I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
24<br />
3.5 Explosives<br />
Explosives are unfortunately the vector most often used by terrorists. Preventing access to explosives, their precursors and<br />
the technology to manufacture them remains very diffi cult. Thus the capability to detect them before they can be activated<br />
is critical. Mitigating existing and new means of attack such as improvised explosive devices (IEDs) is a permanent challenge<br />
for society.<br />
Sustained research eff orts must be pursued in this domain regarding the detection of all types of explosives –unattended<br />
or man-carried –including remote detection capabilities. Detection equipment must be transportable and easy to use.<br />
New solutions allowing very fast intervention are needed to neutralise, even partially, unattended potential explosives. The<br />
development of new markers in manufacturing and the ability to track compounds that identify the source of their components<br />
would also be very benefi cial for detection and investigation.<br />
Coordination at <strong>European</strong> level, mutual use of methods and expertise to counteract violent means of attack and support for<br />
the development of improved harmonised regulation should be encouraged. The existing <strong>European</strong> Network of Explosive<br />
Ordinance Disposal Units could be an appropriate channel to support such action.<br />
3.6 Chemical, Biological, Radiological, Nuclear<br />
Chemical, biological, and radiological incidents, be they intentional or accidental, are major risks for Member States. The<br />
scale of these risks ranges from attacks by states to the use of small, improvised devices by terrorists. The spread of technical<br />
knowledge and capabilities that can enable dedicated individuals or groups to build CBRN devices is a major concern.<br />
While the impact of a CBRN incident on society can vary dramatically, it is in any case likely to be immense. Prevention is<br />
crucial and should receive particular attention by equipping intelligence agencies and policy makers with better information<br />
analysis tools. Consequence management to overcome CBRN attacks and hoaxes is also of extreme importance. This requires<br />
development of more eff ective and reliable detection and identifi cation capabilities, including detection networks, data fusion,<br />
distribution of signal output and decision support tools.<br />
Another important capability gap involves safe containment and decontamination procedures that provide quick eff ect<br />
without harmful side-eff ects, not least of which is the environmental clean-up of these materials. Special focus must also be<br />
placed on understanding the metrics of the psychological and sociological consequences of CBRN incidents and thus how to<br />
design proper countermeasures (education, communication and recovery).<br />
Although Europe has developed good standards for laboratory safety, the advent of dual-use technologies and the proliferation<br />
of know-how for the malicious use of biological agents have increased the need for socially-grounded approaches to biosecurity.<br />
Moreover, the continuing threat of global pandemics –with its potentially devastating impact on the health, social<br />
and economic stability of <strong>European</strong> society – sharpens these security concerns.<br />
3.7 New technologies, new threats<br />
Having identifi ed the sustained research requirements to deal with generally known means of attack, <strong>ESRIF</strong> recognises that<br />
while new technologies are of paramount importance for to improving security, they may also foster new or transformed<br />
threats. Formerly unaff ordable and high-level technologies may become widely available for malicious use; e.g. high-power<br />
microwave or radio frequency jamming devices can be constructed using simple, off -the-shelf components while mobile<br />
devices are used to initiate or detonate homemade bombs.<br />
Although certain future deliberate misuses of technologies can be foreseen, most cannot. There is no doubt that rapid evolution<br />
in ICT/cyber security and its misuse will continue and even accelerate. Some technologies already identifi ed as candidates for<br />
<strong>ESRIF</strong> FINAL REPORT - PART 1 • <strong>European</strong> Security Research And Innovation Agenda (ESRIA)