Call: Online identity theft is countered
Logo | ![]() | ||||||||
Programme | |||||||||
Acronym | HE-CL3-FCT | ||||||||
Type of Fund | Direct Management | ||||||||
Description of programme "Horizon Europe - Cluster 3 - Destination 1: Better protect the EU and its citizens against Crime and Terrorism" | One of the main purposes of this Destination is to contribute significantly to the implementation of the Security Union Strategy [[COM(2020) 605 final.]], i.e. to include Research and Innovation as one of the key building blocks enabling the achievement of the overall policy objectives. As such, the topics in this Destination aim at fully addressing all the key issues underlined in the Strategy. In addition, this Destination touches upon the Counter-Terrorism Agenda [[COM(2020) 795 final.]] as well as the security dimension of the New Pact on Migration and Asylum [[COM(2020) 609 final.]], notably the issues related to criminal networks. More specifically, this Destination includes research topics aiming at fighting crime and terrorism more effectively, particularly through better prevention of crime and enhanced investigation capabilities concerning both traditional crime and cybercrime, as well as at better protection of citizens from violent attacks in public spaces, through more effective prevention, preparedness and response while preserving the open nature of such spaces. This Destination will develop the knowledge and technologies to be taken up by the Internal Security Fund, as a complementary instrument that will enable exploitation of research results and final delivery of the required tools to security practitioners. The goal of this Destination is to bring improved prevention, investigation and mitigation of impacts of crime, including of new/emerging criminal modi operandi (such as those exploiting digitisation and other technologies). Such an approach needs to be based on a deeper knowledge of human and social aspects of relevant societal challenges, such as child sexual exploitation, violent radicalisation, trafficking of human beings, disinformation and fake news, corruption and cyber criminality, including support to victims. Research can further help to transpose such knowledge into the operational activities of Police Authorities [[In the context of this Destination, ‘Police Authorities’ means public authorities explicitly designated by national law, or other entities legally mandated by the competent national authority, for the prevention, detection and/or investigation of terrorist offences or other criminal offences, specifically excluding police academies, forensic institutes, training facilities as well as border and customs authorities.]], as well as civil society organisations. Research and innovation will support Police Authorities and, when applicable, other relevant end-users in better tackling crime, including cybercrime, and terrorism as well as different forms of serious and organised crime (such as smuggling, money laundering, identity theft, counterfeiting of products, trafficking of illicit drugs and of falsified/substandard medicines, environmental crime or illicit trafficking of cultural goods) by developing new technologies, tools and systems (including digital tools, e.g. artificial intelligence, interoperability solutions, etc.). This support refers especially to capabilities to analyse in near-real-time large volumes of data to forestall criminal activities, or to combat disinformation and fake news with implications for security. In addition to improved knowledge, preparedness, prevention and response, projects within this Destination will deliver operational tools for enhanced criminal investigation capabilities for Police Authorities and, when applicable, other relevant end-users. Thus, this Destination covers a broad range of activities from forensics, big data management to the investigation of cybercriminal activities, improved cross-border cooperation and exchange of evidence. With regards to CBRN-E (chemical, biological, radiological, nuclear and explosives) threats, research and innovation within this Destination allows, among others, to generate knowledge for counter-terrorism on the continuously evolving methods related to dangerous chemicals, contaminants and unknown substances, and the development of technologies to counter and respond to related incidents. Furthermore, this Destination aims at improved security of public spaces and public safety, while at the same time preserving the open nature of urban public spaces. All measures to be explored by research and innovation in this area should ensure that citizens can continue their daily lives without major intrusions. To achieve higher security for public space, research in this Destination will identify concepts for prevention, preparedness and response of urban actors (city authorities, Police Authorities, public/private service providers, first responders and citizens) in response to threats of terrorist attacks in public spaces. Innovations can be used to design/improve public spaces to be more secure, also with the help of advanced vulnerability assessments. They can increase the capacity to protect spaces against attacks with manned or unmanned vehicles and can help to detect firearms and other weapons, as well as CBRN-E materials being brought into public spaces. In case attacks cannot be prevented, enhanced effectiveness of mitigation measures including through strategies to reduce vulnerability and strengthening the resilience of possible targets have the potential to reduce the potential impacts of such attacks. Advanced data analysis in real time can critically reduce the time-to-react for first responders. This Destination will also promote, whenever appropriate and applicable, the proposals with:
The Destination will also create opportunities for collaboration on research and innovation among different communities of practitioners operating in the area of fighting crime and terrorism, such as Police Authorities, border and coast guard authorities, and customs authorities. International cooperation is also encouraged where appropriate and relevant. Expected impacts: Proposals for topics under this Destination should set out a credible pathway to contributing to the following expected impact of the Horizon Europe Strategic Plan 2021-2024: “Crime and terrorism are more effectively tackled, while respecting fundamental rights, […] thanks to more powerful prevention, preparedness and response, a better understanding of related human, societal and technological aspects, and the development of cutting-edge capabilities for police authorities […] including measures against cybercrime.” More specifically, proposals should contribute to the achievement of one or more of the following impacts:
Furthermore, in order to accomplish the objectives of this Destination, additional eligibility conditions have been defined. They refer to the active involvement of relevant security practitioners or end-users. Proposals involving earth observation are encouraged to primarily make use of Copernicus data, services and technologies. Projects funded under this Destination are invited to closely cooperate with other EC-chaired or funded initiatives in the relevant domains, such as the Networks of Practitioners projects funded under H2020 Secure Societies work programmes, the Knowledge Networks for Security Research & Innovation funded under the Horizon Europe Cluster 3 Work Programme (”Strengthened Security Research and Innovation” Destination), or the Community of Users for Secure, Safe and Resilient Societies (future CERIS –Community of European Research and Innovation for Security). | ||||||||
Link | Link to Programme | ||||||||
Call | Online identity
theft is countered | ||||||||
Description of call "Online identity theft is countered" |
Expected Outcome: Projects’ results are expected to contribute to some or all of the following outcomes:
Scope: The “classical” form of identity theft has been a big business for years and consists in personal and financial data stolen online, sold in the underground economy and misused by criminal organisations all over the world, usually for financial gain. With the technological evolution, identity theft evolves as well. Personal details can be found by hacking computers, but identity thieves are increasingly getting citizens’ personal information from social media sites. Furthermore, an on-going improvement of technologies to create deepfake audio and video material may result in novel forms of identity theft. This relatively new but rapidly evolving technology superimposes audio, images or videos over another video or creates new ones. For instance, it can be used, among others, to generate new "personalised" child abuse material, to create fake social media accounts in the name of the target person (to harness or stalk them), to place the faces of celebrities on existing pornographic videos, to spread misinformation about a company (leading to financial losses) or a politician or an expert (reputational damage). Research is needed to develop new technological means of detecting deepfakes in support of the work of Police Authorities, as it may only be a matter of time before deepfakes are used more often in online identity theft cases. In addition, this can have serious implications for Police Authorities, since it might complicate investigations and raise questions about the authenticity of evidence. The issue of collecting (cross-border) evidence for its use in courts of law, i.e. in a lawful manner and respecting fundamental rights such as privacy and protection of personal data, should be tackled in proposed activities as well. Other evolving modus operandi and new trends in online identity thefts should be analysed too, and corresponding innovative lawful societal means of preventing as well as innovative lawful technological means of detecting and investigating them should be developed. Thus, activities proposed within this topic should address both the technological and societal dimensions of online identity theft in a balanced way. An analysis of trends (who the victims of identity thefts are usually, whether gender/age/ICT skills play a role, etc.) would be an asset. Special care should be given to ethics and fundamental rights protection throughout the research and the solutions proposed. This topic requires the effective contribution of SSH disciplines and the involvement of SSH experts, institutions as well as the inclusion of relevant SSH expertise, in order to produce meaningful and significant effects enhancing the societal impact of the related research activities. With the aim of developing effective awareness raising campaigns, involvement of relevant Civil Society Organisations, sociologists and psychologists who can shed a light on the phenomenon of identity theft from the side of victims and how to support them, would be an added value of proposals submitted under this topic. If applicable and relevant, coordination with related activities in the Digital Europe Programme should be envisaged too. | ||||||||
Link | Link to Call | ||||||||
Thematic Focus | Research & Innovation, Technology Transfer & Exchange, Capacity Building, Cooperation Networks, Institutional Cooperation, Clustering, Development Cooperation, Economic Cooperation, Digitisation, ICT, Telecommunication, Administration & Governance, Health, Social Affairs, Sports, Equal Rights, Human Rights, People with Disabilities, Social Inclusion, Justice, Safety & Security | ||||||||
Funding area | EU Member States Overseas Countries and Territories (OCTs) |
||||||||
Origin of Applicant | EU Member States Overseas Countries and Territories (OCTs) | ||||||||
Eligible applicants | Research Institution, International Organization, Small and Medium Sized Enterprises, SMEs (between 10 and 249 employees), Microenterprises (fewer than 10 employees), NGO / NPO, Public Services, Other, Start Up Company, University, Enterprise (more than 250 employees or not defined), Education and Training Centres, Lobby Group / Professional Association / Trade Union, Association, Federal State / Region / City / Municipality / Local Authority, National Government | ||||||||
Applicant details | eligible non-EU countries:
At the date of the publication
of the work programme, there are no countries associated to Horizon Europe. Considering the Union’s interest to retain, in
principle, relations with the countries associated to Horizon 2020, most third countries associated to Horizon 2020 are expected
to be associated to Horizon Europe with an intention to secure uninterrupted continuity between Horizon 2020 and Horizon Europe.
In addition, other third countries can also become associated to Horizon Europe during the programme. For the purposes of
the eligibility conditions, applicants established in Horizon 2020 Associated Countries or in other third countries negotiating
association to Horizon Europe will be treated as entities established in an Associated Country, if the Horizon Europe association
agreement with the third country concerned applies at the time of signature of the grant agreement.
Legal entities which are established in countries not listed above will be eligible for funding if provided for in the specific call conditions, or if their participation is considered essential for implementing the action by the granting authority. Specific cases:
|
||||||||
Project Partner | Yes | ||||||||
Project Partner Details | Unless otherwise provided for in the specific call conditions , legal entities forming a consortium are eligible to participate in actions provided that the consortium includes:
| ||||||||
Further info | Proposal page limits and layout: The application form will have two parts:
Page limit - Part B: 45 pages | ||||||||
Type of Funding | Grants | ||||||||
Financial details |
This topic requires the active involvement, as beneficiaries, of at least 3 Police Authorities from at least 3 different EU Member States or Associated countries. For these participants, applicants must fill in the table “Eligibility information about practitioners” in the application form with all the requested information, following the template provided in the submission IT tool. Some activities, resulting from this topic, may involve using classified background and/or producing of security sensitive results (EUCI and SEN). Please refer to the related provisions in section B Security — EU classified and sensitive information of the General Annexes. Activities are expected to achieve TRL 5-6 by the end of the project. To ensure a balanced portfolio, grants will be awarded to applications not only in order of ranking but at least also to those that are the highest ranked within set topics, provided that the applications attain all thresholds. | ||||||||
Submission | Proposals must be submitted electronically via the Funding & Tenders Portal Electronic Submission System. Paper submissions are NOTpossible. |
Register now and benefit:
Personalised newsletter
Register now and benefit:
Save calls in your personal funding basket
Register now and benefit:
Export calls as pdf
Contact us at office@euro-access.eu to
Share your success story on EU project funding with the help of EuroAccess!
News
Published on 20.06.2022
Adaptation of the TEN-T to civilian-defence dual use - studies
Connecting Europe Facility for Transport
Link to CallPublished on 20.06.2022
Electricity, Gas, Smart Grids and CO₂ networks - Studies
Connecting Europe Facility for Energy
Link to Call