News

How does a Law Enforcement Agency (LEA) protect its employees from harm?  Amongst numerous activities and items, it provides secure premises, work procedures and protects information on its personnel. There is a high expectation from employees and society that the huge amount of data collected, held and processed by LEAs...

All intelligence has aspects that can be called data.  This can range from locations, numbers, biometrics, names and other personal information.  Both Law Enforcement and criminal organisations rely upon the collection, storage and use of this data for many purposes.  How the various organisations keep the data secure and safe...

Digital forensics has seen a surge in interest from both researchers and practitioners. This heightened focus is a direct response to the escalating sophistication of cyberattacks, which has made the task of gathering evidence increasingly intricate. As cybercriminals employ advanced techniques, professionals in the field must leverage a myriad of...

In the digital age, the threat landscape is constantly shifting, with ransomware emerging as a dominant force of disruption. A collaborative white paper by the National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) delves deep into the mechanics, evolution, and business models of ransomware, offering insights into...

Under the Horizon Europe Programme an important action for building the future architecture of mobile communications has started. The 5G mobile networks are facing applications no more compatible and the extreme future-looking applications needs a 6G potentials. Under this assumption EU has just funded “Distributed Artificial Intelligence-driven open and programmable architecture...

Since ChatGPT was released in November 2022, it has created a lot of buzz in tech circles, but also in the mainstream. It has set companies racing to get their latest (and usually largest, although that is starting to change) LLMs to market, from Microsoft, to AWS, Google to Facebook...

 The report “Cross-agency situation report” outlines significant threats impacting the fight against organized crime, highlighting economic crime, its geographical spread, global reach, and unlawful influence. Key vulnerabilities include the misuse of incorrect data in official records and the challenges posed by the digital and cross-border nature of crime. Digitalization has...

On January 23, 2024, the NOTIONES project consortium conducted the third of five workshops planned during the project’s lifecycle. This event took place face-to-face in Madrid, Spain, as well as virtually via the MS Teams platform. The workshop methodology was carefully designed to facilitate open discussions on selected topics related to...

IntroductionThe intelligence activities in the field of the fight against criminality and terrorism include the capability of recognizing signals and facts of interest within unstructured textual contents. The possibility of retrieving information contained in proclaims, disseminations, propaganda in general, is a very useful instrument that can help the intelligence agencies to...

Terrorist attacks using explosives and CBRN (Chemical, Biological, Radiological and Nuclear) materials have been present throughout history. While the frequency of CBRN terrorist attacks is relatively low compared to those with explosives and other types of weapons, it is crucial to treat the efforts of both terrorist organizations and individuals with appropriate gravity in order...