Skip to content
Contact Us | Tel. +49 511 762 – 17715 | @: niederee[at]L3S.de
h2020mirror
  • Home
  • About
    • Collaborations and Synergies​
  • Work Plan
  • News
  • Consortium
  • Downloads
  • Publications
  • Contact
  • Toolkit
Menu Close
Toggle the button to expand or collapse the Menu
  • Home
  • About
    • Collaborations and Synergies​
  • Work Plan
  • News
  • Consortium
  • Downloads
  • Publications
  • Contact
  • Toolkit

Threat Analysis

  1. Home>
  2. Toolkit>
  3. Threat Analysis

Intelligence sharing in the context of border security

  • Post published:September 9, 2024
  • Post category:Threat Analysis/Toolkit

There are three different types of intelligence that can be shared by…

Continue ReadingIntelligence sharing in the context of border security
Intelligence sharing in the context of border security

Trends in intelligence sharing practices within the EU

  • Post published:September 9, 2024
  • Post category:Threat Analysis/Toolkit

The analysis carried out within the CRiTERIA project has revealed the following…

Continue ReadingTrends in intelligence sharing practices within the EU
Trends in intelligence sharing practices within the EU

Guidelines for improving threat actor analysis

  • Post published:September 9, 2024
  • Post category:Threat Analysis/Toolkit

One of the key challenges of analysis cross-border threats is the great…

Continue ReadingGuidelines for improving threat actor analysis
Guidelines for improving threat actor analysis

Recommendations for threat analysis

  • Post published:June 13, 2022
  • Post category:Threat Analysis/Toolkit

Recommendation 1 – A stronger focus on methodsIn order to address the…

Continue ReadingRecommendations for threat analysis
Recommendations for threat analysis

Challenges in threat analysis

  • Post published:June 13, 2022
  • Post category:Threat Analysis/Toolkit

The analysis and assessment of threats constitute a primary focus of intelligence.…

Continue ReadingChallenges in threat analysis
Challenges in threat analysis

Threat analysis from open source information in the context of the MIRROR system

  • Post published:June 13, 2022
  • Post category:Threat Analysis/Toolkit

The MIRROR system is designed from the beginning as a tool to…

Continue ReadingThreat analysis from open source information in the context of the MIRROR system
Threat analysis from open source information in the context of the MIRROR system

Recent Posts

  • Human Security Filter – Open-Source Information
  • Human Security Filter – Correlations
  • Human Security Filter – Composite Indicator
  • OSINT applications for law enforcement agencies
  • Introduction to OSINT for humanitarian practitioners

Recent Comments

    Archives

    • September 2024
    • June 2022
    • May 2022
    • April 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • January 2021
    • November 2020
    • August 2020
    • April 2020
    • March 2020
    • November 2019
    • August 2019

    Categories

    • Automation
    • Events
    • Human Rights
    • Media Usage
    • News
    • OSINT
    • Perception Model
    • Publication
    • Risk Assessment
    • Threat Analysis
    • Toolkit
    • Training
    • Video

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Migration-Related Risks Caused by Misconceptions of Opportunities and Requirement

    MIRROR has received funding from the European Union’s Horizon 2020 research and innovation action program under grant agreement No 832921.
    Follow us:
    Linkedin Twitter

    © All rights reserved

    Imprint | Privacy Policy

    Manage Cookie Consent
    We use cookies to optimize our website and our service.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}