border/port security challenges, characteristics, methods...
TRANSCRIPT
Border/Port Security – Challenges, Characteristics, Methods and Technologies
Andrea Mucedola, Joachim Biermann, Anna Galstyan, Victor Cojocaru, Elisa Shahbasian, Dominique Cant, Robert Haboyan, Narek Hayrapetyan, Ondra Vanek,
Pascal Djiknavorian, Lauro Snidaro
NATO ARW Workshop. Yerevan, June 2015.
Border/Port Patrol – Working group 4
The challenges of the corresponding priority area
Information sources, characteristics and needs
Technology trends and solutions
• Elements, their interactions
• Methodology enabling and supporting decision making
• Fundamental services on network and distributed systems
• Human system integration
• Information Fusion throughout all phases of the decision support (OODA)
The challenges of the corresponding priority area • Problem of covering complete supply chain, not only
part of the activities
• Many stakeholders with private data
• Many authorities with unclear chain of command
• Distributed, incompatible data storages, unmapped data collection
• No process for information sharing
• Problem of bluffing/decoy/distruption attacks – costly • Problem of asymetric warfare (defender has to be lucky
always, attacker just once)
Port Supply Chain
Authorised Economic operator
Prenotification 24 hour Advanced rule
Authorised Economic operator
Consolidation/
distribution center
Port of discharge
Vessel Transit
port
Factory
Road/rail
transport
Consolidation/
distribution center
Vessel Port of loading Road/rail
transport
Road/rail
transport
Paperless Customs
Pro
po
sed
Pro
cess
fo
r Su
pp
ly
Ch
ain
Info
rmat
ion
Sec
uri
ty
Information Processing Architecture for Security of Critical Infrastructure
P0: S
ensors
/ P
latf
orm
s
LRIT SAT AIS RADAR GSM
Trans L0-L1 Trans L0-L1 Trans L0-L1 Trans L0-L1 Trans L0-L1
Local Control Center 1 Data- and Information Fusion, asset monitoring,
sensor (re-)directing, local / tactical (re-)action
CI-SD
(loc/reg/nat)
LRIT SAT AIS RADAR GSM
Trans L0-L1 Trans L0-L1 Trans L0-L1 Trans L0-L1 Trans L0-L1
Local Control Center n Data- and Information Fusion, asset monitoring,
sensor (re-)directing, local / tactical (re-)action
CI-SD
(loc/reg/nat)
Regional / national Control Center Data- and Information Fusion L2 Data, operational (re-)action, policy, strategy
…..
CI-SD
(loc/reg/nat)
External DBs
External DBs
External DBs
P1: lo
cal contr
ol
P2/3
: re
gio
nal / national contr
ol
Platform DB
Direct communicatiom
with neighboring agencies
Platform DB
Data stream
Control stream
Platform DB Platform DB
Information Processing Architecture for Security of Critical Infrastructure
CI-SD
(nat/EU)
Data stream
Control stream
Regional / national Control Center 1 Data- and Information Fusion L2 Data,
operational (re-)action, policy, strategy
Regional / national Control Center m Data- and Information Fusion L2 Data,
operational (re-)action, policy, strategy ….
International Control Center Data- and Information Fusion L2 /L3 & L4 Data, coordination (re-)action, policy, strategy
CI-SD
(loc/reg/nat)
CI-SD
(loc/reg/nat)
Local Control Center Local Control enter Local Control Center Local Control Center
External DBs
External DBs
External DBs
P2/3
: re
gio
nal / national contr
ol
P4: E
U inte
gra
ted m
ultin
ational contr
ol
POL
CC
FP
CU CG
PA
Information highway
Everyone is chipping in the info
Information sharing solution Case Study - Italy
A Y X
Encrypted by public keys
Entities able to decode info directed to them
Emergency reaction
KR Ext. line
Security Office
Priority Metadata to be distributed
Emergency type Conventional
Unconventional
Distribute to Concerned stake holders
Security Office
Responsibilities
• access control
• Information distribution
Intranet
Alarm priority
• All can inject alarm
• Port |border authority
• Providers | assign responsibilities
Conventional vs. Unconventional Alarm
Conventional
Fire brigade
Flooding
Electrical Power
Heating / Conditioning
Fridge
Unconventional
Criminals
Terrorism
Cyber
Challenges II – Cyber-security
• How is cyber-security related to border security
• BP systems have to be protected against cyber attacks (of course)
• Cross country (?) cyber attacks – is it an issue of border security?
• How to define borders in cyber space?
• How to apply cyber and physical security to IoT? • Intersection of physical and cyber
Information sources, characteristics and needs • Data collected from sensors
• Supply Chain databases
• Physical records (pen&paper)
• Public sources (News feeds, Twitter, Social Networks)
• …
• NEEDS • Unification, completion, non-redundancy, data cleaning, …
• Typical data fusion needs
Authorities
Single window
Security Related Information
Armenia Canada
Information update
Various sources
Update of systems in a single window
Problem of localization for different countries
Technology trends and solutions Elements and their interactions
Technology trends and solutions Methodology enabling and supporting decision making
Technology trends and solutions Fundamental services on network and distributed systems
Technology trends and solutions Human system integration
Technology trends and solutions Information Fusion throughout all phases of the decision support (OODA)