FCT and BM Projects Synergy Workshop – TENSOR, FLEXIcross, EITHOS, ODYSSEUS
okay so thank you everyone again for for
joining
today um
so thank you everyone for the
collaborative work that we’ve done
together in order to put this uh Synergy
workshop together so today uh we are
going to talk about the fight against
Crime and terrorist uh and also the
border of management uh Synergy work
workshop that has been organized
uh in the collaborative efforts for
tenser uh flexi cross Athos and OD
projects and all these projects have
been funded by European commission so uh
I would like to welcome today the
European commission experts uh and uh
project Partners stakeholders um for
joining uh today’s meeting Workshop um
so what are we going to discuss today is
to explore the groundbreaking
advancements in border security and
crime prevention so in the activities of
fct security research and Innovation uh
they aim to support prevention detection
Mitigation Of Crime and terrorist
related incidents so the new
technologies and capabilities are
imperative in these Endeavors addressing
various forms of organized crime cyber
crime illegal trafficking terrorist and
so on so similarly when it comes to uh
the border
management the objective for the
research and innovation in this area
related to The Border management
including border control risk analysis
and Inter agency cooperations so
projects funded under this cluster are
dedicated to developing technology to
improve border surveillance enhance
travel documentation document security
and detection of risk at the border
while facilitating the movement of
legitimate passengers
so through this Workshop we will delve
into the technical progress made by our
projects with a particular focus on AI
and biometric features we will also
discuss our um exploitation
activities um ethics and policy actions
and then uh next step in this crucial
areas so with um our collaborative work
and exchange insights today
uh I want to bring to your attention the
important of these collaborative efforts
in enhancing security and safety for all
so together we have this opportunity to
um have an A profound impact in crime
prevention and Border management
ensuring a safer and more secure future
for Europe and Beyond so thank you all
again for your participation today I
would like now if um jeppe and um can
help me with the greetings overall also
for the uh our commission uh European
commission officers that are attending
today uh I think that I not many words
just to say thank you
to to to the commission to be to be
present uh and to have accepted this
invitation as I said also in the
invitation that I made to them even
discussed a few weeks ago but then we
refreshed the the invitation also with
some details last week uh it’s it’s a
strange Synergy Workshop in the sense
that we have projects of different
topics and I think this this is an
important achievement
also uh thanking again the the the
European Commission because allowed us
to to meet each other last year during
the project to policy
seminar uh I think that there there is
more effort to to to employ to to use
let’s say to to to increase this kind of
cross topic
collaboration uh there were some other
projects but we we didn’t achieve to to
contact them but I think that we we have
some work to more work to do because
there are also some other commonalities
like for example the uh communication
with the communication or in any case
interoperability with the entry exit
system so in the end this uh we will try
to do it better no because we have just
to give a little bit of story to the
other we have uh H worked a lot to to
create a sort of memorandum of
understanding for the collaboration in
into this kind of uh dissemination
activities and that will bring us also
more added value in terms of techniques
and technologies that we are using that
are in common to the to the to the four
projects essentially so
so let’s hope to do even better in the
next Workshop um involving even more
more more topic related and technology
related projects I will leave the floor
to European
commission uh thank you thank you jpe
and thank you Anna and and indeed uh
thank you for all the four projects uh
Partners it’s a thank you for inviting
us really uh this is this is super um
super interesting and and great to see
uh we’re glad that uh just some of the
um pushes that we we organized like in
the meeting that jeppe was referring to
uh could create some opportunities like
um like
this uh and uh just to uh to Echo and uh
and
explain uh
I I think I I had the pleasure of I’m
I’m just look looking to the the names
and by the way it’s great to see so many
people connected from the four projects
uh I had a pleasure to to meet uh some
of you and I recognize some names but
for those who don’t know me uh I’m Julio
manini I work at the European
commission’s DG unit on um uh Innovation
and security research uh we manage the
uh the program of the Horizon cluster on
civil security research inovation uh
funded by the EU uh and I coordinate the
part on Border management
Innovation but uh exactly as as we said
uh uh we we also work together with the
colleagues in the in in the team uh in
the other team in in the same unit that
coordinates the area on fighting crime
and terrorism Innovation uh to fight
crime and terrorism um I see at least a
colleague from that team uh here with us
today Felix uh and uh Felix may may be
able to say something about fct uh just
uh just after me but just to uh
underline uh the um uh H how important
it is and how
um an interesting achievement it is for
you4 to organize this uh uh this event
together in the past few years our
program uh Innovation for civil security
exists now since uh
uh more than 15 years uh but we
realized as we always learn in the last
few years that uh both us ourselves and
the projects were a little bit in
compartments uh in terms of areas we had
the boorder of management research and
Innovation for Border guards we had the
fight crime and terroris research and
Innovation for police but in many cases
there are a lot of opportunities of
interacting maybe because the techn
ologies are similar maybe because the
capabilities needs are similar maybe
because the practitioners actually work
together border guards and law
enforcement for example and I think what
you do is is a very good example um
Biometrics in terms of Technology um um
security of identity in terms of
challenges just to name a few uh could
be interesting for um for different
communities as well as uh also from the
innovator’s point of view many of you
are companies or universities uh and
could just uh uh benefit for for more
interaction that’s um uh that’s
something that we wanted we hoped uh to
help with the project to policy seminar
when we uh introduced the various
projects and uh and promoted networking
uh and that’s something that we also
ourself try to do uh not least through
the serice uh the community for European
research and Innovation for security uh
where we as commission try to organize
and host thematic events um on
Innovation where we also try to bring a
lot of the policymaking part uh and so
for example today’s worship or this
online worship is very interesting for
for us um I for example I look forward
to it and learn things and take notes to
report and promote to our uh policy
colleagues thematic policy colleagues so
those who work on Border management
policies for the future European border
management or for uh organized crime
fighting uh uh or or terrorist fighting
policies because uh what you’re working
on and what the solutions the
technologies that you’re studying and
develop could be um could be helpful for
uh for them so um thank you very much uh
again congratulations for being able and
being open to this uh networking and
collaboration it’s already very good uh
and uh and of course your projects being
uh still their let’s say first Al more
or less they have a lot of opportunities
to to do to do more um so looking for
for the rest of the afternoon and
leaving the for quickly for for a quick
um mention to Felix from The fct
Innovation team uh if he wants to say
something thank you thanks Julio uh yes
hello everybody very nice to em meet you
um so as as as the fct title indicates
we’re we focus mostly on fighting crime
and terrorism but um because this uh
this topic is rather large it also has
quite a few domains of application so uh
with Julio in the past we’ve been we
we’ve worked a little bit on mapping
potential synergies not only within uh
within uh cluster three uh of the
research program but also with other
clusters so uh we want to make sure that
we have a very good understanding
already of the possible synergies that
go on within our own cluster uh but also
then in the future see if we can expand
that to the other clusters as well and
build a very strong base um I think also
it might be worth mentioning that we
have also these um the work program on
strengthening security research and
Innovation which works also on the um
aspects of research which needs to be
which need to be improved which can be
improved uh
strengthened um by uh also EU funded
projects uh and this should also be able
to support your own projects and and and
facilitate synergies uh make sure that
the community is at least familiar or
aware of one another um at large so um
BM uh border management and fighting
crime and terrorism are um in in my view
some of the most obvious uh synergies uh
but we are also looking to expand this
throughout the the this cluster uh uh uh
as it stands and and possibly uh see see
where we can go from there but I’m very
I’m looking forward to to seeing these
discussions or to hearing these
discussions rather and uh and wish you a
very nice meeting thank you very much
thank you
pH thank you if Anna and elen allow me
so I would like the floor just leave the
floor just to Bruno Shard that is our
project officer at this point just few
words I know that was not in particular
very well very well defined slot but
just to leave the floor to him for some
greetings
yeah hello and thank you for giving me
the floor I think after the colleagues
from the commission I do not have
anything things to add I think it’s a
very good opportunity that we have this
Workshop amongst two different AAS so
this is very good this is very positive
and another positive point is that we
have some colleagues from dig present
today so that we have a direct uh
feedback to policy and uh this is very
very important for the project so I will
give you the back and reach you a very
fruitful uh Workshop today thank you
thank you thank you thank you okay if I
may I would like to the floor is yours
okay h i see our project officer Dr
manova if she would like to to say hi we
are more than
happy uh hello good afternoon everyone
so uh I just joined the meeting so uh uh
and I I heard the greetings uh from
Bruno uh so the same from my side uh
very good initiative so congratulations
for this and I hope this will not be the
last one so I wish you as well a very
fruitful uh meeting ahead and workshop
okay so thank you thank you for inviting
me thank you thank you very
much okay I will start now we start with
a the next slot thank you thank you to
everybody so we leave the floor to Anna
if you want to she wants to moderate
thank you everyone um so um with the
next um let’s say slot we are going to
present the project overview these um
this presentation are going to be made
by the coordinator of each project so we
have elanie veroni from intrasoft
um net company and then we have jpe
salvator Val V from um the project from
flexi cross and then Monica flora and
Dan Ona from simavi from and Manuel past
from Herta from AOS so um elenie if you
would like to start for presenting um
the project overview for tzer sure thank
you
I guess everything is okay uh with the
screen sharing Etc so uh okay thank you
very quickly uh hello everybody I’m very
happy to be here and um among good
colleagues I’m Len veroni I’m a project
manager at L compan roft specifically in
the research and innovation Development
Department I’m the de day coordinator of
tensor
project and um here is the overview for
uh our project everything you need to
know about tensor is in this Slide the
topic under which we have been funded
our Consortium the fact that we started
our journey uh last year on January 1st
meaning that we are well into the second
year of
implementation for the project that we
are an innovation action uh being
supported by the European Union as well
as own funds our overall aim which is to
enable the biometric evidence extraction
Fusion storage and sharing uh in
crossborder settings and how we’re going
to do this uh we’re going to do this by
fusing physiological and behavioral
Biometrics by leveraging AI technology
to provide intelligence and insights and
by developing a biometric data space
system prototype tailored to the needs
to of the security domain we have three
distinct pilot use
cases uh each pilot will take place in a
different uh EU member state but more
about this uh later on few more details
about our Consortium we are happy to
work together with uh 20 Partners across
15 uh European countries we are working
together with rtos law enforcement
agency and for exic institutes large
Industries as well as
smmes a little reminder about the
expectations as these were set by the
call by the topic uh under which tensor
was funded fct
0105 for mod Biometrics used in forensic
science and B police so the expectations
were related to advancing the use of
biometric Technologies by practitioners
strengthening foric evidence Acceptance
in court supporting policym on the use
of modern biometric Technologies taking
of course into account the ethical and
legal rules of operation improving the
operational capabilities of law
enforcement agencies to fight crime and
terrorism and to train foric
practitioners on the use of
state-of-the-art Technologies and
methods in line with those
expectations uh tensor considers three
traditional phological Biometrics the
well-known
fingerprint face face Biometrics as well
as voice but we also go beyond that and
we consider the behavioral Biometrics we
consider gate specifically gate
recognition the way someone
walks um as well as user patterns the
way someone interacts their mobile
devices can also uh used to identify
them so with these five modalities are
the core of tensor we have designed and
we
are uh trying to implement A system that
U extracts biometric traits and other
features from the crime leveraging for
this purpose CV footage recorded audio
or mobile devices that may have been
found at the crime
scene uh then to fuse these biometric
data and features towards supect
recognition identification and identity
verification to store the extracted
biometric data in a privacy preserving
manner enabling encrypted search and
comparison
functionalities and to share biometric
data among trusted national law
enforcement agencies while maintaining
data
sovereignty these are the three main uh
uh objectives for the project so support
the forensic investigation through the
provision of innovative biometric
intelligence and inside to exploit
exploit further the potential of both
behavioral and physiological Biometrics
with a purpose to derive concrete and
robust evidence and to facilitate the
crossborder data exchange um ensuring
also
interoperability these objectives will
be demonstrated in the framework of
three use case scenarios and uh we’ll
make sure that all all our results
Concepts ideas recommendations will be
widely
communicated in the relevant
stakeholders as mentioned uh before we
have three distinct use cases so a few
words about uh these the first one is
evidence collection through intelligence
derived from correlated behavior and
physiological Biometrics based on CCTV
footage
uh this case scenario the first one will
take place in uh Czech Republic and is
being led by the police of Czech
Republic there are six distinct
technology offerings from tensor that
will be leveraged and demonstrated in
the framework of this us case scenario
and the objectives are to derive a
comprehensive set of distinctive
features and increase accuracy and
efficiency in Criminal
Identification for this particular use
case scenario there are
two data sources the main one is the CV
footage with Incorporated audio and
later on in the story line uh we are
also using the police officer’s mobile
device to obtain fingerprint for from
the suspect on the
field uh the extracted
traits is uh three physiological
Biometrics phase voice and
fingerprint um that will be fused with
uh gate which is a behavioral biometric
the produced outcomes a list of possible
suspects along with a confidence level
for each one um with their uh identities
and we are also going to produce a
narration of the investigation process
combining all the relevant
findings the Second Use case scenario
the focus uh now is sifted to a mobile
device uh specifically unlocking this
Smartphone mobile device leading to the
extraction of stored data even biometric
data uh this Cas scenario will take
place in Finland is under the leadership
of the ministry of the interior in
collaboration with the Finish police
again six distinct technology offerings
will be used here the objectives remain
the same but the means are different
data sources now uh is mainly a locked
mobile device associated with the
criminal and the
crime and uh CCTV footage will be also
leveraged later in the story line to
extract
um Bings that can be correlated between
the two data
sources uh the exacted trates as I said
earlier the focus here is on behavioral
Biometrics but also on every possible
relevant information that can be
extracted from the mobile device uh such
as by data stored in the embedded secur
element sensor data about uh for example
about the location of um the criminal
and past whereabouts 2D patterns from
the media files pictures taken with the
phone earlier and how this can be
associated with the crime and the
produced outcomes are information about
the suspects characteristics its past
location whereabouts Etc as well as the
narration of the investigation process
combining all the evidence last but not
least uh we’re going to deliver the
biometric data space the first biometric
data space uh which we’re going to use
to um demonstrate secure data Exchange
in a crossborder scenario for this
purpose two end users are being involved
in this use case scenario which is being
led by the Portuguese police
uh with the participation of the mavian
police there are four technology
offerings being demonstrated here and
the objectives are a bit different we
need to
establish
um that the process is taking place uh
considering also security and
privacy automation scalability enhanced
trust and data sovereignty for this
purpose we have used the idsa
um reference model uh the new paradigm
of data
spaces and um we’re going to use it in
the scenario to exchange facial the
focus here is on
facial uh
templates um in a crossborder
scenario uh there are also technologies
that are used to ensure the aspects I
mentioned earlier security privacy
scalability Etc it’s a different system
than the Tes platform but um we believe
it’s is very very uh
important uh the good thing is that we
have also established a relation of our
use case scenarios with uh the EU
policies for internal security mainly
for the EU strategy to tackle organized
crime uh 2021
2025 uh we see here that uh
the strategy calls for making more
effective use of biometric data and
specifically facial images for
identification PES this is what what we
do um in our use case as well uh calls
for
cooperation law enforcement uh and
judicial cooperation smooth exchange of
uh information and timely access this is
relevant to our use case scenario 3
um for access to digital leads and
evidence because the organized crime
takes place online
nowadays uh we also do this by
leveraging a new biometric uh modality
the behavioral Biometrics related uh to
the mobile device the way we interact
with with
it
um
also there is a need for tools that are
inexpensive and can be operated by
nonspecialized
Personnel uh we’re also going to do that
in the framework of pilot use case to by
offering a
non-costly solution to unlocking uh
mobile devices attacking the the pin and
the pattern of uh the mobile
device finally
um we found very strong relevance with
the regulation on data exchange for
police cooperation the pram 2 framework
uh this is exactly what we do in our
pilot use case scenario 3 uh but we’re
going to
demonstrate this uh through the
biometric data space
technology we believe it fits very
nicely and we are looking forward
to to the results uh from uh this uh
pilot evaluation because we believe that
uh very very useful uh recommendations
polic recommendations can be uh
extracted from this
process this is from my
side I hope I didn’t maybe I went a
little bit over no worries thank you so
much elen thank you thank
you okay um shall we continue with um
flexi cross and
jeppe could see the screen
right TR I reduced a little bit
presentation of a couple of
slides
also uh so we’ll introduce flexy cross
today uh flexy cross is a um flexible
and improveed border crossing experience
so this about managing and improving
border crossing experience for
passengers and giving benefits providing
benefits also to uh border
authorities uh few information related
to the project it’s uh the first half of
the project so it started in September
2022 and we l in in August 2025 it’s a
project that was funded under the
cluster cluster three topic BM
0103 and the main name of the project is
essentially uh to deploy and continuous
validate a toolkit for Innovative border
checking
Solutions uh on the move so a real
operational environment meaning that we
have the possibility to deploy uh easily
uh the border crossing points for um
border guards in order to allow them to
do the necessary checks uh with the
different tools that we will see in the
next slides we started of course doing a
sort of mapping one by one between
challenges and solution of the uh that
are brought from the from the project
starting so from the increasing fright
and passenger
transports uh that has a significant
part into the European Mobility uh in
general this will means that we will
have the
necessity uh uh to improve what is the
workload of the customs and of course of
the security uh the security all the
security personel that is involved in
into border uh border
crossing H and here idea is to leverage
on a uh flexible Dynamic and effective
uh tool kit that will allow to com uh to
use in a transparent way Technologies
like 5G internet of things so with
sensors that are are deployed in the
mobile border crossing points uh to
use artificial intelligence algorithms
that will allow to extract unusual
pattern ER from the from
the essentially from timely and
geographically uh movements of people
across
borders ER and to do so such to to
conduct such Anis in terms of risk
assessment uh across
borders uh we have used just not go in
deep of all the different of the
different factors that we have taken
into account essentially the main
activity is to do uh to bring Innovation
by using such Technologies by delivering
such uh mobile checks into real
operational
environment uh by using Advanced
biometric checks and ESS
allowing in the end to the different
authorities as we have seen also
before uh to allow um to the the the
different border authories to
interoperate uh among each other uh with
the ambition to integrate with the entry
exit system and if possible to have the
interaction also with the entry the ATS
system in order to identify if there is
any particular uh uh um person that is
crossing the bord that has not the
necessary authorization and then to
trigger some more services that will
allow to identify if there is any
phenomena like irregular Crossing or
Contraband or smuggling of goods across
borders the uh project Consortium is
made by 12 Partners uh we have uh we
have engineering as that is the
coordinator then then we have ba ibos
wings and allite as uh the essentially
for the Innovative then we have iccs and
Kia as the research organization and
then we have also five end users that
will take care essentially they will be
the contact point for the three
Pilots uh and we have tcpr for what
concern the rail the railway the wellway
sorry uh networking atg has incubator
that will coordinate the scenario uh
near the port
uh then we will we will have also L
police that will be mainly involved in
the Greek pilot and then we have also
Romanian police Border Police that will
be the Border police involved into the
uh scenarios for what concern
essentially the uh c c scenario and Port
scenario essentially and the railway
scenario uh this is the initial
architecture of the project essentially
so we started with a classical with a
classical for tired architecture where
we have from one side all the sensors
that are deployed like uh acoustic
sensors like mobile mobile devices that
will be used for positioning uh for
providing position essentially to to
analyze if there is any unexpected
pattern that is detected by the
different algorithms then we will have
also on board sensor unit or we have
also passport and fingers uh fingerprint
scanners H we will have also X-ray and
footages or also mobile and fixed
cameras and and uh all these uh sensors
will uh will be ingested essentially by
uh the related
module uh that will uh pass all this
information essentially to the data
processing layer that
will that will analyze through a I ml
algorithm all this information that
comes from the uh from the field
essentially we will see a detailed
architecture after in the technical in
the technical overview and after all
this information are processed they are
fused to create Val added services like
uh like doing biometric verification uh
to do a vehicle person risk assessment
as I was mentioning before to do uh some
uh predictions according to the analysis
of the pattern
ER to the pattern that are extracted
from from the geographical and the and
the temporal uh movements of people
across border ER in order also to create
two other uh addition added value
services that are the uh the detection
of illegal uh illegal trafficking and
also the uh Contraband
smuggling uh phenomena all this
information will be uh visualized for uh
will be
essentially visualized in use case one
through GUI to the two Dimension GUI and
through the augmented reality situation
awareness ER into two two different
situation awareness that are mainly
related to the the two different Pilots
that are in Greece and in the the
scenario related to Romania and movia H
but the most important part is that
essentially uh that the world toolkit
will be instantiated into the three
different Pilots according to the
different needs of the end users
expressed during the requirements
recitation H and all the three Pilots
will communicate through an
interoperability mechanism that will
allow them to export the data that in
the end will be uh will follow the
structure of a data model that has been
formalized within the project but with a
possibility also to create an
intermediate model that will allow us to
uh export all this
information uh according to the data
model that will be defined or at least
that is in progress for the entry exit
system uh these are the three Pilots
that will be the Romania mavia platform
that will be deployed essentially for
the for the use case three the Romanian
uh the Romanian scenario that will be in
galatti
Port ER and then we have also the Greek
the Greek Bulgarian uh scenario that
will be on uh on the
road uh will be at bord stor menu
essentially on the
road on the left we can see all the
sensors that will be used for the
different uh Pilots so we will have a
portal FAL recognition systems for a uh
H verified identity of people that are
crossing fingerprint scanner we will
have also uh on board sensors on board
unit on um polic Vehicles we will have
also uh remote video from fixed cameras
but also videos coming from the uh the
from Ted drones like we will have also
x-ray scanning for uh cargo
identification and acoustic sensing for
position prediction essentially then we
will cover the all the transaction
especially for use case 3 uh and the
exchange of information among the
different sensors with a with a central
system through blockchain uh
Technologies I will go further because I
think that we are a little bit late ER
this is the methodology that we have
used to essentially monitor the
development of the of the different uh
modules that are uh that are currently
um being developed essentially H there
are some be weekly calls that are being
organized in order to uh to to be to to
Sweet essentially with the main
deadlines that we will see after with
the planning that we have not only
inside the project but also with public
projects that currently involves the two
projects of the CL of the
today syy Workshop but we will try to
understand if if it’s possible to uh to
involve also the other people into uh
official events that in the end what has
forced us is to uh strictly monitor all
the release of the uh of the software
module that will be then demonstrated
essentially
uh during these uh events so what I mean
is is this essentially this is not the
gun of the project uh we have uh a
timeline with the three different layers
that are related to the uh in the upper
part we have the different Milestones
related to the uh month 16 to have the
release of the first release of the
toolkit month 20 that is in April 2024
that will be uh the first
uh the the first draft of of the of the
methodology for trial validation
essentially then we will have the
integration the early integration of the
piloting of the pilot sorry with the the
release at month 26 of the second draft
the second release of the flex cross
tool kit and then to to continue with
the month 31 with the end of the
integration before the execution of the
pilots at M 22 and 23 uh and finally the
final report of course of the validation
this means that in the end we will have
different uh different events that are
in the the light light green that we
have highlighted for the technical
workshop for the internal progress but
also workshop for uh with external
stakeholders uh with some okay
activities for for what concern the uh
the dissemination communication
activities but uh uh in conjunction with
main the main activities and that will
uh satisfy the the kpi of the projects
we will have already planned to have
several activities at the bottom part we
can see with tensor that as I said at
the beginning we have organized the the
memorandum of understanding in order to
identify which can be the best
opportunity for us like today to share
some information that also CES to my
mind the different uh questions that we
can do if there is time today
or or offline uh in order to have some
curiosity that can be even exploited
better in uh not only in workshops but
also to have the possibility to uh to
analyze some results in the technical
conference in that will be increte in
2024 or to have for example a white
paper at month 28 by the end of this
year essentially for what concern
uh biometric Technologies for forensic
and Border management essentially so
this is the uh the plan of this
conjunction activities what we we
have essentially drafted in terms of
exploitable assets are there are three
main um topics related to uh all the
functionalities that are validated into
real operational environment like mobile
biometric tools for people
identification uh to improve all the
Border checking processes that are
currently use for the Border guards that
are involved in the project and to to
provide another kind of experience that
is related to the situation the
augmented reality situation
awareness ER for uh for Border checking
and also predictive risk assessment uh
by using the different sensors that are
in the field H another important assent
even if it’s not technical is related to
the framework for privacy and secure
data processing that mainly is involved
not only in the compliancy of the ethics
requirements but also into the
identification of the
um of the the the main pluging point
that can be uh used by technological
people to identify which which can be
the weakness that we have to cover
essentially with the develop the
development activities and to be
compliant so with the with the not only
with the current
ethics framework but also for example
with if possible to identify which are
the possible uh way of improvement with
AI
act ER and last but not least last but
not least also the uh this uh this
interoperability framework at least is a
a module that we are uh designing now in
order to be compliant also
with uh with the DX system I don’t know
if there is any raised hand or uh yeah I
raised hand J because I guess this will
be further discuss in the section that
we have related to the exploitation so
just being being aware of the we have in
fact it was just an INT an introduction
just to okay okay and that’s all and
this was the last slide that are numbers
but we can just share with them just to
have some figures related to the
software modules to the key exploitable
results that we have ident ified and
some activities that we are doing and
that have been described in different
phases of the the slides so I will close
my presentation
sorry no worries thank you so much jpe
no worries um okay moving forward to the
presentation the
overview of Odus and we have Monica
flora and Dana oniga from
suavi Hello everybody thank you very
much for uh for introduction I’m I’m so
I’m Monica Flor I’m the project
coordinator of oiso project and I’m the
head of unit of European project
Department in
inavi uh and I will make just a brief
introduction of uh of what together with
my colleague Dana uh I um I would kindly
ask Dona to share the
screen uh she was sharing the screen
previously so yeah yeah yeah did
disappeared so now I just okay
so just give me one second me one second
I have a small problem but now it’s fine
now it’s it’s okay okay so uh you can go
to the next slide so just few words
about about the project so um what you
say it’s um it’s uh aiming to to offer
some unobstructive technologies for
secure and seamless uh uh border cross
ing for travel facilit facilitation and
uh the project was submitted on BM on
the call BM
0103 uh dedicated to improve border
checks for travel facilitation across
external borders and improve the
experience for both passengers and
Border Authority staff uh the project
it’s an uh uh Innovation action and uh
has a total cost of 4.6
million uh you can go to the next slide
please
L uh the project has a Consortium of 14
Partners from 12 European countries and
also two uh non-eu countries so we are
quite uh quite uh um expanded on on many
many countries from from European
commission European Union sorry but also
for non countries and uh related to to
the actual partner so we um we are are
five end users bodies from countries
like Romania Bulgaria Slovakia France
and also uh and also we have three large
companies uh five small and medium
Enterprises and one Research Institute
so we cover different type of expertises
that are required
for uh for the project
objectives um the main goal of the
project is to improve border crossing
experience for travelers and Border
Authority staff uh while maintaining
security security and monitoring of
movements across land and water you
external borders so Dan I kindly ask you
to to take over because I think it’s Dan
is the project manager of the project
and she will introduce you the main
project objectives thank you Monica so
uh we have H five main objectives uh the
first one is to design uh develop a
platform that will be used by both
border authorities and citizens um the
second objective is related to
advancement of identification and
control capabilities of Border
authorities by introducing a new mobile
virtual
passport uh the third objective is also
about improving the border control
capabilities um specifically by uh uh
using uh safe and portable screening
uh x-ray uh Technologies uh drones UAV
assisted image processing uh and AI
based data analytics the fourth
objective uh is to validate the
effectiveness of the OS platform um by
demonstrating it in various operational
environment uh inside the Train on the
road uh and at the water
border finally uh the fifth objective is
to speed up the rapid uptake for the
service Innovation through wide
communication scientific dissemination
and Commercial uh
exploitation uh as um about uh outcomes
and uh expected impact that uh the
project will have the first outcome um
is to validate uh new and innovative
solutions uh both Solutions uh that I
mentioned before uh the the capabilities
of um the identification of uh people
and the the uh X-ray and um drone
Technologies are uh supported by um uh
powerful AI but you will see more uh
details in our um uh presentation uh
dedicated specially for for Technologies
uh going back to to the outcomes uh the
first uh outcome uh after we validate
the platform and the technologies will
improve the border crossing experience
for both Travelers and authorities staff
but also will maintain security and
monitoring of movements across land and
sea uh EU external borders uh the second
outcome uh is to increase the security
and reliability of Border checks uh
including uh identifying uh people and
goods that might cross external borders
uh and this will also mean an improved
security of EU external uh borders uh we
uh Target Land and Sea borders not air
borders uh with with o project and
finally uh the third outcome uh will
support also uh the planning of Border
checks uh and um also the handling of
pix in crossover the in cross border
traffic uh especially in land Crossings
uh and we hope to improve customs and
supply chain security through better
prevention detection and fight of
illegal activities that might involve uh
flowing of goods across EU external
borders uh what we would um uh bring uh
with our uh
Technologies uh we will um we are
developing a platform uh for both border
authorities and citizens uh and we have
two uh uh pillars that say two main
directions uh first one is um to improve
the checking at Borders by uh using
Technologies uh x-ray Technologies and
drones assisted Technologies uh these
are supported by multimodal fusion and
theist decision support system and also
uh by an explainable uh AI module uh the
second uh the second direction is the
identification and control capabilities
and for this uh we have a device for
seamless identity verification again you
will see this later on uh we will have
digital and virtual passport um they
will be supported by AI power continuous
behavioral authentication by face s gdpr
compliant Travelers counting using
images from static cameras and this um
Technologies are also supported uh by
the decision support system and the
explainable AI
module uh as operational scenarios uh we
are targeting uh illegal border crossing
and the traffic of illicit good uh
materials explosive or drugs we are also
targeting
uh identity thrud and uh in the end also
uh
terrorism we have three Pilots as I’ve
mentioned before uh the land border
Pilots uh one will be at the border
between Republic of mova and
Romania uh this is an external you
border uh and another one will be uh at
the the Border Point uh between Slovakia
and Republic of Slovakia and and and
Hungary uh another uh pilot will be uh
in Bulgaria uh in Burgas Port uh and the
last one uh the train border uh will be
again between Republic of mova and and
Romania more specifically uh in a
crossing point called
unan uh about um a little bit about our
implementation plan and
where we are uh we are uh in mon 15 we
started January 2023 and we are
approaching very fast uh a new uh uh
milestone in uh April uh where we need
to have all um the first versions of the
Technologies ready uh and uh then uh in
June uh mid the year uh we will have the
first version of the uh of the platform
r ready uh then by the end of this year
uh we will have also the first round of
piloting so we will have quite a busy
year um again about uh what happened in
our first year of U implementation we
already achieved the first uh base the
the first Milestone uh the Baseline uh
we finalized the 15 deliverables out of
27 uh we gathered the F the and user
needs uh we defined technical
requirements and we designed uh the
platform
architecture all our Technologies are
under development and we are uh going uh
straight to to achieve the the next uh
uh Milestone that we have uh the
platform is also
progressing and from uh other point of
view we are U monitoring uh applying the
ethical principles required by the uh
commission uh we um uh to communication
and dissemination and we are in good
progress with these uh directions and uh
the work on exploitation and
standardization uh also started at the
beginning of of this year so this ends
my
presentation thank you so much Donna and
Monica for this
presentation um okay uh we will move now
forward for the presentation of atos so
Manuel Pastor
please
actually okay yes I I will do the
overall presentation of the project and
then um Manuel will talk about some of
the technical stuff okay please feel
free to share the screen
and if there’s a way just to keep it to
maximum 10 minutes that’ll be great yeah
yeah I will be very short don’t worry
thank you so
much um okay just let me figure out how
to
share
um right you can see it right yes we can
see thank you perfect so my name is Con
constantakis I’m with SE uh in Greece
and uh I’m coordinating
Athos uh so what is AOS it is quite
different I think from all of the other
projects that are taking part in this uh
project uh because um
uh it uh it is a project that uh is
dedicated to countering online identity
theft uh uh so it’s not about borders uh
or uh um uh or the most uh uh usual
types of of crime that have been
mentioned in previous presentations but
uh more about U um more Insidious and uh
perhaps more everyday type of crime um
so uh a bit of of uh information about
the project um it started in October
2022 it’s going to uh uh last a total of
three years we are precisely in the
middle of this timeline
now um uh it is a research and
Innovation action of course so it
targets uh medium TRL uh results at
about five or
six and uh uh it actually uh uh answered
the call with five uh five distinct uh
uh uh uh things that we’re going to do
I’m going to not going to go through all
of this text now but I’m going to make a
summary in uh uh a bit
later uh so what is the concept of uh of
Athos
uh we need we need to start uh with what
is the concept of online identity theft
so what is identity theft online or not
is when uh uh someone’s Identity or
elements of it are controlled by someone
else without uh uh of course the
victim’s um um uh agreement per say so
so what are elements of uh our identity
uh elements of our identity uh uh like
of our physical identity of course is
our image our voice our names our
signature our uh actually identity card
or passport um our social security
numbers uh uh uh and of course stuff
like that and uh very much of this uh in
in uh recent years perhaps in the resar
like in the last couple of decades very
much of this is also online so uh uh we
have uh a social media uh identity and
this is part of our identity we have
emails we have uh uh so many uh online
services uh from ebanking to online
shopping to accessing government
services
to even like of course watching Netflix
or uh playing games online everything uh
uh everything is connected to a sort of
online
identity uh and online identity theft is
when some or all of this is uh
controlled by someone else for whatever
reasons um of course there are uh uh
like the usual uh perhaps slightly
oldfashioned type of online identity
theft old fashion meaning uh uh perhaps
10 years old or more and this can
include uh emails coming or uh fishing
or trying to uh to get you to um to give
away your credentials so that they can
log in as you or uh that they can uh uh
uh get to your uh ebanking uh account or
stuff like that um there is of course
also other uh things like um someone
creating an in Instagram account that uh
has like a very very similar uh handle
to yours and uses the same pictures and
the same videos and uh so to some
Observer it might uh look like it’s
yours of course this is probably not a
problem for most of us but it can be a
problem for celebrities it can be a
problem for politicians because people
can then use uh uh such uh accounts to
spread fake news to influence people
because these people have a lot of um
influence on uh
uh on society and then of course uh
which is what this uh uh slide is about
there are some very very recent and high
technology
um um uh methods of uh identity theft
and uh one of them is deep fakes uh deep
fakes is a technology that uh is rising
very very rapidly like a couple of years
ago anybody would see a deep fake and it
would be more or less clear that it’s
probably fake not so much now and uh in
a couple of years it’s going to be
probably very very difficult as uh
things um uh get uh much much more
advanced
um we have all seen uh the recent news
uh a couple of months ago uh with the
Deep fake images of Taylor Swift uh that
made Global News and of course this can
also happen with other celebrities uh
there was also with politicians there
was uh um a couple of years ago um this
um uh thing with um uh deep fake video
of President zalinski of Ukraine urging
uh the Armed Forces to surrender which
of course was fake but um and it was
very quickly uh proven to be fake but uh
we can only imagine uh what sort of uh
impact these things can have um and of
course very very recently we also seen
how generative AI uh uh like Sora can uh
uh create very very realistic videos
that are indistinguishable from real
videos in in many cases um another uh
thing is fake social media accounts uh
not only what I mentioned like someone
actually creating an account that looks
very similar to yours but uh it can also
be um uh net of B accounts that uh uh
will uh uh circulate and uh uh share uh
each other’s posts and uh create a very
fake impression of what topics are
relevant or what topics are um are liked
by many people so what uh does Athos
want to do about it aons is going to
actually is building has built an
observatory that is still of course
expanding that has two um um two goals
one is to inform and educate the
European citizens of the dangers of
identity theft and how to protect
against it so a lot of information and
article for non specialized people and
uh the second part is to uh identify and
address the challenges that police
authorities face against online identity
theft because it is a very new a very
recent type of crime and uh um uh it’s
not easy either to report it or to prove
it or to actually uh uh uh address and
uh
um uh do something about
it so the project has actually Four
Paths of action and uh uh uh I’m going
to go very briefly through them so it’s
the sociopsychological
uh part which is to uh going to uh
measure what kind of impact identity
theft has to its victims and also to
society as a whole and what kind of
support structures uh are there and can
we improve upon these support
structures the second thing is the techn
olcal uh pathway so tools for the police
authorities uh uh to detect video
defects to detect audio defects to
detect uh uh botnet accounts on social
media and also um uh an experimental
tool that’s going to extract uh Trends
uh uh that might be relevant not to
solve a specific case but to understand
the general Uh current uh landscape of
uh um uh identity related crimes as this
might be discussed on dark web forums or
even on Surface web
forums um Manuel is going to talk more
about the technological part uh uh um um
in in his
presentation uh then we have the legal
part which is uh how can these
technological tools and also electronic
evidence as a whole be collected and
exchanged between different uh uh law
enforcement authorities uh in a lawful
way and in a way that can also uh be
useful in a court of law uh and provide
some assessment and recommendations on
that and then a very very big part of
the project is the awareness campaigns
so citizen awareness this of course is
our website which is the The Observatory
but uh it’s also uh our webinars and our
physical events and uh um uh uh bigger
or smaller uh uh scale things uh which
includes also quizzes games um articles
stories uh role playing games and so on
uh so that we can reach different kinds
of people children uh um um young people
old people people with more or less uh
familiarization with technology and let
them understand that uh two things first
they must guard their own identity and
also their own online identity and
second uh uh they can they must be aware
that not everything that they see online
these days uh uh is
true so um I have already talked about
this so the observatory is uh two
faceted online portal one is for the
public and the citizens with information
articles uh uh uh awareness um uh
information um some examples and so on
and the second part is going to be
restricted access for Lea only and will
include the technological tools that we
are researching and
developing uh now in terms of timeline
uh the project is going to span three
phases phase one is already complete we
had our needs and requirements we went
through the initial research and
development phase we have created the
public part of the observatory and we
have planned how to reach victims and
how to do our awareness campaigns now we
are in the second phase we are um uh in
the middle of developing the first
version of our technological tools the
awareness campaigns have already started
on multiple levels as as I explained we
have had uh interviews uh with victims
um uh to get their point of view and
what happened and how they fell about it
and how uh uh they wanted uh to be
supported and were they or uh was
something missing there and uh of course
we have also studied the legal framework
proposition and next year we’re going to
enter the phase three which will be
updated uh uh version of the
technological tools the final version of
The Observatory and also um uh
dissemination and stakeholder engagement
and of course some things are continuous
throughout all the phases which is
testing the tools evaluating uh uh uh
with alas in our Consortium and
constantly updating the
observatory so we are exactly in the
middle in month 18 of 36 uh uh you can
see the gun
more or
less and uh this is what the Consortium
uh of Athos looks like we have uh six
Partners from research and Academia
Public Safety Forum uh that specializes
on a uh citizen awareness three
different law enforcement agencies and
uh uh also to uh private for profit uh
uh
companies so I hope I didn’t uh take too
long uh we have uh uh besides me three
other people that are going to take part
in this uh um in this Workshop Manuel is
going to talk about the technological
things and uh in particular bi the
Biometrics which will help us identify
if someone uh if a video is deep fake or
if it is a the real thing um Anastasia
is going to talk about the ethical
implications uh of um of our work and
Mari Christine is going to talk about
about dissemination and exploitation
thank you so much thank you so much
constantinos great um okay we are a
little bit over time um so um thank you
for our project coordinator for the
insightful presentation so they provided
us with a comprehensive overview of the
project so now that we have this solid
understanding we will go into the
innovative ideas um driving the projects
um um so our discussion will revolve now
around the advancements of in AI
biometric features and other key
Technologies um elements that are
shaping the future of the border
security and crime prevention so we will
start uh again with the same um let’s
say categories of the of the project so
from tenzel we will have apostolis from
se he will present uh the technical he’s
a technical manager of tzer and he will
present um the tech technical you know
uh developments in uh in tener uh again
please everyone overall Please be aware
of the timeline that we have so maximum
10 minutes presentation thank you so
much please
apostal yes just give me a second to
share my screen
uh we can see okay perfect perfect okay
so uh thank you I’m AAS I’m a researcher
at uh thir the center for resarch
methology alas following the previous
presentation of SE uh is contining with
the next
presentation uh in so our presentation
this will uh Del into the technical
details of uh our project tenson
and we will uh provide you the technical
overview and the main achievement so uh
considering a basic part of uh uh the
project was uh uh the design and the
establishment of uh the architecture uh
in the architecture part we have
transition from uh the cocept design
that was uh briefly Des described into
the D and uh trans to a logical design
in ense uh what we tried to achieve was
uh uh the principle to to use the
principle of privacy and security by
Design uh in our methodology and put
security and privacy at the center of uh
uh the design from the early beginning
since we don’t wanted to consider uh
those two uh principles uh dust as
enabling Futures so uh security and
privacy by Design was is actually an
agile set of uh Focus security and
privacy practices that includes threat
models privacy and threatment security
testing and uh vulnerability management
uh so the idea is that uh the
organizations should keep uh uh
shouldn’t keep personal data private
Mainely because uh the law requires but
that uh privacy and security practices
should be the fation of uh their
operation and they should monitor dently
at all times uh uh all the goods and
services with uh privacy and security uh
issues uh
so uh in that manner we try to overcome
specific challenges we try to align with
a variety of technological
components uh we uh devised the way that
we will implement the use case workflows
and how uh this will be decorated into
an investigation infrastructure for the
use case PES that have been identified
and how we will emulate an investigation
environment for the C Cas pieces so that
was the challenges that we try to uh
address within the architecture design
and of course to include and utilize uh
A multimodel system that includes 12
core for raising uh
Technologies so uh moving next uh so in
the tensor architecture WE 12 different
core digital foric Technologies placed
together to deliver specific sub
subsystems and
functionalities uh in addition we also
consider the usage of non-core
technologies that facilitate uh the
presentation and visualization of the
information till the continuous
integration delivery of the uh software
components uh we chose four key
different offerings in order to
demonstrate the Innovation offered by
tensor project as part also of uh the
architecture design so the first uh key
uh technology uh offering as an
exploitable asset uh is the first
introduced uh in European Union
biometric data space that offers a
transworth data sharing environment uh
that uh provides an extra uh safeguarded
privacy by utilizing privacy enhancing
Technologies we will uh describe them uh
in the following uh with those part
particular Technologies are uh the
second key technology offering refers to
the Innovative application of long
language models and uh the generative AI
in the security domain uh to that is
used in order to offer insightful uh
case story narratives and allows users
coming from law enforcement authorities
and agencies to connect uh the dots and
have the story uh inside them the third
uh uh key offering is relies on a
multiple criteria decision making which
provides alternative options for
decision- making support uh by writing
the various collected information as
evidence uh which is based on nonuniform
uh prioritization assessment of uh the
collected evidence so not all the
evidence contributes with the same way
to the produced uh outcome and
recommendation and uh fourth the fourth
key offering refers to the allotting
mobile devices which utilizes open
source non non-commercial license Lo
locked software uh to provide an easy to
use solution that can fail out and used
by fores and practitioners uh in the
investigation
field
uh so uh the biometric data space allows
sharing of biometric data in a trusted
data e system where owners keep control
of their data that they own uh the
biometric data space creates identity
and Trust supporting authentication
mechanism uh self sovereignty identity
and verifiable
gradations uh moreover it offers a
Federate catalog service where uh the
search and uh uh comparison and match
available only on the crypted data uh
without uh revealing or disclosing the
uh Ro data information uh it moreover it
enables data sharing and exchange in the
data plane we consider the use of the
blockchain technology uh while in the
control plane uh the use of smart
contract to allow the automated change
of terms for the data sharing change uh
to be enabled and uh last but not least
the usage control uh which is being used
to enforce data usage policies and rules
that govern the data exchange so the
data is uh space uh the biometric data
space over specific advantages regarding
the creation of trash worthiness among
the certified
participants
uh uh it allows uh uh uh scalability and
uh the connection of multiple fores
organizations from uh different
countries and uh in essence it is a data
ecosystem that offers specialized data
services uh enables data sovereignty and
governance and provides increased
security and privacy uh by utilizing as
been told previously uh the specific
privacy andh has Technologies such as uh
homomorphic ention and uh fast
indexing so uh in tenso the biometric
data space is not uh uh considered part
of uh uh the tensor architecture but is
a platform that is uh that is a
standalone platform uh it is based
actually on the idsa international data
spaces reference architecture model and
also it aligns uh with the GX principles
for data harmonization of the biometric
data uh it uses actually the notion of
the connector where each connector is SE
as the interface for connecting one user
or one organization to the other and uh
considering the blockchain solution is
based on the solid framework that allows
for uh the smart codra to take place and
the data exchange take place based on
the smart codra and the deployment of
advanced privacy enhance Technologies
such as homomorphic encryption and the
large scale uh data indexing that allow
search and query forat and comparison on
the encrypted data
so uh why do we need actually a
biometric data space to enable data
sharing and exchange uh already there
are well established Solutions and
Frameworks for data sharing and exchange
uh however the use of biometric data
space uh innovates in the field of uh
data economy with uh uh the latest
advancements in the data governance and
our Solutions aligns with uh most of the
identified existing Solutions such as uh
the hero information exchange channel
the Sienna Channel interpol’s I 247 and
as our project coordinator aleni
mentioned previously with uh the latest
and recently new requirements of the
prom and prom 2 uh model considering the
data exchange and uh our uh offering our
biometric data exchange offering extend
beyond their scope to offer a
trustworthy to create a trustworthy data
system uh for self sovereignty biometric
data exchange which is uh uh improved
and enhanced with specific privacy uh
enhancing
technology uh moreover in tens we aim to
advance fores investigation by using
generative Ai and uh large uh uh
language models we aim to leverage uh
those Technologies to provide improved
understanding by performing Cobra health
analysis on the evidence collected from
various sources uh the offered natural
language communication will allow uh law
enforcement agencies and for raing
investigators uh to retrieve criminal
investigation related information uh
using natural language instead of making
peries to a database and moreover it
will enhance them uh with processing uh
of large volumes of data
uh another important key exploitable
asset of our architecture is the support
for decision making that is based on
multiple criteria analysis uh the
investigation recommendation and
enhancement component is utilized uh to
fuse physiological byal Biometrics along
with some additional features that are
being recognized such as clothing color
face mask or glasses uh it can provide
informed decision making and
recommendation by assessing uh the
modalities reliability and applying
different weights based on their pri
prioritization as previously mentioned
not all the modalities contribute to
with the same weight in the final
outcome uh depending on the conditions
one might be ranked with a stronger
priority in comparison with the others
and moreover it finally uh provides a
narrative generation for the cases under
investigation uh allowing allowing also
uh human intuition to intervene
uh
last uh the last key exploitable asset
uh refers to the technology for
unlocking mobile devices and R uh useful
information that can be collected as
evidence in specific uh cases such as
terrorist that that demand uh instant
access to the information by unlocking
the uh phone and check uh the latest
activity uh the problem is that uh Lo
devices and encryption and encryption
result uh in extended investigation
times and uh manufacturers continuously
improve security mechanism incorporating
sophisticated and more protective uh
features making unlocking and extracting
data of mobile device uh a very big uh
challenge so there is a strong need to
be able to bypass user authentication
mechanism on their mobile devices and uh
although uh coly commercial Solutions
are already uh available uh they require
expertise or training and are licensed
locked uh products that are limited to a
minimum number of uh users so what we
try and what we offer uh in tensor is an
easy to use inexpensive tool that can be
used uh by every law enforcement uh
agency regardless of their expertise
that is scalable out to a large number
of potential users so uh that was all
thank you for your
attention thank you so much
apostos okay uh we will move forward
with a technical presentation from um
flexi cross orestis yes so thank you
very much for being the Flor just a
second
to share my screen
can you see my screen uh we can see the
presentation mode the one that you are
seeing but it’s okay I guess I’m not
sure yeah it’s okay okay uh thank you
very much for giving me the floor it’s
is our great pleasure for being here and
at the same time we consider that it is
a great privilege for us to
with platform and having the opportunity
to exchange ideas and exchange very
useful experiences uh today will talk
about the presentation of uh the
technical models of flex
cross in flexi
cross uh we have uh three uscate board
and Crossing Pilots the one is four
phase trial located at the Port of
Galati at Romania uh the other one is a
road based trial uh located at the
northern borders between Greece and
Bulgaria at romano and the last one is
it is a train based trial located at
teski Romanian bobian border control
Point uh which are the needs the border
crossing needs we have identified the
first one regards the enhancement of for
security through realtime biometric
check risk analysis the second on is
related with smart solutions for traffic
relief and security Advanced B tracking
operations and uh the third one is uh
how to streamline ra travel with an
intelligent and secure F uh checking
system what is our approach uh this is
the envisioned uh flexr modules and
system architecture as uh previously
just have highlighted these are four
layers uh in the first layer we have a d
ingestion layer which combines the
hardware components the sensors which
are going to be used in the second one
layer we have more or less a pattern
recognition uh layer we have a crowd
Behavior Analysis we have a vehicle data
identities processing and classification
or Vision processing module in the third
one security border service layer uh
this is mainly uh risk identifier model
and last but not least we have a a
the creation of a user uh friendly
interface layer uh highlighting having a
very uh useful analytical Dash cods and
um and the opportunity to uh have a role
based control access and control
u i will mainly Focus my uh attention
here in the data processing layer of
course the final aim of our work is to
provide a powerful and being speci for B
uh surveillance providing and parallel
vigilance against potential
threads for this layer uh what we have
achieved is an AI based patter
recognition model uh we have uh achieved
a an indispens fure extraction based on
AI algorithm which enhance the feature
extraction for and videos we have enable
the identification of relevant patterns
and structures and uh our second point
is uh to achieve an object recognition
and
classification uh for that we have
achieved an improved object recogition
uh capability along with enhanced
accuracy in identifying and classifying
object with visual analysis and uh the
third point is about the anomaly
detection uh we are able to identify TR
patterns or instances that they
significantly from the nor and uh this
is crucial for detecting irregularities
outliers or potential threats in various
uh data
sets this is uh the the case in the G
pilot in use case 2 where we have a
computer analysis tool here you can see
two videos uh the1 video on the left
hand side is related with the
identification of u-turn and the other
one on the right hand side you can see
that it is uh related with some loal
paring uh what what are the capabilities
uh as we can see we have uh the
capability of vehicle identification
classification uh along with the vehicle
speed termination and as I said the
U-turn and L parking
events uh the
results uh we uh we envision to exploit
this uh this material in a web app uh
based
[Music]
um
say for authorities which are informed
from the driving CP behavior and
extractor loed
statistics uh for the next slide here
you can see uh a video uh combining
footages from drone cameras exploring
computer vision analysis tools the
technical
capabilities uh what is the context the
system receives an output video uh from
a drone camera and what we are able to
do is H to detect persons and tracking
by detection algorithms and uh finally
to extract some features based on rule
based uh approaches related the visual
PN cases such as person running or
person out of a bond as you can see uh
here
what are the results we also uh let say
plan to use these uh Tools in uh
webs for authorities and which are
informed for the invol suspicious
behavior for the next slide here we uh
we talk about person detecting mod uh
the technical
capabilities uh are related with uh the
uh the opportunity tracking uh number of
people which are who are located in the
train and uh analyzing them uh as uh
Intruders uh what is the opportunity the
opportunity is to uh inform long
agencies and uh to act
accordingly uh the Technologies which
are used are utilized in these previous
models can be summarized as integrated
YOLO algorithms with
Neal
networks for the facal recognition
modules uh what is our
capability uh the system can receive an
input picture taken from a mobile device
for example and compare them with the
database uh of IDs parts or passwords we
can uh see uh the uh matching of of the
photo with the ID and then
uh inform the authorities uh about any
uh arising
inconsistencies
and let’s
did for the Biometrics
detection uh the technical capability we
have is that we have a well- defined
model create data from extraction
national ID
cards uh for we have the uh opportunity
of data Gathering and
Analysis
uh we are currently uh ex we currently
extract from Romanian National IDs very
useful
features and uh finally what is our plan
is to uh integrate this uh model with u
web web apps based for authorities in
order to act accordingly for these
previous models uh of uh Civ Library
were used
and last I conclude my
talk uh this is our uh these are our
next steps uh for the midterm goals we
have the development of the tools in the
rest layers and for the longterm months
uh this is about provision of a central
flexi cross platform thank you very much
for uh for your
attention uh thank you so
much thank thank you so much for the
presentation um okay uh we will move now
to odos and um we have Jo
calapez hello good afternoon hi
okay yes we can see okay perfect thank
okay thank
you okay okay so um theud sales um
project aims at um providing a solution
that delivers at the same time uh fast
uh um border crossing processes both
for travelers persons and vehicles while
ensuring also high security levels
providing informed decisions to border
authorities and um uh insights on the on
on the border crossing processes uh the
focus is on land and sea borders um both
for uh on the land borders including
Railways and um and vehicle um
uh border crossing points it integrates
several uh technologies that uh provide
um at different uh point in time
interactions uh of Travelers and
vehicles um with the with the system for
that will be um processed by the the
platform and the decision support system
um for for an overal risk assessment and
the decision on the water crossing um
authorization or or
refusal the Technologies um include so
starting with the enrollment of
Travelers there will be an application
uh that will integrate um the creation
of a digital identity uh following ik KO
DTC uh standards creating both the
virtual component and the physical
component uh stored at the traveler
mobile uh device and also um a
continuous Behavior Authentication
algorithm that will um monitor the the
the usage of of the app of the user um
the interaction with the app in terms of
vehicle screening there are two main
Technologies uh the X-ray Technologies
for um vehicle scanning and um drones
uavs uh equipped with thermal and high
resolution cameras um the border
crossing um process uh performed with
the with the water control touch points
and with um video um monitoring um
faceless uh gdpr compliant TR travels
counting and uh the overall decision the
decision support system uh based on
multimodal Fusion from the the input
from the different systems um creating a
decision uh and with the expl
explainable AI to um inform on the why
that decision was
taken so go going a bit in detail into
each of these Technologies so the
creation of the digital and virtual
passport um so Travelers will be using
uh their mobile phones uh using um
uploading the their uh travel Document
uh capturing selfies with liess
detection um so creating a a secure
enrollment process um that will generate
the digital identity um depending on the
use cases it may be either directly
shared with the with OD platform or as a
DTC virtual component or it can also be
stored uh on a wallet uh format in the
app for um following the DTC uh physical
component iO Digital travel credential
physical component where the traveler
holds the passport in his mobile device
and presents it uh to the Border uh
Crossing Point um and controlling where
when when to present that um that
information
uh this will this allows for um
anticipation of the risk assessment uh
before the traveler uh reaches the the
border crossing point uh not only with
the enrollment but also with the
registration of of travel so border
authorities will be informed uh this
especially at the land borders uh land
NC borders not being subject to other
regulations from the airline industry
where airlines are required to present
that information through the advanced
passenger information and P&R in this
case border forces will get Advanced um
information also through this this
channel a second component to secure the
uh the the the enrollment and digital
identity um app is the AI continuous
behavioral authentication that um is
able to authenticate the usage of of of
the wallet by um assessing uh the
behavioral patterns and uh creating
generating a risk score that allows uh
the system to platform to authenticate
that it’s actually the actual user who
is uh interacting and accessing the the
wallet application so this is for the
enrollment uh part then moving to the
vehicle um scanning um so uh there will
be we’ll have
[Music]
the uh x-ray technology uh focused on uh
um well at the same time having a safe
the safest possible uh technology so
with a very low uh exposure to uh to
x-rays to to to avoid any risk any
health risks uh but also enabling um
scanning off vehicles in movement uh and
this applies both to
uh cars vehicles but also to to trains
um so the the the technology is in
progress in uh in order to to to achieve
this combination of uh vehicle in move
but uh low uh very low exposure to to to
radiation um and also uh enhancing the
the the detection of um of risk of
threats uh based on the on the image of
on the x-ray images detecting um um
substances vehicles uh uh guns and any
kind of um threat that may may be
present at the while the vehicle is
being um
checked second Technologies linked to
the to the vehicle scanning is the use
of um uavs equipped with thermal and um
high resolution cameras uh that will be
um as as the vehicle is uh approaching
uh the water crossing point the the uavs
will be will be um flying uh around the
the vehicles again allowing for uh move
Vehicles not to not be required to stop
uh to be to be checked um and uh the the
the output of these uh of these images
being uh provided to um to the DSs for
uh for for AI algorithms to uh run on
detection of different uh situations
such as uh detecting U number of people
inside the the vehicle detecting um
vehicle modifications uh and a few other
use cases that are may be relevant to
the border control
authorities then moving from the uh
vehicles to The Travelers border control
um so for the for the actual border
crossing of the Travelers uh based on
the enrollment they’ve provided via the
uh enrollment app um the technology will
uh be focusing on um implementing uh
under move uh face capture and
identification of Travelers against the
gallery of registered pre-registered
Travelers um and uh already getting
receiving the the the feedback from the
decision support system on the on the
risk uh assessment and the the the
authorization for the traveler to to
cross the boorder um also another
Innovation on this use case is the use
of the DTC PC the digital travel
credentials physical component following
I specifications um as what there were
very recently uh published and the where
the traveler presents the the virtual
passport started on his mobile phone uh
rather than uh his physical uh
passport second uh technology uh focus
on The Travelers border crossing
scenario is um the monitoring of the of
the actual border crossing point uh
through the use of um cameras installed
on different um different positions
either indoor or outdoor um and with the
video streams being analyzed by um by
the the by certain algorithms that can
uh perform different use cases such as
counting of objects or persons inside in
specific areas detect the entrance in in
Forbidden areas and uh um raising alarms
on that case uh detecting left uh
objects or on on on specific areas uh
also assessing the the Q side and dwell
time for um for example to inform the
Border authorities that eventually uh
additional resources would be would be
uh would be good to as as the cues are
increasing and the the waiting time is
is getting bigger um all of this video
stream is provided to the DSs um and
again where od’s platform processes all
the all information it provides the
feedback to
the Border authorities
then the uh multimodal fusion and
decision support system so at the core
of the odos platform um is this this DSS
that uh receives the input from the
multiple
Technologies um applying AI models to to
to perform the the the risk assessment
and detection of um of threats and uh to
um of potential potential risk to be to
be communicated to to the Border forces
also deciding on the on the outcome of
the transaction to to allow the bo the
travel to cross the boorder or not and
also to to to provide other other
information so to the Border authorities
this is supported by expain AI uh
basically to um to show the why why
certain decision was uh was was taken uh
by the by the machine learning uh
algorithms uh in case of in case um the
board enforcement wishes to to explore
um certain certain feedback from the DSs
for specific uh
situation so these are the different
technologies that will be integrated
into the OD platform so the the platform
will integrate all of this
um it will deliver the different modules
that will allow uh the Consortium to to
perform the pilot at at the different
scenarios presented by by Dan um earlier
either at both at um land and water um
scenarios um the platform will also
provide uh customer um customer facing
um interface interfaces to to the Border
force and to the to the passengers um to
the citizens uh for for for the based on
on the DSs results and on the on the
risk assessment and also produce uh
reports and vistion and and analytics uh
based on the follow after the the border
crossing and aggregating
the data from multiple um from certain
certain
period so this is um the presentation
for oos if there are any questions I’ll
be happen to present thank you thank you
so much for the presentation super um
now we will move to technical
presentation of AOS and Manuel please
feel free to share the screen okay just
give me a second
yes we can see your screen okay I’m
going to
the okay this is a very short uh
explanation about the AOS technological
approach to our problem that as cost
cost explained is a deep fake
detection this is the the the
technological part there are more more
than deep fakes there are also bot Nets
and AIO fakes but we’re going to explain
that in this is table of confence I’m
going to go to go very fast through them
because I know we have delayed well this
is the first one uh the strategy that
ethos has chosen for for this technical
challenge we studied several approaches
several different algorithms and we
finally decided to go for the
Expressions analysis
because we have the hope that it will be
independent of uh the technology used in
the future by the
fakers and it’s also independent of the
different kind of techniques that that
basically to phase synthesis which is an
artificial phas or face cloning which is
cloning a real person’s face with this
approach we are going to compare a
natural expressions of of the victim
with the suspicious video so we can uh
determine the certain patterns in in the
facial expressions of the victim are
present in the video or not all in an
automatic way
and we have the hope that this is an
independent absolutely independent
approach from technology since it’s
based in in human human expressions and
probably in the future no matter how
good are the the evolution of the fake
technology uh they are not going to to
capture the the the richness of facial
expressions and that our
hope so how are we getting this micro
expressions from from the phase uh very
quick first of all we detect the phase
with two different algorithms the first
one on the left is just to uh is very
quick we determine only five points at
the center of the eyes nose and mouth
and is used only to align the pH
vertically in order to do our own
analysis there is also a a more
complicated algorithm that gets 500
points from a phase and is used to gain
a
3D uh shape of a mesh of of the face I I
don’t want to go into very detailed uh
terminology using this uh this very
detailed fishh mesh sorry uh uh we can
uh extract with a a temporal analysis of
the different positions of mouth eyes
nose and
eyebrows Etc we can get different
gestures which psychologists call Action
units there are much more action units
that those that are present in the
screen this is just an example of the
kind of micro expression that we can get
from uh this three-dimensional mesh like
uh moving up the the inner eyb the
moving up the
chin closing the eyes wing in ETC each
uh action units each expression is is
calculated in five levels of uh
intensity that from a to
e also the the head orientation and the
Gaze orientation of the eyes is
calculated in order to be compared with
the natural motion of the
victim we record a video of the victim
and we compare the natural motion the
natural motion of of of the head and and
the Gaze of the person with the uh video
fake they normally uh doesn’t match is a
is a very good
clue
also a new part of
the video fake detection is audio which
is made by one of the participants in
the Consortium also in Spain uh the
effect detection is is based on and
trying to detect tricks on the audio
like edited
audio uh if you cut and past some parts
of the audio doing a microanalysis this
this Edition can be detected because the
the the sound wave is not absolutely
continuous and and there is a discontinu
in in this part like mro changes in the
background noise Etc it’s also based the
in detection of a natural voice
synthesized voice is very good nowadays
but still can be detected and
differentiated from natural voice and
clone voice which is the most dangerous
one because based on a real person voice
they can clone and create an artificial
imitation that is very good but still
detectable
also a part of the project is detecting
bot Nets which are being used for
criminal purpose and in order to do that
we we use uh web Technologies like
crawlers that are kind of spiders that
are just crawling con con constantly the
The Social Network in order to do that
we have to access the API of the network
and use this these mentioned
Technologies and I would like to do a
very quick
demonstration of about how easy is to
create a a de
fake can we see my my face in in the
screen right now
yes okay what do you think about this is
this the real Manuel or is
this what do you
think or maybe this one much
younger the face is three-dimensional
it’s integrated in my body also for the
older version of
me oh my God actually this is based in a
very popular actor called stany Tui
maybe you recognize some parts of the of
phas it’s three-dimensional and it’s so
easy to do it I just prepared it uh this
morning it took me half an hour or so
it’s based only in one one picture of
the of the
person that’s great that’s interesting
Manuel this is the real
me it’s even scaring sorry yeah it’s
scaring how easy is to do it
exactly and
finally I think there was a final
a final slide but just thank you for
your attention Etc so that’s thank you
so much Manuel for also demonstrating is
very indeed it’s it’s interesting how
easy things can be it’s really scaring
because you just need a normal computer
and a picture of a person you can you
can get it okay really worrying it’s a
real problem
indeed okay and that’s why we are here
to tackle all all these um threats and
find
Solutions uh okay so now we finalized
with the technical uh
presentations so we will have a 10
minutes break for you to I don’t know
grab a coffee and see you um at 38
minutes so it’s 338 I guess
um and then we will continue with the
exploitation activities
and please please make sure or if you
can stretch uh the presentation for the
exploitation in five minutes that would
be great uh so see you in uh in 10
minutes thank
[Music]
you
e
e
e
e
e
e
e
e e
[Music]
e
e
e
e
e
e
e e
okay uh I guess uh you enjoyed the
little break so uh hope everyone is
back so um continue with our agenda we
are in the next segment uh the
exploitation activities we will cover
strategic initiatives and collaborative
efforts aim to maximize the impact of
our research outcome so from the market
analysis to commercialization
strategies uh our expectation activities
are focused in driving tangible results
and size social uh benefits so
um given the fact that some projects are
you know at the beginning of the second
year um let’s say these are activities
on Art um we will have a ini you know uh
information about uh this approach so we
will start with panayotis from tenzo and
he will present the exploitation
activities uh for the
project please feel free to share the
screen yes good afternoon
everyone uh let me share my screen
so can you see my
screen uh not yet not
yet
okay you can see me now and yes we can
see your screen thank you
okay so my name is panagot papan I
represent tensor consorti fanus
Consulting and actually we have the
pleasure and the honor to deal with the
EXP exploitation management of uh of
tensor project so I’ll try to be brief
as you asked Anna ER and uh this is a
actually an activity within the
framework of the project that uh just
started as you very correctly
mentioned so the objectives as described
from the DOA is of course to identify
the exploitation potential of produce
result by all project Partners this is
actually the point of the uh in the
exact point of in which research uh
meets the
market that’s why uh we will uh have
plan to assess the Market Outlook and
perform the technoeconomic analysis
required in order to uh see elements of
commercialization in the use of tensor
developed technology to ensure the
efficient and continuous management of
the ibrs and of course to identify and
analyze the Innovation potential of
tensor now there are two major pillars
of expected outcomes the one is what you
can see now regarding the impact enh
enhancement the market analysis and the
business model ER by this analysis and
uh the analysis of possible business
models this will lead eventually to the
actual exploitation of the tenser result
and will actually provide the the the
necessary guidelines for the definition
of the business plan uh of course to
identify barriers and conditions
existing in in the market and the
preparation of uh the partners uh
exploitation plans the the other major
pillar is uh regarding IPR and
Innovation management uh and if in uh
the expected outcomes the first pillar
the keyword might be sustainability here
the keyword is
safeguarding uh safeguarding IPR through
ped submission and implementation of
creative ideas and of course uh
monitoring constant monitoring of uh the
Emerging Market opportunities via the
strength weaknesses opportunity and
threats as well as political economic
social and technological factor analysis
now it’s very crucial to identify to
find the reg any potential regul
regulatory constraints and opportunities
for placing tens Innovations and to and
to identify the relevant stakeholders
through Innovation Workshop there is a
plan for every for six-month reporting
regarding this uh related activities
which is very crucial not only to for
identification but for steer Wheeling of
uh the expected outcomes now uh steps
that has took place so far is that uh
market analysis questionnaire was
prepared in month 13 with actually the
initialization of this uh task and uh
there was the there was a distributed
questionnaire to Partners at uh month 14
now this focus on market dynamics
competitor and business models we are
actually in the current process of of uh
of taking the proc results and analyze
market trends demands and gaps uh to
develop clear value proposition for
exploitable results and uh This Will
turns out to to be provision to the
partners uh relevant to their
exploitation plans and the IPR aspects
with a questionnaire at month 14 now the
first version will be completed on month
15 for the market analysis as well as
the individual exploitation plans in
order to provide any IPR details that
may occur and this of course will go up
to every six month update regarding the
market analysis and the exploitation
plan now this is a sample of the of the
questioner template that uh we use uh in
order to collect our feedback uh with
some sample uh answers here and uh since
uh by the actual creation of uh and that
happens in in every project in every
Reser project when uh the uh
dissemination exploitation plan it is uh
let’s say uh it is ready uh and it is
uh submitted let’s use that term that
technical term then there there are
actually elements of what is of what the
exploitation uh P plan and Analysis will
be like so uh we consider the fact that
uh exploiting The Horizon results
platform uh in order to revisit
technology offerings for exploitable
assets to reassess any potential based
on lat markting Trend and extend the
list to include non- Technical and
tangible outcomes will uh will further
help project to identify the post key
exploitable results upon this platform
up to now we had already first already
made uh first contact with uh the
Horizon results booster uh collecting
the preliminary inputs on task at month
13 and uh we plan to leverage this uh
this uh tool provided by European
Commission in a specifically utilizing
the module C uh and
uh which is has to do with assisting
projects as may see to enhance their
existing exploitation strategy to create
a part of portfolio disin exploitation
strategy and to focus on key exploitable
results as offered from The Horizon
result
boosters booster and then uh by this way
uh of course uh as other project we’re
seeing the the the appropriate guidance
from this very useful tool of the
European commission uh and focus to
optimiz to focus to optimize the
approach of reaching the market it is
very essential in uh terms of
uh turning any uh result that are
produced within the framework of teso
project uh reachable to the market
because actually it it is a reciprocal
uh let’s say action and uh of course to
emphasize on the collaboration uh with
the Horizon strategic strategic booster
for strategic uh
refinement so the after this uh The
Leverage business plan development which
is another hrb service will be used and
uh we will be able to guide the partners
in the best possible way or for uh the
optimal business plan and at the last
but not least to facilitate which is the
the very essence of exploitation to
facilitate any project result uh and
each transition to the market now uh
there is let’s say somehow a road map
with some drone steps uh guiding to the
exploitation management we are here on
the market March 12 with our fcbm
Workshop so by by the end of the of
March we will merging we’ll be merging
all the inputs and uh then uh we will
proceed uh during April with
exploitation strategy seminar and after
that uh we will proceed to the market
analysis and the business plan that was
from my side thank you very much for
your attention and if there are any
questions I’m very glad to answer thank
you so much panayotis um for presenting
tensor exploitation activities um we
will move forward now with Flexi cross
and Thomas please feel free to share the
screen yes hello Yana hello everybody uh
thank you uh for this lovely Workshop
that is really very
fruitful let me just share my screen
quickly okay so can you see my screen
yes okay uh so my name is Tomas asra I’m
representing ebos uh and
anme um in Cyprus uh we are part of uh
of the flex secross projects and we are
leading the dissemination communication
and exploitation activities
okay the dissemination communication and
exploitation road map uh is uh divided
into three phases the first phase that
uh already started and almost finished
which is to build the footprint for uh
for the project in terms of uh project
websites social media presence on many
uh platforms to raise the awareness of
uh of the project to uh show the people
that the project are uh is exist what is
the objective what we aim to do uh what
is the expected outcome uh then we will
move to the phase two which is
continuing the uh awareness raising
approach uh and moving to the
stakeholder engagement where we will
engage stakeholders within the uh uh
border management uh uh industry let’s
say and to expose the project and to
make joint activities with other
projects and other clusters to make uh
the best of all the res search that is
being done within flexi cross projects
and other projects as well and the phase
three which is uh uh the last phase uh
where we uh start working on the
capacity building and impact generation
uh uh uh to gather all the uh
experiences and challenges that were
faced and uh uh uh uh raised during the
project and to uh uh uh give it to the
Border management
authorities uh to make impact and to
train them and give them some uh
insights now the timeline it’s divided
into three we started in 2023 which is
which was the phase one as well where we
did many uh uh participation in
Symposium and F we will see it in the
next slides and a technical Workshop as
well that we started uh uh internally uh
at the beginning then in 2024 which
started already uh where we we’re going
to move further with the technical
Workshop uh uh externally with other
similar projects and other clusters
where we can share the the experience
that we we are uh we are gaining uh to
start making trainings tutorials
webinars uh to the authorities to the
Border management Personnel uh we are uh
we already started doing newsletters and
press releases to engage the audience uh
uh with with the advancement with the
findings with the the results of the
projects that we are uh generating and
in 2025 we will continue for sure with
the technical workshops and the physical
trainings webinars and pilot trials and
this is the main uh fruit of of the of
the project uh at the end which is the
three Trias that gppe introduced uh
during the first phase of the
workshop uh th sorry to interrupt can we
you have done a presentation can we skip
the dissemination communication and just
only focus on the
exploitation okay thank you so much okay
so this is like uh uh let’s say the uh
exploitation in terms of synergies and
Joint activities with the other project
and clusters where we’re going to be
publishing uh uh in peerreview journals
and Technical Publications uh uh along
with other uh other projects as well
we’re going to do Workshop similar to
the one that we’re doing uh today as
well with tutorials and webinars we’re
going to have many exhibitions as well
in scientific conferences industrial
exhibitions and Symposium and the
general uh spreading with the relevant
actions now for the exploitation the
exploitation strategy that we have is
divided into two which is the first one
is the commercialization which is
divided into market and Trend analysis
Target user and competitors joint
exploitation plan and business model so
what we started is what we generated
each partner uh uh from his side like a
proprietary uh exploitation plan and we
studied the market and the target uh
Target users and competitors and now we
aim to jointly uh develop one uh
exploitation plan to be used for uh for
the generation of the final business
model and the second is the intellectual
property right that we started already
since the beginning of the project where
we uh defined all the uh uh let’s say
the background iprs or all the uh
copyrights that all the partners has and
we are uh during the um let’s say the
development that is ongoing during the
project some foreground on some new uh
uh copyrights may arise that need to be
uh uh let’s say uh
safe this is the achievement so far
where we put until like December 2023 we
developed the market and Trend analysis
and the
competitors uh uh and we uh as I said we
will continue further until uh July 25
to develop the joint exploitation plan
and the final business
model uh during the exploitation and the
the the work that is ongoing now uh we
defined the sector performance where we
uh uh realized that the sector revenue
of the overall uh uh sector uh there was
a growth from 2011 until 2018 with a
small drop between 2014 and uh 2012 and
14 due to the international economic
slowdown and we realized also that from
2011 to 2020 the number of Enterprise
operating in the security system uh
service activities has also grown in the
EU and the countries of the flexi cross
Partners so this is an indication that
this industry is growing and where uh uh
we need to put more more efforts and
more research within this uh this
industry to uh
follow now for the border security
market and customer segments we realized
that we have a a a different segment or
we we uh divided the market into three
uh segments let’s say it was uh it could
be divided by approach which is could be
by threat based approach and Factor
based approach or by environment could
be ground aerial or underwater based on
the uh application that we’re doing
within the project and last by system
which is uh the system that we’re going
to be developing or using uh uh within
the project and the second is the
customer segment we Define the customer
segments of the project or the end users
as well uh we Define the Border uh
control authorities Leia military bodies
crisis management authorities and so on
WE Define the agencies involved in
Border operation frontex the critical
infrastructure protection and other
agencies as
well and here we can see the joint plan
and the business model uh The Joint plan
as I said we developed each and every
partner an individual exploitation plan
which will be used as material to uh uh
uh the final joint exploitation plan uh
uh we have the key EXP the exploitable
results that we are achieving within the
project and in parallel uh as I said we
have the IPR rights to uh uh secure the
findings and the research and the
results that uh project partners are
developing and uh the last one is that
this uh we we adopted the lean canvas
business model where we are working on
the unique value proposition of the
project and to find what are the
solution uh that that we are uh uh and
the features that we are uh giving
within the project and what are the
customer segments and late and lastly to
to have like a cost structure and
revenue streams for the final project
for the
commercialization uh
part that’s and thank you that’s great
thank you Thomas so much for the
presentation okay um moving next to ois
and
Jo hi hello everybody
um please let me know if you can see you
can see your screen super thank you
thank you so my name is Jona I’m from
vision box vision box is the
exploitation manager of
Odus
um so we I’m going to speak about the
exploitation activities uh that are
going to take place uh in the scope
within the scope of the project
so the tasks that uh Encompass the
exploitation activities are U impact
enhancement market analysis and business
modeling IPR and Innovation management
contribution to existing Border
Protection policies and regulations and
impact on operational standards and
standardization activities so we are uh
at the beginning of month 15 uh of the
Odus project you can see that all these
tasks start Ed on month 13 apart from
tasks of the contribution to existing
Border Protection that is going to start
on month 24 so we have just started the
exploitation activities and so there is
no um tangible outputs that I can show
yet but I’m going to speak a bit about
the planned activities exploitation
activities for the
project so we have three
deliverables um that are related to
exploitation we have the first version
of the dissemination communication
exploitation in stakeholders engagement
report this deliverable was already
submitted and it has a first draft of
the exploitation strategy then we’ll
have the delal the second delal impact
enhancement Innovation management
standardization activities and policy
recommendations this deliverable will
compile all the inputs from
um that will be the result of all the
exploitation activities carried out
throughout the
project and then we will have the final
version of the dissemination
communication exploitation and
stakeholders engagement report where we
will
um have the final version of our
exploitation
strategy so the starting with the
exploitation activities we first had to
identify the exploitable assets and the
ownership of those assets so we have
identified eight U exploitable assets
that are going to be the Technologies
developed uh within the scope of the
project so we have simulus identity
verification in Border
Crossing uh digital and virtual passport
AI powered continuous behavioral
authentication non OB obstrusive and
safe x-ray Technologies for vehicle
scanning
UAV assisted vehicle scanning based on
thermal and high resolution cameras The
Faceless gdpr compliant travels counting
multimodal fusion and decision support
system and X AI for privacy and Trust
enhancement so this has been have been
all um described by my colleague uh at
the technical
presentation and of course who will uh
exploit these assets the primarily it
will be the partners that are developing
um the Technologies and also the end
users so the police the Border policies
and other legal en enforcement agencies
and also governmental bodies and the
European Union and standardization
bodies so as exploitation activities we
will uh build a business plan and sales
impact for each of uh the individual
partners and also for the joint
Consortium as a whole so we are going to
do a state-of-the-art analysis to see uh
what is already uh in the market and
what are the alternatives to the Odus
Technologies we’ll make an a competitor
analysis to see who is selling
alternative Technologies um to the to
the Odus and
then we’ll do Market segmentations where
we will identify which are our um
potential clients customers uh which
will of course be end users like police
borders uh sea and land um and other
other uh possible customers then we will
make a projection of Revenue and costs
so which how much revenue will the
partners generate by selling future
selling these Technologies and what will
be the cost projections in terms of
implementation costs Hardware costs
labor costs and also um do a go to
market strategy where we will after
doing the mark segmentation select the
channels uh for which we will um Reach
the the potential clients um and also
what is the message that we want to pass
through the clients in order to make
sure that our Technologies are going to
be selected for for them to use uh for
uh border
control also we will uh conduct some um
intellectual property uh activities uh
we will conduct a global search against
a prior art for potential invention
trademarks and other iprs to make sure
that there is no overlap overlapping
technologies that will prevent us from
uh protecting our um intellectual
property uh and we will uh protect our
intellectual property by by uh
submitting patent so we have committed
uh in our grant agreement to submit uh a
minimum of of two
pents we will also perform a SWAT Matrix
to identify the strengths weaknesses
opportunities and threats of our uh
exploitable assets and also do an
analysis uh a pel analysis to identify
external factors uh that might impact
the future exploitation of our
Technologies so other activities so we
will
um Define how will the Odus Technologies
keep being developed in the future and
by whom uh to we will do this to
guarantee that the there is a future
exploitation potential in all the
Technologies and for that the
technologies have to and keep being
developed
continuously we’ll also um release some
scientific Publications which will be a
scientific contribution for the uh
scientific
community and we also do some
standardization activities as
recommendations to the Border guard
authorities and law enforcement agencies
prepare a concrete plan to submit
contributions to relevant
standardization forums and bodies and
monitor the standard organizations
relevant to odcs
[Music]
um so that’s all for me I don’t know if
you have any question questions thank
you Jo thank you so much for the
presentation of what you say was
exploitation
activities and um now we will um have
the presentation from Athos uh
Marie yes hello good afternoon everybody
so I will share my
screen and can you see it yes we can see
your
screen yeah okay
good um so I will present the
exploitation activity of of etos as uh
already uh mentioned by U by ctis we are
in the middle of the project so it mean
that we have spent a lot of time in
setting up uh the main feature of of
etas and now we are starting to work on
on exploitation
uh so I will mention uh the route for
the uh development and exploitation of
our results the activities that we are
uring and the stakeholders we are
dealing
with so for the exportable results um in
fact as already mentioned uh our project
is a bit specific because uh we’ve got
two different types of activity in fact
uh we’ve got the observatory on online
identity set theft uh on this
Observatory is meant for the public uh
so for for the citizen uh for the
victims and uh we are developing
different activities under this uh like
games quiz Comics awareness campaign um
definition article um uh frequently
asked questions and we want to uh relay
and support some other existing campaign
and then uh as also developed by by uel
we are veloping some tools uh for the LA
um so the the fake NE the fake B net
detection the knowledge extraction and
deep fake detection both audio and video
and so these tools um are really uh for
the LA and we are doing specific
training uh for them uh and uh we have a
clear cut between these two side of the
projects
I don’t
know yes so now for our
activities um what we are doing uh as I
mentioned already we are uh here I’m
mixing a bit dissemination communication
and exploitation so uh we’re organizing
campaign and large webinar uh to
increase the prevention to raise
awareness to provide support to the
victim we are doing some clustering
activities with other fct projects um
also with other uh law enforcement uh
authorities we’ve got dedicated webinars
for uh the AL to increase their
expertise and to get also their feedback
in order to better uh torade our own
tools and regarding exploitation um we
are now at a stage where we are defining
our key exploitation uh results so we
are in the car ization phase of these
results um and Our intention is to apply
to service one of the Orizon research
booster for exploitation so um to uh to
apply for the exploitation
strategy um in the coming in the coming
weeks and then later on one will be in
the last year of the project uh to go a
step further and to go for the service
two of the booster for the business plan
development
um
and as I said um it might be um easier
uh when we have the different solution
provider for the different tools um for
the observatory itself it’s like uh an
observatory for the benefit of the
society uh and then we will have to to
enter more into uh political or societal
uh discussion on who could manage and
could who could continue and sustain The
Observatory so uh we have these two
Dimensions that are uh totally different
I would
say and you will see that uh with uh our
stakeholders we are dealing with um so
we’ve got the public uh so we’ve got uh
citizen consumer Banks children
associations um so we are uh trying to
to work with different Networks
uh of uh representing this different uh
type of uh public uh we are working with
the low enforcement authorities So
within our project we’ve got of course
some law enforcement authorities but we
try to go uh broader and to engage with
more uh law enforcement
Authority
um we saw that um they are very
interested in uh in having new tools uh
but they’re also very interested in um
getting more knowledge on the impact on
victim because it is something that is
less uh there is less research on this
aspect um and we are working also on the
impact uh on evidence recognition and
also legislative instrument
participating in some uh consultation at
you level uh we are dealing uh with
different player at you level like GGO
SEO European Parliament Ena and National
player cyber security expert private
company and National stakeholders so um
for us the exploitation part of etos is
um is really twofold uh we will do uh
for uh the different tools all all that
has been mentioned before uh with other
project it means uh the IPR policy uh
exploitation uh strategy um and we’ll
use uh the very um good Services
provided by by the booster um but we
have also the political Dimension um
that uh will take also a lot of part of
our energy for
exploitation so I try to make it short
because I know that I am the last one so
it’s thank you so much Mar I really
appreciate thank you for considering the
time as well so thank you for the
presentation um all right uh then we are
continue our journey through today’s
Workshop
with um an imperative let’s say reflect
on the ethical and policy dimension for
our
projects um so obviously we are
promoting Innovation but at the same
time we need to protect the fundamental
rights right so um let’s move forward
with the presentation that we have for
tenzor so
Mara uh yes sorry could we anticipate uh
engineering Flex cross presentation
just because of another obligation of
the colleague if
possible uh okay yeah sure okay so we
will have first flexi cross and then
tenser sorry thank you thank you very
much for understanding please let
me
um can you see the can you see my screen
yes okay one second uh okay I will um
will continue with u presenting the
legal and ethical considerations in um
in flexi
cross um so uh the approach uh that we
have um used in the in the in our
project uh was on the one one hand to uh
to have um project legal gender and
ethics manual and on the other hand uh
there were the ethics requirements that
the project were was identified with and
um the two have complemented each other
other and uh so on the one hand we have
addressed the issues of the involvement
of humans processing of personal data um
third countries um Partners from third
countries present in the project in the
Consortium health and safety uh at work
and artificial intelligence while um in
the manual it was um further detailed um
this um ethics requirement um um address
the issues related to artificial
intelligence biometric techniques
blockchain and personal data uh the
whole approach was um
um uh supported by the by an Ethics
board with two members with two internal
members and One external who initially
supported the Consortium in identifying
the requirements defining uh procedures
uh um action points uh and uh further
further on um uh focus and is now
focusing more in monitoring and
supporting the partners in the adopting
and implementing this requirements in in
concrete um as a as a legal and ethics
compliance uh road map we have um the
first phase in which we uh dedicated our
time
in um um analyzing the legal and um
ethics framework applicable to flex
across uh defining the ethics governance
framework um uh prepare the foundational
procedures for the adherence to the
research policy principles we have
prepared consultative checklist uh
Define the guidelines uh requirements
and recommendations uh to the partners
and prepar the number of templates to be
as a support uh during the project
lifetime the second phase was uh um and
is now more on um implementing uh This
legal and ethical requirement uh
performing aware Ness and training
campaigns uh support the the the
Consortium um in complying with the
legal and ethics framework and also
perform constant monitoring activities
the last phase will focus on uh um
completing the uh the ethics and the
legal manual uh update the the legal and
ethical framework um identify the gaps
in the current legisl legislations and
also provide further recommendations for
law enforcement um uh authorities
uh again this um each phase of this is
being um um reviewed by our um external
ethics advisor which on the one hand
looks in in what we have performed and
provides um additional suggestion
recommendations to be um um included in
the in the in the following uh following
phase um as um ethical challenges and
concerns that we had to face and some of
them you have addressed already others
are being are still being handled uh is
on the one hand the human involvement
invalidation and trial facing real
operational
conditions uh there was also the risk of
processing extensive amount of personal
data including special categories of
personal data and profiling
activities um we also have the AI
act it’s final final draft and its
impact on the flexi cross tool kit uh
the use of biometric techniques like uh
facial recognition and fingerprints and
the implementation and EST establishment
of a framework for privacy and secure
data processing with the use of
blockchain Technology uh compliant with
uh the gdpr so as I mentioned some of
these aspects were already addressed
others are being um um further um um
elaborated like the AI act which finally
uh we have um it’s um an informal final
um fin version and uh and now we are
planning to organize on the one hand
some awareness um sessions with the
researchers to inform them about the the
content and the the requirements under
um this new regulation but also in
looking into the the tools and solutions
of flexy cross and uh assess if there if
any of each of them falls under the
prohibition uh practices of if there are
high risks how uh how they need to be uh
adapted or which measures actions need
to be included in order to make sure
they will be eventually compliant also
with the AI
act so this is um from my side and um
this was the approach that we have used
um and we are using during the in the in
the flex cross from an legal ethical
point of view thank you Yana for your
presentation okay uh now we we will move
with the tensor presentation for the
ethics and policy actions please Martha
if you wouldd like to share the
screen
[Music]
yes can you see my
screen no not
yet okay I don’t know why because I want
to
open Mara you still with us
um maybe she has some connections
problem so okay let’s move with
OD and
Marina yes I’m here so let me just share
thank
you okay can you confirm if you see
something yes we can see we can see
screen okay perfect so uh um good
afternoon everyone I’m Marin and I’m the
athetics advisor uh and I am a research
fellow at The Institute of international
sociology of Gia which is a of course
project partner of um o sales so the uh
I would like to just you know respecting
the time but also you know um present uh
the Odis uh data protection and ethics
framework and uh what is behind in terms
of conceptual and management frame
framework and what the activities
procedures and outputs we have done so
far uh in terms of the um ethics and
data protection framework we have
established a sort of a structure uh
that is composed of three pillars the
first one as you can see is the
conceptual and management framework uh
which is uh actually which includes all
the bodies and governance actors that
are involved in the uh in the odos
framework and uh of course the
principles and we are obliged to uh to
follow during the course of the project
the second pillar is are the procedures
and we have adopted several of kind of
Assessments and procedure for evaluation
and monitoring of U all the requirements
that should be met in terms of Ethics uh
within the project and uh the third
pillar is the activities and outputs uh
meaning events uh any kind of workshops
that we have done and of course the
documents outputs of uh of our work so I
will uh present briefly all these three
segments or these three pillars and uh
the details within when it comes to the
first one so of course we we have a data
governance structure and uh we are uh
mainly following the data management uh
principles uh that you can see such as
Fair dat data data quality assurance uh
minimization anization ptimization uh we
use informed consent when uh whenever
research activity involves human
particip ANS uh and of course we make
sure that all the there is an adequate
backup storage capacity and access
control of of the data and the
documentations that we’re circulating
within the project um when it comes to
all the actors that are involved well
there are two uh let’s say levels the
the first one is the project level where
we have the ethics advisor that will be
me me and the external independent tics
board which is composed of two external
experts project coordinator and the
security advisory uh board uh I should
mention here that there is an etics
board as well uh and the ethics board is
actually composed of um the two
externals and uh uh three internal
members uh of the Consortium including
myself at the partner level we have of
course uh uh data protection officers so
these are responsible in terms of their
respective activities in order to be
aligned with the gdpr and compliance and
of course other National and internal
regulations of the of their respective
um
institution um as you know uh of course
uh we follow the fair data management
principle which is uh as you can see
findable accessible interoperable and
reusable uh standards in terms of the
data that we circulate within the uh
project uh I come now to the principles
and and standards that that we use and
of course uh this is uh one of the key
principles in research ethics and that
is the code of ethics where we um follow
um a mixture let’s say of ethicals and
and data protection principles and we
are going to see later on just in a
second what are the key data protection
and ethics principles in in uh uh within
the project so uh when it comes to the
ethical principles we follow of course
so we we line sort of align sort of with
the uh ethic principles that are
established with the Horizon uh Europe
regulation establishing the financial in
uh instrument and uh we have a set a
list of os principles you can see the
description here I just don’t want to
read all of them but the Integrity
voluntary participation the protection
of the participants um any activities of
anticipating harms avoiding of course
improper uh intrusion uh we make sure
that there is adequate representation
and expertise within the Consortium for
uh for the specific uh job that needs to
be done with in the research activities
and of course
confidentiality uh and anonymity and you
can see on the on the left side how we
align it with the Horizon Europe ethical
principles when it comes to data
protection principles of course we
follow uh the gdpr uh principles uh and
uh we have established our own list of
course which is with the gdpr principles
uh as a description and what are the
activities that are involved and uh what
these specific activities uh need to
take care of in Terms of the principle
such as non- incompatible use or you
know purpose limitation data
minimization uh prohibition and
exceptions uh in terms of ver link with
a purpose limitation notifications and
prior checks uh if uh of course um
during the course of the organization of
the research activities but also in
terms of the reporting of the research
activities I mentioned in form consent
point there is the recruitment but also
direct involvement of human participant
access to the information for the data
subjects uh in regard to their uh
privacy and personal information and
right according to the gdpr and the last
one is whenever we do the elaboration of
research uh results we have to follow
automated decision or actually
prohibition of automated individual
decision uh of U of this um of this
process when it comes to the procedures
so we have established us um set of
ethical
assessments firstly we have the soal
Privacy ethical social and legal impact
assessment which is a data protection
impact assessment uh we have done
already this um first cycle uh through
an online question year and now we we’re
in a phasis of elaboration of the
results uh a self assessment so we we
have a specific template provided to we
provide it to the partners uh of course
with just some guidelines on how to use
it and uh how to assess uh self assess
their work in individual research
activities according to the description
of work of the project and uh a risk
assessment which is actually a
collective effort that we all project
Partners do it’s not on individual basis
uh what other activities so far we have
organized um um two ethics um uh sorry
one ethic workshop and the second one is
coming this um uh this year where we um
uh presented to the project Partners
what is our framework of course what are
the obligation what are the ethical
requirements and of course all the uh
self assessment documents uh but also we
organize uh especially Institute project
partner Isaac that where come from it’s
interactive activities uh and um uh
Whenever there is help um uh within the
project partners and the consultation we
uh we do that on a regular B basis where
when it’s needed uh but we also make
meetings with um uh external
advisory uh external experts uh and U
Whenever there is needed and uh on the
basis of their description of work and
responsibilities or they need to do we
help them in assist them in this uh
effort and of course individual
consultation me meetings whenever that
is necessary we also did one C
Workshop already with on the S so this
is our second one so thank you very much
for inviting us it’s really a pleasure
to uh to be today with all of you here
um what are the contribution that you
actually request uh throughout the
project is of course doing the
individual assessment such as Whenever
there is a research activity involving
individuals there is a specific recruit
recruitment checklist that the project
Partners need to uh follow the
assessment I mentioned but also there
are two others like uh making sure that
there is a plan if there is an
incidental findings possibilities and
health and safety assessment which is
part of course of the ethics
requirements as we’ seen uh and heard
from the previous project that are
standard ethics requirements for this
kind of uh kind of projects um uh we
also requested from the project Partners
the specific Declaration on indidual
basis of for a compliance with the gdpr
uh the uh the guidelines of trustworthy
AI in terms of eics and of course we
cannot do that now with the AI act
because it’s not no formal yet and um um
of course we have a templates for
informed consent forms and uh already
adopted which now in the course of the
project need to be further developed
depending on the research activity and
um uh as as because AI components are
part of the project uh we also do the we
use the EL Online system in order to
make the uh the assessments as well but
we also have a specific template where
we elaborate our uh responses on the
altea
questioner uh that is all from my side
of course if you have any question and I
do hope I didn’t take any more time for
for the other speakers with this session
thank you thank you Marina thank you so
much for the comprehensive
presentation um okay we will move now uh
to tensor and Mara are you able are you
back yes yes yes yes okay so I assume
that now everything will be
fine can you see my
screen no not
yet I don’t know why because I incom
W Theory should be because I’m sharing
the screen all the screen no we cannot
see it
maram because it say that one it’s
needed to Ser my
screen I don’t know why Martha I will
share the screen of the presentation uh
just give me one second because it say
that I need an additional permission so
I don’t know
why but in any case so I will start
before you okay thank you very much
sorry for this inconvenient with the
with the presentation so my name is mar
and I will present the ethical issu in
intenso project so er that will be
covered by EAS I wanted to stress one
point that even there are one e
requirements in tensor project that it
will be the recruitment with the
participants the security measure the SE
country participants and the artificial
intelligent issues so it doesn’t mean
that it’s only the ethics issues in one
work packet this is something that is in
more activities in a lot of work packets
especially when there is one interaction
with the with the human beings in this
case with the newers so and it’s
something that is not only in one
activity it’s one overview of the of the
activity so H our role in this project
is to Monitor and of they legal aspect
that could affect T and in this case as
my colleagues stress especially the EU
artificial intelligent ad so that this
is something that we have to be aware of
this because it can it could provote
some some things H from the legal
approach so I want to state that we are
H um taking care about two issues for
one side the technological development
that we are doing in tenso the platform
and The Innovation and for another one
to rearch involving human missing tensor
so this is something that we want to
make this distinction so the development
by himself but at the same time the
research that we are going to do with
the with the human beings regarding the
development of n project had my
colleagues in in advance so we have the
charter fundamental rights of the EU the
general data protection gdpr of course
the convention so it’s something that we
have to keep in mind and this is really
important in our case the biometric the
article five and the special categories
in data protection that we have in the
gdpr so regarding artificial
intelligence is something that is really
really important in our project so
because we have to provide one
methodology that it will be used to
assess the artificial intelligence that
we are using so in this case we are
going to use the ethics guidelines for
try artificial intelligence that it has
been presented by the high level expert
group for artificial intelligent the key
elements in this issue it will be human
agencia oversight Technical robustness
and safety privacy and data governance
transparency diversity
non-discrimination and fairness social
and environmental wellbeing and
accountability so this is something that
we are going to take into account in our
assessment using the altime
methodology next slide please
the guarded the responsive rearch so
this is something that involve our H
resar the re that we are going to do
with the human beings in our case with
the users so in this case we have to
develop protocols for the pilots and we
are really in touch with the um end
users and with the user responses in
order to make sure that we are
um er following the guidelines providing
previous deliverables that it mean
recruitment of the particip ANS volunt
they are volunteer so they can leave the
research at the moment that they want to
do it without any kind of response so
the proc to do all of these issues ER
the consent for this is something that
is really important so the consent for
the adaptation to the National context
the internal procedures and local
language and the Recruitment procedes
and data management so it’s something
that we are really aware of of of this
the recruitment procedures align with
ethical principle this is something that
is really important in our case because
we are working in many cases with the
and we are working in many cases with
volunteers that they are part of one
organization and we have to make sure
that we are in line with that with the
the this H
requirements and next slide please
regarding the policy recommendations
this is something that is really
important in our case so that the
because there is no one certification
and Alor aing so and this is one
becoming an urgent issue at European
level so it’s something that it’s maybe
more in L with the E EU artificial
intelligence not so but we need one
certification one standard one proced
that it will be common in in in several
countries or in in
all companies that are involved in
artificial intelligence just to make
sure that we have Al our algorithms from
an ethical point of view at the standard
and PR um procedures for this should be
develop in the next years or next I I
will say it in the next months but maybe
it will take long time but in any case
it’s something that from the point of
view of the political recommendations we
want to to aress so H has main
conclusions so intor project is really
important the ethics point of view in
the polic in the reair and in the
platform that we are developing now
solution and at the same time it’s
something that will monitor
ER especially from the artificial
intelligent point of view from the
EU ad in ordering to make sure that we
are in line and we make the change that
it will could be act from the
development on these new rules in the
European framework thank you very
much thank you
Martha thank you so much for the
presentation um okay and then we are
going to move with um Anastasia from
atos um kindly ask if you can squeeze it
in five minutes that would be great
thank you so much Anastasia I can
promise but I will
try H give me just one sec to to upload
my
presentation
um it should be visible to you now
not
yet it’s not okay okay we’ll try it
another way around actually now now it’s
yeah it’s fine um yeah perfect I can see
it okay okay I will put it in a
presenter mode um hi everyone uh it is
my pleasure to meet abon you today and
to be able to present to you briefly uh
the ethical Frameworks and policies
within the Athos project uh let me
firstly introduce myself
my name is Anastasia vidaki and I’m a PD
researcher at vub and together with my
colleague sergy vet mayir who
unfortunately could not make it today we
participate in ethos project H so what
is our role in methos it is to address
the legal and ethical challenges faced
by the project both during it and when
deployed uh in the societal real uh
we’re responsible therefore for
monitoring and controlling the conform
it with ethical standards and legal
compliance um and we provide advice on
the matters concerning applied ethics
privacy data protection and societal
acceptance uh as as already ctis and the
previous colleagues that spoke mention H
ethos is a really unique project so
without further Ado I think it is high
time to delve into the subject of
today’s presentation namely ethics and
policy actions within ethos and I will
begin with presenting the relevant
ethical framework of the project and the
measures aspired for ethical h e
evidence collection and usage of
biometric Technologies um as ethics
policies that are applied in the context
of the project uh so as you can see on
the one hand uh we have already
considered the research ethics framework
H depicting concerns on the screening of
recept activities and how resar is
performed um in order to ensure its
compliance with ethical and normative
requirements as you all know under
Horizon uh Europe research project the
activities involving human participants
regardless of their nature or their
topic are subject to ethics compliance
uh so the ethos project Partners have
considered several activities that
potentially H raise um ethical concerns
including processing of personal data in
of interviews observing social media
platforms and tracking or reusing
information uh those have been
separately addressed uh to begin with
while conducting covered research ethos
project Partners May inadvertently
process personal data uh from internet
users while monitoring the dark or the
Deep Web a specific requirements and
organizational measures have been
followed uh to ensure compliance in this
matter H those include ensuring no
personal data is collected um collecting
data unra un abrasively and in
accordance with local cultural values
and obtaining National ethics approvals
beforehand uh Partners also consult
legal and data protection departments
they adhere to National legislation and
Safeguard the anonymity of research
participants before undertaking covert
research uh Partners will provide
detailed justifications and explanations
uh and when utilizing the internet and
social media uh data for research which
is uh a a special characteristic of
Theos project caution will be exercised
to avoid combining s sensitive data
categories from different sources which
could also lead to an infringement of
the individual rights um Consulting with
the institution’s data Protection
Officer and ethics advisor securing
ethical approval for data collection
adhering to platform terms and condition
recognizing um on open- Source data
availability ensuring appropriate
safeguards for vulnerable groups
assessing potential harm H for data
exposure obtaining consent uh for data
used in close groups and respecting
users privacy expectations are measures
aiming to mitigate the risks and ensure
ethical conduct um in research involving
internet and social media data so the
use of publicly available data as we saw
in for research purposes requires
careful consideration of its fairness
and legality on a case-by casee study
and this has been strictly followed by
the ethos Consortium uh just because
data is accessible to the public does
not Grant UNR unrestricted processing
rights so when using uh publicly
available data from social media it’s
crucial to assess whether the
individuals intending for their offering
to the public and ensure compliance with
data controller terms and conditions um
in this matter seeking guidance from a
data protection officers or experts H
has been H conducted and has been
advised in cases of uncertainty in order
to ensure lawful and ethical research
practices uh last but not least
participation in interviewing activities
H in ethos is voluntary and it is
informed involving only adult
participants a capable of providing
explicit informed consent um ethos
ensures that no individuals unable to
give informed concert including H
children or infants will be involved in
research activities or have their
personal data processed uh ethical
considerations regarding human
participants are monitored and updated
on a regular basis for these purposes uh
on the other hand we have the Innovation
governance framework which focuses on
legal ethical and societal issues that
arise from the development and potential
exploitation of the project its
acceptance by society and its potential
effects to the fundamental rights and
freedoms of the individuals Innovation
governance H concerns those let’s say
deeper issues such as but not limited to
human dignity fundamental rights
freedoms and democracy that the
legislation cannot always answer and uh
therefore ethics come into play and
render a valuable tool for governing
technological
innovation so go so going further intoo
in order to view the ethical policy
applied in ethos in matters of
innovation governance namely uh we will
see the measures followed for the
ethical e evidence collection and for
the application of biometric
Technologies for purposes of uh
identifying online identity theft more
specifically we’re going to check which
parameters were taking into account when
designing the ethical collection of the
evidence and the application of the
biometric Technologies at this point
point I have to mention that the work is
still under progress however the main
concerns have already been expressed and
have to do with the interference of e
evidence Collections and Biometrics
practices H with human rights and
Democratic principles so let’s examine
them quickly one by one uh firstly we
have the issues of privacy in the public
disc discourse arising uh the notion of
online anonymity and the expectation of
privacy are really relevant for ethos
project uh along with the fact whether
IP addresses subject or Access Data can
H be regarded as personal data and with
the integration of new technologies we
can say that we’re also experiencing a
re um a new paradigm shift in a criminal
investigation and maybe the criminal
procedure as a whole so from reaction
mechanism it seems that we’re moving to
prevention Technologies to
criminalization of reparatory activities
as such H as a result the individual
face is a historical and unparallel
deont control of H on potential self-
incriminatory information but also on
the capacity to foresee when he or she
might become a suspect in the eyes of
the authorities there is um in this um
uh subject a strong risk that procedural
safeguards in the heart of fair Pro
process such as the presumption of
innocence the right to remain silent and
the privilege of self incrimination
might de facto become theoretical or
illusory to the fact of criminal
proceeding at the same time as Manuel
talked about before we have the web
scrapping the method used for exploring
the dark web which might collide with
the freedom of expression in the
internet uh the collection of personal
data by social media providers may not
be limited to the activities performed
by individuals on social media and H the
social media platforms themselves the
targeting of social media users on the
basis of information concerning their
browsing H Behavior or other activities
outside the social media platform can
give individuals the feeling that
they’re constantly monitored and their
behavior is systematically um under
control so this may cause a chilling
effect that impacts how users perceive
their online experiences uh such effects
may be exacerbated if the targeting is
also based on the analysis of content
shared by social media users um the
implementation of web monitoring
Technologies such as the one in Athos
might also potentially result in a more
fine grain discrimination and
classification of citizens and an
enhancement of um social sorting
practices there is also a risk that
processing activities as such could
could um um allow the identification of
habits but also other cultural ethnical
or Community shared attributes um along
with them the principles of uh necess of
necessity and proportionality H which
are vital in a Democratic Society are
further challenged and um last but not
least um the group The the concept of
group profiling has also be raised we
understand that all those actions H and
practices already adopted or that will
be adopted in ethos have serious ethical
implication
on the research that have already been
considered and will be questioned also
in the future and keep monitored to
ensure the compliance of those research
Endeavors not only with the EU but also
with the international framework h on
ethical principles and uh on legislation
and with that I would like to thank you
for your attention and if you have any
questions regarding the Frameworks i h
tried to describe in a hurry feel free
to contact me in the email for more
details thank you so much Anastasia
thank you for um helping us uh somehow
be in our schedule time um okay so uh we
are almost there I know we OV exceed the
time of the of the workship that we have
so we had already um in presentation
from the technical progress discussion
on the ethics and policy action so what
are we doing next is to discuss uh the
next step forward uh because our journey
doesn’t stop here so I will pass the
floor now to the uh project coordinators
just to have the you know uh 5 10
minutes to discuss
[Music]
the um the conclusions let’s say of this
of today’s workshop and I know I’m
really sorry for you know of for
achieving the time that we we have so
far there but there were so many
information that has to be shared right
and it was very
interesting so thank you thank you Anna
thank you everybody uh very very
interested in in this Workshop today
very interesting presentations uh I
think it’s a very good starting point
for us uh we have already identified
some uh complimentarity between the
projects uh we’re happy to to work on uh
establishing this further
and maybe see how uh we can work
together maybe on a more tangible side
such as uh uh on our Pilots for example
and the use of our Technologies uh in
the framework of uh the security in the
Border management uh domain so now that
we know each other I think it’s a good
idea as proposed earlier by the European
commission
Representatives um to have another
session in a few months maybe from now
uh have
established uh who we are what we are
doing so let’s work on something more
concrete uh that would be my my my
vision at least I hope uh you are Shing
the
same
uh jeppe Monica
Donna H and the colleagues from ethos
we’re happy to keep this channel open
and uh see our next opportunities for
collaboration andna thank you very much
for the moderation great work thank you
thank you everyone thank
you from my I please hear me okay uh
sorry but I’m driving because I the
personal obligation uh first of all I
think that we understood that for sure
if we have to talk uh about more
detailed uh
project results uh next time we will
need more time to uh in order to
dedicate the proper time for each for
each lot dedicated to the project I
think that this is a good lesson learned
for
sure uh the second point I think that uh
beside this uh this um virtual meeting
maybe could be good also to
establish uh if possible wherever
possible to share doents for example to
have a a sort of yeah virtual group
where we can at least upload the
presentation and organize also have the
possibility to organize better the uh
the content in advance to see also to do
some connections with a projects because
for example from my side we
had a couple what I remember from the
presentations like for example the
possibility to uh to to understand how
for example from the Picos point of view
we could integrate with a um with a with
a data space that you were planning in
tensor for example that could be uh nice
another another
approach while waiting let’s say for the
the next release of the ngx system data
model and the other point that is more
related to the to the awareness campaign
that was talking atos before talking
about fraud identity that is online it’s
true
but maybe some of them that could be
also interesting to understand how they
will be defined and to propose for
example for not only for virtual
identity but also let’s say for uh not
for virtual so to access services with
their own identity into the
verification for example the
authentication of people that want to
cross border and so they need uh such
kind of authorization in advance and
could use the systems without with the
route precautions essentially I don’t
know how to but it it sound to me that
would be very nice to have such
awareness campaign also
for uh to to explore uh in play to so to
understand how they will be designed as
I said and uh so virtual virtual
environment where to share documents
these two points that for me were
interesting during the presentations and
also as already
knows and as well we have also contacted
the Horizon booster to so to complete
the two actions for module a module A
and B uh and this could require
essentially some effort from the project
that could be of the same project group
that okay we can discuss
offline uh with some emails just
proposing you next actions that could be
good to have and to present semination
and communication
activities as a project group and we
could have the support of European
commission to create a list of joint
results or results or collaboration as
we were mentioning before H but also we
could have the opportunity to have a
sort of a uh coordinated brand identity
for the project group and this could be
also nice in terms of support so to to
be to
be a little cluster maybe but with the
different from different point of view
from different point of
view this was my my understanding of the
today session agreed thank you so much
and also my next next actions that maybe
we can take note also to to send to to
Julio and to the rest of the commission
exactly okay
we do
so right any other comments
or from okay sorry sorry sorry it’s on
the Sal turn I’m I’m not going to jump
no no no it’s okay there were no turns
it’s just whomever wants to to jump in
okay then from athos’s side uh thank you
all for this invitation uh it has been
interesting um to be honest I would have
welcomed perhaps more discussion rather
than individual presentations because I
think that uh also New things can crop
up in discussions that uh we haven’t
thought of earlier I was happy because
um even though AOS is a different uh uh
focused project than perhaps the rest of
them um I could see that also in the
presentations of other projects um uh
aspects that are relevant to identity
theft uh perhaps in a different way
uh but uh uh um uh like for Border
management for example uh are also
relevant to other projects so perhaps
there could be some Synergy there and uh
perhaps also
The “FCT and BM Projects Synergy Workshop” from 12 March 2024 featured several key presentations and discussions involving multiple European Commission-funded projects centred on crime prevention, border management, and security research. The primary focus was on TENSOR, FLEXIcross, ETHOS, and ODYSSEUS projects.