Innovating Works
FCT-06-2015
FCT-06-2015: Law Enforcement capabilities 2: Detection and analysis of terrorist-related content on the Internet
Scope:Specific challenge:
Sólo fondo perdido 0 €
Europeo
Esta convocatoria está cerrada Esta línea ya está cerrada por lo que no puedes aplicar. Cerró el pasado día 27-08-2015.
Se espera una próxima convocatoria para esta ayuda, aún no está clara la fecha exacta de inicio de convocatoria.
Por suerte, hemos conseguido la lista de proyectos financiados!
Presentación: Consorcio Consorcio: Esta ayuda está diseñada para aplicar a ella en formato consorcio.
Número mínimo de participantes.
Esta ayuda financia Proyectos: Objetivo del proyecto:

Scope:Specific challenge:

Due to the ease of publishing information on the Internet (Web site, blogs, social networks, newsgroups, forums, etc.), terrorists increasingly exploit the Internet as a communication, intelligence, training, recruitment and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters or recruits into their networks. In order to cope with the dangers involved in the use of Internet by global terrorist organizations and grassroots terrorist cells, more efficient and effective automated techniques are required. Despite the often explicit (or at least not disguised) content of these web-sites, especially when used for propaganda, the huge amount of somehow related, yet not illegal, sites, represents a major obstacle to the reliable and fast analysis of their contents. Research should therefore develop and apply new and/or improved data and text and multimedia mining methods to detect, categorize, analyse, reason over, and summarize terrorist-generated content group information from several sources that supports same history, and isolate potential sources describing di... ver más

Scope:Specific challenge:

Due to the ease of publishing information on the Internet (Web site, blogs, social networks, newsgroups, forums, etc.), terrorists increasingly exploit the Internet as a communication, intelligence, training, recruitment and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters or recruits into their networks. In order to cope with the dangers involved in the use of Internet by global terrorist organizations and grassroots terrorist cells, more efficient and effective automated techniques are required. Despite the often explicit (or at least not disguised) content of these web-sites, especially when used for propaganda, the huge amount of somehow related, yet not illegal, sites, represents a major obstacle to the reliable and fast analysis of their contents. Research should therefore develop and apply new and/or improved data and text and multimedia mining methods to detect, categorize, analyse, reason over, and summarize terrorist-generated content group information from several sources that supports same history, and isolate potential sources describing different ideas, that could be intended to generate “disinformation” or fake evidences to distract LEA from real scenarios. Aside this, modes of finding sources of data, capturing and preserving data for forensic analysis, authenticating images and linking videos and conversely proving multimedia data falsification, should be investigated.

Scope:

Proposals should focus on the accurate identification of terrorist online communities (even hiding their real identity), accurate and fast categorization of malicious content published by terrorists and their supporters in multiple languages, large-scale temporal analysis of terrorism trends, and real-time summarization of multilingual and multimedial information published by terrorists, including content filtering for mis- and disinformation and framing. In addition, linking pseudonyms and finding the original author should be part of the research. The developed methodologies should be able to handle massive amounts of multilingual and multimedial web content in minimal time. The scope of the proposed tool should involve law enforcement bodies from the design phase to the prototyping and test phase.

The proposals should address the management of personal data, and related ethical and legal issues. Therefore considerable attention will have to be given to privacy and data protection, and to the adherence to European regulations. For each proposed solution, potential issues vis-à-vis these rights and regulations will have to be analysed, and recommendations on the best solutions to these issues must be proposed.

The development of a base line system for current and future end users should also be envisaged and the solution should follow Open Source concepts.

The Commission considers that proposals requesting a contribution from the EU of between €3m and €5m would allow this specific challenge to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.

Expected impact:

Projects under this topic should lead to:

More effective prevention of terrorist activities planned and organized via the Internet through automated analysis of terrorist-generated content. Faster detection of grassroots terrorist cells from their online activitieş. Faster and more accurate detection and analysis of malicious content published by terrorists. Faster detection and analysis of terrorism trends. Reduction of the "information overload" on web intelligence experts due to automated summarization of the relevant content. Increased privacy and data protection. Contribution to a considerable improvement in the field of public security. For industry better understanding of modern operational Law Enforcement Agency requirements, thus increasing their competitiveness. The outcome of the proposal is expected to lead to development from Technology Readiness Levels (TRL) 6 or above; please see part G of the General Annexes.

Type of action: Innovation Actions


ver menos

Temáticas Obligatorias del proyecto: Temática principal: Risk reduction Security Protection Search and detection Information management Manage intelligence and surveillance actions

Características del consorcio

Ámbito Europeo : La ayuda es de ámbito europeo, puede aplicar a esta linea cualquier empresa que forme parte de la Comunidad Europea.
Tipo y tamaño de organizaciones: El diseño de consorcio necesario para la tramitación de esta ayuda necesita de:

Características del Proyecto

Requisitos de diseño: Duración:
Requisitos técnicos: Scope:Specific challenge: Scope:Specific challenge:
¿Quieres ejemplos? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Personnel costs.
Los costes de personal subvencionables cubren las horas de trabajo efectivo de las personas directamente dedicadas a la ejecución de la acción. Los propietarios de pequeñas y medianas empresas que no perciban salario y otras personas físicas que no perciban salario podrán imputar los costes de personal sobre la base de una escala de costes unitarios
Purchase costs.
Los otros costes directos se dividen en los siguientes apartados: Viajes, amortizaciones, equipamiento y otros bienes y servicios. Se financia la amortización de equipos, permitiendo incluir la amortización de equipos adquiridos antes del proyecto si se registra durante su ejecución. En el apartado de otros bienes y servicios se incluyen los diferentes bienes y servicios comprados por los beneficiarios a proveedores externos para poder llevar a cabo sus tareas
Subcontracting costs.
La subcontratación en ayudas europeas no debe tratarse del core de actividades de I+D del proyecto. El contratista debe ser seleccionado por el beneficiario de acuerdo con el principio de mejor relación calidad-precio bajo las condiciones de transparencia e igualdad (en ningún caso consistirá en solicitar menos de 3 ofertas). En el caso de entidades públicas, para la subcontratación se deberán de seguir las leyes que rijan en el país al que pertenezca el contratante
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 5:. Los elementos básicos de la innovación son integrados de manera que la configuración final es similar a su aplicación final, es decir que está listo para ser usado en la simulación de un entorno real. Se mejoran los modelos tanto técnicos como económicos del diseño inicial, se ha identificado adicionalmente aspectos de seguridad, limitaciones ambiéntales y/o regulatorios entre otros. + info.
TRL esperado:

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
0% 25% 50% 75% 100%
Please read carefully all provisions below before the preparation of your application.
The budget breakdown for this call is given in the call conditions section of the work programme.
List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
 
Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme
 
Evaluation
3.1  Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme
3.2 Guide to the submission and evaluation process
 
Proposal page limits and layout: Please refer to Part B of the standard proposal template.
 
Indicative timetable for evaluation and grant agreement:
Information on the outcome of one-stage evaluation: maximum 5 months from the final date for submission.
Signature of grant agreements: maximum 8 months from the final date for submission.
 
Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:
Innovation Action:
Specific provisions and funding rates
Standard proposal template (administrative forms and structure of technical annex)
Standard evaluation form
Annotated Model Grant Agreement
 
Additional provisions:
Horizon...
Please read carefully all provisions below before the preparation of your application.
The budget breakdown for this call is given in the call conditions section of the work programme.
List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
 
Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme
 
Evaluation
3.1  Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme
3.2 Guide to the submission and evaluation process
 
Proposal page limits and layout: Please refer to Part B of the standard proposal template.
 
Indicative timetable for evaluation and grant agreement:
Information on the outcome of one-stage evaluation: maximum 5 months from the final date for submission.
Signature of grant agreements: maximum 8 months from the final date for submission.
 
Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:
Innovation Action:
Specific provisions and funding rates
Standard proposal template (administrative forms and structure of technical annex)
Standard evaluation form
Annotated Model Grant Agreement
 
Additional provisions:
Horizon 2020 budget flexibility
Classified information
Technology readiness levels (TRL) – where a topic description refers to TRL, these definitions apply.
Financial support to Third Parties – where a topic description foresees financial support to Third Parties, these provisions apply.
 
Open access must be granted to all scientific publications resulting from Horizon 2020 actions, and proposals must refer to measures envisaged. Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.
 
Garantías:
No exige Garantías
No existen condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda tiene efecto incentivador, por lo que el proyecto no puede haberse iniciado antes de la presentación de la solicitud de ayuda. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
No conocemos el presupuesto total de la línea
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
H2020-FCT-2014-2015 Law Enforcement capabilities 2: Detection and analysis of terrorist-related content on the Internet Scope:Specific challenge: Due to the ease of publishing information on the Internet (Web site, blogs, social networks, newsgroups, forums,...
Sin info.
HORIZON-CL3-2024-FCT-01-07 CBRN-E detection capacities in small architecture
en consorcio: Expected Outcome:Projects’ results are expected to contribute to all of the following outcomes: Improved vulnerability assessments by law e...
Cerrada hace 6 meses | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2024-FCT-01-01 Mitigating new threats and adapting investigation strategies in the era of Internet of Things
en consorcio: Expected Outcome:Projects’ results are expected to contribute to all of the following outcomes: Increased understanding of Police Authoriti...
Cerrada hace 6 meses | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2024-FCT-01-05 Combating hate speech online and offline
en consorcio: Expected Outcome:Projects’ results are expected to contribute to all of the following outcomes: Providing Police Authorities and other rele...
Cerrada hace 6 meses | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2024-FCT-01-06 Open Topic
en consorcio: Expected Outcome:Projects’ results are expected to contribute to all of the following outcomes: Building Police Authorities’ capabilities t...
Cerrada hace 6 meses | Próxima convocatoria prevista para el mes de
HORIZON-CL3-2024-FCT-01-02 Open Topic
en consorcio: Expected Outcome:Projects’ results are expected to contribute to all of the following outcomes: Improved European common forensics investig...
Cerrada hace 6 meses | Próxima convocatoria prevista para el mes de