border/port security challenges, characteristics, methods...

20
Border/Port Security – Challenges, Characteristics, Methods and Technologies Andrea Mucedola, Joachim Biermann, Anna Galstyan, Victor Cojocaru, Elisa Shahbasian, Dominique Cant, Robert Haboyan, Narek Hayrapetyan, Ondra Vanek, Pascal Djiknavorian, Lauro Snidaro NATO ARW Workshop. Yerevan, June 2015.

Upload: others

Post on 03-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Border/Port Security – Challenges, Characteristics, Methods and Technologies

Andrea Mucedola, Joachim Biermann, Anna Galstyan, Victor Cojocaru, Elisa Shahbasian, Dominique Cant, Robert Haboyan, Narek Hayrapetyan, Ondra Vanek,

Pascal Djiknavorian, Lauro Snidaro

NATO ARW Workshop. Yerevan, June 2015.

Page 2: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Border/Port Patrol – Working group 4

The challenges of the corresponding priority area

Information sources, characteristics and needs

Technology trends and solutions

• Elements, their interactions

• Methodology enabling and supporting decision making

• Fundamental services on network and distributed systems

• Human system integration

• Information Fusion throughout all phases of the decision support (OODA)

Page 3: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

The challenges of the corresponding priority area • Problem of covering complete supply chain, not only

part of the activities

• Many stakeholders with private data

• Many authorities with unclear chain of command

• Distributed, incompatible data storages, unmapped data collection

• No process for information sharing

• Problem of bluffing/decoy/distruption attacks – costly • Problem of asymetric warfare (defender has to be lucky

always, attacker just once)

Page 4: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Port Supply Chain

Authorised Economic operator

Prenotification 24 hour Advanced rule

Authorised Economic operator

Consolidation/

distribution center

Port of discharge

Vessel Transit

port

Factory

Road/rail

transport

Consolidation/

distribution center

Vessel Port of loading Road/rail

transport

Road/rail

transport

Paperless Customs

Page 5: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Pro

po

sed

Pro

cess

fo

r Su

pp

ly

Ch

ain

Info

rmat

ion

Sec

uri

ty

Page 6: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding
Page 7: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Information Processing Architecture for Security of Critical Infrastructure

P0: S

ensors

/ P

latf

orm

s

LRIT SAT AIS RADAR GSM

Trans L0-L1 Trans L0-L1 Trans L0-L1 Trans L0-L1 Trans L0-L1

Local Control Center 1 Data- and Information Fusion, asset monitoring,

sensor (re-)directing, local / tactical (re-)action

CI-SD

(loc/reg/nat)

LRIT SAT AIS RADAR GSM

Trans L0-L1 Trans L0-L1 Trans L0-L1 Trans L0-L1 Trans L0-L1

Local Control Center n Data- and Information Fusion, asset monitoring,

sensor (re-)directing, local / tactical (re-)action

CI-SD

(loc/reg/nat)

Regional / national Control Center Data- and Information Fusion L2 Data, operational (re-)action, policy, strategy

…..

CI-SD

(loc/reg/nat)

External DBs

External DBs

External DBs

P1: lo

cal contr

ol

P2/3

: re

gio

nal / national contr

ol

Platform DB

Direct communicatiom

with neighboring agencies

Platform DB

Data stream

Control stream

Platform DB Platform DB

Page 8: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Information Processing Architecture for Security of Critical Infrastructure

CI-SD

(nat/EU)

Data stream

Control stream

Regional / national Control Center 1 Data- and Information Fusion L2 Data,

operational (re-)action, policy, strategy

Regional / national Control Center m Data- and Information Fusion L2 Data,

operational (re-)action, policy, strategy ….

International Control Center Data- and Information Fusion L2 /L3 & L4 Data, coordination (re-)action, policy, strategy

CI-SD

(loc/reg/nat)

CI-SD

(loc/reg/nat)

Local Control Center Local Control enter Local Control Center Local Control Center

External DBs

External DBs

External DBs

P2/3

: re

gio

nal / national contr

ol

P4: E

U inte

gra

ted m

ultin

ational contr

ol

Page 9: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

POL

CC

FP

CU CG

PA

Information highway

Everyone is chipping in the info

Information sharing solution Case Study - Italy

A Y X

Encrypted by public keys

Entities able to decode info directed to them

Page 10: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Emergency reaction

KR Ext. line

Security Office

Priority Metadata to be distributed

Emergency type Conventional

Unconventional

Distribute to Concerned stake holders

Page 11: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Security Office

Responsibilities

• access control

• Information distribution

Intranet

Alarm priority

• All can inject alarm

• Port |border authority

• Providers | assign responsibilities

Page 12: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Conventional vs. Unconventional Alarm

Conventional

Fire brigade

Flooding

Electrical Power

Heating / Conditioning

Fridge

Unconventional

Criminals

Terrorism

Cyber

Page 13: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Challenges II – Cyber-security

• How is cyber-security related to border security

• BP systems have to be protected against cyber attacks (of course)

• Cross country (?) cyber attacks – is it an issue of border security?

• How to define borders in cyber space?

• How to apply cyber and physical security to IoT? • Intersection of physical and cyber

Page 14: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Information sources, characteristics and needs • Data collected from sensors

• Supply Chain databases

• Physical records (pen&paper)

• Public sources (News feeds, Twitter, Social Networks)

• …

• NEEDS • Unification, completion, non-redundancy, data cleaning, …

• Typical data fusion needs

Page 15: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Authorities

Single window

Security Related Information

Armenia Canada

Information update

Various sources

Update of systems in a single window

Problem of localization for different countries

Page 16: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Technology trends and solutions Elements and their interactions

Page 17: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Technology trends and solutions Methodology enabling and supporting decision making

Page 18: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Technology trends and solutions Fundamental services on network and distributed systems

Page 19: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Technology trends and solutions Human system integration

Page 20: Border/Port Security Challenges, Characteristics, Methods ...canadiannatomeetings.com/arwarmenia2015/presentations/...Border/Port Patrol – Working group 4 The challenges of the corresponding

Technology trends and solutions Information Fusion throughout all phases of the decision support (OODA)