You are here

Transnational challenges

There is a growing overlap between the EU’s internal and external security problems. Terrorism, organised crime and unregulated migration not only pose a threat to European internal security, but also have a serious impact on the stability of Europe’s immediate neighbourhood. Very often, they find their roots in conflicts and instability further abroad in Africa or Asia.

For some time, the European Union has been active in international debates on the governance of these challenges, and has created new policy instruments of its own. Already in the early 1990s, the EU successfully linked its home-affairs priorities with its Common Foreign and Security Policy. The 2015 migration crisis showed the limits of that approach, and has sparked a new wave of reforms.

Pages

  • Download document
    29March 2017

    This Report examines the energy challenges facing the different regions of Europe, investigating shared priorities and common projects, as well as barriers to integration and cooperation. A series of chapters devoted to distinct regions examines what role the Energy Union can play to help address their energy challenges, including those related to energy security and relations with external suppliers.

  • Download document
    08March 2017

    To step up the fight against terrorism, the EU is looking to forge closer ties with strategic countries in its Southern Neighbourhood. The Union’s initiatives to set up counter-terrorism dialogues in the region have, however, been met with a hesitant response. How can the EU overcome different interpretations of what effective counter-terrorism should look like?

  • Download document
    08March 2017

    Although it is not the first time that Europe has experienced terrorism, for many Europeans, the phenomenon appears to be the most dangerous form of political violence today. So what is old and what new about today’s terrorism?

  • Download document
    02March 2017

    Since the EU adopted its Counter-Terrorism Strategy in 2005, it has focused on forging closer ties with third countries in the fight against terrorism. This study outlines and contextualises current counter-terrorism activities in the region.

  • Download document
    22February 2017

    Since the 1990s, the EU's gender mainstreaming strategy has spread to its foreign policy, including its CSDP. What concrete steps has it taken to promote women in the field of peace and security?

  • Download document
    08February 2017

    In a marked shift from previous policies, many advanced economies are creating labour market integration initiatives for refugees. This Brief argues that although this might seem a shortcut to a more progressive strategy, it risks undermining the integrity of refugee policy and repeating the mistakes of the 1990s.

  • Download document
    10November 2016

    Because of the intertwining of internal and external security matters, the EU’s model of dealing with crisis is being challenged. This Brief looks at how integrating different approaches and distinct practises across the EU may come to represent the key change for policymakers.

  • Download document
    10November 2016

    Civilian CSDP missions were downsized in 2016, paradoxically at a time when security needs are growing – with threats largely of a non-military nature. This Brief shows how these changes call for renewed investment in civilian CSDP so that it can find its place in the evolving global crisis management architecture.

  • Download document
    03November 2016

    As they enter a period of critical elections, the US and European countries are being confronted by a series of threats from cyberspace. Electronic voting infrastructure and networks of political groups have recorded repeated intrusion, while strategic leaks of compromising documents have sought to influence public opinion.

  • 28October 2016

    On 28 October, the EUISS and the European Policy Centre (EPC) organised a small closed-door session with a view to contribute to the debate regarding a new EU Integrated Border Management (IBM) strategy, the design of which was assigned to Frontex in the agency’s recently expanded mandate.

Pages

Pages

  • Download document
    26June 2015

    With law enforcement agencies pooling resources to counter ISIL's online propaganda, this Alert seeks to raise awareness of the jihadists’ use of the so-called ‘Dark Web’, the hidden underbelly of the little explored Deep Web.

  • Download document
    17June 2015

    The Arctic region is currently undergoing major and rapid transformation, both environmentally and economically. This report, the outcome of a EUISS Task Force, examines how these changes carry significant political implications, and highlights the new security challenges that are emerging in the region.

  • Download document
    15June 2015

    This report derives from a colloquium on the theme of ‘Women & War’ organised jointly by the International Committee of the Red Cross (ICRC) and the European Union Institute for Security Studies (EUISS) which took place on 30 September 2014 in Brussels. The proceedings of this colloquium have been written by the speakers or by the Delegation of the ICRC in Brussels on the basis of audio recordings of the event.

  • Download document
    05June 2015

    Industrial espionage – i.e. the theft of trade secrets, intellectual property, and scientific know-how from enterprises and research centres – is on the rise worldwide. This Alert assesses state-sponsored industrial espionage in peacetime, and seeks to highlight the threat it poses to national and economic security.

  • Download document
    24April 2015

    45 years after its inception, the Nuclear Non-proliferation Treaty (NPT) faces old and new challenges. This Brief surveys recent developments ahead of the 2015 Review Conference of the Treaty. As a microcosm of the regime, the European Union is uniquely positioned to bridge the NPT’s main divides.

  • Download document
    15April 2015

    This independent report commissioned by members of the G7, identifies seven compound climate-fragility risks that pose serious threats to the stability of states and societies in the decades ahead. Based on an assessment of existing policies on climate change adaptation, development cooperation and humanitarian aid, and peacebuilding, the report recommends that the G7 take concrete action to tackle climate-fragility risks and increase the resilience of states and societies to them.

  • Download document
    13March 2015

    What progress has been made in Asia with regard to Search and Rescue (SAR) and Humanitarian Assistance and Disaster Relief (HADR) operations since the aviation disasters of last year? Can anything positive emerge from the tragedies?

  • Download document
    13March 2015

    With the next summit of the Arctic Council expected to deal with the EU’s pending application to become a recognised observer in the organisation, this Alert takes a look at the cooperation efforts – and tensions – in the far north.

  • Download document
    30January 2015

    This Brief explains how the internet has increasingly become a tool for extremists to recruit new members, raise funds, and conduct new types of attacks. What can be done to stop the rise of cyber jihadism?

  • Download document
    30January 2015

    With the virtual and physical worlds becoming ever more blurred, and the links between such hacker collectives and governments still unclear, is it still possible to set rules for governing cyberspace?

Pages