Knowledgebase

Number of results: 15

Machine Learning for Security Applications

Document type: 
Technology Trend card
Authors / Institution: 
Publisher / Publication: 
Fraunhofer for the SOURCE project
Abstract: 

1 page sheet on the technology trends of Machine Learning for Security Applications. Machine learning (ML) is a subtopic of artificial intelligence (AI).

It is concerned with techniques that enable computers to automatically learn certain tasks from data, e.g. to recognize faces in images.

Does the new EU Global Strategy deliver on security and defence?

Document type: 
Report
Authors / Institution: 
Publisher / Publication: 
Directorate-General for External Policies - Policy Department
Abstract: 

The Global Strategy for the EU’s Foreign and Security Policy presented by High Representative Federica Mogherini on 28 June 2016 setsout a ‘Shared Vision, Common Action: A Stronger Europe’, in resp

onse to the Member States’ request for a new framework in which the EU can tackle the challenges and key changes to the EU’s environment identified in a strategic assessment carried out in 2015. Many expectations were raised ahead of its publication but itsoon became clear that defence would be a central element of the Global Strategy. A number of defence priorities emerged from the exchanges between the main stakeholders: a central role for the common security and defence policy (CSDP); a clear level of ambition with tools to match; emphasis on EU-NATO cooperation; and concrete follow-up measures such as a ‘White Book’ on European defence. Seen in this light,the Global Strategy captures the urgent need to face the challenges of today’s environment and it may prove to be a major turning point in EU foreign policy and security thinking. It emphasizes the value of hard power — including via a strong partnership with NATO — along with soft power. It will not be easy for the Member States to match the level of ambition set in the Global Strategy and its success will be judged in terms of the follow-up and the measures taken to implement it. Could the first step be a White Book on European Defence?

 

European Defence Action Plan - COM (2016) 950

Document type: 
Policy document
Authors / Institution: 
Publisher / Publication: 
European Commission Communication - COM (2016) 950
Abstract: 

On 30 November 2016 the Commission presented the European defence action plan (EDAP).

The plan proposes a European Defence Fund and other actions to support Member States (MS) in more efficient spending in joint defence. Announced in the 2016 Commission work programme, the EDAP follows up on the communication 'Towards a more competitive and efficient defence and security sector'  of July 2013, as well as on the conclusions of the European Council of December 2013. 

EU Cybersecurity and the Paradox of Progress

Document type: 
Report
Authors / Institution: 
Publisher / Publication: 
CEPS Policy Insights, No. 2018/06
Abstract: 

Technological revolutions bring opportunities, but sometimes even greater threats.

This ‘paradox of progress’ affects cyberspace and threatens the very principle and foundation of the open internet. The global debate on cyber-governance is currently in a stalemate on the norms for global stability of cyberspace and the fight against cybercrime, although the EU is making considerable efforts to strengthen cyberspace resilience and the critical information infrastructure. The author argues that the newly proposed Cybersecurity Act should be supported by additional measures to increase awareness, devise smarter policy and enable effective governance. Too many users and businesses are still failing to take cybersecurity and computer hygiene seriously. And there is a need to strengthen the pan-European coordination of deterrence, detection, and defence. This paper looks at the possibilities for the EU in this domain and argues that at a time of American diplomatic and political retrenchment from Europe and the world, it has an opportunity to play a leading role in global cybersecurity policy and governance.

EU Security Strategies - Extending the EU System of Security Governance

Document type: 
Book
Authors / Institution: 
Publisher / Publication: 
Routledge
Abstract: 

This volume offers a coherent analysis of the European Union’s security strategies within a comparative framework. If the EU is to survive and prosper as an effective security actor, it requir

es that greater attention be devoted to taking a cohesive and common position on the relationship between EU foreign policy means and goals. The major claim of this edited collection is that there is a European grand security strategy that disciplines member state security strategies. That grand strategy has two distinct substantive goals: (1) the preservation and expansion of the EU system of security governance; and (2) the implementation of specific strategies to meet internal and external threats and sources of insecurity. The EU has sought to develop a grand security strategy that not only accounts for the proliferation of threats possessing a military or non-military character and differentiates between core and peripheral regions of interest, but also addresses the requirements to bridge the increasingly blurred boundary between internal and external security threats and the necessary reconciliation of the competing security preferences of its member states. The empirical contributions to this volume examine the EU security strategies for specific issue areas and regional threat complexes. These case studies assess whether and how those strategies have consolidated or expanded the EU system of security governance, as well as their successes and limitations in meeting the security threats confronting the EU and its member-states.

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU - JOIN (2017) 450

Document type: 
Policy document
Publisher / Publication: 
European Commission / European External Action Service
Abstract: 

The European Commission and the High Representative propose a wide range of concrete measures to further strengthen the EU’s cybersecurity structures and capabilities with more cooperation between

the Member States and the different EU structures concerned. These measures are intended to ensure that the EU is better prepared to face the ever-increasing cybersecurity challenges. The approach set out in this Joint Communication aims at building greater resilience and strategic autonomy, boosting capabilities interms of technology and skills, as well as helping to build a strong single market. Additionally, it aims at a better deterence against cyber-attacks, by stepping up work to detect, trace and hold to account those responsible. 

Non-lethal electromagnetic weapons for crowd control

Document type: 
Technology Trend card
Authors / Institution: 
Publisher / Publication: 
Fraunhofer for the SOURCE project
Abstract: 

1 page sheet on the technology trends of non-lethal electromagnetic weapons for crowd control

Electromagnetic weapons for use against humans have been developed in the USA. They use millimeter-waves of 95 GHz that penetrate only the upper layer of the human skin where they cause a burning sensation. Goal of these weapons is to repel target subjects without inducing burn injuries.

Shared Vision, Common Action: A Stronger Europe - A Global Strategy for the European Union’s Foreign And Security Policy

Document type: 
Policy document
Publisher / Publication: 
European External Action Service (EEAS)
Abstract: 

Executive Summary:

"We need a stronger Europe. This is what our citizens deserve, this is what the wider world expects.
We live in times of existential crisis, within and beyond the European Union. Our Union is under threat. Our European project, which has brought unprecedented peace, prosperity and democracy, is being questioned. To the east, the European security order has been violated, while terrorism and violence plague North Africa and the Middle East, as well as Europe itself. Economic growth is yet to outpace demography in parts of Africa, security tensions in Asia are mounting, while climate change causes further disruption. Yet these are also times of extraordinary opportunity. Global growth, mobility, and technological progress – alongside our deepening partnerships – enable us to thrive, and allow ever more people to escape poverty and live longer and freer lives. We will navigate this difficult, more connected, contested and complex world guided by our shared interests, principles and priorities. Grounded in the values enshrined in the Treaties and building on our many strengths and historic achievements, we will stand united in building a stronger Union, playing its collective role in the world."

Fact sheet on Maritime Security, issued in occasion of the Europe Day celebration

Document type: 
Report
Publisher / Publication: 
the European External Action Service (EEAS) fact sheet 2014
Abstract: 

Water covers more than two-thirds of the earth’s surface and affects life everywhere.

Virtually every major issue facing European Union, including global economy, security and stability of states and regions, global competitiveness and job creation, environment etc. can be seen through a maritime dimension

Automated human behavior analysis

Document type: 
Technology Trend card
Authors / Institution: 
Publisher / Publication: 
Fraunhofer for the SOURCE project
Abstract: 

1 page fact sheet on the technology trends of Automated human behavior analysis

The term automated human behavior analysis (AHBA) stands  for  the  identification and assessment of human behavior for the purpose of  detecting suspicious behavior of persons in public or while personnel interactions such as surveys. This process is supported by automated processes. The aim of the automated behavior analysis is the detection of individuals with bad intentions (e.g. terrorists) and the prevention of their actions in advance or uncovering already committed deeds.     

Pages

Go to top