23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Mobile ID devices may be used for a variety of situations where a stationary check point is neither possible nor practically<br />

feasible. Common applications include: fl exible immigration and border control needs in non-stationary environments,<br />

identifi cation and verifi cation in law enforcement applications, access control for buildings, computers, and networks in<br />

fl exible application environments.<br />

The main challenge is to defi ne the interoperability needs and related criteria for checks and controls at the borders and in the<br />

entire Schengen Area.<br />

We should foster the realisation of mobile checks and controls, and prepare the generalisation of EAC checks and controls on<br />

mobile devices everywhere within the Schengen Area.<br />

8.4.2.3 Intelligence-led border management<br />

In synergy with the use of mobile devices, it is important to implement secure data transfers in order to optimise the use of<br />

PNR and APIS data and to process proactive ID checks and controls at the border.<br />

Currently, border control is performed at the border control booth, without mobile equipment. The control is executed only in<br />

a reactive way when the traveller arrives at the border point. No proactive controls are operated. Control posts are connected<br />

to police databases, but do not fully use all capabilities given by PNR and API data.<br />

Border guards, via a better and systematic analysis of PNR and APIS data, could beforehand select persons who have<br />

to be more thoroughly checked, at the gate of the plane (or the boat) with mobile devices connected to databases<br />

through a secure network. Such controls will be more efficient, faster, and more precisely oriented to screen wanted<br />

persons (national, SIS or Interpol alerts).<br />

8.4.2.4 Disasters and emergencies management<br />

In the event of a disaster, it is necessary to provide as soon as possible information related to the identity of victims. The period<br />

of time between the disaster and the restoring of identity management is generally uncertain and creates discomfort and<br />

uncertainty. It produces doubts, a poor image of the crisis management on the part of governments and delays the execution<br />

of additional support actions to victims.<br />

To improve crisis management the following solutions should be developed:<br />

Software mechanisms to build up an identity service based on heterogeneous information (biographic and biometric).<br />

Develop identity management production that can deliver credentials to victims.<br />

Standardisation of rescuer identity, skills and credentials to allow interoperable command and control cooperation.<br />

Electronic wall-mechanism to supervise disaster border zones to manage access rights and to protect victims from<br />

unauthorised reportage.<br />

Build robust, portable and autonomous tools to digitally collect victims’ information on-site and in real time,<br />

including information sharing via a secured network.<br />

8.4.2.5 Harmonised global border control<br />

In the domain of border control there is currently a lack of change management, planning and system interoperability. As a result<br />

new systems are limited and will ultimately not be fi t for the sophisticated purposes for which they are required. Furthermore, it<br />

hinders innovation, and R&D professionals in the domain still do not have roadmaps for all requirements.<br />

These challenges should be addressed by developing the following:<br />

Automated border control to leverage the increasing number of electronic travel and ID documents and to manage the<br />

associated technical and legal complexities.<br />

Move the border controls from reactive to proactive through a connection to a secured information system (through<br />

companies operating fl ights or through a special secured (wireless) network connection), so that passengers will be<br />

checked by the authorities during the fl ight, and only those who need a more detailed control at the border will actually be<br />

physically checked.<br />

191

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!