I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
56<br />
The threats of cyber criminality comprise a broad range: from direct threats to individuals (e.g. online child sexual<br />
abuse) to threats to the national security of entire countries (large scale attacks on information systems) and<br />
occasionally a global impact cannot be excluded.<br />
Some of these threats are listed hereafter:<br />
- Cyber and physical attacks against IP distribution centres resulting in the paralysis of the Internet<br />
- Dissemination of fear, recruiting, propaganda, fund raising – cyber terrorism<br />
- Interfering, gaining remote control of systems that are strategic for state security and air transport (e.g. water, energy<br />
supply networks; communication, aircraft)<br />
- Dissemination of child sexual abuse materials<br />
- Internet as a medium for anonymous exchange of information on criminal activity<br />
- Data mining (open sources and hacking) Internet resources to fi nd potential targets for terrorist attacks and/or<br />
information on them<br />
- Anonymous access to the Internet leading to e.g. cyber stalking or identity thefts<br />
3. Organised abuse of fi nancial or payment systems<br />
According to the Communication from the <strong>Commission</strong> to the Council and the <strong>European</strong> Parliament on the prevention<br />
of and the fi ght against Organised Crime in the fi nancial sector dated 16/4/2004 COM(2004)262, organised fi nancial<br />
crime is taken to mean activities of organised crime groups which abuse fi nancial or payment systems with a view to<br />
fi nancial gain, a defi nition which is wide enough to embrace certain recent scandals in the corporate sector. This category<br />
comprises a number of important fi nancial threats, from money-laundering to payment systems fraud, to direct attacks<br />
against the critical fi nancial infrastructure of private banks and/or public authorities involved in handling and exchanging<br />
fi nancial information. Organised fi nancial crime can potentially result in a broad societal impact due to lost revenues, loss of<br />
reputation and degradation of public standards. High levels of such crime can discourage the creation of new enterprises,<br />
deter potential investors and distort competition.<br />
As categories of fi nancial crime one can distinguish:<br />
- Counterfeit banknotes and coins. Modern digital equipment off ers growing possibilities for reproduction of banknotes<br />
including some of the specifi c machine-readable features incorporated in Euro banknotes<br />
- Fraud and counterfeiting of non-cash means of payment (principally credit and debit cards and cheque<br />
payments)<br />
- Tax fraud. Especially VAT fraud is a major concern for the Member States and the <strong>European</strong> Community, because this<br />
fraud jeopardises legitimate trade in certain economic sectors and hampers the functioning of the internal market<br />
- llegal transactions related to e.g. export of armaments and weapons, trade of drugs, money laundering,<br />
underground banking<br />
1.2.2.2 Required capabilities<br />
Private players and (inter-)national authorities at all levels have to take care of public security. In order to cope with the above<br />
indicated threats they have to provide for a number of capabilities:<br />
Enhanced resilience of supply chains against pollution with counterfeited products<br />
Improved branding of products or of sealed packages of products can contribute to better and easier possibilities of<br />
authentication in diff erent stages of the supply chain. Also the development of tracking and tracing of goods during<br />
transport is relevant in this context. Standardization of the approach for special product categories seems needed for<br />
successful application. Furthermore the investigation for tracing counterfeited products should be made more professional.<br />
(See Working Group 2 on food and agriculture tracking and tracing).<br />
Enhanced resilience and protection of ICT-infrastructure<br />
Protecting the cyberspace from serious abuses is an important challenge for the years ahead. New protective<br />
technological measures and cooperation between law enforcement agencies cannot lag behind modern<br />
forms of crime. Our citizens expect an adequate response from authorities. An adequate strategy includes a<br />
combination of exploring new avenues and better use of existing instruments to ensure an optimal use of<br />
all available resources at EU level. The elimination of redundant duplications and a better and more intensive<br />
<strong>ESRIF</strong> FINAL REPORT - PART 2 • Working Group: Security of Citizens