (2020), it is the prevailing principle of national sovereignty accompanied by lack of trust that have impacted Europol’s establishment and the scope of its operational capacities, in fact, reducing them mainly to the supporting functions. Nonetheless, Europol has been highly active in supporting the EU’s member states in combating TOC and, on numerous occasions, its efforts were rewarded.

One of the most renowned joint investigations in which Europol has been recently involved was code named Operation Venetic (OV) in the UK (or Emma 95 in France and 26Lemont in the Netherlands). OV was a Europe-wide law enforcement operation that took place between March and June 2020 with the aim of decoding encrypted messages sent between users through EncroChat phones suspected of facilitating criminal activities (Shaw, 2020). Equipped with several special functions that were supposed to guarantee the absence of traceability and perfect anonymity (e.g., automatic deletion of messages or erasure of all data in the event of consecutive entries of a wrong password), cryptophones became a widely used communication mean between criminals operating in different parts of Europe following their launch in 2016 (NCA, 2020).

Eventually, EncroChat servers, which were located in France, were infiltrated by French and Dutch police agencies and, subsequently, the harvested data was distributed by Europol to the UK, Sweden, and Norway, among many other states (Europol, 2020a). Then, a series of large-scale law enforcement actions were executed across sixteen European states. Europol was also responsible for coordinating and timing police raids as well as distributing evidence to the right units and task forces (Casciani, 2020). The interception and decoding of messages sent via EncroChat platform resulted in hundreds of property searches and over 1000 Europe-wide arrests. Law enforcement agencies in he UK delivered a particularly huge blow to organised crime groups by seizing:

”over £54 million in cash; 77 firearms (including an AK47 assault rifle, machine guns, handguns, four grenades); over 1,800 rounds of ammunition; more than two tons of Class A and B drugs; over 28 million Etizolam pills (street Valium) from an

illicit laboratory; 55 high-value cars; 73 luxury watches; and 106 EncroChat handsets” (National Crime Agency, 2020).

While the activities on EncroChat were stopped and OV can be regarded as a shared success of European police and crime agencies, the operation shows the considerable scope of TOC and the advanced connectivity of criminal groups that collaborate at the national and international level. Undoubtedly, this complex investigation suggests that Europol has the ability to perform its tasks. However, the case study can be analysed in terms of threats posed by cross-border crime and elements that are essential for the agency to act effectively in its efforts to combat TOC. Firstly, preventing cross-border crime requires adequate and universal regulations and norms within the EU so that the agency can function properly. Secondly, without the alignment of objectives and cooperation of states in sharing intelligence, collaborative actions would not be feasible. Thirdly, constantly adapting criminal groups call into question international organisations’ ability to keep up with the innovations, trends, and changes in criminal world. All of the above challenges will be dealt with in subsequent sections.

Common norms

The very first problem when combating cross-border crime is to decide and agree on what is actually understood by the term. Interestingly, explanation of issues such as organised crime or TOC may vary among scholars, governments, and international organisations aimed specifically at fighting them (Fickenauer, 2005). As shown by Jakobi (2018) there is no precise and universal way of defining TOC since it is such a ’flexible threat’. As a result, certain inadequacies and overlaps between different international conventions may arise (Jakobi, 2018). For the purpose of this paper transnational crimes are conceptualised as:

”behaviours and activities that have a negative impact on the interests of more than one nation-state, implying that these types of crimes always take place across borders and should, consequently, be dealt with at an international level” (Marmo and Chazal, 2016).

The problem with understanding TOC lies in the fact that different activities present distinct threat potentials. Thus, ”differentiated analysis on the conditions, the effects, and the threats of each activity of transnational crime” are essential to be able to understand the dynamics and impact of cross-border crimes (Jakobi, 2018). The multiplicity of criminal actors in Europe and the diversity of operations they engage in makes it even more difficult to define and tackle TOC (Savona and Riccardi, 2015).

Furthermore, the complexity is amplified owing to variances in legal definitions and frameworks between member states – what is illegal in one country may be legal in another. Forsaith et al. (2012) highlights that the key issue of combating organised crime in Europe are, in fact, the wide differences in terms of legislative measures and regulatory frameworks that exist among European states. In his insightful paper, Brady (2018) shows that policing in Europe is especially difficult since ”Europe’s 1.2 million police officers operate in very different, and at times, incompatible ways”. Apart from distinct systems and structures (e.g., in Denmark there is solely one national police agency, whereas UK’s police is decentralised), police agencies in Europe have different norms and rules for gathering evidence, launching and conducting investigations, and sharing information, which at times can make collaboration difficult (Brady, 2018). Interestingly, phone taps, which are illegal in Great Britain, are fully legitimate when used by French police (France24, 2015).

Bureaucracies and certain procedures of member states or their inability to provide sufficient information and support to Europol in a timely manner may incur setbacks and barriers for the agency to act efficiently (Eurojust, 2005). As it was shown in the case of OV, Europol is reliant on intelligence received from the member states in order to coordinate and facilitate transnational investigations. Members of criminal groups who were arrested during the operation have been engaged in multiple criminal activities in various parts of Europe, taking advantage of different illicit markets (e.g., drug trafficking and car theft in the Netherlands, and financial crimes and drug distribution in the UK) (NCA, 2020). Swiftness and efficiency were crucial since EncroChat warned its users and urged them to get rid of the cryptophones immediately as soon as its employees learnt that the platform was being infiltrated by a public authority (Europol, 2020a). Therefore, the unity of norms and processes is crucial for ensuring close and neat exchange of data among actors involved in investigations. This is especially important because TOC groups substantially

benefit from and exploit variances in policing practices, regulations, and capacities of law enforcement agencies operating in different states and regions.

Cooperation and alignment of goals

According to SOCTA (Serious and Organised Crime Threat Assessment), over 5,000 transnationally operating organised crime groups are being investigated in the EU (Europol, 2017). Estimating the magnitude of the revenues produced by TOC is not simple, mainly, due to lack of empirical data. Nonetheless, all Illicit activities in the European Union generate approximately 1% of the EU’s GDP (or 110 billion euro) year-on-year (Savona and Riccardi, 2015). Interestingly, the illicit markets in Europe are not monopolised, instead, there is a plurality of criminal actors (e.g., large and structured groups, free-lance criminals, motorcycle gangs, loose networks, street gangs, and many others) involved in various operations, such as counterfeiting, illicit tobacco, fraud, illicit drugs, human trafficking and organised property crime (Savona and Riccardi, 2015). In geographical terms, there are five primary hubs in Europe which constitute concentrations of specific criminal activities (for example, the South East hub where illicit commodities and illegal immigration proliferate) (Europol, 2011). Due to highly heterogeneous and evolving nature of TOC in Europe, adequate cooperation between member states of intelligence and law enforcement agencies is required to contain cross-border crimes. Nonetheless, there exist significant barriers that shape Europol’s operational capacities and may prevent the agency from appropriately fulfilling its tasks (Safjański, 2013).

Institutional and organisational constraints are factors that can limit Europol’s ‘added value’ to national police forces. Europol’s efficiency is sometimes negatively affected by bureaucratic standstills and complex administrative procedures within member states. As previously mentioned, Europol primarily concentrates on developing and providing supporting mechanisms to the police authorities in Europe. Nonetheless, the amount and quality of data shared with the agency may significantly vary depending on priorities and resources of different member states (Rozée, Kaunert and Léonard, 2013). Countries may refrain from sharing intelligence with Europol since it may not be in their best interest, e.g., in case when the analysis of costs incurred and associated danger

indicates that the risks outweigh the potential benefits (Fägersten, 2010). Interestingly, the evidence suggests that the institutional design of Europol as well as its legal framework may, similarly, cause setbacks and hamper the combat against TOC (Brady, 2008; Stergioulis, 2020). For instance, unanimous approval of all members of the Europol’s management board (including representatives of all 26 member states) is required to implement even a minor administrative change (Brady 2008; Europol, 2020b).

This highlights how varying objectives among member states and their resistance or inability to cooperate may contribute to disruption of Europol’s activities. Most notably, events related to Brexit call into question whether Europol is capable of tackling TOC groups after the membership termination of one of the Europol’s strongest partners. Operation Venetic highlighted the significance of the UK’s market for cross-border criminals involved in illicit drugs and fraud among other crimes. As a consequence of leaving the EU, police forces in the UK ceased to have full access to the Schengen Information System (SIS) (StateWatch, 2021). Comprising of details of 34,962 individuals wanted under the European Arrest Warrant as well as many other valuable data and instruments, the SIS used to be accessed approximately 500 million times yearly by intelligence officials in the UK (Casciani, 2020; European Commission, 2021). Currently, the UK is unable to issue alerts on refusal of entry and stay across the whole Schengen Area, making it more complicated for both Europol and UK’s law enforcement to share information (ETIAS, 2022). Reduced availability and exchange of vital data and intelligence puts the European security operations at considerable risk.

Relevance and efficacy

Technological progress enables criminals to develop new ways of committing crimes and provides them with tools to operate more swiftly and effectively. As seen above, cryptophones can be used to facilitate discreet communication and decrease the possibility of detection by law enforcement agencies. The EncroChat communication network had been serving its 60.000 subscribers (vast majority of which were criminals) for almost four years before it was eventually infiltrated in 2020 (Wright, 2020). During that period, OCGs could coordinate their activities, strengthen cooperation

with domestic partners, and build transnational alliances thanks to the messaging service. Indeed, transnationally operating criminals take advantage of technological advancements and innovations. To provide other examples, weaponised drones assist Mexican criminal groups in attacks against police authorities (BBC News, 2021); easily accessible consumer drones support human traffickers in monitoring routes (Jones, 2020); whereas 3D printers allow arm traffickers to produce illicit firearms that are difficult to detect during cross-border checks (Daly et al., 2021).

The internet also helps to facilitate criminal activity on a number of different levels. Social media, for example, allow criminals to advertise products, spread disinformation, recruit new members communicate and send instructions. Unsurprisingly, misinformation, fraud schemes, ransomware, and phishing campaigns have all increased during the COVID-19 pandemic due to growing reliance on the internet, computer systems, and mobile devices caused by social distancing (Council of Europe, 2021). According to Interpol (2021), cybercrime has recently become one of the central challenges for contemporary international security organisations since there are no borders at all in virtual space, thus, ”threats and attacks can come from any location at any time, posing challenges for police because incidents may involve suspects, victims and crimes spanning multiple countries”. Nowadays, practically all criminal operations feature some online component, whereas some criminal activities have completely moved into the digital realm (Europol, 2022).

The proliferation of online crime resulted in the establishment of the Europol’s European Cybercrime Centre (EC3) in 2013. The unit is aimed specifically at disrupting and dismantling cybercrime networks in Europe (Europol, 2021b). Security agencies seem to understand that the usage of new technologies by TOC groups requires reevaluation of existing practices and introduction of new, comprehensive legal frameworks. However, the question remains whether international security organisations in their contemporary form and institutional structure are actually capable of acting swiftly, flexibly, and cooperatively when combating such a heterogeneous and constantly adopting phenomenon as cross-border crime. According to a report published by Europol (Europol, 2019), which focused on the role of innovations and their impact on the future of crime and law enforcement, emerging technologies (e.g., quantum computing, 5G, cryptocurrencies, artificial intelligence, and molecular biology) are identified as both the challenges and opportunities for proactive law enforcement. While they have disruptive and destabilising

effects when exploited by criminals, technological developments can benefit international security organisations when understood, invested in and, then, implemented (Europol, 2019). As evidenced, however, changes and adjustments occur more rapidly among transnational crime groups than at the international level, which does not bode well for agencies such as Europol which has been previously criticised for being largely reactive, rather than proactive.

Conclusion

Even though contemporary international security organisations possess significant financial and technical resources, and have access to extensive databases, transnational organised crime continuously represents a pressing challenge to these agencies and our societies. Tackling TOC has become a highly difficult task owing to the increased mobility of persons, goods and capital as well as technological advancements, which accelerate innovation across the whole spectrum of criminality and make it more difficult to detect and infiltrate criminals. Nonetheless, technology ought to be regarded as a double-edge sword since it can facilitate the fight against crime through supporting the efforts of security agencies, as in the case of Operation Venetic. Thus, in order to remain a relevant actor, it is necessary for Europol to invest in, understand and actively employ those powerful tools into operations.

As it was pointed out, misaligned objectives among members of international security organisations may negatively influence their collective effort to combat cross-border crime. Similarly as other institutions aimed at containing TOC, Europol is simply unable to function properly without swift exchange of information and prioritisation of cooperation among states and partners. Moreover, significant variances within regulatory frameworks and practices of member states can undermine Europol’s effectiveness. Thus, Europol ought to work with governments and national agencies to adjust certain procedures and attempt to homogenise legal differences as they may inhibit intelligence gathering and transnational investigations. Simultaneously, the security organisation should constantly assess its vulnerabilities, potential risks and barriers to be able to strengthen the EU’s capacity to combat transnational criminal threats and oppose destabilising effects of cross-border crimes.

References

Albanese, J. and Reichel, P. (2013) Transnational organized crime: an overview from six continents. Thousand Oaks: SAGE Publications.

Andersen, M. S. (2010) ’Institutional Constraints to Effective Peacebuilding in Liberia’. Policy brief. Available at: https://nupi.brage.unit.no/nupi-xmlui/bitstream/handle/11250/194389/PB-07-10- Skumsrud%20Andersen.pdf?sequence=3 (Accessed: 22 May 2022).

Archer, C. (2001) International organizations. 3rd edn. New York: Routledge.
BBC News (2021) Mexico cartel used explosive drones to attack police. Available at: https://

www.bbc.com/news/world-latin-america-56814501 (Accessed: 30 May 2022).
Binder, M. and Heupel, M. (2021) ’The Politics of Legitimation in International Organizations.’

Journal of Global Security Studies. 6(3). https://doi.org/10.1093/jogss/ogaa033

Boer, M., Hillebrand, C. and Nölke, A. (2007) ’Legitimacy under Pressure: The European Web of Counter-Terrorism Networks’. Journal of Common Market Studies. 46(1). pp. 101-124. https:// doi.org/10.1111/j.1468-5965.2007.00769.x

Bull, H. (2002) The anarchical society: A study of order in world politics. Basingstoke: Palgrave. Bureš, O. (2016) ‘Intelligence sharing and the fight against terrorism in the EU: Lessons learned

from Europol’.European View. 15(1). pp. 57-66.

Buzan, B. (2009) ’The Middle East Through English School Theory’, in International Society and the Middle East: English School Theory at the Regional Level, eds. Buzan, B. and Gonzalez- Pelaez, A. pp. 24-44. New York: Palgrave Macmillan.

Buzan, B. (2015) ’The English School: a neglected approach to International Security Studies’. Security Dialogue. 46 (2). pp. 126-143. DOI: 10.1177/0967010614555944

Casciani, D. (2020) ’Brexit: What does it mean for security in the UK?’, BBC News. Available at: https://www.bbc.com/news/explainers-55333543 (Accessed: 29 June 2022).

Coglianese, C. (2000) Globalization and the Design of International Institutions. Available at:https://scholarship.law.upenn.edu/cgi/viewcontent.cgi?article=2550&context=faculty_scholarship (Accessed: 29 June 2022).

Council of Europe (2021) Cybercrime and COVID-19. Available at: https://www.coe.int/en/web/ cybercrime/-/cybercrime-and-covid-19 (Accessed: 12 May 2022).

Daly, A., Mann, M., Squires, P. and Walters, R. (2021) ’3D printing, policing and crime’. Policing and Society. 31(1). pp. 37-51. DOI: 10.1080/10439463.2020.1730835

Edwards, A. (2005) ’Transnational Organised Crime’, in. Transnational and Comparative Criminology in a Global Context, eds. Sheptycki, J. and Wardak A. London: Glasshouse Press.

ETIAS (2022) The Schengen Information System: keeping Europe safe. Available at: https:// www.etiasvisa.com/etias-news/schengen-information-system-sis (Accessed: 25 July 2022).

Eurojust (2005) Annual Report 2005. Available at: https://www.eurojust.europa.eu/pl/eurojust- annual-report-2005 (Accessed: 28 July 2022).

Europol (2015) Exploting Tomorrow’s Organised Crime. Available at: https://www.google.com/url? sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiQzsSRhPTwAhVCw4sKHeLFDgcQFjAB egQIBBAD&url=https%3A%2F%2Fwww.europol.europa.eu%2Fsites%2Fdefault%2Ffiles %2Fdocuments%2FEuropol_OrgCrimeReport_web-final_0.pdf&usg=AOvVaw3ddnZPsdzfx- kxRHVZHdhI (Accessed: 11 June 2022).

European Commission (2020) EU support in research on transnational organised crime in Africa in the context of COVID-19. Available at: https://ec.europa.eu/fpi/news/eu-support-research- transnational-organised-crime-africa-context-covid-19_en (Accessed: 16 June 2022).

European Commission (2021) European Arrest Warrant. Available at: https://ec.europa.eu/info/law/ cross-border-cases/judicial-cooperation/types-judicial-cooperation/european-arrest-warrant_en (Accessed: 14 June 2022).

European Parliament (2021) Revision of the Europol Regulation. Available at: https:// www.europarl.europa.eu/thinktank/en/document.html?reference=EPRS_BRI (Accessed: 11 June 2022).

Europol (2011) OCTA 2011: EU Organized Crime Threat Assessment. Available at: https:// www.europol.europa.eu/sites/default/files/publications/octa_2011_1.pdf (Accessed: 18 June 2022).

Europol (2017) OEuropean Union Serious and Organised Crime Threat Assessment 2017. Available at: https://www.europol.europa.eu/publications-events/main-reports/european-union- serious-and-organised-crime-threat-assessment-2017 (Accessed: 21 May 2022).

Europol (2020a) Dismantling of an encrypted network sends shockwaves through organised crime groups across Europe. Available at: https://www.europol.europa.eu/newsroom/news/dismantling- of-encrypted-network-sends-shockwaves-through-organised-crime-groups-across-europe (Accessed: 20 May 2022).

Europol (2020b) Management Board Members. Available at: https://www.europol.europa.eu/ management-board-members (Accessed: 26 June 2022).

Europol (2021a) About Europol. Available at: https://www.europol.europa.eu/about-europol (Accessed: 29 May 2022).

Europol (2021b) European Cybercrime Centre – EC3. Available at: https://www.europol.europa.eu/ about-europol/european-cybercrime-centre-ec3 (Accessed: 5 June 2022).

Europol (2022) Serious and Organised Crime in the EU: A corrupting influence. Available at: https://www.europol.europa.eu/media-press/newsroom/news/serious-and-organised-crime-in-eu- corrupting-influence (Accessed: 29 May 2022).

Fägersten, B. (2010) ’Bureaucratic Resistance to International Intelligence Cooperation – The Case of Europol’. Intelligence and National Security. 25(4). pp. 500-520. DOI: 10.1080/02684527.2010.537028

Fickenauer, J. O. (2005) ’Problems of Definition: What Is Organized Crime?’. Trends in Organized Crime. 8(3).

FBI (2021) What we investigate: Transnational Organized Crime. Available at: https://www.fbi.gov/ investigate/organized-crime (Accessed: 8 June 2022).

France24 (2015) French court approves sweeping new surveillance powers. Available at: https:// www.france24.com/en/20150724-france-surveillance-law-approved-phone-taps-internet-hollande- terrorism (Accessed: 28 May 2022).

Interpol (2021) Cybercrime threat response. Available at: https://www.interpol.int/Crimes/ Cybercrime/Cybercrime-threat-response (Accessed: 30 May 2022).

Jakobi, A. P. (2009) ’International organizations and world society: studying global policy development in public policy’. TranState Working Papers. Universität Bremen.

Jakobi, A. P. (2018) ’The Crime Scene: What Lessons for International Security?’, in The Oxford Handbook of International Security, eds. Gheciu, A. and Wohlforth, W. C. DOI: 10.1093/oxfordhb/ 9780198777854.013.32

Karns, M., Mingst, K. and Stiles, K. (2015) International Organizations: The Politics and Processes of Global Governance. 3rd edn. Boulder: Lynne Rienner Publishers.

Kaunert, C. (2010) ’Europol and EU counterterrorism: International Security Actorness in the External Dimension’. Studies in Conflict and Terrorism. 33(7). pp. 652-671. DOI: 10.1080/1057610X.2010.484041

Jones, K. (2020) How Organized Crime Networks Are Using Drones to Their Advantage. Available at: https://insightcrime.org/news/brief/drones-narcotrafficking-surveillance/ (Accessed: 30 May 2022).

Marmo, M. and Chazal, N. (2016) Transnational Crime and Criminal Justice. London: SAGE Publications.

National Crime Agency (2020) NCA and police smash thousands of criminal conspiracies after infiltration of encrypted communication platform in UK’s biggest ever law enforcement operation. Available at: https://www.nationalcrimeagency.gov.uk/news/operation-venetic (Accessed: 22 May 2022).

NCA (2020) NCA and police smash thousands of criminal conspiracies after infiltration of encrypted communication platform in UK’s biggest ever law enforcement operation. Available at: https://www.nationalcrimeagency.gov.uk/news/operation-venetic (Accessed: 21 May 2022).

OJEU (2002) Council Framework Decision of 13 June 2002 on joint investigations teams, (2002/465/JHA), L 162/1, 20.6.2002.

Quayle, L. (2013) Southeast Asia and the English School of International Relations: A region- theory dialogue. Basingstoke: Palgrave Macmillan.

Reinecke, W. (1998) Global Public Policy. Governing without Government. Washington: Brookings Institution.

Rittberger, V. and Zangl, B. (2006) International Organisation: Polity, Politics and Policies. Houndsmill: Palgrave.

Rozée, S., Kaunert, Ch. and Léonard, S. (2013) ’Is Europol a Comprehensive Policing Actor?’ Perspectives on European Politics and Society. 14(3). pp. 372-387. DOI: 10.1080/15705854.2013.817808

Safjański, T. (2013) ’Barriers to the Operational Effectiveness of Europol’. Internal Security. 5(1). pp. 53-70. DOI: 10.5604/20805268.1059467

Savona, E. U. and Riccardi, M. (2015) From illegal markets to legitimate businesses: the portfolio of organised crime in Europe. Available at: https://www.transcrime.it/wp-content/uploads/2015/12/ ocp.pdf (Accessed: 22 June 2022).

Shaw, D. (2020) ’Hundreds arrested as crime chat network cracked’, BBC News. Available at: https://www.bbc.com/news/uk-53263310 (Accessed: 27 May 2022).

Spandler, K. (2015) ’The political international society: Change in primary and secondary institutions’. Review of International Studies. Cambridge University Press. 41(3). pp. 601-622. doi: 10.1017/S026021051400045X.

StateWatch (2021) EU: Europol holding on to UK data post-Brexit. Available at: https:// www.statewatch.org/news/2021/april/eu-europol-holding-on-to-uk-data-post-brexit/ (Accessed: 27 May 2022).

Suzuki, S. (2009) Civilization and empire: China and Japan’s encounter with European international society. London: Routledge.

Tallberg, J. and Zürn, M. (2019) ’The legitimacy and legitimation of international organizations: introduction and framework’. The Review of International Organizations. 14(1). pp. 581-606. https:// doi.org/10.1007/s11558-018-9330-7

Tan Shek Yan, E. (2013) Understanding African international society: An English School approach. Aberystwyth University.

Wheeler, N. (2000) ’Reflections on the legality and legitimacy of NATO’s intervention in Kosovo’. The International Journal of Human Rights. 4(3). pp. 144-163. DOI: 10.1080/13642980008406897

Wright, R. (2020) Hundreds arrested across Europe as French police crack encrypted network. Available at: https://www.ft.com/content/7006913f-be3d-49b5-8ba7-7c5b78b551b2 (Accessed: 27 June 2022).

Dodaj komentarz

Twój adres e-mail nie zostanie opublikowany. Wymagane pola są oznaczone *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Skip to content