{"id":28123,"date":"2019-07-30T16:00:00","date_gmt":"2019-07-30T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=89687"},"modified":"2019-07-30T16:00:00","modified_gmt":"2019-07-30T16:00:00","slug":"council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/","title":{"rendered":"Council of EU Law Enforcement Protocol improves cross-border cooperation"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/07\/EU-Protocol-full-size-1024x682.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Last March, the Council of the European Union announced the new <a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/law-enforcement-agencies-across-eu-prepare-for-major-cross-border-cyber-attacks\" target=\"_blank\" rel=\"noopener noreferrer\">EU Law Enforcement Emergency Response Protocol<\/a> to address the growing problem of planning and coordinating between governments, agencies, and companies when cyberattacks occur across international boundaries. Remember well-known incidents such as NotPetya and WannaCry? They\u2019re good examples of how cyberattacks can simultaneously impact organizations and other entities in two or more countries. This especially applies to multinational corporations since they have footprints in multiple jurisdictions.<\/p>\n<p>In reading through the Protocol, a few key items are worth noting:<\/p>\n<ul>\n<li><strong>There\u2019s a focus on process<\/strong>\u2014It\u2019s so good to see them focusing on process (and not only on technology). Too many regulations and rulesets talk about technology as if it\u2019s the sole solution to all problems. To truly resolve cybersecurity attacks and to mitigate downstream implications quickly, it takes the combination of <strong>technology + people + process<\/strong>.<\/li>\n<li><strong>Operational Technology (OT) systems and risks need more attention<\/strong>\u2014For many years, OT systems have been increasingly attacked by adversaries. While the focus on IT in the Protocol is logical, the omission of OT factors keeps it from being an even stronger and more robust document. The new Protocol explicitly calls out this problem when it says, \u201c\u2026to establish the criminal nature of the attack, it\u2019s fundamental that the first responders perform all required measures \u2026 to preserve the electronic evidence that could be found within the IT systems affected by the attack, which are essential for any criminal investigation or judicial procedure.\u201d This omission of OT systems is all the more confusing when the <a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/law-enforcement-agencies-across-eu-prepare-for-major-cross-border-cyber-attacks\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a> announcing the Protocol states that, \u201cThe possibility of a large-scale cyber-attack having serious repercussions in the physical world and crippling an entire sector or society, is no longer unthinkable.\u201d<\/li>\n<li><strong>Operational alignment is well-executed<\/strong>\u2014Praise is deserved for the outstanding effort to coordinate multi-stakeholder processes using existing resources and teams. For instance, a partial list of the entities working on these issues in Europe includes <a href=\"https:\/\/www.europol.europa.eu\/about-europol\/european-cybercrime-centre-ec3\" target=\"_blank\" rel=\"noopener noreferrer\">Europol\u2019s European Cybercrime Centre (EC3)<\/a>, the <a href=\"http:\/\/www.ecsirt.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">European Union\u2019s Cybersecurity Incident Response Team (CSIRT) Network,<\/a> the <a href=\"https:\/\/www.enisa.europa.eu\/\" target=\"_blank\" rel=\"noopener noreferrer\">European Union Agency for Network and Information Security (ENISA)<\/a>, and other EU member law enforcement groups. While everyone has the best interest of preventing and responding to cyberattacks at heart, ensuring the alignment and optimal use of existing resources makes very good sense.<\/li>\n<li><strong>Important cross-border thinking adds value<\/strong>\u2014Cyber-adversaries pay no attention to boundaries, so it\u2019s important to defend against these problems with a similar mindset that embraces diverse thinking. Countries that cooperate and coordinate their efforts are likely to detect and identify cyber-adversaries faster and more comprehensively if they approach the problem as a united front. This cross-border way of thinking should be an example for other regions of the world.<\/li>\n<\/ul>\n<p>The improvements to the EU Law Enforcement Emergency Response Protocol are invaluable. By streamlining and strengthening their cross-border approaches, protocols, and ways of communicating, efforts to thwart attacks can begin immediately and proceed more effectively.<\/p>\n<p>Preserving electronic evidence makes finding and punishing the perpetrators a priority. However, work still must be done on developing plans and protocols to mitigate damage to OT systems, and I hope they prioritize this focus for their next iteration.<\/p>\n<h3>Learn more<\/h3>\n<ul>\n<li><strong>Complete an offline assessment of your Active Directory<\/strong>\u2014<a href=\"http:\/\/download.microsoft.com\/download\/1\/C\/1\/1C15BA51-840E-498D-86C6-4BD35D33C79E\/Datasheet_Offline_ADS.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Assess your Active Directory security posture<\/a> and reduce support costs by exposing and remediating configuration and operational security issues before they affect your business.<\/li>\n<li><strong>Learn more about the cybersecurity risk landscape<\/strong>\u2014Watch this Microsoft Digital Crimes Unit overview <a href=\"https:\/\/youtu.be\/IeKOxl_JSK8\" target=\"_blank\" rel=\"noopener noreferrer\">video<\/a> to learn more about how Microsoft is working with public and private partners.<\/li>\n<li><strong>Discover how the Microsoft Incident Response and Recovery Process can help<\/strong>\u2014Read about our <a href=\"http:\/\/download.microsoft.com\/download\/5\/1\/6\/516F59A7-91EE-4463-8612-C85FD3BEBDC7\/microsoft-incident-response-and-recovery-process-brief.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">expert security services<\/a> that are available in case an incident occurs.<\/li>\n<\/ul>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/07\/30\/eu-law-enforcement-protocol-improves-cross-border-cooperation\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new EU Law Enforcement Emergency Response Protocol addresses the growing problem of planning and coordinating between governments, agencies, and companies when cyberattacks occur across international boundaries.<br \/>\nThe post Council of EU Law Enforcement Protocol improves cross-border cooperation appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28124,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[2564,5345,1064,6578],"class_list":["post-28123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity-policy","tag-incident-response","tag-security-intelligence","tag-threat-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Council of EU Law Enforcement Protocol improves cross-border cooperation 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Council of EU Law Enforcement Protocol improves cross-border cooperation 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-30T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"682\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Council of EU Law Enforcement Protocol improves cross-border cooperation\",\"datePublished\":\"2019-07-30T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/\"},\"wordCount\":630,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation.jpg\",\"keywords\":[\"Cybersecurity Policy\",\"incident response\",\"Security Intelligence\",\"Threat protection\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/\",\"name\":\"Council of EU Law Enforcement Protocol improves cross-border cooperation 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation.jpg\",\"datePublished\":\"2019-07-30T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation.jpg\",\"width\":1024,\"height\":682},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Policy\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity-policy\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Council of EU Law Enforcement Protocol improves cross-border cooperation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Council of EU Law Enforcement Protocol improves cross-border cooperation 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/","og_locale":"en_US","og_type":"article","og_title":"Council of EU Law Enforcement Protocol improves cross-border cooperation 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-07-30T16:00:00+00:00","og_image":[{"width":1024,"height":682,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Council of EU Law Enforcement Protocol improves cross-border cooperation","datePublished":"2019-07-30T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/"},"wordCount":630,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation.jpg","keywords":["Cybersecurity Policy","incident response","Security Intelligence","Threat protection"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/","url":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/","name":"Council of EU Law Enforcement Protocol improves cross-border cooperation 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation.jpg","datePublished":"2019-07-30T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation.jpg","width":1024,"height":682},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/council-of-eu-law-enforcement-protocol-improves-cross-border-cooperation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Policy","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity-policy\/"},{"@type":"ListItem","position":3,"name":"Council of EU Law Enforcement Protocol improves cross-border cooperation"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28123"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28123\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28124"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}