Tag - Critical infrastructure

EU sanctions Iran group that hacked Charlie Hebdo
BRUSSELS — European Union countries on Monday slapped new sanctions on hacking groups, including an Iranian group that targeted subscribers of the French satirical magazine Charlie Hebdo. Capitals froze assets and banned doing business with Iranian company Emennet Pasargad, which in 2023 stole data of subscribers to the French magazine and advertised the data for sale on the dark web. Charlie Hebdo was targeted by terrorists in 2015 after publishing cartoons of the Prophet Muhammed. Microsoft in 2023 pinned the data theft on Emennet Pasargad, which happened after the magazine published cartoons mocking then-Iranian Supreme Leader Ali Khamenei. Capitals also sanctioned Chinese company Integrity Technology Group and Chinese firm Anxun Information Technology, also known as i-Soon, and its co-founders Chen Cheng and Wu Haibo, who are banned from entering the EU, the EU sanctions listing showed. According to the details of the sanctions, Anxun Information Technology targeted “critical infrastructure and critical state functions” of EU countries and sold classified information as part of so-called hack-for-hire services.  The United States Department of Justice in March 2025 indicted 12 people involved in i-Soon for cyberattacks the U.S. said it had carried out at the behest of Chinese security services. Chinese security services “paid handsomely” for the data the groups stole, the department said.  Integrity Technology Group, the other Chinese company, facilitated the activities of a Chinese state hacking group dubbed Flax Typhoon, which security officials say has targeted organizations in Taiwan for espionage purposes. Flax Typhoon used Integrity’s products and technology to hack into more than 65,000 devices in six EU member countries, the Council of the EU said on Monday. The U.S. Treasury Department also sanctioned Integrity in January 2025. The United Kingdom hit both Chinese companies with sanctions late last year. 
Data
Foreign Affairs
Security
Technology
Companies
The great Russian disconnect
Anton, a 44-year-old Russian soldier who heads a workshop responsible for repairing and supplying drones, was at his kitchen table when he learned last month that Elon Musk’s SpaceX had cut off access to Starlink terminals used by Russian forces. He scrambled for alternatives, but none offered unlimited internet, data plans were restrictive, and coverage did not extend to the areas of Ukraine where his unit operated. It’s not only American tech executives who are narrowing communications options for Russians. Days later, Russian authorities began slowing down access nationwide to the messaging app Telegram, the service that frontline troops use to coordinate directly with one another and bypass slower chains of command. “All military work goes through Telegram — all communication,” Anton, whose name has been changed because he fears government reprisal, told POLITICO in voice messages sent via the app. “That would be like shooting the entire Russian army in the head.” Telegram would be joining a home screen’s worth of apps that have become useless to Russians. Kremlin policymakers have already blocked or limited access to WhatsApp, along with parent company Meta’s Facebook and Instagram, Microsoft’s LinkedIn, Google’s YouTube, Apple’s FaceTime, Snapchat and X, which like SpaceX is owned by Musk. Encrypted messaging apps Signal and Discord, as well as Japanese-owned Viber, have been inaccessible since 2024. Last month, President Vladimir Putin signed a law requiring telecom operators to block cellular and fixed internet access at the request of the Federal Security Service. Shortly after it took effect on March 3, Moscow residents reported widespread problems with mobile internet, calls and text messages across all major operators for several days, with outages affecting mobile service and Wi-Fi even inside the State Duma. Those decisions have left Russians increasingly cut off from both the outside world and one another, complicating battlefield coordination and disrupting online communities that organize volunteer aid, fundraising and discussion of the war effort. Deepening digital isolation could turn Russia into something akin to “a large, nuclear-armed North Korea and a junior partner to China,” according to Alexander Gabuev, the Berlin-based director of the Carnegie Russia Eurasia Center. In April, the Kremlin is expected to escalate its campaign against Telegram — already one of Russia’s most popular messaging platforms, but now in the absence of other social-media options, a central hub for news, business and entertainment. It may block the platform altogether. That is likely to fuel an escalating struggle between state censorship and the tools people use to evade it, with Russia’s place in the world hanging in the balance. “It’s turned into a war,” said Mikhail Klimarev, executive director of the internet Protection Society, a digital rights group that monitors Russia’s censorship infrastructure. “A guerrilla war. They hunt down the VPNs they can see, they block them — and the ‘partisans’ run, build new bunkers, and come back.” THE APP THAT RUNS THE WAR On Feb. 4, SpaceX tightened the authentication system that Starlink terminals use to connect to its satellite network, introducing stricter verification for registered devices. The change effectively blocked many terminals operated by Russian units relying on unauthorized connections, cutting Starlink traffic inside Ukraine by roughly 75 percent, according to internet traffic analysis by Doug Madory, an analyst at the U.S. network monitoring firm Kentik. The move threw Russian operations into disarray, allowing Ukraine to make battlefield gains. Russia has turned to a workaround widely used before satellite internet was an option: laying fiber-optic lines, from rear areas toward frontline battlefield positions. Until then, Starlink terminals had allowed drone operators to stream live video through platforms such as Discord, which is officially blocked in Russia but still sometimes used by the Russian military via VPNs, to commanders at multiple levels. A battalion commander could watch an assault unfold in real time and issue corrections — “enemy ahead” or “turn left” — via radio or Telegram. What once required layers of approval could now happen in minutes. Satellite-connected messaging apps became the fastest way to transmit coordinates, imagery and targeting data. But on Feb. 10, Roskomnadzor, the Russian communications regulator, began slowing down Telegram for users across Russia, citing alleged violations of Russian law. Russian news outlet RBC reported, citing two sources, that authorities plan to shut down Telegram in early April — though not on the front line. In mid-February, Digital Development Minister Maksut Shadayev said the government did not yet intend to restrict Telegram at the front but hoped servicemen would gradually transition to other platforms. Kremlin spokesperson Dmitry Peskov said this week the company could avoid a full ban by complying with Russian legislation and maintaining what he described as “flexible contact” with authorities. Roskomnadzor has accused Telegram of failing to protect personal data, combat fraud and prevent its use by terrorists and criminals. Similar accusations have been directed at other foreign tech platforms. In 2022, a Russian court designated Meta an “extremist organization” after the company said it would temporarily allow posts calling for violence against Russian soldiers in the context of the Ukraine war — a decision authorities used to justify blocking Facebook and Instagram in Russia and increasing pressure on the company’s other services, including WhatsApp. Telegram founder Pavel Durov, a Russian-born entrepreneur now based in the United Arab Emirates, says the throttiling is being used as a pretext to push Russians toward a government-controlled messaging app designed for surveillance and political censorship. That app is MAX, which was launched in March 2025 and has been compared to China’s WeChat in its ambition to anchor a domestic digital ecosystem. Authorities are increasingly steering Russians toward MAX through employers, neighborhood chats and the government services portal Gosuslugi — where citizens retrieve documents, pay fines and book appointments — as well as through banks and retailers. The app’s developer, VK, reports rapid user growth, though those figures are difficult to independently verify. “They didn’t just leave people to fend for themselves — you could say they led them by the hand through that adaptation by offering alternatives,” said Levada Center pollster Denis Volkov, who has studied Russian attitudes toward technology use. The strategy, he said, has been to provide a Russian or state-backed alternative for the majority, while stopping short of fully criminalizing workarounds for more technologically savvy users who do not want to switch. Elena, a 38-year-old Yekaterinburg resident whose surname has been withheld because she fears government reprisal, said her daughter’s primary school moved official communication from WhatsApp to MAX without consulting parents. She keeps MAX installed on a separate tablet that remains mostly in a drawer — a version of what some Russians call a “MAXophone,” gadgets solely for that app, without any other data being left on those phones for the (very real) fear the government could access it. “It works badly. Messages are delayed. Notifications don’t come,” she said. “I don’t trust it … And this whole situation just makes people angry.” THE VPN ARMS RACE Unlike China’s centralized “Great Firewall,” which filters traffic at the country’s digital borders, Russia’s system operates internally. Internet providers are required to route traffic through state-installed deep packet inspection equipment capable of controlling and analyzing data flows in real time. “It’s not one wall,” Klimarev said. “It’s thousands of fences. You climb one, then there’s another.” The architecture allows authorities to slow services without formally banning them — a tactic used against YouTube before its web address was removed from government-run domain-name servers last month. Russian law explicitly provides government authority for blocking websites on grounds such as extremism, terrorism, illegal content or violations of data regulations, but it does not clearly define throttling — slowing traffic rather than blocking it outright — as a formal enforcement mechanism. “The slowdown isn’t described anywhere in legislation,” Klimarev said. “It’s pressure without procedure.” In September, Russia banned advertising for virtual private network services that citizens use to bypass government-imposed restrictions on certain apps or sites. By Klimarev’s estimate, roughly half of Russian internet users now know what a VPN is, and millions pay for one. Polling last year by the Levada Center, Russia’s only major independent pollster, suggests regular use is lower, finding about one-quarter of Russians said they have used VPN services. Russian courts can treat the use of anonymization tools as an aggravating factor in certain crimes — steps that signal growing pressure on circumvention technologies without formally outlawing them. In February, the Federal Antimonopoly Service opened what appears to be the first case against a media outlet for promoting a VPN after the regional publication Serditaya Chuvashiya advertised such a service on its Telegram channel. Surveys in recent years have shown that many Russians, particularly older citizens, support tighter internet regulation, often citing fraud, extremism and online safety. That sentiment gives authorities political space to tighten controls even when the restrictions are unpopular among more technologically savvy users. Even so, the slowdown of Telegram drew criticism from unlikely quarters, including Sergei Mironov, a longtime Kremlin ally and leader of the Just Russia party. In a statement posted on his Telegram channel on Feb. 11, he blasted the regulators behind the move as “idiots,” accusing them of undermining soldiers at the front. He said troops rely on the app to communicate with relatives and organize fundraising for the war effort, warning that restricting it could cost lives. While praising the state-backed messaging app MAX, he argued that Russians should be free to choose which platforms they use. Pro-war Telegram channels frame the government’s blocking techniques as sabotage of the war effort. Ivan Philippov, who tracks Russia’s influential military bloggers, said the reaction inside that ecosystem to news about Telegram has been visceral “rage.” Unlike Starlink, whose cutoff could be blamed on a foreign company, restrictions on Telegram are viewed as self-inflicted. Bloggers accuse regulators of undermining the war effort. Telegram is used not only for battlefield coordination but also for volunteer fundraising networks that provide basic logistics the state does not reliably cover — from transport vehicles and fuel to body armor, trench materials and even evacuation equipment. Telegram serves as the primary hub for donations and reporting back to supporters. “If you break Telegram inside Russia, you break fundraising,” Philippov said. “And without fundraising, a lot of units simply don’t function.” Few in that community trust MAX, citing technical flaws and privacy concerns. Because MAX operates under Russian data-retention laws and is integrated with state services, many assume their communications would be accessible to authorities. Philippov said the app’s prominent defenders are largely figures tied to state media or the presidential administration. “Among independent military bloggers, I haven’t seen a single person who supports it,” he said. Small groups of activists attempted to organize rallies in at least 11 Russian cities, including Moscow, Irkutsk and Novosibirsk, in defense of Telegram. Authorities rejected or obstructed most of the proposed demonstrations — in some cases citing pandemic-era restrictions, weather conditions or vague security concerns — and in several cases revoked previously issued permits. In Novosibirsk, police detained around 15 people ahead of a planned rally. Although a small number of protests were formally approved, no large-scale demonstrations ultimately took place. THE POWER TO PULL THE PLUG The new law signed last month allows Russia’s Federal Security Service to order telecom operators to block cellular and fixed internet access. Peskov, the Kremlin spokesman, said subsequent shutdowns of service in Moscow were linked to security measures aimed at protecting critical infrastructure and countering drone threats, adding that such limitations would remain in place “for as long as necessary.” In practice, the disruptions rarely amount to a total communications blackout. Most target mobile internet rather than all services, while voice calls and SMS often continue to function. Some domestic websites and apps — including government portals or banking services — may remain accessible through “whitelists,” meaning authorities allow certain services to keep operating even while broader internet access is restricted. The restrictions are typically localized and temporary, affecting specific regions or parts of cities rather than the entire country. Internet disruptions have increasingly become a tool of control beyond individual platforms. Research by the independent outlet Meduza and the monitoring project Na Svyazi has documented dozens of regional internet shutdowns and mobile network restrictions across Russia, with disruptions occurring regularly since May 2025. The communications shutdown, and uncertainty around where it will go next, is affecting life for citizens of all kinds, from the elderly struggling to contact family members abroad to tech-savvy users who juggle SIM cards and secondary phones to stay connected. Demand has risen for dated communication devices — including walkie-talkies, pagers and landline phones — along with paper maps as mobile networks become less reliable, according to retailers interviewed by RBC. “It feels like we’re isolating ourselves,” said Dmitry, 35, who splits his time between Moscow and Dubai and whose surname has been withheld to protect his identity under fear of governmental reprisal. “Like building a sovereign grave.” Those who track Russian public opinion say the pattern is consistent: irritation followed by adaptation. When Instagram and YouTube were blocked or slowed in recent years, their audiences shrank rapidly as users migrated to alternative services rather than mobilizing against the restrictions. For now, Russia’s digital tightening resembles managed escalation rather than total isolation. Officials deny plans for a full shutdown, and even critics say a complete severing would cripple banking, logistics and foreign trade. “It’s possible,” Klimarev said. “But if they do that, the internet won’t be the main problem anymore.”
Data
Defense
Media
Military
Security
Poland investigates Iran links behind cyberattack on nuclear facility
Poland is looking into whether an attempted cyberattack on a nuclear research facility was carried out by Iran, the government said on Thursday. The country’s digital minister Krzysztof Gawkowski said in an emailed statement that Poland had “identified an attempted cyberattack on the servers of the National Centre for Nuclear Research,” which authorities had thwarted. He told local media that the attack was carried out “in the past few days,” Reuters reported.  The nuclear center said in a statement that “all safety systems operated according to procedures.” A reactor is “operating safely and smoothly at full power,” Jakub Kupecki, the center’s director said in the statement. The facility carries out research into nuclear energy; Poland does not have nuclear weapons of its own.  Polish cybersecurity services and the energy ministry are working with the facility, Gawkowski said.  The minister told local media that there are early signals suggesting the attack came from Iran, Reuters reported. “The first identifications of the entry vectors … are related to Iran,” he said, adding that more investigation is required.  Gawkowski added that hackers could also have used indicators linking the attack to Iran in efforts to hide their real origins. Poland has faced a huge number of Russian cyberattacks since the war in Ukraine began in 2022. Western cyber and intelligence agencies have warned critical entities to be on high alert for Iranian cyberattacks following the start of the conflict in late February. The Iranian embassy in Warsaw did not immediately respond to a request for comment.
Defense
Energy
Conflict
Safety
Energy and Climate
Elon Musk steps into the UK energy crisis
LONDON — Elon Musk has been granted a license to supply energy in the U.K. Ofgem announced Thursday morning it has issued Musk-owned Tesla Energy Ventures with a license to provide electricity to U.K. businesses and households.  It brings a fresh contender into the supplier market, amid fears the global energy crisis will force up household bills.  The decision comes at the end of a seven-month approval process. Musk’s bid to enter the U.K. market has been highly controversial, after the world’s richest man and ally of U.S. President Donald Trump publicly criticized Prime Minister Keir Starmer and his government’s handling of the grooming gangs scandal.  Musk appeared last year via video link at a rally organized by the far-right activist Tommy Robinson, where he warned that “violence is going to come” to the British people “whether you choose violence or not.”   Energy Secretary Ed Miliband responded at the Labour Party conference in September: “We have a message for Elon Musk. Get the hell out of our politics and our country.” Miliband said Musk “incites violence on our streets.”   But Miliband would not be drawn at the time on whether Tesla Ventures should be granted an energy license. He insisted it was a matter for Ofgem and had to “go through the proper process.”  Miliband has faced calls from the centrist Liberal Democrats, and from some of Labour’s own MPs, to block the license.  After Musk’s comments about violence, Labour backbencher Clive Lewis said in September: “Elon Musk shouldn’t be allowed anywhere near our critical infrastructure.” The news comes at it a critical time for the domestic retail market, with industry warnings that customer debts have hit £5.5 billion. Disruption of key trade routes in the Gulf has pushed up wholesale gas and oil prices sharply.   Ofgem’s license for Tesla Ventures took effect on Wednesday, the regulator said.  It said the company must comply with all licensing conditions including requirements for treating customers fairly, financial responsibility, operational capability, billing, information provision and consumer protection.  Ofgem will have assessed whether Musk was a “fit and proper” person to lead a U.K energy supplier, although experts have previously said that is unlikely to take political statements into account. Ed Miliband’s Department for Energy Security and Net Zero has been approached for comment.
Energy
Trade
Markets
Energy and Climate UK
Technology UK
Europe braces as Iran threatens to attack
LONDON — The Iranian regime is warning it will attack European cities in any country that joins Donald Trump’s military operation and governments across the region are stepping up security in response. So far, Iranian drones have already targeted Cyprus, with one striking a British Royal Air Force base on the island, and others shot down before they could hit. That prompted the U.K., France and Greece to send jets, warships and helicopters to Cyprus to protect the country from further drone attacks. But with the British, French and German leaders saying they are ready to launch defensive military action in the Middle East, Tehran threatened to retaliate against these countries with attacks on European soil. “It would be an act of war. Any such act against Iran would be regarded as complicity with the aggressors. It would be regarded as an act of war against Iran,” Esmail Baghaei, Iran’s foreign ministry spokesperson, told Iranian state media. Mark Rutte, the former Dutch Prime Minister who now leads NATO, warned on Tuesday that Tehran posed a threat that reached deep into Europe. “Let’s be absolutely clear-eyed to what’s happening here,” Rutte said. “Iran is close to getting its hands on a nuclear capability and on a ballistic missile capability, which is posing a threat not only to the region — the Middle East, including posing an existential threat to Israel — it is also posing a huge threat to us here in Europe.” Iran is “an exporter of chaos” responsible over decades for terrorist plots and assassination attempts, including against people living on European soil, he said.  Here, POLITICO sets out what Iran is capable of, and where European countries may be at greatest risk.  MISSILES AIMED AT ATHENS AND EVEN BERLIN According to reports, Iran has been developing an intercontinental ballistic missile with a range of 10,000 kilometers, which would put European and even American territory potentially within range, said Antonio Giustozzi from the Royal United Services Institute think tank in London. It is not clear whether, under constant attack, Tehran would be able to manufacture and deploy an experimental missile like this, he said.  “Realistically, the further away you fire them, the less precise they will be,” Giustozzi told POLITICO. “Let’s say they had four or five long-range missiles. There may be some value to target something in Europe just to create some excitement and scare public opinion from intervening.”  Iran’s ballistic missile arsenal is known to include several medium-range systems that stretch to roughly 2,000 kilometers, according to the Center for Strategic and International Studies’ Missile Threat database. The solid-fueled Sejjil and Khorramshahr missiles are both assessed to have about that range, which would extend to parts of southeastern Europe from Iranian territory, including areas of Greece, Bulgaria and Romania, depending on the launch location. Romania has a U.S. missile shield site at Deveselu in the southern part of the country which was built to intercept potential missile attacks from Iran. This week, military security was stepped up at the site, according to Romania’s defense minister.  Tehran has long described 2,000 kilometers as a self-imposed ceiling for its ballistic missile program — a limit that keeps most of Europe outside of the envelope while preserving regional reach.  Defence Express, a Kyiv-based defense consultancy group, said the Khorramshahr missile may be capable of hitting targets 3,000 kilometers away if it was fitted with a lighter warhead, potentially bringing Berlin and Rome within range. However, the number of such long-range missiles in Iran’s arsenal is unlikely to be large.  ‘SHAHED’ DRONES AND TOYS PACKED WITH EXPLOSIVES  Iran has invested heavily in drone development and production, and these uncrewed projectiles may be its best flexible weapon. Iran’s “Shahed” drones have been deployed by Russian forces since the early days of the full-scale invasion of Ukraine. These one-way attack drones have a range claimed to be as much as 2,500 kilometers.  To reach targets inside European territory they would need to fly at low altitude across countries such as Turkey and Jordan, though Cyprus has already found out it is within range. Analysts believe the drone that hit U.K.’s RAF Akrotiri air base in Cyprus was likely a shahed-type, and may have been fired from Lebanon by Hezbollah, Iran’s proxy.  But Giustozzi said commercially available drones — even toys — could be used to cause havoc inside Europe. Iran is known to have a network of sleeper agents operating across many countries in Europe, he said, who use criminal groups to carry out attacks.  They could be tasked with a coordinated effort to fly drones over civilian airports, forcing flights to be halted and causing chaos to air traffic across Europe, he said. This would be cheap and easy to do. More ambitious attacks could include striking military targets with drones loaded with explosives. A residential building and cars are damaged by a Shahed drone attack in Kharkiv, Ukraine, last month. The drones have been deployed by Russian forces since the early days of the full-scale invasion of Ukraine. | Pavlo Pakhomenko/NurPhoto via Getty Images But such risk may be low, Giustozzi said, as Iran may not have been able to smuggle bomb making components into European countries as this has not been its primary mode of operation in the region in recent years.  HIT SQUADS AND TERRORISTS  Tehran’s recent focus has been on intimidating and targeting people and groups who are critical of the regime, particularly among the large Iranian diaspora dispersed widely across European countries, according to analysts.  According to an intelligence summary from one Western government, Iran has a long record of plots to assassinate and attack targets inside Europe. Its state-sponsored terrorism involves a mix of direct operations by Iranian forces and, according to the intelligence summary, a growing reliance on organized criminal gangs to maintain “plausible deniability.”  In the past decade, incidents have included the arrest of Iranian diplomat Assadollah Assadi for providing explosives to a couple tasked with bombing a large rally of the National Council of Resistance of Iran (NCRI). Assadi was sentenced to 20 years in prison.  After massive cyberattacks against state infrastructure, the Albanian government formally severed all ties with Iran in 2022. Four years earlier, Albania expelled the Iranian ambassador and several diplomats for plotting a truck bomb attack against an Iranian dissident camp. The Dutch government accused Iran of involvement in the targeted killing of two dissidents, in 2015 and 2017.  Suspected Iranian-backed assassination plots and other attacks have also been reported in Belgium, Cyprus, France, Germany, Sweden, and the U.K., among other countries in Europe.  CYBER ATTACKS  The threat to Europeans from Iran is not just physical, with the regime long being regarded as a capable actor in cyber warfare.   Experts and officials warned Iran could launch fresh cyber operations against Europe in the wake of the war started by the U.S. and Israel, either by targeting governments directly or by hitting critical infrastructure operators.  “We have to monitor now the situation very carefully when it comes to our cyber security and especially our critical infrastructure,” European Commission Executive Vice President Henna Virkkunen told POLITICO. “We know that the online dimension is also very important, the recruiting channel and especially the propaganda is also spread very much online.” Iran is typically seen as one of the big four cyber adversaries to the West — alongside Russia, China and North Korea. So far, however, there is little evidence to suggest it’s actively targeting Europe. In fact, Iran’s cyber activity has largely stopped since the U.S. bombing began, according to one senior European cybersecurity official, granted anonymity to discuss ongoing assessments.  If and when European countries make their support for U.S. and Israeli activities more explicit, that will likely draw them into the firing line, cyber industry officials said. “Europe should definitely expect that exactly what happened in the Gulf could happen and should happen in Europe,” said Gil Messing, chief of staff at Israeli cyber firm Check Point. EU Commissioner Henna Virkkunen spoke of the need to monitor cyber security and especially critical infrastructure. | Thierry Monasse/Getty Images Messing said his firm is already seeing evidence of cyberattacks in Cyprus, the only EU country that Iran has targeted with physical attacks so far. There’s no evidence of attacks in other European countries but it’s likely coming down the tracks, he said. And if attacks do take place, Iran’s capabilities, though lessened in recent years, remain significant, experts said. Iran’s security and intelligence services have cyber units comprising hundreds of people, with tens of millions of dollars of funding, Messing said. “If the regime lasts,” the senior official quoted above said, “they will be back.” Victor Goury-Laffont, Laura Kayali, Antoaneta Roussi, Joshua Berlinger and Sebastian Starcevic contributed reporting.
Defense
Intelligence
Media
Middle East
Politics
US Gulf allies rattled — and seeing few good options — following Iran strikes
Washington’s Gulf Arab partners are bracing themselves for a fraught period ahead as the U.S. and Israel press on with a major operation in Iran — one they had lobbied against. With Iran retaliating and taking aim at targets in Bahrain, the United Arab Emirates, Jordan, Kuwait, Iraq, Qatar and elsewhere where the U.S. has military assets, these countries are considering their options and whether there is any way to avoid a regional war. Trump administration officials signaled to some U.S. allies in the Gulf ahead of time that the attacks were coming and have been in frequent contact with Gulf Arab officials in the hours since, according to two officials from Arab countries in the region. Those officials declined to provide details of the conversations other than to say they had been briefed on the operations. President Donald Trump has spoken with the leaders of Saudi Arabia, Qatar and the UAE, as well as NATO Secretary General Mark Rutte, White House spokesperson Karoline Leavitt said Saturday in a post on X. The White House didn’t immediately respond to a request for additional details. This is a delicate moment for Iran’s neighbors, many of which count on the U.S. for defense backing and are still hoping to have some influence over how the U.S.-Israel military campaign goes forward but now also need to focus on protecting their own airspaces and critical infrastructure. It’s clear the Trump administration disregarded pleas from allies in the region in launching the attack on Iran. At least half a dozen Middle Eastern officials, including two foreign ministers, descended to Washington in the past month to caution against strikes, including from Saudi Arabia, the UAE and Oman. These countries’ fears of a new level of instability in the region are already being realized. The six-member Gulf Cooperation Council — which includes Bahrain, Kuwait, Oman, Qatar, Saudi Arabia and the UAE — is now coordinating on how to respond. “The days ahead will be tricky,” a senior diplomat from a Gulf country said. “Iran grossly miscalculated by attacking the GCC,” using the abbreviation for the grouping. The person declined to say what actions were being discussed. The diplomat, like others, was granted anonymity to discuss sensitive deliberations. The GCC and each of the targeted countries issued statements condemning the Iranian attacks and have vowed to defend themselves. The leaders of the UAE and Saudi Arabia, who have been at odds for months over the civil war in Sudan and other tensions, spoke over the phone Saturday in a sign of how Iran’s response has jolted the region. Oman’s foreign minister Badr Albusaidi — who has been mediating nuclear talks between the U.S. and Iran — said Saturday he was “dismayed” by the joint operation, launched just hours after he met with Vice President JD Vance in a last-ditch effort to head off the military strikes. “Neither the interests of the United States nor the cause of global peace are well served by this,” Albusaidi said on X. “I urge the United States not to get sucked in further. This is not your war.” It’s unlikely U.S.-Iran technical talks scheduled to take place next week in Vienna will proceed. Turkey, the European Union and others have called for regional diplomacy to de-escalate tensions. Turkey, a NATO member which maintains relations with both governments and shares a border with Iran, lamented the U.S.-Israel attacks and Iran’s retaliation, saying in a statement: “We call on all parties to cease the attacks immediately.” Now facing escalating attacks from the Iranians, Gulf states have a series of difficult options. “The GCC is in the peculiar position of becoming a primary target when it had been pushing for de-escalation and diplomacy all along,” said Firas Maksad, managing director for Middle East and North Africa at the Eurasia Group. He said Iran hopes its targeting of Gulf states will pressure Washington to stop the attacks, though he said such an approach is unlikely to succeed. “A more likely outcome is a collective decision by GCC states to either allow the U.S. greater operational freedom to target Iran from their territories or even to respond themselves,” he said. The escalation scenario favors the U.S., he said. Should Iran target Gulf energy infrastructure, that would trigger even more of a response from the U.S. and its Arab allies. Elisa Ewers, a former U.S. official who has worked for decades on the Middle East, said these countries have no choice but to place significant faith in the Trump administration, especially now that Iran has upped the cost and targeted them so directly. “They must hope air defenses hold for as long as needed and this conflict isn’t prolonged with serious economic impacts” said Ewers, who is now at the Council on Foreign Relations.
Defense
Middle East
Foreign Affairs
Cooperation
Military
Germany’s AfD sparks fears it is helping Russia with inquiry on NATO weaknesses
BERLIN — The far-right opposition Alternative for Germany (AfD) party has triggered security fears in Berlin after officially requesting information on vulnerabilities in NATO defenses — insight that would prove useful to the Kremlin. The AfD, which frequently takes positions favorable to Russia, has developed an interest in last year’s “Hedgehog 2025” exercise, a major NATO operation in Estonia, in which Ukrainian drone specialists used tactics learned on the battlefield to “destroy” NATO units in a war game. In a letter obtained by POLITICO, Rüdiger Lucassen, the AfD’s defense spokesperson, asked the government on Feb. 19 to brief the defense committee in the country’s parliament on the lessons learned from the drill. “What capability gaps were identified — particularly in the areas of counter-drone defense, electronic warfare, command capability and the protection of mobile forces?” Lucassen asked in the letter. He also sought clarification on “which capability gaps still exist and by when they are to be closed.” It’s hardly the first time the AfD has raised concerns with inquiries that would elicit information of interest to Russia, and the country’s ruling coalition has sounded the alarm. “With some of the AfD’s motions and questions, the question increasingly arises as to what purpose they actually serve, and whose interests are being pursued,” Florian Dorn, a defense committee lawmaker for the country’s ruling Christian Democratic bloc, told POLITICO, when asked about the Hedgehog 2025 inquiry. “If such information falls into the wrong hands, it endangers our security and defense capability.” Under Germany’s political system, opposition parties have significant powers to demand answers from the government. Ministries can withhold classified material, but must generally respond to formal inquiries. Assessments of military exercises do more than describe what went wrong. They can reveal how exposed certain units were, how quickly they were neutralized, and how long it may take to fix any problems identified. European security officials assume that Russia and other adversaries mine publicly available material to piece together operational patterns. In drone warfare especially — where tactics evolve rapidly and adaptation cycles are short — knowing how long weaknesses may persist can offer strategic advantages. Thomas Erndl, the Christian Democrats’ defense policy spokesperson, also warned of the risks involved, including “the danger that security-relevant information could end up in the wrong hands.” He added that ministries have become accustomed to weighing such risks when drafting their responses to parliamentary inquiries. A senior NATO military official told POLITICO the inquiry hasn’t prompted any “dire concern” within the alliance, but added that NATO members “always want to be careful about the information that gets out publicly.” The controversy over Hedgehog 2025 follows earlier disputes in which AfD lawmakers submitted detailed questions about military transport routes, infrastructure protection and security systems.  Last year, the interior minister of the eastern German state of Thuringia, Georg Maier, accused the AfD of using parliamentary questions to “systematically scout critical infrastructure,” alleging in an interview with Handelsblatt that the party was effectively working its way through what he described as a “Kremlin task list.”  According to reporting by the German newspaper Welt, the state interior ministry compiled a list of 58 AfD inquiries since October 2024 that it said focused on sensitive infrastructure, including police IT systems, drone-defense capabilities, military transport routes, energy networks, water supply and civil protection. Lucassen rejected the suggestion the party had ulterior motives, calling his request a routine instrument of parliamentary oversight. In an e-mail to POLITICO, he said lawmakers have to rely on official military assessments rather than media reporting in order to support the armed forces through legislation and budget decisions. Victor Jack contributed reporting.
Defense
Intelligence
Military
Security
War in Ukraine
Huawei taking part in EU research programs despite Commission crackdown
Chinese technology giant Huawei is participating in 16 projects funded by the European Commission’s Horizon Europe research and innovation program despite being dubbed a high-risk supplier. The Commission restricted Huawei from accessing Horizon projects in 2023 after saying that it (and another Chinese telecom supplier, ZTE) posed “materially higher risks than other 5G suppliers” in relation to cybersecurity and foreign influence. However, public data reviewed by POLITICO’s EU Influence newsletter shows that Huawei still takes part in several projects, many of which are in sensitive fields like cloud computing, 5G and 6G telecom technology and data centers. These projects mean Huawei has been working alongside universities and tech companies in Spain, France, Sweden, Denmark, the Netherlands, Germany, Belgium, Finland and Italy. It also has access to the intellectual property generated by the projects, as the contracts require the sharing of information as well as joint ownership of the results between partners. A Commission spokesperson confirmed that of the 16 projects, 15 were signed before the restrictions took place. The remaining project “was signed in 2025 and was assessed as falling outside the scope of the existing restrictions.” Many of the projects started in January 2023, with the contracts running out at the end of this year, while others will last until 2027, 2028 and 2030. “Huawei participates in and implements projects funded under Horizon Europe in a lawful and compliant manner,” a company spokesperson said. One of the projects is to develop data privacy and protection tools in the fields of AI and big data, along with Italy’s National Research Council, the University of Malaga, the University of Toulouse, the University of Calabria, and a Bavarian high-tech research institute for software-intensive systems. Huawei received €207,000 to lead the work on “design, implementation, and evaluation of use cases,” according to the contract for that project, seen by POLITICO. COMMISSION CRACKDOWN Last month the Commission proposed a new Cybersecurity Act that would restrict Huawei from critical telecoms networks under EU law, after years of asking national capitals to do so voluntarily. “I’m not satisfied [with] how the member states … have been implementing our 5G Toolbox,” the Commission’s executive VP for tech and security policy, Henna Virkkunen, told POLITICO at the time, referring to EU guidelines to deal with high-risk vendors. “We know that we still have high-risk vendors in our 5G networks, in the critical parts … so now we will have stricter rules on this.” The Commission is also working on measures to cut Chinese companies out of lucrative public contracts. Bart Groothuis, a liberal MEP working on the Cybersecurity Act, told POLITICO that the Commission should “honor the promises and commitments” it made “and push them out.” “They should be barred from participating. Period.” Huawei was also involved in an influence scandal last year, with Belgian authorities investigating whether the tech giant exerted undue influence over EU lawmakers. The scandal led to Huawei’s being banned from lobbying on the premises of the European Commission and the European Parliament.
Intelligence
Politics
Technology
Critical infrastructure
Cybersecurity
Why Europe can’t defend what it can’t connect
Europe enters a more contested decade than any since the end of the Cold War. Yet the frontline shaping its security is no longer limited to land, sea, air or even space.   It runs directly through the digital backbone that powers modern life: the networks, data infrastructures and connectivity systems on which governments, economies and armed forces depend.  But Europe will not be secure until it takes this digital backbone’s security seriously, and governs its openness through risk-based, verifiable sovereignty rather than isolationism or complacency.  >  Europe will not be secure until it takes this digital backbone’s security > seriously, and governs its openness through risk-based, verifiable sovereignty A digital frontline that remains dangerously exposed  Hybrid threats no longer sit at the margins of European security. In reality, they cut straight through its core systems. Hospitals, energy grids, transport networks, financial markets and military command-and-control all rely on constant, resilient connectivity.   Via Vodafone. Joakim Reiter, group chief external and corporate affairs officer, Vodafone. And when those systems falter, nations falter. Recent blackouts in Portugal and Spain revealed what this means in practice. A ‘digital failure’ is not an IT incident. It is a national security event.   Adversaries have already drawn the lesson. Subsea cables carrying 95 percent of the world’s internet traffic face mounting sabotage risks. Satellites have become open theatres of geopolitical competition. And cyberattacks now routinely target both critical national infrastructure and the commercial networks that underpin defense readiness.   Despite this, much of Europe’s digital backbone is still approached as a utility, not a strategic asset. Market forces, on their own, cannot deliver the resilience, redundancy and diversity that modern deterrence requires. Piecemeal upgrades and fragmented responsibilities across civil, military and regulatory silos leave avoidable gaps that adversaries will inevitably exploit.  > A ‘digital failure’ is not an IT incident. It is a national security event.   Europe must therefore elevate secure connectivity to the level of defense preparedness — politically, financially and operationally. It requires moving beyond incrementalism to a coordinated framework that fosters and defends critical digital infrastructure — one that enables governments and operators to plan, train and respond together before, not during, the next crisis.  Sovereignty is about control, not isolation  Connectivity alone is not the issue. Europe’s strategic vulnerability also stems from how it governs the technologies on which its digital backbone depends.  And while digital sovereignty is one pillar of Europe’s wider resilience agenda — spanning critical value chains such as defense, automotive, chemicals and energy — it is the pillar without which none of the others can function.  Europe cannot attain digital sovereignty by continuing excessive dependence on a small number of non-European providers. But it also cannot achieve it by walling itself off from global innovation. Both extremes weaken resilience.  That’s why sovereignty done right means governing openness on Europe’s terms. Europe must keep critical operations in trusted European hands while maintaining access to the scale, performance and innovation that global platforms can provide.   This approach starts with understanding sovereignty across three dimensions:  — Data sovereignty: who has lawful access to information.  — Operational sovereignty: who runs and can intervene in critical systems.  — Technological sovereignty: which capabilities Europe must own or control.  The false choice between ‘ban foreign tech’ and ‘do nothing’ is a trap. The real path forward is risk-based, proportionate and verifiable. We must define what truly requires European control and work with like-minded international partners to build a trusted technology ecosystem. Sovereignty needs to be demonstrated in practice, not merely asserted in policy.  This approach would also enable Europe to pool industrial capacity with trusted partners such as Japan, Canada, Australia, the United Kingdom and South Korea. This is cooperation that strengthens Europe rather than diluting control.   From principles to verifiable control  Europe should reject blanket bans based on EU borders that raise costs, slow next-generation deployment and fail to deliver true control. Instead, sovereignty must be translated into concrete, auditable mechanisms that strengthen resilience.   To deliver it, Europe should follow four core principles:   1. Harden the backbone: Europe must create a much better business case for investing in resilient fiber, advanced 5G technologies and future networks built with defense-grade security. And it must fortify subsea cables, satellite systems and cross-border infrastructure against hybrid threats. This is defense spending by another name.  2. Engineer sovereignty into operations: ensure Europe retains verifiable control over access to sensitive systems and require European oversight of critical operations. Authorities must be able to verify who operates critical systems, where data is processed and which legal jurisdiction applies.  3. Certify ‘Trusted European Operators’: establish an EU-wide certification enabling European-anchored providers to manage access to global platforms within EU-governed environments. Make interoperability and portability mandatory to prevent lock-in and ensure resilience.  4. End ‘sovereignty washing’: providers claiming sovereign capabilities must prove it. Europe must require auditable disclosures and rigorous, risk-based assessments. If claims cannot be verified, they should not determine Europe’s critical infrastructure decisions.  In parallel, Europe should adopt a single EU framework defining practical levels across the data, operational and technological dimensions. This would give CIOs, regulators and public bodies clarity and consistency.   From doctrine to delivery  As the dust settles on the annual Munich Security Conference, Europe faces a defining choice. It can carry on treating its digital backbone as regulatory plumbing and watch vulnerabilities compound. Or it can recognise this backbone for what it is — a core line of defence.  > The real test of seriousness is whether governments and operators can plan > together, train together and respond together when systems are stressed.  The real test of seriousness is whether governments and operators can plan together, train together and respond together when systems are stressed. And this depends on whether investment, procurement and certification systems finally move at the speed security demands.  The way forward lies neither in dependence nor in fantasies of self-sufficiency. It must be grounded in risk-based sovereignty, delivered through verifiable control, modernized infrastructure and deeper public–private cooperation, aligned with trustworthy allies.  Ultimately, Europe cannot defend what it cannot connect, and it cannot compete if it closes itself off. Europe will fail this critical strategic test if the regulatory agenda for connectivity — the Digital Networks Act, Cybersecurity Act and merger guidelines revisions — does little to strengthen the very networks its security depends on.  If Europe gets this right, it can build a digital backbone capable of deterring adversaries, supporting allies, protecting citizens and powering innovation for decades to come.  -------------------------------------------------------------------------------- Disclaimer POLITICAL ADVERTISEMENT * The sponsor is Vodafone Group plc * The ultimate controlling entity is Vodafone Group plc * The political advertisement is linked to EU-level security and digital policy with particular focus on the Digital Networks Act, Cybersecurity Act, merger guidelines and broader digital sovereignty strategy. More information here.
Data
Energy
Cooperation
Military
Security