News

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Members of the NOTIONES project consortium participated in the 2022 Zagreb Security Forum (ZSF), which was conducted in Croatia on 6-8 October 2022, where they lectured on security threats and hybrid warfare.  Prof. Shlomo Shpiro and Dr. Barak Bouks from Bar-Ilan University in...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The paper summarizes results from the study of the state-of-the-art of the intelligence cycle phases done by NOTIONES WP2 partners working in T2.3 The intelligence cycle. The analysis of the intelligence cycle, both military and civilian, are considered at the strategic level and its...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Knowledge is never enough, and being up to date in the cybersecurity field is extremely important. Every day a new threat is discovered, trends are created, new hardware are developed, and it is necessary to embrace continuous and interdisciplinary education to know how...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]As intelligence gathering operations become increasingly complex, Andrew Staniforth, Director of Innovation at SAHER (Europe), explains exclusively to the NOTIONES network the future of traditional HUMINT in the digital age, and the importance of developing collaborative partnerships to develop intelligence disciplines. What is your...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Tracking synthetic illicit drugs production and their traffic online is a challenging job due to the fast pace with which the market evolves. Expert.ai has designed and developed a module for the automatic learning of new knowledge. New scientific papers, which expose chemicals as...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]September 2022 marked the first 12 months of NOTIONES project. A lot of work has been carried out by the Consortium during this time, but some key achievements of the project are highlighted below: The tasks related to Intelligence process and preliminary requirements...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]If we interpret the meaning of the words 'Analysis' and 'Intelligence' separately in a security related context, we can see that basically the term 'Intelligence' encompasses analysis as part of a multifaceted process of collecting reliable facts for a specific purpose, often involving...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]In the framework of the Research Monitoring tasks (and notably T5.3) and the related deliverable that will be submitted at the end of October, the NOTIONES consortium has decided to investigate the relationship between LEAs and commercial actors. The relationship between LEAs and commercial...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]One of the UK's leading facial recognition retail security companies, ‘Facewatch’ software provides businesses with security against crime before it even happens. It uses facial recognition to track dangerous people, suspicious individuals, and perimeter breaches making the environment and processes safer. The platform,...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Featured Image sources/copyright: ISEMI via Czech police Investigating CBRN crimes requires special qualifications, training, and the assistance of new technologies. Especially when it comes to the connection between CBRN crime and Cybercrime. In recent years, in cyberspace, we have seen many attempts to procure...