23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

178<br />

Lower costs: with automated gates and other automation tools, the cost per transaction can be reduced by as much as<br />

90%. This has a direct impact on the citizens as tax payers’ money is used more effi ciently.<br />

More pleasant experience: with a reduction of queues the fi rst image that the country gives to the visitor is improved.<br />

Reducing risks of security breaches<br />

If border guards have personal data at their disposal only when they face the person who wants to cross the border, how<br />

could two offi cers, for example, perform thorough identity checks with 400 people presenting themselves at the same<br />

time? Proactive controls give them time to select who they want to check with more interest and who can cross the border<br />

more easily.<br />

It is also quite impossible to fi ght terrorist organisations effi ciently without proactive management of border checks and<br />

controls. Proactive controls are the only way to introduce a dimension of individuality in each control and to perform complete<br />

database checks.<br />

8.2.2.2 Fast response in case of disasters<br />

Potential impact on citizens increases due to population growth<br />

Here, we mainly focus on natural disasters: fl ooding, hurricane, tsunami, etc. Terrorist acts should remain minor, even if they<br />

have major image impact. Furthermore, climate change will increase the number of natural disasters. Additionally, population<br />

density grows in cities, increasing a disaster’s impact on citizens.<br />

In the event of a disaster, it is necessary to provide information related to the identity of the victims. The link between a<br />

person and his identity has to be re-established. The period of time included between the disaster and the restoration of<br />

identity is uncertain. It produces doubts, a bad image of crisis management and delays additional support to victims and<br />

their families.<br />

Preventing spread of epidemic diseases<br />

Epidemic diseases require, by nature, a very fast response. Rapidly establishing a list of victims is crucial to stop the spread of the disease.<br />

It either helps defi ning the danger zones or helps to contact a person who has been in contact with someone who is aff ected.<br />

If we take the example of Chikungunya, as soon as victims are identifi ed, there is an immediate eff ort to destroy the vector<br />

around the suspected aff ected area. A potential link with future victims is always established on the basis of individual interview.<br />

There is no exploitation of surveillance capabilities to identify relations and links faster.<br />

Other agents could be smallpox, SARS 6 , and H1N1. Such agents are extremely contagious and aff ected victims could be<br />

treated if they are contacted in time.<br />

8.2.2.3 Continuous monitoring and control of containers<br />

The challenges to precisely monitor the location and content of containers are becoming more and more complex and<br />

diverse. This is particularly true, as we have to look at the system as a whole. Therefore, the monitoring system must be:<br />

1. Multinational<br />

2. Multi-cargos (diff erent products are transported)<br />

3. Multi-technological<br />

4. Multi-actor (various stakeholders)<br />

5. Expandable/interoperable: to not to establish a monopoly, but rather to follow an approach that can be<br />

extended to establish new «smart» procedures, new standards/data fl ow and new technology.<br />

There are mainly two types of risks that can be classifi ed as follow:<br />

1. Infrastructure risks: The terrorist has the objective to damage or destroy transport elements in order to disrupt the<br />

transport supply chain. The transport elements are in this case the terrorist’s target.<br />

6 Severe Acute Respiratory Syndrome virus<br />

<strong>ESRIF</strong> FINAL REPORT - PART 2 • Working Group: Identifi cation of People and Assets

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!