Author: admin

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Featured Image sources/copyright: ISEMI via Czech police Investigating CBRN crimes requires special qualifications, training, and the assistance of new technologies. Especially when it comes to the connection between CBRN crime and Cybercrime. In recent years, in cyberspace, we have...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Some people associate AI with the concern that technology could take over more and more human jobs. In the field of IT security, where ever-increasing challenges meet notorious staff shortages, this is precisely where a great opportunity lies:...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The Working Groups are the backbone of NOTIONES. They run throughout the project as timely meetings and continuous online working. The Working Groups consist of a mix of intelligence practitioners, academia and technology providers. The work focuses on...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]We are pleased to report that the first NOTIONES project newsletter – October 2022 – has been sent out to the subscribers. NOTIONES newsletters will be created and sent out regularly to inform all interested stakeholders about the project...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]We are proud to announce that the second run of the NOTIONES Innovation Monitoring tasks has started at the beginning of September. The tasks will feed material to new Working Groups that will start in November. Zanasi &...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]We are glad to welcome a new group of research projects into the NOTIONES Network: we have started collaborating on each other’s activities and look forward to further interactions. A very warm welcome to projects ECHO Cybersecurity, popAI Project, CYBERSPACE Project, CC-DRIVER Project, EU-HYBNET, LAW-GAME, INFINITY Horizon, ALIGNER, CTC...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]The past Tuesday, several members of the consortium of NOTIONES participated in a joint #webinar organised between the projects CC-DRIVER and CYBERSPACE. The presenters reported on the current EU cybercrime prospect and described the objectives and challenges of both...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Cryptocurrency is a digital currency in which transactions are decentralized, without a central authority to uphold or maintain it. Transactions are secured by encryption, which makes it nearly impossible to spoof or spend twice. Bitcoin is a cryptocurrency...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]Security and intelligence practitioners are increasingly being challenged by contemporary and emerging technologies to accomplish their core mission of ensuring national security. They need to rapidly expand their cyber capabilities to advance in homeland security. To engage in...