I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
2. Supply chain risks: The terrorist has the objective to misuse the transport supply chain as their means to create damage<br />
or fatalities. The transport elements are in this case not the target but the means (used to transport weapons or as weapons<br />
themselves, in particular if we consider dangerous freight).<br />
8.2.3 Interoperability and information sharing<br />
8.2.3.1 Interoperability of systems<br />
As we invest in new technologies and systems, it is vital to ensure they achieve their full potential. To that end we need to move<br />
beyond the “stove-pipe systems” and ensure the systems can work together in an interoperable fashion. These changes which<br />
our national and international systems are undergoing are groundbreaking. Our current lack of planning and information sharing<br />
must be addressed so we can improve effi ciency in our systems and massively improve the current lack of user satisfaction.<br />
If we deal with these key management issues at an early stage we can build security into a system from the start rather than<br />
making alterations when we realise the problems.<br />
Traditionally, identity systems were established for one purpose and there was little or no information sharing. However, new<br />
systems, for example border and immigration systems which are now at the vanguard of national, regional and global security<br />
need to share and exchange information in a quick and reliable manner. Achieving this will enable systems to process travellers<br />
more effi ciently on fast track programmes and an early detection of persons of interest.<br />
Information sharing falls into three main categories:<br />
Cross-programme: Within a given agency, there may be a need to share information between projects or programmes (e.g.<br />
between visa issuance and asylum systems).<br />
Cross-agency: Within a government, a need generally exists to share information between departments or agencies (e.g.<br />
between border control and law enforcement).<br />
International: Allied nations, regional pacts, or bilateral agreements frequently necessitate the exchange of data between countries.<br />
Interoperability is crucial to the success of any data exchange. Interoperability requires many elements to be successful:<br />
technical, architectural, interface, formatting, security and last but not least policy. In particular, a traceability and control of<br />
database access and interconnections should be well-defi ned starting with the system conception.<br />
Certifi cation of the systems is one means to achieve better interoperability or the development of standards as has been done<br />
in recent years with the ICAO standards on passports. However, one needs to be vigilant as these now interoperable systems<br />
need to be protected against their own inherent vulnerabilities. Ultimately, a lack of system interoperability will limit these new<br />
systems and undermine the sophisticated purposes for which they are required.<br />
As far as standards are concerned our continued failure to agree on certain matters and put in place all required standards<br />
(for example fi ngerprint template interoperability) continues to hold up our ability to exploit and maximise our use of<br />
available and new technologies. Also it hinders innovation and R&D as developers still do not have roadmaps for all<br />
requirements as yet.<br />
8.2.3.2 Tracking international movement of assets<br />
There is no single system governing all the international movements of assets; in fact, freight transport is characterised by<br />
complex interactions among multiple actors, industries, regulatory agencies, modes, operating systems, liability regimes, legal<br />
frameworks, etc. Actors involved are numerous, disparate in nature and activity, operate on tight margins, and, as a result,<br />
represent more of a security risk than their larger counterparts further down the chain (i.e. large airport, port and maritime<br />
transport operators).<br />
Cross-network optimisation of security measures is extremely diffi cult. Each component of the system has tended to seek to<br />
optimise its own operations and, in some cases, ensure that these are compatible with the next link in the chain. However,<br />
it is a well-known tenet in logistics management that the aggregation of individually optimised links leads to a suboptimal<br />
logistics chain. Un-harmonised or inexistent security practices, incompatible operating and information management systems,<br />
179