Skip to main content

Digital Library

Displaying 1 - 5 of 12 results

  • A Whole-of-Society Approach to Preventing and Countering Violent Extremism and Radicalization That Lead to Terrorism - A Guidebook for Central Asia

    The guidebook on “A Whole-of-Society Approach to Preventing and Countering Violent Extremism and Radicalization That Lead to Terrorism - A Guidebook for Central Asia” is one in a series of technical guidebooks produced by the Transnational Threat Department/ Action against Terrorism Unit and focuses on the challenges in developing and implementing effective programmes to prevent and counter VERLT in Central Asia. This volume aims to support policy makers in the region in the development and implementation of effective and relevant P/CVERLT strategies while strengthening the co-operation among government sectors and civil society actors.

  • Montenegro Serious and Organised Crime Threat Assessment

    The report is intended to provide help to all law enforcement agencies and state institutions in Montenegro, as well as other entities involved in fighting serious and organised crime.

  • Serious and Organised Crime Threat Assessment of Montenegro

    This assessment of Montenegro was conducted by the Montenegrin Police Directorate, based on the data from the current situation, dynamics and trends in serious and organised crime, with the purpose to allow law enforcement agencies and state institutions to better understand the situation in the country.

  • Report on Central Asia Regional online workshop on basic police training

    This report, produced by the SPMU, contains summaries of the discussions, as well as executive summary and conclusions and recommendations.

  • Convention on Cybercrime

    The Convention is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. It also contains a series of powers and procedures such as the search of computer networks and interception.