Sorry, you need to enable JavaScript to visit this website.

Judicial Cooperation Key documents

08 February 2016|AVAILABLE IN ENGLISH
The objective of the JIT evaluation report is to provide an overview of the content of the JIT evaluation forms received by the Secretariat over a certain period of time.
10 December 2015|AVAILABLE IN ENGLISH
In this issue: 1. Freezing and confiscation of the proceeds of crime – the main issues 2. Definitions 3. Legal framework 4. Eurojust’s work in this area 5. European efforts 6. NCB confiscation: If not, why not? 7. Interviews with: - Ms Jill Thomas, - Dr Nicola Selvaggi, - Mr Leif Görts, - Mr Filippo...
27 August 2015|AVAILABLE IN ENGLISH
What is a JIT? A joint investigation team (JIT) is a team consisting of judges, prosecutors and law enforcement authorities of several States, established for a fixed period and a specific purpose by way of a written agreement, to carry out criminal investigations in one or more of the involved...
27 August 2015|AVAILABLE IN ENGLISH
Through this funding programme, Eurojust intends to promote the setting up of JITs by reducing the impact on national budgets of costs incurred due to the transnational dimension of the case.
04 June 2015|AVAILABLE IN ENGLISH
The strategic seminar ‘Conflicts of Jurisdiction, Transfer of Proceedings and Ne Bis in Idem: Successes, Shortcomings and Solutions’, jointly organised by Eurojust and the Latvian Presidency of the EU, took place on 4 June 2015. The seminar was organised in combination with the 9th Meeting of the...
04 June 2015|AVAILABLE IN ENGLISH
This report concerns Eurojust’s experience in the field of the prevention and resolution of conflicts of jurisdiction, in particular, in the period from 2009 to 2014. The report is based on Eurojust’s casework, seminars organised or co-organised by Eurojust and contributions made by Eurojust. The...
11 May 2015|AVAILABLE IN ENGLISH
01 April 2015|AVAILABLE IN ENGLISH
BlackShades was an organisation developing and selling malicious software (malware) that enabled buyers to infect computers and remotely take over and control the operations of the infected computers, and perform distributed denial-of-service (DDoS) cyber-attacks, among other things. An FBI...