23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Weight / Cost<br />

Estimate (small2-<br />

5€; med 10-25€;<br />

large 30-40€)<br />

Cluster Timeline<br />

(short-midlong-term)<br />

From WG What? Why? How? Key link<br />

elements<br />

running<br />

No.<br />

y<br />

to cope with<br />

insecurities and<br />

crises) ><br />

malevolent use<br />

of emerging<br />

technology ><br />

human- system<br />

integration ><br />

root causes of<br />

insecurity<br />

Investigate malevolent uses of emerging technologies<br />

from an inter-disciplinary perspective<br />

Understand Human-System Integration aspects of the<br />

operation of security solutions.<br />

y y j g g<br />

technologies reside in the – often unexpected -<br />

use that can be made of them.<br />

med<br />

short term<br />

2<br />

3.1;<br />

3.1; 3.5; 3.11;<br />

3.14<br />

Map, through multidiscipline approaches, relevant<br />

potential pathways to CBRN terrorism (including<br />

radicalisation mechanisms in a CBRN context) and their<br />

unique and specific signatures, sensitive to group<br />

dynamics and technological abilities<br />

Through cautious awareness raising-dialogue gain<br />

support from civil society, law enforcement, academia etc<br />

to detect anomalies<br />

Meta-analysis of the complex threat dilemma and<br />

development of new, non-frequentist and nondeterministic<br />

analysis methods<br />

Methodology to derive the probability of successful<br />

incidents. Input is from actor profiles, actor capabilities,<br />

consequence prediction, probabilitics<br />

Intelligent database development and analysis;<br />

Objective/quantitative algorithms<br />

Modelling capabilities for attack simulation and<br />

intervention planning (in/out-door; urban, sub-urban,<br />

rural, industrial, infrastructure<br />

Ability to prioritize and perform technical assessment<br />

within (inter)national networks<br />

Better and more flexible coverage of emerging threats in<br />

CBRN-related treaties; better defining general purpose<br />

criteria, systems, and having more possibilities and<br />

mandates for monitoring<br />

Creating dual-use awareness<br />

Design of toolbox for monitoring and verification of<br />

implementation of (new) CBRN treaties<br />

Develop alternatives to replace radioactive sources by<br />

non-radioactive means<br />

Before prevention or preparation strategies<br />

can be applied, a complete and accurate<br />

assessment of the CBRN threat is required.<br />

Continuous assessments and foresight then<br />

helps to ascertain the efficacy of prevention<br />

strategies and future investments. An accurate<br />

CBRN threat assessment is also important to<br />

first responders and other crisis management<br />

personnel for setting planning and training<br />

agenda and can help prioritize research in this<br />

critical security area as well.<br />

48 6 CBRN integral threat<br />

assessment:<br />

Surveillance tools for<br />

detection of offensive<br />

capacity with emphasis on<br />

emerging technologies with<br />

dual-use potential; analyzing<br />

actor intention;<br />

Intelligent agent data-base<br />

and sharing capabilities with<br />

high level of standardization<br />

using validated accepted<br />

data;<br />

Systematic identification of<br />

vulnerable targets<br />

med<br />

short to long<br />

term<br />

2<br />

3.2; 3.5; 3.6; 3.7;<br />

The best defense against CBRN terrorist<br />

threats, next to eliminating the cause, is to<br />

prevent extremists from having the availability<br />

of CBRN sources and knowledge.<br />

International legally-binding treaties and<br />

agreements on control of export of sensitive<br />

technologies, materials and knowledge, along<br />

with nationally implemented non-proliferation<br />

measures can reduce the threat of CBRN by<br />

various ways.<br />

49 6 Prevention of CBRN incidents<br />

by effective multinational<br />

counterproliferative<br />

organisational measures:<br />

Increased CBRN-security of<br />

infrastructure (including<br />

knowledge, material, and<br />

equipment) involving<br />

industry, academia, research<br />

institutes, and governmental<br />

267

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!