
, to see if you have full access to this publication.
Edited Book No access
European Security Union
Law and Policies- Editors:
- |
- Series:
- Beck International
- Publisher:
- 2024
Keywords
Search publication
Bibliographic data
- Copyright year
- 2024
- ISBN-Print
- 978-3-406-81045-9
- ISBN-Online
- 978-3-406-83344-1
- Publisher
- C.H.BECK Recht - Wirtschaft - Steuern, München
- Series
- Beck International
- Language
- English
- Pages
- 412
- Product type
- Edited Book
Table of contents
ChapterPages
- Titelei/Inhaltsverzeichnis No access Pages I - XXII
- § 1 The European Security Union between Member State interests and necessities of European integration (Schwarzelühr-Sutter) No access Pages 1 - 5
- § 2 Crime doesn’t stop at the border post – European security in a multi-level system (Barley) No access Pages 5 - 9
- § 3 Building a strong and effective Security Union (Onidi) No access Pages 9 - 13
- A. Guaranteeing security: a joint undertaking No access
- B. The European Security Union: a legal and political objective No access
- I. EU competences for guaranteeing security No access
- II. Regulation of the exercise of competences in EU constitutional law No access
- III. Rule-of-law requirements under primary EU legislation in relation to Member States’ security authorities No access
- I. EU institutions No access
- II. EU agencies in the Area of Freedom, Security and Justice No access
- III. Other EU bodies involved in guaranteeing security No access
- I. Integration by means of institutionalization, cooperation and mutual learning No access
- II. Integration by means of harmonizing security law No access
- III. Integration by means of information systems No access
- IV. Integration by means of financing the guarantee of security No access
- F. Outlook: trends in the Security Union No access
- A. Overview No access
- I. Central common values as a precondition No access
- II. National and EU legal provisions on security No access
- I. Practical issues flowing from a conflict around competence No access
- II. Need to outline the scope of Art. 4(2) sent. 3 TEU No access
- D. Conclusion No access
- A. Introduction No access
- I. A Union based on the rule of law No access
- II. Formal und substantive EU rule-of-law guarantees No access
- I. Foundations of the Security Union in primary EU law No access
- II. The context of freedom and security No access
- III. Member States’ security authorities within the system of the AFSJ No access
- IV. Police cooperation as an example No access
- I. Acting within the scope of the Treaties No access
- II. General enforcement principles of EU law No access
- III. EU rule-of-law guarantees between full commitment and relaxation No access
- I. Art. 4(2) sent. 3 TEU as a general exception in relation to security policy No access
- II. Art. 72 TFEU in relation to the AFSJ No access
- III. Exemptions to the Single Market Programme No access
- IV. Special structure of the Common Foreign and Security Policy/Common Security and Defence Policy No access
- F. Conclusions No access
- A. Introduction No access
- I. Preliminary remarks No access
- II. Focus on intelligence agencies in the following examination of national security and intelligence agencies No access
- III. Binding nature of laws and values on the intelligence services of the Member States in the community of laws and values No access
- IV. Scope of concrete primary-legislation requirements No access
- V. Art. 4(2) sent. 3 TEU No access
- I. Availability of a national security reservation and consequences of the Member States’ involvement in EU lawmaking? No access
- II. Application of secondary legislation not specifically enacted to regulate it also in relation to the intelligence services? No access
- III. Scope of the reservation No access
- D. Summary No access
- A. Introduction No access
- I. National security and horizontal principles No access
- II. ‘In particular, national security remains the sole responsibility of each Member State.’ No access
- I. Freedom, security and justice No access
- II. Internal market and (public) security No access
- III. When security crosses boxes: horizontal matters No access
- IV. Common foreign and security policy No access
- D. ‘No other choice’ No access
- A. Giving content to Member States’ national security reserve No access
- I. Art. 4(2) sent. 3 TEU in the context of the treaties’ conception of competitive federalism No access
- II. Functions and normative demands of Art. 4(2) sent. 3 TEU No access
- III. Instruments for managing competence overlap: the example of the GDPR No access
- I. EU data protection law frameworks as indirect AI regulation No access
- II. Direct AI regulation: constraints on Member States’ security policy imposed by the proposed AI Act No access
- D. EU AI Regulation and Art. 4(2) sent. 3 TEU: sovereigns in sovereigntyrespecting chains No access
- A. Introduction No access
- I. Art. 4(2) TEU cited to justify potential lack of jurisdiction on the part of the Court of Justice No access
- II. Recognition of national security subject to review by an EU judge No access
- II. The constructive echo of European case-law by the Conseil d’État No access
- III. A persistent disagreement regarding the use of data in action to combat serious crime No access
- I. Reserved power and different security cultures No access
- II. Transnational threats from outside and inside the EU No access
- III. Modes of cooperation: a question of trust No access
- IV. Information sharing: a boost for security cooperation No access
- I. Sharing intelligence as an endurance test No access
- II. How a new type of threat to fundamental rights could lead to a European security benchmark on surveillance No access
- C. Cooperation as a pathway in sensitive areas of common EU policy fields No access
- A. Introduction No access
- I. Policy context No access
- II. Law and governance No access
- I. Coordination No access
- II. Harmonization No access
- III. Centralization No access
- I. Frontex No access
- II. ENISA No access
- E. Conclusions No access
- A. The EU security architecture: introductory remarks on its process of differentiation No access
- I. Security agencies No access
- II. Security networks and communications infrastructure: the example of ETIAS No access
- I. Establishing a genuine European border police force No access
- II. Expanding Europol’s mandate on information processing No access
- III. Establishing a security information architecture No access
- D. Outlook and evaluation No access
- A. Introduction No access
- B. The control and oversight ‘landscape’ No access
- I. General comments No access
- II. Authorization No access
- III. Post hoc functions of courts No access
- D. Prosecutors No access
- E. Data protection authorities No access
- F. Concluding remarks No access
- A. Introduction No access
- I. Intergovernmental cooperation to ensure external security and support internal security No access
- II. Supranational dimension of an ‘EU Security Union’ based on Treaty competences No access
- III. The European Security Union: no executive powers, but initiation, support and coordination of Member States’ policies and action No access
- I. Protecting critical infrastructure in the EU against physical and digital attacks No access
- II. Enhancing the EU’s cybersecurity No access
- III. Countering hybrid threats, fighting foreign interference and enhancing EU cyber defence No access
- IV. Fighting terrorism and radicalization No access
- V. Fighting organized crime No access
- VI. Organized crime No access
- VII. Ensuring the security of EU borders and supporting law enforcement and judicial cooperation No access
- VIII. The internal-external security nexus: security in the EU neighbourhood and in partner countries No access
- D. What remains to be done? No access
- E. Subsequent chapters No access
- A. Introduction No access
- I. From the ends of cybersecurity… No access
- II. To the means: three layers of cybersecurity regulation No access
- I. EU cybersecurity regulation – an overview No access
- II. Inconsistencies and gaps in EU cybersecurity regulation No access
- III. The EU Treaties as an obstacle to comprehensive and coherent cybersecurity regulation? No access
- D. Outlook: towards an effective multi-level cybersecurity governance system No access
- A. Introduction No access
- B. The emergence of hybrid threats in the EU’s political discourse No access
- C. Towards shared control of the information space No access
- D. Institutional framework for coordinated response No access
- E. Building resilience No access
- F. Tools for preventing hybrid threats and responding to them No access
- G. Conclusions No access
- A. Introduction No access
- I. Intelligence No access
- II. Intelligence cooperation No access
- I. EU intelligence cooperation between political ambition and bureaucratic reality No access
- II. The primary legislative setting No access
- III. EU intelligence structures No access
- IV. Intelligence cooperation beyond the EU No access
- D. Conclusions No access
- A. Introduction No access
- I. European understandings of IBM and the creation of Frontex No access
- II. IBM in the Treaty of Lisbon No access
- III. IBM and the subsequent evolution of the European Border and Coast Guard No access
- IV. Additional use of Art. 77(2)(d) TFEU to expand the EU’s role in border security No access
- C. Additional critique and developments No access
- D. Conclusions No access
- A. Introduction No access
- I. The underlying databases No access
- II. Interoperability of EU large-scale information systems No access
- I. Problems related to data quality No access
- II. Algorithmic testing and inherent biases No access
- III. The use of AI Act-based technologies No access
- I. EU data protection rules in different contexts No access
- II. Supervision of multi-level data flows No access
- E. Conclusion and outlook No access
- A. Introduction No access
- I. Technological progress No access
- II. The link between internal and external security No access
- III. Executive aggrandisement No access
- I. Roles and responsibilities No access
- II. Legislative and policy agenda No access
- D. Conclusion No access




