Cover of book: European Security Union
, to see if you have full access to this publication.
Edited Book No access

European Security Union

Law and Policies
Editors:
Publisher:
 2024

Keywords



Bibliographic data

Copyright year
2024
ISBN-Print
978-3-406-81045-9
ISBN-Online
978-3-406-83344-1
Publisher
C.H.BECK Recht - Wirtschaft - Steuern, München
Series
Beck International
Language
English
Pages
412
Product type
Edited Book

Table of contents

ChapterPages
  1. Titelei/Inhaltsverzeichnis No access Pages I - XXII
    1. § 1 The European Security Union between Member State interests and necessities of European integration (Schwarzelühr-Sutter) No access Pages 1 - 5
    2. § 2 Crime doesn’t stop at the border post – European security in a multi-level system (Barley) No access Pages 5 - 9
    3. § 3 Building a strong and effective Security Union (Onidi) No access Pages 9 - 13
      1. A. Guaranteeing security: a joint undertaking No access
      2. B. The European Security Union: a legal and political objective No access
        1. I. EU competences for guaranteeing security No access
        2. II. Regulation of the exercise of competences in EU constitutional law No access
        3. III. Rule-of-law requirements under primary EU legislation in relation to Member States’ security authorities No access
        1. I. EU institutions No access
        2. II. EU agencies in the Area of Freedom, Security and Justice No access
        3. III. Other EU bodies involved in guaranteeing security No access
        1. I. Integration by means of institutionalization, cooperation and mutual learning No access
        2. II. Integration by means of harmonizing security law No access
        3. III. Integration by means of information systems No access
        4. IV. Integration by means of financing the guarantee of security No access
      3. F. Outlook: trends in the Security Union No access
      1. A. Overview No access
        1. I. Central common values as a precondition No access
        2. II. National and EU legal provisions on security No access
        1. I. Practical issues flowing from a conflict around competence No access
        2. II. Need to outline the scope of Art. 4(2) sent. 3 TEU No access
      2. D. Conclusion No access
      1. A. Introduction No access
        1. I. A Union based on the rule of law No access
        2. II. Formal und substantive EU rule-of-law guarantees No access
        1. I. Foundations of the Security Union in primary EU law No access
        2. II. The context of freedom and security No access
        3. III. Member States’ security authorities within the system of the AFSJ No access
        4. IV. Police cooperation as an example No access
        1. I. Acting within the scope of the Treaties No access
        2. II. General enforcement principles of EU law No access
        3. III. EU rule-of-law guarantees between full commitment and relaxation No access
        1. I. Art. 4(2) sent. 3 TEU as a general exception in relation to security policy No access
        2. II. Art. 72 TFEU in relation to the AFSJ No access
        3. III. Exemptions to the Single Market Programme No access
        4. IV. Special structure of the Common Foreign and Security Policy/Common Security and Defence Policy No access
      2. F. Conclusions No access
      1. A. Introduction No access
        1. I. Preliminary remarks No access
        2. II. Focus on intelligence agencies in the following examination of national security and intelligence agencies No access
        3. III. Binding nature of laws and values on the intelligence services of the Member States in the community of laws and values No access
        4. IV. Scope of concrete primary-legislation requirements No access
        5. V. Art. 4(2) sent. 3 TEU No access
        1. I. Availability of a national security reservation and consequences of the Member States’ involvement in EU lawmaking? No access
        2. II. Application of secondary legislation not specifically enacted to regulate it also in relation to the intelligence services? No access
        3. III. Scope of the reservation No access
      2. D. Summary No access
      1. A. Introduction No access
        1. I. National security and horizontal principles No access
        2. II. ‘In particular, national security remains the sole responsibility of each Member State.’ No access
        1. I. Freedom, security and justice No access
        2. II. Internal market and (public) security No access
        3. III. When security crosses boxes: horizontal matters No access
        4. IV. Common foreign and security policy No access
      2. D. ‘No other choice’ No access
      1. A. Giving content to Member States’ national security reserve No access
        1. I. Art. 4(2) sent. 3 TEU in the context of the treaties’ conception of competitive federalism No access
        2. II. Functions and normative demands of Art. 4(2) sent. 3 TEU No access
        3. III. Instruments for managing competence overlap: the example of the GDPR No access
        1. I. EU data protection law frameworks as indirect AI regulation No access
        2. II. Direct AI regulation: constraints on Member States’ security policy imposed by the proposed AI Act No access
      2. D. EU AI Regulation and Art. 4(2) sent. 3 TEU: sovereigns in sovereigntyrespecting chains No access
      1. A. Introduction No access
        1. I. Art. 4(2) TEU cited to justify potential lack of jurisdiction on the part of the Court of Justice No access
        2. II. Recognition of national security subject to review by an EU judge No access
        3. II. The constructive echo of European case-law by the Conseil d’État No access
        4. III. A persistent disagreement regarding the use of data in action to combat serious crime No access
        1. I. Reserved power and different security cultures No access
        2. II. Transnational threats from outside and inside the EU No access
        3. III. Modes of cooperation: a question of trust No access
        4. IV. Information sharing: a boost for security cooperation No access
        1. I. Sharing intelligence as an endurance test No access
        2. II. How a new type of threat to fundamental rights could lead to a European security benchmark on surveillance No access
      1. C. Cooperation as a pathway in sensitive areas of common EU policy fields No access
      1. A. Introduction No access
        1. I. Policy context No access
        2. II. Law and governance No access
        1. I. Coordination No access
        2. II. Harmonization No access
        3. III. Centralization No access
        1. I. Frontex No access
        2. II. ENISA No access
      2. E. Conclusions No access
      1. A. The EU security architecture: introductory remarks on its process of differentiation No access
        1. I. Security agencies No access
        2. II. Security networks and communications infrastructure: the example of ETIAS No access
        1. I. Establishing a genuine European border police force No access
        2. II. Expanding Europol’s mandate on information processing No access
        3. III. Establishing a security information architecture No access
      2. D. Outlook and evaluation No access
      1. A. Introduction No access
      2. B. The control and oversight ‘landscape’ No access
        1. I. General comments No access
        2. II. Authorization No access
        3. III. Post hoc functions of courts No access
      3. D. Prosecutors No access
      4. E. Data protection authorities No access
      5. F. Concluding remarks No access
      1. A. Introduction No access
        1. I. Intergovernmental cooperation to ensure external security and support internal security No access
        2. II. Supranational dimension of an ‘EU Security Union’ based on Treaty competences No access
        3. III. The European Security Union: no executive powers, but initiation, support and coordination of Member States’ policies and action No access
        1. I. Protecting critical infrastructure in the EU against physical and digital attacks No access
        2. II. Enhancing the EU’s cybersecurity No access
        3. III. Countering hybrid threats, fighting foreign interference and enhancing EU cyber defence No access
        4. IV. Fighting terrorism and radicalization No access
        5. V. Fighting organized crime No access
        6. VI. Organized crime No access
        7. VII. Ensuring the security of EU borders and supporting law enforcement and judicial cooperation No access
        8. VIII. The internal-external security nexus: security in the EU neighbourhood and in partner countries No access
      2. D. What remains to be done? No access
      3. E. Subsequent chapters No access
      1. A. Introduction No access
        1. I. From the ends of cybersecurity… No access
        2. II. To the means: three layers of cybersecurity regulation No access
        1. I. EU cybersecurity regulation – an overview No access
        2. II. Inconsistencies and gaps in EU cybersecurity regulation No access
        3. III. The EU Treaties as an obstacle to comprehensive and coherent cybersecurity regulation? No access
      2. D. Outlook: towards an effective multi-level cybersecurity governance system No access
      1. A. Introduction No access
      2. B. The emergence of hybrid threats in the EU’s political discourse No access
      3. C. Towards shared control of the information space No access
      4. D. Institutional framework for coordinated response No access
      5. E. Building resilience No access
      6. F. Tools for preventing hybrid threats and responding to them No access
      7. G. Conclusions No access
      1. A. Introduction No access
        1. I. Intelligence No access
        2. II. Intelligence cooperation No access
        1. I. EU intelligence cooperation between political ambition and bureaucratic reality No access
        2. II. The primary legislative setting No access
        3. III. EU intelligence structures No access
        4. IV. Intelligence cooperation beyond the EU No access
      2. D. Conclusions No access
      1. A. Introduction No access
        1. I. European understandings of IBM and the creation of Frontex No access
        2. II. IBM in the Treaty of Lisbon No access
        3. III. IBM and the subsequent evolution of the European Border and Coast Guard No access
        4. IV. Additional use of Art. 77(2)(d) TFEU to expand the EU’s role in border security No access
      2. C. Additional critique and developments No access
      3. D. Conclusions No access
      1. A. Introduction No access
        1. I. The underlying databases No access
        2. II. Interoperability of EU large-scale information systems No access
        1. I. Problems related to data quality No access
        2. II. Algorithmic testing and inherent biases No access
        3. III. The use of AI Act-based technologies No access
        1. I. EU data protection rules in different contexts No access
        2. II. Supervision of multi-level data flows No access
      2. E. Conclusion and outlook No access
      1. A. Introduction No access
        1. I. Technological progress No access
        2. II. The link between internal and external security No access
        3. III. Executive aggrandisement No access
        1. I. Roles and responsibilities No access
        2. II. Legislative and policy agenda No access
      2. D. Conclusion No access

Similar publications

from the topics "European Law & International Law & Comparative Law"
Cover of book: Der Volkseinwand
Book Titles No access
Florian Feigl
Der Volkseinwand
Cover of book: Wie fördert die EU Menschenrechte in Drittstaaten?
Book Titles No access
Dennis Traudt
Wie fördert die EU Menschenrechte in Drittstaaten?
Cover of book: Future-Proofing in Public Law
Edited Book No access
Nicole Koblenz LL.M., Nicholas Otto, Gernot Sydow
Future-Proofing in Public Law