23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

254<br />

Weight / Cost<br />

Estimate (small2-<br />

5€; med 10-25€;<br />

large 30-40€)<br />

Cluster Timeline<br />

(short-midlong-term)<br />

From WG What? Why? How? Key link<br />

elements<br />

running<br />

No.<br />

3.1; 3.2; 3.3; mid term<br />

1<br />

- knowledge capitalisation tools (such as event /<br />

intervention data bases, “business” intelligence / process<br />

optimisation tools).<br />

- scenario simulation tools (incl. Virtual reality) for rapid<br />

assessment during crisis<br />

Connectivity / interoperability with the systems of the<br />

various responding or investigating organisations.<br />

Information systems for shortening of the reaction time.<br />

Providing an efficient civil protection requires<br />

a solid cooperation between the various<br />

organisations in charge. Such cooperation<br />

implies strong common procedures to protect<br />

and react.<br />

6 1 Common operation<br />

procedures for civil<br />

protection<br />

Protection of first responders against hostile treatment.<br />

short term<br />

3.1; 3.8; 3.13;<br />

Tools for Common Operational Picture:<br />

Use of data from external on-line data information<br />

sources (including from public peers).<br />

Elaboration of a common policy on the development and<br />

implementation of methods for financial investigations.<br />

<strong>ESRIF</strong> FINAL REPORT - ANNEX II<br />

3<br />

The fraud targeting the financial and payment<br />

systems is growing dramatically. New kinds of<br />

approaches are needed to address this major<br />

problem.<br />

7 1 Enhanced resilience and<br />

protection of the financial<br />

and payment systems<br />

Methods for training of relevant personnel in the private<br />

and the public sector for fighting against organised<br />

financial crimes.<br />

Monitoring systems for detecting counterfeit banknotes<br />

and coins.<br />

Rules and integrity standards for a higher transparency of<br />

financial systems.<br />

Tools and methods for investigations of financial systems.<br />

short term<br />

5<br />

3.1; 3.10; 3.11;<br />

3.13;<br />

Tools for detection of fraud and counterfeiting of noncash<br />

means of payment by the private sector (e.g. the<br />

retail sector).<br />

Protecting the cyberspace from serious abuses Enhanced detection methodologies and<br />

is a vital challenge for the years ahead. New blocking/filtering technologies.<br />

protective technological measures and Improved systems for automatic translation.<br />

cooperation between law enforcement International applicable unique interfaces, protocols,<br />

agencies cannot lag behind modern forms of connectors etc. for trusted exchange of sensitive<br />

crime. Our citizens expect an adequate information.<br />

response from authorities.<br />

Methods and procedures to detect dangerous sites.<br />

New anti virus programs identifying senders of<br />

messages, detecting potentially hostile intent and<br />

warning for malicious sites.<br />

New approaches for investigating the use of Internet.<br />

Search engines for detecting suspicious behaviour<br />

patterns.<br />

8 1 Resilience and protection<br />

against cyber criminality

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!