FCT and BM Projects Synergy Workshop – TENSOR, FLEXIcross, EITHOS, ODYSSEUS

    okay so thank you everyone again for for
    joining
    today um
    so thank you everyone for the
    collaborative work that we’ve done
    together in order to put this uh Synergy
    workshop together so today uh we are
    going to talk about the fight against
    Crime and terrorist uh and also the
    border of management uh Synergy work
    workshop that has been organized
    uh in the collaborative efforts for
    tenser uh flexi cross Athos and OD
    projects and all these projects have
    been funded by European commission so uh
    I would like to welcome today the
    European commission experts uh and uh
    project Partners stakeholders um for
    joining uh today’s meeting Workshop um
    so what are we going to discuss today is
    to explore the groundbreaking
    advancements in border security and
    crime prevention so in the activities of
    fct security research and Innovation uh
    they aim to support prevention detection
    Mitigation Of Crime and terrorist
    related incidents so the new
    technologies and capabilities are
    imperative in these Endeavors addressing
    various forms of organized crime cyber
    crime illegal trafficking terrorist and
    so on so similarly when it comes to uh
    the border
    management the objective for the
    research and innovation in this area
    related to The Border management
    including border control risk analysis
    and Inter agency cooperations so
    projects funded under this cluster are
    dedicated to developing technology to
    improve border surveillance enhance
    travel documentation document security
    and detection of risk at the border
    while facilitating the movement of
    legitimate passengers
    so through this Workshop we will delve
    into the technical progress made by our
    projects with a particular focus on AI
    and biometric features we will also
    discuss our um exploitation
    activities um ethics and policy actions
    and then uh next step in this crucial
    areas so with um our collaborative work
    and exchange insights today
    uh I want to bring to your attention the
    important of these collaborative efforts
    in enhancing security and safety for all
    so together we have this opportunity to
    um have an A profound impact in crime
    prevention and Border management
    ensuring a safer and more secure future
    for Europe and Beyond so thank you all
    again for your participation today I
    would like now if um jeppe and um can
    help me with the greetings overall also
    for the uh our commission uh European
    commission officers that are attending
    today uh I think that I not many words
    just to say thank you
    to to to the commission to be to be
    present uh and to have accepted this
    invitation as I said also in the
    invitation that I made to them even
    discussed a few weeks ago but then we
    refreshed the the invitation also with
    some details last week uh it’s it’s a
    strange Synergy Workshop in the sense
    that we have projects of different
    topics and I think this this is an
    important achievement
    also uh thanking again the the the
    European Commission because allowed us
    to to meet each other last year during
    the project to policy
    seminar uh I think that there there is
    more effort to to to employ to to use
    let’s say to to to increase this kind of
    cross topic
    collaboration uh there were some other
    projects but we we didn’t achieve to to
    contact them but I think that we we have
    some work to more work to do because
    there are also some other commonalities
    like for example the uh communication
    with the communication or in any case
    interoperability with the entry exit
    system so in the end this uh we will try
    to do it better no because we have just
    to give a little bit of story to the
    other we have uh H worked a lot to to
    create a sort of memorandum of
    understanding for the collaboration in
    into this kind of uh dissemination
    activities and that will bring us also
    more added value in terms of techniques
    and technologies that we are using that
    are in common to the to the to the four
    projects essentially so
    so let’s hope to do even better in the
    next Workshop um involving even more
    more more topic related and technology
    related projects I will leave the floor
    to European
    commission uh thank you thank you jpe
    and thank you Anna and and indeed uh
    thank you for all the four projects uh
    Partners it’s a thank you for inviting
    us really uh this is this is super um
    super interesting and and great to see
    uh we’re glad that uh just some of the
    um pushes that we we organized like in
    the meeting that jeppe was referring to
    uh could create some opportunities like
    um like
    this uh and uh just to uh to Echo and uh
    and
    explain uh
    I I think I I had the pleasure of I’m
    I’m just look looking to the the names
    and by the way it’s great to see so many
    people connected from the four projects
    uh I had a pleasure to to meet uh some
    of you and I recognize some names but
    for those who don’t know me uh I’m Julio
    manini I work at the European
    commission’s DG unit on um uh Innovation
    and security research uh we manage the
    uh the program of the Horizon cluster on
    civil security research inovation uh
    funded by the EU uh and I coordinate the
    part on Border management
    Innovation but uh exactly as as we said
    uh uh we we also work together with the
    colleagues in the in in the team uh in
    the other team in in the same unit that
    coordinates the area on fighting crime
    and terrorism Innovation uh to fight
    crime and terrorism um I see at least a
    colleague from that team uh here with us
    today Felix uh and uh Felix may may be
    able to say something about fct uh just
    uh just after me but just to uh
    underline uh the um uh H how important
    it is and how
    um an interesting achievement it is for
    you4 to organize this uh uh this event
    together in the past few years our
    program uh Innovation for civil security
    exists now since uh
    uh more than 15 years uh but we
    realized as we always learn in the last
    few years that uh both us ourselves and
    the projects were a little bit in
    compartments uh in terms of areas we had
    the boorder of management research and
    Innovation for Border guards we had the
    fight crime and terroris research and
    Innovation for police but in many cases
    there are a lot of opportunities of
    interacting maybe because the techn
    ologies are similar maybe because the
    capabilities needs are similar maybe
    because the practitioners actually work
    together border guards and law
    enforcement for example and I think what
    you do is is a very good example um
    Biometrics in terms of Technology um um
    security of identity in terms of
    challenges just to name a few uh could
    be interesting for um for different
    communities as well as uh also from the
    innovator’s point of view many of you
    are companies or universities uh and
    could just uh uh benefit for for more
    interaction that’s um uh that’s
    something that we wanted we hoped uh to
    help with the project to policy seminar
    when we uh introduced the various
    projects and uh and promoted networking
    uh and that’s something that we also
    ourself try to do uh not least through
    the serice uh the community for European
    research and Innovation for security uh
    where we as commission try to organize
    and host thematic events um on
    Innovation where we also try to bring a
    lot of the policymaking part uh and so
    for example today’s worship or this
    online worship is very interesting for
    for us um I for example I look forward
    to it and learn things and take notes to
    report and promote to our uh policy
    colleagues thematic policy colleagues so
    those who work on Border management
    policies for the future European border
    management or for uh organized crime
    fighting uh uh or or terrorist fighting
    policies because uh what you’re working
    on and what the solutions the
    technologies that you’re studying and
    develop could be um could be helpful for
    uh for them so um thank you very much uh
    again congratulations for being able and
    being open to this uh networking and
    collaboration it’s already very good uh
    and uh and of course your projects being
    uh still their let’s say first Al more
    or less they have a lot of opportunities
    to to do to do more um so looking for
    for the rest of the afternoon and
    leaving the for quickly for for a quick
    um mention to Felix from The fct
    Innovation team uh if he wants to say
    something thank you thanks Julio uh yes
    hello everybody very nice to em meet you
    um so as as as the fct title indicates
    we’re we focus mostly on fighting crime
    and terrorism but um because this uh
    this topic is rather large it also has
    quite a few domains of application so uh
    with Julio in the past we’ve been we
    we’ve worked a little bit on mapping
    potential synergies not only within uh
    within uh cluster three uh of the
    research program but also with other
    clusters so uh we want to make sure that
    we have a very good understanding
    already of the possible synergies that
    go on within our own cluster uh but also
    then in the future see if we can expand
    that to the other clusters as well and
    build a very strong base um I think also
    it might be worth mentioning that we
    have also these um the work program on
    strengthening security research and
    Innovation which works also on the um
    aspects of research which needs to be
    which need to be improved which can be
    improved uh
    strengthened um by uh also EU funded
    projects uh and this should also be able
    to support your own projects and and and
    facilitate synergies uh make sure that
    the community is at least familiar or
    aware of one another um at large so um
    BM uh border management and fighting
    crime and terrorism are um in in my view
    some of the most obvious uh synergies uh
    but we are also looking to expand this
    throughout the the this cluster uh uh uh
    as it stands and and possibly uh see see
    where we can go from there but I’m very
    I’m looking forward to to seeing these
    discussions or to hearing these
    discussions rather and uh and wish you a
    very nice meeting thank you very much
    thank you
    pH thank you if Anna and elen allow me
    so I would like the floor just leave the
    floor just to Bruno Shard that is our
    project officer at this point just few
    words I know that was not in particular
    very well very well defined slot but
    just to leave the floor to him for some
    greetings
    yeah hello and thank you for giving me
    the floor I think after the colleagues
    from the commission I do not have
    anything things to add I think it’s a
    very good opportunity that we have this
    Workshop amongst two different AAS so
    this is very good this is very positive
    and another positive point is that we
    have some colleagues from dig present
    today so that we have a direct uh
    feedback to policy and uh this is very
    very important for the project so I will
    give you the back and reach you a very
    fruitful uh Workshop today thank you
    thank you thank you thank you okay if I
    may I would like to the floor is yours
    okay h i see our project officer Dr
    manova if she would like to to say hi we
    are more than
    happy uh hello good afternoon everyone
    so uh I just joined the meeting so uh uh
    and I I heard the greetings uh from
    Bruno uh so the same from my side uh
    very good initiative so congratulations
    for this and I hope this will not be the
    last one so I wish you as well a very
    fruitful uh meeting ahead and workshop
    okay so thank you thank you for inviting
    me thank you thank you very
    much okay I will start now we start with
    a the next slot thank you thank you to
    everybody so we leave the floor to Anna
    if you want to she wants to moderate
    thank you everyone um so um with the
    next um let’s say slot we are going to
    present the project overview these um
    this presentation are going to be made
    by the coordinator of each project so we
    have elanie veroni from intrasoft
    um net company and then we have jpe
    salvator Val V from um the project from
    flexi cross and then Monica flora and
    Dan Ona from simavi from and Manuel past
    from Herta from AOS so um elenie if you
    would like to start for presenting um
    the project overview for tzer sure thank
    you
    I guess everything is okay uh with the
    screen sharing Etc so uh okay thank you
    very quickly uh hello everybody I’m very
    happy to be here and um among good
    colleagues I’m Len veroni I’m a project
    manager at L compan roft specifically in
    the research and innovation Development
    Department I’m the de day coordinator of
    tensor
    project and um here is the overview for
    uh our project everything you need to
    know about tensor is in this Slide the
    topic under which we have been funded
    our Consortium the fact that we started
    our journey uh last year on January 1st
    meaning that we are well into the second
    year of
    implementation for the project that we
    are an innovation action uh being
    supported by the European Union as well
    as own funds our overall aim which is to
    enable the biometric evidence extraction
    Fusion storage and sharing uh in
    crossborder settings and how we’re going
    to do this uh we’re going to do this by
    fusing physiological and behavioral
    Biometrics by leveraging AI technology
    to provide intelligence and insights and
    by developing a biometric data space
    system prototype tailored to the needs
    to of the security domain we have three
    distinct pilot use
    cases uh each pilot will take place in a
    different uh EU member state but more
    about this uh later on few more details
    about our Consortium we are happy to
    work together with uh 20 Partners across
    15 uh European countries we are working
    together with rtos law enforcement
    agency and for exic institutes large
    Industries as well as
    smmes a little reminder about the
    expectations as these were set by the
    call by the topic uh under which tensor
    was funded fct
    0105 for mod Biometrics used in forensic
    science and B police so the expectations
    were related to advancing the use of
    biometric Technologies by practitioners
    strengthening foric evidence Acceptance
    in court supporting policym on the use
    of modern biometric Technologies taking
    of course into account the ethical and
    legal rules of operation improving the
    operational capabilities of law
    enforcement agencies to fight crime and
    terrorism and to train foric
    practitioners on the use of
    state-of-the-art Technologies and
    methods in line with those
    expectations uh tensor considers three
    traditional phological Biometrics the
    well-known
    fingerprint face face Biometrics as well
    as voice but we also go beyond that and
    we consider the behavioral Biometrics we
    consider gate specifically gate
    recognition the way someone
    walks um as well as user patterns the
    way someone interacts their mobile
    devices can also uh used to identify
    them so with these five modalities are
    the core of tensor we have designed and
    we
    are uh trying to implement A system that
    U extracts biometric traits and other
    features from the crime leveraging for
    this purpose CV footage recorded audio
    or mobile devices that may have been
    found at the crime
    scene uh then to fuse these biometric
    data and features towards supect
    recognition identification and identity
    verification to store the extracted
    biometric data in a privacy preserving
    manner enabling encrypted search and
    comparison
    functionalities and to share biometric
    data among trusted national law
    enforcement agencies while maintaining
    data
    sovereignty these are the three main uh
    uh objectives for the project so support
    the forensic investigation through the
    provision of innovative biometric
    intelligence and inside to exploit
    exploit further the potential of both
    behavioral and physiological Biometrics
    with a purpose to derive concrete and
    robust evidence and to facilitate the
    crossborder data exchange um ensuring
    also
    interoperability these objectives will
    be demonstrated in the framework of
    three use case scenarios and uh we’ll
    make sure that all all our results
    Concepts ideas recommendations will be
    widely
    communicated in the relevant
    stakeholders as mentioned uh before we
    have three distinct use cases so a few
    words about uh these the first one is
    evidence collection through intelligence
    derived from correlated behavior and
    physiological Biometrics based on CCTV
    footage
    uh this case scenario the first one will
    take place in uh Czech Republic and is
    being led by the police of Czech
    Republic there are six distinct
    technology offerings from tensor that
    will be leveraged and demonstrated in
    the framework of this us case scenario
    and the objectives are to derive a
    comprehensive set of distinctive
    features and increase accuracy and
    efficiency in Criminal
    Identification for this particular use
    case scenario there are
    two data sources the main one is the CV
    footage with Incorporated audio and
    later on in the story line uh we are
    also using the police officer’s mobile
    device to obtain fingerprint for from
    the suspect on the
    field uh the extracted
    traits is uh three physiological
    Biometrics phase voice and
    fingerprint um that will be fused with
    uh gate which is a behavioral biometric
    the produced outcomes a list of possible
    suspects along with a confidence level
    for each one um with their uh identities
    and we are also going to produce a
    narration of the investigation process
    combining all the relevant
    findings the Second Use case scenario
    the focus uh now is sifted to a mobile
    device uh specifically unlocking this
    Smartphone mobile device leading to the
    extraction of stored data even biometric
    data uh this Cas scenario will take
    place in Finland is under the leadership
    of the ministry of the interior in
    collaboration with the Finish police
    again six distinct technology offerings
    will be used here the objectives remain
    the same but the means are different
    data sources now uh is mainly a locked
    mobile device associated with the
    criminal and the
    crime and uh CCTV footage will be also
    leveraged later in the story line to
    extract
    um Bings that can be correlated between
    the two data
    sources uh the exacted trates as I said
    earlier the focus here is on behavioral
    Biometrics but also on every possible
    relevant information that can be
    extracted from the mobile device uh such
    as by data stored in the embedded secur
    element sensor data about uh for example
    about the location of um the criminal
    and past whereabouts 2D patterns from
    the media files pictures taken with the
    phone earlier and how this can be
    associated with the crime and the
    produced outcomes are information about
    the suspects characteristics its past
    location whereabouts Etc as well as the
    narration of the investigation process
    combining all the evidence last but not
    least uh we’re going to deliver the
    biometric data space the first biometric
    data space uh which we’re going to use
    to um demonstrate secure data Exchange
    in a crossborder scenario for this
    purpose two end users are being involved
    in this use case scenario which is being
    led by the Portuguese police
    uh with the participation of the mavian
    police there are four technology
    offerings being demonstrated here and
    the objectives are a bit different we
    need to
    establish
    um that the process is taking place uh
    considering also security and
    privacy automation scalability enhanced
    trust and data sovereignty for this
    purpose we have used the idsa
    um reference model uh the new paradigm
    of data
    spaces and um we’re going to use it in
    the scenario to exchange facial the
    focus here is on
    facial uh
    templates um in a crossborder
    scenario uh there are also technologies
    that are used to ensure the aspects I
    mentioned earlier security privacy
    scalability Etc it’s a different system
    than the Tes platform but um we believe
    it’s is very very uh
    important uh the good thing is that we
    have also established a relation of our
    use case scenarios with uh the EU
    policies for internal security mainly
    for the EU strategy to tackle organized
    crime uh 2021
    2025 uh we see here that uh
    the strategy calls for making more
    effective use of biometric data and
    specifically facial images for
    identification PES this is what what we
    do um in our use case as well uh calls
    for
    cooperation law enforcement uh and
    judicial cooperation smooth exchange of
    uh information and timely access this is
    relevant to our use case scenario 3
    um for access to digital leads and
    evidence because the organized crime
    takes place online
    nowadays uh we also do this by
    leveraging a new biometric uh modality
    the behavioral Biometrics related uh to
    the mobile device the way we interact
    with with
    it
    um
    also there is a need for tools that are
    inexpensive and can be operated by
    nonspecialized
    Personnel uh we’re also going to do that
    in the framework of pilot use case to by
    offering a
    non-costly solution to unlocking uh
    mobile devices attacking the the pin and
    the pattern of uh the mobile
    device finally
    um we found very strong relevance with
    the regulation on data exchange for
    police cooperation the pram 2 framework
    uh this is exactly what we do in our
    pilot use case scenario 3 uh but we’re
    going to
    demonstrate this uh through the
    biometric data space
    technology we believe it fits very
    nicely and we are looking forward
    to to the results uh from uh this uh
    pilot evaluation because we believe that
    uh very very useful uh recommendations
    polic recommendations can be uh
    extracted from this
    process this is from my
    side I hope I didn’t maybe I went a
    little bit over no worries thank you so
    much elen thank you thank
    you okay um shall we continue with um
    flexi cross and
    jeppe could see the screen
    right TR I reduced a little bit
    presentation of a couple of
    slides
    also uh so we’ll introduce flexy cross
    today uh flexy cross is a um flexible
    and improveed border crossing experience
    so this about managing and improving
    border crossing experience for
    passengers and giving benefits providing
    benefits also to uh border
    authorities uh few information related
    to the project it’s uh the first half of
    the project so it started in September
    2022 and we l in in August 2025 it’s a
    project that was funded under the
    cluster cluster three topic BM
    0103 and the main name of the project is
    essentially uh to deploy and continuous
    validate a toolkit for Innovative border
    checking
    Solutions uh on the move so a real
    operational environment meaning that we
    have the possibility to deploy uh easily
    uh the border crossing points for um
    border guards in order to allow them to
    do the necessary checks uh with the
    different tools that we will see in the
    next slides we started of course doing a
    sort of mapping one by one between
    challenges and solution of the uh that
    are brought from the from the project
    starting so from the increasing fright
    and passenger
    transports uh that has a significant
    part into the European Mobility uh in
    general this will means that we will
    have the
    necessity uh uh to improve what is the
    workload of the customs and of course of
    the security uh the security all the
    security personel that is involved in
    into border uh border
    crossing H and here idea is to leverage
    on a uh flexible Dynamic and effective
    uh tool kit that will allow to com uh to
    use in a transparent way Technologies
    like 5G internet of things so with
    sensors that are are deployed in the
    mobile border crossing points uh to
    use artificial intelligence algorithms
    that will allow to extract unusual
    pattern ER from the from
    the essentially from timely and
    geographically uh movements of people
    across
    borders ER and to do so such to to
    conduct such Anis in terms of risk
    assessment uh across
    borders uh we have used just not go in
    deep of all the different of the
    different factors that we have taken
    into account essentially the main
    activity is to do uh to bring Innovation
    by using such Technologies by delivering
    such uh mobile checks into real
    operational
    environment uh by using Advanced
    biometric checks and ESS
    allowing in the end to the different
    authorities as we have seen also
    before uh to allow um to the the the
    different border authories to
    interoperate uh among each other uh with
    the ambition to integrate with the entry
    exit system and if possible to have the
    interaction also with the entry the ATS
    system in order to identify if there is
    any particular uh uh um person that is
    crossing the bord that has not the
    necessary authorization and then to
    trigger some more services that will
    allow to identify if there is any
    phenomena like irregular Crossing or
    Contraband or smuggling of goods across
    borders the uh project Consortium is
    made by 12 Partners uh we have uh we
    have engineering as that is the
    coordinator then then we have ba ibos
    wings and allite as uh the essentially
    for the Innovative then we have iccs and
    Kia as the research organization and
    then we have also five end users that
    will take care essentially they will be
    the contact point for the three
    Pilots uh and we have tcpr for what
    concern the rail the railway the wellway
    sorry uh networking atg has incubator
    that will coordinate the scenario uh
    near the port
    uh then we will we will have also L
    police that will be mainly involved in
    the Greek pilot and then we have also
    Romanian police Border Police that will
    be the Border police involved into the
    uh scenarios for what concern
    essentially the uh c c scenario and Port
    scenario essentially and the railway
    scenario uh this is the initial
    architecture of the project essentially
    so we started with a classical with a
    classical for tired architecture where
    we have from one side all the sensors
    that are deployed like uh acoustic
    sensors like mobile mobile devices that
    will be used for positioning uh for
    providing position essentially to to
    analyze if there is any unexpected
    pattern that is detected by the
    different algorithms then we will have
    also on board sensor unit or we have
    also passport and fingers uh fingerprint
    scanners H we will have also X-ray and
    footages or also mobile and fixed
    cameras and and uh all these uh sensors
    will uh will be ingested essentially by
    uh the related
    module uh that will uh pass all this
    information essentially to the data
    processing layer that
    will that will analyze through a I ml
    algorithm all this information that
    comes from the uh from the field
    essentially we will see a detailed
    architecture after in the technical in
    the technical overview and after all
    this information are processed they are
    fused to create Val added services like
    uh like doing biometric verification uh
    to do a vehicle person risk assessment
    as I was mentioning before to do uh some
    uh predictions according to the analysis
    of the pattern
    ER to the pattern that are extracted
    from from the geographical and the and
    the temporal uh movements of people
    across border ER in order also to create
    two other uh addition added value
    services that are the uh the detection
    of illegal uh illegal trafficking and
    also the uh Contraband
    smuggling uh phenomena all this
    information will be uh visualized for uh
    will be
    essentially visualized in use case one
    through GUI to the two Dimension GUI and
    through the augmented reality situation
    awareness ER into two two different
    situation awareness that are mainly
    related to the the two different Pilots
    that are in Greece and in the the
    scenario related to Romania and movia H
    but the most important part is that
    essentially uh that the world toolkit
    will be instantiated into the three
    different Pilots according to the
    different needs of the end users
    expressed during the requirements
    recitation H and all the three Pilots
    will communicate through an
    interoperability mechanism that will
    allow them to export the data that in
    the end will be uh will follow the
    structure of a data model that has been
    formalized within the project but with a
    possibility also to create an
    intermediate model that will allow us to
    uh export all this
    information uh according to the data
    model that will be defined or at least
    that is in progress for the entry exit
    system uh these are the three Pilots
    that will be the Romania mavia platform
    that will be deployed essentially for
    the for the use case three the Romanian
    uh the Romanian scenario that will be in
    galatti
    Port ER and then we have also the Greek
    the Greek Bulgarian uh scenario that
    will be on uh on the
    road uh will be at bord stor menu
    essentially on the
    road on the left we can see all the
    sensors that will be used for the
    different uh Pilots so we will have a
    portal FAL recognition systems for a uh
    H verified identity of people that are
    crossing fingerprint scanner we will
    have also uh on board sensors on board
    unit on um polic Vehicles we will have
    also uh remote video from fixed cameras
    but also videos coming from the uh the
    from Ted drones like we will have also
    x-ray scanning for uh cargo
    identification and acoustic sensing for
    position prediction essentially then we
    will cover the all the transaction
    especially for use case 3 uh and the
    exchange of information among the
    different sensors with a with a central
    system through blockchain uh
    Technologies I will go further because I
    think that we are a little bit late ER
    this is the methodology that we have
    used to essentially monitor the
    development of the of the different uh
    modules that are uh that are currently
    um being developed essentially H there
    are some be weekly calls that are being
    organized in order to uh to to be to to
    Sweet essentially with the main
    deadlines that we will see after with
    the planning that we have not only
    inside the project but also with public
    projects that currently involves the two
    projects of the CL of the
    today syy Workshop but we will try to
    understand if if it’s possible to uh to
    involve also the other people into uh
    official events that in the end what has
    forced us is to uh strictly monitor all
    the release of the uh of the software
    module that will be then demonstrated
    essentially
    uh during these uh events so what I mean
    is is this essentially this is not the
    gun of the project uh we have uh a
    timeline with the three different layers
    that are related to the uh in the upper
    part we have the different Milestones
    related to the uh month 16 to have the
    release of the first release of the
    toolkit month 20 that is in April 2024
    that will be uh the first
    uh the the first draft of of the of the
    methodology for trial validation
    essentially then we will have the
    integration the early integration of the
    piloting of the pilot sorry with the the
    release at month 26 of the second draft
    the second release of the flex cross
    tool kit and then to to continue with
    the month 31 with the end of the
    integration before the execution of the
    pilots at M 22 and 23 uh and finally the
    final report of course of the validation
    this means that in the end we will have
    different uh different events that are
    in the the light light green that we
    have highlighted for the technical
    workshop for the internal progress but
    also workshop for uh with external
    stakeholders uh with some okay
    activities for for what concern the uh
    the dissemination communication
    activities but uh uh in conjunction with
    main the main activities and that will
    uh satisfy the the kpi of the projects
    we will have already planned to have
    several activities at the bottom part we
    can see with tensor that as I said at
    the beginning we have organized the the
    memorandum of understanding in order to
    identify which can be the best
    opportunity for us like today to share
    some information that also CES to my
    mind the different uh questions that we
    can do if there is time today
    or or offline uh in order to have some
    curiosity that can be even exploited
    better in uh not only in workshops but
    also to have the possibility to uh to
    analyze some results in the technical
    conference in that will be increte in
    2024 or to have for example a white
    paper at month 28 by the end of this
    year essentially for what concern
    uh biometric Technologies for forensic
    and Border management essentially so
    this is the uh the plan of this
    conjunction activities what we we
    have essentially drafted in terms of
    exploitable assets are there are three
    main um topics related to uh all the
    functionalities that are validated into
    real operational environment like mobile
    biometric tools for people
    identification uh to improve all the
    Border checking processes that are
    currently use for the Border guards that
    are involved in the project and to to
    provide another kind of experience that
    is related to the situation the
    augmented reality situation
    awareness ER for uh for Border checking
    and also predictive risk assessment uh
    by using the different sensors that are
    in the field H another important assent
    even if it’s not technical is related to
    the framework for privacy and secure
    data processing that mainly is involved
    not only in the compliancy of the ethics
    requirements but also into the
    identification of the
    um of the the the main pluging point
    that can be uh used by technological
    people to identify which which can be
    the weakness that we have to cover
    essentially with the develop the
    development activities and to be
    compliant so with the with the not only
    with the current
    ethics framework but also for example
    with if possible to identify which are
    the possible uh way of improvement with
    AI
    act ER and last but not least last but
    not least also the uh this uh this
    interoperability framework at least is a
    a module that we are uh designing now in
    order to be compliant also
    with uh with the DX system I don’t know
    if there is any raised hand or uh yeah I
    raised hand J because I guess this will
    be further discuss in the section that
    we have related to the exploitation so
    just being being aware of the we have in
    fact it was just an INT an introduction
    just to okay okay and that’s all and
    this was the last slide that are numbers
    but we can just share with them just to
    have some figures related to the
    software modules to the key exploitable
    results that we have ident ified and
    some activities that we are doing and
    that have been described in different
    phases of the the slides so I will close
    my presentation
    sorry no worries thank you so much jpe
    no worries um okay moving forward to the
    presentation the
    overview of Odus and we have Monica
    flora and Dana oniga from
    suavi Hello everybody thank you very
    much for uh for introduction I’m I’m so
    I’m Monica Flor I’m the project
    coordinator of oiso project and I’m the
    head of unit of European project
    Department in
    inavi uh and I will make just a brief
    introduction of uh of what together with
    my colleague Dana uh I um I would kindly
    ask Dona to share the
    screen uh she was sharing the screen
    previously so yeah yeah yeah did
    disappeared so now I just okay
    so just give me one second me one second
    I have a small problem but now it’s fine
    now it’s it’s okay okay so uh you can go
    to the next slide so just few words
    about about the project so um what you
    say it’s um it’s uh aiming to to offer
    some unobstructive technologies for
    secure and seamless uh uh border cross
    ing for travel facilit facilitation and
    uh the project was submitted on BM on
    the call BM
    0103 uh dedicated to improve border
    checks for travel facilitation across
    external borders and improve the
    experience for both passengers and
    Border Authority staff uh the project
    it’s an uh uh Innovation action and uh
    has a total cost of 4.6
    million uh you can go to the next slide
    please
    L uh the project has a Consortium of 14
    Partners from 12 European countries and
    also two uh non-eu countries so we are
    quite uh quite uh um expanded on on many
    many countries from from European
    commission European Union sorry but also
    for non countries and uh related to to
    the actual partner so we um we are are
    five end users bodies from countries
    like Romania Bulgaria Slovakia France
    and also uh and also we have three large
    companies uh five small and medium
    Enterprises and one Research Institute
    so we cover different type of expertises
    that are required
    for uh for the project
    objectives um the main goal of the
    project is to improve border crossing
    experience for travelers and Border
    Authority staff uh while maintaining
    security security and monitoring of
    movements across land and water you
    external borders so Dan I kindly ask you
    to to take over because I think it’s Dan
    is the project manager of the project
    and she will introduce you the main
    project objectives thank you Monica so
    uh we have H five main objectives uh the
    first one is to design uh develop a
    platform that will be used by both
    border authorities and citizens um the
    second objective is related to
    advancement of identification and
    control capabilities of Border
    authorities by introducing a new mobile
    virtual
    passport uh the third objective is also
    about improving the border control
    capabilities um specifically by uh uh
    using uh safe and portable screening
    uh x-ray uh Technologies uh drones UAV
    assisted image processing uh and AI
    based data analytics the fourth
    objective uh is to validate the
    effectiveness of the OS platform um by
    demonstrating it in various operational
    environment uh inside the Train on the
    road uh and at the water
    border finally uh the fifth objective is
    to speed up the rapid uptake for the
    service Innovation through wide
    communication scientific dissemination
    and Commercial uh
    exploitation uh as um about uh outcomes
    and uh expected impact that uh the
    project will have the first outcome um
    is to validate uh new and innovative
    solutions uh both Solutions uh that I
    mentioned before uh the the capabilities
    of um the identification of uh people
    and the the uh X-ray and um drone
    Technologies are uh supported by um uh
    powerful AI but you will see more uh
    details in our um uh presentation uh
    dedicated specially for for Technologies
    uh going back to to the outcomes uh the
    first uh outcome uh after we validate
    the platform and the technologies will
    improve the border crossing experience
    for both Travelers and authorities staff
    but also will maintain security and
    monitoring of movements across land and
    sea uh EU external borders uh the second
    outcome uh is to increase the security
    and reliability of Border checks uh
    including uh identifying uh people and
    goods that might cross external borders
    uh and this will also mean an improved
    security of EU external uh borders uh we
    uh Target Land and Sea borders not air
    borders uh with with o project and
    finally uh the third outcome uh will
    support also uh the planning of Border
    checks uh and um also the handling of
    pix in crossover the in cross border
    traffic uh especially in land Crossings
    uh and we hope to improve customs and
    supply chain security through better
    prevention detection and fight of
    illegal activities that might involve uh
    flowing of goods across EU external
    borders uh what we would um uh bring uh
    with our uh
    Technologies uh we will um we are
    developing a platform uh for both border
    authorities and citizens uh and we have
    two uh uh pillars that say two main
    directions uh first one is um to improve
    the checking at Borders by uh using
    Technologies uh x-ray Technologies and
    drones assisted Technologies uh these
    are supported by multimodal fusion and
    theist decision support system and also
    uh by an explainable uh AI module uh the
    second uh the second direction is the
    identification and control capabilities
    and for this uh we have a device for
    seamless identity verification again you
    will see this later on uh we will have
    digital and virtual passport um they
    will be supported by AI power continuous
    behavioral authentication by face s gdpr
    compliant Travelers counting using
    images from static cameras and this um
    Technologies are also supported uh by
    the decision support system and the
    explainable AI
    module uh as operational scenarios uh we
    are targeting uh illegal border crossing
    and the traffic of illicit good uh
    materials explosive or drugs we are also
    targeting
    uh identity thrud and uh in the end also
    uh
    terrorism we have three Pilots as I’ve
    mentioned before uh the land border
    Pilots uh one will be at the border
    between Republic of mova and
    Romania uh this is an external you
    border uh and another one will be uh at
    the the Border Point uh between Slovakia
    and Republic of Slovakia and and and
    Hungary uh another uh pilot will be uh
    in Bulgaria uh in Burgas Port uh and the
    last one uh the train border uh will be
    again between Republic of mova and and
    Romania more specifically uh in a
    crossing point called
    unan uh about um a little bit about our
    implementation plan and
    where we are uh we are uh in mon 15 we
    started January 2023 and we are
    approaching very fast uh a new uh uh
    milestone in uh April uh where we need
    to have all um the first versions of the
    Technologies ready uh and uh then uh in
    June uh mid the year uh we will have the
    first version of the uh of the platform
    r ready uh then by the end of this year
    uh we will have also the first round of
    piloting so we will have quite a busy
    year um again about uh what happened in
    our first year of U implementation we
    already achieved the first uh base the
    the first Milestone uh the Baseline uh
    we finalized the 15 deliverables out of
    27 uh we gathered the F the and user
    needs uh we defined technical
    requirements and we designed uh the
    platform
    architecture all our Technologies are
    under development and we are uh going uh
    straight to to achieve the the next uh
    uh Milestone that we have uh the
    platform is also
    progressing and from uh other point of
    view we are U monitoring uh applying the
    ethical principles required by the uh
    commission uh we um uh to communication
    and dissemination and we are in good
    progress with these uh directions and uh
    the work on exploitation and
    standardization uh also started at the
    beginning of of this year so this ends
    my
    presentation thank you so much Donna and
    Monica for this
    presentation um okay uh we will move now
    forward for the presentation of atos so
    Manuel Pastor
    please
    actually okay yes I I will do the
    overall presentation of the project and
    then um Manuel will talk about some of
    the technical stuff okay please feel
    free to share the screen
    and if there’s a way just to keep it to
    maximum 10 minutes that’ll be great yeah
    yeah I will be very short don’t worry
    thank you so
    much um okay just let me figure out how
    to
    share
    um right you can see it right yes we can
    see thank you perfect so my name is Con
    constantakis I’m with SE uh in Greece
    and uh I’m coordinating
    Athos uh so what is AOS it is quite
    different I think from all of the other
    projects that are taking part in this uh
    project uh because um
    uh it uh it is a project that uh is
    dedicated to countering online identity
    theft uh uh so it’s not about borders uh
    or uh um uh or the most uh uh usual
    types of of crime that have been
    mentioned in previous presentations but
    uh more about U um more Insidious and uh
    perhaps more everyday type of crime um
    so uh a bit of of uh information about
    the project um it started in October
    2022 it’s going to uh uh last a total of
    three years we are precisely in the
    middle of this timeline
    now um uh it is a research and
    Innovation action of course so it
    targets uh medium TRL uh results at
    about five or
    six and uh uh it actually uh uh answered
    the call with five uh five distinct uh
    uh uh uh things that we’re going to do
    I’m going to not going to go through all
    of this text now but I’m going to make a
    summary in uh uh a bit
    later uh so what is the concept of uh of
    Athos
    uh we need we need to start uh with what
    is the concept of online identity theft
    so what is identity theft online or not
    is when uh uh someone’s Identity or
    elements of it are controlled by someone
    else without uh uh of course the
    victim’s um um uh agreement per say so
    so what are elements of uh our identity
    uh elements of our identity uh uh like
    of our physical identity of course is
    our image our voice our names our
    signature our uh actually identity card
    or passport um our social security
    numbers uh uh uh and of course stuff
    like that and uh very much of this uh in
    in uh recent years perhaps in the resar
    like in the last couple of decades very
    much of this is also online so uh uh we
    have uh a social media uh identity and
    this is part of our identity we have
    emails we have uh uh so many uh online
    services uh from ebanking to online
    shopping to accessing government
    services
    to even like of course watching Netflix
    or uh playing games online everything uh
    uh everything is connected to a sort of
    online
    identity uh and online identity theft is
    when some or all of this is uh
    controlled by someone else for whatever
    reasons um of course there are uh uh
    like the usual uh perhaps slightly
    oldfashioned type of online identity
    theft old fashion meaning uh uh perhaps
    10 years old or more and this can
    include uh emails coming or uh fishing
    or trying to uh to get you to um to give
    away your credentials so that they can
    log in as you or uh that they can uh uh
    uh get to your uh ebanking uh account or
    stuff like that um there is of course
    also other uh things like um someone
    creating an in Instagram account that uh
    has like a very very similar uh handle
    to yours and uses the same pictures and
    the same videos and uh so to some
    Observer it might uh look like it’s
    yours of course this is probably not a
    problem for most of us but it can be a
    problem for celebrities it can be a
    problem for politicians because people
    can then use uh uh such uh accounts to
    spread fake news to influence people
    because these people have a lot of um
    influence on uh
    uh on society and then of course uh
    which is what this uh uh slide is about
    there are some very very recent and high
    technology
    um um uh methods of uh identity theft
    and uh one of them is deep fakes uh deep
    fakes is a technology that uh is rising
    very very rapidly like a couple of years
    ago anybody would see a deep fake and it
    would be more or less clear that it’s
    probably fake not so much now and uh in
    a couple of years it’s going to be
    probably very very difficult as uh
    things um uh get uh much much more
    advanced
    um we have all seen uh the recent news
    uh a couple of months ago uh with the
    Deep fake images of Taylor Swift uh that
    made Global News and of course this can
    also happen with other celebrities uh
    there was also with politicians there
    was uh um a couple of years ago um this
    um uh thing with um uh deep fake video
    of President zalinski of Ukraine urging
    uh the Armed Forces to surrender which
    of course was fake but um and it was
    very quickly uh proven to be fake but uh
    we can only imagine uh what sort of uh
    impact these things can have um and of
    course very very recently we also seen
    how generative AI uh uh like Sora can uh
    uh create very very realistic videos
    that are indistinguishable from real
    videos in in many cases um another uh
    thing is fake social media accounts uh
    not only what I mentioned like someone
    actually creating an account that looks
    very similar to yours but uh it can also
    be um uh net of B accounts that uh uh
    will uh uh circulate and uh uh share uh
    each other’s posts and uh create a very
    fake impression of what topics are
    relevant or what topics are um are liked
    by many people so what uh does Athos
    want to do about it aons is going to
    actually is building has built an
    observatory that is still of course
    expanding that has two um um two goals
    one is to inform and educate the
    European citizens of the dangers of
    identity theft and how to protect
    against it so a lot of information and
    article for non specialized people and
    uh the second part is to uh identify and
    address the challenges that police
    authorities face against online identity
    theft because it is a very new a very
    recent type of crime and uh um uh it’s
    not easy either to report it or to prove
    it or to actually uh uh uh address and
    uh
    um uh do something about
    it so the project has actually Four
    Paths of action and uh uh uh I’m going
    to go very briefly through them so it’s
    the sociopsychological
    uh part which is to uh going to uh
    measure what kind of impact identity
    theft has to its victims and also to
    society as a whole and what kind of
    support structures uh are there and can
    we improve upon these support
    structures the second thing is the techn
    olcal uh pathway so tools for the police
    authorities uh uh to detect video
    defects to detect audio defects to
    detect uh uh botnet accounts on social
    media and also um uh an experimental
    tool that’s going to extract uh Trends
    uh uh that might be relevant not to
    solve a specific case but to understand
    the general Uh current uh landscape of
    uh um uh identity related crimes as this
    might be discussed on dark web forums or
    even on Surface web
    forums um Manuel is going to talk more
    about the technological part uh uh um um
    in in his
    presentation uh then we have the legal
    part which is uh how can these
    technological tools and also electronic
    evidence as a whole be collected and
    exchanged between different uh uh law
    enforcement authorities uh in a lawful
    way and in a way that can also uh be
    useful in a court of law uh and provide
    some assessment and recommendations on
    that and then a very very big part of
    the project is the awareness campaigns
    so citizen awareness this of course is
    our website which is the The Observatory
    but uh it’s also uh our webinars and our
    physical events and uh um uh uh bigger
    or smaller uh uh scale things uh which
    includes also quizzes games um articles
    stories uh role playing games and so on
    uh so that we can reach different kinds
    of people children uh um um young people
    old people people with more or less uh
    familiarization with technology and let
    them understand that uh two things first
    they must guard their own identity and
    also their own online identity and
    second uh uh they can they must be aware
    that not everything that they see online
    these days uh uh is
    true so um I have already talked about
    this so the observatory is uh two
    faceted online portal one is for the
    public and the citizens with information
    articles uh uh uh awareness um uh
    information um some examples and so on
    and the second part is going to be
    restricted access for Lea only and will
    include the technological tools that we
    are researching and
    developing uh now in terms of timeline
    uh the project is going to span three
    phases phase one is already complete we
    had our needs and requirements we went
    through the initial research and
    development phase we have created the
    public part of the observatory and we
    have planned how to reach victims and
    how to do our awareness campaigns now we
    are in the second phase we are um uh in
    the middle of developing the first
    version of our technological tools the
    awareness campaigns have already started
    on multiple levels as as I explained we
    have had uh interviews uh with victims
    um uh to get their point of view and
    what happened and how they fell about it
    and how uh uh they wanted uh to be
    supported and were they or uh was
    something missing there and uh of course
    we have also studied the legal framework
    proposition and next year we’re going to
    enter the phase three which will be
    updated uh uh version of the
    technological tools the final version of
    The Observatory and also um uh
    dissemination and stakeholder engagement
    and of course some things are continuous
    throughout all the phases which is
    testing the tools evaluating uh uh uh
    with alas in our Consortium and
    constantly updating the
    observatory so we are exactly in the
    middle in month 18 of 36 uh uh you can
    see the gun
    more or
    less and uh this is what the Consortium
    uh of Athos looks like we have uh six
    Partners from research and Academia
    Public Safety Forum uh that specializes
    on a uh citizen awareness three
    different law enforcement agencies and
    uh uh also to uh private for profit uh
    uh
    companies so I hope I didn’t uh take too
    long uh we have uh uh besides me three
    other people that are going to take part
    in this uh um in this Workshop Manuel is
    going to talk about the technological
    things and uh in particular bi the
    Biometrics which will help us identify
    if someone uh if a video is deep fake or
    if it is a the real thing um Anastasia
    is going to talk about the ethical
    implications uh of um of our work and
    Mari Christine is going to talk about
    about dissemination and exploitation
    thank you so much thank you so much
    constantinos great um okay we are a
    little bit over time um so um thank you
    for our project coordinator for the
    insightful presentation so they provided
    us with a comprehensive overview of the
    project so now that we have this solid
    understanding we will go into the
    innovative ideas um driving the projects
    um um so our discussion will revolve now
    around the advancements of in AI
    biometric features and other key
    Technologies um elements that are
    shaping the future of the border
    security and crime prevention so we will
    start uh again with the same um let’s
    say categories of the of the project so
    from tenzel we will have apostolis from
    se he will present uh the technical he’s
    a technical manager of tzer and he will
    present um the tech technical you know
    uh developments in uh in tener uh again
    please everyone overall Please be aware
    of the timeline that we have so maximum
    10 minutes presentation thank you so
    much please
    apostal yes just give me a second to
    share my screen
    uh we can see okay perfect perfect okay
    so uh thank you I’m AAS I’m a researcher
    at uh thir the center for resarch
    methology alas following the previous
    presentation of SE uh is contining with
    the next
    presentation uh in so our presentation
    this will uh Del into the technical
    details of uh our project tenson
    and we will uh provide you the technical
    overview and the main achievement so uh
    considering a basic part of uh uh the
    project was uh uh the design and the
    establishment of uh the architecture uh
    in the architecture part we have
    transition from uh the cocept design
    that was uh briefly Des described into
    the D and uh trans to a logical design
    in ense uh what we tried to achieve was
    uh uh the principle to to use the
    principle of privacy and security by
    Design uh in our methodology and put
    security and privacy at the center of uh
    uh the design from the early beginning
    since we don’t wanted to consider uh
    those two uh principles uh dust as
    enabling Futures so uh security and
    privacy by Design was is actually an
    agile set of uh Focus security and
    privacy practices that includes threat
    models privacy and threatment security
    testing and uh vulnerability management
    uh so the idea is that uh the
    organizations should keep uh uh
    shouldn’t keep personal data private
    Mainely because uh the law requires but
    that uh privacy and security practices
    should be the fation of uh their
    operation and they should monitor dently
    at all times uh uh all the goods and
    services with uh privacy and security uh
    issues uh
    so uh in that manner we try to overcome
    specific challenges we try to align with
    a variety of technological
    components uh we uh devised the way that
    we will implement the use case workflows
    and how uh this will be decorated into
    an investigation infrastructure for the
    use case PES that have been identified
    and how we will emulate an investigation
    environment for the C Cas pieces so that
    was the challenges that we try to uh
    address within the architecture design
    and of course to include and utilize uh
    A multimodel system that includes 12
    core for raising uh
    Technologies so uh moving next uh so in
    the tensor architecture WE 12 different
    core digital foric Technologies placed
    together to deliver specific sub
    subsystems and
    functionalities uh in addition we also
    consider the usage of non-core
    technologies that facilitate uh the
    presentation and visualization of the
    information till the continuous
    integration delivery of the uh software
    components uh we chose four key
    different offerings in order to
    demonstrate the Innovation offered by
    tensor project as part also of uh the
    architecture design so the first uh key
    uh technology uh offering as an
    exploitable asset uh is the first
    introduced uh in European Union
    biometric data space that offers a
    transworth data sharing environment uh
    that uh provides an extra uh safeguarded
    privacy by utilizing privacy enhancing
    Technologies we will uh describe them uh
    in the following uh with those part
    particular Technologies are uh the
    second key technology offering refers to
    the Innovative application of long
    language models and uh the generative AI
    in the security domain uh to that is
    used in order to offer insightful uh
    case story narratives and allows users
    coming from law enforcement authorities
    and agencies to connect uh the dots and
    have the story uh inside them the third
    uh uh key offering is relies on a
    multiple criteria decision making which
    provides alternative options for
    decision- making support uh by writing
    the various collected information as
    evidence uh which is based on nonuniform
    uh prioritization assessment of uh the
    collected evidence so not all the
    evidence contributes with the same way
    to the produced uh outcome and
    recommendation and uh fourth the fourth
    key offering refers to the allotting
    mobile devices which utilizes open
    source non non-commercial license Lo
    locked software uh to provide an easy to
    use solution that can fail out and used
    by fores and practitioners uh in the
    investigation
    field
    uh so uh the biometric data space allows
    sharing of biometric data in a trusted
    data e system where owners keep control
    of their data that they own uh the
    biometric data space creates identity
    and Trust supporting authentication
    mechanism uh self sovereignty identity
    and verifiable
    gradations uh moreover it offers a
    Federate catalog service where uh the
    search and uh uh comparison and match
    available only on the crypted data uh
    without uh revealing or disclosing the
    uh Ro data information uh it moreover it
    enables data sharing and exchange in the
    data plane we consider the use of the
    blockchain technology uh while in the
    control plane uh the use of smart
    contract to allow the automated change
    of terms for the data sharing change uh
    to be enabled and uh last but not least
    the usage control uh which is being used
    to enforce data usage policies and rules
    that govern the data exchange so the
    data is uh space uh the biometric data
    space over specific advantages regarding
    the creation of trash worthiness among
    the certified
    participants
    uh uh it allows uh uh uh scalability and
    uh the connection of multiple fores
    organizations from uh different
    countries and uh in essence it is a data
    ecosystem that offers specialized data
    services uh enables data sovereignty and
    governance and provides increased
    security and privacy uh by utilizing as
    been told previously uh the specific
    privacy andh has Technologies such as uh
    homomorphic ention and uh fast
    indexing so uh in tenso the biometric
    data space is not uh uh considered part
    of uh uh the tensor architecture but is
    a platform that is uh that is a
    standalone platform uh it is based
    actually on the idsa international data
    spaces reference architecture model and
    also it aligns uh with the GX principles
    for data harmonization of the biometric
    data uh it uses actually the notion of
    the connector where each connector is SE
    as the interface for connecting one user
    or one organization to the other and uh
    considering the blockchain solution is
    based on the solid framework that allows
    for uh the smart codra to take place and
    the data exchange take place based on
    the smart codra and the deployment of
    advanced privacy enhance Technologies
    such as homomorphic encryption and the
    large scale uh data indexing that allow
    search and query forat and comparison on
    the encrypted data
    so uh why do we need actually a
    biometric data space to enable data
    sharing and exchange uh already there
    are well established Solutions and
    Frameworks for data sharing and exchange
    uh however the use of biometric data
    space uh innovates in the field of uh
    data economy with uh uh the latest
    advancements in the data governance and
    our Solutions aligns with uh most of the
    identified existing Solutions such as uh
    the hero information exchange channel
    the Sienna Channel interpol’s I 247 and
    as our project coordinator aleni
    mentioned previously with uh the latest
    and recently new requirements of the
    prom and prom 2 uh model considering the
    data exchange and uh our uh offering our
    biometric data exchange offering extend
    beyond their scope to offer a
    trustworthy to create a trustworthy data
    system uh for self sovereignty biometric
    data exchange which is uh uh improved
    and enhanced with specific privacy uh
    enhancing
    technology uh moreover in tens we aim to
    advance fores investigation by using
    generative Ai and uh large uh uh
    language models we aim to leverage uh
    those Technologies to provide improved
    understanding by performing Cobra health
    analysis on the evidence collected from
    various sources uh the offered natural
    language communication will allow uh law
    enforcement agencies and for raing
    investigators uh to retrieve criminal
    investigation related information uh
    using natural language instead of making
    peries to a database and moreover it
    will enhance them uh with processing uh
    of large volumes of data
    uh another important key exploitable
    asset of our architecture is the support
    for decision making that is based on
    multiple criteria analysis uh the
    investigation recommendation and
    enhancement component is utilized uh to
    fuse physiological byal Biometrics along
    with some additional features that are
    being recognized such as clothing color
    face mask or glasses uh it can provide
    informed decision making and
    recommendation by assessing uh the
    modalities reliability and applying
    different weights based on their pri
    prioritization as previously mentioned
    not all the modalities contribute to
    with the same weight in the final
    outcome uh depending on the conditions
    one might be ranked with a stronger
    priority in comparison with the others
    and moreover it finally uh provides a
    narrative generation for the cases under
    investigation uh allowing allowing also
    uh human intuition to intervene
    uh
    last uh the last key exploitable asset
    uh refers to the technology for
    unlocking mobile devices and R uh useful
    information that can be collected as
    evidence in specific uh cases such as
    terrorist that that demand uh instant
    access to the information by unlocking
    the uh phone and check uh the latest
    activity uh the problem is that uh Lo
    devices and encryption and encryption
    result uh in extended investigation
    times and uh manufacturers continuously
    improve security mechanism incorporating
    sophisticated and more protective uh
    features making unlocking and extracting
    data of mobile device uh a very big uh
    challenge so there is a strong need to
    be able to bypass user authentication
    mechanism on their mobile devices and uh
    although uh coly commercial Solutions
    are already uh available uh they require
    expertise or training and are licensed
    locked uh products that are limited to a
    minimum number of uh users so what we
    try and what we offer uh in tensor is an
    easy to use inexpensive tool that can be
    used uh by every law enforcement uh
    agency regardless of their expertise
    that is scalable out to a large number
    of potential users so uh that was all
    thank you for your
    attention thank you so much
    apostos okay uh we will move forward
    with a technical presentation from um
    flexi cross orestis yes so thank you
    very much for being the Flor just a
    second
    to share my screen
    can you see my screen uh we can see the
    presentation mode the one that you are
    seeing but it’s okay I guess I’m not
    sure yeah it’s okay okay uh thank you
    very much for giving me the floor it’s
    is our great pleasure for being here and
    at the same time we consider that it is
    a great privilege for us to
    with platform and having the opportunity
    to exchange ideas and exchange very
    useful experiences uh today will talk
    about the presentation of uh the
    technical models of flex
    cross in flexi
    cross uh we have uh three uscate board
    and Crossing Pilots the one is four
    phase trial located at the Port of
    Galati at Romania uh the other one is a
    road based trial uh located at the
    northern borders between Greece and
    Bulgaria at romano and the last one is
    it is a train based trial located at
    teski Romanian bobian border control
    Point uh which are the needs the border
    crossing needs we have identified the
    first one regards the enhancement of for
    security through realtime biometric
    check risk analysis the second on is
    related with smart solutions for traffic
    relief and security Advanced B tracking
    operations and uh the third one is uh
    how to streamline ra travel with an
    intelligent and secure F uh checking
    system what is our approach uh this is
    the envisioned uh flexr modules and
    system architecture as uh previously
    just have highlighted these are four
    layers uh in the first layer we have a d
    ingestion layer which combines the
    hardware components the sensors which
    are going to be used in the second one
    layer we have more or less a pattern
    recognition uh layer we have a crowd
    Behavior Analysis we have a vehicle data
    identities processing and classification
    or Vision processing module in the third
    one security border service layer uh
    this is mainly uh risk identifier model
    and last but not least we have a a
    the creation of a user uh friendly
    interface layer uh highlighting having a
    very uh useful analytical Dash cods and
    um and the opportunity to uh have a role
    based control access and control
    u i will mainly Focus my uh attention
    here in the data processing layer of
    course the final aim of our work is to
    provide a powerful and being speci for B
    uh surveillance providing and parallel
    vigilance against potential
    threads for this layer uh what we have
    achieved is an AI based patter
    recognition model uh we have uh achieved
    a an indispens fure extraction based on
    AI algorithm which enhance the feature
    extraction for and videos we have enable
    the identification of relevant patterns
    and structures and uh our second point
    is uh to achieve an object recognition
    and
    classification uh for that we have
    achieved an improved object recogition
    uh capability along with enhanced
    accuracy in identifying and classifying
    object with visual analysis and uh the
    third point is about the anomaly
    detection uh we are able to identify TR
    patterns or instances that they
    significantly from the nor and uh this
    is crucial for detecting irregularities
    outliers or potential threats in various
    uh data
    sets this is uh the the case in the G
    pilot in use case 2 where we have a
    computer analysis tool here you can see
    two videos uh the1 video on the left
    hand side is related with the
    identification of u-turn and the other
    one on the right hand side you can see
    that it is uh related with some loal
    paring uh what what are the capabilities
    uh as we can see we have uh the
    capability of vehicle identification
    classification uh along with the vehicle
    speed termination and as I said the
    U-turn and L parking
    events uh the
    results uh we uh we envision to exploit
    this uh this material in a web app uh
    based
    [Music]
    um
    say for authorities which are informed
    from the driving CP behavior and
    extractor loed
    statistics uh for the next slide here
    you can see uh a video uh combining
    footages from drone cameras exploring
    computer vision analysis tools the
    technical
    capabilities uh what is the context the
    system receives an output video uh from
    a drone camera and what we are able to
    do is H to detect persons and tracking
    by detection algorithms and uh finally
    to extract some features based on rule
    based uh approaches related the visual
    PN cases such as person running or
    person out of a bond as you can see uh
    here
    what are the results we also uh let say
    plan to use these uh Tools in uh
    webs for authorities and which are
    informed for the invol suspicious
    behavior for the next slide here we uh
    we talk about person detecting mod uh
    the technical
    capabilities uh are related with uh the
    uh the opportunity tracking uh number of
    people which are who are located in the
    train and uh analyzing them uh as uh
    Intruders uh what is the opportunity the
    opportunity is to uh inform long
    agencies and uh to act
    accordingly uh the Technologies which
    are used are utilized in these previous
    models can be summarized as integrated
    YOLO algorithms with
    Neal
    networks for the facal recognition
    modules uh what is our
    capability uh the system can receive an
    input picture taken from a mobile device
    for example and compare them with the
    database uh of IDs parts or passwords we
    can uh see uh the uh matching of of the
    photo with the ID and then
    uh inform the authorities uh about any
    uh arising
    inconsistencies
    and let’s
    did for the Biometrics
    detection uh the technical capability we
    have is that we have a well- defined
    model create data from extraction
    national ID
    cards uh for we have the uh opportunity
    of data Gathering and
    Analysis
    uh we are currently uh ex we currently
    extract from Romanian National IDs very
    useful
    features and uh finally what is our plan
    is to uh integrate this uh model with u
    web web apps based for authorities in
    order to act accordingly for these
    previous models uh of uh Civ Library
    were used
    and last I conclude my
    talk uh this is our uh these are our
    next steps uh for the midterm goals we
    have the development of the tools in the
    rest layers and for the longterm months
    uh this is about provision of a central
    flexi cross platform thank you very much
    for uh for your
    attention uh thank you so
    much thank thank you so much for the
    presentation um okay uh we will move now
    to odos and um we have Jo
    calapez hello good afternoon hi
    okay yes we can see okay perfect thank
    okay thank
    you okay okay so um theud sales um
    project aims at um providing a solution
    that delivers at the same time uh fast
    uh um border crossing processes both
    for travelers persons and vehicles while
    ensuring also high security levels
    providing informed decisions to border
    authorities and um uh insights on the on
    on the border crossing processes uh the
    focus is on land and sea borders um both
    for uh on the land borders including
    Railways and um and vehicle um
    uh border crossing points it integrates
    several uh technologies that uh provide
    um at different uh point in time
    interactions uh of Travelers and
    vehicles um with the with the system for
    that will be um processed by the the
    platform and the decision support system
    um for for an overal risk assessment and
    the decision on the water crossing um
    authorization or or
    refusal the Technologies um include so
    starting with the enrollment of
    Travelers there will be an application
    uh that will integrate um the creation
    of a digital identity uh following ik KO
    DTC uh standards creating both the
    virtual component and the physical
    component uh stored at the traveler
    mobile uh device and also um a
    continuous Behavior Authentication
    algorithm that will um monitor the the
    the usage of of the app of the user um
    the interaction with the app in terms of
    vehicle screening there are two main
    Technologies uh the X-ray Technologies
    for um vehicle scanning and um drones
    uavs uh equipped with thermal and high
    resolution cameras um the border
    crossing um process uh performed with
    the with the water control touch points
    and with um video um monitoring um
    faceless uh gdpr compliant TR travels
    counting and uh the overall decision the
    decision support system uh based on
    multimodal Fusion from the the input
    from the different systems um creating a
    decision uh and with the expl
    explainable AI to um inform on the why
    that decision was
    taken so go going a bit in detail into
    each of these Technologies so the
    creation of the digital and virtual
    passport um so Travelers will be using
    uh their mobile phones uh using um
    uploading the their uh travel Document
    uh capturing selfies with liess
    detection um so creating a a secure
    enrollment process um that will generate
    the digital identity um depending on the
    use cases it may be either directly
    shared with the with OD platform or as a
    DTC virtual component or it can also be
    stored uh on a wallet uh format in the
    app for um following the DTC uh physical
    component iO Digital travel credential
    physical component where the traveler
    holds the passport in his mobile device
    and presents it uh to the Border uh
    Crossing Point um and controlling where
    when when to present that um that
    information
    uh this will this allows for um
    anticipation of the risk assessment uh
    before the traveler uh reaches the the
    border crossing point uh not only with
    the enrollment but also with the
    registration of of travel so border
    authorities will be informed uh this
    especially at the land borders uh land
    NC borders not being subject to other
    regulations from the airline industry
    where airlines are required to present
    that information through the advanced
    passenger information and P&R in this
    case border forces will get Advanced um
    information also through this this
    channel a second component to secure the
    uh the the the enrollment and digital
    identity um app is the AI continuous
    behavioral authentication that um is
    able to authenticate the usage of of of
    the wallet by um assessing uh the
    behavioral patterns and uh creating
    generating a risk score that allows uh
    the system to platform to authenticate
    that it’s actually the actual user who
    is uh interacting and accessing the the
    wallet application so this is for the
    enrollment uh part then moving to the
    vehicle um scanning um so uh there will
    be we’ll have
    [Music]
    the uh x-ray technology uh focused on uh
    um well at the same time having a safe
    the safest possible uh technology so
    with a very low uh exposure to uh to
    x-rays to to to avoid any risk any
    health risks uh but also enabling um
    scanning off vehicles in movement uh and
    this applies both to
    uh cars vehicles but also to to trains
    um so the the the technology is in
    progress in uh in order to to to achieve
    this combination of uh vehicle in move
    but uh low uh very low exposure to to to
    radiation um and also uh enhancing the
    the the detection of um of risk of
    threats uh based on the on the image of
    on the x-ray images detecting um um
    substances vehicles uh uh guns and any
    kind of um threat that may may be
    present at the while the vehicle is
    being um
    checked second Technologies linked to
    the to the vehicle scanning is the use
    of um uavs equipped with thermal and um
    high resolution cameras uh that will be
    um as as the vehicle is uh approaching
    uh the water crossing point the the uavs
    will be will be um flying uh around the
    the vehicles again allowing for uh move
    Vehicles not to not be required to stop
    uh to be to be checked um and uh the the
    the output of these uh of these images
    being uh provided to um to the DSs for
    uh for for AI algorithms to uh run on
    detection of different uh situations
    such as uh detecting U number of people
    inside the the vehicle detecting um
    vehicle modifications uh and a few other
    use cases that are may be relevant to
    the border control
    authorities then moving from the uh
    vehicles to The Travelers border control
    um so for the for the actual border
    crossing of the Travelers uh based on
    the enrollment they’ve provided via the
    uh enrollment app um the technology will
    uh be focusing on um implementing uh
    under move uh face capture and
    identification of Travelers against the
    gallery of registered pre-registered
    Travelers um and uh already getting
    receiving the the the feedback from the
    decision support system on the on the
    risk uh assessment and the the the
    authorization for the traveler to to
    cross the boorder um also another
    Innovation on this use case is the use
    of the DTC PC the digital travel
    credentials physical component following
    I specifications um as what there were
    very recently uh published and the where
    the traveler presents the the virtual
    passport started on his mobile phone uh
    rather than uh his physical uh
    passport second uh technology uh focus
    on The Travelers border crossing
    scenario is um the monitoring of the of
    the actual border crossing point uh
    through the use of um cameras installed
    on different um different positions
    either indoor or outdoor um and with the
    video streams being analyzed by um by
    the the by certain algorithms that can
    uh perform different use cases such as
    counting of objects or persons inside in
    specific areas detect the entrance in in
    Forbidden areas and uh um raising alarms
    on that case uh detecting left uh
    objects or on on on specific areas uh
    also assessing the the Q side and dwell
    time for um for example to inform the
    Border authorities that eventually uh
    additional resources would be would be
    uh would be good to as as the cues are
    increasing and the the waiting time is
    is getting bigger um all of this video
    stream is provided to the DSs um and
    again where od’s platform processes all
    the all information it provides the
    feedback to
    the Border authorities
    then the uh multimodal fusion and
    decision support system so at the core
    of the odos platform um is this this DSS
    that uh receives the input from the
    multiple
    Technologies um applying AI models to to
    to perform the the the risk assessment
    and detection of um of threats and uh to
    um of potential potential risk to be to
    be communicated to to the Border forces
    also deciding on the on the outcome of
    the transaction to to allow the bo the
    travel to cross the boorder or not and
    also to to to provide other other
    information so to the Border authorities
    this is supported by expain AI uh
    basically to um to show the why why
    certain decision was uh was was taken uh
    by the by the machine learning uh
    algorithms uh in case of in case um the
    board enforcement wishes to to explore
    um certain certain feedback from the DSs
    for specific uh
    situation so these are the different
    technologies that will be integrated
    into the OD platform so the the platform
    will integrate all of this
    um it will deliver the different modules
    that will allow uh the Consortium to to
    perform the pilot at at the different
    scenarios presented by by Dan um earlier
    either at both at um land and water um
    scenarios um the platform will also
    provide uh customer um customer facing
    um interface interfaces to to the Border
    force and to the to the passengers um to
    the citizens uh for for for the based on
    on the DSs results and on the on the
    risk assessment and also produce uh
    reports and vistion and and analytics uh
    based on the follow after the the border
    crossing and aggregating
    the data from multiple um from certain
    certain
    period so this is um the presentation
    for oos if there are any questions I’ll
    be happen to present thank you thank you
    so much for the presentation super um
    now we will move to technical
    presentation of AOS and Manuel please
    feel free to share the screen okay just
    give me a second
    yes we can see your screen okay I’m
    going to
    the okay this is a very short uh
    explanation about the AOS technological
    approach to our problem that as cost
    cost explained is a deep fake
    detection this is the the the
    technological part there are more more
    than deep fakes there are also bot Nets
    and AIO fakes but we’re going to explain
    that in this is table of confence I’m
    going to go to go very fast through them
    because I know we have delayed well this
    is the first one uh the strategy that
    ethos has chosen for for this technical
    challenge we studied several approaches
    several different algorithms and we
    finally decided to go for the
    Expressions analysis
    because we have the hope that it will be
    independent of uh the technology used in
    the future by the
    fakers and it’s also independent of the
    different kind of techniques that that
    basically to phase synthesis which is an
    artificial phas or face cloning which is
    cloning a real person’s face with this
    approach we are going to compare a
    natural expressions of of the victim
    with the suspicious video so we can uh
    determine the certain patterns in in the
    facial expressions of the victim are
    present in the video or not all in an
    automatic way
    and we have the hope that this is an
    independent absolutely independent
    approach from technology since it’s
    based in in human human expressions and
    probably in the future no matter how
    good are the the evolution of the fake
    technology uh they are not going to to
    capture the the the richness of facial
    expressions and that our
    hope so how are we getting this micro
    expressions from from the phase uh very
    quick first of all we detect the phase
    with two different algorithms the first
    one on the left is just to uh is very
    quick we determine only five points at
    the center of the eyes nose and mouth
    and is used only to align the pH
    vertically in order to do our own
    analysis there is also a a more
    complicated algorithm that gets 500
    points from a phase and is used to gain
    a
    3D uh shape of a mesh of of the face I I
    don’t want to go into very detailed uh
    terminology using this uh this very
    detailed fishh mesh sorry uh uh we can
    uh extract with a a temporal analysis of
    the different positions of mouth eyes
    nose and
    eyebrows Etc we can get different
    gestures which psychologists call Action
    units there are much more action units
    that those that are present in the
    screen this is just an example of the
    kind of micro expression that we can get
    from uh this three-dimensional mesh like
    uh moving up the the inner eyb the
    moving up the
    chin closing the eyes wing in ETC each
    uh action units each expression is is
    calculated in five levels of uh
    intensity that from a to
    e also the the head orientation and the
    Gaze orientation of the eyes is
    calculated in order to be compared with
    the natural motion of the
    victim we record a video of the victim
    and we compare the natural motion the
    natural motion of of of the head and and
    the Gaze of the person with the uh video
    fake they normally uh doesn’t match is a
    is a very good
    clue
    also a new part of
    the video fake detection is audio which
    is made by one of the participants in
    the Consortium also in Spain uh the
    effect detection is is based on and
    trying to detect tricks on the audio
    like edited
    audio uh if you cut and past some parts
    of the audio doing a microanalysis this
    this Edition can be detected because the
    the the sound wave is not absolutely
    continuous and and there is a discontinu
    in in this part like mro changes in the
    background noise Etc it’s also based the
    in detection of a natural voice
    synthesized voice is very good nowadays
    but still can be detected and
    differentiated from natural voice and
    clone voice which is the most dangerous
    one because based on a real person voice
    they can clone and create an artificial
    imitation that is very good but still
    detectable
    also a part of the project is detecting
    bot Nets which are being used for
    criminal purpose and in order to do that
    we we use uh web Technologies like
    crawlers that are kind of spiders that
    are just crawling con con constantly the
    The Social Network in order to do that
    we have to access the API of the network
    and use this these mentioned
    Technologies and I would like to do a
    very quick
    demonstration of about how easy is to
    create a a de
    fake can we see my my face in in the
    screen right now
    yes okay what do you think about this is
    this the real Manuel or is
    this what do you
    think or maybe this one much
    younger the face is three-dimensional
    it’s integrated in my body also for the
    older version of
    me oh my God actually this is based in a
    very popular actor called stany Tui
    maybe you recognize some parts of the of
    phas it’s three-dimensional and it’s so
    easy to do it I just prepared it uh this
    morning it took me half an hour or so
    it’s based only in one one picture of
    the of the
    person that’s great that’s interesting
    Manuel this is the real
    me it’s even scaring sorry yeah it’s
    scaring how easy is to do it
    exactly and
    finally I think there was a final
    a final slide but just thank you for
    your attention Etc so that’s thank you
    so much Manuel for also demonstrating is
    very indeed it’s it’s interesting how
    easy things can be it’s really scaring
    because you just need a normal computer
    and a picture of a person you can you
    can get it okay really worrying it’s a
    real problem
    indeed okay and that’s why we are here
    to tackle all all these um threats and
    find
    Solutions uh okay so now we finalized
    with the technical uh
    presentations so we will have a 10
    minutes break for you to I don’t know
    grab a coffee and see you um at 38
    minutes so it’s 338 I guess
    um and then we will continue with the
    exploitation activities
    and please please make sure or if you
    can stretch uh the presentation for the
    exploitation in five minutes that would
    be great uh so see you in uh in 10
    minutes thank
    [Music]
    you
    e
    e
    e
    e
    e
    e
    e
    e e
    [Music]
    e
    e
    e
    e
    e
    e
    e e
    okay uh I guess uh you enjoyed the
    little break so uh hope everyone is
    back so um continue with our agenda we
    are in the next segment uh the
    exploitation activities we will cover
    strategic initiatives and collaborative
    efforts aim to maximize the impact of
    our research outcome so from the market
    analysis to commercialization
    strategies uh our expectation activities
    are focused in driving tangible results
    and size social uh benefits so
    um given the fact that some projects are
    you know at the beginning of the second
    year um let’s say these are activities
    on Art um we will have a ini you know uh
    information about uh this approach so we
    will start with panayotis from tenzo and
    he will present the exploitation
    activities uh for the
    project please feel free to share the
    screen yes good afternoon
    everyone uh let me share my screen
    so can you see my
    screen uh not yet not
    yet
    okay you can see me now and yes we can
    see your screen thank you
    okay so my name is panagot papan I
    represent tensor consorti fanus
    Consulting and actually we have the
    pleasure and the honor to deal with the
    EXP exploitation management of uh of
    tensor project so I’ll try to be brief
    as you asked Anna ER and uh this is a
    actually an activity within the
    framework of the project that uh just
    started as you very correctly
    mentioned so the objectives as described
    from the DOA is of course to identify
    the exploitation potential of produce
    result by all project Partners this is
    actually the point of the uh in the
    exact point of in which research uh
    meets the
    market that’s why uh we will uh have
    plan to assess the Market Outlook and
    perform the technoeconomic analysis
    required in order to uh see elements of
    commercialization in the use of tensor
    developed technology to ensure the
    efficient and continuous management of
    the ibrs and of course to identify and
    analyze the Innovation potential of
    tensor now there are two major pillars
    of expected outcomes the one is what you
    can see now regarding the impact enh
    enhancement the market analysis and the
    business model ER by this analysis and
    uh the analysis of possible business
    models this will lead eventually to the
    actual exploitation of the tenser result
    and will actually provide the the the
    necessary guidelines for the definition
    of the business plan uh of course to
    identify barriers and conditions
    existing in in the market and the
    preparation of uh the partners uh
    exploitation plans the the other major
    pillar is uh regarding IPR and
    Innovation management uh and if in uh
    the expected outcomes the first pillar
    the keyword might be sustainability here
    the keyword is
    safeguarding uh safeguarding IPR through
    ped submission and implementation of
    creative ideas and of course uh
    monitoring constant monitoring of uh the
    Emerging Market opportunities via the
    strength weaknesses opportunity and
    threats as well as political economic
    social and technological factor analysis
    now it’s very crucial to identify to
    find the reg any potential regul
    regulatory constraints and opportunities
    for placing tens Innovations and to and
    to identify the relevant stakeholders
    through Innovation Workshop there is a
    plan for every for six-month reporting
    regarding this uh related activities
    which is very crucial not only to for
    identification but for steer Wheeling of
    uh the expected outcomes now uh steps
    that has took place so far is that uh
    market analysis questionnaire was
    prepared in month 13 with actually the
    initialization of this uh task and uh
    there was the there was a distributed
    questionnaire to Partners at uh month 14
    now this focus on market dynamics
    competitor and business models we are
    actually in the current process of of uh
    of taking the proc results and analyze
    market trends demands and gaps uh to
    develop clear value proposition for
    exploitable results and uh This Will
    turns out to to be provision to the
    partners uh relevant to their
    exploitation plans and the IPR aspects
    with a questionnaire at month 14 now the
    first version will be completed on month
    15 for the market analysis as well as
    the individual exploitation plans in
    order to provide any IPR details that
    may occur and this of course will go up
    to every six month update regarding the
    market analysis and the exploitation
    plan now this is a sample of the of the
    questioner template that uh we use uh in
    order to collect our feedback uh with
    some sample uh answers here and uh since
    uh by the actual creation of uh and that
    happens in in every project in every
    Reser project when uh the uh
    dissemination exploitation plan it is uh
    let’s say uh it is ready uh and it is
    uh submitted let’s use that term that
    technical term then there there are
    actually elements of what is of what the
    exploitation uh P plan and Analysis will
    be like so uh we consider the fact that
    uh exploiting The Horizon results
    platform uh in order to revisit
    technology offerings for exploitable
    assets to reassess any potential based
    on lat markting Trend and extend the
    list to include non- Technical and
    tangible outcomes will uh will further
    help project to identify the post key
    exploitable results upon this platform
    up to now we had already first already
    made uh first contact with uh the
    Horizon results booster uh collecting
    the preliminary inputs on task at month
    13 and uh we plan to leverage this uh
    this uh tool provided by European
    Commission in a specifically utilizing
    the module C uh and
    uh which is has to do with assisting
    projects as may see to enhance their
    existing exploitation strategy to create
    a part of portfolio disin exploitation
    strategy and to focus on key exploitable
    results as offered from The Horizon
    result
    boosters booster and then uh by this way
    uh of course uh as other project we’re
    seeing the the the appropriate guidance
    from this very useful tool of the
    European commission uh and focus to
    optimiz to focus to optimize the
    approach of reaching the market it is
    very essential in uh terms of
    uh turning any uh result that are
    produced within the framework of teso
    project uh reachable to the market
    because actually it it is a reciprocal
    uh let’s say action and uh of course to
    emphasize on the collaboration uh with
    the Horizon strategic strategic booster
    for strategic uh
    refinement so the after this uh The
    Leverage business plan development which
    is another hrb service will be used and
    uh we will be able to guide the partners
    in the best possible way or for uh the
    optimal business plan and at the last
    but not least to facilitate which is the
    the very essence of exploitation to
    facilitate any project result uh and
    each transition to the market now uh
    there is let’s say somehow a road map
    with some drone steps uh guiding to the
    exploitation management we are here on
    the market March 12 with our fcbm
    Workshop so by by the end of the of
    March we will merging we’ll be merging
    all the inputs and uh then uh we will
    proceed uh during April with
    exploitation strategy seminar and after
    that uh we will proceed to the market
    analysis and the business plan that was
    from my side thank you very much for
    your attention and if there are any
    questions I’m very glad to answer thank
    you so much panayotis um for presenting
    tensor exploitation activities um we
    will move forward now with Flexi cross
    and Thomas please feel free to share the
    screen yes hello Yana hello everybody uh
    thank you uh for this lovely Workshop
    that is really very
    fruitful let me just share my screen
    quickly okay so can you see my screen
    yes okay uh so my name is Tomas asra I’m
    representing ebos uh and
    anme um in Cyprus uh we are part of uh
    of the flex secross projects and we are
    leading the dissemination communication
    and exploitation activities
    okay the dissemination communication and
    exploitation road map uh is uh divided
    into three phases the first phase that
    uh already started and almost finished
    which is to build the footprint for uh
    for the project in terms of uh project
    websites social media presence on many
    uh platforms to raise the awareness of
    uh of the project to uh show the people
    that the project are uh is exist what is
    the objective what we aim to do uh what
    is the expected outcome uh then we will
    move to the phase two which is
    continuing the uh awareness raising
    approach uh and moving to the
    stakeholder engagement where we will
    engage stakeholders within the uh uh
    border management uh uh industry let’s
    say and to expose the project and to
    make joint activities with other
    projects and other clusters to make uh
    the best of all the res search that is
    being done within flexi cross projects
    and other projects as well and the phase
    three which is uh uh the last phase uh
    where we uh start working on the
    capacity building and impact generation
    uh uh uh to gather all the uh
    experiences and challenges that were
    faced and uh uh uh uh raised during the
    project and to uh uh uh give it to the
    Border management
    authorities uh to make impact and to
    train them and give them some uh
    insights now the timeline it’s divided
    into three we started in 2023 which is
    which was the phase one as well where we
    did many uh uh participation in
    Symposium and F we will see it in the
    next slides and a technical Workshop as
    well that we started uh uh internally uh
    at the beginning then in 2024 which
    started already uh where we we’re going
    to move further with the technical
    Workshop uh uh externally with other
    similar projects and other clusters
    where we can share the the experience
    that we we are uh we are gaining uh to
    start making trainings tutorials
    webinars uh to the authorities to the
    Border management Personnel uh we are uh
    we already started doing newsletters and
    press releases to engage the audience uh
    uh with with the advancement with the
    findings with the the results of the
    projects that we are uh generating and
    in 2025 we will continue for sure with
    the technical workshops and the physical
    trainings webinars and pilot trials and
    this is the main uh fruit of of the of
    the project uh at the end which is the
    three Trias that gppe introduced uh
    during the first phase of the
    workshop uh th sorry to interrupt can we
    you have done a presentation can we skip
    the dissemination communication and just
    only focus on the
    exploitation okay thank you so much okay
    so this is like uh uh let’s say the uh
    exploitation in terms of synergies and
    Joint activities with the other project
    and clusters where we’re going to be
    publishing uh uh in peerreview journals
    and Technical Publications uh uh along
    with other uh other projects as well
    we’re going to do Workshop similar to
    the one that we’re doing uh today as
    well with tutorials and webinars we’re
    going to have many exhibitions as well
    in scientific conferences industrial
    exhibitions and Symposium and the
    general uh spreading with the relevant
    actions now for the exploitation the
    exploitation strategy that we have is
    divided into two which is the first one
    is the commercialization which is
    divided into market and Trend analysis
    Target user and competitors joint
    exploitation plan and business model so
    what we started is what we generated
    each partner uh uh from his side like a
    proprietary uh exploitation plan and we
    studied the market and the target uh
    Target users and competitors and now we
    aim to jointly uh develop one uh
    exploitation plan to be used for uh for
    the generation of the final business
    model and the second is the intellectual
    property right that we started already
    since the beginning of the project where
    we uh defined all the uh uh let’s say
    the background iprs or all the uh
    copyrights that all the partners has and
    we are uh during the um let’s say the
    development that is ongoing during the
    project some foreground on some new uh
    uh copyrights may arise that need to be
    uh uh let’s say uh
    safe this is the achievement so far
    where we put until like December 2023 we
    developed the market and Trend analysis
    and the
    competitors uh uh and we uh as I said we
    will continue further until uh July 25
    to develop the joint exploitation plan
    and the final business
    model uh during the exploitation and the
    the the work that is ongoing now uh we
    defined the sector performance where we
    uh uh realized that the sector revenue
    of the overall uh uh sector uh there was
    a growth from 2011 until 2018 with a
    small drop between 2014 and uh 2012 and
    14 due to the international economic
    slowdown and we realized also that from
    2011 to 2020 the number of Enterprise
    operating in the security system uh
    service activities has also grown in the
    EU and the countries of the flexi cross
    Partners so this is an indication that
    this industry is growing and where uh uh
    we need to put more more efforts and
    more research within this uh this
    industry to uh
    follow now for the border security
    market and customer segments we realized
    that we have a a a different segment or
    we we uh divided the market into three
    uh segments let’s say it was uh it could
    be divided by approach which is could be
    by threat based approach and Factor
    based approach or by environment could
    be ground aerial or underwater based on
    the uh application that we’re doing
    within the project and last by system
    which is uh the system that we’re going
    to be developing or using uh uh within
    the project and the second is the
    customer segment we Define the customer
    segments of the project or the end users
    as well uh we Define the Border uh
    control authorities Leia military bodies
    crisis management authorities and so on
    WE Define the agencies involved in
    Border operation frontex the critical
    infrastructure protection and other
    agencies as
    well and here we can see the joint plan
    and the business model uh The Joint plan
    as I said we developed each and every
    partner an individual exploitation plan
    which will be used as material to uh uh
    uh the final joint exploitation plan uh
    uh we have the key EXP the exploitable
    results that we are achieving within the
    project and in parallel uh as I said we
    have the IPR rights to uh uh secure the
    findings and the research and the
    results that uh project partners are
    developing and uh the last one is that
    this uh we we adopted the lean canvas
    business model where we are working on
    the unique value proposition of the
    project and to find what are the
    solution uh that that we are uh uh and
    the features that we are uh giving
    within the project and what are the
    customer segments and late and lastly to
    to have like a cost structure and
    revenue streams for the final project
    for the
    commercialization uh
    part that’s and thank you that’s great
    thank you Thomas so much for the
    presentation okay um moving next to ois
    and
    Jo hi hello everybody
    um please let me know if you can see you
    can see your screen super thank you
    thank you so my name is Jona I’m from
    vision box vision box is the
    exploitation manager of
    Odus
    um so we I’m going to speak about the
    exploitation activities uh that are
    going to take place uh in the scope
    within the scope of the project
    so the tasks that uh Encompass the
    exploitation activities are U impact
    enhancement market analysis and business
    modeling IPR and Innovation management
    contribution to existing Border
    Protection policies and regulations and
    impact on operational standards and
    standardization activities so we are uh
    at the beginning of month 15 uh of the
    Odus project you can see that all these
    tasks start Ed on month 13 apart from
    tasks of the contribution to existing
    Border Protection that is going to start
    on month 24 so we have just started the
    exploitation activities and so there is
    no um tangible outputs that I can show
    yet but I’m going to speak a bit about
    the planned activities exploitation
    activities for the
    project so we have three
    deliverables um that are related to
    exploitation we have the first version
    of the dissemination communication
    exploitation in stakeholders engagement
    report this deliverable was already
    submitted and it has a first draft of
    the exploitation strategy then we’ll
    have the delal the second delal impact
    enhancement Innovation management
    standardization activities and policy
    recommendations this deliverable will
    compile all the inputs from
    um that will be the result of all the
    exploitation activities carried out
    throughout the
    project and then we will have the final
    version of the dissemination
    communication exploitation and
    stakeholders engagement report where we
    will
    um have the final version of our
    exploitation
    strategy so the starting with the
    exploitation activities we first had to
    identify the exploitable assets and the
    ownership of those assets so we have
    identified eight U exploitable assets
    that are going to be the Technologies
    developed uh within the scope of the
    project so we have simulus identity
    verification in Border
    Crossing uh digital and virtual passport
    AI powered continuous behavioral
    authentication non OB obstrusive and
    safe x-ray Technologies for vehicle
    scanning
    UAV assisted vehicle scanning based on
    thermal and high resolution cameras The
    Faceless gdpr compliant travels counting
    multimodal fusion and decision support
    system and X AI for privacy and Trust
    enhancement so this has been have been
    all um described by my colleague uh at
    the technical
    presentation and of course who will uh
    exploit these assets the primarily it
    will be the partners that are developing
    um the Technologies and also the end
    users so the police the Border policies
    and other legal en enforcement agencies
    and also governmental bodies and the
    European Union and standardization
    bodies so as exploitation activities we
    will uh build a business plan and sales
    impact for each of uh the individual
    partners and also for the joint
    Consortium as a whole so we are going to
    do a state-of-the-art analysis to see uh
    what is already uh in the market and
    what are the alternatives to the Odus
    Technologies we’ll make an a competitor
    analysis to see who is selling
    alternative Technologies um to the to
    the Odus and
    then we’ll do Market segmentations where
    we will identify which are our um
    potential clients customers uh which
    will of course be end users like police
    borders uh sea and land um and other
    other uh possible customers then we will
    make a projection of Revenue and costs
    so which how much revenue will the
    partners generate by selling future
    selling these Technologies and what will
    be the cost projections in terms of
    implementation costs Hardware costs
    labor costs and also um do a go to
    market strategy where we will after
    doing the mark segmentation select the
    channels uh for which we will um Reach
    the the potential clients um and also
    what is the message that we want to pass
    through the clients in order to make
    sure that our Technologies are going to
    be selected for for them to use uh for
    uh border
    control also we will uh conduct some um
    intellectual property uh activities uh
    we will conduct a global search against
    a prior art for potential invention
    trademarks and other iprs to make sure
    that there is no overlap overlapping
    technologies that will prevent us from
    uh protecting our um intellectual
    property uh and we will uh protect our
    intellectual property by by uh
    submitting patent so we have committed
    uh in our grant agreement to submit uh a
    minimum of of two
    pents we will also perform a SWAT Matrix
    to identify the strengths weaknesses
    opportunities and threats of our uh
    exploitable assets and also do an
    analysis uh a pel analysis to identify
    external factors uh that might impact
    the future exploitation of our
    Technologies so other activities so we
    will
    um Define how will the Odus Technologies
    keep being developed in the future and
    by whom uh to we will do this to
    guarantee that the there is a future
    exploitation potential in all the
    Technologies and for that the
    technologies have to and keep being
    developed
    continuously we’ll also um release some
    scientific Publications which will be a
    scientific contribution for the uh
    scientific
    community and we also do some
    standardization activities as
    recommendations to the Border guard
    authorities and law enforcement agencies
    prepare a concrete plan to submit
    contributions to relevant
    standardization forums and bodies and
    monitor the standard organizations
    relevant to odcs
    [Music]
    um so that’s all for me I don’t know if
    you have any question questions thank
    you Jo thank you so much for the
    presentation of what you say was
    exploitation
    activities and um now we will um have
    the presentation from Athos uh
    Marie yes hello good afternoon everybody
    so I will share my
    screen and can you see it yes we can see
    your
    screen yeah okay
    good um so I will present the
    exploitation activity of of etos as uh
    already uh mentioned by U by ctis we are
    in the middle of the project so it mean
    that we have spent a lot of time in
    setting up uh the main feature of of
    etas and now we are starting to work on
    on exploitation
    uh so I will mention uh the route for
    the uh development and exploitation of
    our results the activities that we are
    uring and the stakeholders we are
    dealing
    with so for the exportable results um in
    fact as already mentioned uh our project
    is a bit specific because uh we’ve got
    two different types of activity in fact
    uh we’ve got the observatory on online
    identity set theft uh on this
    Observatory is meant for the public uh
    so for for the citizen uh for the
    victims and uh we are developing
    different activities under this uh like
    games quiz Comics awareness campaign um
    definition article um uh frequently
    asked questions and we want to uh relay
    and support some other existing campaign
    and then uh as also developed by by uel
    we are veloping some tools uh for the LA
    um so the the fake NE the fake B net
    detection the knowledge extraction and
    deep fake detection both audio and video
    and so these tools um are really uh for
    the LA and we are doing specific
    training uh for them uh and uh we have a
    clear cut between these two side of the
    projects
    I don’t
    know yes so now for our
    activities um what we are doing uh as I
    mentioned already we are uh here I’m
    mixing a bit dissemination communication
    and exploitation so uh we’re organizing
    campaign and large webinar uh to
    increase the prevention to raise
    awareness to provide support to the
    victim we are doing some clustering
    activities with other fct projects um
    also with other uh law enforcement uh
    authorities we’ve got dedicated webinars
    for uh the AL to increase their
    expertise and to get also their feedback
    in order to better uh torade our own
    tools and regarding exploitation um we
    are now at a stage where we are defining
    our key exploitation uh results so we
    are in the car ization phase of these
    results um and Our intention is to apply
    to service one of the Orizon research
    booster for exploitation so um to uh to
    apply for the exploitation
    strategy um in the coming in the coming
    weeks and then later on one will be in
    the last year of the project uh to go a
    step further and to go for the service
    two of the booster for the business plan
    development
    um
    and as I said um it might be um easier
    uh when we have the different solution
    provider for the different tools um for
    the observatory itself it’s like uh an
    observatory for the benefit of the
    society uh and then we will have to to
    enter more into uh political or societal
    uh discussion on who could manage and
    could who could continue and sustain The
    Observatory so uh we have these two
    Dimensions that are uh totally different
    I would
    say and you will see that uh with uh our
    stakeholders we are dealing with um so
    we’ve got the public uh so we’ve got uh
    citizen consumer Banks children
    associations um so we are uh trying to
    to work with different Networks
    uh of uh representing this different uh
    type of uh public uh we are working with
    the low enforcement authorities So
    within our project we’ve got of course
    some law enforcement authorities but we
    try to go uh broader and to engage with
    more uh law enforcement
    Authority
    um we saw that um they are very
    interested in uh in having new tools uh
    but they’re also very interested in um
    getting more knowledge on the impact on
    victim because it is something that is
    less uh there is less research on this
    aspect um and we are working also on the
    impact uh on evidence recognition and
    also legislative instrument
    participating in some uh consultation at
    you level uh we are dealing uh with
    different player at you level like GGO
    SEO European Parliament Ena and National
    player cyber security expert private
    company and National stakeholders so um
    for us the exploitation part of etos is
    um is really twofold uh we will do uh
    for uh the different tools all all that
    has been mentioned before uh with other
    project it means uh the IPR policy uh
    exploitation uh strategy um and we’ll
    use uh the very um good Services
    provided by by the booster um but we
    have also the political Dimension um
    that uh will take also a lot of part of
    our energy for
    exploitation so I try to make it short
    because I know that I am the last one so
    it’s thank you so much Mar I really
    appreciate thank you for considering the
    time as well so thank you for the
    presentation um all right uh then we are
    continue our journey through today’s
    Workshop
    with um an imperative let’s say reflect
    on the ethical and policy dimension for
    our
    projects um so obviously we are
    promoting Innovation but at the same
    time we need to protect the fundamental
    rights right so um let’s move forward
    with the presentation that we have for
    tenzor so
    Mara uh yes sorry could we anticipate uh
    engineering Flex cross presentation
    just because of another obligation of
    the colleague if
    possible uh okay yeah sure okay so we
    will have first flexi cross and then
    tenser sorry thank you thank you very
    much for understanding please let
    me
    um can you see the can you see my screen
    yes okay one second uh okay I will um
    will continue with u presenting the
    legal and ethical considerations in um
    in flexi
    cross um so uh the approach uh that we
    have um used in the in the in our
    project uh was on the one one hand to uh
    to have um project legal gender and
    ethics manual and on the other hand uh
    there were the ethics requirements that
    the project were was identified with and
    um the two have complemented each other
    other and uh so on the one hand we have
    addressed the issues of the involvement
    of humans processing of personal data um
    third countries um Partners from third
    countries present in the project in the
    Consortium health and safety uh at work
    and artificial intelligence while um in
    the manual it was um further detailed um
    this um ethics requirement um um address
    the issues related to artificial
    intelligence biometric techniques
    blockchain and personal data uh the
    whole approach was um
    um uh supported by the by an Ethics
    board with two members with two internal
    members and One external who initially
    supported the Consortium in identifying
    the requirements defining uh procedures
    uh um action points uh and uh further
    further on um uh focus and is now
    focusing more in monitoring and
    supporting the partners in the adopting
    and implementing this requirements in in
    concrete um as a as a legal and ethics
    compliance uh road map we have um the
    first phase in which we uh dedicated our
    time
    in um um analyzing the legal and um
    ethics framework applicable to flex
    across uh defining the ethics governance
    framework um uh prepare the foundational
    procedures for the adherence to the
    research policy principles we have
    prepared consultative checklist uh
    Define the guidelines uh requirements
    and recommendations uh to the partners
    and prepar the number of templates to be
    as a support uh during the project
    lifetime the second phase was uh um and
    is now more on um implementing uh This
    legal and ethical requirement uh
    performing aware Ness and training
    campaigns uh support the the the
    Consortium um in complying with the
    legal and ethics framework and also
    perform constant monitoring activities
    the last phase will focus on uh um
    completing the uh the ethics and the
    legal manual uh update the the legal and
    ethical framework um identify the gaps
    in the current legisl legislations and
    also provide further recommendations for
    law enforcement um uh authorities
    uh again this um each phase of this is
    being um um reviewed by our um external
    ethics advisor which on the one hand
    looks in in what we have performed and
    provides um additional suggestion
    recommendations to be um um included in
    the in the in the following uh following
    phase um as um ethical challenges and
    concerns that we had to face and some of
    them you have addressed already others
    are being are still being handled uh is
    on the one hand the human involvement
    invalidation and trial facing real
    operational
    conditions uh there was also the risk of
    processing extensive amount of personal
    data including special categories of
    personal data and profiling
    activities um we also have the AI
    act it’s final final draft and its
    impact on the flexi cross tool kit uh
    the use of biometric techniques like uh
    facial recognition and fingerprints and
    the implementation and EST establishment
    of a framework for privacy and secure
    data processing with the use of
    blockchain Technology uh compliant with
    uh the gdpr so as I mentioned some of
    these aspects were already addressed
    others are being um um further um um
    elaborated like the AI act which finally
    uh we have um it’s um an informal final
    um fin version and uh and now we are
    planning to organize on the one hand
    some awareness um sessions with the
    researchers to inform them about the the
    content and the the requirements under
    um this new regulation but also in
    looking into the the tools and solutions
    of flexy cross and uh assess if there if
    any of each of them falls under the
    prohibition uh practices of if there are
    high risks how uh how they need to be uh
    adapted or which measures actions need
    to be included in order to make sure
    they will be eventually compliant also
    with the AI
    act so this is um from my side and um
    this was the approach that we have used
    um and we are using during the in the in
    the flex cross from an legal ethical
    point of view thank you Yana for your
    presentation okay uh now we we will move
    with the tensor presentation for the
    ethics and policy actions please Martha
    if you wouldd like to share the
    screen
    [Music]
    yes can you see my
    screen no not
    yet okay I don’t know why because I want
    to
    open Mara you still with us
    um maybe she has some connections
    problem so okay let’s move with
    OD and
    Marina yes I’m here so let me just share
    thank
    you okay can you confirm if you see
    something yes we can see we can see
    screen okay perfect so uh um good
    afternoon everyone I’m Marin and I’m the
    athetics advisor uh and I am a research
    fellow at The Institute of international
    sociology of Gia which is a of course
    project partner of um o sales so the uh
    I would like to just you know respecting
    the time but also you know um present uh
    the Odis uh data protection and ethics
    framework and uh what is behind in terms
    of conceptual and management frame
    framework and what the activities
    procedures and outputs we have done so
    far uh in terms of the um ethics and
    data protection framework we have
    established a sort of a structure uh
    that is composed of three pillars the
    first one as you can see is the
    conceptual and management framework uh
    which is uh actually which includes all
    the bodies and governance actors that
    are involved in the uh in the odos
    framework and uh of course the
    principles and we are obliged to uh to
    follow during the course of the project
    the second pillar is are the procedures
    and we have adopted several of kind of
    Assessments and procedure for evaluation
    and monitoring of U all the requirements
    that should be met in terms of Ethics uh
    within the project and uh the third
    pillar is the activities and outputs uh
    meaning events uh any kind of workshops
    that we have done and of course the
    documents outputs of uh of our work so I
    will uh present briefly all these three
    segments or these three pillars and uh
    the details within when it comes to the
    first one so of course we we have a data
    governance structure and uh we are uh
    mainly following the data management uh
    principles uh that you can see such as
    Fair dat data data quality assurance uh
    minimization anization ptimization uh we
    use informed consent when uh whenever
    research activity involves human
    particip ANS uh and of course we make
    sure that all the there is an adequate
    backup storage capacity and access
    control of of the data and the
    documentations that we’re circulating
    within the project um when it comes to
    all the actors that are involved well
    there are two uh let’s say levels the
    the first one is the project level where
    we have the ethics advisor that will be
    me me and the external independent tics
    board which is composed of two external
    experts project coordinator and the
    security advisory uh board uh I should
    mention here that there is an etics
    board as well uh and the ethics board is
    actually composed of um the two
    externals and uh uh three internal
    members uh of the Consortium including
    myself at the partner level we have of
    course uh uh data protection officers so
    these are responsible in terms of their
    respective activities in order to be
    aligned with the gdpr and compliance and
    of course other National and internal
    regulations of the of their respective
    um
    institution um as you know uh of course
    uh we follow the fair data management
    principle which is uh as you can see
    findable accessible interoperable and
    reusable uh standards in terms of the
    data that we circulate within the uh
    project uh I come now to the principles
    and and standards that that we use and
    of course uh this is uh one of the key
    principles in research ethics and that
    is the code of ethics where we um follow
    um a mixture let’s say of ethicals and
    and data protection principles and we
    are going to see later on just in a
    second what are the key data protection
    and ethics principles in in uh uh within
    the project so uh when it comes to the
    ethical principles we follow of course
    so we we line sort of align sort of with
    the uh ethic principles that are
    established with the Horizon uh Europe
    regulation establishing the financial in
    uh instrument and uh we have a set a
    list of os principles you can see the
    description here I just don’t want to
    read all of them but the Integrity
    voluntary participation the protection
    of the participants um any activities of
    anticipating harms avoiding of course
    improper uh intrusion uh we make sure
    that there is adequate representation
    and expertise within the Consortium for
    uh for the specific uh job that needs to
    be done with in the research activities
    and of course
    confidentiality uh and anonymity and you
    can see on the on the left side how we
    align it with the Horizon Europe ethical
    principles when it comes to data
    protection principles of course we
    follow uh the gdpr uh principles uh and
    uh we have established our own list of
    course which is with the gdpr principles
    uh as a description and what are the
    activities that are involved and uh what
    these specific activities uh need to
    take care of in Terms of the principle
    such as non- incompatible use or you
    know purpose limitation data
    minimization uh prohibition and
    exceptions uh in terms of ver link with
    a purpose limitation notifications and
    prior checks uh if uh of course um
    during the course of the organization of
    the research activities but also in
    terms of the reporting of the research
    activities I mentioned in form consent
    point there is the recruitment but also
    direct involvement of human participant
    access to the information for the data
    subjects uh in regard to their uh
    privacy and personal information and
    right according to the gdpr and the last
    one is whenever we do the elaboration of
    research uh results we have to follow
    automated decision or actually
    prohibition of automated individual
    decision uh of U of this um of this
    process when it comes to the procedures
    so we have established us um set of
    ethical
    assessments firstly we have the soal
    Privacy ethical social and legal impact
    assessment which is a data protection
    impact assessment uh we have done
    already this um first cycle uh through
    an online question year and now we we’re
    in a phasis of elaboration of the
    results uh a self assessment so we we
    have a specific template provided to we
    provide it to the partners uh of course
    with just some guidelines on how to use
    it and uh how to assess uh self assess
    their work in individual research
    activities according to the description
    of work of the project and uh a risk
    assessment which is actually a
    collective effort that we all project
    Partners do it’s not on individual basis
    uh what other activities so far we have
    organized um um two ethics um uh sorry
    one ethic workshop and the second one is
    coming this um uh this year where we um
    uh presented to the project Partners
    what is our framework of course what are
    the obligation what are the ethical
    requirements and of course all the uh
    self assessment documents uh but also we
    organize uh especially Institute project
    partner Isaac that where come from it’s
    interactive activities uh and um uh
    Whenever there is help um uh within the
    project partners and the consultation we
    uh we do that on a regular B basis where
    when it’s needed uh but we also make
    meetings with um uh external
    advisory uh external experts uh and U
    Whenever there is needed and uh on the
    basis of their description of work and
    responsibilities or they need to do we
    help them in assist them in this uh
    effort and of course individual
    consultation me meetings whenever that
    is necessary we also did one C
    Workshop already with on the S so this
    is our second one so thank you very much
    for inviting us it’s really a pleasure
    to uh to be today with all of you here
    um what are the contribution that you
    actually request uh throughout the
    project is of course doing the
    individual assessment such as Whenever
    there is a research activity involving
    individuals there is a specific recruit
    recruitment checklist that the project
    Partners need to uh follow the
    assessment I mentioned but also there
    are two others like uh making sure that
    there is a plan if there is an
    incidental findings possibilities and
    health and safety assessment which is
    part of course of the ethics
    requirements as we’ seen uh and heard
    from the previous project that are
    standard ethics requirements for this
    kind of uh kind of projects um uh we
    also requested from the project Partners
    the specific Declaration on indidual
    basis of for a compliance with the gdpr
    uh the uh the guidelines of trustworthy
    AI in terms of eics and of course we
    cannot do that now with the AI act
    because it’s not no formal yet and um um
    of course we have a templates for
    informed consent forms and uh already
    adopted which now in the course of the
    project need to be further developed
    depending on the research activity and
    um uh as as because AI components are
    part of the project uh we also do the we
    use the EL Online system in order to
    make the uh the assessments as well but
    we also have a specific template where
    we elaborate our uh responses on the
    altea
    questioner uh that is all from my side
    of course if you have any question and I
    do hope I didn’t take any more time for
    for the other speakers with this session
    thank you thank you Marina thank you so
    much for the comprehensive
    presentation um okay we will move now uh
    to tensor and Mara are you able are you
    back yes yes yes yes okay so I assume
    that now everything will be
    fine can you see my
    screen no not
    yet I don’t know why because I incom
    W Theory should be because I’m sharing
    the screen all the screen no we cannot
    see it
    maram because it say that one it’s
    needed to Ser my
    screen I don’t know why Martha I will
    share the screen of the presentation uh
    just give me one second because it say
    that I need an additional permission so
    I don’t know
    why but in any case so I will start
    before you okay thank you very much
    sorry for this inconvenient with the
    with the presentation so my name is mar
    and I will present the ethical issu in
    intenso project so er that will be
    covered by EAS I wanted to stress one
    point that even there are one e
    requirements in tensor project that it
    will be the recruitment with the
    participants the security measure the SE
    country participants and the artificial
    intelligent issues so it doesn’t mean
    that it’s only the ethics issues in one
    work packet this is something that is in
    more activities in a lot of work packets
    especially when there is one interaction
    with the with the human beings in this
    case with the newers so and it’s
    something that is not only in one
    activity it’s one overview of the of the
    activity so H our role in this project
    is to Monitor and of they legal aspect
    that could affect T and in this case as
    my colleagues stress especially the EU
    artificial intelligent ad so that this
    is something that we have to be aware of
    this because it can it could provote
    some some things H from the legal
    approach so I want to state that we are
    H um taking care about two issues for
    one side the technological development
    that we are doing in tenso the platform
    and The Innovation and for another one
    to rearch involving human missing tensor
    so this is something that we want to
    make this distinction so the development
    by himself but at the same time the
    research that we are going to do with
    the with the human beings regarding the
    development of n project had my
    colleagues in in advance so we have the
    charter fundamental rights of the EU the
    general data protection gdpr of course
    the convention so it’s something that we
    have to keep in mind and this is really
    important in our case the biometric the
    article five and the special categories
    in data protection that we have in the
    gdpr so regarding artificial
    intelligence is something that is really
    really important in our project so
    because we have to provide one
    methodology that it will be used to
    assess the artificial intelligence that
    we are using so in this case we are
    going to use the ethics guidelines for
    try artificial intelligence that it has
    been presented by the high level expert
    group for artificial intelligent the key
    elements in this issue it will be human
    agencia oversight Technical robustness
    and safety privacy and data governance
    transparency diversity
    non-discrimination and fairness social
    and environmental wellbeing and
    accountability so this is something that
    we are going to take into account in our
    assessment using the altime
    methodology next slide please
    the guarded the responsive rearch so
    this is something that involve our H
    resar the re that we are going to do
    with the human beings in our case with
    the users so in this case we have to
    develop protocols for the pilots and we
    are really in touch with the um end
    users and with the user responses in
    order to make sure that we are
    um er following the guidelines providing
    previous deliverables that it mean
    recruitment of the particip ANS volunt
    they are volunteer so they can leave the
    research at the moment that they want to
    do it without any kind of response so
    the proc to do all of these issues ER
    the consent for this is something that
    is really important so the consent for
    the adaptation to the National context
    the internal procedures and local
    language and the Recruitment procedes
    and data management so it’s something
    that we are really aware of of of this
    the recruitment procedures align with
    ethical principle this is something that
    is really important in our case because
    we are working in many cases with the
    and we are working in many cases with
    volunteers that they are part of one
    organization and we have to make sure
    that we are in line with that with the
    the this H
    requirements and next slide please
    regarding the policy recommendations
    this is something that is really
    important in our case so that the
    because there is no one certification
    and Alor aing so and this is one
    becoming an urgent issue at European
    level so it’s something that it’s maybe
    more in L with the E EU artificial
    intelligence not so but we need one
    certification one standard one proced
    that it will be common in in in several
    countries or in in
    all companies that are involved in
    artificial intelligence just to make
    sure that we have Al our algorithms from
    an ethical point of view at the standard
    and PR um procedures for this should be
    develop in the next years or next I I
    will say it in the next months but maybe
    it will take long time but in any case
    it’s something that from the point of
    view of the political recommendations we
    want to to aress so H has main
    conclusions so intor project is really
    important the ethics point of view in
    the polic in the reair and in the
    platform that we are developing now
    solution and at the same time it’s
    something that will monitor
    ER especially from the artificial
    intelligent point of view from the
    EU ad in ordering to make sure that we
    are in line and we make the change that
    it will could be act from the
    development on these new rules in the
    European framework thank you very
    much thank you
    Martha thank you so much for the
    presentation um okay and then we are
    going to move with um Anastasia from
    atos um kindly ask if you can squeeze it
    in five minutes that would be great
    thank you so much Anastasia I can
    promise but I will
    try H give me just one sec to to upload
    my
    presentation
    um it should be visible to you now
    not
    yet it’s not okay okay we’ll try it
    another way around actually now now it’s
    yeah it’s fine um yeah perfect I can see
    it okay okay I will put it in a
    presenter mode um hi everyone uh it is
    my pleasure to meet abon you today and
    to be able to present to you briefly uh
    the ethical Frameworks and policies
    within the Athos project uh let me
    firstly introduce myself
    my name is Anastasia vidaki and I’m a PD
    researcher at vub and together with my
    colleague sergy vet mayir who
    unfortunately could not make it today we
    participate in ethos project H so what
    is our role in methos it is to address
    the legal and ethical challenges faced
    by the project both during it and when
    deployed uh in the societal real uh
    we’re responsible therefore for
    monitoring and controlling the conform
    it with ethical standards and legal
    compliance um and we provide advice on
    the matters concerning applied ethics
    privacy data protection and societal
    acceptance uh as as already ctis and the
    previous colleagues that spoke mention H
    ethos is a really unique project so
    without further Ado I think it is high
    time to delve into the subject of
    today’s presentation namely ethics and
    policy actions within ethos and I will
    begin with presenting the relevant
    ethical framework of the project and the
    measures aspired for ethical h e
    evidence collection and usage of
    biometric Technologies um as ethics
    policies that are applied in the context
    of the project uh so as you can see on
    the one hand uh we have already
    considered the research ethics framework
    H depicting concerns on the screening of
    recept activities and how resar is
    performed um in order to ensure its
    compliance with ethical and normative
    requirements as you all know under
    Horizon uh Europe research project the
    activities involving human participants
    regardless of their nature or their
    topic are subject to ethics compliance
    uh so the ethos project Partners have
    considered several activities that
    potentially H raise um ethical concerns
    including processing of personal data in
    of interviews observing social media
    platforms and tracking or reusing
    information uh those have been
    separately addressed uh to begin with
    while conducting covered research ethos
    project Partners May inadvertently
    process personal data uh from internet
    users while monitoring the dark or the
    Deep Web a specific requirements and
    organizational measures have been
    followed uh to ensure compliance in this
    matter H those include ensuring no
    personal data is collected um collecting
    data unra un abrasively and in
    accordance with local cultural values
    and obtaining National ethics approvals
    beforehand uh Partners also consult
    legal and data protection departments
    they adhere to National legislation and
    Safeguard the anonymity of research
    participants before undertaking covert
    research uh Partners will provide
    detailed justifications and explanations
    uh and when utilizing the internet and
    social media uh data for research which
    is uh a a special characteristic of
    Theos project caution will be exercised
    to avoid combining s sensitive data
    categories from different sources which
    could also lead to an infringement of
    the individual rights um Consulting with
    the institution’s data Protection
    Officer and ethics advisor securing
    ethical approval for data collection
    adhering to platform terms and condition
    recognizing um on open- Source data
    availability ensuring appropriate
    safeguards for vulnerable groups
    assessing potential harm H for data
    exposure obtaining consent uh for data
    used in close groups and respecting
    users privacy expectations are measures
    aiming to mitigate the risks and ensure
    ethical conduct um in research involving
    internet and social media data so the
    use of publicly available data as we saw
    in for research purposes requires
    careful consideration of its fairness
    and legality on a case-by casee study
    and this has been strictly followed by
    the ethos Consortium uh just because
    data is accessible to the public does
    not Grant UNR unrestricted processing
    rights so when using uh publicly
    available data from social media it’s
    crucial to assess whether the
    individuals intending for their offering
    to the public and ensure compliance with
    data controller terms and conditions um
    in this matter seeking guidance from a
    data protection officers or experts H
    has been H conducted and has been
    advised in cases of uncertainty in order
    to ensure lawful and ethical research
    practices uh last but not least
    participation in interviewing activities
    H in ethos is voluntary and it is
    informed involving only adult
    participants a capable of providing
    explicit informed consent um ethos
    ensures that no individuals unable to
    give informed concert including H
    children or infants will be involved in
    research activities or have their
    personal data processed uh ethical
    considerations regarding human
    participants are monitored and updated
    on a regular basis for these purposes uh
    on the other hand we have the Innovation
    governance framework which focuses on
    legal ethical and societal issues that
    arise from the development and potential
    exploitation of the project its
    acceptance by society and its potential
    effects to the fundamental rights and
    freedoms of the individuals Innovation
    governance H concerns those let’s say
    deeper issues such as but not limited to
    human dignity fundamental rights
    freedoms and democracy that the
    legislation cannot always answer and uh
    therefore ethics come into play and
    render a valuable tool for governing
    technological
    innovation so go so going further intoo
    in order to view the ethical policy
    applied in ethos in matters of
    innovation governance namely uh we will
    see the measures followed for the
    ethical e evidence collection and for
    the application of biometric
    Technologies for purposes of uh
    identifying online identity theft more
    specifically we’re going to check which
    parameters were taking into account when
    designing the ethical collection of the
    evidence and the application of the
    biometric Technologies at this point
    point I have to mention that the work is
    still under progress however the main
    concerns have already been expressed and
    have to do with the interference of e
    evidence Collections and Biometrics
    practices H with human rights and
    Democratic principles so let’s examine
    them quickly one by one uh firstly we
    have the issues of privacy in the public
    disc discourse arising uh the notion of
    online anonymity and the expectation of
    privacy are really relevant for ethos
    project uh along with the fact whether
    IP addresses subject or Access Data can
    H be regarded as personal data and with
    the integration of new technologies we
    can say that we’re also experiencing a
    re um a new paradigm shift in a criminal
    investigation and maybe the criminal
    procedure as a whole so from reaction
    mechanism it seems that we’re moving to
    prevention Technologies to
    criminalization of reparatory activities
    as such H as a result the individual
    face is a historical and unparallel
    deont control of H on potential self-
    incriminatory information but also on
    the capacity to foresee when he or she
    might become a suspect in the eyes of
    the authorities there is um in this um
    uh subject a strong risk that procedural
    safeguards in the heart of fair Pro
    process such as the presumption of
    innocence the right to remain silent and
    the privilege of self incrimination
    might de facto become theoretical or
    illusory to the fact of criminal
    proceeding at the same time as Manuel
    talked about before we have the web
    scrapping the method used for exploring
    the dark web which might collide with
    the freedom of expression in the
    internet uh the collection of personal
    data by social media providers may not
    be limited to the activities performed
    by individuals on social media and H the
    social media platforms themselves the
    targeting of social media users on the
    basis of information concerning their
    browsing H Behavior or other activities
    outside the social media platform can
    give individuals the feeling that
    they’re constantly monitored and their
    behavior is systematically um under
    control so this may cause a chilling
    effect that impacts how users perceive
    their online experiences uh such effects
    may be exacerbated if the targeting is
    also based on the analysis of content
    shared by social media users um the
    implementation of web monitoring
    Technologies such as the one in Athos
    might also potentially result in a more
    fine grain discrimination and
    classification of citizens and an
    enhancement of um social sorting
    practices there is also a risk that
    processing activities as such could
    could um um allow the identification of
    habits but also other cultural ethnical
    or Community shared attributes um along
    with them the principles of uh necess of
    necessity and proportionality H which
    are vital in a Democratic Society are
    further challenged and um last but not
    least um the group The the concept of
    group profiling has also be raised we
    understand that all those actions H and
    practices already adopted or that will
    be adopted in ethos have serious ethical
    implication
    on the research that have already been
    considered and will be questioned also
    in the future and keep monitored to
    ensure the compliance of those research
    Endeavors not only with the EU but also
    with the international framework h on
    ethical principles and uh on legislation
    and with that I would like to thank you
    for your attention and if you have any
    questions regarding the Frameworks i h
    tried to describe in a hurry feel free
    to contact me in the email for more
    details thank you so much Anastasia
    thank you for um helping us uh somehow
    be in our schedule time um okay so uh we
    are almost there I know we OV exceed the
    time of the of the workship that we have
    so we had already um in presentation
    from the technical progress discussion
    on the ethics and policy action so what
    are we doing next is to discuss uh the
    next step forward uh because our journey
    doesn’t stop here so I will pass the
    floor now to the uh project coordinators
    just to have the you know uh 5 10
    minutes to discuss
    [Music]
    the um the conclusions let’s say of this
    of today’s workshop and I know I’m
    really sorry for you know of for
    achieving the time that we we have so
    far there but there were so many
    information that has to be shared right
    and it was very
    interesting so thank you thank you Anna
    thank you everybody uh very very
    interested in in this Workshop today
    very interesting presentations uh I
    think it’s a very good starting point
    for us uh we have already identified
    some uh complimentarity between the
    projects uh we’re happy to to work on uh
    establishing this further
    and maybe see how uh we can work
    together maybe on a more tangible side
    such as uh uh on our Pilots for example
    and the use of our Technologies uh in
    the framework of uh the security in the
    Border management uh domain so now that
    we know each other I think it’s a good
    idea as proposed earlier by the European
    commission
    Representatives um to have another
    session in a few months maybe from now
    uh have
    established uh who we are what we are
    doing so let’s work on something more
    concrete uh that would be my my my
    vision at least I hope uh you are Shing
    the
    same
    uh jeppe Monica
    Donna H and the colleagues from ethos
    we’re happy to keep this channel open
    and uh see our next opportunities for
    collaboration andna thank you very much
    for the moderation great work thank you
    thank you everyone thank
    you from my I please hear me okay uh
    sorry but I’m driving because I the
    personal obligation uh first of all I
    think that we understood that for sure
    if we have to talk uh about more
    detailed uh
    project results uh next time we will
    need more time to uh in order to
    dedicate the proper time for each for
    each lot dedicated to the project I
    think that this is a good lesson learned
    for
    sure uh the second point I think that uh
    beside this uh this um virtual meeting
    maybe could be good also to
    establish uh if possible wherever
    possible to share doents for example to
    have a a sort of yeah virtual group
    where we can at least upload the
    presentation and organize also have the
    possibility to organize better the uh
    the content in advance to see also to do
    some connections with a projects because
    for example from my side we
    had a couple what I remember from the
    presentations like for example the
    possibility to uh to to understand how
    for example from the Picos point of view
    we could integrate with a um with a with
    a data space that you were planning in
    tensor for example that could be uh nice
    another another
    approach while waiting let’s say for the
    the next release of the ngx system data
    model and the other point that is more
    related to the to the awareness campaign
    that was talking atos before talking
    about fraud identity that is online it’s
    true
    but maybe some of them that could be
    also interesting to understand how they
    will be defined and to propose for
    example for not only for virtual
    identity but also let’s say for uh not
    for virtual so to access services with
    their own identity into the
    verification for example the
    authentication of people that want to
    cross border and so they need uh such
    kind of authorization in advance and
    could use the systems without with the
    route precautions essentially I don’t
    know how to but it it sound to me that
    would be very nice to have such
    awareness campaign also
    for uh to to explore uh in play to so to
    understand how they will be designed as
    I said and uh so virtual virtual
    environment where to share documents
    these two points that for me were
    interesting during the presentations and
    also as already
    knows and as well we have also contacted
    the Horizon booster to so to complete
    the two actions for module a module A
    and B uh and this could require
    essentially some effort from the project
    that could be of the same project group
    that okay we can discuss
    offline uh with some emails just
    proposing you next actions that could be
    good to have and to present semination
    and communication
    activities as a project group and we
    could have the support of European
    commission to create a list of joint
    results or results or collaboration as
    we were mentioning before H but also we
    could have the opportunity to have a
    sort of a uh coordinated brand identity
    for the project group and this could be
    also nice in terms of support so to to
    be to
    be a little cluster maybe but with the
    different from different point of view
    from different point of
    view this was my my understanding of the
    today session agreed thank you so much
    and also my next next actions that maybe
    we can take note also to to send to to
    Julio and to the rest of the commission
    exactly okay
    we do
    so right any other comments
    or from okay sorry sorry sorry it’s on
    the Sal turn I’m I’m not going to jump
    no no no it’s okay there were no turns
    it’s just whomever wants to to jump in
    okay then from athos’s side uh thank you
    all for this invitation uh it has been
    interesting um to be honest I would have
    welcomed perhaps more discussion rather
    than individual presentations because I
    think that uh also New things can crop
    up in discussions that uh we haven’t
    thought of earlier I was happy because
    um even though AOS is a different uh uh
    focused project than perhaps the rest of
    them um I could see that also in the
    presentations of other projects um uh
    aspects that are relevant to identity
    theft uh perhaps in a different way
    uh but uh uh um uh like for Border
    management for example uh are also
    relevant to other projects so perhaps
    there could be some Synergy there and uh
    perhaps also

    The “FCT and BM Projects Synergy Workshop” from 12 March 2024 featured several key presentations and discussions involving multiple European Commission-funded projects centred on crime prevention, border management, and security research. The primary focus was on TENSOR, FLEXIcross, ETHOS, and ODYSSEUS projects.

    Leave A Reply
    Share via