Author: admin

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]In the framework of the Research Monitoring tasks (and notably T5.3) and the related deliverable that will be submitted at the end of October, the NOTIONES consortium has decided to investigate the relationship between LEAs and commercial actors. The...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]One of the UK's leading facial recognition retail security companies, ‘Facewatch’ software provides businesses with security against crime before it even happens. It uses facial recognition to track dangerous people, suspicious individuals, and perimeter breaches making the environment...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Featured Image sources/copyright: ISEMI via Czech police Investigating CBRN crimes requires special qualifications, training, and the assistance of new technologies. Especially when it comes to the connection between CBRN crime and Cybercrime. In recent years, in cyberspace, we have...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Some people associate AI with the concern that technology could take over more and more human jobs. In the field of IT security, where ever-increasing challenges meet notorious staff shortages, this is precisely where a great opportunity lies:...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The Working Groups are the backbone of NOTIONES. They run throughout the project as timely meetings and continuous online working. The Working Groups consist of a mix of intelligence practitioners, academia and technology providers. The work focuses on...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]We are pleased to report that the first NOTIONES project newsletter – October 2022 – has been sent out to the subscribers. NOTIONES newsletters will be created and sent out regularly to inform all interested stakeholders about the project...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]We are proud to announce that the second run of the NOTIONES Innovation Monitoring tasks has started at the beginning of September. The tasks will feed material to new Working Groups that will start in November. Zanasi &...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]We are glad to welcome a new group of research projects into the NOTIONES Network: we have started collaborating on each other’s activities and look forward to further interactions. A very warm welcome to projects ECHO Cybersecurity, popAI Project, CYBERSPACE Project, CC-DRIVER Project, EU-HYBNET, LAW-GAME, INFINITY Horizon, ALIGNER, CTC...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The past Tuesday, several members of the consortium of NOTIONES participated in a joint #webinar organised between the projects CC-DRIVER and CYBERSPACE. The presenters reported on the current EU cybercrime prospect and described the objectives and challenges of both...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Cryptocurrency is a digital currency in which transactions are decentralized, without a central authority to uphold or maintain it. Transactions are secured by encryption, which makes it nearly impossible to spoof or spend twice. Bitcoin is a cryptocurrency...