23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

During the post-disaster phase, after the emergency relief operation is over, work starts on further information-sharing and<br />

sustainable recovery, with emphasis on strengthening civil society for the benefi t, safety and security of the citizens. In the case<br />

of major operations, it is fundamental to organise lessons-learnt sessions that greatly contribute to capitalise knowledge and<br />

to identify best-practices in preparation to other emergencies.<br />

(See Working Group 4 report for in depth analysis of the post-disaster phase)<br />

2. Investigation with respect to crime and terrorism<br />

Public Private Trusted Information Exchange Models are needed for an improved exchange and sharing information across law<br />

enforcement and intelligence agencies with private organizations and companies, with the objective of contrasting the threat<br />

coming from terrorist and organized crime activities.<br />

This is a result of the awareness that terrorist and organized criminal activities are not random and impossible to track. Terrorists<br />

must plan and prepare before the execution of an attack by selecting a target, recruiting and training executors, purchasing<br />

goods, acquiring fi nancial support and travelling to the country where the target is located, disseminating propaganda and<br />

revendication material. In performing these activities they leave, voluntarily and/or involuntarily, traces in huge quantities<br />

and in dispersed ways, inside diff erent public and private organizations or freely on the web, even if they attempt to hide or<br />

disguise their identities.<br />

By analyzing the data coming from the communications and activity patterns among potential terrorists and their contacts<br />

it is possible to prevent attacks or crimes from occurring. Sharing the information about terrorists that is available to law<br />

enforcement and intelligence agencies as well as to private companies (in their databases or available freely in, e.g., web<br />

and press), and linking this data together, can help avoid their actions and disrupt their networks. Gathering and sharing<br />

information that identifi es likely suspects is a critical issue here.<br />

Surveillance of public areas and specifi c locations is essential for early responses to signals indicating the risk of incidents and<br />

an adequate intervention in the event of real security obstructions. Integrated control centres with well organised support<br />

information/intelligence have to provide the coordination of operating activities and must be able to function as crisis centres.<br />

These control centres should be extensively equipped with automatic analysis systems and decision-making assistance<br />

systems and systems for synchronization and reliable interaction between diff erent control- and crisis centres.<br />

Mobile technologies for the examination of counterfeit money, bankcards and documents. This would include implementation<br />

of artifi cial intelligence methods and agent technologies to support operational and investigative activities and evidence<br />

procedures.<br />

Generalise the possibility of rapid and secure transmission of data high fl ow (video, its, images, etc.) between the servers of data<br />

of the police forces. Systematise using fi xed or mobile system for the detection of displaced vehicles used by organised crime<br />

or terrorist organisations.<br />

3. Forensics<br />

Forensic science is the application of a broad range of scientifi c disciplines (e.g. biometrics, molecular biology, analytical<br />

science, informatics…) to matters of legal signifi cance. The forensic science process is complex, involving police, scientifi c and<br />

legal/judicial personnel. Its application relies on an eff ective relationship between lawyers, police, scientists and other forensic<br />

specialists, and is interdependent and crosses professional, organisational and jurisdictional boundaries.<br />

Furthermore, forensic science operates in a rapidly changing environment. New developments in technology such as DNA<br />

analysis have altered the role of forensic science and the contribution that it makes to police investigations and criminal<br />

prosecution. The net contribution of forensic science to criminal justice systems continues to rise and operational loads have<br />

typically doubled in the last fi ve years. The use of technology in criminal investigations is clearly on the steep part of the<br />

growth curve. At the same time, due to the increased possibilities of this technology, the application of forensic science has<br />

become much wider than for the evaluation of evidence in court alone. Besides its ‘traditional’ application in the fi ght against<br />

crime, forensic science off ers huge possibilities in information guided policing, crime prevention and security.<br />

61

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!