News

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]One of the UK's leading facial recognition retail security companies, ‘Facewatch’ software provides businesses with security against crime before it even happens. It uses facial recognition to track dangerous people, suspicious individuals, and perimeter breaches making the environment and processes safer. The platform,...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Featured Image sources/copyright: ISEMI via Czech police Investigating CBRN crimes requires special qualifications, training, and the assistance of new technologies. Especially when it comes to the connection between CBRN crime and Cybercrime. In recent years, in cyberspace, we have seen many attempts to procure...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Some people associate AI with the concern that technology could take over more and more human jobs. In the field of IT security, where ever-increasing challenges meet notorious staff shortages, this is precisely where a great opportunity lies: to ward off malware, attacks...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The Working Groups are the backbone of NOTIONES. They run throughout the project as timely meetings and continuous online working. The Working Groups consist of a mix of intelligence practitioners, academia and technology providers. The work focuses on strengthening the understanding of the...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]We are pleased to report that the first NOTIONES project newsletter – October 2022 – has been sent out to the subscribers. NOTIONES newsletters will be created and sent out regularly to inform all interested stakeholders about the project progress and about upcoming events....

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]We are proud to announce that the second run of the NOTIONES Innovation Monitoring tasks has started at the beginning of September. The tasks will feed material to new Working Groups that will start in November. Zanasi & Partners, Scientific and Technical coordinator...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]We are glad to welcome a new group of research projects into the NOTIONES Network: we have started collaborating on each other’s activities and look forward to further interactions. A very warm welcome to projects ECHO Cybersecurity, popAI Project, CYBERSPACE Project, CC-DRIVER Project, EU-HYBNET, LAW-GAME, INFINITY Horizon, ALIGNER, CTC Project, and upcoming AI4CYBER. For further...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The past Tuesday, several members of the consortium of NOTIONES participated in a joint #webinar organised between the projects CC-DRIVER and CYBERSPACE. The presenters reported on the current EU cybercrime prospect and described the objectives and challenges of both projects, as well as the...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Cryptocurrency is a digital currency in which transactions are decentralized, without a central authority to uphold or maintain it. Transactions are secured by encryption, which makes it nearly impossible to spoof or spend twice. Bitcoin is a cryptocurrency created in 2008 by Satoshi...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Security and intelligence practitioners are increasingly being challenged by contemporary and emerging technologies to accomplish their core mission of ensuring national security. They need to rapidly expand their cyber capabilities to advance in homeland security. To engage in the emerging cyber regime complex...