This document discusses threats to critical energy infrastructure from unconventional conflicts. It outlines five key energy challenges facing European countries, including increased dependence on imports and instability in key energy producing regions. The document then categorizes potential targets for attacks and analyzes the motivation and feasibility of targeting oil and gas infrastructure, pipelines, and terminals. While certain infrastructure is vulnerable, the document argues that threats to maritime shipping routes may be overvalued given the small number of actual attacks in the past 14 years. Overall, the document aims to provide a typology of threats but notes the difficulty in achieving the right analysis of risk levels.
This document provides an agenda for a global energy security conference in 2016. It summarizes the topics to be covered, including the current state of global oil markets, demand and supply trends, geopolitical issues in the Middle East and North Africa region, and the future outlook. It also introduces Dr. Cyril Widdershoven, the speaker, and provides details on his background working on energy issues in the Middle East and North Africa.
International Mediterranean Conference Istanbul 20-22nd April 2016Cyril Widdershoven
This document summarizes Dr. Cyril Widdershoven's presentation on energy, security, and economic opportunities in the Mediterranean region. It discusses the turmoil in the region following the Arab Spring uprisings, instability in North Africa, and challenges facing European energy security. It argues that greater cooperation is needed between Europe, North African countries, Turkey, and other regional players to address conflicts, boost investments, and ensure stable energy supplies and security.
The document discusses aviation threats and events that have shaped targeting efforts, including the 2009 Christmas Day underwear bomber attempt and the 2017 Sydney plane terrorist plot. It provides an overview of the National Targeting Center's role in assessing risks for cargo, passengers, and more using various data sources and systems. It also introduces the National Vetting Center as a new "one-stop shop" to consolidate intelligence vetting support for traveler programs.
This document discusses investments and geopolitical risks related to Iran. It provides an overview of Iran's economic background and growth sectors. It outlines opportunities in Iran's oil, gas, and other industries. However, it also details many political and financial risks, such as ongoing sanctions, the influence of the Revolutionary Guard, and tensions with other countries. The document advocates for thorough integrated risk analysis when considering investments or other involvement in Iran.
Pathikrit payne energy security & conflicts (2)IPPAI
The document discusses the shifting dynamics of conflicts and their impact on energy security. While inter-state conflicts have become less common, threats from non-state actors like terrorist groups have increased significantly. Many of these terrorist groups have taken control of oil fields and infrastructure in the Middle East and are generating substantial revenues from illicit oil sales. This poses challenges for energy security around the world.
SMS Ltd Offshore provides risk management and security services to the oil and gas sector, including security audits and assessments, threat management, armed and unarmed security, and emergency response services. They focus on areas like Southeast Asia, Africa, North America, and Latin America, and serve a wide range of clients through offices in the UK.
The German Chancellor hosted the Tunisian Prime Minister in Berlin to discuss regional security, the refugee crisis, and German-Tunisian economic cooperation. This was the first visit by the Tunisian Prime Minister to Berlin and indicated a strengthening of the bilateral alliance. The Chancellor praised relations and cooperation in economic, political, and security matters, stressing the importance of Tunisia's economic revival. Germany is Tunisia's largest trading partner in Europe.
SMS Ltd Offshore provides risk management and safety services for offshore production platforms and operations. Their services include implementing tailored safety plans and procedures for different offshore structures and phases of operations. They also focus on minimizing risks from physical threats and environmental hazards. SMS Ltd Offshore has expertise in a wide range of offshore platform types and environments worldwide.
This document provides an agenda for a global energy security conference in 2016. It summarizes the topics to be covered, including the current state of global oil markets, demand and supply trends, geopolitical issues in the Middle East and North Africa region, and the future outlook. It also introduces Dr. Cyril Widdershoven, the speaker, and provides details on his background working on energy issues in the Middle East and North Africa.
International Mediterranean Conference Istanbul 20-22nd April 2016Cyril Widdershoven
This document summarizes Dr. Cyril Widdershoven's presentation on energy, security, and economic opportunities in the Mediterranean region. It discusses the turmoil in the region following the Arab Spring uprisings, instability in North Africa, and challenges facing European energy security. It argues that greater cooperation is needed between Europe, North African countries, Turkey, and other regional players to address conflicts, boost investments, and ensure stable energy supplies and security.
The document discusses aviation threats and events that have shaped targeting efforts, including the 2009 Christmas Day underwear bomber attempt and the 2017 Sydney plane terrorist plot. It provides an overview of the National Targeting Center's role in assessing risks for cargo, passengers, and more using various data sources and systems. It also introduces the National Vetting Center as a new "one-stop shop" to consolidate intelligence vetting support for traveler programs.
This document discusses investments and geopolitical risks related to Iran. It provides an overview of Iran's economic background and growth sectors. It outlines opportunities in Iran's oil, gas, and other industries. However, it also details many political and financial risks, such as ongoing sanctions, the influence of the Revolutionary Guard, and tensions with other countries. The document advocates for thorough integrated risk analysis when considering investments or other involvement in Iran.
Pathikrit payne energy security & conflicts (2)IPPAI
The document discusses the shifting dynamics of conflicts and their impact on energy security. While inter-state conflicts have become less common, threats from non-state actors like terrorist groups have increased significantly. Many of these terrorist groups have taken control of oil fields and infrastructure in the Middle East and are generating substantial revenues from illicit oil sales. This poses challenges for energy security around the world.
SMS Ltd Offshore provides risk management and security services to the oil and gas sector, including security audits and assessments, threat management, armed and unarmed security, and emergency response services. They focus on areas like Southeast Asia, Africa, North America, and Latin America, and serve a wide range of clients through offices in the UK.
The German Chancellor hosted the Tunisian Prime Minister in Berlin to discuss regional security, the refugee crisis, and German-Tunisian economic cooperation. This was the first visit by the Tunisian Prime Minister to Berlin and indicated a strengthening of the bilateral alliance. The Chancellor praised relations and cooperation in economic, political, and security matters, stressing the importance of Tunisia's economic revival. Germany is Tunisia's largest trading partner in Europe.
SMS Ltd Offshore provides risk management and safety services for offshore production platforms and operations. Their services include implementing tailored safety plans and procedures for different offshore structures and phases of operations. They also focus on minimizing risks from physical threats and environmental hazards. SMS Ltd Offshore has expertise in a wide range of offshore platform types and environments worldwide.
A career coach is hosting a resume review event on February 11th from 4-7 PM at Presse Café in Dix30 for job seekers, students, and professionals to get help improving their resumes. Attendees should bring their current resume, a job posting, and cover letter for a professional review to help them create a better resume and get more responses from employers. Space is limited so reserving ahead by email is recommended.
El documento describe tres herramientas educativas web gratuitas: Think Free Online, que permite crear y editar documentos de Office en línea; Class Tools.net, que permite crear juegos, exámenes y actividades para usar en blogs o páginas web; y Edublogs, que permite crear y administrar blogs educativos con videos, fotos y podcasts. Las tres herramientas son gratuitas, funcionan en cualquier navegador y sistema operativo, y pueden ser utilizadas por estudiantes y maestros.
The resume is for Sanjeev Kumar Chaudhary, who is applying for a position as a Business Development Executive. He has over 3 years of experience in IT and ITES, including managing projects for major clients. He also has a background in sales and marketing. Chaudhary believes he can contribute significantly to business growth through his expertise in various domains, problem-solving and people skills, and experience developing content and presentations.
UMFCCI-NCRA Monthly Business Report Written by UMFCCI Administrator // July...MYO AUNG Myanmar
- Myanmar's telecommunications sector has grown rapidly since 2013 when foreign operators Ooredoo and Telenor entered the market, bringing prices for SIM cards and mobile access down significantly.
- This has enabled a new generation of young tech entrepreneurs in Myanmar to develop over 100 mobile applications locally, including social networks, messaging, and games.
- One example is Nex, a startup founded by 24-year-old Ye Myat Min that has created an anonymous social media app for university students called Hush, which has over 7,000 active users despite infrastructure and internet speed challenges.
- Other popular local apps include chat apps that allow users to communicate in local languages with Myanmar characters and stickers,
Alagoas em Dados e Informações - Plataforma de Dados e Informações Socioeconô...Thiago Avila, Msc
O documento descreve o Portal Alagoas em Dados e Informações, um banco de dados online sobre o estado de Alagoas. O portal fornece dados estatísticos sobre diversos temas como demografia, economia, educação, saúde e infraestrutura dos municípios alagoanos. O portal também disponibiliza mapas, publicações e ferramentas como o Sistema de Informações Municipais para consulta e extração de dados.
The automatic license plate recognition(alpr)eSAT Journals
Abstract Every country uses their own way of designing and allocating number plates to their country vehicles. This license number plate is then used by various government offices for their respective regular administrative task like- traffic police tracking the people who are violating the traffic rules, to identify the theft cars, in toll collection and parking allocation management etc. In India all motorized vehicle are assigned unique numbers. These numbers are assigned to the vehicles by district-level Regional Transport Office (RTO). In India the license plates must be kept in both front and back of the vehicle. These plates in general are easily readable by human due to their high level of intelligence on the contrary; it becomes an extremely difficult task for the computers to do the same. Many attributes like illumination, blur, background color, foreground color etc. will pose a problem. Index Terms: Automatic license plate recognition (ALPR) system, proposed methodology, reference
Oracle Applications Period Closing Processes HumtvAttiq Ahmed
The document discusses the Oracle Payables period closing process which includes 7 key steps: 1) Complete all transactions for the period, 2) Review amounts to post to general ledger, 3) Review posting process, 4) Submit unaccounted transactions sweep, 5) Close current period, 6) Run mass additions transfer to Oracle Assets, and 7) Open next period. The goal is to establish cut-off dates, notify users, reconcile accounts, post transactions, resolve issues, and transfer data to associated modules to close one period and begin the next.
LOS DONES ESPIRITUALES A QUIEN FUERON DADOS A ISRAEL O LA IGLESIARicardo Mojica
1) El documento describe los eventos del día de Pentecostés según se relatan en Hechos 2, cuando los discípulos recibieron el Espíritu Santo y comenzaron a hablar en otras lenguas.
2) Explica que el pentecostalismo moderno no guarda relación con los eventos del día de Pentecostés, sino que es una imitación de las primeras congregaciones cristianas con el objetivo de engañar al mundo.
3) Resalta que las iglesias pentecostales actuales tergiversan la Biblia y
The importance of the Southeastern Mediterranean hydrocarbons to the EUHarris Samaras
Taking into account the growing hydrocarbon demand worldwide and the decreasing indigenous production in Europe, it will require huge efforts and substantial investments of the suppliers to mobilize these fuels in time. Besides, when assessing supply options, it has to be kept in mind that competition for supply will become far stiffer especially from North America, China and the emerging economies of South-East Asia.
The vulnerability of the EU to energy supply risks is a fact but this could be no more! If the most conservative data is taken into account in regard to the hydrocarbon reserves existing in the EEZs of Israel, Cyprus and Greece and the rest that lie within the Southeastern Mediterranean, for the first time ever in European Energy History, the EU could be guaranteed an uninterrupted supply of a traditional energy source.
The challenge ahead for the EU is to manage these new variables in the equation of the Southeastern Mediterranean region with ultimate responsibility and Europeanism so as to guarantee and improve the prospects, economic and social, of its citizens. Moreover, these hydrocarbon discoveries are bound to serve as a catalyst toward greater cooperation amongst the participating countries. The joint exploitation between these countries and the launching of joint projects has the potential to change the whole political and economic scene of the entire region to the better.
The document discusses a conference on energy security held in Abu Dhabi in May 2012. It focused on minimizing risks to development and infrastructure from criminality and terrorism. The author participated as a panel speaker and presented on energy security and securing oil, gas, and pipeline assets. It also lists several other topics and speakers. Overall it provided an opportunity for learning and networking for security professionals in the Middle East region.
In today's uncertain global environment, marine insurers are facing new challenges every day. In this Slideshare we take a look at the five emerging underwriting trends that are changing the rules in 2015.
Read More: http://www.genre.com/knowledge/blog/5-emerging-trends-in-marine-insurance-in-2015.html
Maritime Threats to Supply Chain NarrativeMar-John Cruz
Maritime threats to global supply chains come from both internal and external sources. Internally, theft and tampering can occur during stuffing and loading of cargo at manufacturing plants, warehouses, and ports. Externally, piracy in Southeast Asian waters has risen significantly in recent years, accounting for over 75% of global incidents. Natural disasters and climate change also threaten maritime supply chains, as storms are predicted to intensify due to rising sea temperatures. To address these challenges, governments and industry collaborate through organizations that promote information sharing and set security standards.
The document discusses the threat of terrorist attacks on energy infrastructure and argues that more needs to be done to protect critical facilities. It notes that Al-Qaeda and other groups have explicitly called for attacks on oil production facilities. While private security focuses on industrial safety, public security is often ineffective at preventing determined terrorist strikes. The document proposes that facility operators work with governments to implement low-cost security improvements through consultations and recommendations from expert organizations like SESS & Partners.
The document discusses the challenges facing the UK oil and gas industry, including declining North Sea reserves, high tax rates, and difficulties attracting skilled workers. It also talks about opportunities, such as potential investment in new extraction technologies. The EM&I Group is highlighted as an innovator helping operators reduce costs by developing solutions like diverless underwater inspections to avoid dry-docking rigs.
This document provides an overview of the Somali piracy threat and NATO's counter-piracy Operation Ocean Shield. It notes that Somali piracy attacks peaked in 2011 but have since declined dramatically due to improved naval coordination, use of armed guards, and political developments in Somalia. However, Operation Ocean Shield remains a costly mission for NATO as naval assets are expensive to deploy and maintain. The document aims to analyze the costs and benefits of Ocean Shield and make recommendations about its future, given the reduced piracy threat but continued importance of ensuring stability.
Saudi Arabia's economy has traditionally been heavily dependent on oil, with around 90% of government revenue coming from oil exports. However, fluctuating oil prices present a risk to the stability of the economy. The document discusses Saudi Arabia's efforts to diversify its economy and transition to a post-oil economy. It identifies eight sectors, including mining, manufacturing, and tourism, that show promise for sustainable growth. The conclusion emphasizes that Saudi Arabia must confront challenges through economic reform, private sector development, and more sustainable fiscal management to realize its full economic potential beyond oil.
Are you looking for the best guard security in Alberta-wide, Calgary, Edmonton, Airdrie, or Fort Mcmurray? Just landed the right platform as we at Guard24 offer you the Security Guard Services Edmonton with competitive experience. Security Guard Services Edmonton gives employees surety and peace of mind so they can perform their duties effectively.
The aviation industry is critical to the UK economy, contributing at least £16 billion annually. It employs over 230,000 directly and supports many indirect jobs. Aviation links the UK to over 370 international destinations. While most passengers come from Europe, about 8% come from regions like Africa and the Middle East that pose greater security risks. Aviation security is an ongoing priority that requires balancing risk management with business impacts. The government works closely with industry to help secure the aviation system both in the UK and overseas.
A career coach is hosting a resume review event on February 11th from 4-7 PM at Presse Café in Dix30 for job seekers, students, and professionals to get help improving their resumes. Attendees should bring their current resume, a job posting, and cover letter for a professional review to help them create a better resume and get more responses from employers. Space is limited so reserving ahead by email is recommended.
El documento describe tres herramientas educativas web gratuitas: Think Free Online, que permite crear y editar documentos de Office en línea; Class Tools.net, que permite crear juegos, exámenes y actividades para usar en blogs o páginas web; y Edublogs, que permite crear y administrar blogs educativos con videos, fotos y podcasts. Las tres herramientas son gratuitas, funcionan en cualquier navegador y sistema operativo, y pueden ser utilizadas por estudiantes y maestros.
The resume is for Sanjeev Kumar Chaudhary, who is applying for a position as a Business Development Executive. He has over 3 years of experience in IT and ITES, including managing projects for major clients. He also has a background in sales and marketing. Chaudhary believes he can contribute significantly to business growth through his expertise in various domains, problem-solving and people skills, and experience developing content and presentations.
UMFCCI-NCRA Monthly Business Report Written by UMFCCI Administrator // July...MYO AUNG Myanmar
- Myanmar's telecommunications sector has grown rapidly since 2013 when foreign operators Ooredoo and Telenor entered the market, bringing prices for SIM cards and mobile access down significantly.
- This has enabled a new generation of young tech entrepreneurs in Myanmar to develop over 100 mobile applications locally, including social networks, messaging, and games.
- One example is Nex, a startup founded by 24-year-old Ye Myat Min that has created an anonymous social media app for university students called Hush, which has over 7,000 active users despite infrastructure and internet speed challenges.
- Other popular local apps include chat apps that allow users to communicate in local languages with Myanmar characters and stickers,
Alagoas em Dados e Informações - Plataforma de Dados e Informações Socioeconô...Thiago Avila, Msc
O documento descreve o Portal Alagoas em Dados e Informações, um banco de dados online sobre o estado de Alagoas. O portal fornece dados estatísticos sobre diversos temas como demografia, economia, educação, saúde e infraestrutura dos municípios alagoanos. O portal também disponibiliza mapas, publicações e ferramentas como o Sistema de Informações Municipais para consulta e extração de dados.
The automatic license plate recognition(alpr)eSAT Journals
Abstract Every country uses their own way of designing and allocating number plates to their country vehicles. This license number plate is then used by various government offices for their respective regular administrative task like- traffic police tracking the people who are violating the traffic rules, to identify the theft cars, in toll collection and parking allocation management etc. In India all motorized vehicle are assigned unique numbers. These numbers are assigned to the vehicles by district-level Regional Transport Office (RTO). In India the license plates must be kept in both front and back of the vehicle. These plates in general are easily readable by human due to their high level of intelligence on the contrary; it becomes an extremely difficult task for the computers to do the same. Many attributes like illumination, blur, background color, foreground color etc. will pose a problem. Index Terms: Automatic license plate recognition (ALPR) system, proposed methodology, reference
Oracle Applications Period Closing Processes HumtvAttiq Ahmed
The document discusses the Oracle Payables period closing process which includes 7 key steps: 1) Complete all transactions for the period, 2) Review amounts to post to general ledger, 3) Review posting process, 4) Submit unaccounted transactions sweep, 5) Close current period, 6) Run mass additions transfer to Oracle Assets, and 7) Open next period. The goal is to establish cut-off dates, notify users, reconcile accounts, post transactions, resolve issues, and transfer data to associated modules to close one period and begin the next.
LOS DONES ESPIRITUALES A QUIEN FUERON DADOS A ISRAEL O LA IGLESIARicardo Mojica
1) El documento describe los eventos del día de Pentecostés según se relatan en Hechos 2, cuando los discípulos recibieron el Espíritu Santo y comenzaron a hablar en otras lenguas.
2) Explica que el pentecostalismo moderno no guarda relación con los eventos del día de Pentecostés, sino que es una imitación de las primeras congregaciones cristianas con el objetivo de engañar al mundo.
3) Resalta que las iglesias pentecostales actuales tergiversan la Biblia y
The importance of the Southeastern Mediterranean hydrocarbons to the EUHarris Samaras
Taking into account the growing hydrocarbon demand worldwide and the decreasing indigenous production in Europe, it will require huge efforts and substantial investments of the suppliers to mobilize these fuels in time. Besides, when assessing supply options, it has to be kept in mind that competition for supply will become far stiffer especially from North America, China and the emerging economies of South-East Asia.
The vulnerability of the EU to energy supply risks is a fact but this could be no more! If the most conservative data is taken into account in regard to the hydrocarbon reserves existing in the EEZs of Israel, Cyprus and Greece and the rest that lie within the Southeastern Mediterranean, for the first time ever in European Energy History, the EU could be guaranteed an uninterrupted supply of a traditional energy source.
The challenge ahead for the EU is to manage these new variables in the equation of the Southeastern Mediterranean region with ultimate responsibility and Europeanism so as to guarantee and improve the prospects, economic and social, of its citizens. Moreover, these hydrocarbon discoveries are bound to serve as a catalyst toward greater cooperation amongst the participating countries. The joint exploitation between these countries and the launching of joint projects has the potential to change the whole political and economic scene of the entire region to the better.
The document discusses a conference on energy security held in Abu Dhabi in May 2012. It focused on minimizing risks to development and infrastructure from criminality and terrorism. The author participated as a panel speaker and presented on energy security and securing oil, gas, and pipeline assets. It also lists several other topics and speakers. Overall it provided an opportunity for learning and networking for security professionals in the Middle East region.
In today's uncertain global environment, marine insurers are facing new challenges every day. In this Slideshare we take a look at the five emerging underwriting trends that are changing the rules in 2015.
Read More: http://www.genre.com/knowledge/blog/5-emerging-trends-in-marine-insurance-in-2015.html
Maritime Threats to Supply Chain NarrativeMar-John Cruz
Maritime threats to global supply chains come from both internal and external sources. Internally, theft and tampering can occur during stuffing and loading of cargo at manufacturing plants, warehouses, and ports. Externally, piracy in Southeast Asian waters has risen significantly in recent years, accounting for over 75% of global incidents. Natural disasters and climate change also threaten maritime supply chains, as storms are predicted to intensify due to rising sea temperatures. To address these challenges, governments and industry collaborate through organizations that promote information sharing and set security standards.
The document discusses the threat of terrorist attacks on energy infrastructure and argues that more needs to be done to protect critical facilities. It notes that Al-Qaeda and other groups have explicitly called for attacks on oil production facilities. While private security focuses on industrial safety, public security is often ineffective at preventing determined terrorist strikes. The document proposes that facility operators work with governments to implement low-cost security improvements through consultations and recommendations from expert organizations like SESS & Partners.
The document discusses the challenges facing the UK oil and gas industry, including declining North Sea reserves, high tax rates, and difficulties attracting skilled workers. It also talks about opportunities, such as potential investment in new extraction technologies. The EM&I Group is highlighted as an innovator helping operators reduce costs by developing solutions like diverless underwater inspections to avoid dry-docking rigs.
This document provides an overview of the Somali piracy threat and NATO's counter-piracy Operation Ocean Shield. It notes that Somali piracy attacks peaked in 2011 but have since declined dramatically due to improved naval coordination, use of armed guards, and political developments in Somalia. However, Operation Ocean Shield remains a costly mission for NATO as naval assets are expensive to deploy and maintain. The document aims to analyze the costs and benefits of Ocean Shield and make recommendations about its future, given the reduced piracy threat but continued importance of ensuring stability.
Saudi Arabia's economy has traditionally been heavily dependent on oil, with around 90% of government revenue coming from oil exports. However, fluctuating oil prices present a risk to the stability of the economy. The document discusses Saudi Arabia's efforts to diversify its economy and transition to a post-oil economy. It identifies eight sectors, including mining, manufacturing, and tourism, that show promise for sustainable growth. The conclusion emphasizes that Saudi Arabia must confront challenges through economic reform, private sector development, and more sustainable fiscal management to realize its full economic potential beyond oil.
Are you looking for the best guard security in Alberta-wide, Calgary, Edmonton, Airdrie, or Fort Mcmurray? Just landed the right platform as we at Guard24 offer you the Security Guard Services Edmonton with competitive experience. Security Guard Services Edmonton gives employees surety and peace of mind so they can perform their duties effectively.
The aviation industry is critical to the UK economy, contributing at least £16 billion annually. It employs over 230,000 directly and supports many indirect jobs. Aviation links the UK to over 370 international destinations. While most passengers come from Europe, about 8% come from regions like Africa and the Middle East that pose greater security risks. Aviation security is an ongoing priority that requires balancing risk management with business impacts. The government works closely with industry to help secure the aviation system both in the UK and overseas.
International Mediterranean Conference Istanbul 20-22nd April 2016Cyril Widdershoven
This document summarizes Dr. Cyril Widdershoven's presentation on energy, security, and economic opportunities in the Mediterranean region. It discusses the turmoil in the Middle East and North Africa following the Arab Spring, and outlines challenges including instability, conflicts over energy resources, and threats to European energy security. The presentation argues that greater cooperation is needed between Europe, North African countries, Turkey, and other regional powers to address these issues and ensure stability and secure energy supplies.
The Economical and Financial Impact of Terrorist AttacksRajat Agrawal
A basic presentation on effects of terrorism on economy and financial markets. Cost of terrorism along with 5 major acts of terrorism discussed (including recent attacks in Paris).
Top 10 Risks Covered in Marine Insurance.pptxkrishnaj38
Marine insurance provides protection for businesses involved in maritime activities from a variety of risks. The top 10 risks covered are natural disasters, piracy, collisions, cargo damage, pollution, salvage and wreck removal operations, war and political risks, acts of God, cyber risks, and regulatory and compliance risks. These risks can result in vessel damage, cargo losses, delays, and substantial financial costs. Marine insurance plays a crucial role in mitigating these risks and ensuring the financial resilience of maritime operations.
MANAGING AND MITIGATING THE UPSTREAM PETROLEUM INDUSTRY SUPPLY CHAIN RISKSMahmoud M. Ali
This document discusses managing risks in the upstream petroleum supply chain using the analytic hierarchy process (AHP). It identifies six major risk types: exploration/production, environmental/regulatory compliance, transportation, availability of oil resources, geopolitical, and reputational. Experts were surveyed and their responses were analyzed using AHP. The results showed that transportation and exploration/production risks were the highest priorities. The preferred risk mitigation approach was to internalize and manage risks rather than pass them on or stop activities.
Innovations™ Magazine October - December 2014 T.D. Williamson
The document summarizes perspectives from regional experts on developments in the natural gas industry across Europe, Russia, the Caspian region, the Middle East, Africa, and Asia Pacific. In Europe, there is renewed investment in infrastructure to improve flexibility and reduce dependence on eastern energy sources. In Russia, new pipelines are being built to diversify export markets. The Middle East and Africa region is experiencing both challenges and opportunities for growth, while China and India have vast, complex pipeline networks and a need for improved integrity practices.
The document provides an outlook on the breakbulk transportation industry for 2013 from various industry experts. It discusses that:
- Developing regions like China, India, Africa and Latin America will continue to drive breakbulk momentum in 2013, fueled by ongoing energy projects.
- However, infrastructure bottlenecks and a lack of skilled labor in many developing countries may challenge project cargo movement and economic development.
- Piracy remains a security issue off Africa's coasts, while the multifaceted threat environment in the Gulf of Guinea is expected to see further hijackings.
- Overall, while aware of economic uncertainties, the sector remains warily optimistic given the large number of projects underway globally that will support break
As the war in Ukraine continues protectionism is rising throughout the world. Understanding protectionism and your investments will be one of the paths to success as the forces of Covid shutdowns in China, inflation in the USA, and the prospect of a prolonged war in Europe cloud the markets.
https://youtu.be/4wByx52e3bE
Sabotage and terrorist attacks on oil infrastructure have contributed to rising oil prices. The document discusses how terrorism targeting the oil industry has increased sharply since the 1990s, with 600 of 2600 total attacks in 2013 aimed at oil and gas installations. Effective communication and intelligence sharing between oil companies and government agencies is important for security. The document also provides examples of recent attacks in Nigeria, Iraq, Algeria and Libya that have disrupted oil production and exports.
Gazprom VS ENI : A New War in East Mediterranean Sea?iakovosal
The document discusses tensions between Russian energy company Gazprom and Italian energy company ENI in the Eastern Mediterranean region. Specifically:
- ENI recently discovered a large natural gas field in Egyptian waters, threatening Gazprom's dominance in the regional energy market.
- Russia has increased its military presence in Syria, partly to counter growing Western and ENI influence in the region and protect its interests. Pipelines through Syria could challenge Russian exports to Europe.
- ENI's gas facilities in Egypt near the Nile Delta threaten Turkey and Iran's ambitions, and are vulnerable to terrorist attacks, which could benefit Russia geopolitically. Gazprom views ENI's expansion as a major problem and may try to destabil
The document discusses the French government's process for developing defense strategies and policies. It involves four main steps: 1) analyzing trends and scenarios, 2) developing an overarching strategy, 3) contributing to a new defense policy, and 4) drafting the military planning law. Key factors considered include conflicts, emerging powers, resources, and industrial capabilities. The process is informed by lessons from past experiences and involves contributions from different government departments.
In late November 2011, over 300 privacy professionals gathered in Paris for the IAPP Europe Data Protection Congress. The event featured engaging debate and unparalleled education on the latest developments in privacy for the European data protection community, including a special track on the intersection of privacy and technology, which examined issues such as mobile privacy, “Privacy by Design,” the right to be forgotten and children’s perspectives on privacy and online interactions.
See: s://www.privacyassociation.org/media/uploads/DPC11_Smart_Grid_PPT.pdf
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
1. Threats to Energy Security and Critical Energy Infrastructure
What are the challenges and threats to a State’s energy security, and foremost, to
it’s Critical Energy Infrastructure during unconventional conflicts?
Christophe-Alexandre PAILLARD
Research Director, Ecole Militaire Strategic Research Institute (IRSEM)
ENSEC COE, hybrid threats: overcoming ambiguity, building resilience
10/11 September 2015
2. 24/09/2015
What IRSEM is doing on risk analysis and to
enhance defence strategies
2Christophe-Alexandre PAILLARD
• The Institut de Recherche Stratégique de l’Ecole Militaire (IRSEM) is a French
research centre with the status of national service attached to the DGRIS. Its goal is
to support and promote research in the area of defence and security.
• Its production is focused on international defence and security. It is openly
accessible worldwide. Publications cover Armament and Defence economics,
Defence studies, Strategic studies, and Defence and Society.
• The IRSEM provides academic and financial support to young researchers,
following doctoral and post-doctoral studies.
• The IRSEM results from the reform process that began with the creation of the
French Higher Council for Strategic Training and Research (Conseil Supérieur de la
Formationet de la Recherche Stratégique - CSFRS). It works through the French
Consistency Committee for Strategic Research and Forecasting (Comité De
Cohérence de la Recherche Stratégique et de la Prospective - CCRP) and is
responsible at the French Ministry of Defence for steering and facilitating the
approach to forecasting and strategic research.
• See: http://www.defense.gouv.fr/irsem
3. 24/09/2015
Introduction: European countries are being
confronted to five key energy challenges
3Christophe-Alexandre PAILLARD
1. Emerging countries are more and more taking a major part in the world energy
balance, limiting the European market power to impact world energy prices.
2. Inside the European Union, more and more countries, such as Germany, Italy or
Belgium, are giving up their nuclear industries, leaving the path to hydrocarbon
forms of energy such as coal and more energy imports.
3. The end of many European nuclear industries will mean more external energy
dependencies for an increasing number of European countries.
4. Many energy producers are located in instable areas. However, the recent
development of shale gas in Northern America, offshore oil in Brazil, and offshore
gas in Australia is indeed reshuffling the cards to the disadvantage of Russia and the
MENA area. It should help us to limit the terrorist risks and unconventional attacks.
5. France, the Baltic states, and other European countries will be confronted with a
triple challenge: energy security of supplies, economic efficiency and environmental
needs. Thus, a comprehensive approach of energy issues, not only limited to
economic and industrial topics, is essential to understand the current challenges we
face. Clearly, European countries need to understand and anticipate possible risks
and threats on energy infrastructures and local economies, because we’ll face a
growing vulnerability on our energy infrastructures in case of unconventional
conflicts. It is one of our main vulnerabilities.
4. 24/09/2015
Three parts
4Christophe-Alexandre PAILLARD
I. Typology and origin of possible threats on energy
infrastructures.
II. Between underestimation and overestimation of
threats on energy infrastructures: the right
analysis is the most difficult target to reach.
III. A possible scenario of unconventional attacks on
European energy infrastructures: new grids, new
threats?
6. 24/09/2015
We need to define a typology of targets
and priorities in terms of security
6Christophe-Alexandre PAILLARD
When terrorism is concerned, various targets are indeed highly vulnerable:
• Permanent military infrastructures (headquarters, ammunitions dumps, fuel
depots, spare parts storage, barracks). To neutralize these targets can slow down or
stop troops deployment during operations or to limit the ability of a military force
to engage itself in operations.
• High valued mobile military targets such as aircrafts (AWACS, supply planes,
carriers, fighters, bombers), radars, aircraft carriers, etc.
• Logistics and chains of supplies:
– Means of conveying, landing and boarding : ships, cranes, docks, bridges,
roads, control towers, runways, etc.
– Other suppliers: generators, power lines, tankers, gas tankers, etc.
• Political targets such as decision centres (ministries, key administrations), hospitals,
highly populated areas, etc.
• Economic targets, such as production sites, factories, civilian gas or oil depots,
goods stations and oil and gas companies.
7. 24/09/2015
To understand the MENA area is key to
anticipate threats on energy infrastructures
7Christophe-Alexandre PAILLARD
• In a way, the 9/11 attack in New York was a turning point: before 9/11, Western
policy objectives included dual containment (Iran/Iraq), preserving access to oil and
gas, and promoting democracy. After 9/11, policies shifted on changes in security
and shifted on promoting pre-emptive action (“real and imminent threat”) and
regime change. It did not stop at all terrorism, extreme Islamism and instability in
the MENA area: it was just the contrary.
• With a MENA area dominated by wars and instability, to define what a possible
terrorist threat could be can be tricky: basically, the purpose is to send a political
message to the Western world and to induce fear. It might be state-sponsored, but
this time is a little bit over. Many are fighting against any form of Western influence
in their homeland, as in Syria and Iraq.
• What could do these “terrorist organizations”? They will try to pressure Western
influence on energy out of their countries through terrorist attacks. Al-Qaeda was
first founded to overthrow the Saudi Arabian government, but they all have today a
much broader scale agenda, especially ISIS.
8. 24/09/2015
ISIS vs. oil and gas infrastructures: is it still
that unconventional?
8Christophe-Alexandre PAILLARD
9. 24/09/2015
Why launching an attack on energy
infrastructures? The example of Iraq
9Christophe-Alexandre PAILLARD
• Immediate prospect of death
and destruction:
• Energy systems are war
targets.
• To cause huge
damages.
• Economic and social disruption
+ creation of ripple and
synergistic effects.
• Destroy critical nodes:
• Transportation
(pipelines, port
facilities)
• Production bottlenecks
(oil refineries)
11. 24/09/2015
Targeting oil and gas pipeline terminals is a
natural strategy. Does it work?
11Christophe-Alexandre PAILLARD
• Pipeline terminals are indeed possible targets: however, key terminals such as Ras
Tanura in Saudi Arabia are well protected. In Ras Tanura, north of Bahrain, 7 mb/d
are leaving Saudi Arabia every day, making it an enviable target for any coordinated
action, terrorist apprentices and potential kamikazes. A neutralization, even
limited, is by nature able to disrupt world oil and gas markets and to increase oil
futures on a scale still unknown. Even a simple try would have side-effects on
traders and financial actors for a few days before returning to a cooler behavior.
• The real nightmare would be a “blockade” of the strait of Ormuz, not really a
physical one, something which is just impossible to achieve by terrorist means, but
a form of invisible barrier which would prevent ships from coming into the Arabian
Gulf without any substantial new insurance policy: to succeed in organizing such an
operation needs a complete network of supports, well-equipped teams, and a bit of
intelligence from terrorist organizations. We are in fact leaving conventional
terrorism and we are back to state support of terrorism, which is a completely
different subject.
14. 24/09/2015
Should we expect a new wave of terrorism
on energy supply routes? Sea routes?
14Christophe-Alexandre PAILLARD
• Various forms of terrorist risks could potentially threaten European economies
and traditional energy routes, both at sea and on the ground, used for oil and
gas. The notoriously most threatened areas around Europe are said to be the
Arabian Gulf, the surroundings of Yemen and Somalia, and the Suez Canal as
potential targets.
• Shipbrokers and ship-owners awakened to the tough realities of terrorism when
the Limburg was blown up in 2001 in Yemen. Apart this noticeable exception of
Yemen, nothing really happened at sea since then. Precautionary measures to
increase the number of ships and to speed up crude oil movements were often
useless. It does not mean it could not happen; but it is quite unlikely today.
• Though the impact on the long term of the Limburg bombing was close to zero,
European states cannot underestimate the feasibility of broader attacks and
should give a specific watchfulness on their energy supply routes for the next
years. Due to the position of European states towards the Islamic State and
other Islamic movements, new terrorist attacks on pipelines, tankers, and
liquefied gas carriers could disrupt European economic stability and security.
15. 24/09/2015
Maritime routes, a risk overvalued?
15Christophe-Alexandre PAILLARD
• Maritime routes used by tankers are indeed under pressure, but this pressure might
be a bit overvalued: a feeling of insecurity and anxiety developed after 2001,
without taking into account that only one single ship was attacked in 14 years. If
there were a large-scale political crisis of any kind around the MENA area, realities
should be different and terrorism at sea could be much more scrutinized by
Western chiefs of staff and European states.
• Risks on maritime transports should be considered among many other threats: one
has to take into consideration many forms of risks such as piracy, broad safety on
maritime routes, geopolitics of straits, balance between various means of
transports, and the true nature of physical risks on oil and gas maritime routes.
• If there is a risk on oil and gas maritime routes, as shown with the Limburg case,
damages aren’t bad enough to destabilize oil markets: the feasibility of inflicting
significant damages to a ship depends on geographical, technical and physical
conditions scarcely met. Though the destruction of a few ships should certainly
increase insurance’s prizes, it could certainly not disorganize world maritime traffic
on a period long enough to have durable effects on world energy markets. Only a
war could do this.
17. 24/09/2015
Sinking ships, a hard business in itself!
17Christophe-Alexandre PAILLARD
• Weapons or explosives frequently used have various effects, depending on the angle,
the strength of the explosive charge, the rate of fire, the track course or the point of
impact. A simple RPG7 rocket-launcher is able to damage and make a hole to the hull
of any ship, but double-bottom tankers. It does not mean that tankers targeted will
going off easily. Against this kind of weapon, easy to get on markets, there is no
protection efficient enough to protect all commercial ships sailing at sea. If a military
escort could be provided during war time, it would not seem realistic enough for
Western navies to do it at all time or to equip commercial ships with heavy military
capabilities.
• The explosive capacity of ships, far beyond the strength of the explosive charge, is
also a key element to succeed in sinking them: if a ship is full or empty, she has little
chance to explode. When the ship is full, the fuel gets a capacity to absorb chocks,
which makes unlikely the feasibility of having an explosion. As an example, when the
French OAS launched an attack on gasoline depots in Antibes (southern France) in
1962, it failed; because the tanks were full and had limited explosive capacities.
• On the contrary, if a tanker is half empty, the gas in suspension in the empty part of
the ship, even in very limited quantities, makes an explosion more likely. Though this
risk is limited, there is indeed a bad combination, due to the highly inflammable mix
of oxygen and hydrocarbons.
18. 24/09/2015
Differences of approach between states?
18Christophe-Alexandre PAILLARD
• For consuming states, the risk is limited to the possibility of being confronted to
temporary cuts of supplies. When the Suez canal was closed in 1956 or when the
Iran/Iraq war partly blocked ships in the Arabian Gulf, Western countries feared their
economies could be damaged by a long-term blockade. This kind of risk explained
partly why the American policy in the Middle East, as shown in Kuwait en 1990,
tended to show military strength in the area and to leave noticeable naval forces.
However, terrorism was never responsible of any significant blockade in the Middle
east for the last 70 years.
• For producing states, the risk is far beyond the risks we could be confronted to. They
could suffer from complete exports’ blockades. If producers are confronted with
temporary impossibilities of exporting oil and gas for physical or psychological
reasons, what is at stake is the sake of their whole economies. However, again, no
terrorist act was responsible of large blockades; even in the MENA area.
20. 24/09/2015
New grids for Europe: what for?
20Christophe-Alexandre PAILLARD
• Europe needs a more efficient electricity system and new distribution networks to
face the growing complexity of systems management and a possible growing gap
between energy supplies and demand.
• New European grids thus mean stronger interconnections within the European
electricity system.
• The existing interconnections could go beyond their present limits to the South, across
the Mediterranean Sea, and possibly towards the Russian electricity system.
• The recent opening of electricity markets led to the development of smart meters
such as Linky in France in March 2009, which are the cornerstone of smart grids in a
new European distribution network.
• The European Commission targets 80% of smart meters in 2020 in the EU.
• Networks are indeed moving from a passive to an active position through the
development of decentralized power generation.
• Smart grids might be a potential target for unconventional attacks.
22. 24/09/2015
Smart meters all over France in 2018?
22Christophe-Alexandre PAILLARD
• France is preparing to embrace “smart meter” technology on a massive scale: 90% of
French smart meters should be replaced by 2021 (French law, 17 August 2015). “Smart
meters” or “communicating meters” are electronic boxes which replace traditional
meters on a building’s switchboard.
• Its distinguishing feature is that it connects itself directly, mainly via internet, with the
grid management system. This new generation of meters therefore provides all power
managers, distributors and customers with instant access to information on real-time
power consumption.
• These data should enable power suppliers and distribution service operators (EDF,
Direct Energie, Poweo, GDF, etc.) to finely tune power used by consumers over the
short, medium and long term.
• In France, Linky meters are due to replace old EDF meters across the country. Linky
will communicate data remotely, transmitting it directly to ERDF’s supervision centre.
24. 24/09/2015
How smart meters and smart grids are
going to work
24Christophe-Alexandre PAILLARD
• Smart meters intend to measure and control home electrical consumption precisely.
However, it could erode the privacy of daily life, unless regulators limit data collection
and disclosure, and maybe national security itself.
• Indeed, in the absence of clear rules, these potentially beneficial smart grid
technologies could mean another intrusion on security, leave apart privacy.
• Utilities collecting detailed information about energy use in the home must specify in
advance how they are going to use that data and must confine their collection to
legitimate purposes.
• Utility companies should ensure that consumers have access to their own data, so
they can take advantage of innovative energy efficiency services, and explain clearly
where data are stored and how they are protected.
• The load graphs gathered by advanced energy metering projects allows the
reconstruction of everyone’s life: when you wake up, when you get home, when you
go on vacation, etc.
• These are clearly potential targets for terrorist or criminal organizations.
25. 24/09/2015
Protecting European citizens on smart grids
25Christophe-Alexandre PAILLARD
• Smart grids intelligent monitoring devices are vital information pertaining to the lives
of citizens that can make them vulnerable to criminals and terrorists, but also simply
annoying marketers.
• Smart grids are vulnerable to many attacks and hackers can share the information
they get with external hostile political or criminal movements.
• The usage data stored in the utility server has thus the risk of being stolen and
misused.
• In order to preserve security, energy companies should use anonymous data packets
which contain the usage information, but no user information. This approach allows
the utility companies to forecast load in a region, but not to enable the utility
companies to keep individual usage data to advice the consumers regarding their
energy usage habits.
• Security is a global process, not only a way of keeping the energy markets safe and
reliable in Europe.
26. 24/09/2015
Conclusions
26Christophe-Alexandre PAILLARD
• Is more attention required for the security of energy infrastructures? Controlling
maritime routes is in fact a key element of successful strategies against any
potential terrorist activities. Since WWII, the link between freedom at sea and oil
supplies has been strong, noticeably enough in western powers’ foreign policies.
But terrorism is not a global threat on maritime routes. Gas and oil pipelines are
more local and regional when compared to maritime routes. They are largely on
the ground; sometimes under the sea, as for North Stream. Thus, some of them
could also be major strategic targets, as in Ukraine. However, though bombings
were frequent in Iraq in the last 12 years, it did not change the world energy
balances. It only impacted local forces and populations directly involved in the
area of the bombings.
• A key constraint is imposed by changes to the international strategic
configuration, especially in the MENA area. Although the move towards a
multipolar world is not yet complete, it is raising a number of questions: how do
we define our defence policy? What impact does the economic crisis have on
conflicts and on our military capacities? Is energy the next battlefield for Islamist
movements? Is Ukraine the next step towards energy insecurity in Europe? Etc.