Welcome to EITHOS Observatory

EITHOS is developing a novel Identity Theft Observatory System, empowering European citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of online identity theft (OIDT) related crime. Through targeted awareness campaigns and innovative engagement activities, EITHOS aims to raise public awareness about Online Identity Theft and associated risks and societal impact.

The website is acting as a hub centralising key information and various materials on OIDT and related trends: you’ll be able to get informed about many topics related to OIDT, join our activities among the tens we are proposing, enter our Newsroom to be updated about our project and campaigns as well as latest EU news, and learn about EITHOS in detail. Not forgetting that you’ll always be able to report an incident wherever you’re located in the EU, by clicking on the related button upper right of the homepage.

Are you looking for something particular, do you want to connect on social media, or contact us ? Please find the search bar, our social media accounts and contact us on top of the homepage.

The EITHOS Consortium wishes you a good journey into its OIDT prevention observatory.

deepfake-1

Deepfakes

Deepfakes are media – images, videos, or sound clips – that have been manipulated by deep learning algorithms. Their goal is to alter the identity or perceived actions of the people depicted on the manipulated media – showing people doing or saying things they never did.

banking-fraud-1

Online Frauds

Online fraud refers to deceptive activities conducted through the internet, utilizing channels like email or messaging apps, to trick individuals into revealing sensitive information (e.g., bank details, credit card information). Perpetrators aim to gain financial benefits or use obtained data for identity theft.
cybersecurity-1

Data Privacy

Data privacy refers to the protection of individuals’ personal information and the control they have over how their data is collected, processed, stored, and shared by organizations. It involves ensuring that individuals have the right to keep their sensitive information confidential and that organizations handle data in a secure and lawful manner.

cybersecurity-7

Emerging trends in OIDT

In an era where digital interactions are ubiquitous, the protection of our online identities has become paramount. The world of cybercrime is constantly evolving, and as a result, trends in online identity theft are shifting. Staying informed about these trends is essential for individuals and businesses to safeguard their sensitive information and financial well-being.

cybersecurity-2

Cybersecurity

Cybersecurity refers to the practice of protecting computer systems, networks, programs, and data from digital attacks, unauthorized access, damage, or theft. It encompasses a range of strategies, technologies, and processes designed to ensure the confidentiality, integrity, and availability of information in the digital realm.

digital-identity-1

Digital Identity

Digital identity is the distinct portrayal of a person, organization, or device in the digital realm. It includes unique attributes and credentials that differentiate a digital entity. Utilized in online transactions and access control, components may involve user-names, passwords, biometrics, digital certificates, and authen-tication factors.

digital-identity-2

Social Botnets

Social botnets manipulate social media by automating actions like liking, sharing, and commenting to amplify messages or spread ideas. Used for political propaganda and misinformation, these coordinated botnets impact online discussions, influence perceptions, and may facilitate fraudulent activities.

victimology-1

Psycho-social dimensions of OIDT: victimology

The psycho-social/victimology pers-pective involves studying the psychological and social dimen-sions of individuals who have ex-perienced victimization. It encom-passes understanding both the individual’s emotional responses and the broader social influences that contribute to their expe-riences as victims, with the aim of comprehensively addressing the complexities of victimization.

fake-news-1

Fake News

Fabricated information, unintentional inaccuracies, and deliberately misleading content: they all have impacts on society and require efforts to promote digital literacy and critical thinking to navigate the intricate information landscape of the modern world.

cybersecurity-5

F.A.Q.

Your go-to guide for quick answers to common questions about OIDT.

Project Coordinator
CENTRE FOR RESEARCH AND TECHNOLOGY HELLAS (CERTH)

Address
CHARILAOU THERMI ROAD 6KM
THERMI THESSALONIKI 57001
GREECE

certh-logo-vec
universitabologna 1
ENG-logo-purple
hellenic-police
hertasecurity logo
KEMEA Logo 1
ESMIR Logotipo del Ministerio del Interior
PSCE
2hPOL cmy antique eng 1
universidad politecnica madrid 1
Vicomtech BRTA 1
Vrije Universiteit Brussel logo 1
Skip to content