23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

56<br />

The threats of cyber criminality comprise a broad range: from direct threats to individuals (e.g. online child sexual<br />

abuse) to threats to the national security of entire countries (large scale attacks on information systems) and<br />

occasionally a global impact cannot be excluded.<br />

Some of these threats are listed hereafter:<br />

- Cyber and physical attacks against IP distribution centres resulting in the paralysis of the Internet<br />

- Dissemination of fear, recruiting, propaganda, fund raising – cyber terrorism<br />

- Interfering, gaining remote control of systems that are strategic for state security and air transport (e.g. water, energy<br />

supply networks; communication, aircraft)<br />

- Dissemination of child sexual abuse materials<br />

- Internet as a medium for anonymous exchange of information on criminal activity<br />

- Data mining (open sources and hacking) Internet resources to fi nd potential targets for terrorist attacks and/or<br />

information on them<br />

- Anonymous access to the Internet leading to e.g. cyber stalking or identity thefts<br />

3. Organised abuse of fi nancial or payment systems<br />

According to the Communication from the <strong>Commission</strong> to the Council and the <strong>European</strong> Parliament on the prevention<br />

of and the fi ght against Organised Crime in the fi nancial sector dated 16/4/2004 COM(2004)262, organised fi nancial<br />

crime is taken to mean activities of organised crime groups which abuse fi nancial or payment systems with a view to<br />

fi nancial gain, a defi nition which is wide enough to embrace certain recent scandals in the corporate sector. This category<br />

comprises a number of important fi nancial threats, from money-laundering to payment systems fraud, to direct attacks<br />

against the critical fi nancial infrastructure of private banks and/or public authorities involved in handling and exchanging<br />

fi nancial information. Organised fi nancial crime can potentially result in a broad societal impact due to lost revenues, loss of<br />

reputation and degradation of public standards. High levels of such crime can discourage the creation of new enterprises,<br />

deter potential investors and distort competition.<br />

As categories of fi nancial crime one can distinguish:<br />

- Counterfeit banknotes and coins. Modern digital equipment off ers growing possibilities for reproduction of banknotes<br />

including some of the specifi c machine-readable features incorporated in Euro banknotes<br />

- Fraud and counterfeiting of non-cash means of payment (principally credit and debit cards and cheque<br />

payments)<br />

- Tax fraud. Especially VAT fraud is a major concern for the Member States and the <strong>European</strong> Community, because this<br />

fraud jeopardises legitimate trade in certain economic sectors and hampers the functioning of the internal market<br />

- llegal transactions related to e.g. export of armaments and weapons, trade of drugs, money laundering,<br />

underground banking<br />

1.2.2.2 Required capabilities<br />

Private players and (inter-)national authorities at all levels have to take care of public security. In order to cope with the above<br />

indicated threats they have to provide for a number of capabilities:<br />

Enhanced resilience of supply chains against pollution with counterfeited products<br />

Improved branding of products or of sealed packages of products can contribute to better and easier possibilities of<br />

authentication in diff erent stages of the supply chain. Also the development of tracking and tracing of goods during<br />

transport is relevant in this context. Standardization of the approach for special product categories seems needed for<br />

successful application. Furthermore the investigation for tracing counterfeited products should be made more professional.<br />

(See Working Group 2 on food and agriculture tracking and tracing).<br />

Enhanced resilience and protection of ICT-infrastructure<br />

Protecting the cyberspace from serious abuses is an important challenge for the years ahead. New protective<br />

technological measures and cooperation between law enforcement agencies cannot lag behind modern<br />

forms of crime. Our citizens expect an adequate response from authorities. An adequate strategy includes a<br />

combination of exploring new avenues and better use of existing instruments to ensure an optimal use of<br />

all available resources at EU level. The elimination of redundant duplications and a better and more intensive<br />

<strong>ESRIF</strong> FINAL REPORT - PART 2 • Working Group: Security of Citizens

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!