38 research outputs found
Commodity risk assessment of Crataegus monogyna plants from the UK
The European Commission requested the EFSA Panel on Plant Health to prepare and deliver risk assessments for commodities listed in Commission Implementing Regulation (EU) 2018/2019 as 'High risk plants, plant products and other objects'. Taking into account the available scientific information, including the technical information provided by the applicant country, this Scientific Opinion covers the plant health risks posed by the following commodities: Crataegus monogyna bare root plants and rooted plants in pots imported into the EU from the UK. A list of pests potentially associated with the commodities was compiled. The relevance of any pest was assessed based on evidence following defined criteria. Only the quarantine pest Erwinia amylovora was selected for further evaluation. For E. amylovora the special requirements specified in the Commission Implementing Regulation (EU) 2019/2072 are fulfilled by the UK and no other pests for further evaluation were selected
Pest categorisation of Crisicoccus seruratus
Following the commodity risk assessments of Acer palmatum plants grafted on A. davidii from China, in which Crisicoccus matsumotoi (Hemiptera: Pseudococcidae) was identified as a pest of possible concern, the European Commission requested the EFSA Panel on Plant Health to conduct a pest categorisation of C. matsumotoi for the territory of the European Union. Recent taxonomic revision of the genus Crisisoccus concluded that C. matsumotoi is a synonym of C. seruratus; therefore, the categorisation will use the current valid name C. seruratus. It is an insect pest native to Japan, feeding on species in 13 plant families. There are reports of its presence also in China and the Republic of Korea, but there is great uncertainty about the identity of the species for these records. Therefore, there is uncertainty about the species referred to as C. matsumotoi in the commodity risk assessments of A. palmatum. C. seruratus is a multivoltine species. It has three generations per year and overwinters as a nymph. The most important crops that may be affected by C. seruratus are figs (Ficus carica), grapes (Vitis spp.), nashi pears (Pyrus pyrifolia var. culta), persimmons (Diospyros kaki) and walnuts (Juglans regia). Plants for planting and fruits provide potential pathways for entry into the EU. Host availability and climate suitability suggest that the central, northern and some areas of southern EU countries would be suitable for the establishment of C. seruratus. The introduction of this mealybug would likely have an economic impact in the EU through yield reduction and fruit downgrading because of honeydew deposition and the consequent growth of sooty moulds. This insect is not listed in Annex II of Commission Implementing Regulation (EU) 2019/2072. Phytosanitary measures are available to reduce the likelihood of entry and spread of this species into the EU. C. seruratus satisfies the criteria that are within the remit of EFSA to assess for it to be regarded as a potential Union quarantine pest
Pest categorisation of Pseudococcus cryptus
The EFSA Panel on Plant Health performed a pest categorisation of Pseudococcus cryptus Hempel (Hemiptera: Pseudococcidae), the citriculus mealybug, for the EU. P. cryptus originates from Southeast Asia but is now established in East Africa, the Middle East and South America. The pest is not currently known to occur in the EU (there was a record once, in 2006, in a zoo/botanical garden from southern Spain). P. cryptus is not listed in Commission Implementing Regulation (EU) 2019/2072. It is polyphagous, feeding on plants in more than 90 genera in 51 families, and exhibits a preference for citrus (Citrus spp.) and palms (especially Cocos nucifera, Elaeis guineensis and Areca catechu). It is an important pest of citrus in Japan and parts of the Middle East, although in Israel, it is controlled by natural enemies. It is sexually reproductive, has six overlapping generations each year in Israel, and each female lays up to approximately 150 eggs, depending on temperature and host species. The main natural dispersal stage is the first instar, which crawls over the host plant or may be dispersed further by wind and animals. Plants for planting, fruits, vegetables and cut flowers provide potential pathways for entry into the EU. Climatic conditions in EU member states around the Mediterranean Sea where there is host plant availability, especially citrus, are conducive for establishment. The introduction of P. cryptus is expected to have an economic impact in the EU through reduction in yield and quality of important crops (mainly citrus) and damage to various ornamental plants. Phytosanitary measures are available to reduce the likelihood of entry and further spread. P. cryptus meets the criteria that are within the remit of EFSA to assess for this species to be regarded as a potential Union quarantine pest
Commodity risk assessment of Petunia spp. and Calibrachoa spp. unrooted cuttings from Guatemala
The European Commission requested the EFSA Panel on Plant Health to evaluate the probability of entry of pests (likelihood of pest freedom at entry), including both, regulated and non-regulated pests, associated with unrooted cuttings of the genera Petunia and Calibrachoa produced under physical isolation in Guatemala. The relevance of any pest for this opinion was based on evidence following defined criteria, based on the methodology used for high-risk plants adapted for the specificity of this assessment. Nineteen EU regulated pests (Bemisia tabaci, pepper golden mosaic virus, pepper huasteco yellow vein virus, tomato severe leaf curl virus, tomato yellow leaf curl virus, tomato spotted wilt virus, Liriomyza huidobrensis, Liriomyza sativae, Liriomyza trifolii, Bactericera cockerelli, Eotetranichus lewisi, Epitrix subcrinita, Epitrix cucumeris, Helicoverpa zea, Chloridea virescens, Spodoptera ornithogalli, Ralstonia solanacearum, Ralstonia pseudosolanacearum, Xanthomonas vesicatoria) and one EU non-regulated (Phenacoccus solenopsis) pest fulfilled all relevant criteria and were selected for further evaluation. For these pests, the risk mitigation measures proposed in the technical dossier from Guatemala were evaluated taking into account the possible limiting factors, and an expert judgement is given on the likelihood of pest freedom taking into consideration the risk mitigation measures acting on the pest, including uncertainties associated with the assessment. The limited and partially conflicting information provided in the dossier contributes to the wide estimates of pest freedom. The estimated degree of pest freedom varies among the pests evaluated, with Ralstonia spp. (R. solanacearum and R. pseudosolanacearum) being the pest most frequently expected on the imported cuttings. The expert knowledge elicitation indicated, with 95% certainty, that between 9916 and 10,000 bags containing unrooted cuttings per 10,000 would be free of Ralstonia spp
Decision-support tools to build climate resilience against emerging infectious diseases in Europe and beyond
Climate change is one of several drivers of recurrent outbreaks and geographical range expansion of infectious diseases in Europe. We propose a framework for the co-production of policy-relevant indicators and decision-support tools that track past, present, and future climate-induced disease risks across hazard, exposure, and vulnerability domains at the animal, human, and environmental interface. This entails the co-development of early warning and response systems and tools to assess the costs and benefits of climate change adaptation and mitigation measures across sectors, to increase health system resilience at regional and local levels and reveal novel policy entry points and opportunities. Our approach involves multi-level engagement, innovative methodologies, and novel data streams. We take advantage of intelligence generated locally and empirically to quantify effects in areas experiencing rapid urban transformation and heterogeneous climate-induced disease threats. Our goal is to reduce the knowledge-to-action gap by developing an integrated One Health—Climate Risk framework
On the Privacy Risks of Publishing Anonymized IP Network Traces
Abstract. Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of published packet traces implement a form of address anonymization to hide sensitive information, it has been unclear if such anonymization techniques are sufficient to address the privacy concerns of users and organizations. In this paper we attempt to quantify the risks of publishing anonymized packet traces. In particular, we examine whether statistical identification techniques can be used to uncover the identities of users and their surfing activities from anonymized packet traces. Our results show that such techniques can be used by any Web server that is itself present in the packet trace and has sufficient resources to map out and keep track of the content of popular Web sites to obtain information on the network-wide browsing behavior of its clients. Furthermore, we discuss how scan sequences identified in the trace can easily reveal the mapping from anonymized to real IP addresses.
A generic anonymization framework for network traffic
Lack of trust is one of the main reasons for the limited cooperation between different organizations. The privacy of users is of paramount importance to administrators and organizations, which are reluctant to cooperate between each other and exchange network traffic traces. The main reasons behind reluctance to exchange monitored data are the protection of the users ’ privacy and the fear of information leakage about the internal infrastructure. Anonymization is the technique to overcome this reluctance and enhance the cooperation between different organizations with the smooth exchange of monitored data. Today, several organizations provide network traffic traces that are anonymized by software utilities or ad-hoc solutions that offer limited flexibility. The result of this approach is the creation of unrealistic traces, inappropriate for use in evaluation experiments. Furthermore, the need for fast on-line anonymization has recently emerged as cooperative defense mechanisms have to share network traffic. Our effort focuses on the design and implementation of a generic and flexible anonymization framework that provides extended functionality, covering multiple aspects of anonymization needs and allowing fine-tuning of privacy protection level. The proposed framework is composed by an anonymization application programming interface (AAPI). The performance results show that AAPI outperforms existing tools, while offering significantly more anonymization primitives.