Tools and Technologies
Inspired by the human nervous and immune system researchers at the University of Arizona are developing a new cyber security model, which detects and addresses a threat in its earliest stage. A similar idea has been developed by IBM Security called the “IBM Security immune system”. Thus, these initiative is driven by a desire to
Delivered through virtual reality (VR), augmented reality (AR) and mixed reality (MR), Auggmed offers a training platform for police, security forces and counter-terrorist units as well as first responders. Coordinated by the BMT Group, together with 13 partners, research and development of this EU funded project was completed by May 2018. Auggmed deals with the
As terrorists dive deeper into Dark Nets and Deep Web, obfuscating their presence, DANTE supports European law enforcement agencies, to identify them. Development on the EU funded (H2020) project started in September 2016 and was completed by February 2019. Coordinated by the Italian “ENGINEERING – INGEGNERIA INFORMATICA SPA” the project was conducted by 18 partners.
Dogs, according to the EU, are still the best way to systematically detect explosives. They are mobile, agile and far more sensitive than any chemical detectors yet devised. However, while inexpensive to operate, training suitable dogs is time consuming and labour extensive, making it expensive. As the need for bomb dogs grows the training process
The Adversary project started development in November 2018 and received financing from the EU (H2020). By 2019 the project was concluded. However, according to Project coordinator and CEO of the Adversary Platform, Steindór Guðmundsson “In our minds, the project isn’t really finished at all – it’s just a stepping stone to a much larger project”.
Ever since their coming into existence, social media have been impacting our communication behaviour and added new possibilities to it. Despite their numerous advantages, they are also increasingly becoming a breeding ground for criminal activity. In order to enhance law enforcement in that respect, a structured approach is required. In a legal perspective the term
Aside from more specific projects and calls, the European Commission’s Horizon 2020 Work Programme also deals with the fundamental structures in the field of security research and communication. To ensure the best possible outcomes for research and innovation in the European Union, the areas of research communication, frameworks and procurement needs to be improved continuously.
Whether it’s private citizens, small and medium-sized companies, or the public power grid, we are dependent on elaborate computer systems for routine processes. Without a properly functioning digital system, we could neither withdraw cash from an ATM or turn our lights on, as nearly everything we do in our everyday lives is in some form
When it comes to border security, conventional means seem to be unable to counter modern challenges on a large scale. A new approach is vital to address this issue more adequately. One of the main challenges is for example the management of goods and persons at the borders. Could the implementation of technology be the
As computers gain hold of nearly every facet of our lives, our reliance on them grows. Even now, the water supply, traffic light systems and supply chains of whole communities and cities rely strongly on the correct functioning of computer systems. Should these be infiltrated or manipulated, the consequences could be costly as well as