A Community of Users on Secure, Safe and Resilient Societies

Total Page:16

File Type:pdf, Size:1020Kb

A Community of Users on Secure, Safe and Resilient Societies A Community of Users on Secure, Safe and Resilient Societies (CoU) Mapping Horizon H2020 and EU-Funded Capacity-Building Projects under 2016-2018 Programmes - October 2019 3 A Community of Users on Secure, Safe and Resilient Societies Mapping Horizon 2020 and EU-funded Capacity-Building Projects under 2016-2018 Programmes October 2019 Community of Users (CoU) VI Mapping - Inners.indd 3 30/10/2019 13:37:24 A Community of Users on Secure, Safe and Resilient Societies (CoU) 4 Mapping Horizon 2020 and EU-funded Capacity-Building Projects under 2016-2018 Programmes - October 2019 Contents 1. EXECUTIVE SUMMARY ..................................................................8 2. OVERVIEW OF TASKS AND OBJECTIVES ...................................................9 2.1 Background .............................................................................9 2.2 Objectives ..............................................................................9 2.3 Logistics ...............................................................................10 2.4 Knowledge transfer .....................................................................10 2.5 Who are the users? ......................................................................12 3. POLICY BACKGROUND .................................................................13 3.1 General framework .....................................................................13 3.2 EU Civil Protection Mechanism and related international policies .............................14 3.3 Critical Infrastructure Protection ..........................................................16 3.4 CBRN and Explosives ....................................................................17 3.4.1 CBRN Action Plan .....................................................................17 3.4.2 Explosive Action Plan and Regulation 98/2013 ...........................................18 3.4.3 International Conventions ..............................................................19 3.5 Major accident hazards ..................................................................19 3.6 Serious cross-border threats to health .....................................................20 3.7 EU Adaptation to Climate Change .........................................................20 3.8 Water and Marine policies ...............................................................21 3.9 Control of export and Union Custom Code .................................................22 3.10 Border security ........................................................................22 3.11 Fight against crime and terrorism .......................................................23 4. EU-FUNDING INSTRUMENTS - RESEARCH AND CAPACITY-BUILDING .........................24 4.1 Introduction ............................................................................24 4.2 Horizon 2020. .24 4.3 DG ECHO ..............................................................................25 4.4 DG HOME / ISF ..........................................................................25 4.5 DG DEVCO - CoE ........................................................................26 4.6 LIFE+ ..................................................................................27 4.7 Structural funds ........................................................................27 4.8 Education and Training ..................................................................27 4.9 JRC. .28 4.9.1 JRC's CBRNE activities .................................................................28 4.9.2 ERNCIP ..............................................................................30 4.9.3 Disaster Risk Management Knowledge Centre (DRMKC) ...................................30 4.9.4 Joint Investment Programme (EDA) .....................................................31 Community of Users (CoU) VI Mapping - Inners.indd 4 30/10/2019 13:37:24 A Community of Users on Secure, Safe and Resilient Societies (CoU) Mapping Horizon 2020 and EU-funded Capacity-Building Projects under 2016-2018 Programmes - October 2019 5 1. DISASTER RISK AND CRISIS MANAGEMENT ...............................................32 1.1 Multi-hazards ..........................................................................32 1.1.1 Multi-risk assessment, including cascading effects ........................................32 1.1.2 Multi-hazard risk reduction, preparedness, resilience enhancement .........................33 1.1.3 Multi-hazards situation awareness / early warning ........................................37 1.1.4 Multi-hazard emergency response and crisis management, including cascading effects .......40 1.1.5 Earth observation support ..............................................................46 1.1.6 Cost assessments of hazards. .47 1.2 Climate hazards ........................................................................48 1.2.1 Multi-climate hazard risk prevention, awareness, preparedness, resilience ...................48 1.2.2 Flood risks. .52 1.2.3 Drought risks .........................................................................59 1.2.4 Coastal risks ..........................................................................59 1.2.5 Forest fire risk prevention ..............................................................60 1.3 Geological hazards ......................................................................62 1.3.1 Multi-geo hazard risk prevention, awareness, preparedness, resilience ......................62 1.3.2 Volcanic risks .........................................................................64 1.3.3 Seismic and earthquake risks ...........................................................66 1.3.4 Tsunami risks .........................................................................69 1.3.5 Landslide risks ........................................................................69 1.3.6 Earth-surface ground deformations .....................................................70 2. HEALTH THREATS .....................................................................71 2.1 Victims triage ..........................................................................71 2.2 Contagions, pandemics ..................................................................74 2.3 Medical Responses ......................................................................78 2.4 Digital security in Health Services .........................................................80 3. FOOD SAFETY AND SECURITY ..........................................................84 3.1 Food safety ............................................................................84 3.2 Supply chain ...........................................................................87 Community of Users (CoU) VI Mapping - Inners.indd 5 30/10/2019 13:37:24 A Community of Users on Secure, Safe and Resilient Societies (CoU) 6 Mapping Horizon 2020 and EU-funded Capacity-Building Projects under 2016-2018 Programmes - October 2019 4. CRITICAL INFRASTRUCTURE PROTECTION AND URBAN BUILT ENVIRONMENT .................88 4.1 Urban soft targets and Urban critical infrastructures ........................................88 4.1.1 Screening of persons, bags, vehicles. .88 4.1.2 Detection of potential CBRN-E threats at urban soft targets / urban critical infrastructures ....89 4.1.3 Cyber and physical threats to urban critical infrastructures and urban soft targets ............89 4.1.4 Protection of Public Spaces ............................................................90 4.2 Critical Infrastructure Sectors ............................................................93 4.2.1 Critical Energy Infrastructure: Electrical Power (Electricity) and Smart Grids, Oil, Gas ...........93 4.2.2 Critical Transport / Transportation Infrastructure ..........................................96 4.2.3 Critical Water Infrastructure ............................................................98 4.2.4 Critical Finance Infrastructure ...........................................................99 4.3 Risk assessment and monitoring ..........................................................99 4.3.1 Multi-sector cyber and physical threats to critical infrastructures, including ICT ...............99 4.3.2 Cascading effects from natural disasters related to critical infrastructures ..................100 4.3.3 Multihazard assessment, stress tests ...................................................100 4.3.4 Remote monitoring and surveillance tools / technologies .................................100 4.3.5 Detection, prevention of intruders; Access Control ........................................101 4.4 Resilience .............................................................................102 4.4.1 Resilience of urban built environments .................................................102 4.4.2 Critical Infrastructure Resilience ........................................................103 5. CBRNE THREATS .....................................................................104 5.1 Major accident hazards .................................................................104 5.2 Chemical threats .......................................................................105 5.3 Biological threats ......................................................................105 5.4 RN emergency .........................................................................106 5.5 Explosives and their precursors ..........................................................106 5.6 Water Safety & Security ................................................................108
Recommended publications
  • Free Ssl Certificate Auto Renew
    Free Ssl Certificate Auto Renew someIs Lawerence Changchun multistorey and junkets or aggravating his shoplifter when so maulswhilom! some Is Andres idealizers untrusty urged when eastwards? Brewster Worth disports Emmit clinically? stagnated Where you may experience technologies for auto renewal validation to free ssl certificate auto renew it! At those, it seems that my certificates were properly installed. Watch for headings inside the exchange server to renew and affordable and grab the popular certificate. Do not available free ssl is not personal blog or you mentioned about website security https appears on that the auto renew free ssl certificate. Dns zone and auto renew ssl manually stop following error that with free ssl certificate auto renew it is it. More info about bringing your users report frustration with auto renew free ssl certificate is way is hella easy credentials ini file with auto renew and you will vary in. Why Do I measure an SSL Certificate Renewal? Just stimulate the help with. Encrypt terms and free ssl certificate auto renew free icons and auto? In the details for everyone, all that is complete automation schedule it may be getting renewed before asking the search engine ranking factors into the address. Or foliage could call us. Content to auto renew free ssl certificate again to auto renew free to do this if pat teacher sets of the bank and certificate? Hi Robert, Can accept tell for your bishop, I did trying just not work. To wheat the Let's Encrypt SSL certificate we need to robe the let's encrypt client software.
    [Show full text]
  • Quarterly Enterprise Software Market Review 1Q 2019
    Quarterly Enterprise Software Market Review 1Q 2019 Boston San Francisco 200 Clarendon Street, Floor 45 601 Montgomery Street, Suite 2010 Boston, MA 02116 San Francisco, CA 94111 Peter M. Falvey Michael H.M. Shea Christopher J. Pingpank Michael S. Barker Managing Director Managing Director Managing Director Managing Director 617.896.2251 617.896.2255 617.896.2218 415.762.8101 [email protected] [email protected] [email protected] [email protected] Jeffrey G. Cook Brad E. McCarthy Misha Cvetkovic Principal Principal Vice President 617.896.2252 617.896.2245 415.762.8104 [email protected] [email protected] [email protected] www.shea-co.com Member FINRA & SIPC Copyright ©2019 Shea & Company Overview People ▪ Industry Expertise ▪ Process Excellence 1 2 24 15+ >70 Firm focused exclusively Offices in Boston and San Professionals focused on Years of experience Transactions completed on enterprise software Francisco the software industry amongst our senior representing billions of bankers dollars in value Mergers & Acquisitions Private Placements & Capital Raising Corporate Strategy ■ Sell-side and buy-side M&A advisory ■ Late-stage venture, growth equity and buyouts ■ Corporate development advisory ■ Divestitures ■ Recapitalizations ■ Balance sheet and capital structure review ■ Restructuring ■ IPO advisory ■ Fairness opinions has received an investment from has received an investment from Superior Outcomes has been acquired by has acquired Shea & Company has advised on important transactions representing billions of dollars in
    [Show full text]
  • Guide to the Open Cloud Open Cloud Projects Profiled
    Guide to the Open Cloud Open cloud projects profiled A Linux Foundation publication January 2015 www.linuxfoundation.org Introduction The open source cloud computing landscape has changed significantly since we published our first cloud guide in October 2013. This revised version adds new projects See also the rise of Linux container and technology categories that have since technology with the advent of Docker gained importance, and in some cases and its emerging ecosystem. You will be radically change how companies approach hard pressed to find an enterprise Linux building and deploying an open source distribution that isn’t yet working on Docker cloud architecture. integration and touting its new container strategy. Even VMware vSphere, Google In 2013, many cloud projects were still Cloud Platform, and Microsoft Azure are working out their core enterprise features rushing to adapt their cloud platforms to the and furiously building in functionality. And open source Docker project. enterprises were still very much in the early stages of planning and testing their public, This rapid pace of innovation and resulting private or hybrid clouds–and largely at the disruption of existing platforms and vendors orchestration layer. can now serve as a solid case study for the role of open source software and Now, not only have cloud projects collaboration in advancing the cloud. consistently (and sometimes dramatically) grown their user and developer Other components of the cloud infrastructure communities, lines of code and commits have also followed suit, hoping to harness over the past year, their software is the power of collaboration. The Linux increasingly enterprise-ready.
    [Show full text]
  • Surveillance by Intelligence Services: Fundamental Rights Safeguards And
    FREEDOMS FRA Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU and remedies safeguards rights fundamental services: intelligence by Surveillance Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Mapping Member States’ legal frameworks This report addresses matters related to the respect for private and family life (Article 7), the protection of personal data (Article 8) and the right to an effective remedy and a fair trial (Article 47) falling under Titles II ‘Freedoms’ and VI ‘Justice’ of the Charter of Fundamental Rights of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). Photo (cover & inside): © Shutterstock More information on the European Union is available on the Internet (http://europa.eu). FRA – European Union Agency for Fundamental Rights Schwarzenbergplatz 11 – 1040 Vienna – Austria Tel. +43 158030-0 – Fax +43 158030-699 fra.europa.eu – [email protected] Luxembourg: Publications Office of the European Union, 2015 Paper: 978-92-9239-944-3 10.2811/678798 TK-04-15-577-EN-C PDF: 978-92-9239-943-6 10.2811/40181 TK-04-15-577-EN-N © European Union Agency for Fundamental Rights, 2015 Reproduction is authorised, provided the source is acknowledged. Printed in Luxembourg Printed on process chlorine-free recycled paper (PCF) Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Mapping Member States’ legal frameworks Foreword Protecting the public from genuine threats to security and safeguarding fundamental rights involves a delicate bal- ance, and has become a particularly complex challenge in recent years.
    [Show full text]
  • Fractured Europe: the Schengen Area and European Border Security
    SPECIAL REPORT Fractured Europe The Schengen Area and European border security Calum Jeffray May 2017 Calum Jeffray Calum Jeffray is a Research Fellow within the National Security & Resilience studies programme at RUSI, and is currently on secondment to the UK Government. Prior to his secondment, he conducted research and analysis on a broad range of national security subjects including organised crime, intelligence, cyber security, counter-terrorism and counter-violent extremism. He was part of the secretariat for RUSI’s Independent Surveillance Review, and undertook research projects on behalf of the European Commission as well as the British, Canadian and Danish governments. About ASPI ASPI’s aim is to promote Australia’s security by contributing fresh ideas to strategic decision‑making, and by helping to inform public discussion of strategic and defence issues. ASPI was established, and is partially funded, by the Australian Government as an independent, non‑partisan policy institute. It is incorporated as a company, and is governed by a Council with broad membership. ASPI’s core values are collegiality, originality & innovation, quality & excellence and independence. ASPI’s publications—including this paper—are not intended in any way to express or reflect the views of the Australian Government. The opinions and recommendations in this paper are published by ASPI to promote public debate and understanding of strategic and defence issues. They reflect the personal views of the author(s) and should not be seen as representing the formal position of ASPI on any particular issue. Important disclaimer This publication is designed to provide accurate and authoritative information in relation to the subject matter covered.
    [Show full text]
  • Global Artificial Intelligence Industry Whitepaper
    Global artificial intelligence industry whitepaper Global artificial intelligence industry whitepaper | 4. AI reshapes every industry 1. New trends of AI innovation and integration 5 1.1 AI is growing fully commercialized 5 1.2 AI has entered an era of machine learning 6 1.3 Market investment returns to reason 9 1.4 Cities become the main battleground for AI innovation, integration and application 14 1.5 AI supporting technologies are advancing 24 1.6 Growing support from top-level policies 26 1.7 Over USD 6 trillion global AI market 33 1.8 Large number of AI companies located in the Beijing-Tianjin-Hebei Region, Yangtze River Delta and Pearl River Delta 35 2. Development of AI technologies 45 2.1 Increasingly sophisticated AI technologies 45 2.2 Steady progress of open AI platform establishment 47 2.3 Human vs. machine 51 3. China’s position in global AI sector 60 3.1 China has larger volumes of data and more diversified environment for using data 61 3.2 China is in the highest demand on chip in the world yet relying heavily on imported high-end chips 62 3.3 Chinese robot companies are growing fast with greater efforts in developing key parts and technologies domestically 63 3.4 The U.S. has solid strengths in AI’s underlying technology while China is better in speech recognition technology 63 3.5 China is catching up in application 64 02 Global artificial intelligence industry whitepaper | 4. AI reshapes every industry 4. AI reshapes every industry 68 4.1 Financial industry: AI enhances the business efficiency of financial businesses
    [Show full text]
  • The EU-India Partnership: Time to Go Strategic? Institute for Security Studies Security for Institute European Union
    The EU-India partnership: time to go strategic? go to time The partnership: EU-India European Union Institute for Security Studies How can India and the EU expand their relationship from its current economic dimension Indian Council of to a broader, security-based dimension? Why is this not happening in spite of expressed World Affairs willingness and the clear reciprocal benefits that would ensue? Is there a lack of frank dialogue on sensitive areas, or is there a more general lack of mutual understanding? The various Indian and European contributors to this volume – the result of long-standing collaboration between the Indian Council of World Affairs (ICWA) and the European Union Institute for Security Studies (EUISS) – assess incipient progress and explore ways to advance India-EU relations in the bilateral and multilateral dimensions of the Strategic Partnership. Although it was launched in 2004, a consensus emerges that such a partnership cannot be called strategic as yet. Continuing discussion and analysis of pressing issues is thus necessary in order to facilitate a breakthrough. This book contains detailed proposals for widening the scope of cooperation to both traditional and non-traditional security issues, such as counter-terrorism, security sector reform in third countries and energy. It also explores the potential for India and the EU to reach consensus in international governance forums, with particular emphasis on economic governance, as well as prospects for effective inter- regional cooperation on the main global security
    [Show full text]
  • Terrorism, Intelligence Sharing and Cooperation in the European Union 2016
    Terrorism, Intelligence sharing and Cooperation in the European Union 2016 Abstract The context in which this paper is written relates to an international threat which in the recent years grew in amplitude and received more and more attention from the political elites, namely the concept of terrorism. This paper puts the concept in the territory of the European Union likewise establishing the boundaries of the research. In completion of the context, the internal security dimension of the European Union will be focused on along with terrorism, which will be referred throughout the paper, while other threats such as cross-border crime will be briefly mentioned. The phenomenon of terrorist attacks grew in density within the European Union in the last two years. Thus, the objective of this paper is to identify some of the gaps in the internal security of the Union which cumbersome the implementation of countering measures. In doing so, the research will start from the premise that more focus should be given to information sharing and cooperation between national security services of the member states and the Union’s security related agencies (e.g. Europol, INTCEN) in order to manage the internal security and tackle terrorism. The base of the latter is rooted in official documents or pieces of communication released by European Union bodies, such as The European Agenda on Security or The Renewed European Union Internal Security Strategy 2015-2020. Then, to contrast, the paper will also bring into discussion an alternative for managing the information flow and internal security by presenting and analyzing some of the proposals for a supranational security body, a European secret service.
    [Show full text]
  • NATO Intelligence Sharing in the 21 Century
    NATO Intelligence Sharing in the 21st Century Columbia School of International and Public Affairs Capstone Research Project, Spring 2013 RESEARCH TEAM FACULTY ADVISOR Keenan Mahoney Dr. Joshua Rovner [email protected] [email protected] Nemanja Mladenovic [email protected] Salvador Molina [email protected] Adam Scher [email protected] Selma Stern [email protected] Christopher Zoia [email protected] TABLE OF CONTENTS Executive Summary 3 Introduction & Framework 4 France 8 Germany 18 Italy 28 Turkey 41 Conclusion 55 Notes 57 Appendix 65 2 EXECUTIVE SUMMARY This report analyzes the opportunities and obstacles for intelligence sharing with select NATO members: France, Germany, Italy, and Turkey. In addition to describing the history, organizational structure, and capabilities of these members’ civilian and military intelligence organizations, the report provides a framework for assessing a country’s propensity to share intelligence based on the following six factors: strategic priorities, security environment, established partnerships, intelligence capabilities, and culture. We hope this framework can serve as an enduring analytical tool for intelligence scholars and practitioners. Based on our research, we conclude the following about the prospects for intelligence sharing with France, Germany, Italy, and Turkey: Due to the insular nature of France’s secret services and the lack of legislative oversight, France’s propensity to share intelligence will depend on the characteristics of its potential partners. France will be likely to share if the partner is involved in similar areas of strategic interest, if it is affected by an event that causes a sense of crisis in France, if there are mutual “boots on the ground,” or if the partner is a member of Five Eyes.
    [Show full text]
  • The Consequences of Brexit for European Defence and Security
    Royal United Services Institute for Defence and Security Studies Occasional Paper The Consequences of Brexit for European Defence and Security Sarah Lain and Veerle Nouwens The Consequences of Brexit for European Defence and Security Sarah Lain and Veerle Nouwens Occasional Paper, April 2017, updated August 2017 Royal United Services Institute for Defence and Security Studies ii The Consequences of Brexit for European Security and Defence About RUSI The Royal United Services Institute (RUSI) is the world’s oldest and the UK’s leading defence and security think tank. Its mission is to inform, influence and enhance public debate on a safer and more stable world. RUSI is a research-led institute, producing independent, practical and innovative analysis to address today’s complex challenges. Since its foundation in 1831, RUSI has relied on its members to support its activities. Together with revenue from research, publications and conferences, RUSI has sustained its political independence for 185 years. London | Brussels | Nairobi | Doha | Tokyo | Washington, DC About the Friedrich-Ebert-Stiftung The Friedrich-Ebert-Stiftung is a non-profit German political foundation committed to the advancement of public policy issues in the spirit of the basic values of social democracy through research, education, and international cooperation. The FES, headquartered in Berlin and Bonn, has thirteen regional offices throughout Germany and maintains an international network of offices in more than 100 countries. The views expressed in this publication are those of the author(s), and do not reflect the views of RUSI, FES or any other institution. Published in 2017 by the Royal United Services Institute for Defence and Security Studies.
    [Show full text]
  • Cloudspectator.Com 02
    HOSTING MARKET ANALYSIS WORLDWIDE MANAGED VS UNMANAGED WORDPRESS HOSTING www.cloudspectator.com HOSTING MARKET ANALYSIS 1.0 INTRODUCTION www.cloudspectator.com You’ve got a serious 02 online business to run? First impressions are everything. what’s the difference? Simply Regardless of whether you’re a said, managed hosting offloads a startup, small business owner, variety of technical tasks to the freelance developer, sys admin, service provider so business agency or full-blown enterprise owners can focus on the things it’s critical that your online that really matter, which is presence resonates with your growing the business and customers, so they remain increasing profits and margins. engaged with your business. However, finding a hosting plan Building and maintaining a that best meets the needs of your professional website alone is no business is not always easy. easy task and the underlying Search engine results provide a infrastructure that powers the wide range of managed and website adds even more unmanaged options and the complexity. Many website owners overwhelming amount of choices simply do neither have the time can be dizzying. nor interest in managing and securing infrastructure. This hosting market analysis is focusing on websites powered by Hosting providers have started to WordPress and is meant to address this problem by offering provide guidance how owners various types of managed hosting and decision makers can find the services, in addition to existing perfect hosting plan for their unmanaged hosting plans. But businesses. 1.0 INTRODUCTION WORLDWIDE WORLDWIDE WordPress Catering for all sorts of industries, WordPress is the most popular content management system (CMS) 33% in the world and has become a powered by major part of the internet since its WordPress.
    [Show full text]
  • Recommendations of the ITLC Enterprise Cloud Strategy Committee
    Recommendations of the ITLC Enterprise Cloud Strategy Committee December 2017 Committee Membership Chair Douglas McCrea New Brunswick Chancellor’s Office Executive Sponsor William Lansbury Office of Information Technology Project Manager Albert Vasquez Office of Information Technology Active Members Mary Ann Chianelli Galen Collier Office of Information Technology Office of Advanced Research Computing Kevin Dowlin Andrew Page Newark Provost’s Office Office of Information Technology Tina Pappas/Jon Oliver Tibor Purger School of Communication and Information Rutgers University Libraries Bruce Rights Arnaldo Rodriguez Office of Information Technology New Jersey Medical School Leon Silver Rutgers University Foundation 1 Forward from Committee Chair The technology world bombards consumers, technologists, and organizational leadership alike with a never-ending stream of all things “cloud.” A procession of vendors race to produce cloud-based solutions and offer enticing rates to migrate to the cloud. It is hard not to feel far behind in the ever-escalating and hype-driven world of technology related to the cloud; a world that offers scalability, agility, and is seemingly far more cost-effective than traditional technology. Faced with large capital investments looming in the future, some institutions have even adopted large-scale all-in migrations to the cloud termed “lift and shift” in order to take advantage of these new technologies. While attending conferences, many of us have listened to speakers tout their embrace of the cloud and how it revolutionized their processes. Armed with this knowledge and feeling far behind, the committee set out to build a strategy to tackle the ostensibly lowest hanging fruit: Capital expenditures in the form of Infrastructure as a Service (IaaS).
    [Show full text]