H2020-FCT-2015 Fight against crime and terrorism

Participant Portal
Publication Date: 
Wednesday, 25 March 2015
Thursday, 27 August 2015
Overview and objectives: 

The ambition of this call is both to avoid an incident and to mitigate its potential consequences. This requires new technologies and capabilities for fighting and preventing crime (including cyber-crime), illegal trafficking and terrorism (including cyber-terrorism), including understanding and tackling terrorist ideas and beliefs to also avoid aviation related threats.



  • FCT-01-2015: Forensics topic 1: Tools and infrastructure for the extraction, fusion, exchange and analysis of big data including cyber-offenses generated data for forensic investigation. The availability of petabytes of on-line and off-line information being open to the public owned by the Law Enforcement Agencies (LEA), such as police forces and/or custom authorities or the result of the investigation of a (cyber-) offence, represents a valuable resource but also a management challenge. Access to huge amounts of data, structured (data-bases), unstructured (multilingual text, multimedia), semi-structured (HTML, XML, etc.), heterogeneous data collected by LEA sensors such as Video, Audio, GSM and GPS, all possibly obfuscated or anonymized, available locally or over private LEA owned/shared networks or over the Internet, can easily result in an information overload and represent a problem instead of a useful asset. Proposals under this topic should aim to provide solutions at and beyond the state-of-the-art in the areas of intelligent use and management of complex and large amount of data for the discovery of correlated evidences to support forensic investigation on one hand and for the operational and situational awareness of law enforcement agencies on the other. The problem of extracting, integrating, exchanging ,analysing and exploiting large complex, structured and unstructured (Natural Language Text, SMS, multimedia) heterogeneous data, as well as that of exploiting unstructured data (Natural Language Text, SMS) and adding intelligence (trends analysis, scenarios, etc.), has to be solved by means of at and beyond state-of-the-art technologies in the areas of Big Data, Data Analytics, Multimedia Analysis, Data Modelling, Data mining, Visualization, Intelligent User's Interfaces, Information Retrieval, Automatic Language Translation, Weak Signal Analysis, Ontologies, High Level Fusion Techniques for Context Awareness and Knowledge Representation. Digital intelligence capabilities should also enable smart pre-processing and filtering of sensor data and stored data in order to improve their reliability, accuracy, accessibility and transmission volume.
    Type of action: Research & Innovation Actions
  • FCT-02-2015: Forensic topic 2: Advanced easy to use in-situ forensic tools at the scene of crime. Proposals for this topic should focus on the development methodologies of tools and EU-wide standards for the secure storage, smart visualisation, access and the rapid exchange of forensic data supporting evidence. A multianalytical platform integrating different techniques should be proposed in order to achieve better strategies for gathering and analyzing evidence in the field of forensic research. Relying on knowledge-based fields such as artificial intelligence, machine learning, different procedures, tools and algorithm should be developed within this platform, based on the standard outlined above.
    Type of action: Innovation Actions
  • FCT-03-2015: Forensics topic 3: Mobile, remotely controlled technologies to examine a crime scene in case of an accident or a terrorist attack involving CBRNE materials. The proposal should focus on the “mobile, remotely controlled” characteristics of the technologies to be developed to enable the assessment of hazardous scenes where the deployment of personnel is difficult as a result of an accident or terrorist attack. This should include technologies to enable the verification of CBRNE materials through the identification / detection (including visual recognition) of the type of substance and the collection of forensic material / evidence. The output should be operational in a variety of weather and terrain conditions, and demonstrate that they are cost effective. Proposals should link with existing projects. Tools/technologies should have a minimal disruptive effect on the crime scene.
    Type of action: Research & Innovation Actions
  • FCT-04-2015: Forensics topic 4: Internet Forensics to combat organized crime. Proposals should focus on how to extract, compare, correlate, filter, reason over and/or interpret suspect information, data, communications stored and/or transferred on the Internet including on the deepweb, darknet and other less easily accessible parts of networks, obtained under a lawful warrant, in order to discover facts and evidence to support forensic investigations (including e.g. resolving identities in social networks, authorship identification on webfora, shared media, etc.). Software and, if necessary, hardware tools, methods and guidelines should be proposed. They should tackle all the layers of analysis, from the data-packet level to the data mining, to language interpretation, semantic analysis, and information retrieval, including the multi-lingual aspects, and video and picture analysis. Investigative techniques on any kind of crime using the Internet to some extent (to communicate, transfer data, etc.) should be concerned. The proposed solutions should enable accelerated searches of the huge amount of data-transfer that occurs on the Internet, and to discover and make clear (interpret) out of it the relevant data and information. At the same time, limited, or at least controlled, pervasiveness of the proposed solutions must be guaranteed, in order guarantee the privacy of all the internet users. Ethical issues have to be clearly addressed. Appropriate solutions to fulfil the legitimate request of privacy by the citizens should be embedded in the very core of the proposed solutions. Also, all the developed tools, methods and guidelines should be supported by training support and curricula.
    Type of action: Innovation Actions

Law enforcement capabilities

  • FCT-06-2015: Law Enforcement capabilities 2: Detection and analysis of terrorist-related content on the Internet. Proposals should focus on the accurate identification of terrorist online communities (even hiding their real identity), accurate and fast categorization of malicious content published by terrorists and their supporters in multiple languages, large-scale temporal analysis of terrorism trends, and real-time summarization of multilingual and multimedial information published by terrorists, including content filtering for mis- and disinformation and framing. In addition, linking pseudonyms and finding the original author should be part of the research. The developed methodologies should be able to handle massive amounts of multilingual and multimedial web content in minimal time. The scope of the proposed tool should involve law enforcement bodies from the design phase to the prototyping and test phase. The proposals should address the management of personal data, and related ethical and legal issues.
    Type of action: Innovation Actions
  • FCT-09-2015: Law Enfocement capabilities topic 5: Identity Management. Technological, organizational and societal means necessary for a European electronic identity ecosystem will be identified, researched and tested: New security features with corresponding quality control and checking technologies. Enhanced document lifecycle processes. Harmonized document processes and security features. Technologies for linking physical and virtual identity. Combination of biometric technologies and administrative processes for identification management. Identification of the necessary legal and societal steps to safeguard trust and data protection. Identify patterns in identity fraud and highlight associated social networksn. Take into account and build upon results and findings of existing research projects that potentially may contribute to an European electronic identity ecosystem. A European e-identity ecosystem (potentially tested on a national test-bed level) would create a decisive competitive advantage for Europe on the global level. New technologies and processes in identity management will ease the work of border management and law enforcement authorities as the identity verification becomes more reliable. The personal security increases dues to reduced risk of identity fraud and cyber mobbing. Finally, improved id documents will make people trafficking and organized crime more difficult. A European e-identity ecosystem should make use of existing research results in this field to the highest possible extent to optimise funding impact.
    Type of action: Research & Innovation Actions

Ethical/societal dimension

  • FCT-15-2015: Ethical/Societal Dimension Topic 3: Better understanding the role of new social media networks and their use for public security purposes. The internet has become a central part of modem life. Omnipresent social media, especially media sharing platforms, chat sites, web forums, blogs radically change the way current societies operate. That is why these instruments attract more and more attention from public security planners. This topic shall look at the role and purpose of social media and the relationship between the new social networks and public security. Research to be coordinated by this activity may focus on analysing the following issues: To what extent are social media likely to influence public security planning? Shall the adoption of social media across the public security community be treated as a threat or a tool for public security purposes? Shall the potential of social networking tools be explored by public security agencies for example in order to predict future trends or identify possible threats? To which extent, in the age of the connected society, are social media used in the eve of urban violence and riots? How can the understanding of the different social media influence on the populations lead to the shaping of new forms of policing in the public space? What are the ethical and legal implications, for instance with reference to the respect for fundamental rights, of public agencies using social media information for security planning purposes?
    Type of action: Coordination and Support Actions
  • FCT-16-2015: Ethical/Societal Dimension Topic 4 - Investigating the role of social, psychological and economic aspects of the processes that lead to organized crime (including cyber related offenses), and terrorist networks and their impact on social cohesion. Investigating the role of social, psychological and economic aspects of the processes that lead to organized crime (including cyber related offenses), and terrorist networks and their impact on social cohesion Research should investigate the role of social, psychological and economic factors in progression of individuals who had unremarkable and ordinary lives into organised crime and terrorist networks. It could also take into consideration the analysis of the institutional environment in which these processes take place, as well as the possibilities of connection between the emergence of these damaging organizations and the problem of trust in social dynamics.
    Type of action: Research & Innovation Actions
Budget available: 
€42 160 000.00
Developed programme: 

Horizon 2020: Societal Challenges

Horizon 2020 reflects the policy priorities of the Europe 2020 strategy and addresses major concerns shared by citizens in Europe and elsewhere.A challenge-based approach will bring together resources and knowledge across different fields, technologies and disciplines, including social sciences and the humanities. This will cover activities from research to market with a new focus on innovation-related activities, such as piloting, demonstration, test-beds, and support for public procurement and market uptake.

Plataforma tecnológica cofinanciada por: