23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

180<br />

uncoordinated regulatory frameworks and unclear security continuity protocols among the diff erent links in the transport chain<br />

– and especially at its outer edges – all represent security vulnerabilities that stem from the lack of a coordinated approach to<br />

securing the container transport chain.<br />

8.2.3.3 Cooperation between Member States in case of disasters<br />

Identity Management of rescuers is essential to provide appropriate support (doctors, fi reman, etc.). When multiple Member<br />

States collaborate on dealing with a disaster, each Member State is in charge of a non-overlapping zone because coordination<br />

of support is not interoperable. Due to discrepancies with identity and skills management, it is diffi cult to transfer rescuers<br />

from one zone to another.<br />

Collaboration among rescuers will also become more and more important as it is estimated that disasters and victims impacted<br />

will increase in the forthcoming twenty years. Member States of the <strong>European</strong> Union should collaborate more and more to<br />

provide assistance to victims. Assistance could be located within the <strong>European</strong> Union or in various places around the world.<br />

8.2.3.4 Business models<br />

<strong>Final</strong>ly it is worth noting that the points raised above, with its accompanying extensive list of requirements, will have a fi nancial<br />

impact on those who are purchasing, designing or implementing these new systems. The issue of cost is often avoided or<br />

shied away from, resulting in a lack of appropriate fi nancial planning, ineffi ciencies and cost overrun as well as security being<br />

viewed primarily as a cost.<br />

However, this is not always true and as some innovative schemes in recent times have shown that security<br />

cannot only be seen as a business or service that consumers want to buy (for example citizens in the US and the<br />

Netherlands voluntarily pay for a scheme that enables them to be fast-tracked through certain airports) is a service<br />

that provides security and pays for itself, but also a service that can reduce costs by tackling overstaffing and<br />

providing automating border processing. It is important therefore that we understand the potential cost impact<br />

of these changes as well as the potential savings and related opportunities, and consider appropriate business<br />

models for these new systems.<br />

8.3 Capabilities and gaps<br />

8.3.1 Technology maturity for people and asset identifi cation<br />

8.3.1.1 Biometric systems performance<br />

Current FAR/FRR and possible improvements<br />

The most important threat on any biometric system is the danger to grant unauthorised access, due to false positive<br />

identifi cation (FAR). Another important threat is the denial of access threat, due to false negative identifi cation (FRR). As we<br />

already mentioned lowering the FAR leads to an increase of the FRR and vice-versa. However, certain biometric traits do lead<br />

to better overall performance than others. For instance, among the two biometrics used in e-passport (face and fi ngerprints),<br />

fi ngerprint recognition is clearly recognized as more secure.<br />

Technical improvements of capturing devices and matching devices should be encouraged as they can lead to better<br />

performance. For example, the usage of very high defi nition cameras to capture the face can help analysing the structure<br />

of the skin. Fingerprint capture and matching technologies could be improved in a similar manner, by the processing of<br />

additional details.<br />

Multimodal fusion<br />

A unimodal biometrics system uses a single biometric trait to verify/identify an individual whereas a multimodal biometrics<br />

system uses several traits together to achieve superior performance or can apply to situations where one or more of the<br />

available traits are needed for the identifi cation.Thanks to the advances in fusion techniques, multimodal biometric systems<br />

have many benefi ts such as:<br />

<strong>ESRIF</strong> FINAL REPORT - PART 2 • Working Group: Identifi cation of People and Assets

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!