I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Mobile ID devices may be used for a variety of situations where a stationary check point is neither possible nor practically<br />
feasible. Common applications include: fl exible immigration and border control needs in non-stationary environments,<br />
identifi cation and verifi cation in law enforcement applications, access control for buildings, computers, and networks in<br />
fl exible application environments.<br />
The main challenge is to defi ne the interoperability needs and related criteria for checks and controls at the borders and in the<br />
entire Schengen Area.<br />
We should foster the realisation of mobile checks and controls, and prepare the generalisation of EAC checks and controls on<br />
mobile devices everywhere within the Schengen Area.<br />
8.4.2.3 Intelligence-led border management<br />
In synergy with the use of mobile devices, it is important to implement secure data transfers in order to optimise the use of<br />
PNR and APIS data and to process proactive ID checks and controls at the border.<br />
Currently, border control is performed at the border control booth, without mobile equipment. The control is executed only in<br />
a reactive way when the traveller arrives at the border point. No proactive controls are operated. Control posts are connected<br />
to police databases, but do not fully use all capabilities given by PNR and API data.<br />
Border guards, via a better and systematic analysis of PNR and APIS data, could beforehand select persons who have<br />
to be more thoroughly checked, at the gate of the plane (or the boat) with mobile devices connected to databases<br />
through a secure network. Such controls will be more efficient, faster, and more precisely oriented to screen wanted<br />
persons (national, SIS or Interpol alerts).<br />
8.4.2.4 Disasters and emergencies management<br />
In the event of a disaster, it is necessary to provide as soon as possible information related to the identity of victims. The period<br />
of time between the disaster and the restoring of identity management is generally uncertain and creates discomfort and<br />
uncertainty. It produces doubts, a poor image of the crisis management on the part of governments and delays the execution<br />
of additional support actions to victims.<br />
To improve crisis management the following solutions should be developed:<br />
Software mechanisms to build up an identity service based on heterogeneous information (biographic and biometric).<br />
Develop identity management production that can deliver credentials to victims.<br />
Standardisation of rescuer identity, skills and credentials to allow interoperable command and control cooperation.<br />
Electronic wall-mechanism to supervise disaster border zones to manage access rights and to protect victims from<br />
unauthorised reportage.<br />
Build robust, portable and autonomous tools to digitally collect victims’ information on-site and in real time,<br />
including information sharing via a secured network.<br />
8.4.2.5 Harmonised global border control<br />
In the domain of border control there is currently a lack of change management, planning and system interoperability. As a result<br />
new systems are limited and will ultimately not be fi t for the sophisticated purposes for which they are required. Furthermore, it<br />
hinders innovation, and R&D professionals in the domain still do not have roadmaps for all requirements.<br />
These challenges should be addressed by developing the following:<br />
Automated border control to leverage the increasing number of electronic travel and ID documents and to manage the<br />
associated technical and legal complexities.<br />
Move the border controls from reactive to proactive through a connection to a secured information system (through<br />
companies operating fl ights or through a special secured (wireless) network connection), so that passengers will be<br />
checked by the authorities during the fl ight, and only those who need a more detailed control at the border will actually be<br />
physically checked.<br />
191