Knowledgebase

Number of results: 307

The European Travel Information and Authorisation System (ETIAS)

Document type: 
Legal Trend card
Authors / Institution: 
Publisher / Publication: 
CEPS for the SOURCE project
Abstract: 

The concept of travel authorisations, as easier and smoother procedures than visas, was developed in parallel of progress made on electronic visas, which application is entirely done online.

It was first put in place in Australia in 1996 with the Electronic Travel Authorisation System and broadened to all EU citizens in 2008 through the eVisitor system. While Australia applies a universal visa regime, and the eVisitor form has the legal form of a visa, other countries started developing travel authorisations as an alternative to pre-vet visa free visitors.

The European Entry Exit System (EES)

Document type: 
Legal Trend card
Authors / Institution: 
Publisher / Publication: 
CEPS for the SOURCE project
Abstract: 

The idea of developing a European Entry and Exit System dates back to February 2013 with a first proposal published by the European Commission on a “Smart Borders Package” to better manage increase

d traveller flows and efficiently respond to security concerns. It was composed of 1) an Entry-Exit System (EES) to replace the passport stamping and have a record of overstays, 2) a Registered Traveller Programme (RTP) for frequent travellers to benefit from a pre-screening procedure and be able to use Automated Border Control (ABC) gates like EU citizens and 3) amendments to the Schengen Borders Code to integrate the above-mentioned changes

All 25 technology trend cards

Document type: 
SOURCE publication
Authors / Institution: 
Publisher / Publication: 
Fraunhofer for the SOURCE project
Abstract: 

An overview of twenty five technoclogies and their trends as relevant to societal security

5G - Next Generation Mobile Network, Agent-based Modelling, Augmented Reality Systems, Automated human behavior analysis, Biometric Recognition Technologies, Bioremediation, Blockchain, CRISPR/Cas, Earthquake Prediction, Emergency Management Information Systems, European Maritime Surveillance Systems, Homomorphic Encryption, Indoor Navigation, Internet of Things Security, Machine Learning for Security Applications, Nano Air Vehicles, Non-lethal electromagnetic weapons for crowd control, Post-Quantum Cryptography, Predictive Policing, Quantum Cryptography, Serious Games, Smart Grid, Swarm Robotics, Through-the-Wall Sensing, Whole Body Scanner, 

 

5G - Next Generation Mobile Network

Document type: 
Technology Trend card
Authors / Institution: 
Publisher / Publication: 
Fraunhofer for the SOURCE project
Abstract: 

1 page sheet on the technology trends of 5G - Next Generation Mobile Network. 5G “5th generation mobile communications” is the term for a family of technologies that, as a whole form the

next standard for mobile networks (as an evolution of 3G (UMTS) and 4G (LTE)). This technology “package” consists of new technologies combined with existing technologies mainly from fixed IP networks.

Machine Learning for Security Applications

Document type: 
Technology Trend card
Authors / Institution: 
Publisher / Publication: 
Fraunhofer for the SOURCE project
Abstract: 

1 page sheet on the technology trends of Machine Learning for Security Applications. Machine learning (ML) is a subtopic of artificial intelligence (AI).

It is concerned with techniques that enable computers to automatically learn certain tasks from data, e.g. to recognize faces in images.

E-Handbook on Societal Security Crises and Emergency Response in Europe

Document type: 
SOURCE publication
Publisher / Publication: 
Insitute for European Studies, Vrije Universiteit Brussel for the SOURCE project
Abstract: 

The e-handbook is an innovative educational tool for first responders managing crises in the area of societal security.

It features six multi-media case-studies coming from different parts of Europe, namely: Austria, Sweden, Belgium, and Spain. The case-studies explore and re-construct strategies and actions of first response professionals involved in management of socio-political emergencies and natural disasters. In addition to texts, the interactive content includes educational assignments and video interviews, in which professionals, who took on key roles in the crisis management and emergency response, share their experiences.

Countering Terrorist Narratives

Document type: 
Report
Publisher / Publication: 
Directorate-General for Internal Policies - POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS
Abstract: 

This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the LIBE Committee, provides an overview of current approac

hes to countering terrorist narratives. The first and second sections outline the different responses developed at the global and European Union levels. The third section presents an analysis of four different approaches to responding to terrorist narratives: disruption of propaganda distribution, redirect method, campaign and message design, and government communications and synchronisation of message and action. The final section offers a number of policy recommendations, highlighting five interrelated ‘lines of effort’ essential to maximising the efficiency and effectiveness of counterterrorism and countering violent extremism strategic communication. 

The politics of securitization and the Muhammad cartoon crisis: A post-structuralist perspective

Document type: 
Scientific publication
Authors / Institution: 
Publisher / Publication: 
Security Dialogue, Vol. 42, No. 4-5: 357–369
Abstract: 

A broad array of authors and schools have influenced Barry Buzan and Ole Wæver’s formulation of securitization theory, including John L. Austin, Jacques Derrida and Carl Schmitt.

This article draws attention to and strengthens the post-structuralist elements in the writings of Buzan and Wæver, as this part of the theory has received less attention than those attributable to Schmitt and Austin. Starting from securitization theory as developed by Buzan and Wæver and engaging with later expansions of the theory, I suggest a post-structuralist framework built around three questions: Through which discursive structures are cases and phenomena represented and incorporated into a larger discursive field? What is the epistemic terrain through which phenomena are known? And, what are the substantial modalities that define what kind of an issue a security problem is? The last part of the article brings this framework to bear on the ‘Muhammad cartoon crisis’ that began with the publication of 12 cartoons depicting the Prophet Muhammad in the Danish newspaper Jyllands-Posten in 2005.

Politics, Security, Theory

Document type: 
Scientific publication
Authors / Institution: 
Publisher / Publication: 
Security Dialogue, Vol. 42, No. 4-5: 465–480
Abstract: 

This article outlines three ways of analysing the ‘politics of securitization’, emphasizing an often-overlooked form of politics practised through theory design.

The structure and nature of a theory can have systematic political implications. Analysis of this ‘politics of securitization’ is distinct from both the study of political practices of securitization and explorations of competing concepts of politics among security theories. It means tracking what kinds of analysis the theory can produce and whether such analysis systematically impacts real-life political struggles. Securitization theory is found to ‘act politically’ through three structural features that systematically shape the political effects of using the theory. The article further discusses – on the basis of the preceding articles in the special issue – three emerging debates around securitization theory: ethics, transformations and post-Western analyses. The article finally suggests one possible way forward for securitization theory: a route built on first clarifying its concept of theory, then specifying more clearly the place of political theory and causal mechanisms in different parts of the analysis. The politics of securitization accordingly becomes sharpened. Instead of deducing the political quality of the theory from various empirical statements by its proponents, this approach zooms in on the very core of the theory: how does it structurally condition work done with it in systematically political ways?

Directive (EU) 2017/541 on combating terrorism

Document type: 
Legislation
Publisher / Publication: 
Official Journal of the European Union
Abstract: 

Directive (EU) 2017/541 of the European Parliament and of the Council of 15 March 2017 on combating terrorism and replacing Council Framework Decision 2002/475/JHA and amending Council Decision 200

5/671/JHA

Pages

Go to top