23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Weight / Cost<br />

Estimate (small2-<br />

5€; med 10-25€;<br />

large 30-40€)<br />

Cluster Timeline<br />

(short-midlong-term)<br />

From WG What? Why? How? Key link<br />

elements<br />

running<br />

No.<br />

Investigate psychological mechanisms to understand<br />

(mass) response to extreme incidents, also related to<br />

other kinds of incidents and accidents<br />

Investigation of effective means to communicate with<br />

the public, e.g. in a crisis situation<br />

Identification of stakeholders crisis are more likely to react proportionally to<br />

Emergency psychological CBRN incidents and hoaxes.<br />

support<br />

While emergency responders are trained for<br />

Media is a key player; the and accustomed to facing stressful situations,<br />

public a responder the public and other services involved in the<br />

response are not<br />

short term small<br />

4<br />

3.3; 3.9; 3.12;<br />

3.14<br />

Research should focus on Data Fusion - Automatic<br />

network reconfiguration<br />

In multi-agency environment often noninteroperable<br />

systems are used to gather and<br />

archive data and meta-data. Information<br />

retrieval including forensic search is currently<br />

cumbersome, time consuming and often not<br />

coherently feasible. Adequate mechanisms for<br />

controlled data access need to be devised<br />

Interworking between public and private<br />

security installations is commonly performed<br />

on an alarm basis in a preconfigured manner,<br />

e.g. permanent connection of alarms to a<br />

security operation centre (SOC).<br />

55 7 Automatic analysis<br />

capabilities adaptive to<br />

dynamic situations.<br />

Global Tracking of naval and<br />

cross-border traffic<br />

mid term small to med<br />

4<br />

3.3; 3.9; 3.12;<br />

3.14<br />

Research should focus on Vulnerability modeling and<br />

analysis<br />

56 7 Sharing of sensors and<br />

sensor data (meta data)<br />

large<br />

short to mid<br />

term<br />

3<br />

3.3; 3.7; 3.9;<br />

3.11; 3.12; 3.14<br />

Research should focus on:<br />

> Standardised adaptive systems for different radio<br />

> NEC concepts.<br />

> Broadband satellite communications infrastructure.<br />

> Satellite based observation systems and<br />

telecommunication infrastructure.<br />

> Space Situational Awarennes and Signal Intelligence<br />

Robust and secured sensor network within an<br />

infrastructure and for remote control and<br />

monitoring. Automatic authentication of<br />

people accessing terminals and networks and<br />

monitoring of network traffic.<br />

Permanent communications infrastructures in<br />

crisis phases need<br />

> Intelligent and proactive intrusion detection<br />

systems (IDS) on critical network infrastructure<br />

in place.<br />

> Use of multimodal biometric identification in<br />

critical infrastructure.<br />

> Overall strategy at <strong>European</strong> level for<br />

tackling cyber-warfare.<br />

57 7 Establishment of a Critical<br />

Infrastructure Warning<br />

Information Network<br />

271

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!