Author: admin

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]As the participation of AI expands in areas such as transportation, finance, medicine, security and entertainment, society is realizing the high importance of the Trustworthiness of the Artificial Intelligence as a Service. Lack of stakeholder confidence in such...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Virtual currencies and related services like NFT have potential to push up financial innovation and efficiency, but they also create new opportunities for criminals and terrorists to finances their illicit activities. That why it is important to identify...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Realizing the advantages of artificial intelligence in solving many issues in such important areas as the economy, healthcare, climate change, the spread of diseases, and so on, humanity began to pay special attention to the development of these...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The ICSA Foundation hosted a conference entitled "The Defense of Digital and Electromagnetic Sovereignty – TEMPEST Technology for the Protection of Computer Systems against Electromagnetic Interception and Interception" , which was held on December 5, 2022. The initiative stems...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The Center of Excellence for Police and Security Research at the Hochschule für den öffentlichen Dienst in Bayern prepared a report on Fake News and the related possible solution approaches. Online fake news via manifold channels such as via...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The National Intelligence Center of the Swedish Police Authority has submitted an organized crime situation report which is found by cooperating agencies and network agencies. The purpose of the situation report is to act as a comprehensive strategic...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]A LEA and an organization from the NOTIONES project consortium has been supporting the Kosovo Police, to develop and implement robust systems and processes for Intelligence-Led Policing (ILP).  The principal aims have been to implement processes that gather,...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]September 11, 2001 was a historic turning point also for intelligence which, failing spectacularly, especially for the lack of analysis of information data however acquired, has rediscovered the factor HUMINT (human intelligence) and the importance of the analysis...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The vocabulary defines strategy as the branch of military art that studies, sets and coordinates in broad terms the operations of war. Terrorism is a form of asymmetric warfare. Terrorist tactics employ violence primarily against noncombatants and aim...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The Europeans, although very concerned by the developments of the war in Ukraine, almost a kind of terroristic war that kill indiscriminately civilians, women and children, and even before by the growing transnational terrorist phenomena, have so far...