I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Weight / Cost<br />
Estimate (small2-<br />
5€; med 10-25€;<br />
large 30-40€)<br />
Cluster Timeline<br />
(short-midlong-term)<br />
From WG What? Why? How? Key link<br />
elements<br />
running<br />
No.<br />
Investigate psychological mechanisms to understand<br />
(mass) response to extreme incidents, also related to<br />
other kinds of incidents and accidents<br />
Investigation of effective means to communicate with<br />
the public, e.g. in a crisis situation<br />
Identification of stakeholders crisis are more likely to react proportionally to<br />
Emergency psychological CBRN incidents and hoaxes.<br />
support<br />
While emergency responders are trained for<br />
Media is a key player; the and accustomed to facing stressful situations,<br />
public a responder the public and other services involved in the<br />
response are not<br />
short term small<br />
4<br />
3.3; 3.9; 3.12;<br />
3.14<br />
Research should focus on Data Fusion - Automatic<br />
network reconfiguration<br />
In multi-agency environment often noninteroperable<br />
systems are used to gather and<br />
archive data and meta-data. Information<br />
retrieval including forensic search is currently<br />
cumbersome, time consuming and often not<br />
coherently feasible. Adequate mechanisms for<br />
controlled data access need to be devised<br />
Interworking between public and private<br />
security installations is commonly performed<br />
on an alarm basis in a preconfigured manner,<br />
e.g. permanent connection of alarms to a<br />
security operation centre (SOC).<br />
55 7 Automatic analysis<br />
capabilities adaptive to<br />
dynamic situations.<br />
Global Tracking of naval and<br />
cross-border traffic<br />
mid term small to med<br />
4<br />
3.3; 3.9; 3.12;<br />
3.14<br />
Research should focus on Vulnerability modeling and<br />
analysis<br />
56 7 Sharing of sensors and<br />
sensor data (meta data)<br />
large<br />
short to mid<br />
term<br />
3<br />
3.3; 3.7; 3.9;<br />
3.11; 3.12; 3.14<br />
Research should focus on:<br />
> Standardised adaptive systems for different radio<br />
> NEC concepts.<br />
> Broadband satellite communications infrastructure.<br />
> Satellite based observation systems and<br />
telecommunication infrastructure.<br />
> Space Situational Awarennes and Signal Intelligence<br />
Robust and secured sensor network within an<br />
infrastructure and for remote control and<br />
monitoring. Automatic authentication of<br />
people accessing terminals and networks and<br />
monitoring of network traffic.<br />
Permanent communications infrastructures in<br />
crisis phases need<br />
> Intelligent and proactive intrusion detection<br />
systems (IDS) on critical network infrastructure<br />
in place.<br />
> Use of multimodal biometric identification in<br />
critical infrastructure.<br />
> Overall strategy at <strong>European</strong> level for<br />
tackling cyber-warfare.<br />
57 7 Establishment of a Critical<br />
Infrastructure Warning<br />
Information Network<br />
271