You are here

Transnational challenges

There is a growing overlap between the EU’s internal and external security problems. Terrorism, organised crime and unregulated migration not only pose a threat to European internal security, but also have a serious impact on the stability of Europe’s immediate neighbourhood. Very often, they find their roots in conflicts and instability further abroad in Africa or Asia.

For some time, the European Union has been active in international debates on the governance of these challenges, and has created new policy instruments of its own. Already in the early 1990s, the EU successfully linked its home-affairs priorities with its Common Foreign and Security Policy. The 2015 migration crisis showed the limits of that approach, and has sparked a new wave of reforms.

Pages

  • 03March 2016

    The EU has embarked on a strategy of upgrading its justice and home affairs agencies in order to enhance the efficiency and effectiveness of its foreign and internal security policies. What steps have been taken? And what more can realistically be done?

  • 03February 2016

    On 3-4 February 2016, EUISS and ICDS co-organised a conference in Estonia on ‪the role of Cyber ‪‎Security in the EU Global Strategy for Foreign and Security Policy.

  • Download document
    29January 2016

    One common assumption has been that refugees are leaving camps in Jordan and Lebanon due to difficult conditions and moving on through Turkey into the EU. But because of the northward shift of the Syrian conflict, the reality is somewhat different.

  • Download document
    29January 2016

    With the suspicion that two newly-registered refugees carried out the November Paris attacks, this Alert explores – and debunks – fears that refugee flows from the Middle East have become a backchannel for terrorists entering Europe.

  • 12January 2016

    This conference brought together European policy experts to review the COP21 climate conference in Paris, and to discuss the integration of climate change into the EU Global Strategy on Foreign and Security Policy (EUGS).

  • Download document
    10December 2015

    Given the radically altered international environment, how can the EU best adapt its border regime? This Brief shows how it will require an innovative response, rather than replicating at an EU level the classical attributes of a national model.

  • Download document
    10December 2015

    How could the EU help bridge the gap between energy and climate policies? This Alert argues that by doing so there is an opportunity to both improve European energy security in the long term and to make European climate diplomacy more effective.

  • Download document
    04December 2015

    This Brief examines the first use of the Integrated Political Crisis Response (IPCR) arrangements in response to the refugee crisis in Europe. How do they work? Can this new instrument foster a real joined-up approach to EU crisis response?

  • Download document
    04December 2015

    Member states have twice come close to activating the EU’s ‘solidarity clause’, and both cases have involved an internal security crisis with roots outside the Union. But will EU member states only properly support each other if they also feel able to eliminate the root causes overseas?

  • Download document
    27November 2015

    Climate change is a 'wicked problem' and efforts to address it have been slow, uneven, and politically divisive. But building on the lessons of past debacles, diplomats and negotiators have begun to apply a series of elements, useful for addressing wicked problems, that have changed climate diplomacy for the better.

Pages

Pages

  • Download document
    05June 2015

    Industrial espionage – i.e. the theft of trade secrets, intellectual property, and scientific know-how from enterprises and research centres – is on the rise worldwide. This Alert assesses state-sponsored industrial espionage in peacetime, and seeks to highlight the threat it poses to national and economic security.

  • Download document
    24April 2015

    45 years after its inception, the Nuclear Non-proliferation Treaty (NPT) faces old and new challenges. This Brief surveys recent developments ahead of the 2015 Review Conference of the Treaty. As a microcosm of the regime, the European Union is uniquely positioned to bridge the NPT’s main divides.

  • Download document
    15April 2015

    This independent report commissioned by members of the G7, identifies seven compound climate-fragility risks that pose serious threats to the stability of states and societies in the decades ahead. Based on an assessment of existing policies on climate change adaptation, development cooperation and humanitarian aid, and peacebuilding, the report recommends that the G7 take concrete action to tackle climate-fragility risks and increase the resilience of states and societies to them.

  • Download document
    13March 2015

    With the next summit of the Arctic Council expected to deal with the EU’s pending application to become a recognised observer in the organisation, this Alert takes a look at the cooperation efforts – and tensions – in the far north.

  • Download document
    13March 2015

    What progress has been made in Asia with regard to Search and Rescue (SAR) and Humanitarian Assistance and Disaster Relief (HADR) operations since the aviation disasters of last year? Can anything positive emerge from the tragedies?

  • Download document
    30January 2015

    This Brief explains how the internet has increasingly become a tool for extremists to recruit new members, raise funds, and conduct new types of attacks. What can be done to stop the rise of cyber jihadism?

  • Download document
    30January 2015

    With the virtual and physical worlds becoming ever more blurred, and the links between such hacker collectives and governments still unclear, is it still possible to set rules for governing cyberspace?

  • Download document
    16January 2015

    The first EUISS Brief of 2015 explores the possibility of other jihadi groups evolving along the lines of the Islamic State of Iraq and the Levant (ISIL). What explains the organisation’s spectacular rise? And what elements are required for other groups to replicate ISIL’s achievements?

  • Download document
    19December 2014

    This report on cybersecurity seeks to promote a development-focused approach to the issue. The authors address security not as an end in itself but rather as a means towards social, economic and political development, and argue that cyber capacity building is a developmental issue which requires cooperation among different policy communities.

  • Download document
    19December 2014

    A collaborative project by the entire EUISS research team, this Chaillot Paper analyses changes in the contemporary global environment according to eight distinct but interconnected perspectives. The publication aims to offer a comprehensive background analysis to the policy debates that will inform the drafting of the Report on the international geopolitical environment that the High Representative is due to present in 2015.

Pages