Security Risk Analysis as a Strategic Counterterrorism Tool for National Security: The Case of Frontex Common Integrated Risk Analysis Model (CIRAM)


Published: Dec 31, 2023
Keywords:
National Security Security Risk Analysis Strategy Counterterrorism Frontex CIRAM
Anastasios Nikolaos Kanellopoulos
Abstract

Security Risk Analysis consists an important tool that can be leveraged to properly process information related to National Security and draw useful conclusions through appropriate analytical products. The European Union formulated the appropriate legislation and established new organizations to ensure its external and internal security such as Frontex, designed and developed, in collaboration with the member states, a new security risk analysis tool, the Common Integrated Risk Analysis Model (CIRAM). This paper seeks to approach and examine descriptively, both the elements of this model and its appropriateness to carry out Counterterrorism Risk Analysis.

Article Details
  • Section
  • Articles
Downloads
Download data is not yet available.
References
Bonta, J., Law, M., & Hanson, K. (1998). The prediction of criminal and violent recidivism among mentally disordered offenders: A meta-analysis. Psychological Bulletin, 123(2), 123-142.
Bures, O. (2010). Eurojust’s fledgling counterterrorism role. Journal of Contemporary European Research, 6(2), 236–256.
Đorđević, V., Klemenc, J. and Kolářová, I. (2018). Regional security cooperation reinvented: Western Balkans counterterrorism initiative. European Security, 27(4), 415–433.
Fernández-Rojo, D. (2021). EU migration agencies: The operation and cooperation of Frontex, EASO and Europol. Edward Elgar Publishing.
Fitz‐Gerald, A. (2008). A UK National Security Strategy: Institutional and Cultural Challenges. Defence Studies, 8 (1), 4-25.
Frontex, Common Integrated Risk Analysis Model a comprehensive update (2012). Warsaw.
Frontex, Common Integrated Risk Analysis Model Summary booklet (2013). Warsaw.
Frontex, Guidelines for risk analysis units: Structure and tools for the application of CIRAM version 2.0 (2012). Warsaw.
Hancock, D. A. (2008). The olive branch and the hammer: A strategic analysis of hawala in the financial war on terrorism. Monterey. CA; Naval Postgraduate School.
Hansen, F. and Pettersson, J. (2021). Contradictory migration management? Differentiated security approaches to visa overstay and irregular border crossings in the European Union. European Security, 31(1), 117–134.
Hughes, M. (1982). Terrorism and National Security. Philosophy, 57(219), 5–25.
Jeandesboz, J. (2020). European border policing: Eurosur, knowledge, calculation. The Policing of Flows, 92–121.
Léonard, S. (2010). EU border security and migration into the European Union: FRONTEX and securitisation through practices. European Security, 19(2), 231–254.
Liashuk, R. and Tsaruk, A. (2021). Experience of information and analytical activities in the field of Border Protection of the European Union. Proceedings of the International Conference on Economics, Law and Education Research (ELER 2021).
Lowe, D. (2014). Surveillance and International Terrorism Intelligence Exchange: Balancing the Interests of National Security and Individual Liberty. Terrorism and Political Violence, 28(4), 653–673.
Maier, C. (1993). Peace and security for the 1990s, Social Science Research Council.
Manjarrez, V. M. (2015). Border Security: Defining it is the Real Challenge. Journal of Homeland Security and Emergency Management, 12(4), 793–800.
Marrero Rocha, I. (2018). The European Union’s Foreign ‘terrorist’ fighters. Jihadism, Foreign Fighters and Radicalization in the EU, 44–63.
Nesser, P., Stenersen, A. and Oftedal, E. (2016). Jihadi Terrorism in Europe: The IS-Effect. Perspectives on Terrorism, 10(6), 3-24.
Oliveira Martins, B., Lidén, K. and Jumbert, M. G. (2022). Border security and the digitalisation of sovereignty: insights from EU borderwork. European Security, 31(3), 475–494.
Regulation (EC) 2007/2004, OJ L 349/1.
Regulation (EC) 562/2006, OJ L 105/1.
Richards, J. (2018). Intelligence and counterterrorism. Routledge Handbook Of Terrorism And Counterterrorism, 395–405.
Rios, J. and Insua, D. R. (2011). Adversarial Risk Analysis for Counterterrorism Modeling. Risk Analysis, 32(5), 894–915.
Teich, S. (2016). Islamic Radicalization in Belgium. International Institute for Counter-Terrorism.
Updesh Kumar and Manas K. Mandal (2012). Countering Terrorism: Psychosocial Strategies. New Delhi: Sage Publications Pvt. Ltd.
Van Vlierden, G. (2015). Profile: Paris Attack Ringleader Abdelhamid Abaaoud. CTCSENTINEL, 8(11), 30-35.
Webb, E. and Sutton, R. (2016). An Enduring Threat: Europe’s Islamist Terror Networks Then and Now. [online] The Henry Jackson Society - Centre for the Response to Radicalisation and Terrorism. Available at: <https://henryjacksonsociety.org/centre-on-radicalisation-and-terrorism/> (Accessed: 18/09/2023).
Zmire, Z. and Kim, Y. (2017). Causes of Rising Homegrown Terrorism in Europe: A Case Study of 2015 Paris Attacks. Master. Hanyang University.
Most read articles by the same author(s)