I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
7.2.2 Required capabilities<br />
Security today and in the future will not be eff ective without proper technology and cyber information management. There<br />
is a general perception that technology can be an enabler for global security but it can only became eff ective if it inspires<br />
support from the public through an acceptable social balance between the possible risks and benefi ts and when adequate<br />
procedures to protect the privacy of the citizens are established and known by the public.<br />
The persistence of organised violence in diff erent forms - fi nancial, political, ethnic - threatens the security and prosperity of<br />
<strong>European</strong> citizens. The increased globalisation of networks and fl ows means that risks are no longer confi ned geographically<br />
and that authorities and nations need to collaborate in order to make eff ective responses to threats. With proper governance<br />
of actors, missions and procedures as well as research into new integrity-preserving technologies we can allow a balanced<br />
implementation of security measures that guarantee the protection of personal freedoms.<br />
Special attention will have to be dedicated to collected data gathered during preventive actions. Today, automatic analysis<br />
algorithms are often too expensive and not robust enough to provide reliable meta-data extraction at a quality that is<br />
comparable to human capabilities. At the same time, legal mechanisms are required that take full advantage of technological<br />
opportunities and to allow acceptance of meta-data evidence or to provide accountability for actions taken.<br />
Integrated Surveillance Management - seamless, unimpeded access to surveillance and intelligence data of diff erent tiers,<br />
require interoperability/interfaces and procedural as well as legal frameworks.<br />
Enhanced hazard or asset detection and identifi cation, including global tracking of naval and cross-border traffi c - The current<br />
generation of visual surveillance systems suff ers from a lack of robustness at diff erent levels. The use of other means of<br />
location or identifi cation and tracking (even not absolute) such as tag (e.g. containers tags) or biometry can greatly enhance<br />
video tracking by associating and correlating discontinuous video tracking sequences. Integration of sensors, knowledge<br />
databases, identifi cation parameters databases, etc. within existing systems, and taking into account interoperability issues<br />
between systems that will need to collaborate, is a must. All this will have to be considered during the development of<br />
future systems.<br />
Harmonised global border control - Concept-to-Capability facilities off er a synthetic environment where integrated sensor<br />
solutions can be developed and deployed, providing cost-eff ective and demonstrable operational capability across a number<br />
of disciplines for border control like land, maritime and air operations. Unmanned Air System can supply a wide range of<br />
services in support of surveillance and intelligence operations.<br />
Sharing of sensors and sensor data (meta data) in support of risk and vulnerability assessment allowing early warnings and threats<br />
- Sensor platforms are commonly either used by public or private authorities. Mechanisms for ad-hoc, incident based sharing<br />
of sensor or meta-data need to be devised. Interworking between public and private security installations is commonly<br />
performed on an alarm basis in a preconfi gured manner, e.g. permanent connection of alarms to a security operation centre<br />
(SOC). Mechanisms for the sharing of sensor as well as meta-data derived from sensor data need to be implemented. Methods<br />
are lacking that integrate vulnerability analyses and the identifi cation of indicators with early warning prediction models in the<br />
event of attacks or incidents. This includes inter-system eff ects awareness that should imply secure design and construction<br />
to prevent cascade failures.<br />
Improving Detection and Identifi cation by updating/developing new sensors- new and innovative sensing techniques considering<br />
developments in areas like terahertz, meta or nanomaterials or are required in support to unconventional attacks (e.g. CBRN),<br />
post crisis management or search and rescue.<br />
Continuous improvement of detection/sensor equipment –To support the preparation of the contingency and security plans,<br />
high resolution space-based sensors, both high resolution optical information and high resolution radar information are<br />
also important. Satellite sensors will be able to provide, static area information to setup operation panning. Such sensors<br />
will be able to help in characterising representative crowded areas by providing information about the scene geometry<br />
and interaction.<br />
161