EU Tools Up For Cyber War

As the member states rapidly progress in their own personal cyber arms race, the bloc’s institutions risk being left behind.

The European Commission was hacked back in November and it took until mid-January for the EU to announce that it wants to invest more in cyber defence.

The attack, carried out on 24 November, involved millions of requests being made to access the executive’s website, crippling its servers. It happened in the afternoon and meant many officials were unable to keep working.

But the bloc’s plans to counter hacking and government-launched hoaxes have already come in for criticism. German MEP Jan Phillip Abrecht (Greens/EFA) said that there are so far no tangible measures to protect critical infrastructure or to tackle Fake News. Much is still “under discussion”.

Things have moved on further in the member states though, where military and IT analysts have been working for years on how best to protect themselves from the growing threat of cyber-attacks.

The stakes are also being raised. At least 15 EU members have incorporated a military element into their cyber strategies, although “few admit to having invested in cyber weapons”, according to a European Parliament working paper.

France is a leader in the European cyber arms race. In December, it launched its first cyber unit, which is designed specifically to counter attacks and which is expected to grow to employ 2,600 specialists.

French Defence Minister Jean-Yves Le Drian made a stark warning about a “new cyber battlefield”, which would mean “the whole art of war would have to be rethought”. The new team of hackers will be expected, according to Le Drian, to “break through the systems of our enemies” and “neutralise temporarily or permanently” their networks.

One month earlier the United Kingdom also revealed its new cyber plans. A total of €2.1 billion has been earmarked to bolster its web defence, as well as offence.

Germany is also keen not to miss out on the digital arms race bandwagon. The ministry of defence announced that it will this year set up its own cyber command centre. Existing capacity is set to be centralised under one umbrella, giving the so-called CIR a total manpower of some 14,000 individuals.

Official statements maintain that the mandate of this ‘cyber army’ is limited to fending off external attacks. The federal government insists that the mantra is very much one of defence.

A leaked paper from the defence ministry, later played down by Defence Minister Ursula von der Leyen, included a number of questions relating to the use of offensive cyber weapons.

Candid Wüest of IT security firm Symantec warned that the boundaries between defensive and offensive capabilities in this regard are often difficult to draw. “If I know how someone is attacking me, then this knowledge can be used to launch my own separate attack,” she explained.

This assessment is one that is shared by the German army, the Bundeswehr. The final report relating to the CIR said that “if someone has the capability to defend, then they can also launch a worldwide attack”. As a result, “the boundaries between war and peace become blurred”.

Germany launching its own cyber-attacks is a thought that is clearly conceivable to domestic security agency chief Hans-Georg Maaßen.

He recently even publicly called for Germany’s cyber troops to be deployed on an offensive basis, insisting that the Bundesrepublik must “be able to attack the enemy”.

Ein News

German Spy Chief Fears Russian Interference In 2017 Elections:

 

« Could Britain Fight A Cyber War with Russia?
An Intelligence Crisis In Moscow »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

BlueKrypt

BlueKrypt

BlueKrypt is a consulting firm for the security of IT systems and their management.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

CAPSLOCK

CAPSLOCK

CAPSLOCK delivers career-changing cyber training to help adults re-skill. Learn online to become a cyber security professional and pay no tuition until you land a high-paying job.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

Seigur

Seigur

Seigur is an IT consultancy business providing flexible legal and cyber security services for IT and data privacy programmes.

SphereX Technologies

SphereX Technologies

SphereX is the first on-chain security solution for Web3 applications.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.

Twine Security

Twine Security

Twine is pioneering the creation of AI digital cybersecurity employees to help improve efficiency for cybersecurity teams.