Deputy Secretary General stresses NATO will continue to increase Ukraine’s cyber defences

Deputy Secretary General Mircea Geoană participated virtually at the Cybersec Global 2022 event. Focusing on the tensions between Russia and Ukraine during his keynote speech, the Deputy Secretary General stressed that NATO has been working with Ukraine for years to increase its cyber defences, and will continue to do so at pace.

He said: “The use of hybrid attacks against Ukraine, including cyber-attacks and disinformation, as well as the massing of advanced weapons on its borders, underlines the key role of advanced technology in modern warfare”.

The Deputy Secretary General pointed out that “China and Russia are investing heavily and deploying new technologies with little regard for human rights or international law, aggressively challenging our technological edge”. He recalled that last summer Allies had agreed a new comprehensive cyber defence policy for NATO and went on to say that “we are strengthening our cyber defences and increasing the resilience of our critical infrastructure and supply chains to reduce our vulnerabilities”.

The Deputy Secretary General also noted NATO’s leading role with regard to the new technologies, in areas such as artificial intelligence, autonomous systems, biotechnology, big data, hypersonics, quantum computing and space. He underlined that to avoid any technology gaps, “we are making sure that transatlantic innovation benefits all Allies”. Mr. Geoană emphasized that NATO’s strength comes from its unity and its ability to adapt to remain strong and “retaining our technological edge is a big part of this”, he added.

Dstl trials autonomous maritime asset protection system (AMAPS)

Working with the Royal Navy, industry partners and the US Naval Undersea Warfare Centre, the Defence Science and Technology Laboratory (Dstl) conducted research to improve detection, tracking, classification and defeat capabilities against surface and subsurface threats to high value assets and critical infrastructure, using autonomous systems alongside traditional systems.

Dstl worked collaboratively with an industry consortium comprising QinetiQ, SeeByte, L3 Harris ASV and Thales, to develop a concept demonstrator based on open architectures and autonomous systems. This demonstrator was tested in a synthetic environment to ensure the viability of the concept before experimentation during a 2 week trial in Portland Harbour in October 2021 using Dstl’s containerised system and the Maritime Autonomy Surface Testbed vessel MAST-13.

Different levels of autonomy were evaluated, enabling a better assessment of the role that maritime autonomous systems can play in protecting vulnerable assets while also furthering understanding of the current maturity of the technology.

The trial successfully demonstrated end-to-end autonomy with the remote operation of a long range acoustic device and firing of a vessel arrestor system with the aim to stop a suspect craft.

Future trials will look to stress the system with the aim to assess robustness while completing interoperability tests with the US that were impacted by COVID-19.

Dstl Programme Manager, Alasdair Gilchrist MBE, commented:

The research showed the benefit of integrating multiple sensors, fixed and on uncrewed vessels (UXVs), into a common tactical picture to aid command decisions.

We have progressed maritime Artificial Intelligence/machine learning by developing apps that enable multiple UXVs to be command and controlled from a single operator to protect assets.

We have also developed algorithms to autonomously control and launch non-lethal effectors from uncrewed surface vessels (USVs) to deter aggressors and protect our valuable maritime assets.

CISA Urges Organizations to Implement Immediate Cybersecurity Measures to Protect Against Potential Threats

In response to recent malicious cyber incidents in Ukraine—including the defacement of government websites and the presence of potentially destructive malware on Ukrainian systems—CISA has published CISA Insights: Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats. The CISA Insights strongly urges leaders and network defenders to be on alert for malicious cyber activity and provides a checklist of concrete actions that every organization—regardless of sector or size—can take immediately to:

- Reduce the likelihood of a damaging cyber intrusion,
- Detect a potential intrusion,
- Ensure the organization is prepared to respond if an intrusion occurs, and
- Maximize the organization’s resilience to a destructive cyber incident.

CISA urges senior leaders and network defenders to review the CISA Insights and implement the cybersecurity measures on the checklist.

TSA leaders share tips to get through airport security during the pandemic

There are a handful of actions that travelers can take in an effort to get through Transportation Security Administration (TSA) airport checkpoints during the pandemic in ways that may help reduce the likelihood of contracting COVID-19.

While security is TSA’s top priority, the health and safety of TSA employees and the traveling public is of utmost importance. TSA remains in close communication with medical professionals, the CDC, and various government agencies as we continue to carry out its security mission during the pandemic.

Here are a few suggestions that TSA Federal Security Directors want to share with travelers who are scheduled to fly during the pandemic.

  • John Bambury, TSA Federal Security Director for John F. Kennedy International Airport: “You’ve heard it a thousand times—wear a mask. I wear a mask every single day at the airport, which is one of the top recommendations from the CDC. If you’re flying, you should also consider carrying an extra mask so that if the elastic band snaps on your mask, you’ve got a spare one handy. Also, you may want to change into a fresh mask upon arrival at your destination. If you don’t have a mask, the TSA officer at the travel document checking podium will offer you one for free. When you get to the travel document podium, the TSA officer will ask you to remove your mask for just a few seconds to verify that your face matches the ID that you are presenting.”
  • Scott T. Johnson, TSA Federal Security Director for Washington Dulles International and Ronald Reagan Washington National Airports: “Consider enrolling in TSA PreCheck® because it gets you through the checkpoint conveniently and more quickly than a standard checkpoint lane, making it even more valuable in today’s travel climate. TSA PreCheck passengers spend less time waiting in line and keep their shoes, belts and jackets on during screening and electronics in their carry-ons, reducing overall contact during screening. Travelers in the program also are permitted to leave their 3-1-1 liquids bag in their carry-on bags.”
  • Gerardo Spero, TSA Federal Security Director for Philadelphia International Airport: “Know before you go. By that I mean that you need to know what is in your carry-on bag before you head to the airport to ensure that you have nothing prohibited with you. Prohibited items such as large liquids, knives, pepper spray, loose ammunition, and other prohibited items result in our need to open your carry-on bag and remove them. This keeps you in the checkpoint for an extra few minutes while one of our TSA officers opens your carry-on to search and eventually remove the item. We want to get you through the security checkpoint efficiently and quickly. Prohibited items slow you down.”
  • Thomas Carter, TSA Federal Security Director for Newark Liberty International Airport: “The CDC recommends washing your hands frequently. Consider washing your hands before and after completing the security screening process. If it is not possible to wash your hands, please use hand sanitizer. TSA has instituted a temporary exemption from the 3-1-1 rule, that permits travelers to carry up to one 12-ounce container of liquid hand sanitizer per passenger, in carry-on bags. You can also bring individual hand wipes or a large tub of hand wipes with you to help wipe down your hands and even handles of your carry-on bags.”
  • John C. Allen, TSA Federal Security Director for Yeager Airport: “Do your best to socially distance from others whenever possible. By that I mean, leave some extra space between the traveler in line ahead of you. Take that an extra step back. After you go through the checkpoint scanner, that’s another opportunity to take an extra step back while you wait for your carry-on items along the conveyor belt. Look around, see where you can wait for your carry-on items a little farther away from fellow passengers. Then take your belongings off to the side to put on your shoes, jacket and other items so that you’ve got some extra space of your own to recompose.”
  • Grant Goodlett, TSA Federal Security director for Baltimore/Washington International-Thurgood Marshall Airport: “If you haven’t traveled in a while, you will notice that TSA has installed acrylic shields in checkpoints in an effort to make the screening process safer for passengers and our workforce by reducing the potential of exposure to the coronavirus. Please don’t walk around these acrylic shields to interact with our TSA officers. The shields have small vents to allow for conversation, questions and answers to be shared.”

[Source: TSA]

How Parliamentarians can L.A.B.O.R. for disaster resilience

While hazards may be natural, disasters are not. The choices we make can either increase or decrease risk. As the planet slowly warms, parliamentarians can help. Indeed, they can L.A.B.O.R. for resilience.

The global pandemic caused by Covid-19 has been a wake-up call for the whole world. Appalling losses of life, economic devastation and ripples of insecurity have touched every corner of the planet. No one has been immune and the power (or lack thereof) of the state to prevent, prepare and respond has been severely tested. While there’s no way to guess how the pandemic would have unfolded had the world been more prepared, research repeatedly shows that disaster risk reduction and preparedness mitigate losses by large margins. Just 24 hours warning of a coming storm or heat wave can cut the ensuing damage by 30 percent.

As public tolerance for risk is decreasing; citizens around the world are increasingly exposed to growing and compounded risks, with losses now reaching between $250 and $300 billion annually, up from about $50 billion in the 1980s. Climate change interacts with other hazards - technological, biological, chemical and geopolitical, among others – which creates greater risk complexity. The impacts of disaster know no bounds, but those living in more vulnerable circumstances tend to be the hardest hit, with poorer countries registering the highest post-disaster mortality rates.

While hazards may be natural, disasters are not

Flood, earthquakes, landslides or storms become disasters because of the exposure and vulnerability of people and places. The choices we make can either increase or decrease risk. Therefore, each stakeholder has a role in reducing disaster risk. Parliamentarians are uniquely situated to help societies weather all kind of disasters with more resilience and preparation. Last year, the United Nations Office for Disaster Risk Reduction (UNDRR) and the Inter-Parliamentary Union (IPU) launched a toolkit for parliamentarians detailing how they can help build resilience for their communities. The guidance features ten recommendations grouped into five categories: Legislate; Advocate; Budget; Oversee; Represent (L.A.B.O.R.).

Read below for a snapshot of how parliamentarians can L.A.B.O.R. for their constituency’s resilience.

Legislate
Creating legislation is one of parliamentarians’ key jobs. In this regard, using risk and vulnerability assessments, they can create both DRR (disaster risk reduction) legislation, as well as amend existing legislation to reflect and support international DRR commitments.

Advocate
Parliamentarians can advocate for governments to shift from their current event-centered, response and recovery approach to DRR to a multi-hazard approach that considers vulnerability. They can also advocate for the use of data, expertise and experience from national and international institutions, as well as from other countries, to inform their own DRR frameworks and strategies. Finally, parliamentarians can advocate for DRR to be integrated into climate change plans and initiatives.

Budget (and finance)
Determining budget allocation is another vital task for parliamentarians and here they can focus on funding long-term DRR initiatives – including allocating funds for the oversight of data collection, reporting purposes and regulation enforcement – at all levels of government. Parliamentarians can also integrate and mainstream DRR into public and private investment decisions, ensuring that investments are risk-informed.

Oversee
Accountability is an important aspect of any government investment decision. Parliamentarians can use their oversight role to evaluate government performance, effectiveness and spending for DRR initiatives, thus demonstrating their effectiveness. They can also make people aware of the impacts of regulation, enforcement and penalties. In order to support ease of use and to compare different initiatives, parliamentarians can ensure information is provided in standardized, consistent formats.

Represent
Finally, as elected officials, parliamentarians are responsible for representing all of their constituents and ensuring that DRR policies and plans meet their specific needs. This all-of-society approach must include those most vulnerable in disasters: the poor, women, girls, ethnic minorities and persons with disabilities. Parliaments can ensure that DRR strategies and commitments are durable and will survive electoral changes by using a non-partisan, holistic approach to developing DRR plans.

Using the L.A.B.O.R. framework, parliamentarians can help create disaster-ready communities, both saving lives and protecting economic resources.

[Source: UNDRR]

Balance of Power - Building a Resilient Electric Grid

In early September, Hurricane Ida caused a massive blackout, leaving New Orleans in the dark for more than two days. A month before Ida, Tropical Storm Henri cut power to 100,000 households in Rhode Island. The wildfires in the western United States are common sources of blackouts in California. And earlier this year in Central Texas, harsh winter conditions led to a breakdown of the state’s electric grid, leaving one million people without heat and electricity for days.

These types of events are increasing in frequency as the nation’s infrastructure ages and climate change leads to extreme weather events. Hotter, wetter summers and harsher winters require more reliance on heating and cooling utilities, placing higher stress on the nation’s electric grid. For nearly a decade and a half, the Science and Technology Directorate (S&T) has teamed up with industry and one of the nation’s largest (and windiest) cities to study how technology can ‘help keep the lights on’ during emergencies. This fall, S&T and its partners announced the fruits of this labor: the successful installation and operation of the Resilient Electric Grid (REG) system in Chicago.

How the Electric Grid Works

This is a simplified arrangement of the grid system in the U.S. At the Generation step, electricity is generated at various kinds of power plants by utilities and independent power producers. The plant has lines leading to a transmission substation. The next step is Transmission where electric transmission is the vital link between power production and power usage. There are transmission lines from the generating plant that carry electricity at high voltages over long distances from power plants to communities. These lines lead to a Substation. At the bottom of the image are three light gray buildings with yellow windows, and the bottom right of the image are tall dark gray buildings. Lines from the substation lead to these buildings to represent the Distribution step, where electricity from transmission lines is reduced to lower voltages at substations, and distribution companies then bring the power to your home and workplace. Power lines lead from the Substation to another Substation to the right of the image. Lines from this substation lead to a farm and four houses.The electric grid is a complex network that spans the creation of electricity at a power generation station to the delivery of electricity to the end user. To get from the generation site to the end user, often several (possibly hundreds of) miles away, electricity travels through the transmission system, which converts the very high voltage electricity generated by the power plant to lower voltages. The electricity is further stepped down in voltage through the distribution network as it gets closer to homes, business, and other facilities. Major urban communities have multiple distribution level substations throughout the city to meet the electrical power needs of its population.

Ideally, these distribution substations would be interconnected, so if one substation fails for any reason, another can step in and provide electricity—like driving on system of highways, streets, and roads where you have multiple routes that can get you to the same destination. In reality, however, distribution substations are not interconnected. This is a designed safety feature in the grid so that an issue at one substation, such as a fault current (a large spike in electric current) doesn’t cascade down through the system and impact other substations.

As a result of this set up, if a substation fails, the area that that substation serves experiences a blackout. But what if we could prevent the risk associated with connecting substations so that in the event of a substation failure, other substations could step in and “help” continue to deliver power, creating multiple paths for power to flow just like how traffic flows on the internet?
S&T Powered (and Empowered) a Solution

Finding a solution to increase grid resilience inspired S&T to launch its REG project back in 2007. The project built on the Department of Energy’s (DOE) previous research on High Temperature Superconducting (HTS) cables.

S&T’s Sarah Mahmood, an electrical engineer, led the S&T project team in collaboration with American Superconductor (AMSC), a leading system provider of megawatt-scale power resiliency solutions.

Together, the team developed REG systems featuring cable systems that utilize AMSC’s proprietary Amperium® HTS technology designed to suppress surges while providing the ability to connect substations without risking a cascading fault current.

“Substations are usually not connected because of the risk of fault currents. It’s like a surge. In your house, you use a surge protector. If you don’t have protection against fault currents, you risk damaging the equipment downstream. But because they’re not connected, they lack resiliency,” Mahmood explained.

How a Superconductor Works

HTS cables use liquid nitrogen to keep the cable cool enough to function in a superconducting state. If the HTS cable experiences a fault, the fault creates energy which heats up the system so that it is no longer in a superconducting state, essentially turning itself off automatically, like a switch, preventing equipment damage. What’s more, because HTS cables are superconducting there is very little resistance or loss of power over the length of the cable making them more efficient compared to traditional power cables, which experience a loss of power over distance.

After years of research, development and lab testing to prove the concept of a fault current limiting high temperature superconducting cable, S&T and AMSC partnered with Commonwealth Edison (ComEd), the largest electric utility in Illinois serving over four-million customers, to integrate the technology in the grid.

“S&T is grateful for the partnership with ComEd enabling us to install the REG system in the grid as a permanent asset, hopefully setting a pathway for broader market adoption of this new capability by industry as a potential solution to increase grid resilience,” Mahmood explained.

“The successful integration of the REG system is a major milestone in our efforts to enhance our service to customers through innovation,” said Terence R. Donnelly, President and COO of ComEd. “The increasingly frequent and severe weather events associated with climate change and the need for enhanced cyber and physical security require grid investments that will sustain the high levels of safe and reliable power that our customers depend on.”

HTS Technology Brings Resiliency to Power Grid Operations

A stable homeland is dependent on the reliable delivery of electricity—from public health to the economy and national security. According to DOE's Grid Modernization and the Smart Grid project, there are more than 9,200 electric generating units with more than 1 million megawatts of generating capacity feeding more than 600,000 miles of transmission lines that comprise the U.S. electric grid.

“Our superconductor-based REG system improved the reliability and resiliency of the grid, reducing disruption to public infrastructure and saving money for utility customers—all in an environmentally-friendly manner,” said Daniel P. McGahn, Chairman, President & CEO, AMSC. “We believe this accomplishment opens opportunities for AMSC to deploy REG systems to other innovative utilities.”

On September 30, DHS and DOE participated in a ribbon-cutting in Chicago to highlight the REG system installation into the ComEd grid. ComEd is the first utility in the United States to permanently install the AMSC REG system into the grid and will evaluate connecting it to multiple substations in order to create a back-up system for continuous power delivery even with a disruption to the power grid.

“S&T will continue to monitor the REG system’s performance with hopes for future commercialization, as other utilities look to increase grid resiliency,” said Mahmood.

According to a DOE study, the United States loses nearly $70 billion each year from power outages. S&T’s continued research and development efforts aim to enhance the nation’s overall energy resilience, so future generations can keep the lights on.

[Article source: DHS S&T]

Artificial Intelligence: How to make Machine Learning Cyber Secure

Machine learning (ML) is currently the most developed and the most promising subfield of artificial intelligence for industrial and government infrastructures. By providing new opportunities to solve decision-making problems intelligently and automatically, artificial intelligence (AI) is applied in almost all sectors of our economy.

While the benefits of AI are significant and undeniable, the development of AI also induces new threats and challenges, identified in the ENISA AI Threat Landscape.

How to prevent machine learning cyberattacks? How to deploy controls without hampering performance? The European Union Agency for Cybersecurity answers the cybersecurity questions of machine learning in a new report recently published.

Machine learning algorithms are used to give machines the ability to learn from data in order to solve tasks without being explicitly programmed to do so. However, such algorithms need extremely large volumes of data to learn. And because they do, they can also be subjected to specific cyber threats.

The Securing Machine Learning Algorithms report presents a taxonomy of ML techniques and core functionalities. The report also includes a mapping of the threats targeting ML techniques and the vulnerabilities of ML algorithms. It provides a list of relevant security controls recommended to enhance cybersecurity in systems relying on ML techniques. One of the challenges highlighted is how to select the security controls to apply without jeopardising the expected level of performance.

The mitigation controls for ML specific attacks outlined in the report should in general be deployed during the entire lifecycle of systems and applications making use of ML.

Machine Learning Algorithms Taxonomy

Based on desk research and interviews with the experts of the ENISA AI ad-hoc working group, a total of 40 most commonly used ML algorithms were identified. The taxonomy developed is based on the analysis of such algorithms.

The non-exhaustive taxonomy devised is to support the process of identifying which specific threats target ML algorithms, what are the associated vulnerabilities and the security controls needed to address those vulnerabilities.

The EU Agency for Cybersecurity continues to play a bigger role in the assessment of Artificial Intelligence (AI) by providing key input for future policies. The Agency takes part in the open dialogue with the European Commission and EU institutions on AI cybersecurity and regulatory initiatives to this end.

ESF Members, NSA and CISA publish the fourth installment of 5G cybersecurity guidance

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) published the fourth installment on securing integrity of 5G cloud infrastructures, Ensure Integrity of Cloud Infrastructure. As 5G networks and devices continue to increase in popularity, the importance of platform security to harden your systems against malicious cyber activity and persistence is apparent.

This guidance has been created by the Critical Infrastructure Partnership Advisory Council (CIPAC) Cross Sector Enduring Security Framework (ESF) Working Group - a public-private working group led by NSA and CISA, that provides cybersecurity guidance addressing high priority threats to the nation’s critical infrastructure.

Ensure Integrity of Cloud Infrastructure provides guidance on platform integrity, build time security, launch time integrity, and micro services infrastructure integrity. An industry trend has been to deploy stand-alone 5G core using virtualized functions of micro services on an architecture that provides rapid enablement of services. It is imperative for device and system security that the underlying 5G cloud infrastructure platform on which micro services are deployed, or orchestrated, have been designed and built securely and continue operating as intended.

"A secure 5G core requires cybersecurity mitigations that are implemented at the foundation level and carried forward," said Jorge Laurel, NSA Project Director for ESF. "A secure underlying foundation ensures the services deployed on the network are done so on a secure infrastructure, which further strengthens the security of data across the network."

“The document provides actionable advice for 5G operators, said Neal Ziring, NSA Cybersecurity Technical Director. “The fourth installment in the series covers an essential topic: integrity. Integrity is the most fundamental security property, and ensuring integrity from base hardware up through the software stack is critical for maintaining trustworthy 5G services.”

“The issues facing the cloud community, such as lateral movement to pod security and infrastructure integrity, are complex as are their solutions,” said Alaina Clark, Assistant Director of Stakeholder Engagement, CISA. “This series demonstrates the value of collaboration, spotlighting several cyber best practices that cloud providers, mobile network operators, and customers alike can implement for long-term security benefits. With our ESF government and industry associates, CISA will continue working with the Cloud and 5G communities to secure our Nation’s network infrastructure through partnership efforts like this.”

Maritime Infrastructure: Public Ports Engage in an Extensive Range of Activities beyond Freight Movement

Coastal, Great Lakes, and inland ports are critical to the U.S. economy. Aside from moving freight, ports across the U.S. have a variety of non-freight activities—like cruise ship and ferry terminals, commercial fishing, recreation, and commercial and residential development. Ports engage in non-freight activities to diversify business, find new uses for underused facilities, and contribute to community development.

Federal grant programs we reviewed provided some support to ports for these activities, with the Department of Transportation providing most funding for freight and non-freight projects.

Public ports across the U.S. pursue an extensive range of activities unrelated to freight movement. Examples of such non-freight activities include cruise ship and ferry terminals, commercial fishing, recreation, and commercial and residential development. In a GAO survey of ports, 67 of the 80 respondents reported being involved in non-freight activities in the last 10 years, with most respondents having a mix of freight and non-freight activities. Port officials said they pursue non-freight activities to diversify lines of business, find new uses for underused facilities, and address unmet community development needs, among other reasons. Non-freight activities can also have economic impacts including creating jobs, according to port stakeholders and economic impact studies. For example, one study estimated that commercial fishing activity at the Port of Seattle accounted for 11,300 jobs and generated $1.4 billion in total business output in 2017. Ports most commonly reported funding their non-freight activities with port revenues (55 survey respondents) or state funds (53 survey respondents).

Federal grant programs GAO reviewed have provided some funding to ports for non-freight projects but have largely focused on freight. According to GAO's analysis of federal grant award data for fiscal years 2010 through 2020, agencies provided at least $141 million to ports for non-freight projects during this time, or about 8 percent of the almost $1.9 billion in total funding these programs awarded to ports, in fiscal year 2020 dollars. The U.S. Department of Transportation (DOT) provided the majority of funding to ports for both freight and non-freight projects. DOT-funded non-freight projects include ferry-, cruise-, and fishing-related projects, among others. Stakeholders reported that ports, especially small ports, face challenges with federal grant programs. For example, stakeholders and federal officials said that many grant programs GAO reviewed are consistently oversubscribed and that smaller ports may lack the resources to develop a competitive application. Stakeholders GAO spoke with differed on the need for additional federal funding for non-freight activities.

The nation's coastal, Great Lakes, and inland ports have long been recognized as critical to the national and local economies. Ports can contribute not only by moving freight but also, for example, through activities related to tourism, transportation, or real estate. Nationwide port studies have typically focused on the impact of freight, and less attention has been paid to these non-freight activities.

House Report 116-452 included a provision for GAO to examine ports' non-freight activities. This GAO report describes (1) what is known about the nature of and funding for non-freight activities at public ports, and (2) the extent to which federal discretionary grant programs have provided funds to public ports for non-freight and freight projects, and stakeholders' views on this federal assistance.

To address the two objectives above, GAO conducted a non-generalizable survey of 80 ports and interviewed officials at 15 ports and 14 port industry stakeholders. GAO selected ports for variety based on their level of non-freight activity, freight traffic, and location, and whether they have applied for DOT funding. GAO also interviewed officials within DOT; the Departments of Commerce (Commerce), Defense, and Homeland Security; and the Environmental Protection Agency (EPA).

ESA and PSCE cooperate on Space Applications and Digital Transformation in Public Safety

The European Space Agency (ESA) and Public Safety Communication Europe (PSCE) are working together to support the emergence of space-based applications in the domain of public safety. Having jointly signed a Memorandum of Intent (MoI), the organisations will join efforts to support the emergence of applications that leverage on secure satellite communications for addressing the needs of blue forces. ESA will launch a funding call early in 2022 to invite companies to develop and demonstrate digital services that are enabled by secure satcom solutions for addressing the urgent needs of public safety operators.

Security in space and on Earth are inextricably linked. The deployment of advanced satellite systems and their safe circulation in space are crucial for resilient and secure connectivity on Earth. As set out in its recently released vision for European space activities, ESA is stepping up its efforts to enable Europe to address new safety and security user needs to make sure that our space programmes continue to be at the service of all citizens through Agenda 2025. ESA's Strategic Programme Line “Space Systems for Safety and Security (4S)” combines both to include applications within disaster preparedness, response and resilience, situational awareness, assessments of damages, navigation-based services for tracking and coordinating rescue forces on-site and for emergency vehicles.

Through its ARTES (Advanced Research in Telecommunications Systems) programme, ESA is forging strong links between institutions, industries, and business to leverage the capabilities of space to drive digital services.

“I’m pleased to be working with PSCE to realise the potential of space to drive commercial solutions for secure satellite communication in public safety. This is a great example on how ESA is promoting the use of space technologies and applications to address safety and security needs expressed by the organisations operating in this domain. This collaboration will pave the way to the ESA Rapid and Resilient Crisis Response (R3) Accelerator,“ says Rita Rinaldo, Head of the Partner-led and Thematic Initiatives Section, ESA Space Solutions.

1 14 15 16 17 18 30