
Recent scholarship on y the gender dimension in preventing and countering violent extremism programming, still lacks thorough gender-sensitive data collection and analysis. On the one hand, empirical data and a gender-sensitive approach in counter violent extremism is needed to create lasting security. On the other hand, violent extremism concept does not have an agreed definition. The literature on Traditional Counterterrorism (TC) policy has been conducted from a gender-blind perspective, at the most adding women and “stirring” them into the existent mix, instead of meaningfully re-examining the underlying issues of gender and diversity dynamics. In this context, it is important to critically examine how the unequal socialization can lead to violence and become a driver of VE (Violent Extremism) by bringing in the feminist and intersectional perspectives into research design, data collection and analysis. A better understanding of the causes, manifestations, and mitigation practices of violent extremism is required, by critically examining the relationship between gender and extremism, investigating gender-specific factors for radicalization, such as community belonging, social connections, traumas or empowerment narratives. AMALTHEA will address the challenge of limited access to knowledge, collaboration and unified approaches against gender-related radicalisation via in-depth research and delivery of innovation in three complementary fields: (i) Knowledge creation, targeting LEAs, CSOs, social support professionals, teachers and other P/CVE practitioners; (ii) Knowledge modelling, management and sharing to improve understanding of the role of gender in VE/CVE; and (iii) Tailor-made tools for LEAs and CSOs that will enable engagement, collaboration, efficient policy making and optimised decision making towards de-radicalisation.
CryptoACTION represents Europe’s most ambitious attempt to date in equipping LEAs with mission-appropriate tools to support investigations pertaining to Cryptocurrency-Facilitated Crime and Terrorism (CFCT) activities (money laundering, darknet marketplaces) improve investigation operations including external collaboration workflows and provide comprehensive training curricula for LEAs/prosecutors/judiciary and the world’s first cryptorange. It will deliver an ecosystem of independent but interoperable lawful-investigation tools offering AI co-piloting capabilities to enhance investigator efficiency and supporting the intelligent corelation of blockchain data, structured data from anti-CFCT databases, text, audio and visual data modalities, stemming from lawful surveillance activities and darknet/deepnet/clearnet scraping. It will address technologies/mechanisms that hinder LEA investigations into CFCT, such as TOR, mixers, DEXs, Monero and other privacy coins, etc. both head on and laterally, taking advantage of weaknesses in design/implementation vulnerabilities or human errors on the side of criminals and lawful multi-modal intelligence gathering provided by the tools it will develop and/or enhance. Consortium LEAs will co-design and help validate the CryptoACTION LEA tools and support additional LEA engagement via organising collaborative capacity building workshops based on CryptoACTION training courses and tools. CryptoACTION will take a holistic view of the CFCT landscape and the anti-CFCT efforts, both at the beginning, to guide project efforts, and upon its conclusion, to provide recommendations for further actions, including potential recommendation for regulation and for moving away from cryptocurrency analysis tools giving black-box results to tools, such as those CryptoACTION will deliver, that offer explanations for their results (including any assumptions and uncertainties) and embrace the 7 EU principles of trustworthy AI.
LEAs use the data in their information systems as their basis for making decisions that affect the safety of European citizens. According to a recent report of the European Court of Auditors on the EU Information Systems use, it has been found out that individual countries have different perception and methodologies on how data management should be addressed; officers from LEAs have stated that not all datasets are included in their systems, while other data is either not complete and accurate or not entered in a timely manner. The same report states that there are regulatory and “cultural” issues, according to which some countries do not make all the functions offered in the central EU systems available through their national systems. TENACITy envisions to address these challenges by proposing a 3-pillar approach: (a) Modern and effective tools for exploitation of travel intelligence data by security authorities: TENACITy proposes an interoperable open architecture for the integration and analysis of multiple transactional, historical and behavioural data from a variety of sources, by exploiting game changing digital technologies; (b) Training and sensitisation of LEAs’ personnel: TENACITy envisions the design of a “living lab” to be established to organise hackathons, workshops for all relevant stakeholders who would benefit from the use of passenger data and digital technologies proposed; (c) Holistic approach to crime prevention: TENACITy vision is to implement and demonstrate a Travel Intelligence Governance Framework that will incorporate a holistic approach to crime prevention, will ensure that the proposed digital technologies will support the identification of the modus operandi of criminal and terrorism organizations and will include policy makers in the governance process, examining how the new tools will provide new capabilities to shape the regulations.
Technology advancements enhance everyday life, but they also provide numerous opportunities for the proliferation of advanced cybercrimes, which, via innovative tactics and techniques, pose serious security and financial risks to EU and beyond. ENSEMBLE aims to provide a well-rounded response to the fight against (cross-border) cybercriminal activities, at the nexus of advanced AI-based technological solutions, (multi-stakeholder) investigations processes, training, and awareness in order to detect and prevent cybercrime-related activities, with particular focus on ransomware, cyber fraud, data theft and extortion as well as unauthorised access and crypto-jackings. This will be achieved via a three-pillar approach. ENSEMBLE will develop a modular AI-based, forensically sound investigation toolbox based on user centric criteria, to assist Police Authorities in detecting, extracting, processing, and analysing online information relevant to cybercrime activities, thus fighting sophisticated cyber-threats, capitalising also in joint multi-stakeholder operations both at national and cross border level and in secure data and information sharing mechanisms. Police Authorities, prosecutors, and judicial actors involved in such investigations will be offered innovative training curricula and methods as well as synchronous and/or asynchronous learning methodologies that will be aligned to their needs and improve their current capacity, taking into consideration the technological, procedural, operational, legal/multi-jurisdictional dimensions. Finally, public awareness and engagement with relevant actors for early identification and prevention of cybercrimes will be cultivated through targeted awareness raising campaigns and specific policy recommendations. Having brough together a multidisciplinary team of five LEAs, seven research/academic institutions and six industry partners (including five SMEs) with a wide range of expertise in the field, ENSEMBLE provides a compelling
IAMI aims to revolutionize entity identification and resolution in security, intelligence, and investigation contexts. It addresses the challenges and limitations faced by current identification techniques and offers a visionary solution through advanced AI-powered software. The project's long-term vision is to propel EU LEAs and security/intelligence organizations into a new era of intelligence, investigation, and forensic capabilities. IAMI's core innovation is the development of an AI-powered software system that can seamlessly integrate with existing case management systems and analytic tools. At the heart of IAMI is the concept of the 'Identity-Attributes-Matrix (IAM)', a 3D construct that encompasses a broad spectrum of multi-modal identity-related attributes, including biometric data, non-biometric identity-related data, and analytic results. These attributes are used to facilitate large-scale entity identification/resolution, including a broader range of entity types, simultaneous and rapid multi-entity identification/resolution, systematic and continuous analysis of flux of probe attributes, confidence in noisy/corrupted probe data, reduced false positive rates, access to contact attributes, and the ability to classify fake identities and bots/avatars. Furthermore, IAMI sets the groundwork for effective collaboration and data sharing across European agencies, including international organizations like EUROPOL and INTERPOL through the establishment of a new EU-Wide IAMI enrolled data collection repository for terrorist threat assessment and awareness which enriches their capabilities and assets. The realization of IAMI's vision will be achieved through the demonstration of the developed IAMI solution. It will be communicated and disseminated among EU LEAs and security/intelligence agencies through project activities, including deliverables, training curricula, workshops, and pilots. IAMI represents a significant step forward in EU fight against terrorism.