Skip to main content

Information-sharing and the EU Counter-terrorism Policy: A ‘Securitisation Tool’ Approach

  • Chapter
European Security, Terrorism and Intelligence

Part of the book series: Palgrave Studies in European Union Politics ((PSEUP))

Abstract

In recent years, securitisation theory (Buzan et al., 1998; Balzacq, 2011) has occupied an increasingly prominent place in the study of international security. It emphasises how a specific type of discourse transforms certain entities — subjects or objects — into a threat, thereby enabling the use of extraordinary measures to deal with them. Thus, securitisation theory postulates that threat images can be modelled as the result of discursive processes that take place between the so-called ‘secu-ritising actor’ and the relevant audience(s). This might be called the ‘standard’ view of securitisation. However, such an approach does not seem entirely appropriate to study policy developments in the European Union (EU), notably because of its sui generis political and institutional characteristics. As observed by Léonard, ‘[t]he EU is evidently not a state; it has no government or president to make the kind of dramatic securitising speech acts that can be identified in national contexts’ (Léonard, 2010, p. 236). Nevertheless, there is prima facie evidence that there may have been securitisation processes at play in the development of the EU counter-terrorism policy. This is suggested by the adoption of some extraordinary measures, such as the EU financial sanctions against suspected terrorists. Those are arguably extraordinary on the ground that they have breached the fundamental rights of the persons concerned (van Thiel, 2008; Vlcek, 2009).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Aus, J.P. (2003) ‘Supranational Governance in an “Area of Freedom, Security and Justice”: Eurodac and the Politics of Biometric Control’, Sussex European Institute: University of Sussex, Working Paper 72, http://www.sussex.ac.uk/sei/documents/wp72.pdf.

    Google Scholar 

  • Balzacq, T. (ed.) (2011) Securitization Theory: How Security Problems Emerge and Dissolve (London: Routledge).

    Google Scholar 

  • Brouwer, E. (2006) ‘Data Surveillance and Border Control in the EU: Balancing Efficiency and Legal Protection’ in Balzacq, T. and Carrera, S. (eds) Security Versus Freedom? A Challenge for Europe’s Future (Aldershot: Ashgate).

    Google Scholar 

  • Buzan, B., Wæver, O. and de Wilde, J. (1998) Security: A New Framework for Analysis (Boulder, CO: Lynne Rienner).

    Google Scholar 

  • Commission of the European Communities (2005) ‘Communication from the Commission to the Council and the European Parliament on Improved Effectiveness, Enhanced Interoperability and Synergies among European Databases in the Area of Justice and Home Affairs’, COM (2005) 597, 24 November 2005 (Brussels: Commission of the European Communities).

    Google Scholar 

  • Connolly, T.M. and Begg, C.E. (2009) Database Systems: A Practical Approach to Design, Implementation and Management (Harlow: Addison-Wesley).

    Google Scholar 

  • Council of the European Union (2001) ‘Conclusions Adopted by the Council (Justice and Home Affairs)’, Brussels, SN 3926/6/01, 20 September 2001 (Brussels: Council of the European Union).

    Google Scholar 

  • Council of the European Union (2005a) ‘Press Release, 2645th Council Meeting, Competitiveness (Internal Market, Industry and Research)’, Brussels, 6811/05 (Presse 42), 7 March 2005 (Brussels: Council of the European Union).

    Google Scholar 

  • Council of the European Union (2005b) ‘The European Union Counter-Terrorism Strategy’, 14469/4/05, 30 November 2005 (Brussels: Council of the European Union).

    Google Scholar 

  • De Bruijn, A. and Hufen, J.A.M. (1998) ‘The Traditional Approach to Policy Instruments’ in Peters, B.G. and van Nispen, F.K.M. (eds) Public Policy Instrument: Evaluating the Tools of Public Administration (Cheltenham: Edward Elgar).

    Google Scholar 

  • EPEC (2004) ‘Study for the Extended Impact Assessment of the Visa Information System: Final Report’ (Brussels: EPEC).

    Google Scholar 

  • European Commission (2012) ‘Amended Proposal for a Regulation of the European Parliament and of the Council on the Establishment of “EURODAC” for the Comparison of Fingerprints for the Effective Application of Regulation (EU) [… / …] (Establishing the Criteria and Mechanisms for Determining the Member State Responsible for Examining an Application for International Protection Lodged in One of the Member States by a Third Country National or a Stateless Person) and to Request Comparisons with EURODAC Data by Member States’ Law Enforcement Authorities and Europol for Law Enforcement Purposes and Amending Regulation (EU) No 1077/2011 Establishing a European Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice (Recast Version)’, COM(2012) 254, 30 May 2012 (Brussels: European Commission).

    Google Scholar 

  • European Data Protection Supervisor (2006) ‘Comments on the Communication of the Commission on Interoperability of European Databases’, 10 March 2006 (Brussels: European Data Protection Supervisor).

    Google Scholar 

  • European Data Protection Supervisor (2010) ‘Opinion of the European Data Protection Supervisor on the Amended Proposal for a Regulation of the European Parliament and of the Council Concerning the Establishment of “EURODAC” for the Comparison of Fingerprints for the Effective Application of Regulation (EC) No [… / …] (Establishing the Criteria and Mechanisms for Determining the Member State Responsible for Examining an Application for International Protection Lodged in One of the Member States by a Third Country National or a Stateless Person), and on the Proposal for a Council Decision on Requesting Comparisons with EURODAC Data by Member States’ Law Enforcement Authorities and Europol for Law Enforcement Purposes’, Official Journal of the European Union, C92, 10 April 2010 (Brussels: European Data Protection Supervisor).

    Google Scholar 

  • Feenberg, A. (1991) Critical Theory of Technology (Oxford: Oxford University Press).

    Google Scholar 

  • Guild, E. (2006) ‘Danger — Borders under Construction: Assessing the First Five Years of Border Policy in an Area of Freedom, Security and Justice’ in J. de Zwaan and F. Goudappel (eds) Freedom, Security and Justice in the European Union: Implementation of the Hague Programme (The Hague: T.M.C. Asser Press), 45–72.

    Chapter  Google Scholar 

  • Hood, C. (1983) The Tools of Government (London: Macmillan).

    Book  Google Scholar 

  • Hoogerwerf, A. (ed.) (1989) Overheidsbeleid (Alphen aan den Rijn: Samson).

    Google Scholar 

  • Jones, R.W. (1999) Security, Strategy, and Critical Theory (London: Lynne Rienner).

    Google Scholar 

  • Lascoumes, P. and Le Galès, P. (2004) ‘L’action publique saisie par les instruments’ in Lascoumes, P. and Le Galès, P. (eds) Gouverner par les instruments (Paris: Presses de la FNSP).

    Google Scholar 

  • Léonard, S. (2010) ‘EU Border Security and Migration into the European Union: FRONTEX and Securitisation through Practices’, European Security, 19(2), 231–254.

    Article  Google Scholar 

  • Linder, S. and Peters, B.G. (1984) ‘From Social Theory to Policy Design’, Journal of Public Policy, 4, 237–259.

    Article  Google Scholar 

  • Lodge, J. (2005) ‘EJustice, Security and Biometrics: The EU’s Proximity Paradox’, European Journal of Crime, Criminal Law and Criminal Justice, 13, 533–564.

    Article  Google Scholar 

  • McDonnell, L. and Elmore, R. (1987) ‘Getting the Job Done: Alternative Policy Instruments’, Educational Evaluation and Policy Analysis 9, 133–152.

    Article  Google Scholar 

  • Neal, A. (2009) ‘Securitization and Risk at the EU Border: The Origins of FRONTEX’, Journal of Common Market Studies, 47(2), 333–356.

    Article  Google Scholar 

  • Peters, G.B. and van Nispen, F.K.M. (eds) (1998) Public Policy Instruments: Evaluating the Tools of Public Administration (Cheltenham: Edward Elgar).

    Google Scholar 

  • Ringeling, A.B. (1983) De instrumenten van het beleid (Alphan aan den Rijn: Samson).

    Google Scholar 

  • Salamon, L.M. (2002) ‘The New Governance and the Tools of Public Action: An Introduction’ in Salamon, L.M. (ed.) The Tools of Government: A Guide to the New Governance (Oxford: Oxford University Press).

    Google Scholar 

  • Schneider, A. and Ingram, H. (1990) ‘Behavioral Assumptions of Policy Tools’, Journal of Politics, 52, 510–529.

    Article  Google Scholar 

  • van der Doelen, F.C.J. (1989) Beleidsinstrumenten en energiebesparing (Enschede: Universiteit Twente).

    Google Scholar 

  • van Nispen, F.K.M. and Ringeling, A.B. (1998) ‘On Instruments and Instrumentality: An Assessment’ in Peters, B.G. and van Nispen, F.K.M. (eds) Public Policy Instruments: Evaluating the Tools of Public Administration (Cheltenham: Edward Elgar).

    Google Scholar 

  • van Thiel, S. (2008) ‘UN Anti-terrorism Sanctions and EU Human Rights: The Lessons of European Integration’ in Martenczuk, B. and van Thiel, S. (eds) Justice, Liberty, Security: New Challenges for EU External Relations (Brussels: VUB Press/Brussels University Press), 437–492.

    Google Scholar 

  • Varone, F. (1998) Le choix des instruments des politiques publiques (Bern: Haupt).

    Google Scholar 

  • Vlcek, W. (2009) ‘Hitting the Right Target: EU and Security Council Pursuit of Terrorist Financing’, Critical Studies on Terrorism, 2(2), 275–291.

    Article  Google Scholar 

  • Wæver, O. (1995) ‘Securitization and De-securitization’ in Lipschutz, R.D. (ed.) On Security (New York, NY: Columbia University Press).

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2013 Thierry Balzacq and Sarah Léonard

About this chapter

Cite this chapter

Balzacq, T., Léonard, S. (2013). Information-sharing and the EU Counter-terrorism Policy: A ‘Securitisation Tool’ Approach. In: Kaunert, C., Léonard, S. (eds) European Security, Terrorism and Intelligence. Palgrave Studies in European Union Politics. Palgrave Macmillan, London. https://doi.org/10.1057/9781137314734_6

Download citation

Publish with us

Policies and ethics