23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

24<br />

3.5 Explosives<br />

Explosives are unfortunately the vector most often used by terrorists. Preventing access to explosives, their precursors and<br />

the technology to manufacture them remains very diffi cult. Thus the capability to detect them before they can be activated<br />

is critical. Mitigating existing and new means of attack such as improvised explosive devices (IEDs) is a permanent challenge<br />

for society.<br />

Sustained research eff orts must be pursued in this domain regarding the detection of all types of explosives –unattended<br />

or man-carried –including remote detection capabilities. Detection equipment must be transportable and easy to use.<br />

New solutions allowing very fast intervention are needed to neutralise, even partially, unattended potential explosives. The<br />

development of new markers in manufacturing and the ability to track compounds that identify the source of their components<br />

would also be very benefi cial for detection and investigation.<br />

Coordination at <strong>European</strong> level, mutual use of methods and expertise to counteract violent means of attack and support for<br />

the development of improved harmonised regulation should be encouraged. The existing <strong>European</strong> Network of Explosive<br />

Ordinance Disposal Units could be an appropriate channel to support such action.<br />

3.6 Chemical, Biological, Radiological, Nuclear<br />

Chemical, biological, and radiological incidents, be they intentional or accidental, are major risks for Member States. The<br />

scale of these risks ranges from attacks by states to the use of small, improvised devices by terrorists. The spread of technical<br />

knowledge and capabilities that can enable dedicated individuals or groups to build CBRN devices is a major concern.<br />

While the impact of a CBRN incident on society can vary dramatically, it is in any case likely to be immense. Prevention is<br />

crucial and should receive particular attention by equipping intelligence agencies and policy makers with better information<br />

analysis tools. Consequence management to overcome CBRN attacks and hoaxes is also of extreme importance. This requires<br />

development of more eff ective and reliable detection and identifi cation capabilities, including detection networks, data fusion,<br />

distribution of signal output and decision support tools.<br />

Another important capability gap involves safe containment and decontamination procedures that provide quick eff ect<br />

without harmful side-eff ects, not least of which is the environmental clean-up of these materials. Special focus must also be<br />

placed on understanding the metrics of the psychological and sociological consequences of CBRN incidents and thus how to<br />

design proper countermeasures (education, communication and recovery).<br />

Although Europe has developed good standards for laboratory safety, the advent of dual-use technologies and the proliferation<br />

of know-how for the malicious use of biological agents have increased the need for socially-grounded approaches to biosecurity.<br />

Moreover, the continuing threat of global pandemics –with its potentially devastating impact on the health, social<br />

and economic stability of <strong>European</strong> society – sharpens these security concerns.<br />

3.7 New technologies, new threats<br />

Having identifi ed the sustained research requirements to deal with generally known means of attack, <strong>ESRIF</strong> recognises that<br />

while new technologies are of paramount importance for to improving security, they may also foster new or transformed<br />

threats. Formerly unaff ordable and high-level technologies may become widely available for malicious use; e.g. high-power<br />

microwave or radio frequency jamming devices can be constructed using simple, off -the-shelf components while mobile<br />

devices are used to initiate or detonate homemade bombs.<br />

Although certain future deliberate misuses of technologies can be foreseen, most cannot. There is no doubt that rapid evolution<br />

in ICT/cyber security and its misuse will continue and even accelerate. Some technologies already identifi ed as candidates for<br />

<strong>ESRIF</strong> FINAL REPORT - PART 1 • <strong>European</strong> Security Research And Innovation Agenda (ESRIA)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!