Child sexual abuseCybercrimeData protection and privacyEducation and training of police authoritiesElectronic evidenceFight against crime and terrorismForensic technologies, othersHuman rightsIncident Handling and Digital ForensicsPolice authoritiesSecurityTheories, techniques and tools for the identification, collection, attribution, acquisition, analysis and preservation of digital evidence
CBRN early warningChemical, Biological, Radiological and Nuclear (CBRN) protection and decontamination equipmentEducation and training of police authoritiesFight against crime and terrorismPolice authoritiesProtection of citizens (goods and people)Protection of networksProtection of public spacesSecure public areaSecuritySecurity of transportTerrorism
Community policingCybercrime preventionEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CryptocurrenciesCybercrimeCybercrime preventionCybercrime prosecution and law enforcementEducation and training of police authoritiesFight against crime and terrorismInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecurityTerrorismTerrorist financing
Data protectionEducation and training of police authoritiesFight against crime and terrorismForensic technologies, othersIncident Handling and Digital ForensicsPolice authoritiesSecurity
Arctic OceanArtificial intelligenceBorder and coastguardsBorder and external securityBorder surveillanceCommand and ControlCybersecurityEarth Observation / Services and applicationsEnergy EfficiencyEquipments and sub systemsInteroperabilityInteroperable secured communications (Security systems architecture)Maritime Security And SurveillanceMaritime safetyMaritime surrounding areas surveillancePrivacy by designSecuritySystems-Services FunctionsTechnologies-Components
Border and coastguardsBorder and external securityData Security and PrivacyDigital identityEquipments and sub systemsIdentification equipmentIdentity management systemsPersonal products and servicesPrivacy and identity management (e.g. privacy-preserving authentication)Privacy by designSecuritySecurity documentationTourism / Travel
Border and coastguardsBorder and external securityBorder surveillanceData Security and PrivacyData protection and privacyEarth Observation / Services and applicationsIdentification equipmentPrivacy by designProtection of citizens (goods and people)SecuritySoftware and Hardware Security Engineering
Border and coastguardsBorder and external securityBorder surveillanceControl and track cross border goods and materialsDetection technologyDrugs traffickingEarth Observation / Services and applicationsOrganised crimeProtection of citizens (goods and people)SecurityTrafficking of cultural goodsTrafficking of firearms
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components
Civil securityConducting, analysing studies and /or surveysDemand driven innovationEnd-usersEntrepreneurshipExploitation of resultsIndustrial innovation policyInnovationMarket analysisMarket-creating innovationMission CapabilitiesPublic sector innovationRelated to industrial policyResearch to businessSME supportSafety and SecuritySecure SocietiesSecuritySmall and medium size enterprisesTechnological innovationTechnology assessmentTechnology commercialisationTechnology development
Critical infrastructure, emergency systems, security, safety engineeringPolicy and SupportProtection of areas and infrastructuresReal time data analyticsResilience aspectsSecuritySecurity AnalysisSimulation for decision making (real time simulation)Terrorism
Critical infrastructure, emergency systems, security, safety engineeringManagement of urban areasPolicy and SupportProtection of public spacesSecuritySecurity AnalysisTerrorism
Critical Infrastructure Protection (CIP)Earth Observation / Services and applicationsOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecuritySecurity Management and GovernanceTechnologies-ComponentsTerrorismThreats and vulnerabilities modelling
Cybercrime preventionCybercrime prosecution and law enforcementCybercrime victims assistanceEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CybersecurityData protection and privacyEducation and training of police authoritiesEquipments and sub systemsFight against crime and terrorismInternet EthicsInternet of ThingsPolice authoritiesSecurity
Child sexual abuseCybercrimeData protection and privacyEducation and training of police authoritiesElectronic evidenceFight against crime and terrorismForensic technologies, othersHuman rightsIncident Handling and Digital ForensicsPolice authoritiesSecurityTheories, techniques and tools for the identification, collection, attribution, acquisition, analysis and preservation of digital evidence
CBRN early warningChemical, Biological, Radiological and Nuclear (CBRN) protection and decontamination equipmentEducation and training of police authoritiesFight against crime and terrorismPolice authoritiesProtection of citizens (goods and people)Protection of networksProtection of public spacesSecure public areaSecuritySecurity of transportTerrorism
Community policingCybercrime preventionEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CryptocurrenciesCybercrimeCybercrime preventionCybercrime prosecution and law enforcementEducation and training of police authoritiesFight against crime and terrorismInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecurityTerrorismTerrorist financing
Data protectionEducation and training of police authoritiesFight against crime and terrorismForensic technologies, othersIncident Handling and Digital ForensicsPolice authoritiesSecurity
CybersecurityData protection and privacyEducation and training of police authoritiesEquipments and sub systemsFight against crime and terrorismInternet EthicsInternet of ThingsPolice authoritiesSecurity
Arctic OceanArtificial intelligenceBorder and coastguardsBorder and external securityBorder surveillanceCommand and ControlCybersecurityEarth Observation / Services and applicationsEnergy EfficiencyEquipments and sub systemsInteroperabilityInteroperable secured communications (Security systems architecture)Maritime Security And SurveillanceMaritime safetyMaritime surrounding areas surveillancePrivacy by designSecuritySystems-Services FunctionsTechnologies-Components
Border and coastguardsBorder and external securityData Security and PrivacyDigital identityEquipments and sub systemsIdentification equipmentIdentity management systemsPersonal products and servicesPrivacy and identity management (e.g. privacy-preserving authentication)Privacy by designSecuritySecurity documentationTourism / Travel
Border and coastguardsBorder and external securityBorder surveillanceData Security and PrivacyData protection and privacyEarth Observation / Services and applicationsIdentification equipmentPrivacy by designProtection of citizens (goods and people)SecuritySoftware and Hardware Security Engineering
Border and coastguardsBorder and external securityBorder surveillanceControl and track cross border goods and materialsDetection technologyDrugs traffickingEarth Observation / Services and applicationsOrganised crimeProtection of citizens (goods and people)SecurityTrafficking of cultural goodsTrafficking of firearms
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components
Civil securityConducting, analysing studies and /or surveysDemand driven innovationEnd-usersEntrepreneurshipExploitation of resultsIndustrial innovation policyInnovationMarket analysisMarket-creating innovationMission CapabilitiesPublic sector innovationRelated to industrial policyResearch to businessSME supportSafety and SecuritySecure SocietiesSecuritySmall and medium size enterprisesTechnological innovationTechnology assessmentTechnology commercialisationTechnology development
Cybercrime preventionCybercrime prosecution and law enforcementCybercrime victims assistanceEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
Critical infrastructure, emergency systems, security, safety engineeringPolicy and SupportProtection of areas and infrastructuresReal time data analyticsResilience aspectsSecuritySecurity AnalysisSimulation for decision making (real time simulation)Terrorism
Critical infrastructure, emergency systems, security, safety engineeringManagement of urban areasPolicy and SupportProtection of public spacesSecuritySecurity AnalysisTerrorism
Critical Infrastructure Protection (CIP)Earth Observation / Services and applicationsOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecuritySecurity Management and GovernanceTechnologies-ComponentsTerrorismThreats and vulnerabilities modelling
Cybercrime preventionCybercrime prosecution and law enforcementCybercrime victims assistanceEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
Child sexual abuseCybercrimeData protection and privacyEducation and training of police authoritiesElectronic evidenceFight against crime and terrorismForensic technologies, othersHuman rightsIncident Handling and Digital ForensicsPolice authoritiesSecurityTheories, techniques and tools for the identification, collection, attribution, acquisition, analysis and preservation of digital evidence
CBRN early warningChemical, Biological, Radiological and Nuclear (CBRN) protection and decontamination equipmentEducation and training of police authoritiesFight against crime and terrorismPolice authoritiesProtection of citizens (goods and people)Protection of networksProtection of public spacesSecure public areaSecuritySecurity of transportTerrorism
CybersecurityData protection and privacyEducation and training of police authoritiesEquipments and sub systemsFight against crime and terrorismInternet EthicsInternet of ThingsPolice authoritiesSecurity
Community policingCybercrime preventionEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CryptocurrenciesCybercrimeCybercrime preventionCybercrime prosecution and law enforcementEducation and training of police authoritiesFight against crime and terrorismInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecurityTerrorismTerrorist financing
Data protectionEducation and training of police authoritiesFight against crime and terrorismForensic technologies, othersIncident Handling and Digital ForensicsPolice authoritiesSecurity
Border and coastguardsBorder and external securityData Security and PrivacyDigital identityEquipments and sub systemsIdentification equipmentIdentity management systemsPersonal products and servicesPrivacy and identity management (e.g. privacy-preserving authentication)Privacy by designSecuritySecurity documentationTourism / Travel
Border and coastguardsBorder and external securityBorder surveillanceData Security and PrivacyData protection and privacyEarth Observation / Services and applicationsIdentification equipmentPrivacy by designProtection of citizens (goods and people)SecuritySoftware and Hardware Security Engineering
Border and coastguardsBorder and external securityBorder surveillanceControl and track cross border goods and materialsDetection technologyDrugs traffickingEarth Observation / Services and applicationsOrganised crimeProtection of citizens (goods and people)SecurityTrafficking of cultural goodsTrafficking of firearms
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components
Civil securityConducting, analysing studies and /or surveysDemand driven innovationEnd-usersEntrepreneurshipExploitation of resultsIndustrial innovation policyInnovationMarket analysisMarket-creating innovationMission CapabilitiesPublic sector innovationRelated to industrial policyResearch to businessSME supportSafety and SecuritySecure SocietiesSecuritySmall and medium size enterprisesTechnological innovationTechnology assessmentTechnology commercialisationTechnology development
Arctic OceanArtificial intelligenceBorder and coastguardsBorder and external securityBorder surveillanceCommand and ControlCybersecurityEarth Observation / Services and applicationsEnergy EfficiencyEquipments and sub systemsInteroperabilityInteroperable secured communications (Security systems architecture)Maritime Security And SurveillanceMaritime safetyMaritime surrounding areas surveillancePrivacy by designSecuritySystems-Services FunctionsTechnologies-Components
Critical infrastructure, emergency systems, security, safety engineeringPolicy and SupportProtection of areas and infrastructuresReal time data analyticsResilience aspectsSecuritySecurity AnalysisSimulation for decision making (real time simulation)Terrorism
Critical infrastructure, emergency systems, security, safety engineeringManagement of urban areasPolicy and SupportProtection of public spacesSecuritySecurity AnalysisTerrorism
Critical Infrastructure Protection (CIP)Earth Observation / Services and applicationsOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecuritySecurity Management and GovernanceTechnologies-ComponentsTerrorismThreats and vulnerabilities modelling
CybersecurityData protection and privacyEducation and training of police authoritiesEquipments and sub systemsFight against crime and terrorismInternet EthicsInternet of ThingsPolice authoritiesSecurity
Child sexual abuseCybercrimeData protection and privacyEducation and training of police authoritiesElectronic evidenceFight against crime and terrorismForensic technologies, othersHuman rightsIncident Handling and Digital ForensicsPolice authoritiesSecurityTheories, techniques and tools for the identification, collection, attribution, acquisition, analysis and preservation of digital evidence
CBRN early warningChemical, Biological, Radiological and Nuclear (CBRN) protection and decontamination equipmentEducation and training of police authoritiesFight against crime and terrorismPolice authoritiesProtection of citizens (goods and people)Protection of networksProtection of public spacesSecure public areaSecuritySecurity of transportTerrorism
Community policingCybercrime preventionEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CryptocurrenciesCybercrimeCybercrime preventionCybercrime prosecution and law enforcementEducation and training of police authoritiesFight against crime and terrorismInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecurityTerrorismTerrorist financing
Data protectionEducation and training of police authoritiesFight against crime and terrorismForensic technologies, othersIncident Handling and Digital ForensicsPolice authoritiesSecurity
Border and coastguardsBorder and external securityData Security and PrivacyDigital identityEquipments and sub systemsIdentification equipmentIdentity management systemsPersonal products and servicesPrivacy and identity management (e.g. privacy-preserving authentication)Privacy by designSecuritySecurity documentationTourism / Travel
Border and coastguardsBorder and external securityBorder surveillanceData Security and PrivacyData protection and privacyEarth Observation / Services and applicationsIdentification equipmentPrivacy by designProtection of citizens (goods and people)SecuritySoftware and Hardware Security Engineering
Border and coastguardsBorder and external securityBorder surveillanceControl and track cross border goods and materialsDetection technologyDrugs traffickingEarth Observation / Services and applicationsOrganised crimeProtection of citizens (goods and people)SecurityTrafficking of cultural goodsTrafficking of firearms
Cybercrime preventionCybercrime prosecution and law enforcementCybercrime victims assistanceEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components
Civil securityConducting, analysing studies and /or surveysDemand driven innovationEnd-usersEntrepreneurshipExploitation of resultsIndustrial innovation policyInnovationMarket analysisMarket-creating innovationMission CapabilitiesPublic sector innovationRelated to industrial policyResearch to businessSME supportSafety and SecuritySecure SocietiesSecuritySmall and medium size enterprisesTechnological innovationTechnology assessmentTechnology commercialisationTechnology development
Arctic OceanArtificial intelligenceBorder and coastguardsBorder and external securityBorder surveillanceCommand and ControlCybersecurityEarth Observation / Services and applicationsEnergy EfficiencyEquipments and sub systemsInteroperabilityInteroperable secured communications (Security systems architecture)Maritime Security And SurveillanceMaritime safetyMaritime surrounding areas surveillancePrivacy by designSecuritySystems-Services FunctionsTechnologies-Components
Critical infrastructure, emergency systems, security, safety engineeringPolicy and SupportProtection of areas and infrastructuresReal time data analyticsResilience aspectsSecuritySecurity AnalysisSimulation for decision making (real time simulation)Terrorism
Critical infrastructure, emergency systems, security, safety engineeringManagement of urban areasPolicy and SupportProtection of public spacesSecuritySecurity AnalysisTerrorism
Critical Infrastructure Protection (CIP)Earth Observation / Services and applicationsOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecuritySecurity Management and GovernanceTechnologies-ComponentsTerrorismThreats and vulnerabilities modelling
Cybercrime preventionCybercrime prosecution and law enforcementCybercrime victims assistanceEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
Critical infrastructure, emergency systems, security, safety engineeringPolicy and SupportProtection of areas and infrastructuresReal time data analyticsResilience aspectsSecuritySecurity AnalysisSimulation for decision making (real time simulation)Terrorism
Critical infrastructure, emergency systems, security, safety engineeringManagement of urban areasPolicy and SupportProtection of public spacesSecuritySecurity AnalysisTerrorism
Critical Infrastructure Protection (CIP)Earth Observation / Services and applicationsOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecuritySecurity Management and GovernanceTechnologies-ComponentsTerrorismThreats and vulnerabilities modelling
Civil securityConducting, analysing studies and /or surveysDemand driven innovationEnd-usersEntrepreneurshipExploitation of resultsIndustrial innovation policyInnovationMarket analysisMarket-creating innovationMission CapabilitiesPublic sector innovationRelated to industrial policyResearch to businessSME supportSafety and SecuritySecure SocietiesSecuritySmall and medium size enterprisesTechnological innovationTechnology assessmentTechnology commercialisationTechnology development
Border and coastguardsBorder and external securityBorder surveillanceData Security and PrivacyData protection and privacyEarth Observation / Services and applicationsIdentification equipmentPrivacy by designProtection of citizens (goods and people)SecuritySoftware and Hardware Security Engineering
CybersecurityData protection and privacyEducation and training of police authoritiesEquipments and sub systemsFight against crime and terrorismInternet EthicsInternet of ThingsPolice authoritiesSecurity
Community policingCybercrime preventionEducation and training of police authoritiesFight against crime and terrorismGender in law, criminology and penologyPolice authoritiesSecuritySocial CareSocietal issues in crime and terrorismTerrorismViolent radicalisation
CryptocurrenciesCybercrimeCybercrime preventionCybercrime prosecution and law enforcementEducation and training of police authoritiesFight against crime and terrorismInvestigations of computer crime (cybercrime) and security violationsPolice authoritiesSecurityTerrorismTerrorist financing
Data protectionEducation and training of police authoritiesFight against crime and terrorismForensic technologies, othersIncident Handling and Digital ForensicsPolice authoritiesSecurity
Child sexual abuseCybercrimeData protection and privacyEducation and training of police authoritiesElectronic evidenceFight against crime and terrorismForensic technologies, othersHuman rightsIncident Handling and Digital ForensicsPolice authoritiesSecurityTheories, techniques and tools for the identification, collection, attribution, acquisition, analysis and preservation of digital evidence
CBRN early warningChemical, Biological, Radiological and Nuclear (CBRN) protection and decontamination equipmentEducation and training of police authoritiesFight against crime and terrorismPolice authoritiesProtection of citizens (goods and people)Protection of networksProtection of public spacesSecure public areaSecuritySecurity of transportTerrorism
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components
Arctic OceanArtificial intelligenceBorder and coastguardsBorder and external securityBorder surveillanceCommand and ControlCybersecurityEarth Observation / Services and applicationsEnergy EfficiencyEquipments and sub systemsInteroperabilityInteroperable secured communications (Security systems architecture)Maritime Security And SurveillanceMaritime safetyMaritime surrounding areas surveillancePrivacy by designSecuritySystems-Services FunctionsTechnologies-Components
Border and coastguardsBorder and external securityData Security and PrivacyDigital identityEquipments and sub systemsIdentification equipmentIdentity management systemsPersonal products and servicesPrivacy and identity management (e.g. privacy-preserving authentication)Privacy by designSecuritySecurity documentationTourism / Travel
Border and coastguardsBorder and external securityBorder surveillanceControl and track cross border goods and materialsDetection technologyDrugs traffickingEarth Observation / Services and applicationsOrganised crimeProtection of citizens (goods and people)SecurityTrafficking of cultural goodsTrafficking of firearms
HORIZON-CL3-2025-01-BM-01HORIZON-CL3-2025-01Border and coastguardsBorder and external securityBorder surveillanceControl and surveillance of areasDrugs traffickingEarth Observation / Services and applicationsFight against threats to the EnvironmentMaritime surrounding areas surveillanceMission CapabilitiesOrganised crimeSecurityTechnologies-ComponentsTrafficking of cultural goodsTrafficking of firearms
HORIZON-CL3-2025-01-BM-03HORIZON-CL3-2025-01Border and external securityBorder surveillanceCommunication SystemsCommunication networkControl and surveillance of areasCustoms authoritiesDrugs traffickingHuman rightsInteroperabilityProtection of citizens (goods and people)SecuritySystems-Services Functions
HORIZON-CL3-2025-01-INFRA-01HORIZON-CL3-2025-01Crisis management operationsCritical Infrastructure Protection (CIP)Cyber Defence systemsLong term health hazard prevention in security related situationsOperator trainingOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecurityTechnologies-ComponentsTraining
HORIZON-CL3-2025-01-FCT-01HORIZON-CL3-2025-01Education and training of police authoritiesFight against crime and terrorismForensic technologies, othersIncident Handling and Digital ForensicsPolice authoritiesSecurity
HORIZON-CL3-2025-01-FCT-02HORIZON-CL3-2025-01Education and training of police authoritiesFight against crime and terrorismHuman rightsLaw, criminology, penologyPolice authoritiesSecuritySocietal issues in crime and terrorismTerrorismViolent radicalisation
HORIZON-CL3-2025-01-FCT-04HORIZON-CL3-2025-01Counter-Mine warfareEducation and training of police authoritiesFight against crime and terrorismPolice authoritiesSecurityUnexploded ordnances (UXO/UO)
HORIZON-CL3-2025-01-BM-02HORIZON-CL3-2025-01Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEU charter of fundamental rightsHuman rightsProtection of citizens (goods and people)Security
HORIZON-CL3-2025-01-FCT-03HORIZON-CL3-2025-01Coordination and information sharing in the context of cross-border/organizational incidentsEducation and training of police authoritiesFight against crime and terrorismHuman rightsOrganised crimePolice authoritiesSecurity
HORIZON-CL3-2025-01-INFRA-02HORIZON-CL3-2025-01Crisis management operationsCritical Infrastructure Protection (CIP)Cyber Defence systemsFirst respondersOperator trainingOperators of critical infrastructurePolicy and SupportProtection of areas and infrastructuresResilience aspectsSecurityTraining
Border and coastguardsBorder and external securityBorder surveillanceCustoms authoritiesEarth Observation / Services and applicationsSecurityTechnologies-Components