23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2. Supply chain risks: The terrorist has the objective to misuse the transport supply chain as their means to create damage<br />

or fatalities. The transport elements are in this case not the target but the means (used to transport weapons or as weapons<br />

themselves, in particular if we consider dangerous freight).<br />

8.2.3 Interoperability and information sharing<br />

8.2.3.1 Interoperability of systems<br />

As we invest in new technologies and systems, it is vital to ensure they achieve their full potential. To that end we need to move<br />

beyond the “stove-pipe systems” and ensure the systems can work together in an interoperable fashion. These changes which<br />

our national and international systems are undergoing are groundbreaking. Our current lack of planning and information sharing<br />

must be addressed so we can improve effi ciency in our systems and massively improve the current lack of user satisfaction.<br />

If we deal with these key management issues at an early stage we can build security into a system from the start rather than<br />

making alterations when we realise the problems.<br />

Traditionally, identity systems were established for one purpose and there was little or no information sharing. However, new<br />

systems, for example border and immigration systems which are now at the vanguard of national, regional and global security<br />

need to share and exchange information in a quick and reliable manner. Achieving this will enable systems to process travellers<br />

more effi ciently on fast track programmes and an early detection of persons of interest.<br />

Information sharing falls into three main categories:<br />

Cross-programme: Within a given agency, there may be a need to share information between projects or programmes (e.g.<br />

between visa issuance and asylum systems).<br />

Cross-agency: Within a government, a need generally exists to share information between departments or agencies (e.g.<br />

between border control and law enforcement).<br />

International: Allied nations, regional pacts, or bilateral agreements frequently necessitate the exchange of data between countries.<br />

Interoperability is crucial to the success of any data exchange. Interoperability requires many elements to be successful:<br />

technical, architectural, interface, formatting, security and last but not least policy. In particular, a traceability and control of<br />

database access and interconnections should be well-defi ned starting with the system conception.<br />

Certifi cation of the systems is one means to achieve better interoperability or the development of standards as has been done<br />

in recent years with the ICAO standards on passports. However, one needs to be vigilant as these now interoperable systems<br />

need to be protected against their own inherent vulnerabilities. Ultimately, a lack of system interoperability will limit these new<br />

systems and undermine the sophisticated purposes for which they are required.<br />

As far as standards are concerned our continued failure to agree on certain matters and put in place all required standards<br />

(for example fi ngerprint template interoperability) continues to hold up our ability to exploit and maximise our use of<br />

available and new technologies. Also it hinders innovation and R&D as developers still do not have roadmaps for all<br />

requirements as yet.<br />

8.2.3.2 Tracking international movement of assets<br />

There is no single system governing all the international movements of assets; in fact, freight transport is characterised by<br />

complex interactions among multiple actors, industries, regulatory agencies, modes, operating systems, liability regimes, legal<br />

frameworks, etc. Actors involved are numerous, disparate in nature and activity, operate on tight margins, and, as a result,<br />

represent more of a security risk than their larger counterparts further down the chain (i.e. large airport, port and maritime<br />

transport operators).<br />

Cross-network optimisation of security measures is extremely diffi cult. Each component of the system has tended to seek to<br />

optimise its own operations and, in some cases, ensure that these are compatible with the next link in the chain. However,<br />

it is a well-known tenet in logistics management that the aggregation of individually optimised links leads to a suboptimal<br />

logistics chain. Un-harmonised or inexistent security practices, incompatible operating and information management systems,<br />

179

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!