23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.2.2 Required capabilities<br />

Security today and in the future will not be eff ective without proper technology and cyber information management. There<br />

is a general perception that technology can be an enabler for global security but it can only became eff ective if it inspires<br />

support from the public through an acceptable social balance between the possible risks and benefi ts and when adequate<br />

procedures to protect the privacy of the citizens are established and known by the public.<br />

The persistence of organised violence in diff erent forms - fi nancial, political, ethnic - threatens the security and prosperity of<br />

<strong>European</strong> citizens. The increased globalisation of networks and fl ows means that risks are no longer confi ned geographically<br />

and that authorities and nations need to collaborate in order to make eff ective responses to threats. With proper governance<br />

of actors, missions and procedures as well as research into new integrity-preserving technologies we can allow a balanced<br />

implementation of security measures that guarantee the protection of personal freedoms.<br />

Special attention will have to be dedicated to collected data gathered during preventive actions. Today, automatic analysis<br />

algorithms are often too expensive and not robust enough to provide reliable meta-data extraction at a quality that is<br />

comparable to human capabilities. At the same time, legal mechanisms are required that take full advantage of technological<br />

opportunities and to allow acceptance of meta-data evidence or to provide accountability for actions taken.<br />

Integrated Surveillance Management - seamless, unimpeded access to surveillance and intelligence data of diff erent tiers,<br />

require interoperability/interfaces and procedural as well as legal frameworks.<br />

Enhanced hazard or asset detection and identifi cation, including global tracking of naval and cross-border traffi c - The current<br />

generation of visual surveillance systems suff ers from a lack of robustness at diff erent levels. The use of other means of<br />

location or identifi cation and tracking (even not absolute) such as tag (e.g. containers tags) or biometry can greatly enhance<br />

video tracking by associating and correlating discontinuous video tracking sequences. Integration of sensors, knowledge<br />

databases, identifi cation parameters databases, etc. within existing systems, and taking into account interoperability issues<br />

between systems that will need to collaborate, is a must. All this will have to be considered during the development of<br />

future systems.<br />

Harmonised global border control - Concept-to-Capability facilities off er a synthetic environment where integrated sensor<br />

solutions can be developed and deployed, providing cost-eff ective and demonstrable operational capability across a number<br />

of disciplines for border control like land, maritime and air operations. Unmanned Air System can supply a wide range of<br />

services in support of surveillance and intelligence operations.<br />

Sharing of sensors and sensor data (meta data) in support of risk and vulnerability assessment allowing early warnings and threats<br />

- Sensor platforms are commonly either used by public or private authorities. Mechanisms for ad-hoc, incident based sharing<br />

of sensor or meta-data need to be devised. Interworking between public and private security installations is commonly<br />

performed on an alarm basis in a preconfi gured manner, e.g. permanent connection of alarms to a security operation centre<br />

(SOC). Mechanisms for the sharing of sensor as well as meta-data derived from sensor data need to be implemented. Methods<br />

are lacking that integrate vulnerability analyses and the identifi cation of indicators with early warning prediction models in the<br />

event of attacks or incidents. This includes inter-system eff ects awareness that should imply secure design and construction<br />

to prevent cascade failures.<br />

Improving Detection and Identifi cation by updating/developing new sensors- new and innovative sensing techniques considering<br />

developments in areas like terahertz, meta or nanomaterials or are required in support to unconventional attacks (e.g. CBRN),<br />

post crisis management or search and rescue.<br />

Continuous improvement of detection/sensor equipment –To support the preparation of the contingency and security plans,<br />

high resolution space-based sensors, both high resolution optical information and high resolution radar information are<br />

also important. Satellite sensors will be able to provide, static area information to setup operation panning. Such sensors<br />

will be able to help in characterising representative crowded areas by providing information about the scene geometry<br />

and interaction.<br />

161

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!