Call for papers vol 9, no. 1, 2018 is open until 30 March 2018


Attention: open in a new window. PDFPrintE-mail


Smuggling of persons is mainly characterized with including persons - immigrants who had previously agreed to be the subject of smuggling and ends with the arrival of migrants to their final destination. This means that smuggling is always transnational process and takes place between two or more states. Despite the fact that the Republic of Macedonia has signed the United Nations Refugee Convention of 1951 and its 1967 Protocol, adopted the Law on Asylum and harmonize its own criminal law in accordance with international standards and introduce the same or similar penalty measures for violators, however migrations related to the smuggling of people are very complex problem for the Republic of Macedonia because at the same time, represent social issue and a criminal act14.
Due to the drastic violation of human rights and freedoms, the United Nations Protocol relating to this type of migration, as the main aim has their reducing, preventing, or
complete suppression.

In Table no. 1 are given recorded criminal acts related to smuggling of people in the Republic of Macedonia for the period 2001 - 2010.It is noticeable that the registered
criminal offenses related to the smuggling of people ranging from 21 in 2004 to 36 in 2008.
It is recorded a significant reduction (about 30%) of criminal acts related to people smuggling in 2009 (26) 2010 (27), which of course leads to the conclusion that is improving the operation of the relevant institutions of the Republic of Macedonia. Despite significant

14 The Criminal Law of the Republic of Macedonia smuggling of people is defined as a criminal act. The punitive provisions against the participants in the smuggling of people are regulated in Article 418-b of the Criminal Law of the Republic of Macedonia.

Creative Commons License
Security Dialogues by Toni Mileski is licensed under a Creative Commons Attribution 3.0 Unported License.
Based on a work at

Copyright © 2012 Security Dialogues. Designed by Cube Systems