MAGNETO (2018–2021) was a dedicated platform for correlating multimedia data streams to support organised crime and counter-terrorism investigations.
VENAKA MEDIA LIMITED
UK SME delivering multimedia analysis and machine learning tools for law enforcement, organised crime investigation, and critical infrastructure security.
Their core work
Venaka Media Limited is a UK-based technology SME specialising in multimedia intelligence and data fusion for security and law enforcement applications. Their work centers on building systems that ingest heterogeneous data sources — video, audio, text, social media — and apply machine learning and semantic correlation to surface actionable intelligence for investigators and analysts. In the MAGNETO project they contributed to a platform designed to help law enforcement agencies analyse and correlate multimedia evidence for organised crime and counter-terrorism investigations, with a specific emphasis on producing court-admissible outputs. Their DEFENDER participation suggests additional capability in cyber-physical security monitoring of critical infrastructure.
What they specialise in
MAGNETO project keywords include machine learning, augmented intelligence, and HMI, indicating applied AI work for analyst-facing decision support tools.
The explicit keyword 'court-proof evidence' in MAGNETO suggests Venaka contributed to forensic chain-of-custody and evidence integrity requirements.
DEFENDER (2017–2020) focused on defending European energy infrastructures, pointing to competence in cyber-physical threat detection or communications.
How they've shifted over time
With only two projects starting in the same two-year window (2017–2018), there is insufficient timeline to detect meaningful evolution — this is a snapshot rather than a trajectory. The absence of keywords from DEFENDER likely reflects data gaps rather than a pivot; both projects fall squarely within the security domain. What can be said is that MAGNETO represents a deepening into intelligence analytics and machine learning, whereas DEFENDER suggests an earlier or parallel thread in infrastructure protection.
Venaka appears to be moving toward analyst-facing AI tools for law enforcement — combining multimedia fusion, semantic correlation, and court-ready evidence handling — which positions them well for future EU security and justice-tech programmes.
How they like to work
Venaka has participated exclusively as a consortium partner, never as coordinator, across both projects. Despite that, they have accumulated 41 unique partners across 13 countries in just two projects, indicating participation in large, diverse consortia typical of H2020 security Innovation Actions. This suggests they are brought in as a specialist contributor — providing a defined technical capability — rather than leading the overall programme architecture.
Venaka has worked with 41 distinct partners spread across 13 countries, a notably wide network for an organisation with only two projects. This breadth reflects the large multi-partner consortia common in H2020 security calls rather than deep bilateral relationships.
What sets them apart
Venaka occupies a niche at the intersection of media technology and law enforcement intelligence — a combination that is rare among UK SMEs in the H2020 security space. Their focus on court-proof evidence and human-machine interfaces for investigators suggests they build tools that are not just technically capable but legally usable, which is a significant differentiator in criminal justice contexts. For consortium builders targeting EU security and justice calls, they offer specialist multimedia analytics expertise without the overhead of a large research institution.
Highlights from their portfolio
- MAGNETOTheir largest funded project and the source of all detailed keywords — a multimedia correlation engine for organised crime and counter-terrorism that required both advanced ML and court-admissible evidence standards.
- DEFENDERParticipation in a critical infrastructure security project alongside MAGNETO demonstrates cross-domain security breadth, though keyword data for this project is sparse.