IMSK Integrated Mobile Security Kit

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "IMSK Integrated Mobile Security Kit"

Transcription

1 IMSK Integrated Mobile Security Kit EU Security Research - Achievements & Lessons Learned 1 Brussels November 30th, 2010 Daniel Forsberg, SAAB AB

2 Project details Project Start: 1st of March 2009 Project End: 28th of February 2013 Number of partners in the project: 26 partners Total Cost approximately: EU Contribution requested approximately: Duration: 48 months Project Goal: Enhance the security of the citizens in the scope of events Project high light: Demonstration of the system in September 2012 Web-site: 2

3 Consortium Industries (9 members) Coordinator: Saab AB (SE) Selex Galileo ltd. (UK) Selex Communications S.p.A. (IT) Telespazio S.p.A. (IT), CILAS (FR) Diehl BGT Defence GmbH & CO KG (DE) Thales Security Systems SA (FR) Thales Research and Technology Ltd (UK) Bruker Daltronik GmbH (DE) End users (3 members) Ministère de l intérieur- Service des Technologies de la Sécurité Intérieure (FR) Rikskriminalpolisen, Swedish National Police Board, Nationella Insatsstyrkan (SE) Regione Lombardia (IT) Research Institutes & Universities (8 members) Totalförsvarets Forskningsinstitut, (FOI), Swedish Defence Research Agency (SE) Valtion Teknillien Tutkimuskeskus (VTT) (FI) Commissariat à l'energie Atomique (CEA ) (FR) Deutsches Zentrum für Luft- und Raumfahrt e.v. (DLR) (DE) Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.v (DE) Commission of the European Communities - JOINT RESEARCH CENTRE (IT) Università Degli Studi di Catania, Ingegneria Informatica e Telecomunicazioni (IT) University of Oxford (UK) Small and Medium sized Enterprises (6 members) Thyia Tehnologije d.o.o.(si) AS Regio (EE) EPPRA S.A.S (FR) Qascom S.r.l (IT) TriVision ApS (DK) AirshipVision International S.A (FR) 3

4 IMSK objectives Main goal: enhancement of citizens security in the scope of events Event characteristics large or medium scale, national or international gathering of a large number of people massive security effort required cooperation between different operational forces wider surrounding area (e.g. stations, streets, car parking) and city (hotels, critical infrastructure) to be secured Representative events sports, cultural or political events Examples Olympic Games, high risk football games, political sensitive sport events G8 summits, elections, large demonstrations, royal weddings 4

5 Role in crisis management Crisis prevention Data gathering and data fusion Information analysis and early detection Enhanced situation awareness Decision making Operational preparedness Strategic advanced planning Training Management of declared crisis Response and recovery IMSK main focus IMSK includes training and simulation tools to increase operational readiness Contribute to improved crisis response by providing first responders with an accurate situation display 5

6 Project guidelines The operational needs of security professionals shall be followed IMSK shall rely on innovative security modules The system shall be adaptable to local security forces IMSK s capabilities shall be demonstrated during live trials Project results shall be broadly disseminated, accredited by end users. 6

7 Use of innovative security modules Continuous, efficient and complete threat evaluation Minimized inconvenience for the targets Preserving personal integrity Innovative security module example: high capacity screening 7

8 Project guidelines The operational needs of security professionals shall be followed IMSK shall rely on innovative security modules The system shall be adaptable to local security forces IMSK s capabilities shall be demonstrated during live trials Project results shall be broadly disseminated, accredited by end users. 8

9 Interoperability How the IMSK project will helped to integrate a range of technologies into a common platform (which is consistent with the standardization and interoperability agenda) 9

10 System layout IMSK IMSK Integration Integration platform platform Communication Communication Voice Voice Data Data Command Command & Control Control Checkpoints Checkpoints Area Area Surveillance Surveillance Mobile Mobile Reactive Reactive Surveillance Surveillance Sniper Sniper Detection Detection Support Support Airborne Airborne Segment Segment Decision Decision support support Sensor Sensor modules modules Sensor Sensor modules modules Sensor Sensor modules modules Local Local HMI HMI and and Data Data Processing Processing Training Training (simulation) (simulation) HMI HMI Visualisation Visualisation Data Data processing processing and and data data fusion fusion Data Data processing processing and and data data fusion fusion Data Data processing processing and and data data fusion fusion Sensor Sensor Head Head After After Action Action Review Review Information Information and and Knowledge Knowledge Fusion Fusion Local Local HMI HMI Tools Tools 3D 3D face face reco recosystem Support Support tool tool Enclosed Enclosedmodules Local Local HMI HMI Deployment Deployment aid aid Enclosed Enclosed modules modules 10

11 Logical architecture External Systems All messages accessed through the Integration Platform Common Information Model adopted to TSO (FP6-Oasis) Message, voice and video transmission on same physical network, bandwidth demands differ Sub-systems integrate sensors and provide data to the Integration Platform External and legacy systems may be integrated on demand IMSK Core Support Communication Management Checkpoints External C 2 Area Surveillance Legacy Core Integration Platform Mobile Reactive Surveillance Public Information System Sniper Detection Other IMSK Ext. Comm. Ext. Comm. Ext. Comm. Ext. Comm. E1 I3 I2 Voice Access Communication Msg S7 E2 Backbone Communication Information model Message Access Communication Data and knowledge fusion Command & Control Video Access Communication S1 S2 S3 S4 S5 Voice Video Msg Voice Video Msg Voice Video Msg Voice Msg Voice Video Communication Communication Communication Communication Communication E4 I4 I1 E3 S6 Airborne Segment 11

12 IMSK Integration strategy A system of systems with black box thinking A common protocol to be used The possibilities to write drivers for new or not yet integrated sensors Integration with the protocol not to the other systems Possibility to add sensors into an already existing network without the need to integrate the existing sensors Information Centric Information Infrastructure 12

13 Adaptability Adaptable Use Current / Local Security Procedures Legacy Sensors / Information Systems Increased situation awareness Legacy Communication Integration Core Communication Redundancy IMSK Core Sensor modules Communication platform Information management C2 Integration platform Embedded training Enhancement of security by integration of additional functions filling the required gaps Cost effective enhancement of security by integration of existing capabilities 13

14 Project guidelines The operational needs of security professionals shall be followed IMSK shall rely on innovative security modules The system shall be adaptable to local security forces IMSK s capabilities shall be demonstrated during live trials Project results shall be broadly disseminated, accredited by end users. 14

15 Time schedule Start March End Q Analysis phase Development phase Trail Dev Trial Dissemination 15

16 16 Benefits from a large firm perspective and SME added value

17 Benefits from a large firm perspective The financial help to test and develop new products, markets Marketing possibilities Networking and development of relationships with SME and other Industry. Networking with customers/stake holders on a partnership basis Networking with universities and research organisations New business opportunities as spin-off of the networking Financing of research 17

18 Added value from SME Fast to decisions Close to the market in their segment Enthusiastic Interested and knowledgeable in their area Interested to do the research effective Important to have in mind for industry regarding the SME When the money is out they stop working Make sure to give the SME dedicated tasks 18

19 Benefits to be balanced against: 1. Long time from proposal work to project start 2. Bureaucracy and administration for the reporting is heavy 3. Financing before or after the project 1. Financing of the proposal work 2. Financing of the reporting after the project end 4. Ineffective use of resources 5. Possibilities to shutdown or change the scope 19

20 Summary Main project goal: enhancement of citizens security in the scope of events Main focus: on crisis prevention Approach Analysis of operational requirements System design relying innovative security modules Demonstration of the system Proof of adaptability Dissemination of project results Possibility to add almost any sensor in a later stage 20

21 21

084012/EU XXIV. GP. Eingelangt am 07/06/12. Brussels, 7 June 2012 COUNCIL OF THE EUROPEAN UNION 10983/12 CSCI 22 CSC 37

084012/EU XXIV. GP. Eingelangt am 07/06/12. Brussels, 7 June 2012 COUNCIL OF THE EUROPEAN UNION 10983/12 CSCI 22 CSC 37 084012/EU XXIV. GP Eingelangt am 07/06/12 COUNCIL OF THE EUROPEAN UNION Brussels, 7 June 2012 10983/12 CSCI 22 CSC 37 INFORMATION NOTE From : General Secretariat of the Council To : Delegations No. prev.

More information

Crisis response: what are the main technologies needed?

Crisis response: what are the main technologies needed? Critical Response In SecuritY and Safety emergencies http://www.crisys-project.eu/ Crisis response: what are the main technologies needed? Issued by Thales 10 th May 2012 1 SUMMARY Capabilities recap.

More information

099383/EU XXIV. GP. Eingelangt am 28/11/12. Brussels, 28 November 2012 COUNCIL OF THE EUROPEAN UNION 16932/12 CSCI 54 CSC 86

099383/EU XXIV. GP. Eingelangt am 28/11/12. Brussels, 28 November 2012 COUNCIL OF THE EUROPEAN UNION 16932/12 CSCI 54 CSC 86 099383/EU XXIV. GP Eingelangt am 28/11/12 COUNCIL OF THE EUROPEAN UNION Brussels, 28 November 2012 16932/12 CSCI 54 CSC 86 INFORMATION NOTE From : General Secretariat of the Council To : Delegations No.

More information

Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study

Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study Véronique Pevtschin Engineering Ingegneria Informatica S.p.A CSP Innovation Forum 2015

More information

PReservation Organizations using Tools in AGent Environments

PReservation Organizations using Tools in AGent Environments PReservation Organizations using Tools in AGent Environments PROTAGE Nov 2007 Oct 2010 Conference on Digital Storage and Archiving. Mid- Sweden University 13 14 October 2008 03/11/2008 1 Consortium National

More information

Professional Mobile radio. NEXIUM Wireless Mission-Critical LTE

Professional Mobile radio. NEXIUM Wireless Mission-Critical LTE w w w. t h a l e s g r o u p. c o m Professional Mobile radio NEXIUM Wireless Mission-Critical LTE DEFENCE SECURITY Delivering Defence & Security Mission-Critical LTE Resiliency, availability and security

More information

Topic ICT 1 2014 "Smart Cyber-Physical Systems" Overview of selected projects. CONNECT/A3 Complex Systems & Advanced Computing

Topic ICT 1 2014 Smart Cyber-Physical Systems Overview of selected projects. CONNECT/A3 Complex Systems & Advanced Computing Topic ICT 1 2014 "Smart Cyber-Physical Systems" Overview of selected projects CONNECT/A3 Complex Systems & Advanced Computing Area Coverage The area to be covered is Cyber Physical Systems (CPS): Embedded

More information

Virtual digital libraries: The DILIGENT Project. Donatella Castelli ISTI-CNR, Italy

Virtual digital libraries: The DILIGENT Project. Donatella Castelli ISTI-CNR, Italy Virtual digital libraries: The DILIGENT Project Donatella Castelli ISTI-CNR, Italy The DLs evolution Dynamic Universal Knowledge Environment 2005 Repository of digital texts + search service 1996 Large

More information

An Open Architecture Framework for Safety and Security. Patrick Bikar Solutions Architect, Cisco Public Safety & Security

An Open Architecture Framework for Safety and Security. Patrick Bikar Solutions Architect, Cisco Public Safety & Security An Open Architecture Framework for Safety and Security Patrick Bikar Solutions Architect, Cisco Public Safety & Security 1 Agenda Public Safety and Security: A Complex Discipline An Open Architecture Framework

More information

Doctoral degree scholarship. in aeronautics and space travel technology

Doctoral degree scholarship. in aeronautics and space travel technology Doctoral degree scholarship in aeronautics and space travel technology Scholarship program Munich Aerospace grants scholarships to support young scientists in their doctoral studies. The scholarships are

More information

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal

More information

www.thalesgroup.com Sotas The world class multi-media vehicle system by Courtesy of Comonwealth of Australia

www.thalesgroup.com Sotas The world class multi-media vehicle system by Courtesy of Comonwealth of Australia www.thalesgroup.com The world class multi-media vehicle system by Courtesy of Comonwealth of Australia Optimal Solutions for the Battlefield For many years, is the benchmark for vehicle communication systems,

More information

NEXIUM SAT. Satcom systems solutions

NEXIUM SAT. Satcom systems solutions w w w. t h a l e s g r o u p. c o m NEXIUM SAT Satcom systems solutions DEFENCE SECURITY SATELLITES B ased on its long experience and worldwide leadership in military communications and battlespace digitization,

More information

A System Design for Surveillance Systems Protecting Critical Infrastructures

A System Design for Surveillance Systems Protecting Critical Infrastructures A System Design for Surveillance Systems Protecting Critical Infrastructures 1 FOI (Swedish Defence Research Agency) Box 1165, SE-581 11 Linköping, Sweden {jungert, nikha, niclas.wadstromer}@foi.se Erland

More information

arch. Filippo Terzaghi Esperienze di altri progetti europei: Progetto Streamer - AOU Careggi Project STREAMER 2013-2017

arch. Filippo Terzaghi Esperienze di altri progetti europei: Progetto Streamer - AOU Careggi Project STREAMER 2013-2017 Project STREAMER 2013-2017 Semantics-driven Design through Geo and Building Information Modelling for Energy-efficient Buildings Integrated in Mixed-use Healthcare Districts CP-IP FP7.EeB.NMP.2013-5: Optimised

More information

The role of international transportation sectors in climate stabilization

The role of international transportation sectors in climate stabilization The role of international transportation sectors in climate stabilization H. Preston, D. S. Lee, V. Eyring*, L. Lim Manchester Metropolitan University, UK;* Deutsches Zentrum für Luft- und Raumfahrt (DLR),

More information

Command and Control Integrated Solutions. Transforming security needs into unique custom-made solutions. Building Technologies

Command and Control Integrated Solutions. Transforming security needs into unique custom-made solutions. Building Technologies Command and Control Integrated Solutions Transforming security needs into unique custom-made solutions Building Technologies A Changing World A Basic Need Our cities become more complex; our transportation

More information

Grenzenlos wissen Von der Region in die Welt. Automatisierung von Fahrzeugen

Grenzenlos wissen Von der Region in die Welt. Automatisierung von Fahrzeugen 3. Wissenschaftstag der Europäischen Metropolregion Nürnberg Di, 26. Mai 2009 Hochschule Amberg-Weiden, ACC Grenzenlos wissen Von der Region in die Welt Automatisierung von Fahrzeugen Das EU-Forschungsprojekt

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

FOCUS. Security. Research projects. Innovation serving Comprehensive Protection! In this edition: No 1 - November 2014

FOCUS. Security. Research projects. Innovation serving Comprehensive Protection! In this edition: No 1 - November 2014 FOCUS Security Research projects No 1 - November 2014 In its role as technical platform and forum for gathering and expressing members ideas, UIC is able to synthesise these research needs, along with

More information

Mainstreaming European Military Cyber Defence Training & Exercises

Mainstreaming European Military Cyber Defence Training & Exercises 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises, 23-24 Sep 2013, Mr. Wolfgang Roehrig, Project Officer Cyber Defence Mainstreaming European Military Cyber Defence Training

More information

Intelligent Management System to integrate and control energy generation, consumption and exchange for European Sport and Recreation Buildings

Intelligent Management System to integrate and control energy generation, consumption and exchange for European Sport and Recreation Buildings Conference 2011 Conference under the patronage of the Polish National Contact Point for Research Programmes of the EU Supported by: Let s Construct Europe s Future With Innovative Buildings and Infrastructures

More information

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé

More information

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany. Security systems URBAN SECURITY Information systems protecting major cities with a main goal: to guarantee citizen s well being indracompany.com isafety Urban Security Supports and strengthens coordination

More information

egovernment Digital Agenda Scoreboard 2014

egovernment Digital Agenda Scoreboard 2014 egovernment Digital Agenda Scoreboard 2014 1 egovernment use in EU28 has been flat In 2013 egovernment services have been used by 41% of the EU28 population, down from 44% in 2012 and almost at the same

More information

G-MOSAIC. Project introduction Luboš Kučera Gisat. Project managed by Sergio Proietti Telespazio S.p.A.

G-MOSAIC. Project introduction Luboš Kučera Gisat. Project managed by Sergio Proietti Telespazio S.p.A. GMES services for Management of Operations, Situation Awareness and Intelligence for regional Crises Project introduction Luboš Kučera Gisat Project managed by Sergio Proietti Telespazio S.p.A. G-MOSAIC

More information

LAVOSAR Land Vehicle with Open System Architecture 12.R&T.OP.336 - Public Executive Summary -

LAVOSAR Land Vehicle with Open System Architecture 12.R&T.OP.336 - Public Executive Summary - Land Vehicle with Open System Architecture 12.R&T.OP.336 - Public Executive Summary - Identification: BL 8387 T213 REP Signature: Project Facts Table Contracting Agency: European Defence Agency (EDA) Project

More information

TARGET. Toolkit. Training Augmented Reality Generalised Environment

TARGET. Toolkit. Training Augmented Reality Generalised Environment TARGET Toolkit Training Augmented Reality Generalised Environment TARGET REASON FOR BEING Research & Innovation project H2020 framework 6mil funding over 3 years FCT-07-2014 framework Law enforcement capabilities

More information

Opportunities and Challenges in Software Engineering for the Next Generation Automotive

Opportunities and Challenges in Software Engineering for the Next Generation Automotive Opportunities and Challenges in Software Engineering for the Next Generation Automotive Cyber Physical Systems Electro Mobility Technische Universität München Institut für Informatik Cyber Physical Systems

More information

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation

More information

7 th Meeting. February 01, 2011. Marius Dupuis / marius@vires.com. February 01, 2011 copyright note according to DIN 34 Slide 1

7 th Meeting. February 01, 2011. Marius Dupuis / marius@vires.com. February 01, 2011 copyright note according to DIN 34 Slide 1 7 th Meeting February 01, 2011 Marius Dupuis / marius@vires.com February 01, 2011 copyright note according to DIN 34 Slide 1 Agenda 16:30 Welcome, Agenda and Introduction of Participants 16:35 OpenDRIVE

More information

FOCUS Workshop on Security Research - Drivers, research and outcome. hans.frennberg@foi.se

FOCUS Workshop on Security Research - Drivers, research and outcome. hans.frennberg@foi.se FOCUS Workshop on Security Research - Drivers, research and outcome hans.frennberg@foi.se Workshop - objectives Provide forum for representatives from Swedish security research initiatives to meet and

More information

EU R&I POLICY & DATA-DRIVEN DECISION MAKING. Knowing your innovation ecosystem actors: data on European RTOs

EU R&I POLICY & DATA-DRIVEN DECISION MAKING. Knowing your innovation ecosystem actors: data on European RTOs EU R&I POLICY & DATA-DRIVEN DECISION MAKING Knowing your innovation ecosystem actors: data on European RTOs 13 March 2015 Contents 1. Introduction... 2 2. The distinctive mission of RTOs... 3 3. Lack of

More information

Towards a common methodology for automation FOTs and pilots

Towards a common methodology for automation FOTs and pilots Sami Koskinen, VTT Towards a common methodology for automation FOTs and pilots Technical Workshop Athens, Greece 21 22 APRIL 2016 //Content Field Operational Tests (FOTs) of automated driving Why a common

More information

UK UNCLASSIFIED. Crown Copyright 2012 UK UNCLASSIFIED

UK UNCLASSIFIED. Crown Copyright 2012 UK UNCLASSIFIED 1 Embedding Architecture in the Enterprise Integrated-EA 2012 Wg Cdr Alex Hicks Cap ISTAR DPD Lead Planner Luke Tucker - Niteworks 2 Outline { Background { Approach { Benefits { Lessons { Wider Adoption

More information

Cisco Video Surveillance Services

Cisco Video Surveillance Services Cisco Video Surveillance Services Accelerate the deployment of your flexible, scaleable video surveillance solution while lowering operating costs and managing risk CHALLENGE To access surveillance video

More information

The definitions of Article 2 might be misleading, especially for the definition of public spaces.

The definitions of Article 2 might be misleading, especially for the definition of public spaces. APRIL 2008 Position on European Commission consultation on "Draft Recommendation on the implementation of privacy, data protection and information security principles in applications supported by Radio

More information

IoT Solutions from Things to the Cloud

IoT Solutions from Things to the Cloud IoT Solutions from Things to the Cloud Intel Quark SoC X1000 Applications Marketing Seminar Anaheim, California Oct. 29, 2014 Intel, the Intel logo, the Intel Inside logo, Intel Atom, Intel Core, Quark

More information

CALZONI. Research Activities in Maritime Robotics for Mobility and Manipulation: Industrial and Academic Perspectives

CALZONI. Research Activities in Maritime Robotics for Mobility and Manipulation: Industrial and Academic Perspectives CALZONI Research Activities in Maritime Robotics for Mobility and Manipulation: Industrial and Academic Perspectives Raffaele Grandi, PhD Research Engineer @ Calzoni raffaele.grandi@l-3com.com EMRA 14

More information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?

More information

Fighting Cancer with the (help of) Grid. Jarek Nabrzyski, PSNC naber@man.poznan.pl

Fighting Cancer with the (help of) Grid. Jarek Nabrzyski, PSNC naber@man.poznan.pl Fighting Cancer with the (help of) Grid Jarek Nabrzyski, PSNC naber@man.poznan.pl Outline Cancer informatics Cancer Grid projects European ACGT Project (ehealth) Summary Cancer basics are not covered in

More information

SEC-19-BES-2016: Data fusion for maritime security applications

SEC-19-BES-2016: Data fusion for maritime security applications SEC-19-BES-2016: Data fusion for maritime security applications Research at EXUS 19 on-going projects 12 as coordinator Security Group Current projects / Key people SECURITY OF INFRASTRUCTURES AND UTILITIES

More information

Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need

Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need 1 The Alliance Value Proposition Alliance Value Proposition The threat posed today Terrorist threats

More information

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration Headquarters Air Combat Command AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration This Briefing is: UNCLASSIFIED Mr. John Vona, GS-15 AFC2IC/C2P Purpose Discuss

More information

Security Systems EMERGENCY MANAGEMENT. In security you cannot choose the second best option. indracompany.com

Security Systems EMERGENCY MANAGEMENT. In security you cannot choose the second best option. indracompany.com Security Systems EMERGENCY MANAGEMENT In security you cannot choose the second best option indracompany.com EMERGENCY MANAGEMENT EMERGENCY MANAGEMENT EMERGENCY C4i CENTRE Crisis management and preparednesss

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Service Interoperability

Service Interoperability Service Interoperability Multi-Modal Interoperability Concept (M 1.3.4.1) Version 12/05/2013 Work Package 1.3 Responsible Partner MPDL DARIAH-DE Aufbau von Forschungsinfrastrukturen für die e-humanities

More information

EUROPASS DIPLOMA SUPPLEMENT

EUROPASS DIPLOMA SUPPLEMENT EUROPASS DIPLOMA SUPPLEMENT TITLE OF THE DIPLOMA (ES) Técnico Superior en Administración de Sistemas Informáticos en Red TRANSLATED TITLE OF THE DIPLOMA (EN) (1) Higher Technician in Computer Network Systems

More information

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience INSPIRE: INcreasing Security and Protection through Infrastructure REsilience Salvatore D Antonio Consorzio Interuniversitario Nazionale per l Informatica saldanto@unina.it CRITIS 2008 - Frascati (Italy)

More information

From energy audits to ICT implementation: a methodology applied to sport facilities

From energy audits to ICT implementation: a methodology applied to sport facilities WORKSHOP Challenges, Opportunities, and Lessons Learned from ongoing Research Projects From energy audits to ICT implementation: a methodology applied to sport facilities Enrico Sabbatini UNIVERSITA POLITECNICA

More information

13 th EC GI & GIS Workshop WIN: A new OGC compliant SOA. for risk management. GMV, 2007 Property of GMV All rights reserved

13 th EC GI & GIS Workshop WIN: A new OGC compliant SOA. for risk management. GMV, 2007 Property of GMV All rights reserved 13 th EC GI & GIS Workshop WIN: A new OGC compliant SOA for risk management GMV, 2007 Property of GMV All rights reserved Content 1. Introduction 2. Objectives 3. Architecture and Model 4. Technical aspects

More information

Volume Trends in EU Postal Markets

Volume Trends in EU Postal Markets Volume Trends in EU Postal Markets Antonia Niederprüm 14th Königswinter Seminar, 25-27 November 2013 Postal Regulation and Volumes under Pressure Königswinter, 26 November 2013 0 Agenda 1. Today: Differences

More information

D1.3 Industry Advisory Board

D1.3 Industry Advisory Board Project acronym: Project full name: EDSA European Data Science Academy Grant agreement no: 643937 D1.3 Industry Advisory Board Deliverable Editor: Other contributors: Deliverable Reviewers: Mandy Costello

More information

Horizon 2020. Possibilities of cooperation and first results. Speaker: Zygmunt Krasiński, Director

Horizon 2020. Possibilities of cooperation and first results. Speaker: Zygmunt Krasiński, Director Polish-Ukrainian-German Rectors' Meeting Warsaw, 15 December 2014 Horizon 2020 Possibilities of cooperation and first results Speaker: Zygmunt Krasiński, Director This presentation is based on materials

More information

Press Dossier April 2010

Press Dossier April 2010 Press Dossier April 2010 Content Page Introduction 3 About ARROW 4 ARROW and the European institutions 4, 5 ARROW Partners 6 Work Packages 7 Project Target Groups 7 Project Added Value 8 Expected Results

More information

Get the best performance from your LTE Network with MOBIPASS

Get the best performance from your LTE Network with MOBIPASS Get the best performance from your LTE Network with MOBIPASS The most powerful, user friendly and scalable enodeb test tools family for Network Equipement Manufacturers and Mobile Network Operators Network

More information

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) Certified Foundation Watchkeeper X is built to the same standards as a manned aircraft, and conforms to CAA/MAA standards. It

More information

Comprehensive Emergency Management Education 604.528.5800 1.877.528.5591

Comprehensive Emergency Management Education 604.528.5800 1.877.528.5591 Bachelor of Emergency & Security Management Studies prepare yourself and your team with the most accessible, customizable emergency management training from Canada s Leading Public Safety Educator Comprehensive

More information

Role of ICT in Emergency and Disaster Management

Role of ICT in Emergency and Disaster Management Role of ICT in Emergency and Disaster Management Eswaran Subrahmanian Center for Study of Science Technology and Policy 1 A Framework for Support Technology EMS Decision support Policy & Practices Institutions

More information

PRODUCT CLASSIFICATION FOR ACCOUNTING, BOOKKEEPING AND AUDITING SERVICES; TAX CONSULTANCY SERVICES AND BUSINESS AND MANAGEMENT CONSULTANCY SERVICES

PRODUCT CLASSIFICATION FOR ACCOUNTING, BOOKKEEPING AND AUDITING SERVICES; TAX CONSULTANCY SERVICES AND BUSINESS AND MANAGEMENT CONSULTANCY SERVICES PRODUCT CLASSIFICATION FOR ACCOUNTING, BOOKKEEPING AND AUDITING SERVICES; TAX CONSULTANCY SERVICES AND BUSINESS AND MANAGEMENT CONSULTANCY SERVICES RELEVANCE TEST BASED ON DATA COLLECTED IN THE EU AND

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

Innovative System for Airport Security

Innovative System for Airport Security Innovative System for Airport Security ATOM Airport detection and Tracking Of dangerous Materials by passive and active sensors arrays Roberta Cardinali SESM s.c.ar.l. Outline Introduction to ATOM project

More information

Physical Security. Overview

Physical Security. Overview Physical Security Currently in this Country defence and security including private sector have responded to rising concerns about theft, fraud, and terrorism by sharpening their focus on physical security

More information

PROBANT. Initial feedback from European Research. SRC 08 Paris 29 September 2008. Paris, 29 September. Specialist Crime Investigation Service

PROBANT. Initial feedback from European Research. SRC 08 Paris 29 September 2008. Paris, 29 September. Specialist Crime Investigation Service PROBANT Initial feedback from European Research SRC 08 Paris 29 September 2008 SRC 08, Initial Steering feedback Committee from European Meeting Research, 2, TU Delft, Paris, 25 September 29 September

More information

National Preparedness for Surge Capacity

National Preparedness for Surge Capacity H National Preparedness for Surge Capacity Protecting Critical Assets Against Threats and Vulnerabilities Serving Government Customers Globally K. John Pournoor Ph.D., 3M Global Emergency Preparedness

More information

www. thalesgroup. com Network Management Systems

www. thalesgroup. com Network Management Systems www. thalesgroup. com Network Management Systems NETWORK MANAGEMENT SYSTEMS FROM THALES Based on Thales' highly successful dynamic management software, the NMS family of Link 16 products provides fully

More information

Det talte ord gælder

Det talte ord gælder Thank you for the invitation. I m pleased to be given this opportunity to speak to you about Homeland Security, seen from my point of view. Homeland Security is a concept we ve all grown very familiar

More information

THE SOFTWARE PRODUCTS FOR WATER NETWORKS MANAGEMENT THE CONTROL TECHNOLOGY GROUP. The AQUASOFT family solutions allow to perform:

THE SOFTWARE PRODUCTS FOR WATER NETWORKS MANAGEMENT THE CONTROL TECHNOLOGY GROUP. The AQUASOFT family solutions allow to perform: THE SOFTWARE PRODUCTS FOR WATER NETWORKS MANAGEMENT FAST SpA introduces the AQUASOFT family applications, dedicated to water networks complete supervision. The products are essential for unified management

More information

Stelios C. A. Thomopoulos, PhD -

Stelios C. A. Thomopoulos, PhD - National Centre for Scientific Research Demokritos Cyber Security Research Roadmap, Decision Support System for addressing Privacy Concerns, & Maritime Border Protection Stelios C. A. Thomopoulos, PhD

More information

ESKISP6046.02 Direct security architecture development

ESKISP6046.02 Direct security architecture development Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable

More information

SAFE CITY. The Safe city understands the need for security to evolve from reactive to a proactive and integrated response. PREVENTION + REACTION

SAFE CITY. The Safe city understands the need for security to evolve from reactive to a proactive and integrated response. PREVENTION + REACTION The increased mobility of people combined with the growth in international goods traffic together present national governments and international organizations with new and rapidly changing challenges to

More information

EU Project Aladdin. Mobile. Destination-Management. for SMEs. European Commission

EU Project Aladdin. Mobile. Destination-Management. for SMEs. European Commission Sixth Framework Programme Horizontal Research Activities involving SME s Co-operative Research Project ala din EU Project Aladdin Mobile Destination-Management for SMEs European Commission www.aladdin-project.org

More information

EUROPASS DIPLOMA SUPPLEMENT

EUROPASS DIPLOMA SUPPLEMENT EUROPASS DIPLOMA SUPPLEMENT TITLE OF THE DIPLOMA (ES) Técnico Superior en Sistemas de Telecomunicaciones e Informáticos TRANSLATED TITLE OF THE DIPLOMA (EN) (1) Higher Technician in Telecommunications

More information

DNO Stakeholder Engagement Best Practice Sharing. Customer-Led Network Revolution Low Carbon Case Study 19 th June 2014

DNO Stakeholder Engagement Best Practice Sharing. Customer-Led Network Revolution Low Carbon Case Study 19 th June 2014 DNO Stakeholder Engagement Best Practice Sharing Customer-Led Network Revolution Low Carbon Case Study 19 th June 2014 CLNR is assessing the potential for network technology and customer flexibility solutions

More information

Accreditation Application Forms

Accreditation Application Forms The Institute of Risk Management The Institute of Risk Management Accreditation Application Forms Universities and Professional Associations The Institute of Risk Management Accreditation Application Forms

More information

Digital performance of Italy

Digital performance of Italy Digital performance of Italy Broadband markets At the end of 2013, fixed broadband covered 99% of homes in Italy (97% in the EU). In rural areas, fixed broadband covered 88% of homes. At the same time,

More information

NSCWIP. Social media during a crisis. CCS wants to hear your views. Keeping you updated

NSCWIP. Social media during a crisis. CCS wants to hear your views. Keeping you updated PLEASE NOTE: This newsletter reflects the views/ discussions of members at the NSCWIP meeting. They do not necessarily reflect Government policy. NSCWIP Newsletter of the National Steering Committee for

More information

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M? M 2 M IWG Eclipse, M2M and the Internet of Things Overview M2M? Technology that supports wired or wireless communication between machines. (TechTarget) M2M Market Opportunity Key Trends 1. New connected

More information

Security in Vehicle Networks

Security in Vehicle Networks Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development

More information

THE FUTURE OF SMART GRID COMMUNICATIONS

THE FUTURE OF SMART GRID COMMUNICATIONS THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND

More information

ESSEX FIRE AUTHORITY Essex County Fire & Rescue Service

ESSEX FIRE AUTHORITY Essex County Fire & Rescue Service ESSEX FIRE AUTHORITY Essex County Fire & Rescue Service MEETING Essex Fire Authority AGENDA ITEM 14 MEETING DATE 5 September 2012 REPORT NUMBER SUBJECT REPORT BY Risk and Business Continuity Department

More information

Towards Open Urban Platforms for Smart Cities and Communities. Memorandum of Understanding

Towards Open Urban Platforms for Smart Cities and Communities. Memorandum of Understanding Towards Open Urban Platforms for Smart Cities and Communities Memorandum of Understanding 1. Outline of this Memorandum 1.1. The market for current Urban Platform(s) is fragmented and uncertain on the

More information

Entrepreneurship education in Germany 1

Entrepreneurship education in Germany 1 Entrepreneurship education in Germany 1 1 OVERVIEW The German educational system is decentralised. Both the functional design and the responsibility for education lie primarily with the federal states

More information

An SME perspective on Cloud Computing November 09. Survey

An SME perspective on Cloud Computing November 09. Survey An SME perspective on Cloud Computing November 09 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA

More information

ANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN

ANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN Delegations will find attached the work programme of the European Network of Law Enforcement Technology Services (ENLETS) 2014-2020. COSI is invited to endorse this work programme. 17365/13 EB/hm DG D

More information

CINI Big Data Lab Università degli Studi di Bari Aldo Moro Dip. Informatica

CINI Big Data Lab Università degli Studi di Bari Aldo Moro Dip. Informatica PPP Big Data Value: ruolo e finalità Donato Malerba CINI Big Data Lab Università degli Studi di Bari Aldo Moro Dip. Informatica Big Data Entering the black-box: research challenges, application and business

More information

The Journey to achieving a new production facility in China.

The Journey to achieving a new production facility in China. The Journey to achieving a new production facility in China. 2 Structure of GETRAG GETRAG GETRAG Getriebe- und Zahnradfabrik Hermann Hagenmeyer GmbH & Cie KG GETRAG International GmbH GETRAG s.r.o. GETRAG

More information

Flexiant s FP7 Involvement Supports Academic Partners and Research Institutions to Develop the Next Wave of Cloud Technology

Flexiant s FP7 Involvement Supports Academic Partners and Research Institutions to Develop the Next Wave of Cloud Technology Flexiant s FP7 Involvement Supports Academic Partners and Research Institutions to Develop the Next Wave of Cloud Technology Seventh Framework Programme (FP7) bundles all research-related EU initiatives

More information

RS Components Available with Master Data Product Catalog in CADENAS PARTsolutions Availability of all digital product data from RS Components

RS Components Available with Master Data Product Catalog in CADENAS PARTsolutions Availability of all digital product data from RS Components RS Components Available with Master Data Product Catalog in CADENAS PARTsolutions Availability of all digital product data from RS Components Augsburg, Mörfelden-Walldorf, 9 th of August 2011. RS Components

More information

Dynamic user interface adaptation for mobile computing devices

Dynamic user interface adaptation for mobile computing devices Università degli Studi di Catania Dipartimento di Ingegneria Informatica e delle Telecomunicazioni Dynamic user interface adaptation for mobile computing devices Mario Bisignano, Giuseppe Di Modica, Orazio

More information

Campus Security Guidelines. Recommended Operational Policies for Local and Campus Law Enforcement Agencies

Campus Security Guidelines. Recommended Operational Policies for Local and Campus Law Enforcement Agencies Campus Security Guidelines Recommended Operational Policies for Local and Campus Law Enforcement Agencies A project of William J. Bratton, Chief of Police, Los Angeles President, Major Cities Chiefs Association

More information

Validation & Verification of Safety Critical Systems in the Aerospace Domain.

Validation & Verification of Safety Critical Systems in the Aerospace Domain. Validation & Verification of Safety Critical Systems in the Aerospace Domain. Workshop: Teststrategien und -techniken für Onboardsysteme in der Luft- und Raumfahrt 07.10.2008 Dipl. Ing. Jörg Hofmann 1

More information

Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4.

Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4. Lecture 26 Enterprise Internet Computing 1. Enterprise computing 2. Enterprise Internet computing 3. Natures of enterprise computing 4. Platforms High end solutions Microsoft.Net Java technology 1 Enterprise

More information

VividApps Limited Service Definition Document

VividApps Limited Service Definition Document VividApps Limited Service Definition Document Page 1 of 10 Overview Reap the Benefits of multiple services from a single application, keeping you proactively connected with your clients. Assurity is a

More information

NXP s Solution to ecall Brussels, October 19 th, 2010

NXP s Solution to ecall Brussels, October 19 th, 2010 NXP s Solution to ecall Brussels, October 19 th, 2010 Agenda The Mission of NXP and its Partners NXP s ecall platform Awareness the Next Step Conclusions NXP leads innovation in Telematics Breakthrough

More information

IT Security and OT Security. Understanding the Challenges

IT Security and OT Security. Understanding the Challenges IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control

More information

Company Presentation and Main Activities

Company Presentation and Main Activities S.r.l. Page 1 Company Presentation and Main Activities Via fiume 23, 57123, Livorno - Italy Prof. Marco Luise Dr. Ing. Marco Della Maggiora Company Profile Page 2 Digital Craftmanship www.wiser.it Page

More information

SDR (Software Defined Radio) & Cognitive Radios Overview

SDR (Software Defined Radio) & Cognitive Radios Overview ROMA Telecom Italia LAB SDR (Software Defined Radio) & Cognitive Radios Overview Enrico Buracchini. Outline Overview on Telecom Italia activities on SDR/CR SDR concept and related technological challeges

More information

Mobilität in Deutschland 2008 MID 2008

Mobilität in Deutschland 2008 MID 2008 Institut für Verkehrsforschung Mobilität in Deutschland 2008 MID 2008 (Mobility in Germany) Information Meeting Add-Ons Bonn, 24 July 2007 Contents Contents of of the the Project s Project s Presentation

More information

巨 量 資 料 分 層 儲 存 解 決 方 案

巨 量 資 料 分 層 儲 存 解 決 方 案 巨 量 資 料 分 層 儲 存 解 決 方 案 Lower Costs and Improve Efficiencies Cano Lei Senior Sales Consulting Manager Oracle Systems Oracle Confidential Internal/Restricted/Highly Restricted Agenda 1 2 3 Why Tiered Storage?

More information