Border Management in Transformation: Transnational Threats and Security Policies of European States

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book looks into the processes of change and renewal of border control and border security and management during the past 30 years after the fall of the Iron Curtain, and the immense challenges in nation-building in South-Eastern Europe after the collapse of former Yugoslavia in relation to strategic security management. The abolition of border controls within the Schengen area and simultaneous introduction of necessary replacement measures was an additional topic.

The book provides an insight into which the European Union is competent in the reform and modernisation of state law enforcement agencies for ensuring effective border control, border surveillance and border management in line with the EU acquis communautaire and EU standards.

In the 21st century, along with the process of globalisation, a constantly evolving security environment creates new dimensions of threats and challenges to security and stability of transnational nature. This seeks for comprehensive, multidimensional, collective and well-coordinated responses.

The European Union, Organization for Security and Co-operation in Europe, United Nations, as well as other international organisations are able to really contribute to developing cooperative and coordinated responses to these threats by relying on its broad membership and profound expertise and experience.

According to the position of the European Union, a modern, cost-benefit-oriented and effective border management system should ensure both, open borders as well as maximum of security at the same time. Thus, the Union’s endeavour is to safeguarding internal security to all member states through preventing transnational threats, combating irregular migration and any forms of cross-border crime for ensuring smooth border crossings for legitimate travellers and their belongings, goods and services.

That is why the Union’s concept of Integrated Border Management has been developed to ensure effective border control and surveillance and cost-efficient management of the external borders of the European Union.

The Union’s policy is and will continue to be developed on the basis of the three main areas in place: common legislation, close operational/tactical cooperation and financial solidarity. In addition, Integrated Border Management has been confirmed as a priority area for strengthening the cooperation with third countries in the European Commission’s strategic security management approach, where non-EU countries are encouraged as partners to upgrade their border security, surveillance and border management systems.

Author(s): Johann Wagner
Series: Advanced Sciences and Technologies for Security Applications
Publisher: Springer
Year: 2020

Language: English
Pages: 429
City: Cham

Preface
Acknowledgements
Contents
About the Author
Acronyms
Part IIntroduction
1 Thematic Introduction
1.1 Introduction of the Subject Area
1.2 Subject of Research
1.3 Integrated Border Management—An Initial Assessment
1.4 Central Thesis of the Work
1.5 Structure of the Work
References
Part IIMethods
2 Methodical Structure of the Work
2.1 Methods
2.1.1 General Methodological Approach
2.2 Data Collection
2.2.1 Areas of Quality and Quantity-Oriented Content Analyses
2.2.2 Dataset 1: Legislation and Official Documents
2.2.3 Dataset 2: Secondary Data
2.2.4 Dataset 3: Case Studies
2.2.5 Dataset 4: Qualitative Interviews of Experts
2.2.6 Additional Insights: Accumulative Reflection of Comprehensive Assessments Developed in the Overall Area of BSM and Its Relation to TNT and TOC
2.3 Final Contemplation
References
Part IIIAnalytical Framework
3 Transnational Threats
3.1 Security in Retrospective Consideration
3.2 Security as a Central Concept of Value
3.3 Areas of Transnational Threats
3.4 Diseases as Transnational Threats
3.5 The Fall of the Iron Curtain and Its Impact on Border Regimes
3.5.1 The Dissolution of the Soviet Union
3.5.2 The Disintegration of Yugoslavia
3.5.3 Ukraine—A Torn State
3.6 Transnational Threats from Fragile and Failed States
3.6.1 Fragile and Failed States
3.6.2 Afghanistan
3.6.3 Iraq
3.6.4 Arab Spring—The Break-Up Follows Chaos and Anarchy
3.6.5 Syria
3.6.6 Libya
3.6.7 Daesh (Islamic State)
3.6.8 Weapon Arsenals Without Adequate Control
3.6.9 Radicalisation as a Transnational Threat
3.7 Preliminary Conclusion
References
4 Transnational Organised Crime (TOC)
4.1 Organised Forms of Crime
4.2 Is Organised Crime the Same as Mafia?
4.3 What is Organised Crime?
4.4 Classic Areas of TOC
4.4.1 Relevant Offence Fields and Legal Foundations
4.4.2 Ethnic OC Groups and Their Offence Fields
4.5 OC Definitions in Comparison
4.5.1 United Nations
4.5.2 Council of Europe
4.5.3 European Union
4.5.4 EUROPOL
4.5.5 INTERPOL
4.6 OC Definitions in Comparison
4.7 Interface Problems in the Fight Against OC Within the Member States of the European Union (EU MS)
4.8 Preliminary Conclusion
References
5 Migration in the Context of EU Border Management
5.1 Migration and Its Causes
5.2 Irregular Migration
5.3 Rising Migration Pressure as a Result of Events in the Context of Destabilisation
5.4 Important Legal Requirements with Regard to Migration and Border Control and Legal Border Crossing
5.4.1 Legal Requirements for Legal Entry According to the Act on the Residence, Economic Activity and Integration of Foreigners in the Federal Territory
5.4.2 Border Protection, Border Police Control and Border Crossing
5.4.3 Measures to Terminate a Residence Title
5.4.4 Safe Country of Origin—Safe Third Country
5.4.5 The Dublin Regulation
5.5 Definitions
5.6 Irregular Migration as a Form of Cross-Border OC or Even Transnational Threat
5.6.1 Irregular Migration
5.6.2 Trafficking in Human Beings (THB)
5.6.3 People Smuggling
5.6.4 Differentiation
5.6.5 Smuggling of People
5.6.6 Escape Aid
5.7 ‘The Boat is Full’
5.8 ‘Mare Nostrum’ and ‘Triton’
5.9 Preliminary Conclusion
References
6 Summary of the Analytical Framework
References
Part IVEmpirical Analysis
7 Border Management in Europe
7.1 Function of the Boundary
7.2 Border Management Versus Mobility
7.3 Border Management as an Integral Approach
7.4 Development of the European Security Policy—The Eltville Recommendations
7.5 Border Control and Border Management in Europe
7.6 EU MS are Allowed to Close Borders
7.7 Preliminary Conclusion
References
8 Coordinated Border Management
8.1 Integrated Border Management (IBM)
8.2 State Authorities Involved in Border Management
8.3 Border Guard Equal to Border Police?
8.4 Control of Goods Traffic
8.5 Veterinary and Phytosanitary Services
8.6 Other Stakeholders
8.7 Compensatory Measures by Eliminating Stationary Border Control
References
9 EU Agencies with Regard to Integrated Border Control Within the Framework of the Created Compensatory Measures
9.1 The Europeans Union's Judicial Cooperation Unit—EUROJUST
9.2 European Dactyloscopy—Eurodac
9.3 European Border Surveillance System—EUROSUR
9.4 European Union Agency for Fundamental Rights—FRA
9.5 Collège Européen De Police—CEPOL
9.6 European Police Office—EUROPOL
9.7 Preliminary Conclusion
References
10 Frontex—The EU Border Management and Coast Guard Agency
10.1 Introduction
10.2 The Relevancy of Frontex
10.3 Mandate and Tasks of Frontex
10.3.1 Joint Operations
10.3.2 Risk Analysis
10.3.3 Training
10.3.4 Research
10.3.5 Rapid Interventions
10.3.6 Support for EU MS in Joint Repatriations
10.3.7 Information Exchange and Systems
10.4 Preliminary Conclusion
References
11 International Police Cooperation
11.1 The Stability Pact
11.2 Southeast European Cooperation Initiative−SECI
11.3 International Law Enforcement Coordination Units−ILECU
11.4 Border Police Liaison Officers
11.5 International Police Missions
11.6 Prüm Decision−Facilitation of Cross-Border Cooperation
11.7 Joint Centres
11.8 Central European Police Academy−CEPA
11.9 Common Training Standards and Equipment
11.10 Cross-Border Police Cooperation
11.11 Preliminary Conclusion
References
Part VGood Practices as Recommendations for Action
12 Crisis Intervention and Management
12.1 The Stability Pact for South-East Europe
12.2 The Role of the OSCE Within the Ohrid Border Process
12.3 Preliminary Conclusion
References
13 Supranational Organisations in the Context of IBM
13.1 Organization for Security and Co-operation in Europe (OSCE)
13.1.1 OSCE Border Security and Management Concept (BSMC)
13.1.2 OSC−National Focal Point Network (NFP)
13.1.3 OSCE−Border Management Staff College (BMSC)
13.2 United Nations
13.3 INTERPOL Border Management Programme
13.4 United Nations High Commissioner for Refugees (UNHCR)
13.5 International Organisation for Migration (IOM)
13.6 International Centre for Migration Policy Development (ICMPD)
13.7 Geneva Centre for the Democratic Control of Armed Forces (DCAF)
13.8 Preliminary Conclusion
References
14 Extraterritoriality and Border Control
14.1 State—State Borders
14.2 Boundary and Border Area
14.3 Spatial Relocation of the Boundary (Remote Control)
14.4 Instruments the Relocation of Border Checks
14.5 Advanced Passenger Information (API)
14.5.1 Personal Name Record (PNR)
14.6 Preliminary Conclusions
References
15 Border Management in Transformation
15.1 Dimensions of Borders—Three Plus One
15.1.1 Land Boundaries
15.1.2 Water Boundaries
15.1.3 Air Boundaries
15.1.4 Cyber Space as a Fourth Dimension
15.2 Factors of Influence Regarding the Transformation Process
15.3 Common Foreign and Security Policy (CFSP) of the EU
15.4 EU Assistance Programs
15.5 Phenomenon Mass Influx of Refugees
15.6 Lack of Enforceability of Binding EU Legislation
References
Part VIConcluding Remarks
16 Conclusions from the Thesis
16.1 Recapitulation of Research Methods
16.1.1 Review of Feasible Versus Desirable Research Methods
16.1.2 Strengths and Limitations of Research Methods
16.2 Key Findings of the Research Work
16.3 Results Achieved and Contributions to Knowledge Gain in Alignment with the Research Work
16.4 Policy Recommendations as a Result of the Research Work
16.4.1 IBM
16.4.2 Visa Regime
16.4.3 Asylum and Migration
16.4.4 Internal Security
16.5 Questions Left Unanswered
16.6 Future Research
16.7 Closing Remarks
References
Annex 1: Criminal Offenses Related to OC
Annex 2: Delict Areas of Transnational Threats
Annex 3: Comparison of OC and Transnational Threats
Annex 4: Definitions of Diseases as a Transnational Threat
Annex 5: OC Definitions
Annex 6: Irregular Migration Along “Frontex Routes”
Annex 7: IBM Definitions
Annex 8: Ethnically Dominated OC Groups
Annex 9: Five-Phases Air Traveller Cycle
Annex 10: General Indicators Regarding the Detection of OC-Relevant Issues
Annex 11: List of Senior Experts Relevant to BSM, TNT, TOC and Migration
Annex 12: Interview Structure Used in Discussions with Senior BSM Experts
Annex 13: Approval of Reports Through UN, EU, EC, and OSCE
Annex 14: Confirmation from the University Passau, Germany
Bibliography