TOPIC : Information and data stream management to fight against (cyber)crime and terrorism
|Publication date:||27 October 2017|
|Focus area:||Boosting the effectiveness of the Security Union (SU)|
|Types of action:||IA Innovation action|
|DeadlineModel: Planned opening date:||single-stage 14 March 2019||Deadline:||22 August 2019 17:00:00|
|Types of action:||IA Innovation action|
|DeadlineModel: Planned opening date:||single-stage 15 March 2018||Deadline:||23 August 2018 17:00:00|
|Time Zone : (Brussels time)|
Topic DescriptionSpecific Challenge:
Large amounts of data and information from a variety of origins have become available to practitioners involved in fighting crime and terrorism. Full advantage is not currently taken of the most advanced techniques for Big Data analysis, and artificial intelligence.Scope:
The amount of data generated and gathered in the frame of (cyber)crime investigations increases exponentially, thereby creating a considerable challenge for law enforcement. The effectiveness of law enforcement action depends on capabilities to improve the quality of data, and to convert voluminous and heterogeneous data sets (images, videos, geospatial intelligence, communication data, traffic data, financial transactions related date, etc.) into actionable intelligence. These capabilities could be significantly enhanced by the use of domain-specific tools, i.e. Big Data analysis applications designed for the needs of crime investigators (pre-processing, processing and analysis, visualisation, etc.). Furthermore, predictive analytics would greatly benefit from open source intelligence gathering, social network and darknet data analysis, and allow for resource-efficient, effective and proactive law enforcement.
Examples of trends in cybercrime are numerous. The Internet of Things can potentially connect practically everything, thus also potentially making everything more vulnerable. Wearable devices make us traceable, 3D printers can produce weapons, autonomous cars provide opportunities for kidnappers, teleworking opens doors for cyber-espionage etc. Cybercriminals follow the technological development and benefit from it, while measures for countering cybercrime are often one step behind. Law Enforcement Agencies would benefit from new means of preventing and countering new kinds of crime, building on the comprehensive trend analysis of emerging cybercrime activities based on past of (cyber)criminal activities, on technological developments, and on trends in the society.
Criminal and terrorist acts are usually subsequent to patterns of abnormal behaviour. Behavioural/anomaly detection systems (using a large variety of sensors) and methodologies require the analysis and processing of enormous quantities of data, together with improved imaging techniques to allow for the identification of suspicious events or of criminals. Such systems should operate in near real-time and at similar distances as a surveillance camera. They should also comply with privacy requirements and the respect of fundamental rights such as the right to privacy and the right to protection of personal data.
Proposals are invited from consortia involving relevant security practitioners, civil society organisations, and the appropriate balance of IT specialists, psychologists, sociologists, linguists, etc. exploiting Big Data and predictive analytics that both (a) characterise trends in cybercrime and in cybercriminal organizations (based on a profound analysis of current and emerging cybercriminal organizational types and structures), and (b) enhance citizens' security against terrorist attacks in places considered as soft targets, including crowded areas (stations, shopping malls, entertainment venues, etc.).
Proposals should lead to solutions developed in compliance with European societal values, fundamental rights and applicable legislation including in the area of privacy and protection of personal data. Societal aspects (e.g. perception of security, possible side effects of technological solutions, societal resilience) have to be addressed in a comprehensive and thorough manner.
The centre of gravity for technology development with actions funded under this topic is expected to be up to TRL 5 to 7 – see General Annex G of the Horizon 2020 Work Programme.
The Commission considers that proposals requesting a contribution from the EU of about EUR 8 million would allow this specific challenge to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.Expected Impact:
- improved support for the work of Law Enforcement Agencies in managing Big Data, i.e. in extracting, combining, analysing and visualising large amounts of structured and unstructured data in the context of criminal investigations;
- increased awareness regarding the state of the art and trends in cybercriminal activities (short-, mid- and long-term);
- in-depth knowledge of means of preventing and countering emerging and future cybercriminal activities;
- improved capabilities to combine and analyse in near-real-time large volumes of heterogeneous data to anticipate criminal events;
- shorter delays between the emergence of new cybercrime activities and the deployment of countermeasures.
- a European, common strategic approach for preventing and countering an emerging cybercrime activity in its early stage of development;
- a European, common strategic approach for processing and combining huge amounts of data in the context of crowd protection in full compliance with applicable legislation on protection of personal data.
It is expected that this topic will continue in 2020.Cross-cutting Priorities:
Topic conditions and documents
1. Eligible countries: described in Annex A of the Work Programme.
A number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon 2020 projects. See the information in the Online Manual.
This topic requires the active involvement of at least 3 Law Enforcement Agencies (LEAs) from at least 3 different EU or Associated countries.
The duration of the proposed activities must not exceed 24 months.
Proposal page limits and layout: please refer to Part B of the proposal template in the submission system below.
- Evaluation criteria, scoring and thresholds are described in Annex H of the Work Programme.
- Submission and evaluation processes are described in the Online Manual.
4. Indicative time for evaluation and grant agreements:
Information on the outcome of evaluation (single-stage call): maximum 5 months from the deadline for submission.
Signature of grant agreements: maximum 8 months from the deadline for submission.
5. Proposal templates, evaluation forms and model grant agreements (MGA):
6. Additional provisions:
For grants awarded under this Security call for Coordination and Support Actions, Pre-Commercial Procurement Actions, Innovation Actions and/or Research and Innovation Actions, the Commission or Agency may object to a transfer of ownership or the exclusive licensing of results to a third party established in a third country not associated to Horizon 2020. The respective option of Article 30.3 of the Model Grant Agreement will be applied.
8. Additional documents:
7. Open access must be granted to all scientific publications resulting from Horizon 2020 actions.
Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.
Open access to research data
The Open Research Data Pilot has been extended to cover all Horizon 2020 topics for which the submission is opened on 26 July 2016 or later. Projects funded under this topic will therefore by default provide open access to the research data they generate, except if they decide to opt-out under the conditions described in Annex L of the Work Programme. Projects can opt-out at any stage, that is both before and after the grant signature.
Note that the evaluation phase proposals will not be evaluated more favourably because they plan to open or share their data, and will not be penalised for opting out.
Open research data sharing applies to the data needed to validate the results presented in scientific publications. Additionally, projects can choose to make other data available open access and need to describe their approach in a Data Management Plan.
Projects need to create a Data Management Plan (DMP), except if they opt-out of making their research data open access. A first version of the DMP must be provided as an early deliverable within six months of the project and should be updated during the project as appropriate. The Commission already provides guidance documents, including a template for DMPs. See the Online Manual.
Eligibility of costs: costs related to data management and data sharing are eligible for reimbursement during the project duration.
The legal requirements for projects participating in this pilot are in the article 29.3 of the Model Grant Agreement.
LEARs, Account Administrators or self-registrants can publish partner requests for open and forthcoming topics after logging into the Participant Portal.
To access the Electronic Submission Service of the topic, please select the type of action that is most relevant to your proposal from the list below and click on the 'Start Submission' button. You will then be asked to confirm your choice of the type of action and topic, as these cannot be changed in the submission system. Upon confirmation you will be linked to the correct entry point.
To access existing draft proposals for this topic, please login to the Participant Portal and select the My Proposals page of the My Area section.
|Type of Action||Innovation action [IA]|
|Topic||Information and data stream management to fight against (cyber)crime and terrorism - SU-FCT03-2018-2019-2020|
|Guidance on proposal submission:||H2020 online manual|
H2020 Online Manual is your guide on the procedures from proposal submission to managing your grant.
Participant Portal FAQ – Submission of proposals.
National Contact Points (NCP) - contact your NCP for further assistance in your national language(s).
Research Enquiry Service – ask questions about any aspect of European research in general and the EU Research Framework Programmes in particular.
Enterprise Europe Network – contact your EEN national contact for advice to businesses with special focus on SMEs. The support includes guidance on the EU research funding.
IT Helpdesk - contact the Participant Portal IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc.
European IPR Helpdesk assists you on intellectual property issues
CEN and CENELEC, the European Standards Organisations, advise you how to tackle standardisation in your project proposal. Contact CEN-CENELEC Research Helpdesk at email@example.com
Partner Search Services help you find a partner organisation for your proposal.