Connect with us

Politics

Horizon Europe – Space: call for experts

Published

on

horizon-europe-–-space:-call-for-experts

EU Space Research aims to foster a cost-effective, competitive, and innovative space industry and research community. Under Horizon Europe Cluster 4 – Space (Destination 5), HaDEA is funding projects that prepare future evolutions of the EU Space Programme components, foster the EU space sector’s competitiveness, reinforce its independent capacity to access space, and secure its autonomy of supply for critical technologies.

To evaluate project proposals submitted under the upcoming Horizon Europe EU Space Research call 2025 (HORIZON-CL4-2025-02), HaDEA is looking for experts with knowledge and professional experience in one or more of the following (or related) areas:

  • European Spaceports: Spaceports; Launch Systems; Launch Operations; Launch Standards and Regulatory Practices; Spaceport Interoperability and Safety Equipment.
  • Space Transportation Systems: Disruptive Technologies for Digitalisation; Eco-design Software Tools to enhance In-orbit Reconfigurability; Smart Avionics; Health Monitoring Systems and Smart Sensors; On-board High-data Rate Processing; Thermo-mechanical Monitoring and Damage Detection; Ground and Flight Software for Data Management.
  • In-Space Operations and Services: In-space Servicing, Assembly and Manufacturing (ISAM); Satellite Life Extension; In-space Logistics; In-space Refuelling; Rendezvous, Proximity Operations and Docking (RPOD); Functional Satellite Modules; Spacecraft Service Interfaces; Space Robotics.
  • Satellite Communication: Digitalisation; End-to-End SatCom Mission Capabilities; Satellite Network Interconnectivity; Optical Communication; Inter-Satellite Links; Reconfigurable Payloads; 5G/6G Interoperability; Distributed Computing; Flexible and Modular Testbeds; Data Fusion; System Security; Resource Usage Optimisation; Processing Payload Hardware; Data Downlink.
  • Earth Observation: Digitalisation; On-board Processing Software and AI; Multi-source Data Fusion; Equipment and Instruments Digitalisation; Ground Segment Interfaces; Active and Adaptive Optics; High-power Electronics; Miniaturised Instruments Design; System Security; Resource Usage Optimisation; Processing Payload Hardware; Data Downlink; Remote Sensing of Maritime Litter and Ship Source Pollution.
  • Copernicus Services: Copernicus Climate Change Service (C3S); Copernicus Atmosphere Monitoring Service (CAMS); Copernicus Anthropogenic CO₂ Emissions Monitoring & Verification Support (CO2MVS); Copernicus Marine Environment Monitoring Service (CMEMS); AI/ML Digital Transition of Copernicus Services.
  • Space Critical EEE Components and Equipment: RISC-V Microprocessors on 7nm; Chip Scale Atomic Clocks; Solar Cells; Connectors; Advanced Packages; MRAM Memories.
  • Quantum Space Gravimetry: Exploitation of Quantum Space Gravimetry (QSG) Mission Data; Quantum Sensing Technology; International Scientific Cooperation.

Interested experts with a very good command of written and spoken English are invited to register their profile in the European Commission’s expert database (see Call for expression of interest for experts 2021-2027).

In case you are already registered in the database, please make sure to update your profile and include relevant keywords and/or topic areas.

The final selection of experts will be made on the basis of selection criteria such as professional expertise and experience, as well as the absence of conflict of interest. In addition, we strive for a balanced composition in terms of geographical diversity, private-public sector representation, and gender. For reasons of gender balance, we particularly encourage new applications from women.

Contracted experts act in their individual capacity to assist HaDEA with the evaluation of project proposals and/or the monitoring of approved projects. Please consult the Standard briefing on Horizon Europe proposal evaluation for more details on the overall evaluation process and the role of individual experts.

In case of questions, please contact HADEA-SPACE-CALLSec [dot] europa [dot] eu (HADEA-SPACE-CALLS[at]ec[dot]europa[dot]eu)with your expert registration number and your specific field(s) of expertise.

Source link

Author

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Politics

Colombia: Joint Press Release on negotiations on a Partnership and Cooperation Agreement

Published

on

colombia:-joint-press-release-on-negotiations-on-a-partnership-and-cooperation-agreement

DISCLAIMER OPINIONS: The opinions of the authors or reproduced in the articles are the ones of those stating them and it is their own responsibility. Should you find any incorrections you can always contact the newsdesk to seek a correction or right of replay.

DISCLAIMER TRANSLATIONS: All articles in this site are published in English. The translated versions are done through an automated process known as neural translations. If in doubt, always refer to the original article. Thank you for understanding.

DISCLAIMER PHOTOS: We mostly used photos images that are readily available online, from free sources, or from the people promoting the news. If by any chance it happens that we have used one of your copyrighted photos, please do not hesitate to contact us and we will take it down without question. We do not make profits as this is a not for profit project to give voice to the voiceless while giving them a platform to be informed also of general news, and it is completely free.

Author

Continue Reading

Politics

Trade: Coreper endorses the Council’s negotiating position on FDI screening revision

Published

on

trade:-coreper-endorses-the-council’s-negotiating-position-on-fdi-screening-revision

DISCLAIMER OPINIONS: The opinions of the authors or reproduced in the articles are the ones of those stating them and it is their own responsibility. Should you find any incorrections you can always contact the newsdesk to seek a correction or right of replay.

DISCLAIMER TRANSLATIONS: All articles in this site are published in English. The translated versions are done through an automated process known as neural translations. If in doubt, always refer to the original article. Thank you for understanding.

DISCLAIMER PHOTOS: We mostly used photos images that are readily available online, from free sources, or from the people promoting the news. If by any chance it happens that we have used one of your copyrighted photos, please do not hesitate to contact us and we will take it down without question. We do not make profits as this is a not for profit project to give voice to the voiceless while giving them a platform to be informed also of general news, and it is completely free.

Author

Continue Reading

Politics

Steal, Deal, Repeat: Cybercriminals cash in on your data

Published

on

steal,-deal,-repeat:-cybercriminals-cash-in-on-your-data

In its newly released 2025 Internet Organised Crime Threat Assessment (IOCTA) , Europol has issued a chilling warning: the digital underworld is no longer just about hacking into systems—it’s about profiting from stolen data. This underground economy, fueled by compromised identities, credentials, and sensitive information, powers everything from ransomware attacks to child exploitation, forming a sprawling criminal ecosystem that transcends borders and technologies.

The report, published today, underscores how cybercriminals have shifted their focus from isolated breaches to building a robust marketplace where stolen data is not merely an end goal—but a currency.

A Hidden Economy Built on Access

At the heart of this criminal enterprise lies access—access to corporate networks, personal devices, and individual identities. The IOCTA 2025 paints a stark picture of a world where nearly every aspect of our digital lives is under siege. From phishing campaigns to AI-generated deepfakes, cybercriminals are deploying increasingly sophisticated tools to infiltrate systems and harvest valuable data.

According to Edvardas Šileris, Head of Europol’s European Cybercrime Centre (EC3), “You can’t defend what you don’t understand.” He added that the latest assessment provides critical insights into the hidden mechanisms of cybercrime, equipping law enforcement, policymakers, and private sector stakeholders with the intelligence they need to respond effectively.

Generative AI Supercharges Social Engineering

One of the most alarming trends outlined in the report is the use of generative artificial intelligence , including large language models (LLMs), to enhance social engineering attacks. Criminals are now capable of crafting highly personalized scam messages tailored to victims’ cultural contexts, languages, and even personal habits. These AI-driven tactics allow fraudsters to mimic trusted entities—from bank representatives to government officials—with unnerving accuracy.

This evolution is particularly devastating in the realm of child sexual exploitation , where offenders are leveraging AI to automate grooming processes and increase the emotional manipulation of young victims. The report warns that these tools enable predators to scale their operations, making detection and prevention more challenging than ever before.

Data as Commodity: Crime-as-a-Service Thrives

Cybercrime has become accessible to virtually anyone willing to pay. The rise of Crime-as-a-Service (CaaS) platforms means that even those without technical expertise can purchase stolen data, rent out botnets, or follow step-by-step guides to execute complex fraud schemes. Marketplaces operating on dark web forums, encrypted messaging apps, and subscription-based services offer bulk sales of login credentials, compromised corporate systems, and even remote access to hacked infrastructure.

“Data is no longer just the target—it’s a commodity,” the report states. Every breach, leak, or phishing success feeds into a cycle where data is harvested, repackaged, and resold across layers of the criminal supply chain.

Extortion, Identity Theft, and Exploitation

Beyond financial fraud, stolen data is being weaponized for extortion, identity theft, and abuse , often targeting the most vulnerable members of society. Ransomware groups continue to exploit known software vulnerabilities and manipulate human behavior through psychological pressure and fear-based tactics. One emerging technique involves mimicking common error messages and CAPTCHA boxes—a tactic dubbed “ClickFix”—to trick users into installing malware themselves.

Meanwhile, the growing reliance on end-to-end encryption (E2EE) poses a significant challenge for law enforcement. While essential for protecting user privacy, E2EE apps like WhatsApp, Signal, and Telegram are increasingly abused by criminals to coordinate illegal activity, exchange stolen data, and evade surveillance. Europol notes that encrypted communications are now a primary channel for organizing cybercrime, with investigators facing near-total opacity into these operations.

Recommendations: A Call for Coordinated Action

To combat these evolving threats, Europol calls for a coordinated response at the EU level. Key recommendations include:

  • Lawful access solutions for encrypted communications that balance security and privacy concerns.
  • Harmonized data retention rules across member states to ensure consistent collection and availability of digital evidence.
  • Digital literacy initiatives , especially targeted at children and teenagers, to help them recognize and resist online manipulation.

The report emphasizes that while technology evolves rapidly, many of the vulnerabilities exploited by cybercriminals are long-standing. Human factors—such as poor password hygiene, unpatched software, and susceptibility to social engineering—remain central to many successful attacks.

Behind the Report: Operational Insights from the Frontlines

The IOCTA 2025 draws on thousands of investigations supported by Europol annually, particularly through its European Cybercrime Centre (EC3) and Economic and Financial Crime Centre (EFECC) . Contributions from national police forces and private sector partners provide a comprehensive view of the current threat landscape.

It builds upon the broader EU Serious and Organised Crime Threat Assessment (SOCTA) , reinforcing the message that in today’s digital age, data is power—and everyone’s data is at risk.

Final Thoughts: A Race Against Time

As cybercriminals grow more organized, technologically advanced, and profit-driven, the stakes for cybersecurity have never been higher. The IOCTA 2025 serves not only as a diagnostic tool but also as a rallying cry for unity among governments, tech companies, educators, and citizens.

In the words of Šileris: “We must move faster than the threat. Understanding it is the first step.”

And as this report makes clear, the time to act is now.

Europol’s 2025 Internet Organised Crime Threat Assessment (IOCTA), published today, reveals how stolen data fuels the digital underworld, powering a criminal ecosystem that spans from online fraud and ransomware to child exploitation and extortion. The report paints a stark picture of a cybercrime economy built on access—access to your systems, your identity, and your most sensitive information.The Head of Europol’s…

Source link

Author

Continue Reading

Trending

Copyright © 2023 EuroTimes