Master thesis | Crisis and Security Management (MSc)
closed access
The focus of this paper is the security cooperation between FIU-NL and Europol, organizations that annually process transaction data on millions of EU-citizens. The author makes the case that...Show moreThe focus of this paper is the security cooperation between FIU-NL and Europol, organizations that annually process transaction data on millions of EU-citizens. The author makes the case that Function Creep, “the expansion of the use of a system or token to include other functions not originally envisioned by their promotors” undermines trust and therefore hinders security cooperations. Through the application of Whelans network theory and the concept of Function Creep in a case study design. The case study is of the implementation of the integration of FIU.net, a decentralized system, into SIENA, Europols centralized database. The author argues that a clear negative impact on trust is found, even when the Function Creep is only ‘intended’ and aims to expand upon the commonly understood conceptualization of Function Creep.Show less
Master thesis | Crisis and Security Management (MSc)
open access
Increasingly, law enforcement focuses on the prevention of crime. In this approach, the role of information is important. Especially combined with the technological advancements of Internet and...Show moreIncreasingly, law enforcement focuses on the prevention of crime. In this approach, the role of information is important. Especially combined with the technological advancements of Internet and social media make that using publicly accessible information is inevitable. Whether this implies that such “open-source information” is freely accessible to law enforcement officers tasked with intelligence-led policing and creating intelligence remains to be the question. By means of a literary analysis, document analysis, interviews with practitioners and a single case study this research aimed to find out how intelligence officers can make use of this vast and valuable amount of information whilst adhering to security principles of surveillance and entrapment. This study found that there is no judicial framework built around creating intelligence as is the case with ongoing criminal investigations and surveillance is only partially possible. Article 3 of the Police Directive functions as the basis of officer’s functioning and any privacy breach that is more than necessary needs to be carefully considered under principles of proportionality and necessity. The assessment of these is thus vital, especially when applied to issues of national security – e.g. right-wing extremism – where these two principles have the opportunity of clashing. The study also found that a clear distinction between tasks of the public prosecutor and the municipality is of importance in order for intelligence officers to engage in effective intelligence-led policing. Finally, the attitude towards information as merely “nice-to-have” within intelligence-led policing needs to shift towards “need-to-have” to properly assess necessity and proportionality.Show less