IPATCH logo

Resources

  • D4.2 – Legal Analysis

    This report provides an overview of the legal framework in which the counter piracy measures proposed in D3.1 of the IPATCH project must operate. It also presents an in-depth analysis of the legal implications of the counter piracy measures proposed in D3.1, and derives a measure of “legality” for each countermeasure, as well as a definition of the legal framework surrounding piracy countermeasures. The countermeasures proposed by D3.1 are divided into four categories: • “Monitoring and communication” countermeasures; • “Non-lethal” countermeasures; • “Less-than-lethal” countermeasures; • and “Lethal” countermeasures. The conclusion of the analysis undertaken is that a “measure of legality” is impossible, given the complexity of the legal framework, but classifying the proposed countermeasures into these four different categories is helpful to evaluate the degree of their legal implications.

    Uploaded:  27 / Jun / 2017

  • D4.3 – Ethical and Societal Analysis

    This document constitutes deliverable D4.3 of the project, and was originally intended to develop a quantitative and qualitative scoring of the countermeasures in order to compare the levels of ethical & social acceptance. This objective is impossible to fulfil in its literal interpretation, due to the nature of ethics in one hand, and to the context of armed conflict, on the other hand. Instead, this study aims to provide a qualitative and critical ethical impact assessment, based on a number of ethical frameworks described herein. It proposes a typology that classifies the countermeasures, taking account of the specific context. Apart from the monitoring technologies, the countermeasures were classified as the following: non-lethal, less than lethal and lethal. Our recommendation here is to encourage the use of the non-lethal first, than the less than lethal; and to discourage the use the lethal ones.

    Uploaded:  28 / Jun / 2017

  • D5.2 - Maritime Data Collection

    This document describes the details of the data collection campaign held by IPATCH on 21st and 22nd April 2015, including the recording location, number and type of vessels and pirate boats (skiffs) and details of the sensors used. The document also describes in detail the scenarios which were recorded, derived from the threat scenarios developed in WP3 of the project.

    Uploaded:  31 / Aug / 2015

  • D5.41 – Early Detection Module 1

    This document describes the work carried out in Task 5.4 of the IPATCH project, whose aim was to develop the Early Detection Module (EDM) of the on-board system. The role of the EDM is to utilise sensor fusion algorithms to combine the outputs of sensors and detection/tracking algorithms and provide input to the higher level situational awareness modules of the on-board system. Whilst previous deliverables (D5.1, D5.2 and D5.3) have reported on the development of the individual algorithmic methods which will be deployed, this document explains how the algorithms can be implemented in a real operational system and integrated within the framework of the IPATCH on-board situational awareness platform. An overview of the EDM architecture is presented, and the current status and plans for integration with other sub-systems is described. A report on the current results from initial tests is given, as well as discussion of the remaining work to be carried out between the time of writing and the first sea trials in WP8.

    Uploaded:  28 / Jun / 2017

  • D5.42 – Early Detection Module 2

    This document presents the follow-on work to deliverable D5.41 regarding the development of the Early Detection Module (EDM) of the on-board system in IPATCH. The role of the EDM is to utilise sensor fusion algorithms to combine the outputs of sensors and detection/tracking algorithms and provide input to the higher-level situational awareness modules of the on-board system. This document updates on how the prototype of the Early Detection Module has evolved compared to the version presented in D5.41. The progress made in the individual detection and tracking algorithms which operate on data from single sensors (visible cameras, thermal cameras, and data from the ship’s bridge systems) is described and updates to the multi-sensor multi-target tracking component are reported. The updated architecture of the Early Detection Module and its constituent parts is presented and the current performance and remaining issues to be addressed are discussed.

    Uploaded:  28 / Jun / 2017

  • D6.31 – Threat Recognition and Classification Module 1

    This report describes the work done in WP6, and especially in T6.3 with the aim to produce a cohesive suite of methods that can communicate data with the IPATCH Integration Platform. The report presents the further work that was done since the deliverables “D6.1 – Situational Awareness and Behavioural Analysis Algorithms” and “D6.2 – Threat Detection and Classification Algorithms”. This work consists mostly of integration work and further development of the specific methods in the Threat Classification Module (TCM), i.e. the Semantic models, the Situational awareness models and the Bayesian network (BN) models. Integration tests, performed on 1st – 3rd March 2016 at the WP8 integration meeting, had shown that the different parts of the TCM can communicate data objects to and from the Integration Platform. These data objects are Actors, Behaviours and Common Operational Picture (COP). The data model, the semantic models and the BN have been further developed and refined for the IPATCH applications. The results presented in this report describe mainly results from the integration work, or rather, the results show the current status of the integration work. ‘Integration’ here means how data is communicated to and from the Integration Platform. In addition, the Semantic models have been verified against several of the IPATCH scenarios.

    Uploaded:  28 / Jun / 2017

  • D6.32 – Threat Recognition and Classification Module 2

    This report presents the final version of the Threat Classification Module (TCM) developed in WP6, and is a continuation of D6.31 – Threat Classification Module 1. The outline of the report is as follows. Section 2 describes the further development of the different parts of the TCM. Section 3 presents evaluation results from individual models as well as from integration tests of the whole chain of models. Section 4 describes a countermeasure module that will use information from the TCM to select countermeasures. Finally section 5 presents conclusions and future work.

    Uploaded:  28 / Jun / 2017

  • D7.11 – On-board Integration Platform 1

    This report describes the design and development of the integration platform component in task 7.1 of the IPATCH project. The Integration Platform for IPATCH is an evolution of the Integration Platform developed within the FP7 project ARENA. The architectural evolutions were described in IPATCH deliverable D2.3 and the implementation and refinements have been carried out in task 7.1. The main evolutions contain, besides the data model, the inclusion of topics in the publish/subscribe architecture, the clarification of modules’ roles, and a rewriting of the C++ library. The first phase of task 7.1 succeeded in providing the evolutions required for the IPATCH use case.

    Uploaded:  28 / Jun / 2017

  • D7.12 – On-board integration platform 2

    This report describes the design of the Integration Platform for IPATCH, which is an evolution of the ARENA Integration Platform. The evolutions were described in D2.3. The main evolutions contain, besides the data model, the inclusion of topics, the clarification of modules roles, and a rewriting of the C++ library. The first phase of Task 7.1, reported in deliverable D7.11, succeeded in provided these evolutions. The second phase consisted of code convergence, testing, bug fixing, optimization, and better documentation. This document reports the work which took place in this second phase of Task 7.1. The most significant contribution in the second half of the task was performance optimization, which has been increased substantially. However, it has become clear throughout the testing phase that the use of XML messages has become a performance bottleneck which will be difficult to alleviate without switching to a different approach. Suggestions for future improvements are suggested towards the end of the document.

    Uploaded:  28 / Jun / 2017

  • D7.21 – Decision Support Tool 1

    This deliverable (D7.21) presents the general concept, methodology and current status of the decision support module prepared within task T7.2 – Decision Support Tool. Additionally the main inputs outputs of the Decision Support (DS) module and the methods of recommending are described there, which include approach to Counter Measure (CM) classification, system modes, exclusions, system configuration, parameters, etc.

    Uploaded:  28 / Jun / 2017

  • D7.22 – Decision Support Tool 2

    This document presents the work that was done in task 7.2, the aim of which was to develop the decision support tool which will provide a guide on what should be done in the given situation. The main methodology and logic of Decision Support module was described in the previous deliverable which was the result of task 7.2 and named D7.21 Decision Support Tool 1. This document extends the previously presented concept and provides more details concerning data processing and parameters which configures the module. Its open architecture and various parameters enables it be a flexible solution which could be easily reconfigured if new data is available which has been described in module maintenance section. Because this deliverable summarizes the work on software component a significant part has been dedicated to the description of software architecture. Thus, the deliverable contains a description of the module logic, workflow diagrams, internal components and software methods. The whole work is summarized using an example of a use case which shows the module output in relation to parameters which could be used for its configuration. This approach enables the same module to be adapted continuously to constantly changing threats and new situations when in use in a real system.

    Uploaded:  28 / Jun / 2017

  • D7.31 – Human Machine Interface 1

    The IPATCH Human Machine Interface (HMI) is one of the main development components of the IPATCH project. There are two main reasons that HMI is such an important and integral component of this project: a) it allows the end users to see in a user friendly format the output of the system while it is working, and b) it provides the developers of the algorithms used in the project to test and optimize their algorithms. Finally, using the HMI we can show proof of concept by demonstrating playbacks of real life scenarios and the outputs of the algorithms regarding these scenarios in a smart and user friendly way for a non-expert. The scope of this deliverable is to give an overview of the HMI. This includes technical characteristics, its main functions based on the user requirements, the layout of the system as well as the graphical user interfaces (GUIs) it provides, and finally the capabilities of connecting to external modules for exchange information through the Integration Platform (IP).

    Uploaded:  28 / Jun / 2017

  • D7.32 – Human Machine Interface 2

    The scope of this deliverable is to give an overview of the IPATCH Human Machine Interface (HMI), which is one of the main development components of the IPATCH project. This includes technical characteristics, its main functions based on the user requirements, the layout of the system as well as the graphical user interfaces (GUIs) it provides and finally the capabilities of connecting to external modules to exchange information through the Integration Platform (IP) and Protocol Buffers (Protobuf). The contribution of this deliverable to project goals and objectives is to demonstrate the capabilities of the HMI showing that it is a user-friendly and intuitive system to use especially in stressful situations such as a pirate attack when decisions have to be taken quickly.

    Uploaded:  28 / Jun / 2017

  • D8.33 – Consolidated Evaluation Report

    This deliverable evaluates the final outcomes of the IPATCH project relating to the on-board system for surveillance, threat detection and decision support. It consolidates results from the development, land-based testing and sea trials, and discusses the performance of the on-board system and its components.

    The first part of this document presents the technical evaluation of the key functionalities of the system: detection and tracking, situation awareness, threat recognition and decision support. It provides a quantitative assessment of how well the system performs in these areas.

    The second part of the document provides a more holistic, qualitative evaluation and assesses the concept of the system in a broader context. It includes a critical analysis of the concept and approach, and a discussion of the results and conclusions. It also provides some discussion on how the IPATCH system and its parts might be used in the future.

    Uploaded:  6 / Jul / 2017

  • D9.3 – Report on the Threat Scenarios Workshop

    The report on the Threat Scenarios Workshop presents the outcomes of a discussion workshop with maritime companies and other relevant stakeholders. The workshop took place in London on 3rd December 2014 alongside the TRANSEC conference on transport security. It was organised to verify the data analysis results, discuss the use of countermeasures and develop realistic and pertinent threat scenario models. This document describes the preliminary results of Task 3.2 (Data Analysis) and Task 3.3 (Threat Scenarios and Countermeasure Definitions) as well as the main points discussed during the workshop. The outcome of the workshop is a long list of useful comments and suggestions that will inform the refinement of the threat scenarios (Task 3.3) as well as provide input regarding the manual on countermeasures (Task 4.4), the threat recognition algorithms (Task 6.2), and the decision support tool (Task 7.2).

    Uploaded:  6 / Feb / 2015

  • D9.4 – Performance Evaluation Workshop

    This document describes the planning and outcomes for the Workshop on Performance Evaluation of Tracking and Surveillance (PETS). The workshop is the chosen platform to disseminate the IPATCH dataset, corresponding to the maritime threat scenarios of the data collection campaign that has been held in Brest, France in April 2015. A first edition of the PETS workshop disseminating the IPATCH dataset took place on July 1st 2016 in Las Vegas, USA, in conjunction with CVPR 2016. A new edition of PETS disseminating the IPATCH dataset took place on July 26th 2017 in Hawaii, USA, in conjunction with CVPR 2017. This document includes the workshop structure, the workshop challenges, submission and acceptance procedure, and final programme for each of both PETS editions.

     

    Uploaded:  28 / Jun / 2017

  • D9.51 – Report on the first legal and ethical workshop

    This deliverable reports on the first Ethical and Legal Workshop, which was organized jointly with the IPATCH, P5 and PARIS projects and held on 13th March 2015 in Namur, Belgium. The sub-title of the workshop was “Deepening the reflection on ethical, legal and social issues in security surveillance technology projects”. The workshop was able to carry a reflective perspective on the ethics work already done in these projects. This first workshop was organised to engage legislation and policy makers, researchers in the fields of sociology, psychology and law, and experts in surveillance technologies, with the aim of discussing and reviewing the ethical and legal issues surrounding the use of different countermeasures and privacy issues resulting from the use of threat-detection technologies. Representatives from the IPATCH consortium were joined by members of the P5 and PARIS project consortia. These projects raise similar legal and ethical concerns and cross-fertilisation of the different experiences was an interesting dimension of the discussion.

    Uploaded:  28 / Jun / 2017

  • D9.52 – Report on the second legal and ethical workshop

    This document provides a summary the second ethical and legal workshop of the IPATCH project, which was held on April 15th at the Antwerp maritime academy (Hogere Zeevaartschool, Antwerp) with the collaboration of Royal Belgian Marine Society and was entitled “Conference on the legal implications of the use of piracy countermeasures by commercial vessels”. The aim of this conference was to organize the discussions around several concrete piracy scenarios that ships and crews could potentially face, providing an opportunity to apply ethical and legal principles (which sometimes seem very abstract) to more defined realities with the objective of making these principles more practical and comprehensive. The main discussion sessions were focused on three topics: • applicable law to countermeasures and the concept of legitimate self-defence applied to the use of “lethal” piracy countermeasures; • concept, extent and consequences of legitimate self-defence applied to “less-than-lethal” and “non-lethal” piracy countermeasures; • operational cooperation and coordination between law enforcement authorities (LEAs) involved in the fight against piracy.

    Uploaded:  6 / Jul / 2017