Encyclopedia of Law and Economics

2019 Edition
| Editors: Alain Marciano, Giovanni Battista Ramello

Counterterrorism

  • Marie-Helen MarasEmail author
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-7753-2_516

Abstract

The European Union has developed several policies and actions to combat terrorism. The EU’s counterterrorism strategy is fourfold. It seeks to prevent terrorism, protect people and property against terrorism, pursue terrorists, and respond to terrorism. To achieve this, the EU has implemented measures that seek to disrupt terrorists’ operations, prevent radicalization and recruitment of terrorists, secure critical infrastructures and borders, impede terrorists’ plans and actions, cut off terrorists’ funding and support, improve information sharing, enhance cooperation among agencies, and coordinate responses in the event of a terrorist attack.

This is a preview of subscription content, log in to check access.

References

  1. Balzacq T, Bigo D, Carrera S, Guild E (2006) Security and the two-level game: the treaty of Prüm, the EU and the management of threats. CEPS working document no 234Google Scholar
  2. Becker GS (1968) Crime and punishment: an economic approach. J Polit Econ 76(2):169–217CrossRefGoogle Scholar
  3. Council Framework Decision 2002/584/JHA of 13 June 2002 on the European arrest warrant and the surrender procedures between Member StatesGoogle Scholar
  4. Council Framework Decision 2008/978/JHA of 18 December 2008 on the European evidence warrant for the purpose of obtaining objects, documents and data for use in proceedings in criminal mattersGoogle Scholar
  5. Directive 2004/82/EC on the obligation of carriers to communicate passenger data (2004) OJ L 261Google Scholar
  6. Directive 2005/60/EC of the European Parliament and of the Council of 26 October 2005 on the prevention of the use of the financial system for the purpose of money laundering and terrorist financingGoogle Scholar
  7. Enders W, Sandler T (2006) The political economy of terrorism. Cambridge University Press, CambridgeGoogle Scholar
  8. European Commission (2004) Communication from the commission to the council and the European parliament of 20 October 2004 – critical infrastructure protection in the fight against terrorism. COM (2004) 702 final. http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_terrorism/l33259_en.htm
  9. European Commission (2005) Communication from the commission to the European parliament, the council, the European economic and social committee and the committee of the regions – commission provisions on “ARGUS” general rapid alert system. COM (2005) 662 final. http://eur-ex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52005DC0662:EN:HTML
  10. European Commission (2007) Communication from the commission of 12 December 2006 on a European programme for critical infrastructure protection. COM (2006) 786 final (7 June 2007). http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_terrorism/l33260_en.htm
  11. European Commission (2010) On the global approach to transfers of Passenger Name Record (PNR) data to third countries. COM (2010) 492 final (21 Sept 2010). http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_terrorism/jl0043_en.htm
  12. European Commission (2014) ARGUS – a general European rapid alert system. http://ec.europa.eu/health/preparedness_response/generic_preparedness/planning/argus_en.htm
  13. Frey BS (2004) Dealing with terrorism: stick or carrot? Edward Elgar, CheltenhamCrossRefGoogle Scholar
  14. Frey BS, Luechinger S (2007) Decentralization as a response to terror. In: Brück T (ed) The economic analysis of terrorism. Routledge, AbingtonGoogle Scholar
  15. Landes WN (1978) An economic study of U.S. aircraft hijacking: 1961–1976. J Law Econ 21:1–31CrossRefGoogle Scholar
  16. Maras M-H (2012) Counterterrorism. Jones and Bartlett, BurlingtonGoogle Scholar
  17. Maras M-H (ed) (2013) The CRC Press terrorism reader. CRC Press, Boca RatonGoogle Scholar
  18. Maras M-H (2014) Transnational security. CRC Press, Boca RatonCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.John Jay College of Criminal JusticeCity University of New YorkNew YorkUSA