Horizon 2020 Secure Societies

advertisement
Horizon 2020
Secure Societies
• Khoen Liem
Security Research and Industry
DG Enterprise and Industry
Tel Aviv, 24 Feb. 2014
2013
FP7: successes and lessons learned
• Some FP7 project results:
• -have been rapidly integrated into successful
commercial products
• - produced (lasting) benefits to stakeholders (even
outside the consortium involved)
• First lessons:
• - independent testing and validation of the results
recommended at the end
• - greater emphasis should be given to dissemination
to users' community
• - Large scale initiatives have given visibility
H-2020 Key pillars
 Supporting Europe's excellent
science base
 Building industrial
leadership in Europe
 Tackling societal challenges
for a better society
 Secure societies
Security: a societal challenge
It concerns the protection of citizens, society and
economy as well as Europe's assets, infrastructures
and services, its prosperity, political stability and
well-being.
Any malfunction or disruption, intentional or
accidental, can have a detrimental impact with high
associated economic or societal costs.
Secure Societies: does industry matter?
The security industry is one of the sectors with highest potential for
growth and employment in the EU. In 2011, the sector employed 180,000
people, with an annual turnover of approximately €30 billion.
• Overcoming market fragmentation through EU-wide standards
• Reducing the gap from research to market by introducing new funding
schemes such as Pre-Commercial Procurement
• Better integration of societal considerations by thoroughly assessing
the impact of security technologies on fundamental rights
Security Research
•
•
•
•
•
•
Maintains its mission driven character
Supports EU internal and external security policies
Supports the EU industry to be competitive
Strengthens the involvement of the end-users
Takes more into account the Societal Dimension
Includes Cyber-Security
European Cyber
Security Strategy
Objectives of security research in H2020
• Reinforce support for the EU's internal and
external security strategy
• Improve the competitiveness of EU industries
• Address security gaps and prevent threats to
security
• Maintain a mission-oriented approach and
integrate end-users needs
• Enhance the societal dimension and coordination
Objectives of security research in H2020
• Reinforce support for the EU's internal and
external security strategy
Lisbon Treaty
• Improve the competitiveness of EU industries
• Address security gaps and prevent threats to
security
• Maintain a mission-oriented approach and
integrate end-users needs
• Enhance the societal dimension and coordination
"Secure Societies" in Horizon 2020
Protecting Freedom and Security of Europe and its Citizens
REGULATION (EU) No 1291/2013
• OBJECTIVES
1. Fight crime, illegal trafficking and terrorism, including understanding and
tackling terrorist ideas and beliefs
2. Protect and improve the resilience of critical infrastructures, supply chains
and transport modes
3. Strengthen security through border management
4. Improve cyber security
5. Increase Europe's resilience to crises and disasters
6. Ensure privacy and freedom, including in the Internet and enhancing the
societal legal and ethical understanding of all areas of security, risk and
management
7. Enhance standardisation and interoperability of systems, including for
emergency purposes
6. Support the Union's external security policies including through conflict
prevention and peace-building
11
Strong link to EU policy initiatives
- The EU Internal Security Strategy in Action,
COM(2010)673
- Towards a stronger European disaster response: the role of civil
protection and humanitarian assistance, COM(2010)600
- The EU Action Plan on combating terrorism
- The Security Industry Policy Action Plan
COM (2012) 417
- Cybersecurity Strategy of the European Union: An Open, Safe and
Secure Cyberspace JOIN(2013) 1 final
- Flagship Initiative 'Digital Agenda for Europe'
- The EU Strategy towards the Eradication of Trafficking in Human
Beings 2012–2016, COM(2012) 286
- European Programme for Critical Infrastructure Protection (EPCIP),
COM(2006)786
- Civilian Headline Goal 2008
- EU Maritime Security Strategy……(2014)
EU Policy implementation:
strategic approach
EU Bodies
Member States
(Committees)
DG SANCO
Consumer
health
EDA
Defence
EEAS
DG HOME
Ext. security
Internal
Security
Customs
DG ENV
Environment
FPI
Foreign Policy
Instrument
DG TAXUD
DG ENTR
DG CNECT
Security
Comm.
DG TRADE
Trade
DG DEVCO
International
cooperation
ECHO
DG RTD
Civil
protection
Research
DG MOVE
JRC
Joint Res.
Centre
Transport
Agencies
EU Policies
EU Research
+ UN Bodies, NATO
Industry, Stakeholders, NGO’s, Researchers, Experts, etc.
13
Features
 Strengthened coordination with relevant EUAgencies: FRONTEX, EUROPOL, ENISA, EMSA, euLISA etc.
 Closer coordination with the activities of EDA
 Pre-Commercial Procurement (PCP) instrument
14
Structure of the Secure Societies
Work Programme
• Disaster Resilient Societies
•
– ENTR (+ R&I)
Crisis management and civil protection, critical infrastructure protection
• Fight against Crime and Terrorism
•
Forensics, law enforcement capabilities, ethical/societal dimension
• Border Security
•
- ENTR
Border crossing points, information management, supply chain security
• Digital Security
•
- ENTR
– CNCT (+ ENTR)
Privacy, access control, trust eServices, Secure information sharing
Disaster Resilient Societies
safeguarding and securing society, including adapting to climate change
The DRS-call is divided in the following sub-sectors:
• Crisis management and Civil Protection
• Disaster Resilience & Climate Change
[These topics come from the Environment Challenge 5 – with their budget.]
• Critical Infrastructure Protection
• Communication interoperability
• Ethical/Societal Dimension
2014: 62,4 Mio / 2015: 65,1 Mio
Disaster-resilience
Crisis management and Civil Protection
DRS-1-2015: Crisis management topic 1: Potential of current and new measures and
technologies to respond to extreme weather and climate events
DRS-2-2014: Crisis management topic 2: Tools for detection, traceability, triage and
individual monitoring of victims after a mass CBRN contamination and/or exposure
DRS-3-2015: Crisis management topic 3: Demonstration activity on large scale disasters and
crisis management and resilience of EU external assets against major identified threats or
causes of crisis
DRS-4- 2014: Crisis management topic 4: Feasibility study for strengthening capacity-building
for health and security protection in case of large-scale pandemics – Phase I Demo
DRS-5-2014: Crisis management topic 5: Situation awareness of Civil Protection decisionmaking solutions – preparing the ground for a Pre-commercial Procurement (PCP)
DRS-6-2015: Crisis management topic 6: Addressing standardisation opportunities in support of
increasing disaster resilience in Europe
DRS-7-2014: Crisis management topic 7: Crises and disaster resilience – operationalizing
resilience concepts
Call - Disaster-resilience
Disaster Resilience & Climate Change
DRS-9-2014/2015: Disaster Resilience & Climate Change topic 1: Science and
innovation for adaptation to climate change: from assessing costs, risks and
opportunities to demonstration of options and practices
DRS-10-2015: Disaster Resilience & Climate Change topic 2: Natural Hazards:
Towards risk reduction science and innovation plans at national and European level
DRS-11-2015: Disaster Resilience & Climate Change topic 3: Mitigating the impacts
of climate change and natural hazards on cultural heritage sites, structures and
artefacts
Call - Disaster-resilience
Critical Infrastructure Protection
DRS-12-2015: Critical Infrastructure Protection topic 1: Critical Infrastructure “smart grid”
protection and resilience under “smart meters” threats
DRS-13-2015: Critical Infrastructure Protection topic 2: Demonstration activity on tools for
adapting building and infrastructure standards and design methodologies in vulnerable
locations in case of natural or man-originated catastrophes
DRS-14-2015: Critical Infrastructure Protection topic 3: Critical Infrastructure resilience
indicator - analysis and development of methods for assessing resilience
DRS-15-2015: Critical Infrastructure Protection topic 4: Protecting potentially hazardous and
sensitive sites/areas considering multi-sectorial dependencies
DRS-16-2014: Critical Infrastructure Protection topic 6: Improving the aviation security chain
DRS-17-2014/2015: Critical infrastructure protection topic 7: SME instrument topic:
“Protection of urban soft targets and urban critical infrastructures”
Call - Disaster-resilience
Communication interoperability
DRS-18-2015: Communication technologies and interoperability topic 1: interoperable next
generation of broadband radio communication system for public safety and security – Precommercial Procurement (PCP)
DRS-19-2014: Communication technologies and interoperability topic 2: Next generation
emergency services ("112 – cross border")
Call - Disaster-resilience
Ethical/Societal Dimension
DRS-20-2014: Ethical/Societal Dimension topic 1: Improving protection of Critical
infrastructures from insider threats
DRS-21-2014: Ethical/Societal Dimension topic 2: Better understanding the links between
culture, risk perception and disaster management
DRS-22-2015: Ethical/Societal Dimension topic 3: Impact of climate change in third countries
on Europe's security
Policies matters - EXAMPLE
DRS-16-2014:
Critical Infrastructure Protection topic 6: Improving
the aviation security chain
•
…Aviation
Security
is
governed
by
EU
as Directive 2008/114/EC of 8 December 2008….
•
Policy
is
moving
towards
more
risk-based,
focused, passenger-facilitation oriented measures
•
…risk-based
security
and
on passengers and industry
•
COPRA Aviation Security Research Roadmap:
a
reduced
legislation,
operational
http://www.copra-project.eu/Results.html
•
Flightpath 2050: Europe’s vision for aviation:
http://ec.europa.eu/transport/modes/air/doc/flightpath2050.pdf
•
IATA Checkpoint of the Future:
http://www.iata.org/whatwedo/security/pages/checkpoint-future.aspx
such
outcomeimpact
Fight against Crime and Terrorism
The FCT-call is divided in the following subsectors:
• Forensics
• Law enforcement capabilities
• Urban security
• Ethical/Societal Dimension
2014: 56,8 Mio / 2015: 44,3Mio
Call – Fight against crime and Terrorism
Forensics
FCT-1-2015: Forensics topic 1: Tools and infrastructure for the fusion, exchange and
analysis of big data including cyber-offenses generated data for forensic investigation
FCT-2-2015: Forensic topic 2: Advanced easy to use in-situ forensic tools at the scene of
crime
FCT-3-2015: Forensics topic 3: Mobile, remotely controlled technologies to examine a crime
scene in case of an accident or a terrorist attack involving CBRNE materials
FCT-4-2015: Forensics topic 4: Internet Forensics to combat organized crime
Call – Fight against crime and Terrorism
Law enforcement capabilities
FCT-5-2014: Law enforcement capabilities topic 1: Develop novel monitoring systems
and miniaturised sensors that improve Law Enforcement Agencies' evidence- gathering
abilities
FCT-6-2015: Law Enforcement capabilities 2: Detection and analysis of terrorist-related
content on the Internet
FCT-7-2014: Law enforcement capabilities topic 3: Pan European platform for serious
gaming and training
FCT-8-2014: Law enforcement capabilities topic 4: Trans-national cooperation among
public end-users in security research stakeholders
FCT-9-2015: Law Enforcement capabilities topic 5: Identity Management
Call – Fight against crime and Terrorism
Urban security
FCT-10-2014: Urban security topic 1: Innovative solutions to counter security challenges
connected with large urban environment
FCT-11-2014: Urban security topic 2: Countering the terrorist use of an explosive
threat, across the timeline of a plot, including the detection of explosives in a flow
FCT-12-2014: Urban security topic 3: Minimum intrusion tools for de-escalation during
mass gatherings improving citizens’ protection
Call – Fight against crime and Terrorism
Ethical/Societal Dimension
FCT-13-2014: Ethical/Societal Dimension Topic 1: Factors affecting (in-) security
FCT-14-2014: Ethical/Societal Dimension Topic 2: Enhancing cooperation between law
enforcement agencies and citizens - Community policing
FCT-15-2015: Ethical/Societal Dimension Topic 3: Better understanding the role of new
social media networks and their use for public security purposes
FCT-16-2015: Ethical/Societal Dimension Topic 4 - Investigating the role of social,
psychological and economic aspects of the processes that lead to organized crime
(including cyber related offenses), and/or terrorist networks and their impact on social
cohesion
FCT-17-2015: Fast track to Innovation Topic
Border Security and External Security
The
•
•
•
•
•
•
BES-call is divided in the following sub-sectors
Maritime Border Security
Border crossing points
Supply Chain Security
Information Management
Conflict prevention and Peace building
Ethical/Societal Dimension
• 2014: 20,8 Mio / 2015: 44,4 Mio
Call – Border Security and External Security
Maritime Border Security
BES-1-2015: Maritime Border Security topic 1: radar systems for the surveillance of coastal and
pre-frontier areas and in support of search and rescue operations
BES-2-2015: Maritime Border Security topic 2: Low cost and “green” technologies for EU coastal
border surveillance
BES-3-2015: Maritime Border Security topic 3: Light optionally piloted vehicles (and sensors) for
maritime surveillance
BES-4-2015: Maritime Border Security topic 4: Detection of low flying aircraft at near shore air
space
Call – Border Security and External Security
Border crossing points
BES-5-2015: Border crossing points topic 1: Novel mobility concepts for land border security
BES-6-2015: Border crossing points topic 2: Exploring new modalities in biometric-based border
checks
BES-7-2015: Border crossing points topic 3: Optimization of border control processes and
planning
Supply Chain Security
BES-8-2015: Supply Chain Security topic 1: Development of an enhanced non-intrusive (standoff) scanner
BES-9-2014: Supply Chain Security topic 2: Technologies for inspections of large volume freight
Call – Border Security and External Security
Information Management
BES-10-2015: Information management topic 1: Civilian humanitarian mission personnel tracking
BES-11-2015: Information management topic 2: Information management, systems and
infrastructure for civilian EU External Actions
Conflict prevention and Peace building
BES-12-2014: Conflict prevention and peace building topic 1: Enhancing the civilian conflict
prevention and peace building capabilities of the EU
BES-13-2015: Conflict prevention and peace building topic 2: Training curricula for Conflict
Prevention and Peace Building personnel
Ethical/Societal Dimension
BES-14-2014: Ethical Societal Dimension topic 1: Human factors in border control
Digital Security
The DS-call concerns the following subjects:
• Privacy
• Access Control
• The role of ICT in Critical Infrastructure Protection
• Secure Information Sharing
• Trust eServices
• Risk management and assurance models
• 2014: 47,0 Mio / 2015: 50,3 Mio
Call – Digital Security: Cybersecurity, Privacy and Trust
DS-1-2014: Privacy
DS-2-2014: Access Control
DS-6-2014: Risk management and assurance models
DS-3-2015: The role of ICT in Critical Infrastructure Protection
DS-4-2015: Secure Information Sharing
DS-5-2015: Trust eServices
Time line
Call open: 25 March 2014
Call closed: 28 Aug 2014
Info on outcome of Evaluation:
end December 2014
Signature of Grant Agreements:
starting March 2015
Website: http://ec.europa.eu/research/participants/portal/desktop/en/home.html
Cyber
Security
Citizens, businesses and administrations
increasingly involved in digital
interactions and transactions.
Internet led to cyber-crime worth B€/
year, to attacks to critical infrastructures
and to breaches of privacy.
Lack of security of digital technologies is
a risk for economy and society.
Cyber security has become a political
and economic priority.
Eurobarometer: 50% of the EU citizens
are worried (percentage increasing)
Cyber security has become part of "Secure
Societies“
Challenges:
- How to assess the threats in cyber-space and their possible scope?
- How to best tackle cyber-threats and protect citizens in the digital
domain?
Convergence of traditional security needs and the digital world. Many
infrastructures and services privately owned and operated, yet protection
of public (safety and) security is responsibility of public authorities.
Security is an issue that can only be tackled effectively if all
stakeholders cooperate: companies and authorities must work
together across borders.
Maritime Security: European Council calls for action
In the December 2013 conclusions, the European
Council called for "an EU Maritime Security
Strategy by June 2014, on the basis of a joint
Communication from the Commission and the High
Representative, taking into account the opinions of
the Member States, and the subsequent elaboration
of action plans to respond to maritime challenges"
By doing so the Council highlighted the importance
of the topic and encouraged the Commission to
take action in the field of maritime security.
Maritime Security: International Instruments
• International Convention for the Safety of Life at Sea, 1974, as amended (London, 1
November 1974, entered into force 1 May 1991) 1184 UNTS 3; 14 ILM 959 (SOLAS)
• International Convention on Maritime Search and Rescue (Hamburg, 27 April 1979,
entered into force 22 June 1985) 1405 UNTS 97 (SAR Convention)
• United Nations Convention on the Law of the Sea (Montego Bay, 10 December 1982,
entered into force 16 November 1994) 1833 UNTS 3; 21 ILM 1261 (LOSC)
• Convention on the High Seas (Geneva, 29 April 1958, entered into force 30 September
1962) 13 UST 2312; 450 UNTS 11 (HSC)
• Convention on the Territorial Sea and the Contiguous Zone (Geneva, 29 April 1958,
entered into force 10 September 1964) 15 UST 1606; 516 UNTS 205 (TSC)
• Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms
Located on the Continental Shelf (Rome, 10 March 1988, entered into force 1 March
1992) 27 ILM 685 (SUA Protocol)
• Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances
(Vienna, 20 December 1988, entered into force 11 November 1990) UN Doc
E/CONF.82/15; 28 ILM 493 (Vienna Drugs Convention)
Agreement concerning cooperation in Suppressing Illicit Maritime and Air Trafficking in
Narcotic Drugs and Psychotropic Substances in the Caribbean Area (San Jose, Costa Rica,
10 April 2003, not yet in force) (Aruba Agreement)
• ……
Research routes in R&D for Maritime
(Border) Security
Systems of systems demonstration
- Combination of IP results
- Multi-mission
-Demonstration Programme
PERSEUS (27 M€ EC contr.)
System development and validation
- Combination of capabilities
- Mission specific
SEABILLA (10 M€ EC contr.)
I2C (10 M€ EC contr.)
SUNNY (10 M€ EC contr.)
POV CLOSEYE (9 M€ EC contr.)
Capability development
- Technology development (e.g.
detection) -> (WIMAAS, AMASS,
SECTRONIC)
-Road mapping:
OPERAMAR  POV CISE ?
Maritime Border Security in WP
2014-2014 Secure Societies
BES-1-2015: Maritime Border Security topic 1: radar systems
for the surveillance of coastal and pre-frontier areas and in
support of search and rescue operations
BES-2-2015: Maritime Border Security topic 2: Low cost and
“green” technologies for EU coastal border surveillance
BES-3-2015: Maritime Border Security topic 3: Light
optionally piloted vehicles (and sensors) for maritime
surveillance
BES-4-2015: Maritime Border Security topic 4: Detection of
low flying aircraft at near shore air space
Pre-Commercial Procurement (PCP)
When?
Challenge requires R&D to get new solutions developed. Problem
clear, but pros / cons of several potential competing solutions not
compared / validated yet. No commitment to deploy (PPI) yet.
What?
Public sector buys R&D to steer development of solutions to its needs,
gather info about pros / cons of alternative solutions to be better
informed to make specs for a follow-up PPI possibly later, to avoid
supplier lock-in (create competitive supply base)
How?
Public sector buys R&D from several suppliers in parallel (comparing
alternative solution approaches), in form of competition evaluating
progress after critical milestones (design, prototyping, test phase),
risks & benefits of R&D (e.g. IPRs) shared with suppliers to maximise
incentives for wide commercialisation
PCP to steer the development of solutions towards concrete public
sector needs, whilst comparing alternative solution approaches from
various vendors
PPI to act as launching customer / first buyer of innovative commercial
end-solutions newly arriving on the market
Applied R&D / Pre-commercial Procurement (PCP)
Phase 0
Curiosity
Driven
Research
Phase 1
Solution design
Phase 2
Prototype
development
Supplier A
Supplier B
Supplier B
Supplier C
Supplier C
Supplier D
Supplier D
Phase 3
Original development
of limited volume
of first test products /
services
Supplier B
Supplier D
Public Procurement of
Innovative Solutions (PPI)
Phase 4
Deployment of commercial
volumes of end-products
Wide diffusion of newly
developed solutions
Supplier(s)
A,B,C,D
and/or X
Also normally multiple sourcing
here to keep competition going
Objectives:
– Price/quality products that better fit public sector needs
– Earlier customer feedback for companies developing solutions
– Better take-up/Wider commercialisation of R&D results
Eligibility
SME Funding - Eligibility criteria
• Only applications for funding from one for-profit
SME or a consortium of for-profit SMEs
• Only applications from SMEs established in EU
Member States or countries associated to Horizon
2020
• No concurrent submission or implementation with
another Phase 1 or Phase 2 project
SME Instrument Topic (DRS 17)
Structure:
The SME instrument consists of three separate phases and a
coaching and mentoring service for beneficiaries. Participants can
apply to phase 1 (feasibility study) with a view to applying to phase
2 (innovation project) at a later date, or directly to phase 2. In phase
3 (if applicable) SMEs can benefit from indirect support
measures/services as well as access to the financial facilities
supported under Access to Risk Finance of the work programme.
Expected impact:
Enhancing profitability and growth performance of SMEs by
combining and transferring new and existing knowledge into
innovative, disruptive and competitive solutions seizing European
and global business opportunities.
Budget:
Phase 1: lump sum of EUR 50.000
Phase 2: between EUR 0.5 and 2.5 million
SME Instrument Topic
(DRS 17 - Protection of
urban soft targets and urban critical infrastructure)
Objective: to carry out a small-scale demonstration of innovative technologies and
tools (Phase 2).
Area: urban critical infrastructure protection, such as, for example:
- designing buildings and urban areas;
- protection of energy/transport/communication grids;
- critical infrastructure surveillance solutions;
- protecting supply chains;
- avoiding cyber-attacks and developing cyber resilience systems for critical
infrastructures.
Scope: focused to cover, for example:
- high throughput screening of people and bags including ability to screen them in
reasonably real-time as people approach entrances to buildings or enter public
transportation system;
- high throughput screening for vehicles to identify threats that warrant further
inspection (as opposed to random searching);
- potential CBRN-E threats and the way in which these threats could be carried-out
against soft targets and critical infrastructures;
- mitigation of vehicle-borne improvised explosive devices, with a specific focus on
vehicle-borne ones (e.g. in cases of parked vehicles, penetrative attacks, etc.).
European Council (19-20/12 2014) Conclusions
First thematic debate on defence since the entry into force of the
Lisbon Treaty.
Highlighted the importance of an effective Common Security and
Defence Policy (CSDP).
Recognised that financial constraints and fragmented defence
markets limit military capabilities and jeopardise the stability and
competitiveness of Europe's defence and security industry.
A number of priority actions were identified:
- Increasing the effectiveness, visibility and impact of CSDP
- Enhancing the development of capabilities
- Strengthening Europe's defence industry
European Council – Research & Dual-use
"To ensure the long-term competitiveness of the European defence
industry and secure the modern capabilities needed, it is essential to
retain defence Research & Technology (R&T) expertise, especially in
critical defence technologies."
- Civil and defence research reinforce each other
- Further dual-use research is encouraged
- Synergies between national and EU research should be maximised
- A Preparatory Action on CDSP-related research will be set up
More information:
http://ec.europa.eu/enterprise/policies
/security/index_en.htm
Contact:
ENTR-SECURITY-RESEARCHINDUSTRY@ec.europa.eu
(you can also find me in 'LinkedIn' khoen.liem@gmail.com)
Download