How To Build An International Security System



Similar documents
Professional Mobile radio. NEXIUM Wireless Mission-Critical LTE

How To Know What Is In The List Of Approved Cryptographic Products (Lacp)

099383/EU XXIV. GP. Eingelangt am 28/11/12. Brussels, 28 November 2012 COUNCIL OF THE EUROPEAN UNION 16932/12 CSCI 54 CSC 86

An Open Architecture Framework for Safety and Security. Patrick Bikar Solutions Architect, Cisco Public Safety & Security

Virtual digital libraries: The DILIGENT Project. Donatella Castelli ISTI-CNR, Italy

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets

NEXIUM SAT. Satcom systems solutions

Sotas The world class multi-media vehicle system by Courtesy of Comonwealth of Australia

arch. Filippo Terzaghi Esperienze di altri progetti europei: Progetto Streamer - AOU Careggi Project STREAMER

Command and Control Integrated Solutions. Transforming security needs into unique custom-made solutions. Building Technologies

LAVOSAR Land Vehicle with Open System Architecture 12.R&T.OP Public Executive Summary -

OUTCOME OF PROCEEDINGS

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

Mainstreaming European Military Cyber Defence Training & Exercises

Intelligent Management System to integrate and control energy generation, consumption and exchange for European Sport and Recreation Buildings

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.

Cisco Video Surveillance Services

Security Systems EMERGENCY MANAGEMENT. In security you cannot choose the second best option. indracompany.com

SEC-19-BES-2016: Data fusion for maritime security applications

egovernment Digital Agenda Scoreboard 2014

G-MOSAIC. Project introduction Luboš Kučera Gisat. Project managed by Sergio Proietti Telespazio S.p.A.

EUROPASS DIPLOMA SUPPLEMENT

TARGET. Toolkit. Training Augmented Reality Generalised Environment

Opportunities and Challenges in Software Engineering for the Next Generation Automotive

7 th Meeting. February 01, Marius Dupuis / marius@vires.com. February 01, 2011 copyright note according to DIN 34 Slide 1

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

UK UNCLASSIFIED. Crown Copyright 2012 UK UNCLASSIFIED

Role of ICT in Emergency and Disaster Management

EU R&I POLICY & DATA-DRIVEN DECISION MAKING. Knowing your innovation ecosystem actors: data on European RTOs

IoT Solutions from Things to the Cloud

CALZONI. Research Activities in Maritime Robotics for Mobility and Manipulation: Industrial and Academic Perspectives

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

www. thalesgroup. com Network Management Systems

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration

Enhanced resilience for major emergencies Proven capability solutions to deliver the resilience you need

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience

AVC Patent Portfolio License Briefing*

The internet and digital technologies play an integral part

From energy audits to ICT implementation: a methodology applied to sport facilities

Volume Trends in EU Postal Markets

ANNEX ENLETS. Work programme European Network of Law Enforcement Technology Services /13 EB/hm 2 ANNEX DG D 2C LIMITE EN

D1.3 Industry Advisory Board

Horizon Possibilities of cooperation and first results. Speaker: Zygmunt Krasiński, Director

WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)

Get the best performance from your LTE Network with MOBIPASS

OHSC OXFORD HOME STUDY COLLEGE EVENT MANAGEMENT LEVEL - 4

Khalil ROUHANA Director. Directorate-General for Information Society European Commission

Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE

Comprehensive Emergency Management Education

MetroNet6 - Homeland Security IPv6 R&D over Wireless

Innovative System for Airport Security

PRODUCT CLASSIFICATION FOR ACCOUNTING, BOOKKEEPING AND AUDITING SERVICES; TAX CONSULTANCY SERVICES AND BUSINESS AND MANAGEMENT CONSULTANCY SERVICES

PROBANT. Initial feedback from European Research. SRC 08 Paris 29 September Paris, 29 September. Specialist Crime Investigation Service

Stelios C. A. Thomopoulos, PhD -

EUROPASS DIPLOMA SUPPLEMENT

Accreditation Application Forms

Public trainings, In-house seminars, webinars Personal qualification on ISO 26262

Monitoring & Control of Small-scale Renewable Energy Sources

NSCWIP. Social media during a crisis. CCS wants to hear your views. Keeping you updated

THE SOFTWARE PRODUCTS FOR WATER NETWORKS MANAGEMENT THE CONTROL TECHNOLOGY GROUP. The AQUASOFT family solutions allow to perform:

Security in Vehicle Networks

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?

Satellite REPRINTED FROM. John D. Prentice, Stratos Global Corp., USA,

THE FUTURE OF SMART GRID COMMUNICATIONS

The Journey to achieving a new production facility in China.

Digital performance of Italy

Towards Open Urban Platforms for Smart Cities and Communities. Memorandum of Understanding

ANNEX IV. Scientific programmes and initiatives

Entrepreneurship education in Germany 1

OEMC Four Core Missions

An SME perspective on Cloud Computing November 09. Survey

BARCELONA URBAN HABITAT. The vision, approach and projects of the City of Barcelona towards smart cities

Subject: National Preparedness

Transcription:

IMSK Integrated Mobile Security Kit EU Security Research - Achievements & Lessons Learned 1 Brussels November 30th, 2010 Daniel Forsberg, SAAB AB

Project details Project Start: 1st of March 2009 Project End: 28th of February 2013 Number of partners in the project: 26 partners Total Cost approximately: 23 500 000 EU Contribution requested approximately: 14 900 000 Duration: 48 months Project Goal: Enhance the security of the citizens in the scope of events Project high light: Demonstration of the system in September 2012 Web-site: www.imsk.eu 2

Consortium Industries (9 members) Coordinator: Saab AB (SE) Selex Galileo ltd. (UK) Selex Communications S.p.A. (IT) Telespazio S.p.A. (IT), CILAS (FR) Diehl BGT Defence GmbH & CO KG (DE) Thales Security Systems SA (FR) Thales Research and Technology Ltd (UK) Bruker Daltronik GmbH (DE) End users (3 members) Ministère de l intérieur- Service des Technologies de la Sécurité Intérieure (FR) Rikskriminalpolisen, Swedish National Police Board, Nationella Insatsstyrkan (SE) Regione Lombardia (IT) Research Institutes & Universities (8 members) Totalförsvarets Forskningsinstitut, (FOI), Swedish Defence Research Agency (SE) Valtion Teknillien Tutkimuskeskus (VTT) (FI) Commissariat à l'energie Atomique (CEA ) (FR) Deutsches Zentrum für Luft- und Raumfahrt e.v. (DLR) (DE) Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.v (DE) Commission of the European Communities - JOINT RESEARCH CENTRE (IT) Università Degli Studi di Catania, Ingegneria Informatica e Telecomunicazioni (IT) University of Oxford (UK) Small and Medium sized Enterprises (6 members) Thyia Tehnologije d.o.o.(si) AS Regio (EE) EPPRA S.A.S (FR) Qascom S.r.l (IT) TriVision ApS (DK) AirshipVision International S.A (FR) 3

IMSK objectives Main goal: enhancement of citizens security in the scope of events Event characteristics large or medium scale, national or international gathering of a large number of people massive security effort required cooperation between different operational forces wider surrounding area (e.g. stations, streets, car parking) and city (hotels, critical infrastructure) to be secured Representative events sports, cultural or political events Examples Olympic Games, high risk football games, political sensitive sport events G8 summits, elections, large demonstrations, royal weddings 4

Role in crisis management Crisis prevention Data gathering and data fusion Information analysis and early detection Enhanced situation awareness Decision making Operational preparedness Strategic advanced planning Training Management of declared crisis Response and recovery IMSK main focus IMSK includes training and simulation tools to increase operational readiness Contribute to improved crisis response by providing first responders with an accurate situation display 5

Project guidelines The operational needs of security professionals shall be followed IMSK shall rely on innovative security modules The system shall be adaptable to local security forces IMSK s capabilities shall be demonstrated during live trials Project results shall be broadly disseminated, accredited by end users. 6

Use of innovative security modules Continuous, efficient and complete threat evaluation Minimized inconvenience for the targets Preserving personal integrity Innovative security module example: high capacity screening 7

Project guidelines The operational needs of security professionals shall be followed IMSK shall rely on innovative security modules The system shall be adaptable to local security forces IMSK s capabilities shall be demonstrated during live trials Project results shall be broadly disseminated, accredited by end users. 8

Interoperability How the IMSK project will helped to integrate a range of technologies into a common platform (which is consistent with the standardization and interoperability agenda) 9

System layout IMSK IMSK Integration Integration platform platform Communication Communication Voice Voice Data Data Command Command & Control Control Checkpoints Checkpoints Area Area Surveillance Surveillance Mobile Mobile Reactive Reactive Surveillance Surveillance Sniper Sniper Detection Detection Support Support Airborne Airborne Segment Segment Decision Decision support support Sensor Sensor modules modules Sensor Sensor modules modules Sensor Sensor modules modules Local Local HMI HMI and and Data Data Processing Processing Training Training (simulation) (simulation) HMI HMI Visualisation Visualisation Data Data processing processing and and data data fusion fusion Data Data processing processing and and data data fusion fusion Data Data processing processing and and data data fusion fusion Sensor Sensor Head Head After After Action Action Review Review Information Information and and Knowledge Knowledge Fusion Fusion Local Local HMI HMI Tools Tools 3D 3D face face reco recosystem Support Support tool tool Enclosed Enclosedmodules Local Local HMI HMI Deployment Deployment aid aid Enclosed Enclosed modules modules 10

Logical architecture External Systems All messages accessed through the Integration Platform Common Information Model adopted to TSO (FP6-Oasis) Message, voice and video transmission on same physical network, bandwidth demands differ Sub-systems integrate sensors and provide data to the Integration Platform External and legacy systems may be integrated on demand IMSK Core Support Communication Management Checkpoints External C 2 Area Surveillance Legacy Core Integration Platform Mobile Reactive Surveillance Public Information System Sniper Detection Other IMSK Ext. Comm. Ext. Comm. Ext. Comm. Ext. Comm. E1 I3 I2 Voice Access Communication Msg S7 E2 Backbone Communication Information model Message Access Communication Data and knowledge fusion Command & Control Video Access Communication S1 S2 S3 S4 S5 Voice Video Msg Voice Video Msg Voice Video Msg Voice Msg Voice Video Communication Communication Communication Communication Communication E4 I4 I1 E3 S6 Airborne Segment 11

IMSK Integration strategy A system of systems with black box thinking A common protocol to be used The possibilities to write drivers for new or not yet integrated sensors Integration with the protocol not to the other systems Possibility to add sensors into an already existing network without the need to integrate the existing sensors Information Centric Information Infrastructure 12

Adaptability Adaptable Use Current / Local Security Procedures Legacy Sensors / Information Systems Increased situation awareness Legacy Communication Integration Core Communication Redundancy IMSK Core Sensor modules Communication platform Information management C2 Integration platform Embedded training Enhancement of security by integration of additional functions filling the required gaps Cost effective enhancement of security by integration of existing capabilities 13

Project guidelines The operational needs of security professionals shall be followed IMSK shall rely on innovative security modules The system shall be adaptable to local security forces IMSK s capabilities shall be demonstrated during live trials Project results shall be broadly disseminated, accredited by end users. 14

Time schedule Start March 2009 2010 2011 2012 End Q1-2013 Analysis phase Development phase Trail Dev Trial Dissemination 15

16 Benefits from a large firm perspective and SME added value

Benefits from a large firm perspective The financial help to test and develop new products, markets Marketing possibilities Networking and development of relationships with SME and other Industry. Networking with customers/stake holders on a partnership basis Networking with universities and research organisations New business opportunities as spin-off of the networking Financing of research 17

Added value from SME Fast to decisions Close to the market in their segment Enthusiastic Interested and knowledgeable in their area Interested to do the research effective Important to have in mind for industry regarding the SME When the money is out they stop working Make sure to give the SME dedicated tasks 18

Benefits to be balanced against: 1. Long time from proposal work to project start 2. Bureaucracy and administration for the reporting is heavy 3. Financing before or after the project 1. Financing of the proposal work 2. Financing of the reporting after the project end 4. Ineffective use of resources 5. Possibilities to shutdown or change the scope 19

Summary Main project goal: enhancement of citizens security in the scope of events Main focus: on crisis prevention Approach Analysis of operational requirements System design relying innovative security modules Demonstration of the system Proof of adaptability Dissemination of project results Possibility to add almost any sensor in a later stage 20

21 www.imsk.eu