23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3. Working Group: Border Security<br />

3.1 Introduction<br />

The objectives of border management are to prevent illicit cross border<br />

activities, while facilitating legitimate movements of persons and goods.<br />

According to the Schengen Borders Code, border control comprises<br />

checks on persons at border crossing points and surveillance between<br />

these border crossing points, as well as an analysis of the risks for internal<br />

security and analysis of the threats that may aff ect the security of the<br />

external borders of the <strong>European</strong> Union.<br />

All studied scenarios show that in the long-term perspective, the task<br />

of border management to facilitate legitimate border crossings, while<br />

detecting and preventing illicit activities, will remain a critical capability,<br />

given the expected rising cross-border fl ows of people and goods.<br />

Border control is likely to face increasing demands for effi ciency, which implies a need for technical systems that are user-friendly and reliable<br />

in operational conditions. A general challenge is also to make the technical equipment aff ordable enough to be widely employed.<br />

A further general challenge that applies to all scenarios is interoperability. Europe is developing a policy on Integrated Border<br />

Management that calls for integration between diff erent national authorities related to border security, between the Member<br />

States, and fi nally between the Member States and neighbouring third countries.<br />

These measures call for improved interoperability and standards, operational as well as technical, between the diff erent units.<br />

The interoperability challenge concerns many technical systems, including communications and information systems.<br />

In all situations, border guards will need capabilities to collect intelligence and produce a common situational picture to<br />

identify threats and carry out operations.<br />

Required capabilities for border guards largely depend upon the operating environment. For this reason, WG3 activities were<br />

carried out by four task groups covering Border Checks and Land, Maritime, and Air Border Surveillance.<br />

3.2 Threats, risks and challenges<br />

Legitimate border crossings take place at border crossing points on land or at airports and seaports. Crossings of the land and<br />

maritime borders outside of the border crossing points should be detected and prevented.<br />

Naturally, the threats, risks and challenges faced vary depending on the environment. Furthermore, the threats and risks constantly<br />

evolve, as criminal organisations adapt to the development of border control procedures and technologies. It can be assumed<br />

that some organised criminals have enough resources to deploy countermeasures to some border control systems.<br />

In terms of future threats and scenarios, while the threat from terrorists might increase in scenarios with an increased level of<br />

confl ict, other likely challenges depend more on economic conditions. Growing populations in the <strong>European</strong> neighbourhood,<br />

together with limited improvement in living conditions are likely to create a strong driver for illegal migration.<br />

89

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!