Skip to main content

Schüren Vertrauensprobleme die Angst vor Massenüberwachung in Europa?

David Barnard-Wills argumentiert, dass EU-Bürger für ihre  Sicherheit nicht unbedingt mehr von ihrer Privatsphäre aufgeben wollen – und dass Politiker dies bei Entscheidungen über Überwachungspraktiken Ernst nehmen sollten.

Angeheizt durch Edward Snowdens Enthüllung von immer mehr Details der Überwachungspraktiken von NSA und GCHQ, hat es in den vergangenen Monaten eine intensive Berichterstattung der Medien über Motive und Grenzen der staatlichen Überwachung gegeben und wie die Bürger über das Verhältnis von Sicherheit und Privatheit denken. Dies hat auf nationaler wie auch europäischer Ebene erhebliche politischer Aufmerksamkeit erregt. Bürgerrechtsgruppen haben Protestaktionen gegen Massenüberwachung organisiert, zuletzt am 11.2. unter dem Motto „The day we fight back“ (Der Tag, an dem wir zurückschlagen).

Es ist daher sowohl für Sozialwissenschaftler und Politiker besonders wichtig und drängend, die Reaktionen der Bürger auf die zunehmende Überwachung genauer zu verstehen. Welche Faktoren sind besonders kritisch und führen zu öffentlichen Protesten und unter welchen Umständen ist die Öffentlichkeit bereit, bestimmte Überwachungs-und Sicherheitsmaßnahmen zu akzeptieren?

Das von der Europäischen Union finanzierte Projekt PRISMS (Privacy and Security Mirrors) versucht, genau dies zu untersuchen. Es versucht, das Verhältnis zwischen Privatsphäre und Sicherheit zu analysieren und eine evidenzbasierte Perspektive für die Vereinbarkeit von Privatsphäre, Sicherheit und Vertrauen zu entwickeln. Es wird untersucht, wie sogenannte Sicherheitstechnologien Bürger zunehmend überwachen und dabei in vielen Fällen die Privatsphäre und andere Grundrechte verletzen.

Eines der wichtigsten Ziele des Projektes ist es, die sehr vereinfachte Annahme zu überwinden, wonach die Bürger Privatheit und Sicherheit als Nullsummenspiel betrachten und es akzeptieren, für ein Mehr an Sicherheit in zunehmendem Masse ihre Privatheit und informationelle Selbstbestimmung aufgeben zu müssen. Als Ergebnis soll das Projekt solche Faktoren ermitteln, die die Einstellungen der Bürger zu Privatheit und Sicherheit beeinflussen und in die Bewertung spezifischer Sicherheitstechnologie einfliessen. Die Berücksichtigung solcher Faktoren in Politik, Verwaltung und Unternehmen kann zu besseren Entscheidungen über Überwachungspraktiken beitragen.

Das Projekt lässt seit Mitte Februar vom  Meinungsforschungsinstitut  Ipsos Mori eine Befragung von 27.000 europäischen Bürgern durchführen, um ein genaues Bild über deren Einstellung zu Privatsphäre und Sicherheit zu erstellen, also zu einer Zeit, da diesen Themen eine erhöhte öffentliche Aufmerksamkeit erhalten. Erste Ergebnisse der Befragung werden im April 2014 verfügbar sein, aber bereits zur Vorbereitung der Umfrage wurden Fokus-Gruppen mit Bürgern in Deutschland, Belgien, Portugal, Dänemark, Estland, Ungarn, Rumänien und Großbritannien durchgeführt.

In den Fokusgruppen hatten viele der Teilnehmer das Gefühl, dass ihre Privatsphäre schwer zu schützen ist, wenn sie an der modernen Gesellschaft teilhaben wollten. Dennoch war ihnen zumindest prinzipiell  der Schutz ihrer Privatsphäre und ihrer persönlichen Daten sehr wichtig.

In den meisten Ländern waren die Teilnehmer der Ansicht, dass sie selbst die Hauptverantwortung für den Schutz ihrer Privatsphäre hätten. Allerdings erwarten Sie auch von den Regierungen ihrer Länder ersthafte Bemühungen, die richtigen Rahmenbedingungen zum Schutz ihrer Rechte zu entwickeln. Schließlich wünschen sie sich auch eine wirksame Durchsetzung dieser Rechte durch staatliche Stellen wie die Polizei und Aufsichtsbehörden. Organisationen, die personenbezogene Daten erheben, sollten dafür verantwortlich sein, dass diese sicher und rechtskonform gespeichert und verarbeitet werden.

Die Teilnehmer der Fokusgruppen wünschten sich in der Regel robuste Anwendungsfälle für Überwachungstechnologien, die auch umfänglich die Interessen der Betroffenen berücksichtigen. Insbesondere wollten die Personen würdevoll und individuell behandelt werden, ohne von Vorherein unter Generalverdacht zu stehen. Bei der Einführung von Technologien, von denen ihre Rechte unmittelbar berührt werden, wünschen sie sich eine frühzeitige und ernsthafte Information über die Funktionsweise und Implikationen der fraglichen Technologie und eine ernsthafte Konsultation der Bürger.

Der konkrete Kontext war allen beteiligten Bürgern sehr wichtig, zum Beispiel war die Akzeptanz von Sicherheits- und Überwachungstechnik auf Flughäfen höher als bei Anwendungen in anderen Lebensbereichen, wie z.B. von intelligenten Stromzählern. Die Vorteile solcher Smart Meter für die Verbraucher waren vielen Bürgern wenig einleuchtend.

Bei der Internetnutzung nehmen Bürger mittlerweile vielfach an, dass ihr Verhalten von staatlichen Stellen breit überwacht werden, um Terrorismus und organisierter Kriminalität vorzubeugen und halten dies (mit der Ausnahme der Deutschen) auch für legitim.

Bürger haben bei Überwachungspraktiken von Unternehmen noch größere Bedenken als bei (rechtmäßiger) staatlicher Überwachung. Sie hatten dabei vor allem Sorgen über die Folgen solcher Praktiken auf ihre körperliche und finanzielle Sicherheit. Die Bürger äußerten das Gefühl, dass sie mit der Wahrung ihrer Rechte sowie moralischen und kulturellen Werte gegenüber Unternehmen in vielen Fällen überfordert sind und hier vor allem der Staat in der Pflicht sei, die notwendige Balance zwischen den Interessen herzustellen.

Diese Befunde haben Konsequenzen für die Governance der Überwachung in Europa. Datenschutz und Privatsphäre sind immer noch wichtige gesellschaftliche Werte und sollten geschützt werden, auch wenn die Teilnehmer sagen, dass es in Einzelfällen, wie zum Beispiel Flugreisen, eingeschränkt werden könnte. Momentan seien die überzogenen staatlichen Sicherheitsansprüchen (Sicherheit als „Supergrundrecht“) nicht in Übereinstimmung mit den individuellen Bedürfnisse nach Sicherheit und Privatheit.

Die PRISMS Forscher der Freien Universität in Brüssel (VUB) haben vorgeschlagen, dass die Art und Weise, wie die Angst vor der Kriminalität häufig in Umfragen gemessen wird, von der Annahme ausgeht, dass sich Menschen normalerweise ein Maximum an Sicherheit wünschen. Empirische Ergebnisse legen aber mittlerweile nahe, dass dies nicht der Fall ist: Wenn Menschen Angst vor der Kriminalität zum Ausdruck bringen oder sich Sorgen über bestimmte Sicherheitsvorfälle machen, bedeutet dies nicht weder, dass sie zusätzliche Sicherheitsmaßnahmen unterstützen, noch dass die Menschen das Gefühl haben, deswegen ihre Grundrechte und Freiheiten aufgeben zu müssen.

Vielmehr scheint es darauf anzukommen, in welchem Maße die Bürger den öffentlichen und privaten Sicherheitskräften vertrauen. Der momentane Widerstand gegen Massenüberwachung durch die Geheimdienste legt jedenfalls nahe, dass es bei einem Teil der europäischen Öffentlichkeit zu einem erheblichen Vertrauensverlust gegenüber staatlichen Institutionen gekommen ist. Die in Kürze vorliegenden Ergebnisse der Umfrage sollte eine genauere Beantwortung dieser Frage ermöglichen und entsprechende Vorschläge für die Politik untermauern.

Alle PRISMS Forschungsberichte sind auf der Projekt-Webseite (http://prismsproject.eu) verfügbar.

 

Final EVITA Workshop on Security of Automotive On-Board Networks

23 November 2011, Honda Academy in Erlensee, Germany

In order to present major results of the project to the public, the EVITA consortium held a Workshop on Security of Automotive On-Board Networks. The workshop took place before the Car 2 Car Forum 2011 at the Honda Academy in Erlensee (near Frankfurt/Main, Germany). After presenting the main points of the specifications of the security building blocks, the consortium showed desktop and vehicle demonstrators for various automotive applications that require security measures.

EVITA E-safety vehicle intrusion protected applications

Background & Objectives

Future automotive safety applications based on vehicle-to-vehicle and vehicle-to-infrastructure communication have been identified as a means for decreasing the number of fatal traffic accidents. Examples of such applications are local danger warnings and electronic emergency brakes. While these functionalities inspire a new era of traffic safety, new security requirements need to be considered in order to prevent attacks on these systems. Examples of such threats are forced malfunctioning of safety-critical components or the interference with the traffic flow by means of fake messages.

Secure and trustworthy intra-vehicular communication is the basis for trustworthy communication among cars or between cars and the infrastructure. Therefore, the objective of the EVITA project is to design, verify, and prototype an architecture for automotive on-board networks where security-relevant components are protected against tampering and sensitive data are protected against compromise when transferred inside a vehicle.

By focusing on the protection of the intra-vehicle communication EVITA complements other e-safety related projects that focus on the protection of the vehicle-to-X communication.

Work Plan

Security requirements analysis

Starting from relevant use cases and security threat scenarios, security requirements for on-board networks will be specified. Also legal requirements on privacy, data protection, and liability issues will be considered.

Secure on-board architecture design

Based on the security requirements and the automotive constraints, a secure on-board architecture and secure on-board communications protocols will be designed. The security functions will be partitioned between software and hardware. The root of trust will be placed in hardware security modules that may be realised as extensions to automotive controllers or as dedicated security controller chips.

In order to ensure that the identified requirements are satisfied, selected parts of the secure on-board architecture and the communications protocols will be modelled using UML and automata and verified using a set of different but complementary model-based verification tools.

Implementation

For prototyping, FPGA’s will be used to extend standard automotive controllers with the functionality of cryptographic coprocessors. The low-level drivers for interacting with the hardware will be partially generated from UML models.

For even faster prototyping, the security functionality will also be implemented purely in software. An API will be defined so that applications on top of this API can use the cryptographic functions regardless of whether they are provided in hardware or software. All developed code will be validated to ensure its correctness.

Prototype-based demonstration

The secure on-board communication will be deployed inside a lab car demonstrating e-safety applications based on vehicle-to-X communication. Cryptographic methods will ensure the integrity and authenticity of information exchanged within the vehicle and will protect the electronic control units against theft, tampering, and unauthorised cloning.

Releasing the automotive hardware security modules for deployment in cars on public roads requires further implementation and testing efforts, which are out of scope of this project.

Dissemination and external interfaces

In order that the entire automotive industry may benefit from the project results, the secure on-board architecture and communications protocol specifications will be published as open specifications.

The EVITA project partners will liaise with related initiatives in the fields of e-safety and embedded security to achieve multilateral synergies.

Project duration

July 2008 – December 2011

Project Partners

Fraunhofer SIT BMW Group Robert Bosch GmbHContinental Teves AG & Co. OHG escrypt GmbH EURECOMFraunhofer ISI Fujitsu Semiconductor Europe Infineon Technologies AGKatholieke Universiteit Leuven MIRA Ltd Institut TELECOMTrialog

Deliverables

Public reports

No. Deliverable name Date
D0 Project summary Apr. 2012
D1.2.5.1 Presentation slides from the EVITA Workshop on 1 July 2010 Jul. 2010
D1.2.5.2 Presentation slides from the Final EVITA Workshop on 23 November 2011 Nov. 2011
D1.2.6 Final liaisons documentation Mar. 2012
D1.2.7 Final dissemination strategy Apr. 2012
D2.1 Specification and evaluation of e-security relevant use cases Dec. 2009
D2.3 Security requirements for automotive on-board networks based on dark-side scenarios Dec. 2009
D2.4 Legal framework and requirements of automotive on-board networks Sept. 2011
D3.1 Security and trust model Nov. 2009
D3.2 Secure on-board architecture specification Aug. 2011
D3.3 Secure on-board protocols specification Jul. 2011
D3.4.3 On-board architecture and protocols verification Dec. 2010
D3.4.4 On-board architecture and protocols attack analysis Dec. 2010
D4.0.3 Security architecture implementation – Progress report Jul. 2011
D4.2.3 LLD modelling, verification, and automatic C-code generation Jan. 2012
D4.4.2 Test results Feb. 2012

SysML models

Requirement diagrams for automotive on-board networks

These models are to be viewed with the open source UML toolkit TTool.

Publications

2011

  • M. Wolf, T. Gendrullis: Design, implementation, and evaluation of a vehicular hardware security module. In 14th International Conference on Information Security and Cryptology, Seoul, South Korea, November/December 2011 – Paper
  • H. Schweppe, B. Weyl, Y. Roudier, M.S. Idrees, T. Gendrullis, M. Wolf: Securing car2X applications with effective hardware-software co-design for vehicular on-board networks. In 27th Joint VDI/VW Automotive Security Conference, Berlin, Germany, October 2011. VDI Berichte 2131 – Paper
  • G. Pedroza, M.S. Idrees, L. Apvrille, Y. Roudier: A formal methodology applied to secure over-the-air automotive applications. In 74th IEEE Vehicular Technology Conference (VTC2011-Fall), San Francisco, CA, USA, September 2011 – Paper
  • H. Schweppe, Y. Roudier, B. Weyl, L. Apvrille, D. Scheuermann: Car2X communication – Securing the last meter. In 4th International Symposium on Wireless Vehicular Communications (WIVEC 2011), San Francisco, CA, USA, September 2011 – Paper
  • G. Pedroza, L. Apvrille, D. Knorreck: AVATAR: A SysML environment for the formal verification of safety and security properties. In 11th International Conference on New Technologies of Distributed Systems (NOTERE), Paris, France, May 2011 – Paper
  • M.S. Idrees, H. Schweppe, Y. Roudier, M. Wolf, D. Scheuermann, and O. Henniger: Secure automotive on-board protocols: A case of over-the-air firmware updates. In T. Strang, A. Festag, A. Vinel, R. Mehmood, C. Rico Garcia und M. Röckl, eds., 3rd International Nets4Cars/Nets4Trains Workshop, Oberpfaffenhofen, Germany, March 2011. Springer (LNCS vol. 6596) – Paper
  • A. Fuchs, S. Gürgens, and C. Rudolph: A formal notion of trust and confidentiality – Enabling reasoning about system security. In Journal of Information Processing, vol. 19 (2011), pp. 274–291 –Paper

2010

  • O. Henniger: Secure automotive on-board networks – Basis for secure vehicle-to-X communication. In Workshop “Staufrei von Holland nach Hessen” (From Holland to Hesse without traffic jam), Frankfurt/Main, Germany, December 2010 – Slides
  • G. Pedroza, L. Apvrille, and R. Pacalet: A formal security model for verification of automotive embedded applications. In 3rd Sophia-Antipolis Formal Analysis Workshop (SAFA 2010), Sophia-Antipolis, France, October 2010 – Paper
  • D. Knorreck, L. Apvrille, and R. Pacalet: Partitioning of in-vehicle systems-on-chip: a methodology based on DIPLODOCUS. In 13th Sophia-Antipolis Microelectronics Forum (SAME 2010), Sophia-Antipolis, France, October 2010 – Paper
  • L. Apvrille, R. El Khayari, O. Henniger, Y. Roudier, H. Schweppe, H. Seudié, B. Weyl, M. Wolf: Secure automotive on-board electronics network architecture. In FISITA 2010 World Automotive Congress, Budapest, Hungary, May/June 2010 – Paper
  • M.S. Idrees, Y. Roudier, and L. Apvrille: A framework towards the efficient identification and modelling of security requirements. In 5th Conference on Security in Network Architectures and Information Systems (SAR-SSI 2010), Menton, France, May 2010
  • H. Schweppe, Y. Roudier: Security issues in vehicular systems: Threats, emerging solutions and standards. In 5th Conference on Security in Network Architectures and Information Systems (SAR-SSI 2010), Menton, France, May 2010 – Paper
  • A. Ruddle: Security risk analysis approach for on-board vehicle networks. In “The Fully Networked Car” Workshop at the Geneva International Motor Show, Geneva, Switzerland, March 2010 – Slides

2009

  • O. Henniger and H. Seudié: EVITA-project.org: E-safety vehicle intrusion protected applications. In 7thescar (Embedded Security in Cars) Conference, Düsseldorf, Germany, November 2009, invited talk –Slides
  • H. Seudié: Vehicular on-board security: EVITA project. In C2C-CC Liaison Security Workshop, Wolfsburg, Germany, November 2009, invited talk – Slides
  • O. Henniger, L. Apvrille, A. Fuchs, Y. Roudier, A. Ruddle, and B. Weyl: Security requirements for automotive on-board networks. In 9th International Conference on Intelligent Transport System Telecommunications (ITST 2009), Lille, France, October 2009 – Paper
  • B. Weyl, O. Henniger, A. Ruddle, H. Seudié, M. Wolf, and T. Wollinger: Securing vehicular on-board IT systems: The EVITA Project. In 25th Joint VDI/VW Automotive Security Conference, Ingolstadt, Germany, October 2009 – Paper
  • F. Stumpf, B. Weyl, C. Meves, M. Wolf: A security architecture for multipurpose ECUs in vehicles. In 25th Joint VDI/VW Automotive Security Conference, Ingolstadt, Germany, October 2009 – Paper
  • T. Kosch: Privacy and data protection for drivers – A contribution from the EVITA project. In 16th ITS World Congress, Stockholm, Sweden, September 2009, invited talk – Slides
  • M. Wolf: Designing secure automotive hardware for enhancing traffic safety. In CAST Workshop “Mobile Security for Intelligent Cars”, Darmstadt, Germany, August 2009, invited talk – Slides
  • A. Fuchs and R. Rieke: Identification of authenticity requirements in systems of systems by functional security analysis. In Workshop on Architecting Dependable Systems at the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2009), Estoril, Portugal, June 2009 – Paper

2008

  • M. Wolf: Vehicular security hardware. In 6th escar (Embedded Security in Cars) Conference, Hamburg, Germany, November 2008, invited talk – Slides

E-safety Vehicle Intrusion proTected Application (EVITA)

Car to car and car to infrastructure communication has a great potential to further decrease road fatalities. But this implies a massive deployment of a communication infrastructure comprising the car, and consequently opens the door to vehicle intrusion threats, which will in turn create substantial threats to the overall car safety functions. Consequences may range from irritating malfunction of on-board commodity devices to dangerous failures, e.g. missing support for braking and/or steering which can create life threatening situations.It is the distinct objective of EVITA to address these threats by preventing unauthorised manipulation of on-board systems in order to successfully prevent the intrusion into the in-vehicular systems and the transmission of corrupted data to the outside. By focusing on vehicle intrusion projection EVITA complements SeVeCOM and NoW which focus on communication protection.Starting from identifying the necessary industrial use cases regarding assembly and field maintenance and compiling profound scenarios of possible threats, the overall security requirements are defined. On this basis a secure trust model will be compiled and a secure on-board architecture and protocol will be specified, verified, validated and, lastly, demonstrated. EVITA will release the architecture and protocol specification as an open standard.The consortium brings together all relevant expertise to successfully take the challenge: a car manufacturer, tier-one suppliers, security, hardware, software and legal experts. In order to guarantee a broad uptake of the open standard, EVITA will cooperate with the Car 2 Car Communication Consortium.

Status

Finished  (07/2008-12/2011)

Clients

7th Framework Programme, European Commission, DG Information Society, Unit G4

Partners

  • Fraunhofer Institute for Secure Information Technology (SIT), DE
  • Robert Bosch GmbH, DE
  • Continental Teves AG & Co. oHG, DE
  • ESCRYPT GmbH, DE
  • Infineon, DE
  • Fujitsu Services AB, SE
  • MIRA Ltd, UK
  • Trialog, FR
  • KU Leuven, BE
  • BMW Forschung und Technik GmbH, DE
  • GROUPE DES ECOLES DES TELECOMMUNICATIONS (institut Telecom), FR
  • INSTITUT EURECOM, FR

Deliverables with ISI contributions

  • Dumortier, Jos, Christophe Geuens, Alastair Ruddle, Lester Low, and Michael Friedewald, “Legal framework and requirements of automotive on-board networks”, EVITA Deliverable 2.4, EVITA Project, 2011. http://www.evita-project.org/Deliverables/EVITAD2.4.pdf
  • Ruddle, Alastair, David Ward, Benjamin Weyl, Sabir Idrees, Yves Roudier, Michael Friedewald, Timo Leimbach, Andreas Fuchs, Sigrid Gürgens, Olaf Henniger, Roland Rieke, Matthias Ritscher, Henrik Broberg, Ludovic Apvrille, Renaud Pacalet, and Gabriel Pedroza, “Security requirements for automotive on-board networks based on dark-side scenarios”, EVITA Deliverable 2.3, 2009. http://www.evita-project.org/Deliverables/EVITAD2.3.pdf
  • Kelling, Enno, Michael Friedewald, Timo Leimbach, Marc Menzel, Peter Säger, Hervé Seudié, and Benjamin Weyl, “E-safety vehicle intrusion protected applications: Specification and Evaluation of e-Security relevant use cases “, EVITA Deliverable 2.1, 2009. http://www.evita-project.org/Deliverables/EVITAD2.1.pdf

Final EVITA Workshop on Security of Automotive On-Board Networks

23 November 2011, Honda Academy in Erlensee, Germany

In order to present major results of the project to the public, the EVITA consortium holds a Workshop on Security of Automotive On-Board Networks. The workshop takes place before the Car 2 Car Forum 2011 at the Honda Academy in Erlensee (near Frankfurt/Main, Germany). After presenting the main points of the specifications of the security building blocks, the consortium shows desktop and vehicle demonstrators for various automotive applications that require security measures.

EVITA at Car 2 Car Forum 2011

24-25 November 2011, Honda Academy in Erlensee, Germany

Desktop and vehicle demonstrators of the EVITA project are part of the exhibition of the Car 2 Car Forum 2011 at the Honda Academy in Erlensee (near Frankfurt/Main, Germany). The demonstrators show various automotive applications that require security measures. Results of the EVITA project will also be presented in a plenary session. The Car 2 Car Forum is the annual forum for members of the Car 2 Car Communication Consortium.

CONTECS CONverging TEChnologies and their impact on the Social sciences and humanities

This project addresses the potential roles that the social sciences and humanities (SSH) can play with regard to the phenomenon of technological convergence (between Nano-, Bio-, Information technologies, Cognitive sciences and Social sciences and Humanities), its shaping and ethical and societal implications.

In an integrated and systemic approach the project explores the major ethical and societal questions raised by technological development in the field of converging technologies (CT) and the ways in which these can be addressed by the Social Sciences and Humanities. In the context of imminent transformations to a European knowledge-based society, these questions present key opportunities and challenges which the research community needs to be prepared to face. This research project will build on a review and monitoring of technological developments in the CTs and relevant global RTD policy trends, at the same time analysing their possible implications for contributions by the SSH.

The project will further analyse how and to what extent the SSH can contribute to the shaping of science and technology. The final aim is to raise awareness of Converging Technology issues throughout the SSH community and to develop options for a research agenda to be implemented in the SSH priority of the 7th Framework Program. The emergence of the knowledge-based society will entail new forms of relationships between its citizens on the one hand, and between its citizens and institutions on the other hand. The project aims to mobilise European research capacities in SSH that are necessary to develop an understanding of and to address issues related to this critical phenomenon.

Status

Completed (02/2006 – 01/2008)

Client

6th Framework Programme, European Commission, DG Research, Directorate K

Partners

  • Research Centre Karlsruhe, Institute for Technology Assessment and Systems Analysis (ITAS)
  • University Oxford, Saïd Business School
  • L’Institut de l’Ecole normale supérieure

Publications

Articles and book chapters

  • Rader, Michael, “CONverging TECnologies and their impact on the Social sciences and humanities (CONTECS)”, Technikfolgenabschätzung – Theorie und Praxis, Vol. 15, No. 1, 2006, pp. 139.
  • Coenen, Christopher, “Converging Technologies – Promises and Challenges”, Technikfolgenabschätzung – Theorie und Praxis, Vol. 15, No. 1, 2006, pp. 110-114.
  • Quendt, Christiane, Torsten Fleischer, and Michael Rader, “Converging Technologies als Gegenstand internationaler forschungspolitischer Debatten – Beoachtungen, Analysen, Probleme”, Paper presented at: Technology Assessment in World Society: NTA2 – Second conference of the “TA Network”, Berlin, 2006.
  • Beckert, Bernd, Clemens Blümel, and Michael Friedewald, “Visions and Realities in Converging Technologies: Exploring the technology base for convergence”, Innovation: The European Journal of Social Science Research, Vol. 20, No. 4, 2007, pp. 375-394.
  • Coenen, Christopher, “Utopian Aspects of the Debate on Converging Technologies”, in Gerhard Banse, Imre  Hronszky, and G.  Nelson (eds.), Converging Technologies. Promises and Challenges, Sigma, Berlin, 2007.
  • Coenen, Christopher, “Konvergierende Technologien und Wissenschaften. Der Stand der Debatte und politischen Aktivitäten zu »Converging Technologies«”, Hintergrundpapier 16, Büro für Technikfolgen-Abschätzung beim Deutschen Bundestag, Berlin, 2008.
  • Fleischer, Torsten, Christiane Quendt, and Michael Rader, “Converging Technologies und die Sozial- und Geisteswissenschaften: Ergebnisse und Erfahrungen aus einem EU-Projekt”, Technikfolgenabschätzung – Theorie und Praxis, Vol. 17, No. 2, 2008, pp. 74-77.
  • Beckert, Bernd, Clemens Blümel, and Michael Friedewald, “Kje danes prihaja do tehnološke konvergence? Identifikacija področij interdisciplinarnih zahtev in vplivov na znastveni in technološki razvoj”, Casopis za kritiko znanosti, domišljijo in antropologijo (Journal for the Criticism of Science, Imagination and New Anthropology), Vol. 37, No. 237, 2009, pp. 43-55.

Official deliverables

  • Andler, Daniel, and Vincent Pargade, “Converging technologies and their impact on the social sciences and humanities (CONTECS). Cognitive science within Convergence: A first attempt at delineating the field in Europe”, Deliverable D1.1 – Part B, Fraunhofer ISI, Karlsruhe, 2006.
  • Woolgar, Steve, “Converging technologies and their impact on the social sciences and humanities (CONTECS). Visions and Discourse in Converging Technologies: a background report”, Deliverable D1.2, University Oxford, Said Business School, Oxford, 2006.
  • Rader, Michael, Christopher Coenen, Torsten Fleischer, Beate-Josefine Luber, and Christiane Quendt, “Converging technologies and their impact on the social sciences and humanities (CONTECS): Current trends in RTD policy on Converging Technologies “, Deliverable D1.3, Research Center Karlsruhe, Karlsruhe, 2006.
  • Andler, Daniel, and Simon Barthelmé, “Converging technologies and their impact on the social sciences and humanities (CONTECS). Cognitive science within Convergence: Key issues in the European Context”, Deliverable D3.1 – Part B, Institut de l’École normale supérieure, Paris, 2007.
  • Beckert, Bernd, Clemens Blümel, Michael Friedewald, and Axel Thielmann, “Converging technologies and their impact on the social sciences and humanities (CONTECS): R&D Trends in Converging Technologies “, Deliverable D3.1 – Part A, Fraunhofer ISI, Karlsruhe, 2007.
  • Woolgar, Steve, Christopher Coenen, and Elena Simakova, “Converging technologies and their impact on the social sciences and humanities (CONTECS). The Ontological Politics of Convergence”, Deliverable D3.2, University Oxford, Said Business School, Oxford, 2007.
  • Rader, Michael, Christopher Coenen, Torsten Fleischer, Beate-Josefine Luber, and Christiane Quendt, “Converging technologies and their impact on the social sciences and humanities (CONTECS): Current trends in RTD policy on Converging Technologies “, Deliverable D3.3, Research Center Karlsruhe, Karlsruhe, 2007.
  • Andler, Daniel, Simon Barthelmé, Bernd Beckert, Clemens Blümel, Christopher Coenen, Torsten Fleischer, Michael Friedewald, Christiane Quendt, Michael Rader, Elena Simakova, and Steve Woolgar, “Converging technologies and their impact on the social sciences and humanities (CONTECS): An Analysis of critical issues and a suggestion for a future research agenda”, Final Report 2008.

Basic Research and Innovative Science for Energy (BRISE)

Background

Since numerous radical technological changes brought about the energy technology revolutions of mid 19th century, technology in energy sector has experienced notable progresses but mainly as incremental improvements of well-established technological paradigms and not as radical changes in the basic schemes followed for the provision of energy services.

Solving short-term energy-related problems by fine-tuning existing technologies is not sufficient and may not work out in the future due to the exponential growth of energy demand. Since a stabilisation of this demand seems to be unrealistic, it is essential to analyse how energy progress could shift from incremental progress toward radical changes. For instance, high potential technologies like carbon-free electricity, bio-fuels or hydrogen/fuel cell might become radical technologies if they receive further developments from basic research discoveries.

The key idea of the project was based on the fact that purely incremental progress will not suffice to provide the knowledge and technologies needed to address the daunting challenges ahead of us in terms of availability and affordability of clean energy. Therefore a combination of breakthroughs in the provision and use of energy, tapping the potential of basic science, multidisciplinary approaches and cross-cutting technologies were required. However, lessons from various attempts made in Europe and outside seem to show that “science mining” to identify results or discoveries with application potential for energy does not automatically work. The idea was therefore to use a “reverse methodology” based on the identification of the main bottlenecks for which technologies breakthroughs are needed. For these bottlenecks possible solutions were determined offered by the area of fundamental science and basic research. With respect to the emerging technologies to be identified here we concentrated on nanotechnology, biotechnology and information and communication technology.

Objective

The goal of this study was to support the European Commission in developing a programme of basic research activities that stimulate major breakthroughs within the energy sector (energy primary sources and transformation). The specific objectives of this study  consist of the two following points:

  1. identify the major breakthroughs and potentials in the energy field (excluding nuclear);
  2. determine, through a multidisciplinary approach, what are the basic research needs to stimulate these breakthroughs.

This analysis provided relevant recommendations on basic research potentials that were used for the definition of priorities in energy research.

Method and approach

The work was built on the earlier project “ESTIR Energy Scientific & Technological Indicators and References”. The results of this project were revisited and adapted as an essential basis for the background documentation.

A first step was to extract the main issues with relevance to fundamental and basic research from the ESTIR project on the one hand and possible applicability to energy conversion processes on the on the other hand. In a second step the document (REF) that has been extracted from the results of the ESTIR project was complemented by additional information from other sources and expert views.

Based on this background elaborated in by desk research one workshops was held in order to validate and further develop the initial background document. The final result of the project was an approach to tap the potential of fundamental science for the research and development needs of the energy sector.

Status

Completed project (June 2006 – December 2007)

Client

European Commission, Joint Research Centers, Institute for Prospective Technological Studies (IPTS)

Partners

  • GeorgiaTech, Technology Policy and Assessment Centre (TPAC)
  • BSR Sustainability GmbH

Publication

Official deliverables

  • Ragwitz, Mario, Michael Friedewald, Sibylle Gaisser, Axel Thielmann, Marilyn Brown, Susan Cozzens, and Felipe Andrés Toro, “Basic Research and Innovative Science for Energy”, BRISE Deliverable 5, European Techno-Economic Policy Support Network (ETEPS), Brussels, 2008.

This website stores some user agent data. These data are used to provide a more personalized experience and to track your whereabouts around our website in compliance with the European General Data Protection Regulation. If you decide to opt-out of any future tracking, a cookie will be set up in your browser to remember this choice for one year. I Agree, Deny Diese Website speichert einige User-Agent-Daten. Diese Daten werden verwendet, um eine persönlichere Erfahrung zu ermöglichen und um Ihren Aufenthaltsort auf unserer Website in Übereinstimmung mit der EU Datenschutz-Grundverordnung zu verfolgen. Wenn Sie sich dazu entschließen, das Tracking zu deaktivieren, wird in Ihrem Browser ein Cookie eingerichtet, das diese Auswahl ein Jahr lang speichert. Ich stimme zu, Stimme nicht zu
1177