Anda di halaman 1dari 26

The changing landscape of European

liberty and security: the mid-term


report of the CHALLENGE project

Didier Bigo, Sergio Carrera, Elspeth Guild and R.B.J. Walker

Introduction project also addresses parallel trends elsewhere


and the potential effects of what happens in
CHALLENGE is an integrated project nanced Europe upon other regions. So far, the project
by the Sixth European Union Framework Pro- has explored the following broad themes:
gramme of the Directorate General for Research of
the European Commission involving 60 scholars & the apparent radicalisationisation of specic
and researchers from 23 uni- forms of transnational political violence and
versities and research institutes its effects on liberal po-
across Europe. It provides Didier Bigo is the scientic coordinator of licies
critical assessments of the lib- the CHALLENGE project. He is Profes- & the threat assessments
erties of citizens and others sor of International Relations at Sciences- produced through tech-
living in the EU and the way Po, the Institut dEtudes Politiques de nologies of risk man-
Paris and Researcher at CERI/FNSP.
in which they are affected by agement and the
Email: didier.bigo@libertysecurity.org
the proliferation of discourses S. Carrera is a research fellow at the development of new
about insecurity, the practices Centre for European Policy Studies in technologies of surveil-
of reassurance, protection and Brussels. lance prevention, pro-
coercion of governments and Email: sergio.carrera@ceps.be ling, data transfer,
transnational agencies enacted E. Guild is Professor of European Migra- biometric identiers
tion Law at the Radboud University of
in the name of the safety of Nijmegen (The Netherlands), Senior Re- and the degree to which
citizen or their collective secur- search Fellow at the Centre for European security has been re-
ity, and the exchange of infor- Policy Studies in Brussels and a partner in duced to a need for
mation concerning their iden- the London law rm, Kinsley Napley. surveillance and con-
tity through new techniques of Email: elspeth.guild@conits.org trol.
R.B.J. Walker is Professor of Interna-
surveillance and control. tional Relations at the School of Politics,
& the changing forms ta-

CHALLENGE thus at- International Relations and Philosophy ken by logic of suspi-
tempts to facilitate a recon- (SPIRE), Keele University, and Professor cion and the practices of
ceptualisationisation of the of Political Science at the University of exception and deroga-
transformation of the inter- Victoria. tion, especially in rela-
Email: rwalker@uvic.ca
national order and the place tion to established
of the EU in it, and to enable understandings of the
a broader range perspectives about the condi- rule of law, to the multidimensional and
tions under which we are asked to make continuous reframing of the enemy, and to
judgements about the need for severe limits on the practices this reframing permits that are
liberty and the rule of law, as well as on the used to exclude or otherwise target specic
legitimacy of new forms of institutional author- groups.
ity and technologies of social control. While it is & the impact on the rights and freedoms of
explicitly concerned with trends in Europe, the citizens and foreigners.

ISSJ 192 r UNESCO 2009. Published by Blackwell Publishing Ltd., 9600 Garsington Road, Oxford, OX4 2DK, UK and 350 Main Street, Malden, MA 02148, USA.
284 Didier Bigo et al.

& the relation between the internal and external to knowledge and apocalyptic visions of a
impact of illiberal practices, especially in the dangerous future.
context of transatlantic relations but also of Liberal polities have long resorted to
an increasingly interconnected world order, illiberal practices of government, policing and
and the place of the EU in this world. social control. Indeed, their claimed need to
resort to illiberal practices has always generated
Our research responds to widespread concerns questions about the legitimacy of specic forms
about the resort to specic illiberal practices by of liberal government, policing, social control
contemporary liberal regimes, such as killing in and claims to authority. Security policy has been
counterterrorism operations, extraordinary ren- assumed to be at least partly beyond the reach of
ditions, discrimination against foreigners and democratic participation. Hence, for example,
increasingly intrusive forms of surveillance. the crucial role of the principle of the rule of law
These practices are linked with the identication and formal declarations of war in the limitation
of growing global insecurity that is widely inter- of arbitrary decision under extreme conditions.
preted as requiring sterner policies from the Serious long-standing questions about the char-
authorities and, consequently, new constraints acter of modern political life are at stake. Yet
on principles of liberty under the law and while generalised claims about security as the
presumptions of the innocence of individuals. rst freedom may remind us of a broader
The project examines the tensions created heritage of liberal achievements and their limits,
by claims that security is the rst freedom and they also suggest important changes in the way
that a new balance has to be established to coercive and restrictive policies are now justied,
manage the global scale of contemporary both domestically and internationally. Both the
dangers. It focuses on the justication of these scale at which and the strategies through which
policies and constraints on grounds of emer- new illiberal practices generated by emerging
gency, necessity and prevention in a radically European and transnational actors are now
transformed global environment, and the impact threaten to take us well beyond established
these policies have on civil liberties, political trade-offs between liberal aspirations and illib-
rights and social cohesion. eral necessities. They demand urgent attention
Five years after 9/11 no one doubts that and a more vigorous interplay between innova-
liberal polities have resorted to many illiberal tive forms of scholarship and public debates
practices, or that these practices have been legi- about appropriate policy. This is our objective.
timised by sweeping claims about global dan-
gers. Their scale is both revealed and obscured
by enquiries into the war in Iraq. Serious dan- Illiberal practices in liberal
gers are apparent, but the connection between regimes
such dangers and the mobilisation of tougher
practices of security and constraints on liberal The radicalisation of violence, critical
freedoms is not clear. The narratives of the infrastructure vulnerability and
intelligence services, security specialists and threat assessment
professionals of politics more generally have
been widely doubted, not only in relation to their Radicalisation of violence Everyone in this pro-
knowledge of the current situation but also to ject recognises that we confront signicant
their knowledge of and capacity to anticipate the transformations in practices of violence,
future with any accuracy. expressed most dramatically by the activities of
Such doubts extend beyond the conduct of Al-Qaeda and similar networks. Everyone
this particular war. Indeed, the tendency to understands the pressures for practices of
focus narrowly on conict in Iraq obscures a coercion and control brought by such violence,
broader pattern of surveillance in which illiberal as well as both requiring specic responses and
practices are being justied by a complex eld of the way the choice of a response, which involves
routinised transactions among many transna- selecting from fundamental social values.
tionally organised agencies, institutions and Everyone is familiar with the various ways in
interests; one that also thrives on weak claims which any response to new violent practices will

r UNESCO 2009.
European liberty and security report 285

be played out on a complex eld of institutional of political violence do not follow the demands of
interests, social forces and political judgements state formation and national frontiers, but
and will be subject to all the usual dynamics of become transversal.
incomplete knowledge, partial perspectives and Under such conditions, spatial proximity
unintended consequences. We also know, to a inside state territories ceases to be a factor
greater or lesser degree, that recent responses to limiting hatred and violence and generating
violent practices have themselves generated a solidarity. Such proximity may even be an
transnational climate of fear, unease and aggravating factor, as when a private enemy is
suspicion in ways that raise questions about turned into a public enemy by competing political
the shift towards new illiberal practices in liberal leaders: conicts following the break-up of
societies. Yugoslavia offer many examples here. Under
We recognise that contemporary forms of such conditions, also, attacks by small organised
illiberalism are sustained not only by broadly groups can destroy larger targets through tech-
accepted interpretations of new patterns of nological processes involving the miniaturisation
violence but also by a political culture of unease of violence so that the problem for governments
linked with new forms of collaboration between becomes less a military one concerning the
the bureaucracies concerned with security as accumulation of sufcient forces and a capacity
well as with the development of a private indus- to destroy the adversary, than one of detection in
try concerned with new technologies of surveil- locating an enemy that is small enough to hide
lance. What is not clear is how we are to come to easily. This tactical capacity for the invisibilisa-
informed and reasonable judgements about an tion of clandestine actors has created a complex
appropriate proportionality between the dan- situation requiring a different frame of mind than
gers and risks posed by new practices of violence that recommended by traditional principles of
and the intensity of practices of coercion, military strategy. It has signicantly transformed
surveillance and control they require. These combat into a set of tasks involving information-
questions have been at the heart of our discus- gathering, prevention and punishment.
sions, which have turned on different assess- From the 1970s onwards these attacks were
ments of the degree to which new historical and often more symbolic than military in character.
structural conditions have provided opportu- They were deployed when forms of intersubjec-
nities for political, institutional and commercial tivity generated violent struggles for the recogni-
advantage that have helped to shape and tion of symbolic values and memories of the
intensify a new politics of fear and unease at past. Such conicts were more concerned with
the cost of entrenched liberal principles. recognition and memory than with material
The monopolisation by governments of the interests or the will to take over political power.
means of violence has long restricted major In a European context, the Armenian and
forms of violence to state authorities and their Kurdish conicts of the 1980s stand as examples
military capacities for international wars. Small of this. In most such cases, governments and
wars, especially guerrilla operations, continue to military experts have over-estimated the capa-
exist, but they have often followed the Clause- cities of these organisations and confused their
witzian matrix involving the polarisation of symbolic impact with their effective power (as
conict between two enemies, and a strategy for subsequent judicial trials have shown years
conquering hearts and minds among the popula- later). We may now be on the verge of a major
tion, understood as a third party. From the mid- change, in that some small groups have become
1970s, researchers in polemology and conict less interested in convincing third parties to join
studies have shown that whether identied as their cause to take over political power or to
guerrilla war, nationalist struggles or terrorism, a negotiate internationally, and are ready to use
capillarisation of violence has occurred (Bigo large-scale violence against the third party itself
2006a; DalLago 2006a, Dillon and Reid 2007; (Bigo and Hermant 1988; Duclos and Hermant
Jabri 2006b, 2006c; Olsson 2006). This refers to a 2006; Scandamis 2006,).
reversal of the conventional geopolitical process The terminology of radicalisation of
through which populations are homogenised and violence, which has come to have almost
enemies are expelled from a home territory. Lines unchallenged status in the identication of the

r UNESCO 2009.
286 Didier Bigo et al.

problems we face, tries to capture the motiva- about preventing terrorism and expanding
tions of the actors or the structures of the process democracy have been more or less ineffective.
that seem to be leading to a change in the scale Consequently, beyond the split over Iraq
and targets of the violence deployed by small and the inadequate rhetoric of the war on
political organisations. But this carelessly over- terror, we have seen a new global common
generalised characterisation of radicalisation sense emerging, predicated on a belief that
has too often been used rhetorically to discon- technologies of surveillance orchestrated, at a
nect forms of violence from their specic minimum, at the transatlantic level, is the only
roots and to associate them with a particular way to solve problems posed by a stealth
subculture of radical Islam, understood as enemy that is quite impossible to detect. It is
fundamentalist or as a political doctrine of in this context that we can begin to understand
Islamo-fascism. A refusal to look at the recent appeals to the notion of the protection
broader transformation of social conicts was of critical infrastructures as well as the
already a factor in the way strategic studies and traditional market approach of risk reformu-
security experts were led to similarly simplistic lated into threat assessment against terrorist
culturalist views in the mid-1980s. The failure to activities.
understand the different strategies of voluntary
death in combat in order to maximise the killing
of third parties can be explained in much the Protection, homeland defence, critical infrastruc-
same way (see articles in Cultures & Conits 63, ture vulnerability, and threat assessment The
2006; Conitti Globali 2006). Many other factors notions of protection, homeland defence
must be considered in any attempt to explain and the vulnerability of critical infrastru-
changing patterns of violence. These include the ctures largely predate September 11, both in
sacricial dimension of certain strategies; the US military doctrine and in Europe, at least in
delocalisation of conict; technologies of infor- France and the UK (Burgess 2006c; Huysmans
mation, control and killing at a distance limiting 2006; Wver 2006). They were developed during
the face-to-face relations between the comba- the latter stages of the cold war and held special
tants. They also include the changing role of the appeal for military forces confronted with
mass media with respect to the speed of discourses about a peace dividend after the
communication and framing of the enemy; new fall of the Berlin Wall (Bigo 2006a, 2006c). They
relations between spatial vicinity and enmity; carry the message that even if the Soviet threat
and the failure of strategies of counterterrorism is over, many other threats remain: small
or anti-subversion which contribute directly to but interconnected and perhaps even more
the prolongation and sometimes the success of dangerous than the visible threat of the Soviet
the small groups being fought. military.
The failure to understand the transforma- By the mid-1990s different military doctrines
tion of contemporary political violence its had already integrated ideas about networks in
banality and its capillarisation, and the turn warfare and revived biological metaphors about
from military combat to policing has created the body of the nation state (Dillon and Reid
paralysis and anxiety among the government 2007). Nevertheless, they continued to assume
leaders of the western societies when dealing that only enemies with advanced technologies
with these forms of violence. It has been vaguely (whether missiles, weapons of mass destruction or
understood that traditional forms of war-mak- hackers on the Internet) could harm western
ing do not offer a solution but constitute the countries (Bonditti, 2005). Consequently they
continuation and development of the problem. continued to act well within Clausewitzian
Many governments have warned the USA and traditions of strategic warfare. Even when
the coalition of the willing that war against military forces became interested in low-intensity
states considered to be sponsors of terrorism conicts and terrorism, they sought to maintain
could worsen the situation. However, clear alter- sharp differences between their own role and the
native strategies have not emerged and suppo- role of intelligence services and police forces.
sedly new doctrines coming from the military, They were ready to integrate them, but not to
the police forces and the intelligence services collaborate with them. Further, military profes-

r UNESCO 2009.
European liberty and security report 287

sionals continued to insist on the need for account of a divide between the west and the
advanced technologies, especially on technologies rest, especially radical Islam (Burgess 2006a and
for checking information and gathering multiple 2006c; Cesari 2006a, 2006b; Huysmans 2006). In
layers of data as the key to winning against an relation to the effects on threat assessment and
invisible enemy. Military industries linked with critical vulnerability, this faith has led to a worst-
the cold war have also reconverted techniques case scenario approach and the justication of
developed for Star Wars against the Soviet tougher controls on borders, especially for some
threat by emphasising their usefulness in the war specic nationalities. The creation of the US
against drugs and in border controls against Homeland Security Department has recongured
illegal migrants (DalLago 2006a, 2006b). the relations between different institutions and
In Europe the dynamics of enlargement and authorities and has given the intelligence services a
the recognition of the freedom of movement of crucial role in coordinating information coming
individuals, including third country nationals from the military, police and border agencies both
already there, has profoundly limited this tradi- within and outside the scope of the Homeland
tional vision of a static and clearly bounded Security Department (Bonditti 2005).
homeland security. An alternative approach has This reliance on worst-case scenarios, of
been developed through a policing approach to practices of risk assessment that are effectively
managing people and their mobility (Guild free from any careful analysis of probabilities
2006a). The Schengen Information System has and that are primed to register maximum
epitomised both the originality and the difcul- dangers from single instances is increasingly
ties of this approach (Brouwer 2006). The found at the heart of the policies of management
management of EU border controls has been of fear and unease in the western democracies
different from the USA and the concept of (Bigo 2006a, 2006b; Guild 2006b; Loader and
protection itself has consequently come to have Walker 2005). Connected with the negative
different connotations than it has in the USA. dynamics of war abroad and the tendency to
Specically, the technologically driven US vision believe in technology as a solution, this
of military security diverges from the approach approach to risk has had major consequences:
of the EU in policing risk; an approach that has it has raised levels of suspicion; justied declara-
had practical effects on relations between tions of emergency rules and derogations of the
borders and identity (Huysmans et al. 2006). rule of law; destabilised the importance of
Nevertheless a common tendency to turn the human rights conventions at the international
referent object of security towards the self rather level; justied the development of technologies
than to an unknown enemy has been central to of mass surveillance at the transnational level
policies adopted both in the USA and the EU and massive exchange of individual data;
over critical infrastructure vulnerability and enabled the merging of the roles and missions
claims about the weaknesses of western democ- of military, police and intelligence services; and
racies (Wver 2006). Traditional sovereign acts encouraged zealous visions of democracy that
of making society secure are being reoriented have been difcult to distinguish from an
towards domestic rather than international ideology of empire, and have generated criminal
spaces, changing both the practice and rationality policies inside and outside the battleeld
of security (Sby 2005). Consequently, national (Bergalli and Rivera 2005, 2006b, Bigo and
security is increasingly conated with personal Tsoukala 2006; Dal Lago 2005, Dieben and
security and internal (in)security is increasingly Dieben 2005; Guild 2006b; Jabri 2006b).
conated with external (in)security.
Many accounts of recent US policy have
been given. Most agree that after 9/11 the shock Increasing suspicion, developing
of being attacked by a small group using low technologies of surveillance and their
levels of technology to achieve major levels of impact on freedom
violence created waves of fear, uncertainty and
revenge which have been framed and concep- Logic of suspicion and practices of exception
tualised through a combined faith in advanced The impossibility of knowing where and against
military technology and a simplistic cultural whom to ght back has led to growing unease

r UNESCO 2009.
288 Didier Bigo et al.

about the identity and the location of the enemy. have different proposals and rely on different
Consequently, suspicions have been generated resources. For some the recruitment of people
towards anyone who seems to share character- capable of inltrating the enemy is crucial in
istics associated with the perpetrators of vio- order to provide good intelligence. For others
lence: a certain gender, a certain nationality, a this is insufcient and too late, so that suspicion
certain age group, a certain religion, a certain needs to be deployed beyond the reach of the
profession (Bonelli 2005, 2006; Burgess 2006b existing knowledge in the services. It needs to be
and 2006c; Cesari 2007; Jabri 2006a, 2006c; helped by resources provided by existing tech-
Lianos 2005; Scandamis 2007). nologies of surveillance that have not been
While everybody recognised that suspicions applied before.
exist, and have become a paradigmatic feature of After the anthrax scare the US government
post 9/11 anti-terrorist policies, the question of hesitated between two somewhat different stra-
the degree to which this suspicion is based on tegies. One focused on the enemy within.
legitimate grounds has divided researchers. Provoking memories of McCarthyism, it
Some have argued for the right of the govern- involved a generalised suspicion; an insistence
ment to use derogatory and emergency measures that every US citizen may be a terrorist, and a
in confronting such a threat. However, most strategy of naming an external but potentially
have considered that the claimed threats cannot internalised enemy, the radical Muslim. It is at
be assessed naively and need to be discussed in that time that the US government decided not
terms of the proportionality of the response and only to launch the war in Afghanistan but also to
legal norms about the presumption of innocence target Iraq in order to both externalise the threat
(Guild 2006b; Jabri 2006b; Toth 2006). This has and to concentrate on specic groups inside the
generated a common research agenda in the USA, with a major reinforcement of the control
project on the conditions in which a climate of of people on the move and in transit.
suspicion emerges and practices of exception. At the same time, however, there has been a
Some have done this using an inventory of the tendency, while data mining all individuals,
practical measures taken by the different services including citizens, to adopt specic policies
in some countries (Bigo and Camus 2006; Bigo et oriented towards foreigners and particular
al. 2008; Olsson 2006). Others used databases religious and national minorities, both at the
and limits posed by the judiciary (Brouwer borders and inside the USA. Ofcially the latter
2006); or changes in both in legislation and the policy has been presented as a balanced
justication of legislation on grounds of emer- situation, even if many analysts, and many
gency and state of exception (Aradau 2004, lawyers, have complained about this vision of
2007; Guild 2006a; Huysmans 2006; Jabri 2006a; balance a vision that in fact involves a major
Walker 2006b, 2006c). shift from individual freedoms to preventive and
The rise in the level of suspicion and the way coercive measures.
in which certain groups have been proled has Moreover, and more informally, it seems
been analysed in France, Spain, the UK and at that some services have also continued with the
the EU level. Comparisons have been made with rst strategy and have designed large schemes
the US situation. As a result of these investiga- for accessing databases; a data-mining process
tions, it has become clear that the practices of that includes any traveller to the USA and the
policing have been partly freed from judicial possibility of creating a de facto national registry
controls, and that this has enabled more of all US citizens and their criminal records as
possibilities for control and surveillance for the well as their beliefs and preferences.
police and intelligence services (as well as for In this very specic context of uncertainty
some private security providers) beyond the and unease, suspicion has been justied as long
limits of what was considered to be normal as its object has been understood to be more or
before 11 September. The key question for all less limited, and the principle of presumed
the services, both in the USA and in Europe, has innocence has been considered as naive and
been how to deploy suspicion broadly enough to inefcient in a time of serious emergency.
catch unknown people while not suspecting This has created a phobia of everything that
everybody. The different security professionals may be considered national disloyalty and has

r UNESCO 2009.
European liberty and security report 289

contributed to an ultra-patriotism with a dis- competent authorities, to transnational


turbingly vengeful tone. exchanges of data in order to monitor the
In Europe tensions have been less extreme, possible actions of violent groups and to
even after the bombings in Madrid and London. establish proles of their potential future acts.
The idea that habeas corpus, obligations linked Such proling involves an analysis of how it is
to international conventions, and the national possible to prevent human violence by small
rule of law can be discarded has not really groups, and how to determine whether the
ourished, except partly in the UK with the human knowledge coming from a detective
provisions to derogate from the European approach is sufcient for prevention. If
Convention of Human Rights (Aradau 2007; technologies of software simulation of possible
Guild 2006b; Neal 2006). But while almost no futures are involved, how is it possible to model
EU country has formally declared a situation of an uncertain future as an array of probabilities?
emergency or a state of exception, the societal The kind of risk assessment used for insurance
climate against migrants and foreigners, espe- purposes cannot work for an approach based on
cially those coming from Islamic countries, has a worst-case scenario, so questions arise about
contributed to support for the US position in the credibility and legitimacy of discourses
many political circles, especially those that seek concerning the prevention of terrorism (Dillon
opportunities for justifying more general mea- and Reid 2007; Wver 2006).
sures against migrants and refugees (Balzacq Monitoring the future in a desperate move
and Carrera 2005; Lock 2006; Palidda 2006a, to reduce uncertainty through technology and
2006b, Ortuno Aix and Fernandez Bessa 2006). coordination has been called prevention in
Suspicion has also emerged as a paradigm ofcial language, but in fact works as a form of
enacting specic illiberal practices, although anticipation (Bigo 2006a, Guild and Selm 2005).
judges, lawyers and non-governmental organi- The two forms of proling need to be differ-
sations have shown some capacity to openly entiated. The rst is based on substantiated facts
contest what has been going on (Brouwer 2005, and a criminal police approach. It often follows
Szikinger and Toth 2006). Here suspicion has what has already happened in order to nd the
not converged with ultra patriotism; for exam- criminal before he repeats a crime.
ple, the Aznar government that tried to dupli- The second form is not only based on facts
cate the Bush strategy to mobilise the country, but even more on conjectures and parameters
suffered severe electoral defeat (Fernandez given to specic software or analysts in order to
Bessa and Ortuno Aix 2006). Nevertheless, even help them to build scenarios of the future about
if Europe has been more moderate, suspicion has people who are unknown to the detective
become a routinised practice of the intelligence services, and even to the intelligence services.
services and the police. Moreover, in many This proling is independent of a criminal
countries the law has been changed in order to population and is constituted by a category of
weaken judicial controls and give more freedom individuals who have either crossed paths with
(that is, the possibility of discretion, if not an identied suspect or share some general
arbitrariness) to these services. This has created characteristics with the supposed enemy. It is
the conditions for a transnational exchange of supposed to give the outline of an elusive enemy,
information that is already stored in databases, to follow its traces and to anticipate its actions.
and pleas for more collaboration as a natural But these predictions about the future
move towards greater efciency (Guittet and movements and identity of the enemy cannot
Bigo 2006). be prescient. They are full of uncertainty. The
technical character of the databases in which
they are stored cannot allow for assessments of
Technologies of surveillance and impacts on the quality of the information or the capacity of
the rights and freedoms The development of the model to project the past into a possible
this climate of suspicion has opened the way for future that can be understood by the authorities.
specic techniques of group proling. These The image of technical efciency and scientic
vary from local and national detective stories objectivity masks a far murkier mix of question-
stored in databases and exchanged between able information and slippery logic. The

r UNESCO 2009.
290 Didier Bigo et al.

uncertainty of the future cannot be reduced by secure storage, exchange and transfer of such
proling specic groups or by a maximum data have been crucial in this respect. They have
security scenario, and the commitment of the been combined with traditional forms of identi-
security discourses to protect effectively always cation through the inclusion of chips (or radio-
tends to be exaggerated and misleading when the frequency identication) and are now burgeon-
enemy is unknown or undetectable. ing through visa applications, visas, passports,
The events of 11 September have opened up identity cards and passes for specic areas. The
a phase that is not of hypersecurity but is one competition between US and EU security
in which the meaning of security as effective industries concerning biometric identiers, soft-
protection and reassurance has been discarded. ware for data-mining and the integration of data
We now probably live in a post-national security protection into this software and technology is a
era; one in which uncertainty plays an increas- key element in explaining the efforts on both
ingly multidimensional role in structuring a sides of the Atlantic to mobilise specic partner-
political life that is neither conned to the state ships between public and private actors.
nor is organised globally (Walker 2005, 2006a). What is at stake here is the control of
Many of the old categories of analysis are of mobility under three categories: space, time and
little help in this context, not least in relation to speed. Different formulations have been pro-
questions about security. Nevertheless, this does posed to explain the logic of these transforma-
not justify contemporary claims about the need tions. One is the importation of the matrix of
for extreme forms of hypersecurity or hypersur- war inside society (Jabri 2006a, 2006b, 2006c).
veillance. These merely add new problems with- Another is the development of a global policing
out resolving the core need to provide effective using warfare (Dal Lago 2006b, 2006c). A third
protection. is the restructuration of the dispositif of the
The development of forms of intelligence- Panopticon into a Banopticon (Bigo 2006a).
led surveillance and a logic of control has All these hypotheses connect the develop-
accelerated since 11 September. Dataveil- ment of specic technologies of surveillance
lance, the multiplicity of forms of surveillance internally and transnationally with the form of
burgeoning from private companies that are warfare enacted in the name of peace and
partly driven by a desire to know more about democracy abroad, and analyse the merging of
consumers, has been considered to be both internal and external feelings of unease and fear,
effective and a form of good management that and their homogenisation through the naming
can be transposed to public bureaucracies. It has of global terrorism. They describe and try to
created what has been called a surveillance explain the routines of surveillance, the framing
assemblage (Haggerty and Ericson 2000) that of the sovereign moment of exception, the
was already emerging in decentralised forms symbolic politics that are at stake, and the
before 11 September but is now the object of an effective capacity of struggles enacted by these
attempt by the intelligence services to connect tools.
the different layers of information, especially As their effectiveness in terms of protection
between military intelligence services and the is doubtful, many researchers have drawn
security industry. The judiciary has been highly attention to the role of the professionals of
resistant towards this move, especially in Europe politics in providing reassurance to the
(Aradau 2007; Guild 2006b; Jabri 2006c; Neal population and to the symbolic politics of
and Dillon 2008; Szikinger and Toth 2006; counter-terrorism rhetoric. This has generated
Tekofski 2006). research on the importance of anti-terrorist
We have analysed this move from security discourses and their successive or simultaneous
to surveillance and the inuence of the security deployments and conicts around the notion of
industry in the framing of threat assessments danger, emergency, security and freedom.
and the vulnerability of society in various ways Extending established critiques of the notion of
(Bigo 2005; Bonditti 2008; Burgess 2006b; a balance between security and freedom, some
Lianos 2005; Wver 2006). For example, the researchers have specialised in the analysis of the
technologies of computerisation of personal public sphere and the role of the media in this
data, of software permitting the quick and respect (Bonelli 2005; Palidda 2007; Tsoukala

r UNESCO 2009.
European liberty and security report 291

2006a, 2006b) and have shown how the general and of the social and legal mechanisms that have
suspicion and the development of technologies contributed to these changes.
of surveillance is connected in public and media Such analyses suggest very serious pro-
narrative. The discourses of reassurance are blems for social cohesion. The individual who
limited in their long-term effects, even if the used to be seen as included is now likely to be
discourse of mobilisation to war was effective at treated and qualied as the enemy (Guild and
the beginning. The credibility of the authorities Minderhoud 2006). The case of Spain has here
involved in anti-terrorist rhetoric is diminishing, served as a good empirical example for the
especially but not only with the Iraq war. analysis of terrorist legislation, and the evolu-
In the face of this possibility of large-scale tion and practices of penal agencies (Bergalli and
violence initiated by small clandestine groups, Rivera 2005, 2006a, 2006b). In fact, in Spain a
we see the buck being passed. Nobody wants to number of criminal code reforms, procedural
take ultimate responsibility and everyone is rules and police and prison regulations have
always ready to lend it to another authority been modied by the anti-terrorism philosophy.
in order to dilute the possible blame on whoever We have seen how new indictable offences, more
was in charge during the moment of exception. police power and penitentiary restrictions have
Tensions between the professionals of politics been introduced after 11 September 2001, and
and media experts, on one side, and the even more so after 11 March 2004. In the same
professionals of security management, on the vein, criminal justice agencies have played a
other, have been profound; both during the greater role in more severe violations of human
framing of the threat and subsequently for the rights than before. Research has also taken note
framing of who was responsible for knowing of some situations in which freedom of speech
what was going on and how past failures are to and political dissent have been reduced or
be explained. Some important questions have directly cut out by the closure of newspapers or
emerged from the impossibility of resolving the the outlawing of political parties.
crisis through a sovereign decision concentrated One of the key innovations of this research
on one authority. One concerns the way in which has been to address questions about the role of
we are to cope with uncertainty, potential the professionals of security management at the
violence and a politics of prevention. Another transnational level. This has suggested a differ-
concerns who has the capacity and authority to ent way of looking at the contemporary situa-
assess the truth and its verication process (Bigo tion. The struggles and alliances between
2006c; Walker 2006b, 2006c). professions inside the eld of security manage-
Different researchers have tried to answer ment professionals may have become more
these questions either by choosing to look at the relevant for explaining some policies than the
local and national levels for specic countries or traditional approaches predicated on the
by trying to conceptualise the relations at the national interests of the states or oversimplied
transnational level. Special attention had been conceptions of a homogeneous process of
given to the new member states joining the EU globalisation.
and to the southern borders of the EU, in order Inside this transnational eld of (in)security
to connect the local, national and regional levels professionals, some continue to insist on tradi-
(Balzac and Carrera 2005; Bonelli 2005; Fer- tional solutions and rely on local knowledge and
nandez Bessa and Ortuno Aix 2006; Palidda a national security agenda in order to cope with
2007; Pap 2005; Saari 2006; Smith 2006; danger. Here attention is focused especially on
Seikinger 2005; Tchorbadjiyska 2006; Toth border controls and sovereignty. Terrorism is
2006, Vlcek 2006; Weinar 2006). The production then framed either as a problem of defence and
of laws on anti-terrorism and the way in which foreign affairs, especially when it is clear that
they affect the rights of individuals, especially specic groups have acquaintances with other
those suspected of terrorism, have been governments or warlord leaders outside the
studied in detail. Analyses have also been made country, or a police problem when it is an
of the transformation of the criminal justice insider group. Another very different discourse
system and of the free movement of individuals on security insists on the novelty of the threat
in the framing of the enemy and invasion, after 9/11 and pleads for a transnational

r UNESCO 2009.
292 Didier Bigo et al.

coordination against danger through the instruments of exchange of information and


exchange of data concerning potential suspects. knowledge. These exchanges of information
The crucial difference between these two forms concerning personal data have been set up not
of security discourse becomes invisible once the only inside the EU and between liberal regimes
debate is reduced to a supposed balance between (the EU, the USA, Australia, Canada, and so
security and freedom, or when denitions of on) but also between any states that have
security are essentialised (as a common good, or information on terrorist activities.
as a right of the citizen). The French and Belgian teams contributing
These struggles around the notion of to the CHALLENGE project have worked
security and the order of priorities in the together in order to specify these elements at
management of threats have generated a eld the EU level. They have begun mapping the
of security professionals that is transversal to relations between Europol, Eurojust, Eurodac
that associated with nation-states. Discussions and FRONTEX to better understand how this
about the management of frontiers have been network of European institutions exchanges or
central to the consequent polarisation of con- does not exchange information, and what kind
ceptions of the best practices of control (whether of information is exchanged. But the relation
or territory or persons, of public or private with the USA and other third parties cannot be
management, of collective or individual security ignored, as it is a central component of a broader
or of human agents or technological equipment) pattern.
and to the determination of what is now at stake Issues related to the Passenger Name
under the terminology of security, which has Records Agreement concluded between the EU
come to refer mainly to practices of surveillance. and the USA on processing and transferring
The old game of national security and personal data by air carriers to the USA have
sovereign states and its constraints is still been assessed in some detail (Guild and Brouwer
powerful and acts against the practices of 2006). On 30 May 2006 the European Court of
collaboration between the authorities exchan- Justice declared that this agreement was unlaw-
ging data. National interests and traditional ful. At the heart of concerns about the data
military thinking have difculties in coping within the structure of EUUSA relations is the
with the logic of policing beyond borders, where justied worry about the capacity of the EU to
all the coercive actors act against the same protect its citizens and residents rights. The
enemy, especially when the latter is unknown. lack of clear and accessible EU remedies for
They are dubious about the discourse on the passengers against the transmission and use of
imperative need for collaboration, and even their personal information is difcult to recon-
more about the technological trends that the cile with the generally accepted principle that
surveillance industry promotes. For them the everyone whose rights under EU law have been
only clear knowledge derives from human and violated should have an effective remedy.1 The
local sources, and specic enquiries, not from legal constraints of the EU, tied up with a
data-mining and the massive exchange of European understanding of human rights as
personal data. encompassing the right of individuals to control
However, the trend privileged by political their own data, lead to inexorable conict with
professionals has been mainly in the opposite the US authorities, which consider data to be the
direction. Different governments, independently property of the individual or authority that
of their positions on Iraq, have put a lot of collects them. Data thus have acquired a
resources into a technological solution mixing political life of their own; one that has opened
private and public initiatives, and a vision of new ssures in EUUSA relations.
prevention, coupled with the surveillance of One of the key questions here concerns the
ows of persons proled in advance. boundaries of the eld created by the technical
The existence of a eld of professionals of devices permitting intelligence-led surveillance
(in)security at the transnational level, merging at the transatlantic level. Does such a eld now
internal and external security preoccupations, as exist? Is it useful? Is it dangerous for democracy?
well as private and public references of manage- How should we cope with the search for
ment, has led to the creation and development of ever more information, and with the existing

r UNESCO 2009.
European liberty and security report 293

boundaries between systems of information, not for the basic rule of law. The infringement of the
only between the EU, the USA and Australia, rule of law in the name of technology and
but also between non-democratic and demo- rhetorically resonant but weakly substantiated
cratic regimes? Collaboration with states, which beliefs will produce predictions about the future
are often non-democratic, that have this infor- actions of small groups that are not only largely
mation, and the emerging logic of a stock inaccurate but counter-productive in the long
exchange of information at this level has become run. This will be the case even if it seems useful to
particularly worrying for non-governmental invoke derogation and exception at the begin-
organisations interested in the violation of ning; such measures will be used by targeted
human rights. groups to win sympathy to their cause and to
They are especially worried in so far as anti- attack the legitimacy of the governments toler-
terrorist policies promoted by liberal regimes ating such measures.
may have a direct effect on the violation of The idea put forward by many profes-
human rights inside these countries and may sionals of security at the transnational level that
even create the conditions for democracies to we need to reduce what is rst and foremost a
turn a blind eye in order to continue to have political choice to use these technologies to an
access to information necessary for their own ethical choice with a specic use of technology is
struggle. Moreover, this form of collaboration in itself an ethical problem. It masks the
with dictatorial regimes poses questions regard- responsibility for decisions concerning exception
ing the reliability of their information and the and derogation and creates a temporal disjunc-
risks of accepting such information and its ture between these actions and popular consti-
categorisations too easily. tutional, parliamentary control. While such
Thus, our research on the way suspicions control is not disappearing, some governments
have been articulated and the consequent devel- and people with responsibility in the surveillance
opment of specic technologies of intelligence- industry have managed to take advantage of the
led surveillance, as well as on the impact of such lag between decisions and accountability, hop-
technologies for established norms of freedom, ing that the moment at which knowledge of their
suggests a signicant recourse to illiberal prac- illiberal practices becomes public can be delayed
tices (Aradau, Brouwer, Bonelli, Guild, Lodge, and that amnesia will soon take effect.
Neal, Tsoukala). What is not yet clear is whether The idea of speeding up processes of
these specic illiberal practices are part of a accountability must be discussed more openly
broader restructuring of practices of (in)security (Ackerman 2006, European Liberty and Secur-
at the transnational level. Many commentators ity [ELISE] 2006). The limits of data sharing
have noted a tendency to work towards more must also be made clear: it is not the same thing
porous accounts of what we mean by liberal to share data inside the EU, between democra-
democracy. Others have raised the possibility cies, or with every state that has interesting data
that we are entering an international, transna- about small groups using clandestine violence.
tional, global or imperial order characterised by Judgements about regimes cannot be erased for
a permanent and general exception. Our re- the sake of greater efciency in the global war on
search recognises the signicance of this broader terror. The key problem is not usefully identied
picture for the interpretation of specic practices by the lazy and propagandistic metaphor of a
of illiberalism, as well as the potentially balance between security and freedom. It is a
momentous implications some versions of this matter of assessing who is responsible for the
broader picture have for established principles derogation of law in cases of emergency and
of freedom, the rule of law, and so on. large-scale danger as well as for identifying the
The technical forms taken by intelligence procedures deemed to be appropriate, under
(as dataveillance), through software proling, which precise conditions and under what sort of
data mining, large-scale primary targets and control. Once these questions of political
intrusive forms of invasion of privacy do not authority are posed more effectively and without
seem to be more efcient than human intelli- mystifying rhetoric, our capacities for informed
gence. An accurate human investigation is judgements about matters of great seriousness
possible, using detective methods and respect will become much clearer.

r UNESCO 2009.
294 Didier Bigo et al.

The European arena: the of law needs to reside at the heart of the
effects of suspicion and European integration project. The Hague Pro-
exception on liberty and gramme appears to marginalise the protection of
fundamental rights and freedoms (liberty), the
security principle of equality and of democratic account-
An area of freedom, security and ability and judicial control. The overall priority
justice? that guides the programme remains clear:
strengthening security understood as coercion
Based on the foundations provided by the (Bigo 2006b). The direct result is that the EU
Amsterdam Treaty, the Tampere European policy and regulatory framework do not offer
Council of October 1999 gave political direction the necessary mechanisms and venues for the
for the gradual development of an Area of creation of an AFSJ based on the liberty and
Freedom, Security and Justice (AFSJ) equality of all.
(European Parliament 1999). The Tampere This analysis is coupled with analysis and
Programme identied the creation of an AFSJ mapping of the different agencies and profes-
as a fundamental priority for the future of the sionals in charge of security (Bigo 2006a).
EU, and set out the objectives for its rst ve CHALLENGE has addressed the anti-terrorist
years ending in 2004. The Hague Programme activities carried out by police organisations,
agreed by the Council on November 2004 intelligence services and military personnel in a
adopted a new ve-year policy agenda in these selection of national arenas (France, Spain and
areas (European Council 2005). UK) as well as at the EU level. Further, it is
CHALLENGE has provided a reexive investigating the relationships and the porous
examination of the main achievements of the boundaries between the professionals of secur-
AFSJ and its future ambitions. It has discussed ity, politics and the media. The relations between
the level of policy convergence2 reached in these the public bureaucracies and the private security
dimensions of freedom, security and justice industry working on the exchange of informa-
(Balzacq and Carrera 2005, 2006; Guild 2006a). tion through databases and developing new
In general terms, the expected level of harmoni- technologies such as biometrics identiers
sation, or Europeanisation, in some elds has are also subject to study. This empirical research
not been successfully reached. Furthermore, an indicates how the European professionals of
in-depth examination of the provisions included security3 link the different services of law
in the EUs legislative instruments reveals enforcement authorities, customs, intelligence
surprisingly low minimum standards, which and secret services in such a way that profes-
may endanger international and European sional solidarity between these services is giving
commitments to human rights. They also offer birth to a general common sense about what is,
wide discretion for member states to apply and what is not, security (Bigo 2006a; Guild
national law and substantial exceptions to the 2005).
common rules that both permit wide divergence
in practice and dispersion in the national arena.
A major weakness of The Hague Progra- The external security dimension: a
mme is the way in which freedom and security common foreign and security policy
are presented as antithetical values requiring a and the European neighbourhood
balanced approach. This metaphor of balance policy
mainly consists of the need to nd the right
equilibrium between freedom and security in the The European Security Strategy (ESS) (2003)
EU. In fact, its predecessor, the Tampere adopted in December 2003 by the EU heads of
Programme, rejected this understanding of the state and government afrmed that the post-
relationship between freedom and security by cold war environment is increasingly one of open
advocating a shared commitment to freedom borders and that the EU should progressively
based on human rights, democratic institutions become more ready to share responsibility for
and the rule of law as the starting paradigm global security. The ESS identied a number of
(CHALLENGE Paper 2004). Securing the rule global challenges and key threats that the EU

r UNESCO 2009.
European liberty and security report 295

seems to be presently facing: terrorism and by the same rigorous obligations to respect civil
organised crime, the proliferation of weapons liberties. Instead, the conduct of violence is
of mass destruction and regional conicts. regulated by treaties on the conduct of war.
CHALLENGE is addressing the emerging inter- Two trends are now challenging this tradi-
face between internal and external security in tional perception. First, EU military involve-
Europe, and the implications of this changing ment is in the area of peace-keeping, building
relationship to liberty and equality. and maintenance. This has come to mean a form
Linking the discussion on exceptionalism of policing abroad. Institutional discussions
with (in)securitisation processes in our socie- about the correct personnel to use for these
ties requires a sociological analysis of what is purposes have given rise to some discussion in
security today both internally and externally. military circles in the EU. A new role for police
The relationship between freedom and (in) with military status now seems to be developing.
security must be analysed by looking at the The second trend concerns the obligations on
various social practices of the different agents military personnel in action abroad. The
and the dynamic of transformation of their European Court of Human Rights has been
relations. For instance, through the involvement required to consider whether breaches of human
of the military in international police operations rights contained in the European Court of
in the European neighbourhood, the relation- Human Rights by European military personnel
ship between state violence and the law is also abroad constitute violations of the European
being deeply redened (Dieben and Dieben states duties under the Convention. These
2005; Guild 2006b; Guittet 2006a). decisions on this issue exemplify the centrality
The use of policing terminology in EU of supranational law as a mechanism of govern-
external military intervention in Afghanistan ance and as a mechanism determining entitle-
brings a language of legal legitimacy associated ment to exercise violence anywhere. This
with peace to a situation of international conict centrality substantially changes the meaning of
(Olsson, 2006). One of our main conclusions has sovereignty.
been that the non-Clausewitzian character of The EUs increasing responsibility for
twenty-rst century armed conict has para- peace-keeping missions throughout the world
doxically led to an interest in the political scripts has also raised a number of open questions, such
and narratives of the potential enemy (Clause- as to what extent the development of EU
witz, 1976), while simultaneously depoliticising military power will compete with or complement
the relation to any form of military resistance. the actions of other international organisations
This paradox is all the more important to such as NATO. On the other hand, it has not
highlight, as the importance of the relation been determined whether the emergence of the
between intervening forces and local popula- military dimension will or will not strengthen the
tions has been emphasised by the shift from EUs soft power. CHALLENGE has assessed
wars between states to wars inside states. It the extent to which potential EU military
also highlights the importance of politicisation intervention shapes the international system.
and depoliticisation processes in wars in which The interactions between EU and NATO have
the confrontation between external forces and been analysed through the cases of civil crisis
local societies has been made more complex by management and the ght against terrorism. In
the network dimension of military interventions. the light of this, it has been argued that
In the same vein, we have assessed the legal enlightened Atlanticism, which would recon-
engagements that have been taken in the context cile the interests of the EU with those of its
of EU external security action by looking at the major allies, allows for a mutually benecial
nature of the citizen, the foreigner and the state political, military and institutional system of
from the angle of security in the form of the continuing relations between both structures
monopoly of violence. Traditionally, the (Barbe 2005).
exercise of violence outside the state has not been The ESS identied as a strategic objective
subject to the same limitations as violence in the the need to build security in the neighbourhood.
state. Those exercising violence outside the state In May 2004 the EU acquired not just 10 new
that is, military personnel are not constrained member states but also several new neighbours.

r UNESCO 2009.
296 Didier Bigo et al.

At about the same time, it began to esh out a competent public authorities. Two issues stand
European Neighbourhood Policy (ENP), to out that result from the various shifts between
bring some order to the EUs relations with its competent levels of government: on the one
old and new neighbours and to ensure that the hand, the possibilities of political accountability,
newly enlarged EU would be surrounded by a control and legitimacy through representative
ring of friends. While the ENP does not resolve assemblies and other alternative forms, and on
the basic dilemma of how large the EU should the other hand, the position of individual
become, it does place in its hands additional citizens, particularly the consequences for their
tools for its relations with its neighbours. In fact, legal protection (Tekofsky, 2006).
it requires much of these neighbours and seems The current phase of the EU model of
to offers only vague incentives in return. The border control has recently experienced a series
hovering ghost of enlargement will not vanish of substantial and institutional developments:
with the commitment to extend to these neigh- the entry into force of the Schengen Borders
bours all the freedoms of the internal market but Code (European Commission 2004) the trans-
without institutional participation in it. The formation of the common visa list and the
member states will need to be more serious about institutional outputs of the EU common borders
setting clear benchmarks and offering concrete strategy. In particular, the project is assessing
incentives if the ENP is to meet its core the European Agency for the Management of
objectives (Smith 2006). Operational Cooperation at the External Bor-
Furthermore, the EU neighbourhood is ders of the Member States of the EU (FRON-
quite a variegated place (Guild 2005). For TEX) and its relationship with EU borders law
instance, when one examines the provisions on as codied in the Schengen Borders Code
movement of persons one has the impression (European Council, 2004). The research is
that the neighbours differ greatly, even when addressing the overall coherence between border
they border one another. In addition, the law and the FRONTEX agency. The impacts of
neighbourhood policy instruments related to this relationship in terms of legality, legitimacy,
mobility may be considered repressive. Looking democratic and judicial accountability, as well
at the example of irregular migration, the as for the status of the individual are therefore at
emphasis seems to be centred on placing obliga- the heart of the analysis.
tions on neighbours to act as the buffer between The communitarisation of part of the
the EU and other countries. The staples of the Schengen acquis into the EU legal framework
ENP in this area are mainly about the exchanges has involved processes of securitisation around
of information, monitoring irregular migration individuals and their liberties. The Schengen
ows and readmission agreements. The conse- common borders regime and the dismantling of
quences of this approach are likely to harm the internal border control inside Europe led to
neighbours relations with their own respective many fears about a potential increase of
neighbourhoods beyond the EU, as they will be insecurity, referring to concerns around issues
required to take coercive action against these related to irregular immigration, transnational
nationals. Instead of reinforcing solidarity in the organised crime and terrorism. The lifting of the
region such an approach is likely to create more internal border controls has therefore implied
dividing lines, tensions and instability. both reinvigoration of territorial control over
the common external border, and a recongura-
EU border law and institutional tion of deterritorialised control around indivi-
mechanisms duals and their free movement. These processes
of control have subordinated liberty to the
Our research has addressed the shifts in govern- security guarantees and the compensatory
ance that have occurred with respect to compe- security measures deemed necessary in order to
tence over external border control in the light of ensure the exercise of the freedom to move inside
the protection of internal and external security. Schengenland (Bigo and Guild 2005).
It is paying particular attention to their In fact, the development of the technology of
consequences in terms of accountability and surveillance and control has direct implications
the position of individual citizens towards for the legal protection and status of the

r UNESCO 2009.
European liberty and security report 297

individual. The way in which the individual is mechanisms fostering dynamism and liberty in
traced by the state and other supranational the common area of mobility have been intro-
authorities, for instance the transformation of duced at the national and EU level.
population registers and the so-called Schengen The direct consequences of this alternative
Information System is new. A central question approach towards enlargement can be seen, for
has also been whether the rights and civil liberties instance, in the European Commissions propo-
of third country nationals seeking to cross sal to regulate border trafc at the external land
Europes external borders are balanced in an borders (European Commission 2005b), which
appropriate way against the legitimate need of aims at blurring the rigid border control of the
governments to control their external borders and Schengen acquis and normalising and liberal-
to protect internal security. The availability of ising the free movement of people from the
legal remedies and the scope of judicial review for neighbourhood in the east and north (Balzacq
third country nationals entered into the Schengen and Carrera 2005; Tchorbadjiyska, 2005).
Information System on the basis of Article 96 of If we take into consideration the national
the Convention Implementing the Schengen experiences of some of the new member states in
Agreement of 1990 urgently needs reinforcement their processes of alignment with the Schengen
(Brouwer, 2006).4 acquis, the EU mandatory visa policy could have
caused the most signicant problems in Hungary
because of the large number of ethnic Hungar-
Enlargement and frontiers: the ians who are nationals of states on the EU visa
eastern and southern European blacklist living in the cross-border regions of
borders the neighbourhood. Notwithstanding, penetr-
ability and mobility in general have been safe-
The medium-term and long-term impact of guarded by a national exible Hungarian visa
enlargement processes on issues of external and regime coupled with the EU regulations on local
internal security with regional contacts, espe- border trafc (Baranyi 2006). Similarly, in
cially in the context of partial accession of states Poland visa policy has been adapted to maintain
to the EU, is central to understanding the the volume of border crossings and mutual
changing relationship of liberty and security in contacts on both sides of the territorial border
the Europe. We have assessed the experiences by (Weinar 2006). As a result, there has been no
some of the 2004 member states in the processes decisive increase in the immigration ows to
of Europeanisation (Toth 2006; Weinar 2006) Poland through other legal or irregular chan-
and how enlargement is (or is not) increasing the nels. Previous research indicates that a harsh
safety and stability in a Wider Europe amongst border policy can boost the numbers of un-
its members (old and new) and in its circle of documented migrants and undocumented work-
friends. ers in the country; it seems therefore that Polish
The Schengen project has signicance for policy-makers may have chosen the right path.
the EU as a whole, especially since 1 May 1999 Nevertheless, the real long-term consequences of
when the acquis was incorporated into the EU. It the full implementation of the Schengen acquis
exerts crucial effects over the relations of the remain unclear as the situation could still change
different parties involved, separating, ltering drastically (Tchorbadjiyska 2005).
and linking current member states with pre- In contrast with the strategies and policies
accession and candidate countries. When we implemented at the eastern European common
look at the processes of enlargement and its borders, controls at the southern European
impact in the east and the north, we perceive a border are having cataclysmic results for the
dynamic consisting of a shared rejection of the movement of individuals and respect for human
transformation of foreigner/neighbour into a rights. Two different and fundamentally anti-
foe/enemy. A series of political considerations thetical dynamics can be distinguished in the
and policy initiatives have aimed at preventing treatment of the foreigner in Europe to one
the reframing and tightening of the movement of another: one aims at not creating new lines,
individuals in relation to the member states of alleviating the effects of the EU common
eastern and central Europe. A number of external border and increasing stability and

r UNESCO 2009.
298 Didier Bigo et al.

safety (processes of inclusion toward the eastern becomes for immigrants and refugees the moat
and northern neighbours); while the other of Fortress Europe.
promotes the idea of Fortress Europe, instability The development of a common immigra-
and friction, and puts at risk the rights of the tion policy has been constantly referred to at
individual (the southern and Euro-Mediterra- ofcial level as a priority for the future of the
nean dimension). Union. However, member states continue to
In the context of the changes in the ght share competences over immigration and the
against illegal immigration in the Euro- Europeanisation process in these areas is still in
Mediterranean area and in Euro-Mediterranean its infancy. Most importantly, a common
relations, the cases of Italy and Spain deserve approach to immigration for the purposes of
particular attention (Cuttitta forthcoming; employment (labour immigration), and its mul-
Palidda 2007). Our research has found that tidimensional implications, is still lacking
neither restrictive immigration policies nor (Carrera 2007; Guild 2005). CHALLENGE
tightened and delocalised border controls results has focused on how undermining the working
in a reduction of the phenomenon labelled conditions for a small group of the national
illegal migration ows, the dismantling of labour force those qualied as irregular
organised crime in the eld of trafcking and immigrants places this category of people
smuggling of immigrants, or a decrease of under unacceptable vulnerability in relation to
casualties involving irregular immigrants on their employer, the citizen and the state (Lock
their way to Europe. On the contrary, migration 2006). The need to build in common measures to
movements do not decrease although they may reduce the risk of abuse has been also acknowl-
switch to longer, more difcult and more edged by the European Commission (2006b).
dangerous routes, thus increasing both the Our research will continue looking at alterna-
turnover of criminal organisations and death tives to the current EU system in the eld of
risks for migrants. Therefore the actual result of employment and immigration, which too often
the delocalisation of European southern border results in the theft of labour and exploitation of
controls to North Africa seems to be the the individual.
delocalisation of the above-mentioned side- In the same context, EU member states
effects of restrictive immigration policies, which retain competence to dene their social security
could have a long-term impact on the political systems. The member states use this power to
conscience of European civil society. make social security an instrument of immigra-
While Euro-African cooperation increases tion policy. Unwanted immigrants are excluded
and migration controls in North Africa are from branches of social security and social
tightened, a further state restriction is pressure assistance benets (Minderhoud 2007). In recent
to push asylum determination across the Med- years there has been some improvement in the
iterranean by setting up EU approved proce- social security protection of immigrants in EU
dures to be carried out outside EU borders, with legislation. If EU legislation fails to provide
temporal and spatial limitations on the protec- sufcient protection, European human rights
tion to granted asylum seekers that undermine laws may provide the instruments to combat the
the very concept of protection. refusal of social security rights, which is based
Additionally, the EU is urging North on discrimination by nationality.
African countries to enhance their own asylum
systems, which in itself is most laudable. The
problem arises when the improvement in the Immigrants and Islam: the fear of the
asylum procedures of neighbouring countries is enemy within
used in the EU as an excuse to refuse responsi-
bility to protect individuals who are travelling Migratory waves result in multicultural societies
through these countries. Asylum in the EU that challenge some traditional ideas about
territory thus becomes de facto impossible. The identity. The illusion of living in a homogeneous
Euro-Mediterranean Partnership, instead of society disappears, leaving an awareness that
leading to a Euro-Mediterranean free-trade difference is an inevitable (whether or not
area which broadens the EU internal market, desirable) characteristic (Fernandez Bessa and

r UNESCO 2009.
European liberty and security report 299

Ortuno Aix 2006). In this regard, CHAL- increasingly in political circles and the media,
LENGE has reviewed integration programmes and even in Muslim organisations. However,
and legislation for immigrants in a selected academics are still debating the legitimacy of the
group of EU member states (Carrera 2006a, term and questioning how it differs from other
2006b). The main trends and similarities have terms such as racism, anti-Islamism, anti-Mus-
been assessed and compared. In the national limness and anti-Semitism. The term islamo-
arena there appears to be a distinct move phobia does serve ideological purposes in
towards integration programmes with a manda- Europe, especially the interests of some political
tory character. Obligatory participation in such parties and Muslim activists.
programmes is now a regular feature of both Moreover, Muslim integration in Europe is
immigration and citizenship legislation, and a occurring under the international constraint of
precondition for having access to a secure legal the ght against Islamist terrorism. In recent
status. However, the link made between the years, as states have responded to the threat of
social inclusion of immigrants and the juridical terrorism, most have strengthened their security
framework on immigration and integration may and anti-terrorism laws while placing further
at times conict with human rights considera- restrictions on immigration. It often appears as
tions, and endanger the interculturalism and if immigration and internal and external security
diversity that are inherent to the nature of the policies are conated. Since 11 September 2001,
EU as recognised in Art. 151.1 EC Treaty (Art EU member states have arrested over 20 times
151.1. EC Treaty provides that the Community more terrorist suspects than the USA (Cesari
shall contribute to the owering of the cultures 2007). This has given rise to a perception of
of the Member States, while respecting their threat that categorises domestic Muslims as
national and regional diversity and at the same foreign enemies, and is used in turn to justify
time bringing the common cultural heritage to lower level of legal and social rights for them.
the fore). The increasing establishment of a Finally, the research has shown that aside from
juridical framework on integration may have anti-Muslim sentiment, the primary factors
counterproductive effects by preventing the driving discrimination in Europe are policies
social inclusion of immigrants (Besselink towards ethnic minorities in general, anti-terror-
2006a, 2006b). Some EU states may need to ism policy and legal changes in the immigration
adjust their conceptualisation of identities from and naturalisation frameworks. This discrimina-
one that emphasises a mythical national homo- tion can culminate in physical abuse but also
geneity to another one that is heterogeneous, entails political, media and intellectual discourse
diverse and intercultural. and obstacles to religious practices.
At the same time, CHALLENGE is analys-
ing the exceptionalism of Islam and Muslims
in European political discourse and policy- European governance and its relation
making at both the national and EU levels, to the world context
and identifying changes in the orientations and
content of policies after 11 September 2001. The CHALLENGE is addressing the institutional
consequences of these changes on the processes and normative patterns of governance in a
of Muslim integration into European societies in dynamic perspective, drawing on the model of
terms of their social situation, citizenship, the community method expressed through the
political participation and religious recognition EU institutional mechanisms and tools
are central to social cohesion. A comparative (Scandamis 2006). Our research is examining
analysis has been completed on anti-terrorism normative criteria for assessing the management
laws and their consequences for the protection of the various aspects of security in specic
of religious freedom and immigration and institutional settings envisaged in the EU Con-
nationality laws in France, the UK, Germany, stitutional Treaty (Treaty Establishing a Con-
Italy and Spain (Cesari 2006b). The term stitution for Europe, as signed in Rome on 29
islamophobia encapsulates a modern and October 2003 and published in OJ C/310 on 16
secular anti-Islamic discourse that has December 2003, See Article 13.2 (The Unions
intensied after 9/11. The term has been used objectives) which stipulates that the Union

r UNESCO 2009.
300 Didier Bigo et al.

shall offer its citizens an area of freedom, legal base will be reformed (Diedrichs and Tekin
security and justice without internal frontiers). 2006). It has become clear that the Constitu-
This has been linked with an investigation of tional Treaty has been useful and damaging at
liberal constitutionalism within the meaning of the same time: useful as it prescribed an
EU law and the construction of a common institutional macro-structure of the CFSP for
identity in the EU. Considering rst the source of the next decade and included some clarifying
civil liberties and human rights from revolu- provisions on the relationship between the CFSP
tions to international conferences the subject of and uropean Security and Defence Policy, but
rights has moved from the citizen to the human also damaging, as it narrowed the debate on the
being. In the Constitutional Treaty, both sources fundamentals of CFSP and overlooked the
of rights derive from the constitutional traditions institutional potential and options that exist
of the member states and the European Court of even without the Constitutional Treaty.
Human Rights. As regards the protection As regards the AFSJ, our research has
provided, the Constitutional Treaty appeared raised concerns that in its current form it does
to have followed more closely the approach of not provide sufcient transparency (Lodge
international treaties than of national constitu- 2006). Progress in transparency requires con-
tional settlements. The individual who is pro- stant and careful attention. Active citizenship
tected is, as regards most rights, the human being and a constant effort at all governance levels to
rather than the citizen (Guild 2005). inform and explain their actions to the public are
Furthermore, the project has offered a therefore needed. It is necessary to make sure
discussion about the implications that the that the legitimacy of the decisions taken will
Constitutional Treaty would have brought in depend on governments goals, intentions and
the eld of internal and external security. The measures communicated effectively and accoun-
Constitutional Treaty would have positively tably to the public. This calls for an open
revisited the foundations and prospects of the political culture and transparent procedures and
EUs AFSJ and proposed a far-reaching reallo- practices; a commitment to openness that is
cation of competencies in the area of security. entrenched through institutional accountability.
First, most of the complex institutional and legal The AFSJ currently straddles the First and
frictions that currently characterise cooperation Third Pillars of the Union. Dismantling the
in these sensitive policies would have been current pillar structure is a prerequisite for
substantially solved. Second, it would have comprehensive, legitimate, efcient, transparent
provided a uniform juridical framework facil- and democratic responses to the dilemmas posed
itating efciency and legal certainty, and over- by the Europeanisation processes in the elds of
coming the current democratic and judicial security and liberty (Carrera and Guild 2006).
decit that characterises policies dealing with The AFSJ should therefore be consolidated in
freedom, security and justice. the EC First Pillar. Following a similar line, the
Third, by collapsing the current pillar European Commission (2006a) has already
structure, the Constitutional Treaty would suggested in its Communication 2006/211 on
abolish the EU Third Pillar, which is the A Citizens Agenda: Delivering Results for
intergovernmental dimension from which the Europe that it will make a proposal under
most far-reaching policies dealing with security Article 42 of the Treaty on European Union to
emerge. Finally, the Constitution, and particu- this effect. A concrete policy recommendation
larly the Charter of Fundamental Rights of the was presented to the Finnish Presidency for
EU, inserted as its Part II, would guarantee the adoption, which did not take place notwith-
accountability of the legal measures adopted and standing concerted political efforts by the
their full compliance with the rule of law and Presidency.
fundamental rights. These institutional discussions in the EU
On the other hand, we have seen how the have been dogged by the tension between the
ratication crisis of the Constitutional Treaty Community method and intergovernmental
has created a new situation concerning the methods of cooperation, and a societal
Common Foreign and Security Policy (CFSP), (expressed as judicial) disquiet regarding the
in which it has become uncertain whether its protection of constitutional rights in the eld of

r UNESCO 2009.
European liberty and security report 301

security. One illustration of the rst tension is subject to an European Arrest Warrant has
well illustrated by the Treaty of Prum (also given rise to a series of judgements in the
referred to as Schengen III, which allows police supreme courts of a number of member states
forces in signatory countries to compare and (in particular, Cyprus, Finland, Germany,
exchange data more easily), signed originally Poland and Belgium) challenging the constitu-
between seven member states of the EU on May tionality of part of the implementing legislation
2005.5 This Treaty is a practice of resistance by which the EU Framework Decision on the
against the EUs AFSJ and the processes of European Arrest Warrant is transposed into
Europeanisation as forms of harmonisation and national law (Geyer and Guild 2006).
integration, and they spread a fragmented At a general level, this implies that the way
approach of the EU through a mutual recogni- the EU functions through its pillars and in which
tion procedure that cannot work if the level of more and more autonomous agencies play the
trust between partners means a de facto blind eye role of nodes in a web of national institutions,
turned on the practices of the other partners. gives to the EU specic form of governance. The
This generates a lack of discussion on divergence model does not reproduce the states behaviour,
between member states concerning the imple- and is not an empire in the making, even if some
mentation of central principles of freedom and national states want to create the EU as a
justice, data protection and privacy, and on the potential rival for hegemony. The EU is less and
reasons for such divergence. less a territorial model with xed boundaries and
It creates a fear of deepening the discussions clear delimitations. It is a transnational web of
over principles and the temptation to impose the institutions connecting with other parts of the
voices of the major players only, in the name of world for better or worse. It may be used by
the need to work rapidly. Often this is accom- other powers, as exemplied by the practices of
panied by a critique of the enlargement of the extraordinary rendition where the complicity or
EU as having produced an inefcient structure alliance of some intelligence services with
that needs to be corrected by ad hoc mechanisms their US counterparts took priority over their
decided more or less in secret by those who have loyalty to EU values or even their national
the most resources. CHALLENGE research has governments.
shown that these sorts of practices fundamen- The EU may also underwrite a new form of
tally weaken the EU. They undermine EU doing diplomacy by integrating in a dialectical
initiatives such as the principle of availability mode the interests of the neighbours and the
(European Commission, 2005) by permitting interests of the EU member states. These fora
national security agencies to retain sovereignty leave room for the emergence of new ideas and
over information deemed necessary for security procedures discussed in common, and which are
purposes. They also allow the pooling of not merely the imposition of the agenda by the
national sovereignties in the name of the struggle most powerful agent in its own interest, even if
against a global insecurity, but without a real they may look as if they are trying to instigate
discussion concerning the implications of a European norms as universal ones by convincing
global security approach (Balzacq Bigo et al. others of their validity. How these many others
2006; Geyer and Guild 2006). react to the EU form of governance through a
An example of the second tension has been web of policies that may be contradictory and
the use of the principle of mutual recognition in seem inefcient or pervasive, if not seductive, is a
the eld of judicial cooperation in criminal key question. The relation of the EU to the
matters and one of its rst fruits, the European world is different from the relation of the USA
Arrest Warrant. It is designated to strengthen to what it calls the rest of the world. Central to
cooperation between the judicial authorities of this may be discussing the position of the
the member states by eliminating the use of mediator and perhaps the value of being or not
extradition. Thus is a judicial decision taken by being a vanishing mediator (Balibar 2003) in
one state that seeks the arrest and surrender by framing a more transnationalised world, often
another signatory state of a person for criminal beyond mere national state territorial sover-
prosecution or a custodial sentence. The failure eignty, but one that is not without borders and
to provide sufciently clear rights for individuals boundaries. How can these boundaries be

r UNESCO 2009.
302 Didier Bigo et al.

framed as opened and not sealed? How can security solution to a potential worst-case
nations interconnect without invading? How can scenario. The core problem involves an
universal norms be developed from a local place always difcult relation between security
without the temptation to colonise the political and liberty, and it is irresponsible to listen
imagination of others? only to those concerned with security, espe-
cially when security is itself framed in terms of
worst-case scenarios with profound implica-
Implications tions for established accounts of the relation-
ship between liberty and security.
The research already done suggests a broad range
& Suspicions generated by specic technologies
of implications for a number of policy areas: linked with new privatepublic partnerships
in military and policing intelligence spheres
& The principle of freedom is central to every- must be avoided. Arguments for greater
ones aspirations for the future of Europe. European rather than US control over security
Security is a tool that supports freedom. It and surveillance industries must not be used to
must be applied through the rule of law con- justify the erosion of ethical commitments or
sistently with European and international the development of practices on the margins of
human rights obligations. This conceptuali- the law that infringe the fundamental rights of
sation of the relationship between freedom citizens and foreigners. The use of specic
and security must inform EU policy. The technologies and the need for collaboration
areas covering the dimensions of freedom, must be proportionate with the scale of the
security and justice must seek to achieve the actual danger, based on accumulated knowl-
freedoms that are at the heart of the EU, edge. It must not be usurped by worst-case
which deploys security to further them. scenarios that have no limit other than the
& Consequently, the rule of law is central to the political imagination of experts who can
future of Europe and must apply both presume to be acting beyond the limits of
internally and externally in the context of political responsibility.
the CFSP and the ENP. The human rights of & The EU needs a solid constitutional frame-
affected by EU activities must constitute the work that is coherent and based on Commu-
framework in which all these policies and nity methods. The current constitutional
actions are developed. In EU law the protec- structure, characterised by obscurity and the
tion of human rights involves not only use of exceptions and deviations, is not longer
assessment by authorities carrying out police a valid mechanism for achieving the various
objectives, but also the individuals rights to integration projects that the EU currently
seek a judicial remedy if a human right pursues.
violation occurs. & Social cohesion in member states depends on
& Policy needs to be sensitive to immediate understanding that integration is a right for
dangers and also to the historical experience migrants to equality, rather than an obliga-
within which claims about immediate dangers tion to abandon their identity.
have justied dangerous forms of exception- & The traditional EU approach to integration
alism. as the right of the immigrant to equal
& The integration of internal and external treatment provides the only legitimate
security discourses and practices in the name approach for the EU to adopt, as emphasised
of a ght against global danger destabilises in the Tampere Programme of 1999.
the boundaries between the police, intelli- & Social security systems must be designed with
gence services, military forces and border and great care in order to ensure the inclusion of
immigration services. This has long-term immigrants who are already participating in
implications for constitutional and demo- the receiving society, irrespective of whether
cratic principles. The voices of the judges, they hold the status of irregulars or regulars,
lawyers and non-governmental organisations according to the law.
must be heard and draw attention to the risks & EU border law and its institutional mechan-
involved here, and avoid the maximum isms must be tied together in a rm legal

r UNESCO 2009.
European liberty and security report 303

framework in which bodies of the Union, of law and human rights, which must not be
such as FRONTEX, ensure compliance in undermined by any arguments linked to
practice, and that the individual has access to exceptionalism.
the right of appeal in case of being refused & Mainstreaming a European religion must be
entry in the territory of a member state. The avoided. The EU must always guarantee
actions carried out by FRONTEX need to be respect for Art. 9 of the European Conven-
subject to democratic and judicial account- tion for the Protection of Human Rights and
ability. Fundamental Freedoms. Freedom of
& The justication for treating the movement of thought, conscience and religion need to be
individuals differently on the north and duly protected and promoted at EU level.
eastern and the south European borders must & Scapegoating a religious community on
be re-examined and reconceptualised. Refus- dubious security grounds can lead only to
ing people entry and calling would-be political and social exclusion, the fracturing
immigants from the south illegal is counter- of social cohesion and social conict.
productive to fostering freedom, security and & The relation of the EU to the world should be
justice for all. The EU needs to develop informed by its present position, and not its
common immigration rules that liberalise the colonial past or its will to compete for
admission of immigrants for employment and hegemony. It has to open new avenues for
self-employment. Regulatory mechanisms to discussion in order to foster debates and
liberalise the movement of people on the democratic procedures, and to prot from its
southern border are urgently needed in order own internal difculties, using a web struc-
to reduce irregular immigration. ture to reach consensus and unity to invent
& In peace-keeping missions the added value of ways to recognise the values of heterogeneity
EU engagement is the commitment to the rule and multiplicity.

Notes

1. This principle has been not living in a secure world. They offences, including those referred
repeatedly conrmed in the are implicated in a social space to in Article 71, or in respect of
judgments of the European Court that links all institutions whom there is clear evidence of an
of Justice and inserted in Article regulating the life of a people in intention to commit such offences
47 of the EU Charter on the name of protection and the in the territory of a Contracting
Fundamental Rights. institutions that can use Party. 3. Decisions may also be
legitimately the threat to kill and based on the fact that the alien has
2. By policy convergence we the power to control survival. been subject to measures
mean not only the degree of involving deportation, refusal of
harmonisation or level of entry or removal which have not
Europeanisation based on the 4. Art. 96.2 of the Convention
says that Decisions may be based been rescinded or suspended,
number of legal instruments that including or accompanied by a
have been adopted at the level of on a threat to public policy or
public security or to national prohibition on entry or, where
the EU, but also to the discretion applicable, a prohibition on
left to member states to apply a security which the presence of an
alien in national territory may residence, based on a failure to
wide range of provisions comply with national regulations
incorporated in the EU laws pose. This situation may arise in
particular in the case of: (a) an on the entry or residence of
examined. aliens.
alien who has been convicted of an
3. Security professionals are offence carrying a penalty
dened according to their capacity involving deprivation of liberty of 5. Convention between the
to produce statements on fear and at least one year; (b) an alien in Kingdom of Belgium, the Federal
unease and present solutions to respect of whom there are serious Republic of Germany, the
manage unease and the feeling of grounds for believing that he has Kingdom of Spain, the French
being protected or not, of living or committed serious criminal Republic, the Grand Duchy of

r UNESCO 2009.
304 Didier Bigo et al.

Luxembourg, the Kingdom of the border cooperation particularly to (Germany), 27 May 2005, Council
Netherlands and the Republic of combat terrorism, cross-border Secretariat, 10900/05, (Brussels, 7
Austria on stepping up cross- crime and illegal migration, Prum July 2005).

Acknowledgement

This interim report, which from comments made by part- tion about the CHALLENGE
covers the period June 2004 ners in the CHALLENGE consortium, see www.liberty
December 2006, beneted network. For more informa- security.org.

References

ACKERMAN, B. 2006. Les pouvoirs Unidos y la Union Europea tras la BIGO, D. 2006a. Global (in)security:
dexception a lage du terrorisme, crisis de Irak. Madrid: La Catarata. the eld of the professionals of unease
Esprit, AugustSeptember. management and the ban-opticon.
BERGALLI, R. AND RIVERA BEIRAS, I. Hong Kong: University of Hong
ARADAU, C. 2004. The perverse 2005. Poltica criminal de la Kong Press.
politics of four-letter words: risk guerra, Desao (s)(1) Barcelona:
and pity in the securitisation of Anthropos Research and BIGO, D. 2006b. Liberty, whose
human trafcking, Millennium: Publications. liberty? The Hague programme and
Journal of International Studies, 33 the concept of freedom, In:
(2), 251277. BERGALLI, R. AND RIVERA BEIRAS, I. Balzacq, T. and Carrera, S., eds
eds 2006a. Emergencias urbanas. Security versus freedom: a challenge
ARADAU, C. 2007. Law for Europes future? Aldershot:
Barcelona: Anthropos Editorial.
transformed: Guantanamo and the Ashgate.
other exception, Third World
BERGALLI, R. AND RIVERA BEIRAS, I.
Quarterly, 28 (3), 498501. BIGO, D. 2006c. Protection:
eds, 2006b. Torturas y abuso de
poder. Barcelona: Anthropos security, territory and population,
BALIBAR, E. 2003. LEurope,
Editorial. In: Huysmans, J., Dobson, A. and
lAmerique, la Guerre. reexions sur
Prokhovnik, R., eds The politics of
la mediation Europeenne. Paris: La
BESSELINK, L. F. M. 2006a. De protection, sites of insecurity and
Decouverte.
binnengrenzen van het Koninkrijk: political agency. London:
BALZACQ, T. AND CARRERA, S. 2005. Verbanning en inburgering Routledge.
Migration, borders and asylum: [Banishment and integration:
BIGO, D. AND CAMUS, C 2006. The
trends and vulnerabilities in EU erecting internal borders within the
French anti-terrorism strategy, In:
policy. Brussels: Centre for Kingdom of the Netherlands].
Neve, R., Vervoorn, L., Leeuw, F.
European Policy Studies. Tijdschrift voor Antilliaans recht-
and Bogaerts, S., eds First inventory
Justicia, (3/j2006), 7084.
BALZACQ, T. AND CARRERA, S. 2006. of policy on counterterrorism:
The Hague programme: the long Germany, France, Italy, Spain, the
BESSELINK, L. F. M. 2006b.
road to freedom, security and UK and the United States. Research
Unequal citizenship: integration
justice, In: Balzacq, T. and in progress. Cahiers 2006 - 3a. The
measures and equality, In:
Carrera, S., eds Security versus Hague: Wetenschappelijk
Carreram, S., (ed.) The nexus
freedom: a challenge for Europes Onderzoek- en
between immigration, integration and
future. Aldershot: Ashgate. Documentatiecentrum (WODC),
citizenship in the EU,
Dutch Ministry of Justice.
BARANYI, B. 2006. Short-term CHALLENGE Liberty and
impacts of enlargement on the Security Collective Conference. BIGO, D AND HERMANT, D eds 1991.
Romanian and Hungarian border Brussels: CEPS, 12 April. Approches polemologiques. Paris:
crossing, Regio, Minorities, FEDN.
Politics, Society, 9 (1), 100129. BIGO, D. 2005. La mondialisation
de l(in)securite, Cultures & BONDITTI, P. 2005. Biometrie et
BARBE, E. ed. 2005. Existe una Conits. Special ELISE, 58 matrise des ux: vers une geo-
brecha transatlantica? Estados (summer), 53101. technopolis du vivant-en mobilite,

r UNESCO 2009.
European liberty and security report 305

Cultures & Conits, 58 (summer), Globalisation and environmental CESARI, J. 2007. The hybrid and
131154. challenges: reconceptualising globalised Islam of western
security in the 21st century. Berlin, Europe, In: Samad, Y. and Sen,
BIGO, D AND HERMANT, D. 1988. La Heidelberg, New York, Hong K., eds Islam in the European Union,
relation terroriste, analyse de la Kong, London, Milan, Paris, transnationalism, youth and the war
violence politique des organisations Tokyo: Springer. on terror. Karachi: Oxford
clandestines dans les democraties University Press.
occidentales. Etudes BURGESS, P. 2006c. Social values
Polemologiques, Documentation and the logic of threat: the European CHALLENGE PAPER 2004.
Francaise. Programme for Critical Response to The Hague Programme:
Infrastructures Protection protecting the rule of law and the
BONDITTI, P. 2008. Homeland
(EPCIP). Paper read at the fundamental rights of the next ve
security through traceability:
conference on Critical years of an EU area of freedom,
technologies of control as critical
Infrastructure Protection. Utrecht, security and justice. Available online
infrastructures, In: Dunn, M. A.
8 March. at http://www.libertysecurity.org/
and Kristensen, K. S., eds Securing
article62.html [Accessed 18 January
the homeland. critical
CARRERA, S. 2006a. A comparison 2008].
infrastructure, risk and (in)security.
of integration programmes in the
London: Routledge. CLAUSEWITZ, C. V. 1976. On war.
EU: trends and weaknesses.
BONELLI, L. 2005. The control of CHALLENGE Research Paper (1). Princeton, NJ: Princeton University
the enemy within? Police intelligence Available online at http:// Press.
in the French banlieues, In: Bigo, www.libertysecurity.org/
article851.html [Accessed 21 CONFLITTI GLOBALI 2007.
D. and Guild, E., eds Controlling
October 2008]. Internamenti, Special issue.
frontiers: free movement into and
Conitti globali, 4.
within Europe. London: Ashgate.
CARRERA, S. ed. 2006b. The nexus
BONELLI, L. 2006. Hidden in plain between immigration, integration DAL LAGO, A. 2005. La guerra-
sight. Intelligence, exception and and citizenship in the EU. mondo. 1 Milan: Agenzia X.
suspicion after September 11th CHALLENGE Research Paper
DAL LAGO, A. 2006a. Esistono
2001, In: Bigo, E. and Tsoukala, Collective Conference Volume (No.
davvero i conitti tra culture? Una
A., eds Illiberal practices in liberal 2) 65. riessione storicometodologica, In
regimes. Paris: LHarmattan.
Galli, C., ed. Le sde del
CARRERA, S. 2007. Building a
BROUWER, E. 2005. Effective common policy on labour Multiculturalismo. Bologna: Il
remedies for third country Mulino.
migration: towards a comprehensive
mationals in EU law: justice and global approach in the EU?
accessible to all?, European DAL LAGO, A. 2006b. The global
CEPS Working Document (256). state of war, Ephemera. Theory and
Journal of Migration and Law, 7 (3),
219236. Politics in Organisations, 6 (1), 926.
CARRERA, S. AND GUILD, E. 2006.
No constitutional treaty? DAL LAGO, A. 2006c.
BROUWER, E. 2006. Data
Implications for the area of Presentazione a Metamorfosi del
surveillance and border control in
freedom, security and justice, In: guerriero, Conitti globali, 3, 57.
the EU: Balancing efciency and
Balzacq, T. and Carrera, S., eds Milan: Agenzia X.
legal protection, In: Balzacq, T.
Security versus freedom? A challenge
and Carrera, S., eds Security versus
for Europes future. Aldershott: DIEBEN, D. AND DIEBEN, T. 2005.
freedom: a challenge for Europes
Ashgate. When does war become crime?
future. Aldershot: Ashgate.
Aspects of the criminal case against
BURGESS, P. 2006a. The ethical CESARI, J. 2006a. Islam in Europe: Eric O. Nijmegen: Wolf Legal
transformation of risk. Paper read the snare of exceptionalism, In: al- Publishers.
at the conference on Values in Azmeh, A. and Fokas, E., eds Islam
Decision Making on Risk in Europe: diversity, identity and DIEDRICHS, U. AND TEKIN, F. 2006.
(VALDOR). Stockholm. 1418 inuence. Cambridge: Cambridge CFSP after the constitutional
May. University Press. treaty: the stakes for the future,
In: Balzacq, T. and Carrera, S., eds
BURGESS, P. 2006b. The insecurity CESARI, J. 2006b. Muslims in Security versus freedom? A challenge
of the community of values: the western Europe After 9/11: why the for Europes Future. Aldershot:
European Union as a security term Islamophobia is more a Ashgate.
community, In: Grin, J., Gunter predicament than an explanation.
Brauch, H., Mesjasz, C., Chadha Available online at http:// DILLON, M. AND REID, J. 2007. The
Behera, N., Chourou, B., Oswald www.libertysecurity.org/ liberal way of war: the martial face of
Spring, U., Liotta, P. H. and article1167.html [Accessed 21 global biopolitics. London:
Kameri-Mbote, P., eds October 2008]. Routledge.

r UNESCO 2009.
306 Didier Bigo et al.

DUCLOS, J. AND HERMANT, D. 2006. European Union. Council. php?item_id=1411 [Accessed 21


Mort volontaire combattante: Regulation (EC) No 2007/2004. October 2008].
sacrices et strategies, Cultures & Brussels: EU.
Conits, 63 (autumn), 711. GUILD, E. 2005. What is a
EUROPEAN COUNCIL 2005. The neighbour? Examining the EU
EUROPEAN COMMISSION 2005a. Hague programme: strengthening neighbourhood policy from the
Proposal for a Framework Decision freedom, security and justice in the perspective of movement of
on the exchange of information under European Union, 2005/C53/01, OJ persons. In Western NIS Forum
the principle of availability, COM C53/1. Available online at http:// for Refugee-assisting NGOs. Yalta.
(2005) 490, Brussels, 12 October. www.libertysecurity.org/ Available online at http://www.
Available online at www. imprimer.php?id_article=264 libertysecurity.org/article270.html
eurowarrant.net/documents/ [Accessed 21 October 2008]. [Accessed 21 October 2008].
cms_eaw_360_2_MEMO.
05.367.doc [Accessed 21 October EUROPEAN LIBERTY AND SECURITY GUILD, E. 2006a. Danger: borders
2008]. (ELISE) 2006. Final synthesis under construction: assessing the
report. ELISE consortium. rst ve years of border policy in an
EUROPEAN COMMISSION 2005b. Available online at http:// area of freedom, security and
Proposal for a regulation, laying www.libertysecurity.org/ justice, In: Goudappel, F. J. and de
down rules on local border trafc at article793.html [Accessed 21 Zwaan, F., eds, Freedom, security
the external land borders of the October 2008]. and justice in the European Union:
member states and amending the implementation of The Hague
Schengen Convention and the EUROPEAN PARLIAMENT 1999.
Programme. The Hague: Asser
Common Consular Institutions. Tampere European Council 15 and
Press.
COM (2005) 56 nal, Brussels, 16 October 1999: Presidency
Available online at http://eur- conclusions, Available online at GUILD, E. 2006b. The
lex.europa.eu/LexUriServ/ http://www.europarl.europa.eu/ judicialisation of armed conict:
LexUriServ.do?uri=CELEX: summits/tam_en.htm [Accessed 21 transforming the twenty-rst
52005PC0480:EN:NOT [Accessed October 2008].
century, In: Huysmans, J.,
21 October 2008]. Dobson, A. and Prokhovnik, R., eds
EUROPEAN SECURITY STRATEGY
(ESS) 2003. A secure Europe in a The politics of protection, sites of
EUROPEAN COMMISSION 2006a. A
citizens agenda: delivering results better world. Brussels, 12 insecurity and political agency.
December.Available online at London: Routledge.
for Europe, COM(2006) 211,
Brussels, 10 May. Available online http://consilium.europa.eu/uedocs/
GUILD, E. AND BROUWER, E. 2006.
at http://ec.europa.eu/ cmsUpload/78367.pdf [Accessed 21
October 2008]. The political life of data. The ECJ
commission_barroso/president/pdf/
decision on the PNR agreement
com_2006_211_en.pdf [Accessed 21
FERNANDEZ BESSA, C. AND ORTUNO between the EU and the US. CEPS
October 2008]. Policy Brief No. 109 6.Available
AIX, J. M. 2006. Spanish
EUROPEAN COMMISSION 2006b. immigration policies and legislative online at http://www.
Policy priorities in the ght against evolution in that eld as a new libertysecurity.org/article1062.html
illegal immigration of third-country exceptional framework. Papiers [Accessed 21 October 2008].
nationals, COM (2006) 402 nal, CHALLENGE Barcelona: OPSHR
Brussels, 19 July. Available online at University of Barcelona. GUILD, E. AND MINDERHOUD, P. S.
http://europa.eu/scadplus/leg/en/ eds 2006. Immigration and criminal
lvb/l14525.htm [Accessed 21 FERNANDEZ BESSA, C., MANAVELLA, law in the European Union: The legal
October 2008]. A. AND ORTUNO AIX, J. M. 2007. measures and social consequences of
Report on the analysis of the criminal law in member states on
EUROPEAN COMMISSION 2006c. effects of terrorist legislation on trafcking and smuggling in human
Regulation (EC) No 562/2006 criminalisation/victimisation of beings. The Hague: Martinus
Establishing a community code on the immigrants and people suspected of Nijhoff Publishers.
rules governing the movement of terrorism, Observatori del Sistema
persons across borders (Schengen Penal i els Drets Humans. GUILD, E. AND SELM, J. VAN eds
borders code), OJ L 105/1, 15 March 2005. International migration and
Available online at http://europa.eu/ GEYER, F. AND GUILD, E. 2006. security: opportunities and
scadplus/leg/en/lvb/l14514.htm Getting local: Schengen, Prum and challenges. New York: Routledge.
[Accessed 21 October 2008]. the dancing processions of
Echternach three paces forward GUITTET, E. P. 2006a. Military
EUROPEAN COUNCIL 2004. and two back for EU police and activities inside national territory:
Establishing a European Agency judicial cooperation in criminal the French case, In: Bigo, D. and
for the management of operational matters. CEPS Commentary:4. Tsoukala, A., eds Illiberal practices
cooperation at the external borders Available online at http:// in liberal regimes. Paris:
of the member states of the shop.ceps.eu/downfree. LHarmattan.

r UNESCO 2009.
European liberty and security report 307

GUITTET, E. P. 2006b. Ne pas leur Available online at http:// SAARI, S. 2006. Balancing between
faire conance serait leur faire www.peter-lock.de/start.php inclusion and exclusion: the EUs
offense. Antiterrorisme, solidarite [Accessed 18 January 2009] ght against irregular migration and
democratique et identite politique, human trafcking from Ukraine,
Cultures & Conits, 61 (spring), LODGE, J. 2006. Communicating Moldova and Russia.
5176. (in)security: a failure of public CHALLENGE Working Paper
diplomacy? CHALLENGE WP2 23. CEP.
GUZZETTI, L. 2006. The language Research Paper 3. Available online
of the camps, Conitti globali, at http:// shop.ceps.eu/ SCANDAMIS, N. 2006. Freedom,
Special issue, 4. downfree.php?item_id=1397 equality and exception in market
[Accessed 21 October 2008]. economies, CHALLENGE.
HAGGERTY, K. D. AND ERICSON, . R. Available online at http://
V. 2000. The surveillant MINDERHOUD, P. 2007. The other www.libertysecurity.org/
assemblage, British Journal of EU Security: social protection, article1280.html [Accessed 21
Sociology, 51 (44), 605622. European Journal of Social Security, October 2008].
8 (4), 361380.
HUYSMANS, J. 2006. The politics of SMITH, K. E. 2006. The outsiders:
insecurity. Fear, migration and NEAL, A. 2006. Foucault in the European neighbourhood
asylum in the EU. London: Guantanamo: towards an policy, In: Balzacq, T. and
Routledge. archaeology of the exception, Carrera, S., eds Security versus
Security Dialogue, 37 (1), 3146. freedom? A challenge for Europes
HUYSMANS, J., DOBSON, A. AND
future. Aldershot: Ashgate.
PROKHOVNIK, R. eds 2006. The NEAL, A. AND DILLON, M. eds 2008.
politics of protection: sites of Foucault on politics, society and war. SBY, K. 2005. Critical
insecurity and political agency. Basingstoke: Palgrave. infrastructure protection and
London. New York: Routledge. practices of sovereignty. A paper
OLSSON, C. 2006. Military read at the Nordic Political Science
JABRI, V. 2006a. La guerre et lEtat intervention and the concept of the Association meeting and presented
liberal democratique, Cultures & political, In: Bigo, D. and at CHALLENGE workshop in
Conits, 61 (spring), 934. Tsoukala, A., eds Illiberal practices Reykjavik in August, and
JABRI, V. 2006b. The limits of in liberal regimes. Paris: Copenhagen in September.
agency in times of emergency, In LHarmattan.
SZIKINGER, I. 2005. The Police Act
Huysmans, J., Dobson, A. and and the National Security Act in
PALIDDA, S. 2006a. Analysis of
Prokhovnik, R., eds The politics of Service of the Fight against
statistical data from 1990 to the
protection: sites of insecurity and Terrorism. Fundamentum,
present day about immigration and
political agency. London. New Human Rights Quarterly Special
income distribution, work market,
York: Routledge. Issue 5969.
housing situation, and informal
JABRI, V. 2006c. War, security and economies. CHALLENGE
SZIKINGER, I. AND TOTH, J. 2006.
the liberal state, Security Dialogue, Working Paper WP8 38. Available
Efforts for building lawful
37 (1), 4764. online at http://www.
enforcement, security and balance in
libertysecurity.org/article1295.html
public law in Hungary,
LIANOS, M. 2005. Security, liberty [Accessed 21 October 2008].
CHALLENGE Working Paper
and vulnerability in the risk society:
PALIDDA, S. 2006b. The practices WP7 17.
a cross-cutting work package,
CHALLENGE Working Paper of the everyday war against TCHORBADJIYSKA, A. 2005. The
WP11.Available online at http:// migrations (and its paradoxes). consequences of aligning visa policy
www.libertysecurity.org/ CHALLENGE Working Paper in the process of accession: the case
article184.html [Accessed 21 WP8 11. CEPS. of Bulgaria. Paper read at the
October 2008]. conference Enlargement of the EU:
PALIDDA, S. 2007. I gli degli
A Challenge for what? in
LOADER, I. AND WALKER, N. 2005. immigrati: una posterita
Budapest: Hungarian Academy of
Locating the public interest in inopportuna, In FrancoAngeli, ed.
Sciences.
transnational policing. Paper read XII Rapporto sulle migrazioni.
to a workshop on Constabulary Milan: Fondazione Ismu. TCHORBADJIYSKA, A. 2006. EU
Ethics and the Spirit of Trans- migration phobia and citizens rights
national Policing Onati, IISL 13 PAP, A. L. 2005. Ethnic in the candidate countries,
14 July. discrimination and the war against European Journal for Migration and
terrorism the case of Hungary, In Law, 8 (2), 143162.
LOCK, P. 2006. The economy of Halmai, G., ed. Fundanentum,
new wars: cold consolidation of Human Rights Quarterly Special TEKOFSKY, A. 2006. Security in
peace through criminalisation? issue. Lake Mary, FL: Vanderplas, European Union external border
CHALLENGE Working Paper. 3148. law, CHALLENGE Working

r UNESCO 2009.
308 Didier Bigo et al.

Paper WP13 19.Available online at VLCEK, W. 2006. Development v. of Diversity in Organisations, 5 (5),
http://www.libertysecurity.org/ terrorism migrant remittances or 7382.
article846.html [Accessed 21 terrorist nancing, CHALLENGE
October 2008]. Working Paper WP2 26.Available
online at http://www. WALKER, R. B. J. 2006b. Lines of
TOTH, J. 2006. Relations of kin libertysecurity.org/article2159.html insecurity: international, imperial,
state and kinminorities in the [Accessed 21 October 2008]. exceptional, Security Dialogue, 37
shadow of the Schengen Regime, (1), 6582.
Regio, Minorities, Politics, Society, WAEVER, O. 2006. World conict
9, 1846. over religion: secularism as awed WALKER, R. B. J. 2006c.
TSOUKALA, A. 2006a. the dening solution, In: Mouritsen, P. and Recontextualising relations
of the terrorist threat in the post- Joergensen, K. E., eds Constituting between liberty and security,
September 11th era, In: Bigo, D. communities: political solutions to Security Dialogue, 37 (1), 5.
and Tsoukala, A., eds Illiberal cultural conicts. London: Palgrave.
practices of liberal regimes:
(in)security games. Paris: WALKER, R. B. J. 2005. WEINAR, A. 2006. The Polish
LHarmattan. LInternational, limperial, experiences of visa policy in the
lexceptionnel, Cultures & Conits, context of securitisation,
TSOUKALA, A. 2006b. La 58 (summer), 1351. CHALLENGE Working Paper
legitimation des mesures WP7 12. Available online at http://
dexception dans la lutte anti- WALKER, R. B. J. 2006a. The www.libertysecurity.org/
terroriste en Europe, Cultures & double outside of the modern article991.html [Accessed 21
Conits, 61 (spring), 2550. international, International Journal October 2008].

r UNESCO 2009.

Anda mungkin juga menyukai