19.11.2014 Views

Towards a Baltic Sea Region Strategy in Critical ... - Helsinki.fi

Towards a Baltic Sea Region Strategy in Critical ... - Helsinki.fi

Towards a Baltic Sea Region Strategy in Critical ... - Helsinki.fi

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CRITICAL INFRASTRUCTURE PROTECTION IN THE BALTIC SEA REGION<br />

As <strong>in</strong> the Green Paper, the Directive requires the establishment of the<br />

Operator Security Plans (OSP) which aim is to identify the ECI owners’ and<br />

operators’ assets and establish relevant security solutions for their protection. In<br />

addition, the OSP should <strong>in</strong>clude a risk analysis based on major threat scenarios,<br />

vulnerability assessment based on common methodologies as well as<br />

identi<strong>fi</strong>cation, selection and prioritisation of counter-measures and procedures<br />

divided between permanent (such security measures which cannot be <strong>in</strong>stalled at<br />

short notice) and graduated security measures (activated based on the prevail<strong>in</strong>g<br />

risk and threat level). It is up to the Security Liaison Of<strong>fi</strong>cer (SLO), appo<strong>in</strong>ted by<br />

ECI owners/operators, to function as the contact po<strong>in</strong>t <strong>in</strong> provid<strong>in</strong>g all the relevant<br />

security <strong>in</strong>formation between the ECI and the member state authority. The CIP<br />

Contact Po<strong>in</strong>t <strong>in</strong>stead coord<strong>in</strong>ates the <strong>in</strong>formation between the Commission, the<br />

Member State itself and other Member States. In all <strong>in</strong>formation exchange and<br />

shar<strong>in</strong>g con<strong>fi</strong>dentiality is regarded as crucial.<br />

While it might be said that the EPCIP is a typical technocratic and<br />

bureaucratic – if not top-down – approach to face common problems, as a whole<br />

the Directive Proposal seems to have found an acceptable compromise between the<br />

needs of multilateral or even supranational cooperation and coord<strong>in</strong>ation and the<br />

national governments’ defensive reactions aga<strong>in</strong>st the threats to their autonomy<br />

and sovereignty <strong>in</strong> a <strong>fi</strong>eld that traditionally has been regarded as their sole legal<br />

responsibility. True, <strong>in</strong> reality several multilateral and EU regulations and<br />

coord<strong>in</strong>ation issues have a long time have to been taken <strong>in</strong>to account <strong>in</strong> national<br />

CIP efforts.<br />

The Commission has prepared the implementation strategy for the Directive<br />

by propos<strong>in</strong>g a EPCIP Action Plan, which would consists of three ‘workstreams’,<br />

much along to the l<strong>in</strong>es proposed <strong>in</strong> the above-mentioned ‘Non-Paper’, def<strong>in</strong>ed as<br />

loss and/or degradation of products or services); 3) Environmental effect; 4) Political effects; 5)<br />

Psychological effects; 6) and Public health consequences. Each Member State then identi<strong>fi</strong>es those<br />

<strong>in</strong>frastructures which satisfy the criteria and noti<strong>fi</strong>es the Commission. (Commission 2006a) The<br />

‘criticality’, <strong>in</strong> turn, is a widely discussed and somewhat flexible concept, as already seen when<br />

review<strong>in</strong>g the different def<strong>in</strong>itions of CI. The International Risk Governance Council (IRGC), for<br />

<strong>in</strong>stance, states that criticality of <strong>in</strong>frastructures depends on several factors as well as on<br />

perception of the <strong>in</strong>dividuals. Moreover, governments have different priorities and criteria for<br />

classify<strong>in</strong>g <strong>in</strong>frastructures that can be different than the priorities of <strong>in</strong>dividuals. Thus, the IRGC<br />

(2005) has suggested three factors which determ<strong>in</strong>e the degree of criticality: 1) Scope – extent of<br />

the population and geographic area covered; 2) Magnitude – potential impact or loss (public<br />

health, economic, environmental) of supply; 3) and Time-effect – additional damage caused by<br />

extended duration of serious impact. ‘Risk assessment’, <strong>in</strong> turn, has been def<strong>in</strong>ed (Risk assessment<br />

and prioritization 2003; see also Moteff 2004, p. 3) as a systematic, analytical process to identify<br />

hazards, establish their likelihood, and assess potential severity of a successful attack on some<br />

element of the system. It <strong>in</strong>volves the <strong>in</strong>tegration of threat, vulnerability, and consequence<br />

<strong>in</strong>formation. They are necessary for selection and implementation of actions to reduce the risk<br />

associated with exist<strong>in</strong>g or anticipated threats. From the perspective of deliberate threats, risk<br />

assessment should <strong>in</strong>clude three basic components: 1) assessment of the threat environment<br />

(likelihood for an attack); 2) vulnerability of the system (likelihood that an attack will be<br />

successful); 3) and the criticality and magnitude of the possible consequences (impact of a<br />

successful attack). It is important that risk assessment is iterative and periodically updated to<br />

determ<strong>in</strong>e how risks change based on implementation of safeguards and countermeasures. Many<br />

models and methodologies have been developed by which threats, vulnerabilities, and risks are<br />

<strong>in</strong>tegrated and then used to <strong>in</strong>form the cost effective allocation of resources to reduce those risks.<br />

44 NORDREGIO REPORT 2007:5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!