Table of contents Introduction ........................................................................................................................ 7
Call - Disaster-resilience: safeguarding and securing society, including adapting to climate change .................................................................................................................... 9
I. Crisis management .................................................................................................... 10
DRS-1-2015: Crisis management topic 1: Potential of current and new measures and technologies to respond to extreme weather and climate events ......................................... 10
DRS-2-2014 Crisis management topic 2: Tools for detection, traceability, triage and individual monitoring of victims after a mass CBRN contamination and/or exposure ....... 11
DRS-3-2015: Crisis management topic 3: Demonstration activity on large scale disasters and crisis management and resilience of EU external assets against major identified threats or causes of crisis ................................................................................................................. 12
DRS-4- 2014: Crisis management topic 4: Feasibility study for strengthening capacity-building for health and security protection in case of large-scale pandemics – Phase I Demo .................................................................................................................................... 14
DRS-5-2014: Crisis management topic 5: Situation awareness of Civil Protection decision-making solutions – preparing the ground for a Pre-commercial Procurement (PCP) ......... 15
DRS-6-2015: Crisis management topic 6: Addressing standardisation opportunities in support of increasing disaster resilience in Europe.............................................................. 16
DRS-7-2014: Crisis management topic 7: Crises and disaster resilience – operationalizing resilience concepts ............................................................................................................... 17
DRS-8-2014: Crisis management topic 8: Trans-national co-operation among National Contact Points (NCPs) for Security ..................................................................................... 19
II. Disaster Resilience & Climate Change ..................................................................... 20
DRS-9-2014/2015: Disaster Resilience & Climate Change topic 1: Science and innovation for adaptation to climate change: from assessing costs, risks and opportunities to demonstration of options and practices................................................................................ 20
DRS-10-2015: Disaster Resilience & Climate Change topic 2: Natural Hazards: Towards risk reduction science and innovation plans at national and European level ....................... 22
DRS-11-2015: Disaster Resilience & Climate Change topic 3: Mitigating the impacts of climate change and natural hazards on cultural heritage sites, structures and artefacts ...... 23
III. Critical Infrastructure Protection ............................................................................... 24
DRS-12-2015: Critical Infrastructure Protection topic 1: Critical Infrastructure “smart grid” protection and resilience under “smart meters” threats .............................................. 24
DRS-13-2015: Critical Infrastructure Protection topic 2: Demonstration activity on tools for adapting building and infrastructure standards and design methodologies in vulnerable locations in case of natural or man-originated catastrophes ................................................ 25

Secure societies – Protecting freedom and security of Europe and its citizens
PART 14 - Page 3 of 106
DRS-14-2015: Critical Infrastructure Protection topic 3: Critical Infrastructure resilience indicator - analysis and development of methods for assessing resilience .......................... 26
DRS-15-2015: Critical Infrastructure Protection topic 4: Protecting potentially hazardous and sensitive sites/areas considering multi-sectorial dependencies ..................................... 28
DRS-16-2014: Critical Infrastructure Protection topic 6: Improving the aviation security chain ..................................................................................................................................... 29
DRS-17-2014/2015: Critical infrastructure protection topic 7: SME instrument topic: “Protection of urban soft targets and urban critical infrastructures” ................................... 30
IV. Communication technologies and interoperability ................................................... 33
DRS-18-2014: Communication technologies and interoperability topic 1: interoperable next generation of broadband radio communication system for public safety and security – Pre-commercial Procurement (PCP) ................................................................................... 33
DRS-19-2014: Communication technologies and interoperability topic 2: Next generation emergency services .............................................................................................................. 35
V. Ethical/Societal Dimension ....................................................................................... 36
DRS-20-2014: Ethical/Societal Dimension topic 1: Improving protection of Critical infrastructures from insider threats ...................................................................................... 36
DRS-21-2014: Ethical/Societal Dimension topic 2: Better understanding the links between culture, risk perception and disaster management ............................................................... 37
DRS-22-2015: Ethical/Societal Dimension topic 3: Impact of climate change in third countries on Europe's security ............................................................................................. 38
Conditions for this call......................................................................................................... 40 Call – Fight against crime and Terrorism ............................................................................... 46
I. Forensics.................................................................................................................... 47
FCT-1-2015: Forensics topic 1: Tools and infrastructure for the fusion, exchange and analysis of big data including cyber-offenses generated data for forensic investigation .... 47
FCT-2-2015. Forensic topic 2: Advanced easy to use in-situ forensic tools at the scene of crime .................................................................................................................................... 48
FCT-3-2015: Forensics topic 3: Mobile, remotely controlled technologies to examine a crime scene in case of an accident or a terrorist attack involving CBRNE materials ......... 50
FCT-4-2015: Forensics topic 4: Internet Forensics to combat organized crime ................. 51
II. Law enforcement capabilities.................................................................................... 52
FCT-5-2014: Law enforcement capabilities topic 1: Develop novel monitoring systems and miniaturised sensors that improve Law Enforcement Agencies' evidence- gathering abilities ................................................................................................................................. 52
FCT-6-2015: Law Enforcement capabilities 2: Detection and analysis of terrorist-related content on the Internet ......................................................................................................... 53

FCT-7-2014: Law enforcement capabilities topic 3: Pan European platform for serious gaming and training ............................................................................................................. 55
FCT-8-2014: Law enforcement capabilities topic 4: Trans-national cooperation among public end-users in security research stakeholders .............................................................. 56
FCT-9-2015: Law Enforcement capabilities topic 5: Identity Management ...................... 56
III. Urban security ........................................................................................................... 58
FCT-10-2014: Urban security topic 1: Innovative solutions to counter security challenges connected with large urban environment ............................................................................. 58
FCT-11-2014: Urban security topic 2: Countering the terrorist use of an explosive threat, across the timeline of a plot, including the detection of explosives in a flow ..................... 59
FCT-12-2014 Urban security topic 3: Minimum intrusion tools for de-escalation during mass gatherings improving citizens’ protection .................................................................. 60
IV. Ethical/Societal Dimension ....................................................................................... 61
FCT-13-2014: Ethical/Societal Dimension Topic 1: Factors affecting (in-) security ......... 61
FCT-14-2014: Ethical/Societal Dimension Topic 2: Enhancing cooperation between law enforcement agencies and citizens - Community policing .................................................. 62
FCT-15-2015: Ethical/Societal Dimension Topic 3: Better understanding the role of new social media networks and their use for public security purposes ....................................... 63
FCT-16-2015: Ethical/Societal Dimension Topic 4 - Investigating the role of social, psychological and economic aspects of the processes that lead to organized crime (including cyber related offenses), and/or terrorist networks and their impact on social cohesion ............................................................................................................................... 64
FCT-17-2015: Fast track to Innovation Topic ..................................................................... 65
Conditions for this call......................................................................................................... 67 Call – Border Security and External Security ......................................................................... 69
I. Maritime Border Security.......................................................................................... 70
BES-1-2014: Maritime Border Security topic 1: radar systems for the surveillance of coastal and pre-frontier areas and in support of search and rescue operations .................... 70
BES-2-2015: Maritime Border Security topic 2: Low cost and “green” technologies for EU coastal border surveillance ................................................................................................... 71
BES-3-2014: Maritime Border Security topic 3: Light optionally piloted vehicles (and sensors) for maritime surveillance ....................................................................................... 72
BES-4-2015: Maritime Border Security topic 4: Detection of low flying aircraft at near shore air space ...................................................................................................................... 73
II. Border crossing points ............................................................................................... 74
BES-5-2015: Border crossing points topic 1: Novel mobility concepts for land border security ................................................................................................................................. 74

BES-6-2015: Border crossing points topic 2: Exploring new modalities in biometric-based border checks ....................................................................................................................... 76
BES-7-2015: Border crossing points topic 3: Optimization of border control processes and planning................................................................................................................................ 77
III. Supply Chain Security ............................................................................................... 78
BES-8-2015: Supply Chain Security topic 1: Development of an enhanced non-intrusive (stand-off) scanner ............................................................................................................... 78
BES-9-2014: Supply Chain Security topic 2: Technologies for inspections of large volume freight ................................................................................................................................... 79
IV. External Security ....................................................................................................... 81
BES-10-2015: Information management topic 1: Civilian humanitarian mission personnel tracking ................................................................................................................................ 81
BES-11-2014: Information management topic 2: Information management, systems and infrastructure for civilian EU External Actions ................................................................... 82
BES-12-2014: Conflict prevention and peace building topic 1: Enhancing the civilian conflict prevention and peace building capabilities of the EU ............................................ 83
BES-13-2015: Conflict prevention and peace building topic 2: Training curricula for Conflict Prevention and Peace Building personnel ............................................................. 84
V. Ethical Societal Dimension ....................................................................................... 84
BES-14-2014: Ethical Societal Dimension topic 1: Human factors in border control ........ 84
Conditions for this call......................................................................................................... 86 Call – Digital Security: Cybersecurity, Privacy and Trust ...................................................... 88
DS-1-2014: Privacy ............................................................................................................. 88
DS-2-2014: Access Control ................................................................................................. 90
DS-6-2014: Risk management and assurance models ......................................................... 90
DS-3-2015: The role of ICT in Critical Infrastructure Protection ....................................... 91
DS-4-2015: Secure Information Sharing ............................................................................. 94
DS-5-2015: Trust eServices ................................................................................................. 95
Conditions for this call......................................................................................................... 97 Other actions .......................................................................................................................... 99
1 - PRS item 1: Use of Galileo PRS in Professional Mobile Networks receiver, provision of an Early Service ................................................................................................................... 99
2 - PRS item 2: Remote PRS processing server ................................................................ 100
3 - Space surveillance and tracking (SST) ......................................................................... 101

4 - Supporting the implementation of the Security Industrial Policy and Action Plan through the European Reference Network for Critical Infrastructure Protection (ERNCIP)............................................................................................................................................ 101
5 - Developing Law Enforcement Tools and Techniques in the Fight Against Cybercrime............................................................................................................................................ 102
6 – Evaluations of the proposals for the 2014 and 2015 calls “Disaster-resilience: safeguarding and securing society, including adapting to climate change”, “Fight against crime and terrorism” and “Border Security” ..................................................................... 103
7 – External expertise - Evaluations of the proposals for the 2014 and 2015 calls “Digital Security: Cybersecurity, Privacy and Trust” ..................................................................... 103
8 - Support to workshops, conferences, expert groups, communications activities or studies............................................................................................................................................ 103
9 - Ex post evaluation of the FP7 Security Theme ............................................................ 104
Budget – SC7 Secure societies ....................................................................................... 105