23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.10 Border Security<br />

The main focuses in the fi eld of border security are the effi cient and eff ective control of the fl ow of people and goods at border<br />

crossing points, and surveillance of border areas – land, sea or airspace – beyond those border crossing points. Detection of<br />

anomalies in large, regular fl ows and the use of mobile technologies in mobile environments such as trains and boats are<br />

important topics. For the usage of mobile devices it is important to implement secure data transfer technology. Proactive<br />

methods of processing ID checks and controls have to be developed.<br />

Research is needed to improve current systems for checking people and scanning goods at border crossings in a secure,<br />

convenient and effi cient manner. This includes biometrics for identifi cation of people and sensors for screening goods.<br />

Furthermore, a holistic approach to border management, including an understanding of border activities within and beyond<br />

Europe, is needed to ensure effi cient border management.<br />

Another area where research is needed is sensor and information systems for detecting non-cooperative and non-registered<br />

vessels at sea, and for detecting anomalies in the traffi c fl ow.<br />

Interoperability is essential to make border security more effi cient. Research must cover technical interoperability aspects<br />

between deployed systems, as well as interoperability at the organisational level, taking into account the diversity of<br />

cross-border cultures. Interoperability may also be enhanced through harmonised or common operational procedures for<br />

development, acquisition and training.<br />

The ultimate output of research and innovation initiatives must be aff ordable and user-friendly equipment. Social science<br />

research for understanding and modelling various risks related to border security is also of crucial importance.<br />

3.11 Identity management and protection<br />

Citizens expect high levels of security from digital systems. The absence of written and visual proof has given rise to demand<br />

for high levels of identifi cation and authentication of parties and transactions. Without adequate protection, personal data and<br />

individual credentials are vulnerable in a virtual world. <strong>ESRIF</strong> proposes to address research topics that enhance the accuracy<br />

of biometric devices by developing strong authentication processes and technologies, and that improve methods of secure<br />

online authentication of individuals, regardless of which digital identity element they use.<br />

Digital identity is increasingly an integral part of an individual’s identity. The particular set of data linked to "digital identity"<br />

should be protected using the results of robust research. <strong>ESRIF</strong> has identifi ed research domains to counteract identity theft.<br />

The current lack of solutions costs companies, countries and citizens billions of euros in fraud and theft, and undermines global<br />

and fi nancial security. Moreover, to combat fraud systems and technologies should perform mutual recognition between<br />

regional, national and/or <strong>European</strong> systems.<br />

Correct identifi cation of individuals within health systems, together with appropriate medical records, is always a priority.<br />

Systems need to be developed that support unavoidable exchanges of patient information on a national and transnational<br />

basis but which protect individual identity and privacy rights at the same time.<br />

<strong>ESRIF</strong> advocates implementation of a ‘privacy by design’ data protection approach that should be part of an information<br />

system’s architecture from the start. To ensure real eff ectiveness, this privacy-by-design” protection should combine general<br />

privacy controls, a separation of data of diff erent streams, privacy management systems, and eff ective ‘anonymisation’ of<br />

personal data. Research in these areas must be pursued to ensure that eff ective solutions are available as soon as possible.<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!