TENACITy becomes part of the Hybrid Threats Cluster

Strengthening the ecosystem collaboration for societal resilience against disinformation and disinformation-fuelled crime

What is a project cluster?

Project clustering refers to an alliance created by projects with related subjects or complementing interests, which can encompass partnerships for communication and dissemination activities, participation in meetings of common interest, joint capacity building activities and workshops, among other examples.

The European Commission incentivises the clustering of Horizon Europe projects in order to enhance the impact of financed projects. By forming or joining a cluster, projects can better collaborate and support each other through knowledge sharing and benchmarking project outcomes, hence creating synergies and facilitating the achievement of the proposed impacts.

The Hybrid Threats Cluster

Hybrid threats, a combination of tactics including diplomatic, military, economic, technological, have long been used to destabilise adversaries. Large-scale online disinformation campaigns for instance are used to shape the political narrative and subsequently hinder democratic processes. Countering these constantly evolving challenges by enhancing resilience, and detecting, preventing and responding to hybrid threats is a key priority for the European Union and its member states. In light of  this, a cluster of innovative projects has been created to increase societal resilience to disinformationmisinformation and hybrid threats by strengthening cross-stakeholder collaboration. Knowledge sharing, upskilling and alignment on activities, enables the cluster participants to enhance the efforts and maximise the impact of their respective projects.

The projects involved in the cluster include:

FERMI – Fake News Risk Mitigator

ATHENA – An Exposition On The Foreign Information Manipulation And Interference

RESONANT – Interdisciplinary Research Project on Foreign Information Manipulation and Interference

TENACITy – Travel Intelligence Against Crime And Terrorism

TENSOR – Reliable biomeTric tEchNologies to asSist Police authorities in cOmbating terrorism and oRganized crime

Vera.aI – VERification Assisted by Artificial Intelligence

VIGILANT – Vital Intelligence To Investigate Illegal Disinformation

TENACITy Project Update: Review Results and Future Advancements

We’re thrilled to announce a significant milestone in the TENACITy project as we wrap up a pivotal review event, marking the transition into the next chapter of our journey. This milestone signifies a crucial step forward in our mission to revolutionize public safety through research and innovation.

The insights and feedback gathered from the review event have already begun to catalyze innovative advancements within our project. Our team is more energized and committed than ever to push the boundaries of what’s possible in our field.

As we move into the second half of our journey, we are focused on enhancing our designs, refining operational workflows, and adopting a citizen-centric approach. These efforts are setting the stage for exciting technological leaps that will shape the future of public safety.

Stay tuned as we continue to transform challenges into opportunities and foster safer communities through research and development. The road ahead is promising, and we look forward to sharing more thrilling updates with you!

TENACITy Training & Living Lab Workshop

We are thrilled to announce the successful conclusion of the TENACITy Training & Living Lab workshop, a collaborative initiative aimed at fostering innovation within law enforcement agencies (LEAs). Co-organized by the Center for Security Studies (KEMEA) and Hardware and Software Engineering, with the active participation of the TENACITy Consortium and external Passenger Information Units (PIUs), this event was held at the KEMEA premises in Athens on February 29th and March 1st. It brought together a diverse group of stakeholders to explore cutting-edge solutions and drive positive change in security studies.

Day One:

The workshop kicked off with a dynamic blend of educational activities designed to empower LEAs with the latest tools and techniques. Through interactive sessions and practical demonstrations, participants embarked on a journey of discovery, learning how to integrate the TENACITy solution into their daily operations. Discussions were lively, and ideas flowed freely as attendees exchanged views, shared best practices, and collaborated on problem-solving strategies.

Day Two:

Building on the momentum of the first day, the second day of the workshop was dedicated to in-depth discussions and comprehensive assessments. Round table discussions provided a platform for participants to dive deeper into the development and implementation of project tools, fostering a spirit of collaboration and innovation. The event concluded with an assessment process, ensuring that participants left with a clear understanding of their progress and next steps.

The success of the Training & Living Lab workshop was a testament to the power of collaboration and shared commitment. With over 70 attendees from external Project Implementation Units (PIUs) and the TENACITy Consortium, the event was a vibrant exchange of ideas and experiences. We extend our heartfelt thanks to all participants for their invaluable contributions and dedication to advancing the objectives of the TENACITy project.

Criminal Exploitation of Maritime, Air and Land Transport in Illicit Trade


Article by UCSC-Transcrime

Globalization has led to a growing interconnection between countries in terms of transport supply chains and movement of people. Although providing relevant opportunities for both EU companies and citizens, such interconnection also poses serious risks in terms of security of external and internal EU borders. EU Border Guards agencies and Law Enforcement Agencies continuously screen incoming passengers and goods to proactively identify potential threats.

Criminal organizations and individual offenders exploit a variety of transportation modi operandi to move illicit products. These modi operandi depend on several factors, such as the risk of detection, the scrutiny level of the border controls, the quantity of the illicit products, and the geographical distance to be covered.[1] Time to time, based on these factors one out of maritime, air or land modes of transport is preferred against the others.

Maritime mode of transport

Criminal organizations and individual offenders frequently exploit sea transport for smuggling illicit products due to its facilitation of large-scale shipments and the relatively lax legal obligations in terms of information to be provided to and controls performed by authorities. In addition, there is a variety of techniques available to hide illicit products in legitimate cargos (see image below).[2]

Rip-on/rip-off: Illicit products are loaded in the port of departure and recovered in the port of destination. Often neither the senders nor the recipients are aware of their legitimate cargo being exploited for illicit purposes.

Switch: This is a variant of the rip-on/rip-off method. In the port of departure, illicit products are placed in an accessible place in the container. At the destination port, before the container is inspected, the products are removed and transferred to another container that has already been inspected or it does not need to be inspected.

Within legitimate goods: Illicit products are concealed or incorporated into the legitimate goods transported in the container. This method typically requires the involvement of the owners of the legal cargo and possibly also of corrupted dock workers.

In container structure: Illicit products are concealed in areas of the container such as insulation materials within the walls and floorings, cooling compartments, or in the exterior beams. This technique requires the involvement of corrupted port employees to place and retrieve illicit goods.

Commercial vessels and drop-off: The illicit products are transported by a variety of commercial vessels such as cargo ships, fishing vessels and tankers. In the proximity of the destination, the consignment is dropped off in the sea for collection.

Pleasure vessels: Due to the less stringent checks, pleasure vessels, such as yachts, are frequently used for the transportation of illicit products.

Inflatable and speed boats: In the case of illicit consignments of short-medium distances and/or in coastal waters, small custom-made vessels are sometimes used.

Underwater attachments and semi-submersibles: Illicit products are transported in missile-shaped containers attached to the hull of the vessels below the water. This method requires the use of specialised divers at both the origin and destination ports.

Despite the specific method, in most cases, corruption has a relevant role in the success of the trafficking as it helps to undermine transport infrastructure or gain access to EU ports.[3]


Air mode of transport

Another common transportation modus operandi exploited by criminals involved in illicit trafficking is air transport. The usage of air transport for criminal purposes mostly relies on commercial aviation through the misuse of scheduled air transport (e.g., passengers and cargo flights) and general aviation (e.g., wide variety of private civil flights). Criminal flights may be operated in three ways: (i) “white” flights are operated in full compliance with general aviation rules; (ii) “grey” flights apparently follow existing regulations, but at some points they deviate from standard procedures (e.g., abuses of reporting, unscheduled stops/touch-and-go and drop-off); (iii) “black” flights are fully unreported, they consist of clandestine flights operated at low altitude, on radio silence, etc. The reliance on air transport for illicit trafficking purposes has as main advantage the possibility of organizing large consignments that can be transported over long distances in relatively short time. The risks associated with this mean of transportation vary greatly according to the typology of flights. Commercial flights are the riskiest and thus, the least exploited, due to the intensive security checks both on passengers and goods. Instead, private planes are less targeted by security checks and need to comply with less security requirements; as a consequence, they are subjected to the misuse by criminals to a greater extent.[4]

The most common aircrafts and related techniques used for the purpose of illicit trafficking through aviation are displayed below.[5]


Commercial passenger flights: Illicit trafficking trough commercial passenger flights mostly involved passengers concealing some illicit products in their luggage or in/on their bodies. This method usually does not necessitate the assistance of corrupted personnel. Generally, this modus operandi is used for the transportation of limited quantities of illicit products.

Cargo flights: In the case of the exploitation of cargo flights, illicit products are usually concealed in parcels or incorporated in the legitimate goods transported by the sender of the legal cargo.

Private jets: Criminal networks often rely on private jets to smuggle large quantities of illicit products over long distances, including transatlantic flights. This modus operandi is typically chosen due to the perceived less stringent controls private jets are subjected to. Very often the crew members of the flight are aware and complicit.

Helicopters: Sometimes also helicopters are used by criminal networks to traffic illicit products on short distances as they offer the possibility of avoiding land security checkpoints.

Unmanned Aerial Vehicles (UAVs): UAVs (i.e., drones) consist of an increasingly used modus operandi exploited by criminal networks to smuggle illicit products. This method is especially used to deliver drugs in harshly reachable places (e.g., prisons) or to avoid land borders.

Land mode of transport

Besides maritime and air transportation, illicit products are often trafficked by land. This mode of transport is very frequent for intra-EU trafficking. Indeed, once the illicit products have reached the European mainland most often by sea or air, the distribution to EU MSs mostly occurs by land. This mode of transportation for intra-EU trafficking is often selected by criminal networks due to the advantages brought by the Schengen area that allows free movement of people and goods without systematic controls at the borders. To a lesser extent, the land mode of transportation can also be used for the transferring of illicit products from the origin to the destination countries. Illicit products can alternatively be loaded on private vehicles (e.g., cars, trucks) and commercial trucks where they are concealed among legitimate goods.[6]


[1] UNODC, “Global Study on Firearms Trafficking 2020” (Vienna: United Nations on Drugs and Crime, 2020).

[2] EMCDDA and Europol, EU Drug Markets Report 2019 (LU: Publications Office, 2019), (SOCTA) 2021: A Corrupting Influence : The Infiltration and Undermining of Europe’s Economy and Society by Organised Crime. (LU: Publications Office, 2021).

[3] Europol, European Union Serious and Organised Crime Threat Assessment (SOCTA) 2021.

[4] EMCDDA and Europol, EU Drug Markets Report 2019; EMCDDA, EU Drug Market, Cocaine; Europol, European Union Serious and Organised Crime Threat Assessment (SOCTA) 2021.

[5] EMCDDA and Europol, EU Drug Markets Report 2019; EMCDDA, EU Drug Market, Cocaine.

[6] EMCDDA and Europol, EU Drug Markets Report 2019.


TENACITy 2nd Plenary Meeting

The second plenary meeting of TENACITy Project took place in Athens on November 2 and 3, 2023, providing an invaluable opportunity for the consortium members to meet in person and delve into the progress made since the preceding plenary session. Over the course of the two-day gathering, a comprehensive analysis of the advancements made within each Work Package and the corresponding milestones attained.

Participants offered detailed insights into the tasks they lead and the performed and planned activities for each of the tasks. At the closing of the plenary meeting featured an engaging open discussion, focusing on the technical partners exploration of tools and the synergies envisioned for the development phase.

KEMEA Showcases TENACITy Project’s Impact on Border Security at MEDEA Project Event

Center for Security Studies (KEMEA) had the great opportunity to showcase TENACITy Project at the MEDEA Project Borders Security: Acting Ahead across Research, Practice, and Policy , which took place in Madrid during 27 – 28 September ISDEFE premises.

TENACITy aim, objectives, as well the Practitioners’ role in it were discussed at the “Practitioners’ Key Role in Security Research Pannel”, moderated by Giulio Maria Mancini PO & Area Coordinator for Border Management, DG Migration & Home Affairs.

The panel involved both practitioners and innovators to share their experiences and perspectives. It is always a pleasure to support initiatives and events that promote innovation and cooperation in the Security Sector, highlighting the importance of the participation of LEAs in EU projects for real-world testing and validation of new tools or procedures.

KEMEA Showcases TENACITy Project at Thessaloniki International Trade Fair

Center for Security Studies (KEMEA) had the great pleasure and opportunity to participate in the 87th Thessaloniki International Trade Fair, during 9-17 September 2023, and disseminated TENACITy Project.

TENACITy aims to implement and demonstrate a Travel Intelligence Governance Framework that will incorporate a holistic approach to crime prevention, will ensure that its proposed digital technologies will support the identification of the modus operandi of criminal and terrorism organizations and will include policy makers in the governance process.

It was a great opportunity to raise awareness about TENACITy and communicate the added value that can bring to the FCT sector.

Unveiling the mechanisms of migrant smuggling: Insights into transportation and facilitation strategies


Article by UCSC-Transcrime

Migrant smuggling is the process of facilitating the unlawful entry, transit or residence of an individual in a country.[1] It is a market in which the commodity traded is the assisted illegal entry into a country for a profit.[2] Migrants constitute the demand-side of the market as they are willing to buy a service, that is the illegal entry into a country, for reasons that include leaving war zones, extreme poverty, economic hardship, or persecution.[3] The demand is satisfied by several sellers, namely the smugglers, who provide these services for a wide array of reasons, ranging from economic returns to assistance to individuals with similar social and cultural backgrounds.

Migrant smugglers rely on a variety of means of transport to facilitate irregular migration both into and within the EU. Migrant smugglers’ modi operandi depend on several factors, such as the origin of the smugglers, the type of travel used, the route and the price that the migrant is willing to pay for the journey.[4]

Most irregular migrants in the EU arrive via Mediterranean Sea routes, using several types of boats. The choice of boat depends on the migrants’ budget and the length of the journey. Options include speedboats, sailing boats, motor yachts, and small inflatable rubber boats. Smuggling organizations even construct their own boats. However, sailing yachts and speedboats are less common due to the high costs and risks involved if these boats are damaged or seized. Instead, stolen boats are frequently used to reduce costs and make it harder for law enforcement to identify the smuggling network. Various methods have been identified for transporting migrants. One typical approach involves using two vessels: a larger one like a fishing trawler or cargo ship to take migrants on open ocean voyages, then transferring them to a smaller boat for the final leg to the landing site. The boat crew and smugglers abandon the migrants, providing basic instructions for navigating the small boat, and return to shore in the second vessel. Another technique, known as the “mother ship technique,” is commonly observed between Egypt and Italy. It involves using fisher boats, often owned by recruited professional fishermen, to transport migrants in international waters. The migrants are then transferred to smaller vessels and left adrift to be intercepted by Italian authorities, while the fishermen return to the departure coast.[5]

Overland transportation is the second most common method used by irregular migrants. It serves as a means to reach departure points and for secondary movements during longer journeys after utilizing other transportation options.[6] Various vehicles, such as cars, buses, lorries, and trains, are commonly employed depending on the specific route. Migrants transported overland, including for secondary movements, are often confined in dark and airtight cargo compartments, exposing them to life-threatening conditions. Smugglers frequently use rented vehicles or vehicles with fake license plates to hinder traceability if intercepted by law enforcement. It is worth noting that migrants can also be smuggled unknowingly in vehicles, such as when smugglers target commercial trucks waiting at border crossings, cut the seals and let the migrants in[7]. Lastly, overland transportation can involve migrants simply walking to cross borders, forming what is known as “caravans of hope.” These large groups of migrants aim to cross the EU’s external borders in search of protection, companionship, and to convey a unified visual message to national governments.

Air facilitation to or within the EU is infrequent but may become more prominent due to heightened controls on land and sea routes. [8] Air smuggling offers increased safety, speed, and lower risks for smugglers. Typically, smugglers do not accompany migrants but instead coordinate their journeys remotely from the origin or a third country, using messaging apps or other channels. Major international airports are prime targets for air smuggling as they connect to various parts of the world through major airlines. Migrant smuggling by air often complements other forms of travel as part of a larger facilitation plan. Migrants initially fly to a neighbouring third country and subsequently attempt to illegally enter the EU by land or sea.[9]

Two main methods of air migrant smuggling in the EU have been detected. Firstly, irregular migrants may use EU airports as transit points to third-party countries, as transit visas are often not required for many nationalities. They book flights that pass-through EU airports but intentionally stay in the country instead of continuing their journey. Upon arrival, they destroy their original documents (e.g., passports, visas), purposely miss their connecting flights, and apply for asylum in the EU country. In other cases, smugglers instruct migrants to meet a member of the criminal organization in the international lounge of the transit airport, where they receive new (often forged) documents. After the meeting, migrants attempt to leave the EU airport. Another common method involves trying to directly enter an EU member state using fraudulent documents. Document fraud plays a significant role in irregular air entry into the EU, especially by air.


[1] Europol, European Union Serious and Organised Crime Threat Assessment (SOCTA) 2021.

[2] Veronica Bilger, Martin Hofmann, and Michael Jandl, “Human Smuggling as a Transnational Service Industry: Evidence from Austria,” International Migration 44, no. 4 (2006); Paolo Campana and Federico Varese, “Exploitation in Human Trafficking and Smuggling,” European Journal on Criminal Policy and Research 22 (2016): 89–105.

[3] Georgios A. Antonopoulos and John Winterdyk, “The Smuggling of Migrants in Greece: An Examination of Its Social Organization,” European Journal of Criminology 3, no. 4 (October 2006): 439–61.

[4] Luigi Achilli, “Irregular Migration to EU and Human Smuggling in the Mediterranean: The Nexus between Organized Crime and Irregular Migration, Mobility and Refugee Crisis in the Mediterranean,” IEMED POLICY Brief, 2016; Peter Tinti and Tuesday Reitano, Migrant, Refugee, Smuggler, Saviour (London: Hurst & Company, 2016).

[5] European Commission, “A Study on Smuggling of Migrants. Characteristics, Responses and Cooperation with Third Countries,” 2015.

[6] Europol and Interpol, “Migrants Smuggling Networks. Joint Europol-Interpol Report,” 2016.

[7] European Commission, “A Study on Smuggling of Migrants. Characteristics, Responses and Cooperation with Third Countries.”

[8] Europol, European Union Serious and Organised Crime Threat Assessment (SOCTA) 2021.

[9] UNODC, “Migrant Smuggling by Air,” Issue Paper, 2010.

The API/PNR state of play and challenges in Europe

Exploiting travel intelligence for security brings a broad range of different professional disciplines closer together, transferring knowledge between many competences: Border control including Entry Exit System (EES), European Travel Information and Authorisation System (ETIAS) & Advance Passenger Information (API); Visa/migration authorities; Police cooperation; Counterterrorism/Internal Security; Criminal investigation, Passenger Information Units (PIUs); Customs; Carriers and airlines; law enforcement officials, etc., to meet the challenges of the dynamic threat environment. This large scale of actors dictates common tools and approaches. TENACITy works beyond the current state of play, to propose an open architecture, applicable at European level. TENACITy’s vision of strengthening security authority’s role in fighting serious cross-border crimes, amongst others, is to provide for modern and effective tools for exploitation of travel intelligence data by security authorities and to implement and demonstrate a Travel Intelligence Governance Framework that will incorporate a holistic approach to crime prevention.

As a first step, in the context of the TENACITy project, it was considered as necessary to have an in-depth analysis of the current state of play of the processing of PNR and API data in European countries. In this respect, KEMEA prepared and distributed to Passenger Information Units (PIUs) a survey to gather necessary input from PIUs to conduct an in-depth analysis of the existing state-of-play of the technical, and other, capacities of PIUs on the usage of API/PNR data). More specifically, the survey aimed at the identification of i) the level of the implementation of the technical solutions to process PNR and API data, ii) the technical solution developed and iii) the user and system requirements and challenges faced by PIUs.

Twelve EU Member States and two non-EU countries replied to the survey. The majority of the PIUs confirmed that they have an up and running system to process PNR data and API data and highlighted that the existing technological solution covers a big part of their operational needs. In particular, some stressed the usefulness of the historical searches on a case-by-case basis or by comparing PNR data against relevant databases or by processing those against pre-determined criteria in order to identify the yet – unknown criminals.

As for the challenges identified, those vary. In relation to the exchange of PNR data, some mentioned that the exchange of PNR data is not standardised and some PIUs are not using the agreed PIU-PIU template. Most of them highlighted that the data quality is rather poor in order to perform quick and efficient analysis of the data, with an emphasis given at the ‘broken travels’. As a result, they mentioned a number of data that they would wish to become mandatory for the air carriers to collect (for e.g., the date of birth of the passenger was something highlighted). Additionally, some PIUs are already processing PNR data from air carriers that do not support automated transmission yet confirmed that there are limited datasets available to compare those data with. Similarly, the same challenge appears to those who collect PNR data from other modes of transport.   Overall, all the PIUs, that participated to the survey, have well set up their systems and other non-technological challenges, like the non-standardised process of exchanging PNR data or the quality of the data are more important. In those challenges, the legal obstacles and the financial challenges shall be added. Many of these challenges can be solved and need to be solved at a legal level. However, the participants have recognised that tools and technological solutions with many automations are needed as they can also solve a part of their operational problems

TENACITy participated to Project to Policy Seminar

The Projects to Policy Seminar, which took place in Brussels on June 14 and 15, 2023, was a highly successful event that brought together newly launched projects and policy DGs. Coordinated by DG HOME and REA, this seminar served as a valuable platform for collaboration and knowledge sharing. Its primary objective was to establish a strong connection between research initiatives and policy priorities by facilitating engagement and alignment. To achieve this, participants were organized into four distinct thematic areas, ensuring focused discussions and maximizing the seminar’s overall impact. The four thematic areas where:

  • Fighting crime and terrorism & Infrastructure (FCT/INFRA)
  • Strengthened Security Research and Innovation (SSRI)
  • Disaster-resilient societies (DRS),
  • Border management (BM)

The TENACITy team was enthusiastic about showcasing their advancements, exchanging knowledge, and receiving valuable advice from policy experts during the plenary sessions and focused discussions held within the seminar.

This project has received funding from the European Union's Horizon Europe research and innovation programme under grant agreement No 101074048