• 热门标签

当前位置: 主页 > 航空资料 > 国外资料 > ICAO >

时间:2011-08-28 13:01来源:蓝天飞行翻译 作者:航空
曝光台 注意防骗 网曝天猫店富美金盛家居专营店坑蒙拐骗欺诈消费者

Given the complexity of the task and a broad range of actors involved, coordi-nation of such efforts remains of the utmost importance. While presenting a detailed compendium of ongoing projects and programmes worldwide is outside the scope of this paper, ICAO has been taking into account and tracking other relevant capacity-building activities in order to ensure that the current and future projects do not duplicate but complement and reinforce each other. Also, where possible, creating synergies, economies of scale and adding to sustainability of such projects.
423Atableof coordinated assistance activitiesmaybe foundin Volume4, Number1ofthe MRTD Report, available at http://www2.icao.int/en/MRTD/Pages/ICAOMRTDReport.aspx.
Another important aspect is to ensure that such capacity-building work capitalises on each international agency’s strengths and areas of expertise. Inter-agency MOUs are of particular help in this respect as they assist in outlining the roles and focus of each actor.
I. Some Problem Areas
(a)
Some  States do not issue machine-readable passports compliant with ICAO standards and speci.cations, and are unable to meet the1 April 2010 deadline for their introduction in accordance to their international obligations under the Chicago Convention. In addition, their old-style passports present insuf.cient security features, use glued-in passport photos that can be easily altered includ-ing photo substitution on the bio-data page and exploited by transborder criminals.424

(b)
In a number of countries, including those that already have ICAO-compliant MRPs, breeder documents (birthcerti.cates, nationalID cards, etc.) requiredto applyfor a passport generally have no security features and can be easily faked or altered. When combined with weaknesses in their current Civil Registry system (e.g., no matches between birth and death records or name changes), this situations presents numerous opportunities for identity fraud where a “legitimately-issued” passport could be obtained on the basis of fake or doc-tored breeder documents. As modern MRPs are very dif.cult to forge or alter effectively, the focus of document fraud worldwide has been increasingly shifting to breeder documents which often have insuf.cient security features and can be exploited for criminal purposes.

(c)
In some countries, including those that already have ICAO-compliant MRPs, immigration staff process passport controls manually, without the use of an automated database with passport readers that would store information which couldbe retrieved and analyzed as required. In addition, there is often no watch list functionality which makes it impossible to detectknown cases of document fraud and persons of interest. Such lack of processing infrastructure eliminates the facilitation advantages that MRTDs offer and constitute vulnerability in preventing terrorism and trans-border crime.

(d)
In a number of States, immigration and passport of.cials appear to have very limited knowledge of migrant processing and passport examination, and gener-ally have notundergone anyspecializedvocational training relevant to their daily duties. They cannot take advantage of modern secure MRTDs and migrant processing techniques, often reducing their work to a mechanical stamping of passports, with obvious implications to border security and integrity.


424While a laser-engraved passport photo is not part of the ICAO MRTD standards yet, it is a recommended good practice as photo substitution of glued-in passport photos remains perhaps the most common modus operandi in travel document fraud.
F. Unmanned Aerial Vehicles
Based on the Environmental Scan data, these are the main capacity gaps that
present security vulnerabilities which can be exploited by criminals and terrorists. While implications to those speci.c States’ national security are obvious, the current situation presents security risks regionally and even globally. Trans-border crime is international by de.nition, and border security and identity management weaknesses have the potential of spilling over across international borders. Most developing nations reliant on international aid are unlikely to be able to solve the identi.ed security challenges without international technical assistance that would provide funding and expertise to tackle the problem in a coordinated manner.
 
中国航空网 www.aero.cn
航空翻译 www.aviation.cn
本文链接地址:Aviation Security Law 航空安全法(119)