Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Europe's New Rules to Thwart Terror Attacks

By Kylie Bull
Europe’s New Rules to Thwart Terror Attacks
April 1, 2017

New EU-wide rules on illegal acts to counter the growing threats from foreign fighters and lone wolves were approved by the European Parliament on February 16. The new directive on combatting terrorism will update the current European Union framework rules on terrorist offences and widen their scope to include emerging threats.

 

The extended list of preparatory acts to be criminalized includes:

  • Traveling abroad to join a terrorist group and and/or returning to the EU with the aim of carrying out a terrorist attack,

  • Recruiting for terrorism,

  • Training or being trained for terrorism,

  • Aiding, abetting or attempting to carry out an attack,

  • Public incitement or praise of terrorism, and

  • Financing of terrorism and terrorist groups.

 

The new directive also includes provisions to ensure immediate assistance to victims and their relatives after an attack. For example, EU member states should ensure that support services are in place to help families find out which hospital their relative has been taken to, and help victims to return to their home countries, if they have been caught in an attack while visiting another EU country. Assistance should also include medical and psychological support as well as advice on legal and financial matters such as legal procedures for making claims.

Once the new rules are published in the EU Official Journal, member states will have 18 months to transpose them into national law. The UK and Ireland will not be bound by the directive, but may notify the EU Commission of their intention to opt in, if they so wish. Denmark will not be covered by the directive.

At the same time, the European Parliament also approved new rules to step up external border checks with a view to improving the EU’s internal security. Under these new rules, all EU citizens and third-country nationals entering or leaving the EU will be systematically checked against databases, including those of lost and stolen documents.

The new regulation on border checks amends the Schengen Borders Code and is in direct response to terrorist threats in Europe as demonstrated by recent attacks in Belgium, France and Germany.

The checks will be mandatory at all air, sea and land borders, on both entry and exit. However, if these systematic checks slow land and sea border traffic too much, EU countries may carry out only “targeted” checks instead, provided that a risk assessment has shown that this would not lead to threats to security. People who are not subjected to a “targeted” check would at least have to go through an ordinary check to ascertain that their travel documents are valid and establish their identities.

At air borders, member states may use targeted checks for a six-month transition period after the new regulation enters into force. This period may then be prolonged by a maximum of 18 months in some exceptional cases, for example where airports lack facilities to perform systematic checks against databases and need more time to adapt.

KEYWORDS: counterterrorism EU security international security travel security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kylie Bull began her career in television news at ITN in the UK before moving to print journalism. She has been an editor at IHS Jane's for sixteen years, where she continues today, and was recently the managing editor at Homeland Security Today. Bull has reported on a wide variety of security, geopolitical and counterterrorism subjects and has interviewed world leaders such as Russian President Vladimir Putin and UK Prime Minister Theresa May.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber responsive default

    Training Exercise Held to Thwart Cyber-Enabled Human Trafficking

    See More
  • cyber 2 responsive default

    EU Enacts New Law to Improve Critical Infrastructure Cybersecurity

    See More
  • Security newswire default

    Online Terrorism Propaganda Targeted in Europe

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing