Professional Documents
Culture Documents
Euros Ur
Euros Ur
I. I NTRODUCTION
The aim of our project is to facilitate the sharing of
actionable information related to border control between EU
Member States. This exchange should allow the creation of
a common awareness of the situation at the external border
of the EU which is, since the creation of the European free
movement area, a topic of supranational interest. Difculties
to share information stem from two different sources:
356
Fig. 1.
Each node keeps and controls its own set of information plus
a copy of information received from other nodes. Information
entered at a node is automatically shared intransitively with
other nodes (push mode only) according to the sharing rules
(see Section V) established locally in the node according to
the existing bilateral or multilateral agreements. There is no
possibility to pull data from other nodes. User access is dened
locally in each node, using LDAP (Lightweight Directory
Access Protocol) Directory Service. PKI infrastructure is used
to authenticate nodes accessing services of the other nodes.
The architecture of the network is depicted in Figure 1.
The business information pieces are accessible to the node
users through the Information Sharing Application. It is a
multi-tier Web application running in each nodes Apache and
V. S HARING P OLICIES
The information shared is pushed by the originating node,
the owner, into the network and distributed to other nodes
following bilateral or multilateral agreements between them
which the system identies as sharing rules.
This approach prots from the distributed character of the
network which not having any central node is not limited
7 We
8 Many
357
Fig. 2. Various icon types used for visualisation: (a) irregular migration and
related cross-border crime (rst two rows), (b) man-made disasters (inverted
triangles), (c) natural disasters (triangles), etc.
VII. C ONCLUSIONS
The Information Sharing Application (ISA) presents artefacts on one of the three preinstalled maps using a rich set of
icons. Artefacts in the same geographic location are grouped
to keep clarity of the situational picture. Relations between
artefacts can be displayed as arrows. New icons appear as their
information is entered or received. Three predened views are
available: Event, Analytical and Operational.
A screenshot of ISAs Interface is given in Figure 3. The
user interface is optimized to allow fast and easy access
to detailed information and functions. Counters indicating
numbers of pending items are displayed. A list of alerts is
displayed and automatically updated. A set of pop-ups can
be activated by an action of a mouse over an artefact to
present intermediate-level information or allow fast access
to available functions. The ISAs Interface includes editors
for: creating and manipulating event descriptions (templates),
creating information lters, managing sharing rules, creating
graphical objects, conguring ISA settings (e.g., access to map
services, dening user settings, etc.). Furthermore, an event
browser (based on user-dened lters) is provided. Finally,
ISA is equipped with an artefact-related persistable chat with
other network nodes.
We have briey presented an effort aiming at the development of a simple decentralised network for sharing geotagged border control-related information between EU Member States, which is an essential milestone that will hopefully
pave the way for creating a future EU-level integrated border
surveillance system. The network as such provides tracks
to transport information. The further steps will focus on
providing the cargo, i.e., using the network to populate it
with event, analytical and operational information, that will
lead to the creating of situational pictures at the EU borders.
R EFERENCES
[1] Martin Atkinson, Jakub Piskorski, Erik Van der Goot and Roman Yangarber. 2011. Multilingual Real-Time Event Extraction for Border
Security Intelligence Gathering. In: Counterterrorism and Open Source
Intelligence Series. Lecture Notes in Social Networks, Vol. 2.
[2] Henry L. Stimson Center. 2008. New Information and Intelligence Needs
in the 21st Century Threat Environment. Published by Stimson Center.
[3] Christopher Westphal. 2008. Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies.
CRC Press, Inc, Boca Raton, FL, USA.
[4] Yasuharu Yamada. 2010. Web Based Disaster Information Sharing
Platform, GeoWeb using Open Source Software and Freeware for Rural
Areas. In International Archives of the Photogrammetry, Remote Sensing
and Spatial Information Science, Volume XXXVIII, Part 8, 2010.
358