<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Romeo Drobarov</style></author><author><style face="normal" font="default" size="100%">Biljana Popovska</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Development of the EU Policy of Police Cooperation with Third Countries: The Case  of the Republic of North Macedonia</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Counterterrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">European Union</style></keyword><keyword><style  face="normal" font="default" size="100%">Europol</style></keyword><keyword><style  face="normal" font="default" size="100%">Organized crime</style></keyword><keyword><style  face="normal" font="default" size="100%">police cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">third countries</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">48</style></volume><pages><style face="normal" font="default" size="100%">201-212</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Organized crime and terrorism threats to EU citizens require effective police cooperation. This article provides an overview of efforts for establishing a solid fundament for cooperation among agencies of the EU Member States and with third countries emphasising the role of Europol. Applied case study as a research method pinpoints developing police cooperation among Europol, EU Member States, and third countries. The focus is on the activities of the Europol unit at the Ministry of Interior in Skopje. The authors critically review the implementation of cooperation strategies, agreements, and plans in the specific legislative and policy framework of the Republic of North Macedonia. The findings will be of interest to anyone interested in the challenges of incorporating EU policy in police institutions of third countries.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">201</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Rosław Jeżewski</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cross-domain Coercion as Russia’s Endeavor to Weaken the Eastern Flank of NATO: A Latvian Case Study</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">corrupt government</style></keyword><keyword><style  face="normal" font="default" size="100%">cross-domain coercion</style></keyword><keyword><style  face="normal" font="default" size="100%">Eastern Flank</style></keyword><keyword><style  face="normal" font="default" size="100%">economic footprint</style></keyword><keyword><style  face="normal" font="default" size="100%">Latvia</style></keyword><keyword><style  face="normal" font="default" size="100%">Latvian resistance</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">Organized crime</style></keyword><keyword><style  face="normal" font="default" size="100%">Russia</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">18</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Cross-domain coercion is tangible on NATO’s Eastern flank and characterized by the use of derogatory propaganda, fake news, financial assets in the Latvian banking system, Russian-based organized crime, and various military elements. This study on cross-domain coercion, however, concentrates also on the cohesion of the Latvian population, existing gaps within society, and its susceptibility to being exploited by Russia. To acquire data for this study, the author conducted interviews with representatives of the Eastern flank countries and performed an extensive literature review. To determine the root causes of vertical division in the society, the “5 WHYs” method was used. This research has proved that the presence of a Russian minority and the Russian-based organized crime minority can be a good base to create unrest and that Russia is able to influence the internal policy of a country when the Russian economic footprint exceeds 12 % of GDP. The demographics and the cohesion (including vertical and horizontal divisions) of the society are factors determining the resistance of Latvia. The triumph of the populist parties during the October 2018 parliamentary elections reflect the trend that the nation is tired of the corrupt and ineffective government rather than that it is drifting towards Russia. In a broader scope, it is expected that cross-domain coercion will increase and Russia will test the cohesion of NATO.</style></abstract><issue><style face="normal" font="default" size="100%">1-2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chris Deliso</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Risks Relating to the Migrant Crisis and Interagency Cooperation: The Case of Macedonia and Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">illegal migration</style></keyword><keyword><style  face="normal" font="default" size="100%">interagency cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">Organized crime</style></keyword><keyword><style  face="normal" font="default" size="100%">psychological warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">Terrorism</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">21-27</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The migrant crisis in the Balkans from 2015-2016 is examined as an example of a hybrid-warfare scenario in contemporary Europe that demonstrates how institutionally-driven security responses that can be applied to successfully counter hybrid threats. Analyzing the experience of Macedonia and Bulgaria, the author identifies five types of security threats that were witnessed along the Balkan route during the migrant crisis. Migrant flows can be infiltrated by potential terrorist for the purposes of simple transit and/or attack scenarios. Organized crime, e.g. by combining human trafficking with other illegal activities, is the second security risk. Thirdly, hostile intelligence penetration of migrant inflows was a very serious hybrid threat, given the opacity of the phenomenon, i.e., the inability to distinguish ‘who is who’ and what their intentions are. Fourth, the presence of pro-migrant activist and anarchist groups with a track record of violent behavior was a persistent threat as it could be multiplied by participation of large numbers of migrants in concentrated efforts against state borders. Finally, the security situation was affected by the important, and yet often forgotten, psychological warfare. </style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">21</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mirosław Banasik</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Changing Security Paradigm. New Roles for New Actors – The Russian Approach</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">European Union</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">Organized crime</style></keyword><keyword><style  face="normal" font="default" size="100%">Russian Federation</style></keyword><keyword><style  face="normal" font="default" size="100%">threats</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Fall 2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">31-43</style></pages><abstract><style face="normal" font="default" size="100%">The success of the Russian Federation in Ukraine and the annexation of Crimea attest to the fact that the hybrid warfare constitutes an effective tool for achieving political objectives. This article evaluates the nature of hybrid warfare based on theoretical publications on the art of war and doctrinal documents of the Russian Federation, and characterizes the practical dimensions of hybrid warfare. It can be concluded on that basis that hybrid warfare and organized crime constitute real threats to European safety and security. International organizations such as NATO and the European Union so far have not drawn up neither the strategy nor effective tools for countering these phenomena.</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Piotr Dela</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyberspace as the Environment Affected by Organized Crime Activity</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">Information warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">Organized crime</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">55-64</style></pages><abstract><style face="normal" font="default" size="100%">This article provides an overview of the main issues surrounding the use of cyberspace as the field on which information warfare is waged. It also investigates the role of organized criminal activities. The basic impact, place and role of recognition and counter-recognition in cyberspace are identified. The economic impact in terms of the level of development of cyberspace is also assessed.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">55</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nika Chitadze</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Global Dimensions of Organized Crime and Ways of Preventing Threats at International Level</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">illegal formations</style></keyword><keyword><style  face="normal" font="default" size="100%">international conventions</style></keyword><keyword><style  face="normal" font="default" size="100%">law enforcement agencies</style></keyword><keyword><style  face="normal" font="default" size="100%">mafia</style></keyword><keyword><style  face="normal" font="default" size="100%">Organized crime</style></keyword><keyword><style  face="normal" font="default" size="100%">smuggling</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">17-32</style></pages><abstract><style face="normal" font="default" size="100%">The present paper predominantly focuses on the different approaches related to the definition of organized crime, the primary conditions that create a convenient foundation upon which organized crime can develop, the main activities of organized criminal groups, and leading organized criminal formations across the different regions of the world, in particular, the Italian Mafia, the Japanese bōryokudan (Yakuza), Chinese triads, Colombian drug cartels, and Russian criminal organizations (“Russian Mafia”), and so on.
The second part of the paper is dedicated to the review of the international experience of fighting against transnational organized crime, particularly with regard to different international conventions and agreements within the nineteenth century and first half of the twentieth century. It also explores this phenomena on a UN-level and with reference to a range of European institutions (the EU, Council of Europe). The concluding section sees an examination of the role of law enforcement agencies in the fight against organized crime.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">17</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sam Mullins</style></author><author><style face="normal" font="default" size="100%">James K. Wither</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Terrorism and Organized Crime</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">convergence</style></keyword><keyword><style  face="normal" font="default" size="100%">Counter-terrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">crime-terror nexus</style></keyword><keyword><style  face="normal" font="default" size="100%">law-enforcement</style></keyword><keyword><style  face="normal" font="default" size="100%">Organized crime</style></keyword><keyword><style  face="normal" font="default" size="100%">Terrorism</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">65-82</style></pages><abstract><style face="normal" font="default" size="100%">This article begins with an assessment of the similarities and differences between terrorists and criminals, including profiles, methods, systems of organization and motives. Notably, the article identifies seven categories of crimes committed by terrorists: 1) Inherent/violent, 2) Preparation/facilitation, 3) Funding, 4) Specialized terrorism offenses, 5) Vigilantism/public relations, 6) Miscellaneous/Spontaneous/Unrelated Offences, and 7) Previous criminal records. Next, the crime-terror nexus is discussed and four types of relationships between terrorists and criminals are identified: 1) Interaction, 2) Appropriation, 3) Assimilation, and 4) Transformation. The article concludes with a discussion of the concept of convergence between terrorism and organized crime, and implications for counter-terrorism and law-enforcement.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">65</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aleksejs Loskutovs</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Transnational Organized Crime – Latvian Challenges and Responses</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">border crossing</style></keyword><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">human trafficking</style></keyword><keyword><style  face="normal" font="default" size="100%">illegal trafficking</style></keyword><keyword><style  face="normal" font="default" size="100%">Money Laundering</style></keyword><keyword><style  face="normal" font="default" size="100%">narcotic substances</style></keyword><keyword><style  face="normal" font="default" size="100%">Organized crime</style></keyword><keyword><style  face="normal" font="default" size="100%">vehicle theft</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">33-39</style></pages><abstract><style face="normal" font="default" size="100%">This article provides recent evidence from Latvia on activities of organized crime groups, covering illegal border crossing, drug trafficking, economic crime, money laundering, theft of vehicles, human trafficking, and the corruption related to all these types of crime. The concluding section presents regional and European initiatives to counter organized crime, in which Latvian law enforcement agencies participate, as well as the national project to build a fence on the border with the Russian Federation.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record></records></xml>