Knowledgebase

Number of results: 225

The European Integrated Border Management Concept- SOURCE legal card

Document type: 
Legal Trend card
Authors / Institution: 
Publisher / Publication: 
CEPS for the SOURCE project
Abstract: 

The integration of border management at the European level is expressly foreseen in EU primary law.

 Article 77(2)(d) of the TFEU includes the progressive introduction of a European IBM system among the goals to be achieved by the EU policies on borders checks, asylum and migration

The European Integrated Border Management (EIBM) concept constitutes a part of the strategy that the EU has progressively elaborated “to compensate” for the abolition of internal borders within the Schengen areais. This concept is based on the assumption that strengthened operational and technical cooperation at the EU external borders is necessary for both facilitating the legitimate movement of goods and persons and for the detection, prevention and reduction of irregular migration and cross-border crime

The implementation and future development of the European IBM concept falls under the “shared responsibility or competences” between EU and Member States’ actors. It must go hand-to-hand with Lisbon Treaty standards, the EU Charter of Fundamental Rights, and EU secondary (Schengen-related) legislation – and in particular the SBC

 

SOURCE Legal Card – Internal Border Controls in the Schengen Area

Document type: 
Legal Trend card
Authors / Institution: 
Publisher / Publication: 
CEPS for the SOURCE project
Abstract: 

The Schengen Borders Code (Regulation (EU) 2016/399) provides the legal framework for a common approach within the Schengen area for internal and external border controls.

The guiding principles of the Schengen Borders Code (SBC) are the absence of internal border controls and common rules on external border controls (Art. 1 SBC).

As of December 2018, 22 of the 28 EU Member States, excl. Bulgaria, Croatia, Cyprus, Ireland, Romania and the UK, as well as Iceland, Liechtenstein, Norway and Switzerland, participate in the Schengen Area.

The absence of internal border controls espoused in the SBC entails that all persons may travel freely within the Schengen area without being subjected to border checks (Art. 22 SBC). Member States remain entitled to police checks (as long as they do not have an equivalent effect to border checks), security controls at sea- and airports, and checks relating to the legal obligation to carry a valid papers and document (Art. 23 SBC).

Under exceptional circumstances, the Schengen Borders Code provides for the possibility to temporarily reintroduce controls at the internal borders (Artt. 25-35 SBC). Internal border controls may be temporarily reintroduced only as a last resort (Art. 25(2) SBC), must comply with the criteria for their temporary reintroduction (in accordance with Artt. 26 and 30 SBC), and must follow the proper procedure and limitations (under Artt. 27-29 SBC).
 

The European Travel Information and Authorisation System (ETIAS)

Document type: 
Legal Trend card
Authors / Institution: 
Publisher / Publication: 
CEPS for the SOURCE project
Abstract: 

The concept of travel authorisations, as easier and smoother procedures than visas, was developed in parallel of progress made on electronic visas, which application is entirely done online.

It was first put in place in Australia in 1996 with the Electronic Travel Authorisation System and broadened to all EU citizens in 2008 through the eVisitor system. While Australia applies a universal visa regime, and the eVisitor form has the legal form of a visa, other countries started developing travel authorisations as an alternative to pre-vet visa free visitors.

The European Entry Exit System (EES)

Document type: 
Legal Trend card
Authors / Institution: 
Publisher / Publication: 
CEPS for the SOURCE project
Abstract: 

The idea of developing a European Entry and Exit System dates back to February 2013 with a first proposal published by the European Commission on a “Smart Borders Package” to better manage increase

d traveller flows and efficiently respond to security concerns. It was composed of 1) an Entry-Exit System (EES) to replace the passport stamping and have a record of overstays, 2) a Registered Traveller Programme (RTP) for frequent travellers to benefit from a pre-screening procedure and be able to use Automated Border Control (ABC) gates like EU citizens and 3) amendments to the Schengen Borders Code to integrate the above-mentioned changes

All 25 technology trend cards

Document type: 
SOURCE publication
Authors / Institution: 
Publisher / Publication: 
Fraunhofer for the SOURCE project
Abstract: 

An overview of twenty five technoclogies and their trends as relevant to societal security

5G - Next Generation Mobile Network, Agent-based Modelling, Augmented Reality Systems, Automated human behavior analysis, Biometric Recognition Technologies, Bioremediation, Blockchain, CRISPR/Cas, Earthquake Prediction, Emergency Management Information Systems, European Maritime Surveillance Systems, Homomorphic Encryption, Indoor Navigation, Internet of Things Security, Machine Learning for Security Applications, Nano Air Vehicles, Non-lethal electromagnetic weapons for crowd control, Post-Quantum Cryptography, Predictive Policing, Quantum Cryptography, Serious Games, Smart Grid, Swarm Robotics, Through-the-Wall Sensing, Whole Body Scanner, 

 

E-Handbook on Societal Security Crises and Emergency Response in Europe

Document type: 
SOURCE publication
Publisher / Publication: 
Insitute for European Studies, Vrije Universiteit Brussel for the SOURCE project
Abstract: 

The e-handbook is an innovative educational tool for first responders managing crises in the area of societal security.

It features six multi-media case-studies coming from different parts of Europe, namely: Austria, Sweden, Belgium, and Spain. The case-studies explore and re-construct strategies and actions of first response professionals involved in management of socio-political emergencies and natural disasters. In addition to texts, the interactive content includes educational assignments and video interviews, in which professionals, who took on key roles in the crisis management and emergency response, share their experiences.

Countering Terrorist Narratives

Document type: 
Report
Publisher / Publication: 
Directorate-General for Internal Policies - POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS
Abstract: 

This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the LIBE Committee, provides an overview of current approac

hes to countering terrorist narratives. The first and second sections outline the different responses developed at the global and European Union levels. The third section presents an analysis of four different approaches to responding to terrorist narratives: disruption of propaganda distribution, redirect method, campaign and message design, and government communications and synchronisation of message and action. The final section offers a number of policy recommendations, highlighting five interrelated ‘lines of effort’ essential to maximising the efficiency and effectiveness of counterterrorism and countering violent extremism strategic communication. 

The politics of securitization and the Muhammad cartoon crisis: A post-structuralist perspective

Document type: 
Scientific publication
Authors / Institution: 
Publisher / Publication: 
Security Dialogue, Vol. 42, No. 4-5: 357–369
Abstract: 

A broad array of authors and schools have influenced Barry Buzan and Ole Wæver’s formulation of securitization theory, including John L. Austin, Jacques Derrida and Carl Schmitt.

This article draws attention to and strengthens the post-structuralist elements in the writings of Buzan and Wæver, as this part of the theory has received less attention than those attributable to Schmitt and Austin. Starting from securitization theory as developed by Buzan and Wæver and engaging with later expansions of the theory, I suggest a post-structuralist framework built around three questions: Through which discursive structures are cases and phenomena represented and incorporated into a larger discursive field? What is the epistemic terrain through which phenomena are known? And, what are the substantial modalities that define what kind of an issue a security problem is? The last part of the article brings this framework to bear on the ‘Muhammad cartoon crisis’ that began with the publication of 12 cartoons depicting the Prophet Muhammad in the Danish newspaper Jyllands-Posten in 2005.

Politics, Security, Theory

Document type: 
Scientific publication
Authors / Institution: 
Publisher / Publication: 
Security Dialogue, Vol. 42, No. 4-5: 465–480
Abstract: 

This article outlines three ways of analysing the ‘politics of securitization’, emphasizing an often-overlooked form of politics practised through theory design.

The structure and nature of a theory can have systematic political implications. Analysis of this ‘politics of securitization’ is distinct from both the study of political practices of securitization and explorations of competing concepts of politics among security theories. It means tracking what kinds of analysis the theory can produce and whether such analysis systematically impacts real-life political struggles. Securitization theory is found to ‘act politically’ through three structural features that systematically shape the political effects of using the theory. The article further discusses – on the basis of the preceding articles in the special issue – three emerging debates around securitization theory: ethics, transformations and post-Western analyses. The article finally suggests one possible way forward for securitization theory: a route built on first clarifying its concept of theory, then specifying more clearly the place of political theory and causal mechanisms in different parts of the analysis. The politics of securitization accordingly becomes sharpened. Instead of deducing the political quality of the theory from various empirical statements by its proponents, this approach zooms in on the very core of the theory: how does it structurally condition work done with it in systematically political ways?

The implementation of the EU arms export control system

Document type: 
Report
Publisher / Publication: 
Directorate-General for External Policies - Policy Department
Abstract: 

The aim of the workshop was to provide an overview of the EU arms export control system as well as options for improvement.

The main speaker, Dr Sibylle Bauer, Director of the Dual-Use and Arms Trade Control Programme at the Stockholm International Peace Research Institute (SIPRI), provided a brief overview of the main elements of the EU Common Position 2008/944/CFSP and then focused on aspects related to strengthening implementation of the eight criteria of the Common Position, the enhancement of compliance with the reporting obligation by Member States, possible ways to increase the transparency and public scrutiny of the export control framework and the development of the EU’s institutional framework in this context. Her presentation was followed by a debate involving members of the Security and Defence Committee of the European Parliament, the outcome of which may feed into the EP Annual Report on Arms Export.

Pages

Go to top