This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Europe's New Rules to Thwart Terror Attacks
Security Newswire

Europe's New Rules to Thwart Terror Attacks

Europe’s New Rules to Thwart Terror Attacks
April 1, 2017
Kylie Bull
KEYWORDS counterterrorism / EU security / international security / travel security
Reprints
No Comments

New EU-wide rules on illegal acts to counter the growing threats from foreign fighters and lone wolves were approved by the European Parliament on February 16. The new directive on combatting terrorism will update the current European Union framework rules on terrorist offences and widen their scope to include emerging threats.

 

The extended list of preparatory acts to be criminalized includes:

  • Traveling abroad to join a terrorist group and and/or returning to the EU with the aim of carrying out a terrorist attack,

  • Recruiting for terrorism,

  • Training or being trained for terrorism,

  • Aiding, abetting or attempting to carry out an attack,

  • Public incitement or praise of terrorism, and

  • Financing of terrorism and terrorist groups.

 

The new directive also includes provisions to ensure immediate assistance to victims and their relatives after an attack. For example, EU member states should ensure that support services are in place to help families find out which hospital their relative has been taken to, and help victims to return to their home countries, if they have been caught in an attack while visiting another EU country. Assistance should also include medical and psychological support as well as advice on legal and financial matters such as legal procedures for making claims.

Once the new rules are published in the EU Official Journal, member states will have 18 months to transpose them into national law. The UK and Ireland will not be bound by the directive, but may notify the EU Commission of their intention to opt in, if they so wish. Denmark will not be covered by the directive.

At the same time, the European Parliament also approved new rules to step up external border checks with a view to improving the EU’s internal security. Under these new rules, all EU citizens and third-country nationals entering or leaving the EU will be systematically checked against databases, including those of lost and stolen documents.

The new regulation on border checks amends the Schengen Borders Code and is in direct response to terrorist threats in Europe as demonstrated by recent attacks in Belgium, France and Germany.

The checks will be mandatory at all air, sea and land borders, on both entry and exit. However, if these systematic checks slow land and sea border traffic too much, EU countries may carry out only “targeted” checks instead, provided that a risk assessment has shown that this would not lead to threats to security. People who are not subjected to a “targeted” check would at least have to go through an ordinary check to ascertain that their travel documents are valid and establish their identities.

At air borders, member states may use targeted checks for a six-month transition period after the new regulation enters into force. This period may then be prolonged by a maximum of 18 months in some exceptional cases, for example where airports lack facilities to perform systematic checks against databases and need more time to adapt.

Subscribe to Security Magazine

Recent Articles by Kylie Bull

Malware Experts Predict Attacks on Medical Imaging Devices Will Increase

UK Hospitals Receive Funding for Cybersecurity

Cooperation at Sea to Combat Maritime Attacks

China Creates Secure Communications Network

Most Countries without Cybersecurity Strategy

Kylie Bull began her career in television news at ITN in the UK before moving to print journalism. She has been an editor at IHS Jane's for sixteen years, where she continues today, and was recently the managing editor at Homeland Security Today. Bull has reported on a wide variety of security, geopolitical and counterterrorism subjects and has interviewed world leaders such as Russian President Vladimir Putin and UK Prime Minister Theresa May.

Related Articles

Online Terrorism Propaganda Targeted in Europe

Training Exercise Held to Thwart Cyber-Enabled Human Trafficking

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

cybersecurity breach

The Top 12 Data Breaches of 2019

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing