I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Weight / Cost<br />
Estimate (small2-<br />
5€; med 10-25€;<br />
large 30-40€)<br />
Cluster Timeline<br />
(short-midlong-term)<br />
From WG What? Why? How? Key link<br />
elements<br />
running<br />
No.<br />
y<br />
to cope with<br />
insecurities and<br />
crises) ><br />
malevolent use<br />
of emerging<br />
technology ><br />
human- system<br />
integration ><br />
root causes of<br />
insecurity<br />
Investigate malevolent uses of emerging technologies<br />
from an inter-disciplinary perspective<br />
Understand Human-System Integration aspects of the<br />
operation of security solutions.<br />
y y j g g<br />
technologies reside in the – often unexpected -<br />
use that can be made of them.<br />
med<br />
short term<br />
2<br />
3.1;<br />
3.1; 3.5; 3.11;<br />
3.14<br />
Map, through multidiscipline approaches, relevant<br />
potential pathways to CBRN terrorism (including<br />
radicalisation mechanisms in a CBRN context) and their<br />
unique and specific signatures, sensitive to group<br />
dynamics and technological abilities<br />
Through cautious awareness raising-dialogue gain<br />
support from civil society, law enforcement, academia etc<br />
to detect anomalies<br />
Meta-analysis of the complex threat dilemma and<br />
development of new, non-frequentist and nondeterministic<br />
analysis methods<br />
Methodology to derive the probability of successful<br />
incidents. Input is from actor profiles, actor capabilities,<br />
consequence prediction, probabilitics<br />
Intelligent database development and analysis;<br />
Objective/quantitative algorithms<br />
Modelling capabilities for attack simulation and<br />
intervention planning (in/out-door; urban, sub-urban,<br />
rural, industrial, infrastructure<br />
Ability to prioritize and perform technical assessment<br />
within (inter)national networks<br />
Better and more flexible coverage of emerging threats in<br />
CBRN-related treaties; better defining general purpose<br />
criteria, systems, and having more possibilities and<br />
mandates for monitoring<br />
Creating dual-use awareness<br />
Design of toolbox for monitoring and verification of<br />
implementation of (new) CBRN treaties<br />
Develop alternatives to replace radioactive sources by<br />
non-radioactive means<br />
Before prevention or preparation strategies<br />
can be applied, a complete and accurate<br />
assessment of the CBRN threat is required.<br />
Continuous assessments and foresight then<br />
helps to ascertain the efficacy of prevention<br />
strategies and future investments. An accurate<br />
CBRN threat assessment is also important to<br />
first responders and other crisis management<br />
personnel for setting planning and training<br />
agenda and can help prioritize research in this<br />
critical security area as well.<br />
48 6 CBRN integral threat<br />
assessment:<br />
Surveillance tools for<br />
detection of offensive<br />
capacity with emphasis on<br />
emerging technologies with<br />
dual-use potential; analyzing<br />
actor intention;<br />
Intelligent agent data-base<br />
and sharing capabilities with<br />
high level of standardization<br />
using validated accepted<br />
data;<br />
Systematic identification of<br />
vulnerable targets<br />
med<br />
short to long<br />
term<br />
2<br />
3.2; 3.5; 3.6; 3.7;<br />
The best defense against CBRN terrorist<br />
threats, next to eliminating the cause, is to<br />
prevent extremists from having the availability<br />
of CBRN sources and knowledge.<br />
International legally-binding treaties and<br />
agreements on control of export of sensitive<br />
technologies, materials and knowledge, along<br />
with nationally implemented non-proliferation<br />
measures can reduce the threat of CBRN by<br />
various ways.<br />
49 6 Prevention of CBRN incidents<br />
by effective multinational<br />
counterproliferative<br />
organisational measures:<br />
Increased CBRN-security of<br />
infrastructure (including<br />
knowledge, material, and<br />
equipment) involving<br />
industry, academia, research<br />
institutes, and governmental<br />
267