TESTUDO

TESTUDO

TESTUDO Autonomous Swarm of Heterogeneous resources in infrastructure protection via threat prediction and prevention As its surroundings changes radically and climate conditions deteriorates, Europe and its Members adapt to these current challenges. To this end and in order to maximise their usability, the EC established a framework of a common policy (EU Security Market study) by categorizing potential technologies per security domain, including Critical Infrastructure (CI) Protection. This trend is indicative for the importance and significancy that the EC gives to these matters. Any potential disruption, either intentional as a terrorist attack or a natural disaster, may risk smooth operations of such structures that may have a severe impact on a local society and its daily activities or well-being. Current advancements in various technologies can be particularly beneficial in CI…
Read More
FUELPHORIA

FUELPHORIA

FUELPHORIA Accelerating the sustainable production of advanced biofuels and RFNBOs – from feedstock to end-use FUELPHORIA will set-up and test value chains for advanced biofuels and renewable non-biological fuels in Europe, establishing sustainable, competitive and secure value chains for advanced biofuels. The project contributes to the objectives of the European Commission’s 2022 REPower EU Plan “to scale-up renewables, achieve electrification, and replace fossil-based heat and fuel in industry, buildings, and the transport sector”. A versatile range of processes including but not limited to chemical, biological, and photo-biological processes will serve as the scaffold to convert different feedstocks into an array of renewable fuels of quality specifications defined by end-users in the transport (e.g. maritime and road) and in the power (e.g. gas or oil-fired thermal plants) production sector. Four demonstrators…
Read More
CONNECTOR

CONNECTOR

CONNECTOR CustOms exteNded iNteroperablE Common informaTiOn shaRing environment CONNECTOR aims to support the European Integrated Border Management (EIBM) and the EU Customs Action Plan by emphasising the importance of collaborative efforts among Customs, Border and Coast Guard Authorities in managing borders, especially under current and future challenging circumstances. This objective can be achieved through Customs participation in the Common Information Sharing Environment (CISE) network and Enhanced Common Information Sharing Environment (e-CISE) via the proposed Customs Extended Common Information Sharing Environment (CE-CISE). CONNECTOR proposes an integrated, common, and shared risk assessment approach for all Border Management Authorities. This approach considers pan-EU common risk indicators for each end user group, including Customs, Border and Coast Guards Authorities, as well as FRONTEX. Its aim is to safeguard the external EU border, protect EU…
Read More
ALLIES

ALLIES

ALLIES AI-based framework for supporting micro (and small) HSPs on the report and removaL of onLIne tErroriSt content The ALLIES project aims at supporting micro (and small) HSPs in achieving compliance with the new requirements and obligations under the TCO Regulation. To achieve this, ALLIES adopts four main approaches, each targeting skill development and innovation. These four pillars will be respectively focused on (1) learning and awareness raising, (2) technical development and adaptation, (3) training and education, and (4) experience sharing and reporting mechanisms. Both the learning and awareness raising initiatives will further expand the capacity of the TCO Regulation by designing a taxonomy of online terrorist related behaviours. The second pillar will be focused on the development of a specific set of AI-boosted user-friendly tools that will enhance small…
Read More
PERIVALLON

PERIVALLON

PERIVALLON Protecting the EuRopean terrItory from organised enVironmentAl crime through inteLLigent threat detectiON tools PERIVALLON aims to provide an improved and comprehensive intelligence picture of organised environmental crime and develop effective and efficient tools and solutions for detecting and preventing such types of criminal activities and for assessing their environmental impact based on geospatial intelligence, remote sensing, scanning, online monitoring, analysis, correlation, risk assessment, and predictive analytics technologies, by leveraging the latest advancements in Artificial Intelligence (AI) in the fields of computer vision and multimodal analytics. As a result, enhanced investigation processes and methodologies will be derived through the capabilities provided by the developed tools and solutions, and the insights obtained though the proposed Environmental Crime Observatory. The capacity of end users (including Police Authorities and Border Guards) will also…
Read More
FaRADAI

FaRADAI

FaRADAI Frugal and Robust AI for Defence Advanced Intelligence An important crosscutting need for Artificial Intelligence is to create technologies for trustworthy autonomous and frugal learning, i.e. the ability of a system to adapt and learn from its environment, including from user supervision, for a reasonable cost and without intervention from expert developers nor regression. Such technologies can be highly disruptive and have high impacts for many capabilities, especially when the information to manage is highly variable or unpredictable and high adaptability is needed. These technologies can also alleviate the current need to provide data to the system developers to get improvements depending on such data, which can be critical when the data is confidential, and is thus critical for defence. They can more generally enhance technological independence. Selected actions…
Read More
CTC

CTC

CTC Cut The Cord With the nature of terror incidents undergoing a technology-aided transformation (e.g. use of cryptocurrencies to enhance anonymity), the monitoring and analysis of financial transactions play a pivotal role in the effort to timely prevent actions and funding of global terrorism. Financial crime exploits every aspect of digital transformation and identifies non-traditional products for financing and supporting terrorist organisations, such as social media, cryptocurrencies, and other Financial Technologies. The prevention and disruption of terrorism financing requires international cooperation and advanced investigative techniques based on new technologies. The CTC project (Cut The Cord) aims to enhance the public-private cooperation through the establishment of a wide stakeholder community, with the vision to sustain it beyond the end of the project. Joint training exercises (theoretical and hands-on) will be organised…
Read More
Nestor

Nestor

NESTOR NESTOR – aN Enhanced pre-frontier intelligence picture to Safeguard The EurOpean boRders NESTOR aims to demonstrate a fully functional next generation holistic border surveillance system providing pre-frontier situational awareness beyond maritime and land border following the concept of the European Integrated Border Management. NESTOR long-range, wide area surveillance capabilities for detection, recognition classification and tracking of moving targets (e.g. persons, vehicles, drones etc.) is based on optical, thermal imagine and Radio Frequency (RF) spectrum analysis fed by an interoperable long range IP-based network of sensors including stationary installations and mobile manned or unmanned aerial, water surface, underwater and ground vehicles, capable of functioning both as standalone, tethered and in swarms (UAV, USV, UUV and UGV) platforms. NESTOR Border Command Control and Coordination intelligence (BC3i) system using cutting-edge Artificial Intelligence…
Read More
ODYSSEUS

ODYSSEUS

ODYSSEUS Preventing, Countering and Investigation Terrorist Attacks Through Prognostic, Detection and Forensic Mechanisms for Explosive Precursors ODYSSEUS aims to increase the knowledge on homemade explosives (HMEs) and explosive precursors, including precursors not previously studied, and develop effective and efficient prognostic, detection, and forensic tools to improve the capabilities of Law Enforcement Agencies (LEAs) towards the prevention, countering, and investigation of terrorist incidents involving HMEs. ODYSSEUS will build upon relevant previous projects mainly HOMER, through the involvement of HOMER’s core partners in this consortium, and will thus continue the work already performed in HOMER on some precursors and also further extend it to not previously studied precursors. To discover potentially hitherto unknown information, online HMEs recipes will be collected and their content will be analysed in order to extract knowledge about…
Read More
SECANT

SECANT

SECANT SECurity And privacy protectioN in Internet of Things devices SECANT aims to contribute decisively towards improving the readiness and resilience of organisations against the crippling modern cyber-threats, by increasing the privacy, data protection, and accountability across the entire interconnected ICT ecosystem, and by reducing the costs for security training in the European market. To this end, the SECANT platform will enhance the capabilities of organisations’ stakeholders, by implementing (a) collaborative threat intelligence collection, analysis, and sharing; (b) innovative risk analysis specifically designed for interconnected nodes of an industrial ecosystem; (c) cutting-edge trust and accountability mechanisms for data protection, and (d) security awareness training for more informed security choices. The effectiveness and versatility of the proposed solution will be validated in four realistic pilot use case scenarios applied in the…
Read More
CALLISTO

CALLISTO

CALLISTO Copernicus Artificial Intelligence Services and data fusion with other distributed data sources and processing at the edge to support DIAS and HPC infrastructures Artificial Intelligence (AI) is already part of our lives and is extensively entering the space sector to offer value-added Earth Observation (EO) products and services. CALLISTO project integrates Copernicus data, already indexed in DIAS platforms such as ONDA-DIAS, utilising High Performance Computing infrastructures for enhanced scalability when needed. Complementary distributed data sources involve Galileo positioning data, visual content from UAVs, Web and social media data linking them with open geospatial data, in-situ sensor data. On top of these data sources, AI methods are applied to extract meaningful knowledge such as concepts, changes, activities, events, 3D-models, videos and animations of the user community. AI methods are also…
Read More
ISOLA

ISOLA

ISOLA A system platform that enhances the situational awareness and support Ship’s Security Stakeholders to the execution of their duties referring to the Ship's Security Plan Maritime transport enables trade and contacts between all EU nations and has always been a catalyst for economic development and prosperity of the Union. One of the major concerns of EU policy is to protect the citizens and economies from the consequences of unlawful intentional acts against shipping and port operations. ISOLA will develop, integrate, test, deploy, demonstrate and validate a systematic and fully automated security approach by incorporating innovative technologies for sensing, monitoring, data fusion, alarming and reporting real-time during illegal incidents. This will ensure high level of security among all passengers of the ship and augmentation of the Ship Security Plan. The…
Read More
7SHIELD

7SHIELD

7SHIELD Prevention, detection, response and mitigation of combined physical and cyber threats to critical infrastructure in Europe The 7SHIELD project addresses the security and the resilience of EU Ground Segments of Space Systems, meeting the crosscutting and the sectorial criteria of the EU critical infrastructures (2008/14). The Copernicus era has created a new market with the massive amounts of satellite data that the ground segments of space systems receive serve to the market and governmental bodies. A physical/cyber-attack to their installations or communication networks, respectively, would cause debilitating impact on public safety and security of EU citizens and public authorities. A physical attack on a space ground segment makes the distribution of satellite data problematic and, on the other hand, a cyber-attack in its data storage, access and exchange affects…
Read More