«COOPERATION THEME 10 SECURITY (European Commission C(2007)5765 of 29 November 2007) FP 7 Cooperation Work Programme: Security This Work Programme ...»
Activity 1: Security systems integration, interconnectivity and interoperability For each of the four mission areas, integration, connectivity and interoperability play a very specific enabling role - both within and amongst missions. The purpose of this section is to draw attention to, and in some instances expand upon, those common issues of importance mentioned within the mission areas. Activities will enable and/or contribute to the performance of technology required for building up the necessary capabilities, thus focusing on cross-cutting issues such as: enhancing the interoperability and intercommunication of systems, equipment, services and processes while ensuring their reliability, protection of confidentiality and integrity of information, traceability of all transactions and their processing etc. Activities will also address standardisation and training matters (including such with respect to cultural, human and organisational interoperability).
To reach these objectives, a joint call with the ICT Theme is organised as follows:
Joint Call between the ICT Theme and the Security Theme on Critical Infrastructure Protection The interoperability and interconnectivity of supply systems is one of the cornerstones of the functioning of our societies. The vulnerabilities in the intercommunication of systems, equipment, services and processes and their resilience against malicious attacks of terrorism and (organised) crime are elementary to the security of the citizens.
The objective of the joint call is to make key infrastructures of modern life, such as energy production sites and transmission systems, storage and distribution, information and communication networks, sensitive manufacturing plants, banking and finance, healthcare, or transportation systems more secure and dependable. The aim is to protect such critical infrastructures that can be damaged, destroyed or disrupted by deliberate acts of terrorism, natural disasters, negligence, mismanagements, accidents, computer hacking, criminal activity and malicious behaviour and to safeguard them against incidents, malfunctions and failures.
The joint call is structured around two specific foci.
For more details concerning these topics consult the ICT Work programme.
Focus of the ICT Theme Objective ICT-SEC-2007.1.7 The first focus is called for by the ICT theme21 and is addressing technology building blocks for creating, monitoring and managing secure, resilient and always available information infrastructures that link critical infrastructures so that they survive malicious attacks or accidental failures, guarantee integrity of data and continuous provision of responsive and
trustworthy services, and support dynamically varying trust requirements. This includes:
a) Understanding and managing the interactions and complexity of interdependent critical infrastructures; mastering their vulnerabilities; preventing against cascading effects;
providing recovery and continuity in critical scenarios (including research towards designing and building self adapted and self healing complex systems); and security and dependability metrics and assurance methods for quantifying infrastructure interdependencies.
b) Designing and developing secure and resilient networked and distributed information and process control systems; systemic risk analysis and security configuration and management of critical information infrastructures and dynamic assurance frameworks for interconnecting them with critical infrastructures; availability of security forensics.
c) Developing longer term visions and research roadmaps; metrics and benchmarks for comparative evaluation in support of certification and standardisation; international cooperation and co-ordination with developed countries; coordination with related national or regional programmes or initiatives.
Call: Joint Call ICT & Security 1 Funding schemes: (a) and (b) Collaborative Projects ('small or medium scale focused research projects' only); (c) Coordination and support actions (aiming at coordinating or at supporting research activities).
Focus of the Security Theme
The second focus is called for by the Security theme and is addressing technology building blocks for creating, monitoring and managing secure, resilient and always available transport and energy infrastructures that survive malicious attacks or accidental failures and
guaranteeing continuous provision of services. The following topics are called:
Topic ICT-SEC-2007-1.0-01 Risk assessment and contingency planning for interconnected transport or energy networks Technical content / scope: The task is to develop integrated frameworks and agreed, common methodologies for (a) global analyses and assessment of risks, failures and vulnerabilities of transport or energy infrastructures, and (b) management and contingency For more details concerning these topics consult the ICT Work Programme.
planning based on the compilation and analyses of emergency plans, to assure interoperability between interconnected and interdependent heterogeneous transport or energy infrastructures.
Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project and Coordination and support action (aiming at supporting research activities).
Topic ICT-SEC-2007-1.0-02 Modelling and simulation for training
Technical content / scope: Security crises concerning cross-border interconnected European transport or energy infrastructures can lead to effects with high impacts of disruption. The task consists of modelling & simulation including scenario building for handling security incidents to support the training of crisis managers.22 Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project.
Topic ICT-SEC-2007-1.0-03 Optimised situational awareness through intelligent surveillance of interconnected transport or energy infrastructures Technical content / scope: The task consists of developing tools that integrate smart surveillance information from interconnected and heterogeneous transport or energy infrastructures in order to build up high level situation awareness. The objective is to enable optimized decision making required for cross-border interoperable crisis management to ensure secure, resilient and always available transport or energy infrastructures.23 Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project.
Topic ICT-SEC-2007-1.0-04 ICT support for first responders in crises occurring in critical infrastructures Technical content / scope: The task consists of developing novel technologies for personal digital support systems as part of an integral, secure emergency management system to support first responders in crises occurring in various types of critical infrastructures under all circumstances. The action has to build upon ongoing research on emergency management, secure wireless communication, first responder technologies, etc. See as well topic SEC-2007Personal equipment with a view to compatibility and complementarity.
Call: Joint Call ICT & Security 1 Funding scheme(s): Collaborative project.
Actions in this area will provide significant improvement in the security, performance, dependability and resilience of complex and interdependent critical infrastructures while considering as well organisational dynamics, human factors, societal issues and related legal aspects.
See also COM(2005) 576 final. Green Paper on a European Programme for Critical Infrastructure Protection.
Same as previous footnote.
They will reinforce European industry’s potential to create important market opportunities and establish leadership.
They will contribute to establishing, strengthening and preserving trust in the use of technologies for the protection of critical infrastructures. This includes creating sufficient awareness and understanding of all relevant issues for the take-up of their outcome (e.g.
regarding potential classification requirements, international co-operation needs, communication and implementation strategies etc.), in order to ensure acceptance of such technologies by relevant stakeholders.
They will achieve a more effective protection through enhanced co-operation, coordination and focus across Europe, and contribute to the development and promotion of metrics, standards, evaluation and certification methods and best practice in security of critical infrastructures.
Under the condition that the preliminary draft budget for 2008 is adopted without modifications by the budgetary authority Under the condition that the preliminary draft budget for 2008 is adopted without modifications by the budgetary authority
Indicative budget allocation for the Security Work Programme 2007 Security Research Call 1 (FP7-SEC-2007-1) Up to an indicative 3% for international co-operation.
Up to an indicative 2% for ERA-NET.
An indicative 58% (deviation possible from 50% to 70%) for integration projects (Areas 1.2, 2.2, 3.2, 4.2).
An indicative 35% (deviation possible from 25% to 45%) for capability projects (Areas 1.3, 2.3, 3.3, 4.3, in activity 6).
An indicative 7% (deviation possible from 4% to 12%) for topics which are implemented through coordination and supporting activities (Areas 1.1, 2.1, 3.1, 4.1, in activity 6, activity 7).
Joint Call ICT & Security 1 (FP7-ICT-SEC-2007-1) Up to an indicative 3% for international co-operation.
An indicative 90% (deviation possible from 80% to 100%) for collaborative projects.
Up to an indicative 10% for coordination and support actions.
This amount includes EUR 76.2 million from the 2008 budget, which is added under the condition that the budget for 2008 is adopted without modifications by the budget authority.
• Evaluation procedure:
A one-stage submission procedure will be followed.
Proposals will be evaluated in a single-step procedure.
• Indicative evaluation and contractual timetable: Evaluations of proposals are expected to be carried out in June/July 2007. It is expected that the contract negotiations for the shortlisted proposals will be open from September 2007 to July 2008.
• Consortia agreements are required for all actions.
• Particular requirements for participation, evaluation and implementation:
The minimum number of participating entities required, for all funding schemes, is set out in the Rules for Participation: For Collaborative projects, the minimum condition shall be the participation of 3 legal entities, each of which is established in a Member State or Associated Country and no two of which are established in the same Member State or Associated Country. For Coordination and Supporting Actions aiming at supporting research activities and policies the minimum condition shall be the participation of one legal entity. For Coordination and Supporting Actions aiming at coordinating research activities and policies the minimum condition shall be the participation of three legal entities, each of which is established in a Member State or Associated Country, and no two of which are established in the same Member State or Associated Country.
Proposals must not contain any classified information, this will immediately lead to declaring them ineligible (note that the proposed action itself can involve classified information).
If classified inputs are required to carry out a proposed action or the output of the action needs to be classified, proposers have to ensure and provide evidence of the clearance of all relevant persons and facilities. Consortia have to clarify issues such as e.g. access to classified information or export or transfer control with the national authorities of their Member States / Associated Countries prior to submitting the proposal. Proposals need to provide a security aspect letter, indicating the levels of classification required. Appropriate arrangements have to be included in the consortium agreement.
Proposers claiming that their proposal should receive Community funding up to 75% should demonstrate in the proposal that the required conditions (very limited market size and a risk of "market failure", the need for accelerated equipment development in response to new threats) apply. The final decision will be based on the recommendations of the relevant evaluation panel.
Consortia are strongly encouraged to actively involve SMEs and end users. Their presence in the consortia will be judged under the evaluation criterion ‘Quality and efficiency of the implementation and the management’ with a view to meeting the main objectives of the theme.
Proposers responding to SEC-2007-7.0-06 must be NCPs officially appointed by the relevant national authorities, all others will be considered non eligible.
The evaluation panel will comprise end users as well.
Page 50 of 57 FP 7 Cooperation Work Programme: Security
The evaluation criteria (including weights and thresholds) and sub-criteria, together with the eligibility, selection and award criteria for the different funding schemes are set out in Annex 2 to this work programme.
Positively evaluated proposals involving sensitive and classified information, those involving international co-operation as well as those collaborative projects where 75% funding for all participants is foreseen will be flagged to the members of the Security Programme Committee configuration and dealt with according to its Rules for Procedure.
Coordinators of all integration project proposals and of all demonstration project (phase 1) proposals that pass all the evaluation thresholds can be invited to a hearing.
As a result of the evaluation, a ranked list of proposals retained for funding will be drawn up as well as a reserve list of proposals that may be funded in case budget becomes available during negotiations.
The forms of grants which will be offered are specified in Annex 3 to the Co-operation work programme
III.2 Joint Call ICT & Security 1 (FP7-ICT-SEC-2007-1)
• Call title: Joint Call ICT & Security 1