Vulnerabilities of EU Large-Scale IT Systems Used in Law Enforcement Cross-Border Information Exchange
Downloads
A borderless Europe needs to ensure continuous and secure exchange of data and information between the law enforcement authorities. This needs to be done through monitoring technology development and identifying large-scale IT systems protection from emerging threats. Decision making is never based solely on knowledge of technical issues, as the potential and expected benefits of implementing a particular technology depend specifically on the architecture of system data and information. Cybersecurity attacks on these systems can be explained starting with the attackers and targets, the approach to compromised system and the route used to break into the system.
Downloads
Baldaccini, Anneliese, “Counter-Terrorism and the EU Strategy for Border Security:Framing Suspects with Biometric Documents and Databases”, European Journal of Migration and Law, 10(1), 2008.
Besters, Michiel and Brom, Frans W.A., “’Greedy’ Information Technology: The Digitalization of the European Migration Policy”, European Journal of Migration and Law, 12(4), 2010.
Bigo, Didier and Carrera, Sergio and Hayes, Ben and Hernanz, Nicholas and Jeandesboz, Julien, “Justice and Home Affairs Databases and a Smart Borders System at EU External Borders: An Evaluation of Current and Forthcoming Proposals”, CEPS Paper in Liberty and Security in Europe, No. 52, December 2012.
Brouwer, Evelin, Digital Borders and Real Rights: Effective Remedies for Third-Country Nationals in the Schengen Information System, “Immigration and Asylum Law and Policy in Europe”, vol. 15, Leiden, Martinus Nijhoff Publishers, 2008.
Coman, Iulian Marius, „Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation”, International Journal of Information Security and Cybercrime Vol. 7 Issue 1/2018.
Council Decision 2009/316/JHA of 6 April 2009 on the establishment of the European Criminal Records Information System (ECRIS) in application of Article 11 of Framework Decision 2009/315/JHA.
Council Decision of 8 June 2004 establishing the Visa Information System (VIS) (2004/512/EC).
Council Regulation (EC) No 2725/2000 of 11 December 2000 concerning the establishment of “EURODAC” for the comparison of fingerprints for the effective application of the Dublin Convention (EURODAC Regulation), OJ L 316, 15.12.2000.
Council Regulation (EC) No 2725/2000 of 11 December 2000 concerning the establishment of ‘Eurodac’ for the comparison of fingerprints for the effective application of the Dublin Convention.
Council Regulation (EU) No 541/2010 of 3 June 2010 amending Regulation (EC) No 1104/2008 on migration from the Schengen Information System (SIS 1+) to the second generation Schengen Information System (SIS II), OJ L 155, 22.6.2010.
Data Breach from January 2019 to April 2020, ENISA Threat Landscape December on the establishment, operation and use of the second generation Schengen.
Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union.
Doezi, Zoltan, “The Development, the Integration and the Assessment of the Existing Large-Scale IT Systems in the Area of Freedom, Security and Justice”, Acta Juridica Hungarica, 54(2), 2013.
EU-LISA Annual Conference Report 2019, p.25.
EU-LISA Consolidated Annual Activity Report 2020, 29 June 2021.
EU-LISA decision on Security Rules on the protection of CIS, 2019.
European Council Conclusions, 26/27 June 2014, Bruxelles.
Framework for Improving Critical Infrastructure Cybersecurity, National Institute of Standards and Technology, USA, 2018.
Good Practices in the Area of Border Security and Management in the Context of Counterterrorism and Stemming the Flow of “Foreign Terrorist Fighters”, UNCCT, 2018 Information System (SIS II), OJ L 381, 28.12.2006.
IP/16/1247 “Stronger and Smarter Borders in the EU: Commission proposes to establish an Entry-Exit System”, European Commission, Brussels, 6.4.2016.
MEMO/11/682 “Frequently Asked Questions: The Visa Information System goes live”, Europa Press Releases RAPID, Brussels, 11.10.2011.
Protecting Large-scale IT systems developed and/or managed by eu-LISA from modern threats, eu-LISA, 2016.
Regulation (EC) No 1987/2006 of the European Parliament and of the Council of 20 December 2006 on the establishment, operation and use of the second generation Schengen Information System (SIS II).
Regulation (EU) 2017/2226 of the European Parliament and of the Council of 30 November 2017 establishing an Entry/Exit System (EES) to register entry and exit data and refusal of entry data of third-country nationals crossing the external borders of the Member States and determining the conditions for access to the EES for law enforcement purposes, and amending the Convention implementing the Schengen Agreement and Regulations (EC) No 767/2008 and (EU) No 1077/2011.
Regulation (EU) 2018/1240 of the European Parliament and of the Council of 12 September 2018 establishing a European Travel Information and Authorisation System (ETIAS) and amending Regulations (EU) No 1077/2011, (EU) No 515/2014, (EU) 2016/399, (EU) 2016/1624 and (EU) 2017/2226.
Regulation (EU) 2018/1726 of the European Parliament and of the Council of 14 November 2018 on the European Union Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice (eu-LISA), and amending Regulation (EC) No 1987/2006 and Council Decision 2007/533/JHA and repealing Regulation (EU) No 1077/2011.
Regulation (EU) No 1052/2013 of the European Parliament and the Council of 22 October 2013 establishing the European Border Surveillance System (Eurosur), OJ L 295, 6.11.2013.
Treaty of Lisbon amending the treaty on European Union and the treaty establishing the European Community, 2007/c 306/01.
Webpage: https://eucrim.eu/news/eu-creates-new-central-database-convicted-third-country-nationals/.




