Cover des Buchs: European Security Union
, um zu prüfen, ob Sie einen Vollzugriff auf diese Publikation haben.
Sammelband Kein Zugriff

European Security Union

Law and Policies
Autor:innen:
Verlag:
 11.12.2024

Zusammenfassung

Cross-border threats have increased the importance of internal and external security for the EU Member States. In this respect, the 2020 EU Security Union Strategy provides a coherent regulatory framework for numerous concepts, strategies and action plans in the field of EU security measures concerning, e.g.

  • Critical infrastructure and network information systems

  • Counter-terrorism

  • Institutional intelligence cooperation

The contributions discuss these and numerous other security issues, providing clarification and insights into the extent and limits of European security cooperation and the degree to which Member States remain solely responsible for their own national security.

Jan-Hendrik Dietrich is professor at the Federal University of Applied Administrative Sciences; Arne Pilniok is professor at the University of Bielefeld. The authors are distinguished experts from academia and stakeholder institutions.

Schlagworte


Publikation durchsuchen


Bibliographische Angaben

Erscheinungsjahr
2024
Erscheinungsdatum
11.12.2024
ISBN-Print
978-3-406-81045-9
ISBN-Online
978-3-406-83344-1
Verlag
C.H.BECK Recht - Wirtschaft - Steuern, München
Reihe
Beck International
Sprache
Englisch
Seiten
412
Produkttyp
Sammelband

Inhaltsverzeichnis

KapitelSeiten
  1. Titelei/Inhaltsverzeichnis Kein Zugriff Seiten I - XXII
    1. § 1 The European Security Union between Member State interests and necessities of European integration (Schwarzelühr-Sutter) Kein Zugriff Seiten 1 - 5
    2. § 2 Crime doesn’t stop at the border post – European security in a multi-level system (Barley) Kein Zugriff Seiten 5 - 9
    3. § 3 Building a strong and effective Security Union (Onidi) Kein Zugriff Seiten 9 - 13
      1. A. Guaranteeing security: a joint undertaking Kein Zugriff
      2. B. The European Security Union: a legal and political objective Kein Zugriff
        1. I. EU competences for guaranteeing security Kein Zugriff
        2. II. Regulation of the exercise of competences in EU constitutional law Kein Zugriff
        3. III. Rule-of-law requirements under primary EU legislation in relation to Member States’ security authorities Kein Zugriff
        1. I. EU institutions Kein Zugriff
        2. II. EU agencies in the Area of Freedom, Security and Justice Kein Zugriff
        3. III. Other EU bodies involved in guaranteeing security Kein Zugriff
        1. I. Integration by means of institutionalization, cooperation and mutual learning Kein Zugriff
        2. II. Integration by means of harmonizing security law Kein Zugriff
        3. III. Integration by means of information systems Kein Zugriff
        4. IV. Integration by means of financing the guarantee of security Kein Zugriff
      3. F. Outlook: trends in the Security Union Kein Zugriff
      1. A. Overview Kein Zugriff
        1. I. Central common values as a precondition Kein Zugriff
        2. II. National and EU legal provisions on security Kein Zugriff
        1. I. Practical issues flowing from a conflict around competence Kein Zugriff
        2. II. Need to outline the scope of Art. 4(2) sent. 3 TEU Kein Zugriff
      2. D. Conclusion Kein Zugriff
      1. A. Introduction Kein Zugriff
        1. I. A Union based on the rule of law Kein Zugriff
        2. II. Formal und substantive EU rule-of-law guarantees Kein Zugriff
        1. I. Foundations of the Security Union in primary EU law Kein Zugriff
        2. II. The context of freedom and security Kein Zugriff
        3. III. Member States’ security authorities within the system of the AFSJ Kein Zugriff
        4. IV. Police cooperation as an example Kein Zugriff
        1. I. Acting within the scope of the Treaties Kein Zugriff
        2. II. General enforcement principles of EU law Kein Zugriff
        3. III. EU rule-of-law guarantees between full commitment and relaxation Kein Zugriff
        1. I. Art. 4(2) sent. 3 TEU as a general exception in relation to security policy Kein Zugriff
        2. II. Art. 72 TFEU in relation to the AFSJ Kein Zugriff
        3. III. Exemptions to the Single Market Programme Kein Zugriff
        4. IV. Special structure of the Common Foreign and Security Policy/Common Security and Defence Policy Kein Zugriff
      2. F. Conclusions Kein Zugriff
      1. A. Introduction Kein Zugriff
        1. I. Preliminary remarks Kein Zugriff
        2. II. Focus on intelligence agencies in the following examination of national security and intelligence agencies Kein Zugriff
        3. III. Binding nature of laws and values on the intelligence services of the Member States in the community of laws and values Kein Zugriff
        4. IV. Scope of concrete primary-legislation requirements Kein Zugriff
        5. V. Art. 4(2) sent. 3 TEU Kein Zugriff
        1. I. Availability of a national security reservation and consequences of the Member States’ involvement in EU lawmaking? Kein Zugriff
        2. II. Application of secondary legislation not specifically enacted to regulate it also in relation to the intelligence services? Kein Zugriff
        3. III. Scope of the reservation Kein Zugriff
      2. D. Summary Kein Zugriff
      1. A. Introduction Kein Zugriff
        1. I. National security and horizontal principles Kein Zugriff
        2. II. ‘In particular, national security remains the sole responsibility of each Member State.’ Kein Zugriff
        1. I. Freedom, security and justice Kein Zugriff
        2. II. Internal market and (public) security Kein Zugriff
        3. III. When security crosses boxes: horizontal matters Kein Zugriff
        4. IV. Common foreign and security policy Kein Zugriff
      2. D. ‘No other choice’ Kein Zugriff
      1. A. Giving content to Member States’ national security reserve Kein Zugriff
        1. I. Art. 4(2) sent. 3 TEU in the context of the treaties’ conception of competitive federalism Kein Zugriff
        2. II. Functions and normative demands of Art. 4(2) sent. 3 TEU Kein Zugriff
        3. III. Instruments for managing competence overlap: the example of the GDPR Kein Zugriff
        1. I. EU data protection law frameworks as indirect AI regulation Kein Zugriff
        2. II. Direct AI regulation: constraints on Member States’ security policy imposed by the proposed AI Act Kein Zugriff
      2. D. EU AI Regulation and Art. 4(2) sent. 3 TEU: sovereigns in sovereigntyrespecting chains Kein Zugriff
      1. A. Introduction Kein Zugriff
        1. I. Art. 4(2) TEU cited to justify potential lack of jurisdiction on the part of the Court of Justice Kein Zugriff
        2. II. Recognition of national security subject to review by an EU judge Kein Zugriff
        3. II. The constructive echo of European case-law by the Conseil d’État Kein Zugriff
        4. III. A persistent disagreement regarding the use of data in action to combat serious crime Kein Zugriff
        1. I. Reserved power and different security cultures Kein Zugriff
        2. II. Transnational threats from outside and inside the EU Kein Zugriff
        3. III. Modes of cooperation: a question of trust Kein Zugriff
        4. IV. Information sharing: a boost for security cooperation Kein Zugriff
        1. I. Sharing intelligence as an endurance test Kein Zugriff
        2. II. How a new type of threat to fundamental rights could lead to a European security benchmark on surveillance Kein Zugriff
      1. C. Cooperation as a pathway in sensitive areas of common EU policy fields Kein Zugriff
      1. A. Introduction Kein Zugriff
        1. I. Policy context Kein Zugriff
        2. II. Law and governance Kein Zugriff
        1. I. Coordination Kein Zugriff
        2. II. Harmonization Kein Zugriff
        3. III. Centralization Kein Zugriff
        1. I. Frontex Kein Zugriff
        2. II. ENISA Kein Zugriff
      2. E. Conclusions Kein Zugriff
      1. A. The EU security architecture: introductory remarks on its process of differentiation Kein Zugriff
        1. I. Security agencies Kein Zugriff
        2. II. Security networks and communications infrastructure: the example of ETIAS Kein Zugriff
        1. I. Establishing a genuine European border police force Kein Zugriff
        2. II. Expanding Europol’s mandate on information processing Kein Zugriff
        3. III. Establishing a security information architecture Kein Zugriff
      2. D. Outlook and evaluation Kein Zugriff
      1. A. Introduction Kein Zugriff
      2. B. The control and oversight ‘landscape’ Kein Zugriff
        1. I. General comments Kein Zugriff
        2. II. Authorization Kein Zugriff
        3. III. Post hoc functions of courts Kein Zugriff
      3. D. Prosecutors Kein Zugriff
      4. E. Data protection authorities Kein Zugriff
      5. F. Concluding remarks Kein Zugriff
      1. A. Introduction Kein Zugriff
        1. I. Intergovernmental cooperation to ensure external security and support internal security Kein Zugriff
        2. II. Supranational dimension of an ‘EU Security Union’ based on Treaty competences Kein Zugriff
        3. III. The European Security Union: no executive powers, but initiation, support and coordination of Member States’ policies and action Kein Zugriff
        1. I. Protecting critical infrastructure in the EU against physical and digital attacks Kein Zugriff
        2. II. Enhancing the EU’s cybersecurity Kein Zugriff
        3. III. Countering hybrid threats, fighting foreign interference and enhancing EU cyber defence Kein Zugriff
        4. IV. Fighting terrorism and radicalization Kein Zugriff
        5. V. Fighting organized crime Kein Zugriff
        6. VI. Organized crime Kein Zugriff
        7. VII. Ensuring the security of EU borders and supporting law enforcement and judicial cooperation Kein Zugriff
        8. VIII. The internal-external security nexus: security in the EU neighbourhood and in partner countries Kein Zugriff
      2. D. What remains to be done? Kein Zugriff
      3. E. Subsequent chapters Kein Zugriff
      1. A. Introduction Kein Zugriff
        1. I. From the ends of cybersecurity… Kein Zugriff
        2. II. To the means: three layers of cybersecurity regulation Kein Zugriff
        1. I. EU cybersecurity regulation – an overview Kein Zugriff
        2. II. Inconsistencies and gaps in EU cybersecurity regulation Kein Zugriff
        3. III. The EU Treaties as an obstacle to comprehensive and coherent cybersecurity regulation? Kein Zugriff
      2. D. Outlook: towards an effective multi-level cybersecurity governance system Kein Zugriff
      1. A. Introduction Kein Zugriff
      2. B. The emergence of hybrid threats in the EU’s political discourse Kein Zugriff
      3. C. Towards shared control of the information space Kein Zugriff
      4. D. Institutional framework for coordinated response Kein Zugriff
      5. E. Building resilience Kein Zugriff
      6. F. Tools for preventing hybrid threats and responding to them Kein Zugriff
      7. G. Conclusions Kein Zugriff
      1. A. Introduction Kein Zugriff
        1. I. Intelligence Kein Zugriff
        2. II. Intelligence cooperation Kein Zugriff
        1. I. EU intelligence cooperation between political ambition and bureaucratic reality Kein Zugriff
        2. II. The primary legislative setting Kein Zugriff
        3. III. EU intelligence structures Kein Zugriff
        4. IV. Intelligence cooperation beyond the EU Kein Zugriff
      2. D. Conclusions Kein Zugriff
      1. A. Introduction Kein Zugriff
        1. I. European understandings of IBM and the creation of Frontex Kein Zugriff
        2. II. IBM in the Treaty of Lisbon Kein Zugriff
        3. III. IBM and the subsequent evolution of the European Border and Coast Guard Kein Zugriff
        4. IV. Additional use of Art. 77(2)(d) TFEU to expand the EU’s role in border security Kein Zugriff
      2. C. Additional critique and developments Kein Zugriff
      3. D. Conclusions Kein Zugriff
      1. A. Introduction Kein Zugriff
        1. I. The underlying databases Kein Zugriff
        2. II. Interoperability of EU large-scale information systems Kein Zugriff
        1. I. Problems related to data quality Kein Zugriff
        2. II. Algorithmic testing and inherent biases Kein Zugriff
        3. III. The use of AI Act-based technologies Kein Zugriff
        1. I. EU data protection rules in different contexts Kein Zugriff
        2. II. Supervision of multi-level data flows Kein Zugriff
      2. E. Conclusion and outlook Kein Zugriff
      1. A. Introduction Kein Zugriff
        1. I. Technological progress Kein Zugriff
        2. II. The link between internal and external security Kein Zugriff
        3. III. Executive aggrandisement Kein Zugriff
        1. I. Roles and responsibilities Kein Zugriff
        2. II. Legislative and policy agenda Kein Zugriff
      2. D. Conclusion Kein Zugriff

Ähnliche Veröffentlichungen

aus dem Schwerpunkt "Europarecht & Internationales Recht & Rechtsvergleichung"
Cover des Buchs: Geschlechtergerechtigkeit in globalen Lieferketten
Monographie Vollzugriff
Isabell Hensel, Anne-Christin Mittwoch
Geschlechtergerechtigkeit in globalen Lieferketten
Cover des Buchs: Humanitäres Völkerrecht
Lehrbuch Kein Zugriff
Udo Fink, Ines Gillich
Humanitäres Völkerrecht