1 / 46

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies. Khoen Liem Security Research and Industry DG Enterprise and Industry Tel Aviv, 24 Feb. 2014. 2013. FP7: successes and lessons learned. Some FP7 project results: -have been rapidly integrated into successful commercial products

sierra
Download Presentation

Horizon 2020 Secure Societies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Horizon 2020Secure Societies Khoen Liem Security Research and IndustryDG Enterprise and Industry Tel Aviv, 24 Feb. 2014 2013

  2. FP7: successes and lessons learned • Some FP7 project results: • -have been rapidly integrated into successful commercial products • - produced (lasting) benefits to stakeholders (even outside the consortium involved) • First lessons: • - independent testing and validation of the results recommended at the end • - greater emphasis should be given to dissemination to users' community • - Large scale initiatives have given visibility

  3. H-2020 Key pillars • Supporting Europe's excellent science base • Building industrial leadership in Europe • Tackling societal challenges for a better society • Secure societies

  4. Security: a societal challenge It concerns the protection of citizens, society and economy as well as Europe's assets, infrastructures and services, its prosperity, political stability and well-being. Any malfunction or disruption, intentional or accidental, can have a detrimental impact with high associated economic or societal costs.

  5. Secure Societies: does industry matter? The security industry is one of the sectors with highest potential for growth and employment in the EU. In 2011, the sector employed 180,000 people, with an annual turnover of approximately €30 billion. • Overcoming market fragmentation through EU-wide standards • Reducing the gap from research to market by introducing new funding schemes such as Pre-Commercial Procurement • Better integration of societal considerations by thoroughly assessing the impact of security technologies on fundamental rights

  6. Security Research • Maintains its mission driven character • Supports EU internal and external security policies • Supports the EU industry to be competitive • Strengthens the involvement of the end-users • Takes more into account the Societal Dimension • Includes Cyber-Security European Cyber Security Strategy

  7. Objectives of security research in H2020 • Reinforce support for the EU's internal and external security strategy • Improve the competitiveness of EU industries • Address security gaps and prevent threats to security • Maintain a mission-oriented approach and integrate end-users needs • Enhance the societal dimension and coordination

  8. Objectives of security research in H2020 • Reinforce support for the EU's internal and external security strategy • Improve the competitiveness of EU industries • Address security gaps and prevent threats to security • Maintain a mission-oriented approach and integrate end-users needs • Enhance the societal dimension and coordination Lisbon Treaty

  9. "Secure Societies" in Horizon 2020Protecting Freedom and Security of Europe and its CitizensREGULATION (EU) No 1291/2013 • OBJECTIVES 1. Fight crime, illegal trafficking and terrorism, including understanding and tackling terrorist ideas and beliefs 2. Protect and improve the resilience of critical infrastructures, supply chains and transport modes 3. Strengthen security through border management 4. Improve cyber security 5. Increase Europe's resilience to crises and disasters 6. Ensure privacy and freedom, including in the Internet and enhancing the societal legal and ethical understanding of all areas of security, risk and management 7. Enhance standardisation and interoperability of systems, including for emergency purposes 6. Support the Union's external security policies including through conflict prevention and peace-building

  10. Strong link to EU policy initiatives - The EU Internal Security Strategy in Action, COM(2010)673 - Towards a stronger European disaster response: the role of civil protection and humanitarian assistance, COM(2010)600 - The EU Action Plan on combating terrorism - The Security Industry Policy Action Plan COM (2012) 417 - Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace JOIN(2013) 1 final - Flagship Initiative 'Digital Agenda for Europe' - The EU Strategy towards the Eradication of Trafficking in Human Beings 2012–2016, COM(2012) 286 - European Programme for Critical Infrastructure Protection (EPCIP),COM(2006)786 - Civilian Headline Goal 2008 - EU Maritime Security Strategy……(2014)

  11. EU Policy implementation: strategic approach EU Bodies Member States (Committees) DG SANCO Consumer health DG TAXUD Customs EDA Defence DG ENTR Security EEAS Ext. security DG CNECT Comm. DG HOME InternalSecurity DG ENV Environment DG TRADE Trade FPI Foreign Policy Instrument DG RTD Research JRC Joint Res. Centre DG DEVCO Internationalcooperation ECHO Civil protection DG MOVE Transport EU Policies EU Research Agencies + UN Bodies, NATO Industry, Stakeholders, NGO’s, Researchers, Experts, etc.

  12. Features • Strengthened coordination with relevant EU-Agencies: FRONTEX, EUROPOL, ENISA, EMSA, eu-LISA etc. • Closer coordination with the activities of EDA • Pre-Commercial Procurement (PCP) instrument

  13. Structure of the Secure Societies Work Programme • Disaster Resilient Societies – ENTR (+ R&I) • Crisis management and civil protection, critical infrastructure protection • Fight against Crime and Terrorism - ENTR • Forensics, law enforcement capabilities, ethical/societal dimension • Border Security - ENTR • Border crossing points, information management, supply chain security • Digital Security – CNCT (+ ENTR) • Privacy, access control, trust eServices, Secure information sharing

  14. Disaster Resilient Societies safeguarding and securing society, including adapting to climate change The DRS-call is divided in the following sub-sectors: • Crisis management and Civil Protection • Disaster Resilience & Climate Change • [These topics come from the Environment Challenge 5 – with their budget.] • Critical Infrastructure Protection • Communication interoperability • Ethical/Societal Dimension 2014: 62,4 Mio / 2015: 65,1 Mio

  15. Disaster-resilience Crisis management and Civil Protection DRS-1-2015: Crisis management topic 1: Potential of current and new measures and technologies to respond to extreme weather and climate events DRS-2-2014: Crisis management topic 2: Tools for detection, traceability, triage and individual monitoring of victims after a mass CBRN contamination and/or exposure DRS-3-2015: Crisis management topic 3: Demonstration activity on large scale disasters and crisis management and resilience of EU external assets against major identified threats or causes of crisis DRS-4- 2014: Crisis management topic 4: Feasibility study for strengthening capacity-building for health and security protection in case of large-scale pandemics – Phase I Demo DRS-5-2014: Crisis management topic 5: Situation awareness of Civil Protection decision-making solutions – preparing the ground for a Pre-commercial Procurement (PCP) DRS-6-2015: Crisis management topic 6: Addressing standardisation opportunities in support of increasing disaster resilience in Europe DRS-7-2014: Crisis management topic 7: Crises and disaster resilience – operationalizing resilience concepts

  16. Call - Disaster-resilience Disaster Resilience & Climate Change DRS-9-2014/2015: Disaster Resilience & Climate Change topic 1: Science and innovation for adaptation to climate change: from assessing costs, risks and opportunities to demonstration of options and practices DRS-10-2015: Disaster Resilience & Climate Change topic 2: Natural Hazards: Towards risk reduction science and innovation plans at national and European level DRS-11-2015: Disaster Resilience & Climate Change topic 3: Mitigating the impacts of climate change and natural hazards on cultural heritage sites, structures and artefacts

  17. Call - Disaster-resilience Critical Infrastructure Protection DRS-12-2015: Critical Infrastructure Protection topic 1: Critical Infrastructure “smart grid” protection and resilience under “smart meters” threats DRS-13-2015: Critical Infrastructure Protection topic 2: Demonstration activity on tools for adapting building and infrastructure standards and design methodologies in vulnerable locations in case of natural or man-originated catastrophes DRS-14-2015: Critical Infrastructure Protection topic 3: Critical Infrastructure resilience indicator - analysis and development of methods for assessing resilience DRS-15-2015: Critical Infrastructure Protection topic 4: Protecting potentially hazardous and sensitive sites/areas considering multi-sectorial dependencies DRS-16-2014: Critical Infrastructure Protection topic 6: Improving the aviation security chain DRS-17-2014/2015: Critical infrastructure protection topic 7: SME instrument topic: “Protection of urban soft targets and urban critical infrastructures”

  18. Call - Disaster-resilience • Communication interoperability • DRS-18-2015: Communication technologies and interoperability topic 1: interoperable next generation of broadband radio communication system for public safety and security – Pre-commercial Procurement (PCP) • DRS-19-2014: Communication technologies and interoperability topic 2: Next generation emergency services ("112 – cross border")

  19. Call - Disaster-resilience Ethical/Societal Dimension DRS-20-2014: Ethical/Societal Dimension topic 1: Improving protection of Critical infrastructures from insider threats DRS-21-2014: Ethical/Societal Dimension topic 2: Better understanding the links between culture, risk perception and disaster management DRS-22-2015: Ethical/Societal Dimension topic 3: Impact of climate change in third countries on Europe's security

  20. Policies matters - EXAMPLE DRS-16-2014: Critical Infrastructure Protection topic 6: Improving the aviation security chain • …Aviation Security is governed by EU legislation, such as Directive 2008/114/EC of 8 December 2008…. • Policy is moving towards more risk-based, outcome- focused, passenger-facilitation oriented measures • …risk-based security and a reduced operational impact on passengers and industry • COPRA Aviation Security Research Roadmap:http://www.copra-project.eu/Results.html • Flightpath 2050: Europe’s vision for aviation: http://ec.europa.eu/transport/modes/air/doc/flightpath2050.pdf • IATA Checkpoint of the Future: http://www.iata.org/whatwedo/security/pages/checkpoint-future.aspx

  21. Fight against Crime and Terrorism The FCT-call is divided in the following sub-sectors: • Forensics • Law enforcement capabilities • Urban security • Ethical/Societal Dimension 2014: 56,8 Mio / 2015: 44,3Mio

  22. Call – Fight against crime and Terrorism Forensics FCT-1-2015: Forensics topic 1: Tools and infrastructure for the fusion, exchange and analysis of big data including cyber-offenses generated data for forensic investigation FCT-2-2015: Forensic topic 2: Advanced easy to use in-situ forensic tools at the scene of crime FCT-3-2015: Forensics topic 3: Mobile, remotely controlled technologies to examine a crime scene in case of an accident or a terrorist attack involving CBRNE materials FCT-4-2015: Forensics topic 4: Internet Forensics to combat organized crime

  23. Call – Fight against crime and Terrorism Law enforcement capabilities FCT-5-2014: Law enforcement capabilities topic 1: Develop novel monitoringsystems and miniaturised sensors that improve Law Enforcement Agencies' evidence- gathering abilities FCT-6-2015: Law Enforcement capabilities 2: Detection and analysis of terrorist-related content on the Internet FCT-7-2014:Law enforcement capabilities topic 3: Pan European platform for serious gaming and training FCT-8-2014: Law enforcement capabilities topic 4: Trans-national cooperation among public end-users in security research stakeholders FCT-9-2015: Law Enforcement capabilities topic 5: Identity Management

  24. Call – Fight against crime and Terrorism Urban security FCT-10-2014: Urban security topic 1: Innovative solutions to counter security challenges connected with large urban environment FCT-11-2014: Urban security topic 2: Countering the terrorist use of an explosive threat, across the timeline of a plot, including the detection of explosives in a flow FCT-12-2014: Urban security topic 3: Minimum intrusion tools for de-escalation during mass gatherings improving citizens’ protection

  25. Call – Fight against crime and Terrorism Ethical/Societal Dimension FCT-13-2014: Ethical/Societal Dimension Topic 1: Factors affecting (in-) security FCT-14-2014: Ethical/Societal Dimension Topic 2: Enhancing cooperation between law enforcement agencies and citizens - Community policing FCT-15-2015: Ethical/Societal Dimension Topic 3: Better understanding the role of new social media networks and their use for public security purposes FCT-16-2015: Ethical/Societal Dimension Topic 4 - Investigating the role of social, psychological and economic aspects of the processes that lead to organized crime (including cyber related offenses), and/or terrorist networks and their impact on social cohesion FCT-17-2015: Fast track to Innovation Topic

  26. Border Security and External Security The BES-call is divided in the following sub-sectors • Maritime Border Security • Border crossing points • Supply Chain Security • Information Management • Conflict prevention and Peace building • Ethical/Societal Dimension • 2014: 20,8 Mio / 2015: 44,4 Mio

  27. Call – Border Security and External Security Maritime Border Security BES-1-2015: Maritime Border Security topic 1: radar systems for the surveillance of coastal and pre-frontier areas and in support of search and rescue operations BES-2-2015: Maritime Border Security topic 2: Low cost and “green” technologies for EU coastal border surveillance BES-3-2015: Maritime Border Security topic 3: Light optionally piloted vehicles (and sensors) for maritime surveillance BES-4-2015: Maritime Border Security topic 4: Detection of low flying aircraft at near shore air space

  28. Call – Border Security and External Security • Border crossing points • BES-5-2015: Border crossing points topic 1: Novel mobility concepts for land border security • BES-6-2015: Border crossing points topic 2: Exploring new modalities in biometric-based border checks • BES-7-2015: Border crossing points topic 3: Optimization of border control processes and planning • Supply Chain Security • BES-8-2015: Supply Chain Security topic 1: Development of an enhanced non-intrusive (stand-off) scanner • BES-9-2014: Supply Chain Security topic 2: Technologies for inspections of large volume freight

  29. Call – Border Security and External Security Information Management BES-10-2015: Information management topic 1: Civilian humanitarian mission personnel tracking BES-11-2015: Information management topic 2: Information management, systems and infrastructure for civilian EU External Actions Conflict prevention and Peace building BES-12-2014: Conflict prevention and peace building topic 1: Enhancing the civilian conflict prevention and peace building capabilities of the EU BES-13-2015: Conflict prevention and peace building topic 2: Training curricula for Conflict Prevention and Peace Building personnel Ethical/Societal Dimension BES-14-2014: Ethical Societal Dimension topic 1: Human factors in border control

  30. Digital Security The DS-call concerns the following subjects: • Privacy • Access Control • The role of ICT in Critical Infrastructure Protection • Secure Information Sharing • Trust eServices • Risk management and assurance models • 2014: 47,0 Mio / 2015: 50,3 Mio

  31. Call – Digital Security: Cybersecurity, Privacy and Trust DS-1-2014: Privacy DS-2-2014: Access Control DS-6-2014: Risk management and assurance models DS-3-2015: The role of ICT in Critical Infrastructure Protection DS-4-2015: Secure Information Sharing DS-5-2015: Trust eServices

  32. Call open: 25 March 2014 Call closed: 28 Aug 2014 Info on outcome of Evaluation: end December 2014 Signature of Grant Agreements: starting March 2015 Time line Website: http://ec.europa.eu/research/participants/portal/desktop/en/home.html

  33. Cyber Security Citizens, businesses and administrations increasingly involved in digital interactions and transactions. Internet led to cyber-crime worth B€/ year, to attacks to critical infrastructures and to breaches of privacy. Lack of security of digital technologies is a risk for economy and society. Cyber security has become a political and economic priority. Eurobarometer: 50% of the EU citizens are worried (percentage increasing)

  34. Cyber security has become part of "Secure Societies“ Challenges: - How to assessthe threats in cyber-space and their possiblescope? - How to besttackle cyber-threats and protect citizens in the digital domain? Convergence of traditional security needs and the digital world. Many infrastructures and services privately owned and operated, yet protection of public (safety and) security is responsibility of public authorities. Security is an issue that can only be tackled effectively if all stakeholders cooperate: companies and authoritiesmust work together across borders.

  35. Maritime Security: European Council calls for action In the December 2013 conclusions, the European Council called for "an EU Maritime Security Strategy by June 2014, on the basis of a joint Communication from the Commission and the High Representative, taking into account the opinions of the Member States, and the subsequent elaboration of action plans to respond to maritime challenges" By doing so the Council highlighted the importance of the topic and encouraged the Commission to take action in the field of maritime security.

  36. Maritime Security: International Instruments • International Convention for the Safety of Life at Sea, 1974, as amended (London, 1 November 1974, entered into force 1 May 1991) 1184 UNTS 3; 14 ILM 959 (SOLAS)• International Convention on Maritime Search and Rescue (Hamburg, 27 April 1979, entered into force 22 June 1985) 1405 UNTS 97 (SAR Convention)• United Nations Convention on the Law of the Sea (Montego Bay, 10 December 1982, entered into force 16 November 1994) 1833 UNTS 3; 21 ILM 1261 (LOSC)• Convention on the High Seas (Geneva, 29 April 1958, entered into force 30 September 1962) 13 UST 2312; 450 UNTS 11 (HSC)• Convention on the Territorial Sea and the Contiguous Zone (Geneva, 29 April 1958, entered into force 10 September 1964) 15 UST 1606; 516 UNTS 205 (TSC)• Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms Located on the Continental Shelf (Rome, 10 March 1988, entered into force 1 March 1992) 27 ILM 685 (SUA Protocol)• Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances (Vienna, 20 December 1988, entered into force 11 November 1990) UN Doc E/CONF.82/15; 28 ILM 493 (Vienna Drugs Convention)Agreement concerning cooperation in Suppressing Illicit Maritime and Air Trafficking in Narcotic Drugs and Psychotropic Substances in the Caribbean Area (San Jose, Costa Rica, 10 April 2003, not yet in force) (Aruba Agreement)• ……

  37. Systems of systems demonstration • Combination of IP results • Multi-mission • Demonstration Programme PERSEUS (27 M€ EC contr.) Research routes in R&D for Maritime (Border) Security System development and validation • Combination of capabilities • Mission specific SEABILLA (10 M€ EC contr.) I2C (10 M€ EC contr.) SUNNY (10 M€ EC contr.) POV CLOSEYE (9 M€ EC contr.) Capability development • Technology development (e.g. detection) -> (WIMAAS, AMASS, SECTRONIC) • Road mapping: OPERAMAR  POV CISE ?

  38. Maritime Border Security in WP 2014-2014 Secure Societies BES-1-2015: Maritime Border Security topic 1: radar systems for the surveillance of coastal and pre-frontier areas and in support of search and rescue operations BES-2-2015: Maritime Border Security topic 2: Low cost and “green” technologies for EU coastal border surveillance BES-3-2015: Maritime Border Security topic 3: Light optionally piloted vehicles (and sensors) for maritime surveillance BES-4-2015: Maritime Border Security topic 4: Detection of low flying aircraft at near shore air space

  39. Pre-Commercial Procurement (PCP) • When? • Challenge requires R&D to get new solutions developed. Problem clear, but pros / cons of several potential competing solutions not compared / validated yet. No commitment to deploy (PPI) yet. • What? • Public sector buys R&D to steer development of solutions to its needs, gather info about pros / cons of alternative solutions to be better informed to make specs for a follow-up PPI possibly later, to avoid supplier lock-in (create competitive supply base) • How? • Public sector buys R&D from several suppliers in parallel (comparing alternative solution approaches), in form of competition evaluating progress after critical milestones (design, prototyping, test phase), risks & benefits of R&D (e.g. IPRs) shared with suppliers to maximise incentives for wide commercialisation

  40. PCP to steer the development of solutions towards concrete public sector needs, whilst comparing alternative solution approaches from various vendors PPI to act as launching customer / first buyer of innovative commercial end-solutions newly arriving on the market Public Procurement of Innovative Solutions (PPI) Applied R&D / Pre-commercial Procurement (PCP) Phase 0 Curiosity Driven Research Phase 1 Solution design Phase 4 Deployment of commercial volumes of end-products Wide diffusion of newly developed solutions Phase 2 Prototype development Phase 3 Original development of limited volume of first test products / services Supplier A Supplier B Supplier B Supplier B Supplier(s) A,B,C,D and/or X Supplier C Supplier C Supplier D Supplier D Supplier D Also normally multiple sourcing here to keep competition going • Objectives: • Price/quality products that better fit public sector needs • Earlier customer feedback for companies developing solutions • Better take-up/Wider commercialisation of R&D results

  41. Eligibility SME Funding - Eligibility criteria • Only applications for funding from one for-profit SME or a consortium of for-profit SMEs • Only applications from SMEs established in EU Member States or countries associated to Horizon 2020 • No concurrent submission or implementationwithanother Phase 1 or Phase 2 project

  42. SME Instrument Topic (DRS 17) Structure: The SME instrument consists of three separate phases and a coaching and mentoring service for beneficiaries. Participants can apply to phase 1 (feasibility study) with a view to applying to phase 2 (innovation project) at a later date, or directly to phase 2. In phase 3 (if applicable) SMEs can benefit from indirect support measures/services as well as access to the financial facilities supported under Access to Risk Finance of the work programme. Expected impact: Enhancing profitability and growth performance of SMEs by combining and transferring new and existing knowledge into innovative, disruptive and competitive solutions seizing European and global business opportunities. Budget: Phase 1: lump sum of EUR 50.000 Phase 2: between EUR 0.5 and 2.5 million

  43. SME Instrument Topic (DRS 17 - Protection of urban soft targets and urban critical infrastructure) Objective: to carry out a small-scale demonstration of innovative technologies and tools (Phase 2). Area: urban critical infrastructure protection, such as, for example: - designing buildings and urban areas; - protection of energy/transport/communication grids; - critical infrastructure surveillance solutions; - protecting supply chains; - avoiding cyber-attacks and developing cyber resilience systems for critical infrastructures. Scope: focused to cover, for example: - high throughput screening of people and bags including ability to screen them in reasonably real-time as people approach entrances to buildings or enter public transportation system; - high throughput screening for vehicles to identify threats that warrant further inspection (as opposed to random searching); - potential CBRN-E threats and the way in which these threats could be carried-out against soft targets and critical infrastructures; - mitigation of vehicle-borne improvised explosive devices, with a specific focus on vehicle-borne ones (e.g. in cases of parked vehicles, penetrative attacks, etc.).

  44. European Council (19-20/12 2014) Conclusions • First thematic debate on defence since the entry into force of the Lisbon Treaty. • Highlighted the importance of an effective Common Security and Defence Policy (CSDP). • Recognised that financial constraints and fragmented defence markets limit military capabilities and jeopardise the stability and competitiveness of Europe's defence and security industry. • A number of priority actions were identified: • Increasing the effectiveness, visibility and impact of CSDP • Enhancing the development of capabilities • Strengthening Europe's defence industry

  45. European Council – Research & Dual-use • "To ensure the long-term competitiveness of the European defence industry and secure the modern capabilities needed, it is essential to retain defence Research & Technology (R&T) expertise, especially in critical defence technologies." • Civil and defence research reinforce each other • Further dual-use research is encouraged • Synergies between national and EU research should be maximised • A Preparatory Action on CDSP-related research will be set up

  46. More information: http://ec.europa.eu/enterprise/policies/security/index_en.htmContact:ENTR-SECURITY-RESEARCH-INDUSTRY@ec.europa.eu(you can also find me in 'LinkedIn' - khoen.liem@gmail.com)

More Related