Annexes to COM(2018)472 - Internal Security Fund - Main contents
Please note
This page contains a limited version of this dossier in the EU Monitor.
dossier | COM(2018)472 - Internal Security Fund. |
---|---|
document | COM(2018)472 |
date | July 7, 2021 |
CRITERIA FOR THE ALLOCATION OF FUNDING TO THE MEMBER STATES’ PROGRAMMES
The budgetary resources referred to in Article 10 shall be allocated to the Member States’ programmes as follows:
(1) | a one-time fixed amount of EUR 8 000 000 shall be allocated to each Member State at the start of the programming period; |
(2) | the remaining budgetary resources referred to in Article 10 shall be distributed according to the following criteria:
|
The initial allocation of the remaining budgetary resources referred to in point (2) of the first paragraph shall be based on the annual statistical data produced by the Commission (Eurostat) covering the year 2019. For the purposes of the mid-term review, the reference figures shall be based on the annual statistical data produced by the Commission (Eurostat) covering the year 2023. Where a Member State has not provided the Commission (Eurostat) with the data for a given year, the Commission may instead use the most recent available statistical data preceding the year concerned for that Member State.
ANNEX II
IMPLEMENTATION MEASURES
1.
The Fund shall contribute to achieving the specific objective set out in point (a) of Article 3(2) of this Regulation by focusing on the following implementation measures:
(a) | ensuring the uniform application of the Union acquis on security by supporting the exchange of relevant information, for example via Prüm, EU PNR and SIS II, including through the implementation of recommendations from quality control and evaluation mechanisms such as the Schengen evaluation and monitoring mechanism or other quality control and evaluation mechanisms; |
(b) | setting up, adapting and maintaining security-relevant EU and decentralised information systems, including ensuring their interoperability, and developing appropriate tools to address identified gaps; |
(c) | increasing the active use of security-relevant EU and decentralised information systems, ensuring that those systems are provided with high quality data; and |
(d) | supporting relevant national measures, including the interconnection of security-relevant national databases and the connection of those databases to Union databases, when provided for in relevant legal bases, if relevant to implementing the specific objectives set out in point (a) of Article 3(2). |
2.
The Fund shall contribute to achieving the specific objective set out in point (b) of Article 3(2) by focusing on the following implementation measures:
(a) | increasing the number of law enforcement operations involving two or more Member States, including, where appropriate, operations involving other relevant actors, in particular through facilitating and improving the use of joint investigation teams, joint patrols, hot pursuits, discreet surveillance and other operational cooperation mechanisms in the context of the EU policy cycle, with special emphasis on cross-border operations; |
(b) | improving the coordination and increasing the cooperation of competent authorities within and between Member States and with other relevant actors, for example through networks of specialised national units, Union networks and cooperation structures, and Union centres; and |
(c) | improving inter-agency cooperation at Union level between the Member States, and between Member States and relevant Union bodies, offices and agencies, as well as cooperation at national level among the competent authorities within each Member State. |
3.
The Fund shall contribute to achieving the specific objective set out in point (c) of Article 3(2) by focusing on the following implementation measures:
(a) | increasing training, exercises and mutual learning, specialised exchange programmes and sharing of best practices in and between Member States’ competent authorities, including at local level, and with third countries and other relevant actors; |
(b) | exploiting synergies by pooling resources and knowledge and sharing best practices between Member States and other relevant actors, including civil society, through, for example, the creation of joint centres of excellence, development of joint risk assessments, or common operational support centres for jointly conducted operations; |
(c) | promoting and developing measures, safeguards, mechanisms and best practices for the early identification, protection and support of witnesses, whistleblowers and victims of crime and developing partnerships between public authorities and other relevant actors to this effect; |
(d) | acquiring relevant equipment and setting up or upgrading specialised training facilities and other essential security-relevant infrastructure to increase preparedness, resilience, public awareness and adequate response as regards security threats; and |
(e) | protecting critical infrastructure against security-related incidents by detecting, assessing and closing vulnerabilities. |
ANNEX III
SCOPE OF SUPPORT
Within its objectives, the Fund may support, inter alia, the following types of actions:
(a) | setting up, adapting and maintaining ICT systems that contribute to the achievement of the objectives of this Regulation, training on the use of such systems, and testing and improving the interoperability components and data quality of such systems; |
(b) | monitoring of the implementation of Union law and Union policy objectives in the Member States in the area of security-relevant information systems, including data protection, privacy and data security; |
(c) | EU policy cycle/EMPACT operational actions; |
(d) | actions supporting an effective and coordinated response to crises and linking up existing sector-specific capabilities, expertise centres and situational awareness centres, including those for health, civil protection, terrorism and cybercrime; |
(e) | actions developing innovative methods or deploying new technologies with a potential for transferability to other Member States, in particular projects aimed at testing and validating the outcome of Union-funded security research projects; |
(f) | actions that improve resilience as regards emerging threats, including trafficking via online channels, hybrid threats, the malicious use of unmanned aerial systems and chemical, biological, radiological and nuclear threats; |
(g) | providing support to thematic or cross-theme networks of specialised national units and national contact points to improve mutual confidence, the exchange and dissemination of know-how, information, experience and best practices, the pooling of resources and expertise in joint centres of excellence; |
(h) | education and training for staff and experts in relevant law enforcement and judicial authorities and administrative agencies, taking into account operational needs and risk analyses, in cooperation with CEPOL and, when applicable, the European Judicial Training Network, including education and training on prevention policies, with special emphasis on fundamental rights and non-discrimination; |
(i) | cooperation with the private sector, for example in the fight against cybercrime, in order to build trust and improve coordination, contingency planning and the exchange and dissemination of information and best practices among public and private actors, including in the protection of public spaces and critical infrastructure; |
(j) | actions empowering communities to develop local approaches and prevention policies, and awareness-raising and communication activities among stakeholders and the general public on Union security policies; |
(k) | financing of equipment, means of transport, communication systems and security-relevant facilities; |
(l) | financing the cost of staff involved in the actions that are supported by the Fund or actions requiring involvement of staff for technical or security-related reasons. |
ANNEX IV
ACTIONS REFERRED TO IN ARTICLE 12(3) AND ARTICLE 13(10)
(1)
Projects which aim to prevent and counter radicalisation
(2)
Projects which aim to improve the interoperability of EU information systems and national ICT systems, insofar as provided for by Union or Member State law
(3)
Projects which aim to fight the most important threats posed by serious and organised crime, in the framework of EU policy cycle/EMPACT operational actions
(4)
Projects which aim to prevent and fight cybercrime, in particular child sexual exploitation online, and crimes where the internet is the primary platform for evidence collection
(5)
Projects which aim to improve the security and resilience of critical infrastructure
ANNEX V
CORE PERFORMANCE INDICATORS AS REFERRED TO IN ARTICLE 27(1)
Specific objective set out in point (a) of Article 3(2)
1. | Number of ICT systems made interoperable in the Member States/with security-relevant EU and decentralised information systems/with international databases |
2. | Number of administrative units that have set up new, or adapted existing, information exchange mechanisms/procedures/tools/guidance for exchange of information with other Member States/Union bodies, offices or agencies/third countries/international organisations |
3. | Number of participants who consider the training activity useful for their work |
4. | Number of participants who report three months after the training activity that they are using the skills and competences acquired during that training activity |
Specific objective set out in point (b) of Article 3(2)
5. | The estimated value of assets frozen in the context of cross-border operations |
6. | Quantity of illicit drugs seized in the context of cross-border operations, by type of product (1) |
7. | Quantity of weapons seized in the context of cross-border operations, by type of weapon (2) |
8. | Number of administrative units that have developed/adapted existing mechanisms/procedures/tools/guidance for cooperation with other Member States/Union bodies, offices or agencies/third countries/international organisations |
9. | Number of staff involved in cross-border operations |
10. | Number of Schengen evaluation recommendations addressed |
Specific objective set out in point (c) of Article 3(2)
11. | Number of initiatives developed/expanded to prevent radicalisation |
12. | Number of initiatives developed/expanded to protect/support witnesses and whistleblowers |
13. | Number of critical infrastructure/public spaces with new/adapted facilities protecting against security-related risks |
14. | Number of participants who consider the training activity useful for their work |
15. | Number of participants who report three months after the training activity that they are using the skills and competences acquired during that training activity |
(1) Breakdown of types of drugs (based on the categories used in reports on illicit drugs: EU Drug Markets Report, the European Drug Report as well as the EMCDDA Statistical Bulletin):
— | cannabis; |
— | opioids, including heroin; |
— | cocaine; |
— | synthetic drugs, including amphetamine-type stimulants (including amphetamine and methamphetamine) and MDMA; |
— | new psychoactive substances; |
— | other illicit drugs. |
(2) Breakdown of types of weapons (based on existing legislation, namely Council Directive 91/477/EEC of 18 June 1991 on control of the acquisition and possession of weapons. The proposed categories are simplified, compared to those mentioned in Annex I to Directive 91/477/EEC, and in line with those inside the Schengen Information System, used by national authorities):
— | weapons of war: automatic firearms and heavy firearms (anti-tank, rocket launcher, mortar, etc.); |
— | other short firearms: revolvers and pistols (including salute and acoustic weapons); |
— | other long firearms: rifles and shotguns (including salute and acoustic weapons). |
ANNEX VI
TYPES OF INTERVENTION
TABLE 1: CODES FOR THE INTERVENTION FIELD DIMENSION
001 | TER-Countering terrorist financing |
002 | TER-Prevention and countering of radicalisation |
003 | TER-Protection and resilience of public spaces and other soft targets |
004 | TER-Protection and resilience of critical infrastructure |
005 | TER-Chemical Biological Radioactive Nuclear |
006 | TER-Explosives |
007 | TER-Crisis management |
008 | TER-Other |
009 | OC-Corruption |
010 | OC-Economic and financial crime |
011 | OC-Laundering of the proceeds of crime |
012 | OC-Drugs |
013 | OC-Firearms trafficking |
014 | Trafficking in cultural objects |
015 | OC-Trafficking in human beings |
016 | OC-Migrant smuggling |
017 | OC-Environmental crime |
018 | OC-Organised property crime |
019 | OC-Other |
020 | CC-Cybercrime – Other |
021 | CC-Cybercrime – Prevention |
022 | CC-Cybercrime – Facilitating investigations |
023 | CC-Cybercrime – Victims assistance |
024 | CC-Child Sexual Exploitation – Prevention |
025 | CC-Child Sexual Exploitation – Facilitating investigations |
026 | CC-Child Sexual Exploitation – Victims assistance |
027 | CC-Child Sexual Exploitation, including distribution of child abuse images and child pornography |
028 | CC-Other |
029 | GEN-Information exchange |
030 | GEN-Police or interagency cooperation (customs, border guards, intelligence services) |
031 | GEN-Forensics |
032 | GEN-Victim support |
033 | GEN-Operating support |
034 | TA-Technical assistance – information and communication |
035 | TA-Technical assistance – preparation, implementation, monitoring and control |
036 | TA-Technical assistance – evaluation and studies, data collection |
037 | TA-Technical assistance – capacity building |
TABLE 2: CODES FOR THE TYPE OF ACTION DIMENSION
001 | ICT systems, interoperability, data quality (excluding equipment) |
002 | Networks, centres of excellence, cooperation structures, joint actions and operations |
003 | Joint Investigation Teams (JITs) or other joint operations |
004 | Secondment or deployment of experts |
005 | Training |
006 | Exchange of best practices, workshops, conferences, events, awareness-raising campaigns, communication activities |
007 | Studies, pilot projects, risk assessments |
008 | Equipment |
009 | Means of transport |
010 | Buildings, facilities |
011 | Deployment or other follow-up of research projects |
TABLE 3: CODES FOR THE IMPLEMENTATION DIMENSION
001 | Actions covered by Article 12(1) |
002 | Specific actions |
003 | Actions listed in Annex IV |
004 | Operating support |
005 | Emergency assistance as referred to in Article 25 |
TABLE 4: CODES FOR THE PARTICULAR THEMES DIMENSION
001 | Cooperation with third countries |
002 | Actions in or in relation to third countries |
003 | Implementation of Schengen evaluation recommendations in the area of police cooperation |
004 | None of the above |
ANNEX VII
EXPENDITURE ELIGIBLE FOR OPERATING SUPPORT
1.
Within the specific objective set out in point (a) of Article 3(2), operating support within the Member States’ programmes shall cover:
(a) | maintenance of and helpdesk for security-relevant EU and, where relevant, national ICT systems that contribute to the achievement of the objectives of this Regulation; |
(b) | staff costs that contribute to the achievement of the objectives of this Regulation. |
2.
Within the specific objective set out in point (b) of Article 3(2), operating support within the Member States’ programmes shall cover:
(a) | maintenance of technical equipment or means of transport used for actions in the area of prevention, detection and investigation of serious and organised crime with a cross-border dimension; |
(b) | staff costs that contribute to the achievement of the objectives of this Regulation. |
3.
Within the specific objective set out in point (c) of Article 3(2), operating support within the Member States’ programmes shall cover:
(a) | maintenance of technical equipment or means of transport used for actions in the area of prevention, detection and investigation of serious and organised crime with a cross-border dimension; |
(b) | staff costs that contribute to the achievement of the objectives of this Regulation. |
4.
Expenditure concerning actions which are not eligible under Article 5(5) shall not be covered.
ANNEX VIII
OUTPUT AND RESULT INDICATORS AS REFERRED TO IN ARTICLE 27(3)
Specific objective set out in point (a) of Article 3(2)
Output indicators
1. | Number of participants in training activities |
2. | Number of expert meetings/workshops/study visits |
3. | Number of ICT systems set up/adapted/maintained |
4. | Number of equipment items purchased |
Result indicators
5. | Number of ICT systems made interoperable in the Member States/with security-relevant EU and decentralised information systems/with international databases |
6. | Number of administrative units that have set up new, or adapted existing, information exchange mechanisms/procedures/tools/guidance for exchange of information with other Member States/Union bodies, offices or agencies/third countries/international organisations |
7. | Number of participants who consider the training useful for their work |
8. | Number of participants who report three months after the training activity that they are using the skills and competences acquired during that training activity |
Specific objective set out in point (b) of Article 3(2)
Output indicators
1. | Number of cross-border operations, separately specifying:
|
2. | Number of expert meetings/workshops/study visits/common exercises |
3. | Number of equipment items purchased |
4. | Number of transport means purchased for cross-border operations |
Result indicators
5. | The estimated value of assets frozen in the context of cross-border operations |
6. | Quantity of illicit drugs seized in the context of cross-border operations, by type of product (1) |
7. | Quantity of weapons seized in the context of cross-border operations, by type of weapon (2) |
8. | Number of administrative units that have developed/adapted existing mechanisms/procedures/tools/guidance for cooperation with other Member States/Union bodies, offices or agencies/third countries/international organisations |
9. | Number of staff involved in cross-border operations |
10. | Number of Schengen evaluation recommendations addressed |
Specific objective set out in point (c) of Article 3(2)
Output indicators
1. | Number of participants in training activities |
2. | Number of exchange programmes/workshops/study visits |
3. | Number of equipment items purchased |
4. | Number of transport means purchased |
5. | Number of items of infrastructure/security-relevant facilities/tools/mechanisms constructed/purchased/upgraded |
6. | Number of projects to prevent crime |
7. | Number of projects to assist victims of crime |
8. | Number of victims of crimes assisted |
Result indicators
9. | Number of initiatives developed/expanded to prevent radicalisation |
10. | Number of initiatives developed/expanded to protect/support witnesses and whistleblowers |
11. | Number of critical infrastructure/public spaces with new/adapted facilities protecting against security-related risks |
12. | Number of participants who consider the training activity useful for their work |
13. | Number of participants who report three months after the training activity that they are using the skills and competences acquired during that training activity |
(1) Breakdown of types of drugs (based on the categories used in reports on illicit drugs: EU Drug Markets Report, the European Drug Report as well as the EMCDDA Statistical Bulletin):
— | cannabis; |
— | opioids, including heroin; |
— | cocaine; |
— | synthetic drugs, including amphetamine-type stimulants (including amphetamine and methamphetamine) and MDMA; |
— | new psychoactive substances; |
— | other illicit drugs. |
(2) Breakdown of types of weapons (based on existing legislation, namely Council Directive 91/477/EEC of 18 June 1991 on control of the acquisition and possession of weapons. The proposed categories are simplified, compared to those mentioned in Annex I to Directive 91/477/EEC, and in line with those inside the Schengen Information System, used by national authorities):
— | weapons of war: automatic firearms and heavy firearms (anti-tank, rocket launcher, mortar, etc.); |
— | other short firearms: revolvers and pistols (including salute and acoustic weapons); |
— | other long firearms: rifles and shotguns (including salute and acoustic weapons). |