PROTECTING EUROPE - CHAILLOT PAPER / 151 - MepoForum.sk

 
CONTINUE READING
PROTECTING EUROPE - CHAILLOT PAPER / 151 - MepoForum.sk
PROTECTING
EUROPE
The EU’s response
to hybrid threats
By
Daniel Fiott and Roderick Parkes

                              CHAILLOT PAPER /
                              April 2019
                                                 151
European Union Institute for Security Studies (EUISS)
100, avenue de Suffren
75015 Paris

http://www.iss.europa.eu
Director: Gustav Lindstrom

© EU Institute for Security Studies, 2019.
Reproduction is authorised, provided the source is acknowledged, save where otherwise stated.

The views expressed in this publication are solely those of the authors and do not
necessarily reflect the views of the EUISS or of the European Union.

             print                      ISBN 978-92-9198-833-4         online                        ISBN 978-92-9198-832-7

                           CATALOGUE NUMBER QN-AA-19-002-EN-C                           CATALOGUE NUMBER QN-AA-19-002-EN-N

                                               ISSN 1017-7566                                               ISSN 1683-4917

                                           DOI 10.2815/679971                                           DOI 10.2815/712409

Published by the EU Institute for Security Studies and printed in Belgium by Bietlot.
Luxembourg: Publications Office of the European Union, 2019.
Cover image credit: Todd Diemer/unsplash
PROTECTING
EUROPE
The EU’s response
to hybrid threats
By
Daniel Fiott and Roderick Parkes

                             CHAILLOT PAPER /
                             April 2019
                                                151
The authors

Daniel Fiott is Security and Defence Editor at
the EUISS where he works on European defence,
CSDP, the EDTIB, defence industries, defence
innovation and hybrid threats. He holds a PhD
in Political Science from the Free University
of Brussels.

Roderick Parkes is a Senior Analyst at the EUISS
where he works on issues relating to interna-
tional home affairs cooperation – migration,
crime and terrorism. He holds a PhD from the
University of Bonn.
1

CONTENTS
Executive Summary                                 2    Conclusion      42

Introduction                                      4    Glossary        44
Beyond semantics                                  6
The purpose of this study                         8
                                                       Abbreviations   47

CHAPTER 1

Flows and borders                                11
The threat to the EU’s borders                    11
Policy response: addressing
four border weaknesses                           16
Lessons: the EU as its own worst enemy           21

CHAPTER 2

Nuts and bolts                                   23
Disentangling critical infrastructure networks   23
The EU and critical infrastructure protection:
the story so far                                 27
Ensuring that resilience becomes the norm        32

CHAPTER 3

Hearts and minds                                 34
Demystifying disinformation                      35
Deflecting and refuting disinformation the EU way 38
Towards a more media-literate and
resilient society?                               40
2                                                            Protecting Europe | The EU’s response to hybrid threats

EXECUTIVE SUMMARY
The EU takes hybrid threats seriously and has       of a new mindset among policymakers and cit-
designed an array of policies to counter them.      izens. A solid response is one that can draw on
Its main focus is the ongoing crises beyond its     intelligence, financial and human resources but
borders, throughout its eastern and southern        above all good political judgment.
neighbourhoods. In Ukraine and elsewhere, the
EU is trying to counter hostile Russian actions.    Measured against this yardstick, the EU’s re-
But its countermeasures are focused inwards         sponse has clearly come some way, not least
too as its own member states come under at-         when it comes to mobilising financial and hu-
tack. These measures are helping more gen-          man resources. However, some familiar stick-
erally to ‘future-proof’ the EU itself, to shore    ing points remain. Information-sharing and
up its own internal structures and networks         intelligence exchange between member states
in the face of a rapidly shifting international     and across EU institutions are still a work in
landscape. They are helping Europe respond to       progress. Risk assessments are often based on
powers such as China and the use of new tech-       the lowest common denominator (that is, a
nologies such as 5G.                                minimal level of information exchange). Proper
                                                    response networks are still hampered by a lack
These countermeasures now cover everything          of trust. And the EU has yet to properly tap the
from the European digital economy to its cy-        private sector – let alone to enhance public me-
ber, maritime, space and energy domains.            dia literacy. But perhaps the biggest problem is
But they play a particularly important role in      also the oldest: the EU institutions find it diffi-
three sectors, namely the security of EU bor-       cult to overcome compartmentalised silo men-
ders, its critical infrastructure and the infor-    talities when they devise their strategies and
mation environment. These three fields con-         responses to hybrid threats.
stitute quite literally the nuts and bolts of the
European Union. Protecting them means de-           This disjointedness is a serious weakness.
fending the very cornerstones of the EU – the       Adversaries deploy conventional and uncon-
three fields are vital to the continued integra-    ventional tactics as part of an overall strategy to
tion of the European economy and to the health      destabilise the EU. No single aspect of the threat
of the democratic institutions underpinning         facing Europe exists in isolation from others. A
it. Predictably, they are the subject of our in-    disturbance to the EU’s critical infrastructure,
depth case studies.                                 say, may well appear to be an isolated event.
                                                    The real challenge for the EU is to join the dots
The case-studies show that the EU must build        between seemingly staccato events and identi-
up its defences, in particular vis-à-vis un-        fy a combined hybrid campaign. And it is here,
conventional threats. The response to hybrid        in this murky field of sleuthing and attribution
threats will never yield to a specific timeframe,   that the EU will require the key mix - timely and
meaning that efforts to build resilience will be    credible intelligence coupled with good politi-
an ongoing feature of EU external and internal      cal judgment. It goes without saying, therefore,
action. The EU has to identify and remedy cur-      that it would be a mistake to read any of the
rent vulnerabilities. But it must be constantly     chapters in this Chaillot Paper in isolation from
on the watch for new vulnerabilities created        the others - or indeed in isolation from further
by actors eyeing a more extensive hybrid cam-       areas such as cyber defence.
paign. Moreover, apart from the usual slew of
policy mechanisms and strategy papers, a truly      The EU’s own sprawling and hybrid nature
effective EU response demands nothing short         makes it an indispensable actor for countering
Executive Summary                                   3

hybrid threats. NATO has grudgingly come to
respect the EU as an essential partner in this
field and, if the EU can only bring together its
capabilities, it could give heft to those current
buzz terms – transatlantic security and stra-
tegic autonomy. Yet, the Union’s hybrid char-
acter also leaves it uniquely vulnerable. Hybrid
threats demand a cautious balancing act be-
tween fundamental rights and security, an
open market and a secure economy. And they
demand speed and decisiveness. Timing and
early response are key, and it is incumbent on
the EU institutions and member states to move
rapidly. For the EU that means learning to put
its money where its mouth is, and calling out a
hybrid attack as a hybrid attack.
4                                                                                    Protecting Europe | The EU’s response to hybrid threats

INTRODUCTION
The notion of unconventional threats that fall                           It is true that NATO differs from other organi-
under the threshold of military force – a con-                           sations in its definition of ‘hybrid threats’. For
cept which last appeared during the Cold War                             example, the European Union understands hy-
– has lately made a comeback, albeit under the                           brid campaigns to be ‘multidimensional, com-
title ‘hybrid threats’. The use of the term ‘hy-                         bining coercive and subversive measures, using
brid threats’ has been accompanied by some                               both conventional and unconventional tools
doubts about whether it actually means any-                              and tactics (diplomatic, military, economic,
thing. There are two main reservations about                             and technological) to destabilise the adversary.
using the label, and it is worth getting these out                       They are designed to be difficult to detect or at-
of the way quickly.                                                      tribute, and can be used by both state and non-
                                                                         state actors’.4 NATO defines hybrid threats as
First, in trying to characterise the non-conven-                         ‘those posed by adversaries, with the ability
tional aspects of modern warfare it is argued                            to simultaneously employ conventional and
that the concept fails to provide a theory that is                       non-conventional means adaptively in pursuit
both comprehensive and operational, and those                            of their objectives’.5 And yet, the different se-
are precisely the qualities which strategists and                        mantic choices of both organisations cannot
policymakers demand from their theories.1 A                              disguise their basic commonalities. Both speak
whole host of other labels purport to describe                           of state and non-state actors, for instance,
hybrid-like challenges more accurately: ‘irreg-                          even if NATO classifies them robustly as ‘ad-
ular warfare’, ‘non-linear combat’, ‘compound                            versaries’. These differences of nuance come
warfare’, the ‘grey zone’. By contrast the con-                          down to understandable differences of method
cept of hybrid threats is politically subjective,                        and mandate.
and no single definition can ever be agreed
that describes the tactics of such different ac-                         In fact problems arise only when organisa-
tors as Russia and Daesh.2 The proliferation of                          tions try to make their definition definitive.
corrective labels has only added to confusion                            Inevitably each differs over issues of attribu-
and contestation over the very idea of hybrid                            tion, vulnerabilities, capabilities and inten-
threats. Some argue that organisations like                              tions.6 One definition may emphasise the com-
NATO should thus drop the term ‘hybrid’ al-                              bination of conventional and non-conventional
together and instead focus on how a range of                             means, whereas the other looks at the societal
threats connect together to produce a politi-                            dimension. Thus the Multinational Capability
cal effect.3                                                             Development Campaign (the ‘synchronised use
                                                                         of multiple instruments of power tailored to

1   Élie Tenenbaum, “Hybrid Warfare in the Strategic Spectrum: An Historical Assessment” in NATO’s Response to Hybrid Threats, ed.
    Guillaume Lasconjarias and Jeffrey A. Larsen (Rome: NATO Defence College, 2015), pp. 111-12.

2   Ofer Fridman, Russian “Hybrid Warfare”: Resurgence and Politicisation (London: Hurst Publishers, 2018).

3   Damien Van Puyvelde, “Hybrid War: Does it Even Exist?”, NATO Review, 2015, https://www.nato.int/DOCU/review/2015/Also-
    in-2015/hybrid-modern-future-warfare-russia-ukraine/EN/index.htm.

4   European Commission/High Representative of the Union for Foreign Affairs and Security Policy, “Joint Communication on
    Increasing Resilience and Bolstering Capabilities to Address Hybrid Threats”, JOIN(2018) 16 final, Brussels, June 13, 2018, p. 1.

5   Michael Miklaucic, “NATO Countering the Hybrid Threat”, NATO Allied Command Transformation, September 23, 2011, https://
    www.act.nato.int/nato-countering-the-hybrid-threat.

6   Frank G. Hoffman, “Hybrid Threats: Reconceptualising the Evolving Character of Modern Conflict”, Strategic Forum, no. 240
    (April 2009), p. 5.
Introduction                                                                                                                                5

specific vulnerabilities across the full spectrum                         the ‘Gerasimov Doctrine’, which has taken on
of societal functions to achieve synergistic ef-                          an almost mythological (if overblown)12 quality
fects’)7 rivals the European Centre of Excellence                         in recent years. It has been some time since a
for Countering Hybrid Threats (a ‘coordinated                             military doctrine and tactician have made news
and synchronised action that deliberately tar-                            in outlets such as the Financial Times.13
gets democratic states’ and institutions’ sys-
temic vulnerabilities through a wide range of                             Yet, today’s hybrid threats really are different
means […], activities [that] exploit the thresh-                          from those of the past, rendered far more dead-
olds of detection and attribution as well as the                          ly not least due to an array of evolving technol-
border between war and peace […] and the aim                              ogies. Whole new vistas have been unleashed by
is to influence different forms of decision mak-                          autonomous systems and artificial intelligence.
ing’).8 Despite their best efforts to be rigorous,                        Take unmanned aerial vehicles (UAVs) these
such definitions are most useful precisely be-                            are increasingly seen as cheap yet sophisticated
cause they allow us to pick and mix.                                      systems for reconnaissance, critical infrastruc-
                                                                          ture disruption; and, in the worse cases, they
Second, a fixation on hybrid threats and                                  can be weaponised too.14 Or take the cyber do-
non-conventional forms of warfare can be                                  main.15 The internet and online networks allow
an expedient way of ignoring convention-                                  state and non-state actors to unleash their ag-
al military threats. As one astute analyst ob-                            gression in new ways. They can be used to hack
serves, while the label ‘hybrid’ has been use-                            critical infrastructure and democratic pro-
ful in stoking policy interest in security issues                         cesses, launch persuasive disinformation and
it only illuminates ‘a specific part of what is a                         propaganda campaigns, steal information and
much larger evolving puzzle’.9 The fact that                              unload sensitive data into the public domain. In
Russia bristles with conventional land and nu-                            the worse cases, cyber allows an adversary to
clear forces should not be overlooked. Worse:                             take control of assets such as military systems
the term ‘hybrid ’is considered a conceptual                              (e.g. unmanned aerial vehicles) and command
honey trap which attracts attention by dress-                             structures.
ing up a very old phenomenon as something
fresh and new. Commentators are quick to                                  In sum, any historically-informed understand-
point out that there is nothing new about hy-                             ing of this particular field of warfare will begin
brid threats.10 Historians have shown that hy-                            with the observation that a ‘hybrid threat’ is
brid tactics were used by the likes of Saddam                             not just a lumpen mess of non-convention-
Hussein, Ho Chi Minh, Hizbullah and even the                              al threats. It is not enough to group together
Duke of Wellington.11 Nevertheless, Russia’s                              terrorism, civil disobedience, cyberattacks,
hybrid strategy has experienced new life under                            criminal activities, disinformation campaigns,

7    Patrick J. Cullen and Erik Reichborn-Kjennerud, “MCDC Countering Hybrid Warfare Project: Understanding Hybrid Warfare”,
     Multinational Capability Development Campaign/NATO Allied Command Transformation, January 2017, p. 3.

8    “Hybrid Threats”, The European Centre of Excellence for Countering Hybrid Threats, January 14, 2018, https://www.hybridcoe.fi/
     hybrid-threats/.

9    Andrew Monaghan, “The ‘War’ in Russia’s ‘Hybrid Warfare’”, Parameters, vol. 45, no. 4 (Winter 2015-2016), pp. 65-74.

10   Guillaume Lasconjarias and Jeffrey A. Larsen, “Introduction: A New Way of Warfare” in NATO’s Response to Hybrid Threats, ed.
     Guillaume Lasconjarias and Jeffrey A. Larsen (Rome: NATO Defence College, 2015), pp. 1-14.

11   Robert Wilkie, “Hybrid Warfare: Something Old, Not Something New”, Air and Space Power Journal, vol. 23, no. 4 (2009), p. 15.

12   For a corrective of the use of the term ‘Gerasimov Doctrine’ see Mark Galeotti, “The Mythical ‘Gerasimov Doctrine’ and the
     Language of Threat”, Critical Studies on Security, (early view) doi:10.1080/21624887.2018.1441623, https://www.tandfonline.com/
     doi/abs/10.1080/21624887.2018.1441623?journalCode=rcss20.

13   Henry Foy, “Valery Gerasimov, the General with a Doctrine for Russia”, Financial Times, September 15, 2017, https://www.ft.com/
     content/7e14a438-989b-11e7-a652-cde3f882dd7b.

14   “Drones and Countering them in a Hybrid Environment: A Case for EU-wide Regulation on Unmanned Aerial Systems”, Summary
     Report, European Centre of Excellence for Countering Hybrid Threats, 2018, https://www.hybridcoe.fi/.

15   Jonathan Zittrain, “‘Netwar’: The Unwelcome Militarisation of the Internet has Arrived”, Bulletin of the Atomic Scientists, vol. 73,
     no. 5 (2017), pp. 300-04.
6                                                                                    Protecting Europe | The EU’s response to hybrid threats

election meddling, proxy conflicts, fighters                             Europe’s democratic institutions and processes
without insignia, and call this a hybrid cam-                            (e.g. Cambridge Analytica).
paign. And yet there is no harm in taking a broad
lens to the question of how such challenges                              The re-emergence of hybrid tactics and the
converge and whether they are being used to                              growth of new technologies have at least had
escalate instability. As one expert points out,                          the effect of bringing the EU and NATO clos-
while there exists a temptation to ‘compart-                             er together – surely one of the main bene-
mentalise the various modes of war into con-                             fits. The EU and NATO have signed two Joint
venient categories, future adversaries will not                          Declarations (2016 and 2018) designed to en-
gaze through our analytical prism.’16 The task                           hance their cooperation on a range of securi-
is to understand what the particular use of hy-                          ty issues such as maritime security, cyber and
brid tactics in a given instance reveals about the                       hybrid threats. Until even quite recently, a ‘grey
way an adversary thinks and acts, even if it does                        area’ existed between the pair when it came to
not appear to have a clearly defined strategy.17                         hybrid threats, and neither organisation could
                                                                         credibly take the lead on the problem. NATO
                                                                         has a mandate for conventional deterrence; the
                                                                         EU deals with crisis management beyond its

BEYOND SEMANTICS
                                                                         borders and stewardship of the Single Market.
                                                                         Those Joint Declarations, therefore, are found-
                                                                         ed on the premise that by combining the efforts
The reality is that the EU has developed a work-                         and skills of each organisation, that grey area
ing definition of hybrid threats and it sees them                        can be rendered a little more black and white
as a critical issue to be addressed by policy-                           – perhaps even closing a gap that might oth-
makers working on the Common Foreign and                                 erwise be exploited by adversaries through the
Security Policy (CFSP), the Common Security                              use of hybrid tactics.
and Defence Policy (CSDP), the Area of Freedom,
Security and Justice (AFSJ) and the Security                             More specifically, the EU has developed a range
Union. The EU has been spurred into action by                            of policy initiatives that are designed to help the
the aggressive behaviour of Russia and its sei-                          Union and its member states respond to hybrid
zure of Crimea, in 2014. This led to fears that                          threats and improve its own resilience. In 2013
Russia may use the same tactics against other                            the EU released a cybersecurity strategy and in
former Soviet states and Warsaw Pact mem-                                2016 a Directive on the security of network and
bers. Additionally, the actions of Daesh in the                          information systems across the EU was adopt-
southern neighbourhood have led the EU to fo-                            ed – this Directive (EU 2016/1148 or the ‘NIS
cus on the ways that social media and networks                           Directive’) was to be fully transposed by all EU
can be used to radicalise Europeans and direct                           member states by 9 May 2018. In addition to
terrorist operations on the European mainland.                           the cyber-relevant conclusions of the European
Finally, cyberattacks emanating from places                              Agenda on Security in 2015, the EU present-
such as China or Iran and subversive operations                          ed a Joint Communication entitled ‘Resilience,
by commercial entities have not only disrupted                           Deterrence and Defence: Building Strong Cyber
critical infrastructure in Europe (e.g. Wannacry                         Security for the EU’18, which included initia-
and NotPetya), but have weakened trust in                                tives such as a strengthening of the EU Agency
                                                                         for Network and Information Security (ENISA)

16   Hoffmann, “Hybrid Threats: Reconceptualising the Evolving Character of Modern Conflict”, p. 8.

17   Lawrence Freedman, “Ukraine and the Art of Limited War”, Survival: Global Politics and Strategy, vol. 56, no. 6 (2014), pp. 7-38.

18   European Commission/High Representative of the Union for Foreign Affairs and Security Policy, “Joint Communication on
     Resilience, Deterrence and Defence: Building Strong Cybersecurity for the EU”, JOIN(2017) 450 final, Brussels, September 13, 2017,
     https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=JOIN:2017:450:FIN&rid=3.
Introduction                                                                                                                          7

and a blueprint for a coordinated response to                           plan to tackle chemical, biological, radiologi-
large-scale cybersecurity incidents and crises                          cal and nuclear risks,24 but a range of exercises
in the EU.19 The EU’s efforts are not confined to                       were organised too. On 28 September 2017, the
cybersecurity, however.                                                 EU launched a parallel and coordinated exercise
                                                                        (PACE17) on a fictitious scenario in order to test
In 2015 the EU established an ‘East StratCom                            the EU’s situational awareness, reaction time,
Task Force’ to combat disinformation directed                           communications channels – and to learn some
against Europe by the Russian government and                            lessons. From 5-23 November 2018, an ‘EU
media sources.20 Task forces on strategic com-                          Hybrid Exercise 2018’ was organised. It should
munication were later established for the South                         also be noted that in 2016 the European Defence
and the Western Balkans. On 6 April 2016, the                           Agency (EDA) had organised a table-top exer-
EU outlined a joint framework on countering                             cise on a fictitious hybrid crisis situation. All
hybrid threats, which, among other things,                              of the measures taken by the EU since 2015
established the ‘Hybrid Fusion Cell’ a hub for                          were summed up in a joint communication on
analysing potential hybrid threats in the EU’s                          increasing resilience and countering hybrid
intelligence and situation centre (INTCEN).21                           threats and further action points were tabled.25
An ‘EU Hybrid Playbook’ laid the first steps                            And, finally, last December the EU published its
towards a system of coordination at the EU                              approach to tackling disinformation.26
and national levels in case of a hybrid attack.22
In June 2016, the High Representative of the                            This is not an unalloyed story of progress.
Union for Foreign and Security Policy and Vice-                         Alongside the proliferation of EU measures
President of the European Commission (HR/                               (see Figure 1 on page 9) there is a proliferation
VP) released the EU Global Strategy. Its mantra                         of national approaches. There is a strong case
was the ‘protection of Europe’ - through crisis                         for greater coherence between national strat-
management, border protection and efforts to                            egies, not least in order to identify best prac-
counter extremism, cyberattacks and disinfor-                           tices – there is much to learn from certain EU
mation along the ‘nexus’ between internal and                           member states. Beyond the strategies, how far
external security.                                                      has the EU come in preventing and respond-
                                                                        ing to hybrid threats, as opposed to just writ-
It spurred the EU to take stock of its joint frame-                     ing about the issue? Given that hybrid threats
work for countering hybrid threats23 and en-                            represent a combination of different threats
hancing practical responses to hybrid threats.                          and tactics, what are the most effective meth-
In 2017 the EU not only published an action                             ods and strategies for tackling multiple threats

19   European Commission, “Commission Recommendation on Coordinated Response to Large-Scale Cybersecurity Incidents and
     Crises”, C(2017) 6100 final, Brussels, September 13, 2017, https://ec.europa.eu/transparency/regdoc/rep/3/2017/EN/C-2017-
     6100-F1-EN-MAIN-PART-1.PDF

20   High Representative of the Union for Foreign Affairs and Security Policy, “Action Plan on Strategic Communication”,
     Ares(2015)2608242, June 22, 2015, http://archive.eap-csf.eu/assets/files/Action%20PLan.pdf.

21   European Commission/High Representative of the Union for Foreign Affairs and Security Policy, “Joint Communication
     establishing a Joint Framework on Countering Hybrid Threats”, JOIN(2017) 18 final, Brussels, April 6, 2016.

22   European Commission/High Representative of the Union for Foreign Affairs and Security Policy, “Joint Staff Working Document:
     EU Operational Protocol for Countering Hybrid Threats – ‘EU Playbook’”, SWD(2016) 227 final, Brussels, July 5, 2017.

23   European Commission/High Representative of the Union for Foreign Affairs and Security Policy, “Joint Report on the
     Implementation of the Joint Framework on Countering Hybrid Threats – A European Union Response”, JOIN(2017) 30 final,
     Brussels, July 19, 2017.

24   European Commission, “Action Plan to Enhance Preparedness against Chemical, Biological, Radiological and Nuclear Security
     Risks”, COM(2017) 610 final, Brussels, October 18, 2017, https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-
     do/policies/european-agenda-security/20171018_action_plan_to_enhance_preparedness_against_chemical_biological_
     radiological_and_nuclear_security_risks_en.pdf.

25   European Commission/High Representative of the Union for Foreign Affairs and Security Policy, “Joint Communication on
     Increasing Resilience and Bolstering Capabilities to Address Hybrid Threats”, JOIN(2018) 16 final, Brussels, June 13, 2018.

26   European Commission/High Representative of the Union for Foreign Affairs and Security Policy, “Joint Communication on an
     Action Plan Against Disinformation”, JOIN(2018) 36 final, Brussels, December 5, 2018, https://eeas.europa.eu/sites/eeas/files/
     action_plan_against_disinformation.pdf.
8                                                                                   Protecting Europe | The EU’s response to hybrid threats

simultaneously? How can the EU help improve                             and simulation on transboundary crises and
coordination between member states on hybrid                            hybrid threats was organised in Brussels on 4
threats, especially in a rapidly changing and                           April 2019.28 This is not the place to rehearse
deteriorating security landscape? Are the EU                            vulnerabilities revealed in confidence.
and its member states on course to developing
a common approach to early warning and risk                             Third, this Chaillot Paper does not simply pro-
analysis? What are the EU’s institutional and                           vide a list of EU initiatives that have already
societal strengths in the face of hybrid threats                        been developed. Indeed, the aim of this study
and conventional security challenges? Is the                            is to provoke ideas for further action on hy-
Union linking early warning with early action?                          brid threats and to identify avenues for further
                                                                        coordination between EU bodies and member
                                                                        states. In essence, this study wants to provide
                                                                        the reader with practical and operational in-

THE PURPOSE OF
                                                                        sights on how best to counter hybrid threats.
                                                                        It shares best practices and uncovers possible

THIS STUDY
                                                                        ways of improving coordinated EU approaches
                                                                        to hybrid threats. But, just as this publication is
                                                                        not a vulnerability assessment, nor does it deal
A few notes on what this Chaillot Paper is and                          with the possible development of aggressive
what it is not. First, it is not interested in de-                      hybrid capabilities by the member states, let
bating conceptual issues. It does not engage in                         alone by the EU.
any further debate about the merits of the term
‘hybrid threats’. Quite simply: the term ‘hybrid                        We look at three indicative areas: these deal
threats’ is already being used and understood                           with the EU’s territorial, physical and in-
by EU officials and government representa-                              stitutional infrastructure. Borders are ren-
tives to capture a range of non-conventional                            dered vulnerable because of increased migra-
security challenges. Whether in healthcare and/                         tion to Europe and by the ‘weaponisation’ of
or transport, the ‘hybrid’ label is encouraging                         cross-border flows. Critical infrastructure is
staff in various EU bodies to give more consid-                         targeted as a means of upsetting the civilian
eration to the security aspects of their respec-                        population with energy shortages, digital and
tive portfolios than has perhaps been the case                          financial disruption, and delays to transport
in the past. An annex containing a glossary pro-                        and healthcare. Disinformation poisons dem-
vides further background information.27                                 ocratic processes and institutions, as well as
                                                                        trust in the media and government. Each chap-
Second, this Chaillot Paper will not delve into the                     ter provides an overview of the subject matter
vulnerabilities of EU member states. Again, this                        and outlines EU policy developments. What this
could be positively unhelpful. In conducting the                        paper does do is try to answer the big question:
analysis for this paper, we consulted a range of                        in what practical ways can the EU prevent and
primary materials. We conducted semi-struc-                             respond to hybrid threats?
tured interviews with EU officials and govern-
ment representatives. And we co-organised a
simulation and conference on 28 February – 1
March 2019 in Bucharest. Another workshop

27   The authors would like to thank Federica Fazio for helping compile the glossary and for assistance with data collection in chapter
     three.

28   The Institute would like to thank the Romanian Presidency of the Council of the EU and the General Secretariat of the Council
     of the EU for their support in organising high-level conferences on hybrid threats in 2019. See EU Institute for Security Studies
     (EUISS) , “Facing Hybrid Threats through Consolidated Resilience and Enhanced Strategic Communication”, Bucharest,
     February 28, 2019, https://www.iss.europa.eu/content/facing-hybrid-threats-through-consolidated-resilience-and-enhanced-
     strategic-communication; and EUISS, “From Sense-making to Decision-making: Sharing Experiences on the Management of
     Transboundary Crises in the EU”, Brussels, April 4, 2019, https://www.iss.europa.eu/content/sense-making-decision-making-
     sharing-experiences-management-transboundary-crises-eu.
Introduction                                                                                                                                                               9

EU CRISIS Figure
            RESPONSE     ARCHITECTURE
                    1 – The EU’s
An overview crisis response architecture
              An overview

                                                                                          TERRORISM
                                                                                        AND MIGRATION

                                        HYBRID
                                       THREATS                                    EUROSUR

                                                                                                                                                   HEOF
                                                                                                     FRONTEX                                                       EWRS
                                      STRATCOM
                                                                                  Europol
                                                                                                                 STAR            HEALTH
                                                                                                                                 AND DISEASE           MEDISYS              HSC
                             HFC                  RAS-DIS
                                                                                             EASO
                                                                                                                                                                   HEDIS
         EU RESPONSE                                                                                                                               ECDC
                                                                 EXTERNAL                                                                                                             AVIATION
                                             INTCEN               CRISES                                           EC3
                                                                                                                                  CYBER
      ARGUS           IPCR
                                                                                                                                                                                       EASA
                                                                      CPCC             MPCC                                                ENISA

               CRS
                                                                                                                                                                                      SPACE
                                                           CIVCOM            SITROOM                                     NIS Cooperation               EU CSIRT
                                       EUMS INT                                                 CP                            Group                    Network
          INFRASTRUCTURE
                                                                                                                                                                             SATCEN              GSA
                                                    EUMC             CSDP-CR           PSC                                                 CERT- EU

         CIWIN             CIP PoCs                                                                       ENERGY                                                  CBRN

                                                                                             EUOAG                                                    RAS-CHEM           RAS-BICHAT
                                                                                                             OCG             ACER
                                                            rescEU
              CIVIL PROTECTION               ERCC
                 AND DISASTER
                                                                                                ENTSO-E               GCG                                        ECURIE

                                EMSA                  EU CPM

                                                                                                             ECG
                                                                                             ENTSOG
                                             EERC                    EMSA

                                                                                SSN
                                                                                               MARITIME

                     KEY                  shared
                                      responsibilities

                European        EU Member                       European   EU                         abbreviations
               Commission           States                      External Agencies                     overleaf
                                                                Action
                                                     Council    Service
                                                    of the EU
10                                                        Protecting Europe | The EU’s response to hybrid threats

ACER                    ECDC                   EUMS INT                         MEDISYS
 Agency for              European Centre        EU Military Staff                 EU Information
 Cooperation of          for EU Disease         Intelligence                      Scanning Tool
 Energy Regulators       Prevention and
                         Control
                                               EUOAG                            MPCC
ARGUS                                           EU Offshore Oil and               Military Planning
 European               ECG                     Gas Authorities                   and Conduct
 Commission                                     Group                             Capability
                         Electricity
 Coordination
                         Coordination Group
 System
                                               Europol                          NIS Cooperation
                        ECURIE                  EU Agency for                   Group
CERT- EU                                        Law Enforcement
                         European                                                 Network and
 EU Computer                                    Cooperation
                         Community Urgent                                         Information
 Emergency               Radiological                                             Systems
 Response Team           Information           EUROSUR
                         Exchange               European Border                 OCG
CIP PoCs                                        Surveillance System
                                                                                  Oil Coordination
 Critical               EERC                                                      Group
 Infrastructure
 Protection Points of
                         European              EWRS
 Contact
                         Emergency
                         Response Capacity
                                                Early Warning                   PSC
                                                Response System
                                                                                  Political and
                                                for Communicable
CIVCOM                  EMSA                    Diseases and
                                                                                  Security Committee

 Committee on            European Maritime      Outbreak of
 Civilian Aspects of     Safety Agency          Unknown Aetiology               RAS-BICHAT
 Crisis Management                                                                Rapid Alert System -
                                               FRONTEX
                        ENISA                                                     CBRN Agents
CIWIN                                           European Board and
                         EU Cybersecurity
 Critical                Agency
                                                Coast Guard Agency
                                                                                RAS-CHEM
 Infrastructure
                                                                                  Rapid Alert System -
 Warning                                       GCG
 Information            ENTSO-E                                                   Chemical
                                                Gas Coordination
 Network                 European Network
                         of Transmission
                                                Group
                                                                                RAS-DIS
CP                       System Operators                                         Rapid Alert System-
                         for Electricity       GSA                                Disinformation
 Crisis Platform
                                                European GNSS
CPCC                    ENTSOG                  Agency
                                                                                rescEU
 Civilian planning       European Network                                         Reserve Operational
 and Conduct             of Transmission       HEDIS                              Capacities at the
 Capability              System Operators       Health Emergency                  Union level
                         for Gas                and Disease
CRS                                             Information System              SATCEN
 Crisis Response        ERCC                   HEOF                               EU Satellite Centre
 System
                         Emergency
                         Response               Health Emergency                SITROOM
CSDP-CR                  Coordination Centre    Operations Facility
                                                                                  Situation Room
 CSDP and Crisis
 Response               EU CPM                 HFC                              SSN
                         Civil Protection       Hybrid Fusion Cell                SafeSeaNet
EASA                     Mechanism
                                               HSC                              STAR
 European Aviation
 Safety Agency          EU CSIRT Network        Health Security                   Strategic Analysis
                                                Committee                         and Response Centre
                         EU Computer
EASO                     Security Incident
                         Response Teams        INTCEN                           STRATCOM
 European Asylum
                                                EU Intelligence and               Strategic
 Support Agency
                        EUMC                    Situation Centre                  Communication
                         European Union                                           Taskforces
EC3                      Military Committee
                                               IPCR
 European
 Cybercrime Centre                              Integrated Political
                                                Crisis Response
CHAPTER 1 | Flows and borders                                                                                                        11

    CHAPTER 1

FLOWS AND BORDERS
Preparing for a hybrid attack at the border

‘Little green men’. When people think of hy-                           flows of migrants and criminals, of goods and
brid border threats, they likely envisage the                          waste, weapons and information, and it re-
Russian soldiers who seeped across the bor-                            quires border guards and law-enforcement
der into Ukraine in unmarked green uniforms                            officials to close down the avenues for hostile
in 2014. Border incursions and land grabs by                           powers to exploit the vulnerabilities of the EU’s
unmarked soldiers have a long history – the                            globalised economy.
method was used first against Colombia in the
1930s (by the Peruvians) and then in Kashmir in
1999 (Pakistanis).1 But this, the ‘classic’ hybrid

                                                                       THE THREAT TO THE
border attack, is not uppermost in the mind of
EU officials when they think of hybrid border

                                                                       EU’S BORDERS
threats. Russia or Turkey are unlikely to launch
such an attack on the territorial integrity of
an EU member state. And if they did – around
the Suwalki Gap, say, or on one of the Aegean                          The Schengen Area covers 4 million km² of
islands – the response lies largely outside EU                         Europe and is fringed by the three usual border
competencies. Territorial defence for almost all                       types – land, sea and air. Each of the three bor-
EU member states is a task for NATO.2                                  der types is clustered in a different part of the
                                                                       passport-free travel area. As a result, the EU is
The EU’s competencies lie instead in manag-                            facing three relatively distinct clusters of hybrid
ing the borders of the Schengen Area, the EU’s                         threats, each associated with one of the three
passport-free travel zone. The Union’s powers                          border types, the specific flows encountered at
in this field are laid out in Title V of the Treaty                    that type of border, and a geographically-prox-
on the Functioning of the EU (TFEU). Article                           imate sponsor state or terrorist group.
67(2) TFEU gives the EU the power to frame a
common European borders policy, and Article                            Along the southern flank of the EU, the mari-
67(3) charges it with providing security with-                         time border stretches from the Aegean to the
in these borders. This traditionally means pre-                        Western Mediterranean. The most obvious
venting cross-border crime and irregular mi-                           threat here is posed by Daesh and other terror-
gration. The hybrid threat derives from their                          ist groups with roots in the Middle East and
potential ‘weaponisation’ by hostile powers.                           North Africa region. These groups have dis-
The response requires the EU to monitor the                            placed people across the Arab World, and then

1   Dan Altman, “By Fait Accompli, Not Coercion: How States Wrest Territory from Their Adversaries”, International Studies Quarterly,
    vol. 61, no. 4 (2017), pp. 881-91.

2   And the treatment of regions inside the EU with secessionist ambitions and of ethnic minorities falls to the Council of Europe
    (COE) and the Organisation for Security and Cooperation in Europe (OSCE).
12                                                                               Protecting Europe | The EU’s response to hybrid threats

exploited the migration flows themselves,            Lastly, in the EU’s north-west lie the heavi-
sometimes taxing migrants for financial gain,        ly globalised border hubs. Western Europe is
sometimes smuggling family                                           home to major airports Charles

                                               T
members to safety to increase
                                              he cyberattack de          Gaulle (Paris), Frankfurt and
their hold on local territory.                                       Schiphol (Amsterdam), as well
They have politicised the flow of             which hit              as cargo ports – Rotterdam,
people into Europe, hoping to Maersk in 2017                         Antwerp, Hamburg. A small
trigger anti-Muslim feeling and        cost the Danish               disruption in any of these has
to fuel left- and right-wing ter-                                    massive repercussions. A drone
                                       shipping giant
rorism. As for transit countries                                     incident like the one at Gatwick
such as Turkey, they have been a little over                         airport in 2018 cost a single
accused of accommodating ter- €250 million.                          airline €17 million in passen-
rorist groups. Turkey has also                                       ger welfare costs and lost reve-
shown an interest in using mi-                                       nue. The cyberattack which hit
gration flows not just for political leverage vis-   Maersk in 2017 cost the Danish shipping giant a
à-vis the EU, but to increase its territorial hold-  little over €250 million, not including the ram-
ings in Kurdish areas. It has seemingly exploited    ifications for other firms in its global supply
the tensions in the Aegean with Greece, while        chain.3 Maersk was hit by malware hidden in
also pushing Kurdish refugees into the EU and        an electronic tax return in Ukraine, a sign of the
offering to secure ‘safe zones’ to its south.        vulnerability of networked systems. Threats at
                                                     these borders come as much from inside the EU
To the east, the EU shares a long land border with   as outside, and may be physical or virtual. Air
three members of the ‘Eastern Partnership’ -         and sea ports house expensive infrastructure
Ukraine, Belarus and Moldova – as well as with       such as liquefied natural gas (LNG) refineries,
Russia. The vulnerabilities along this border are    for instance, leaving them vulnerable to so-
largely inherited from the Soviet domination of      called insider threats by employees.
the area. Poland and its neighbours were for-
merly on the frontline to Western Europe, and
their most advanced border infrastructure was
to the West. By contrast their eastern borders
                                                                      The EU’s threat assessors:
were built for transit, and communities there                         Frontex and co.
still tend to straddle both sides of the border.
The EU is committed to ensuring no new iron          Frontex leads on border matters, and in 2016
curtain descends on the East. But this com-          it gained new powers to carry out assessments
mitment to a light-touch border regime may           of the EU’s border vulnerabilities. Each year,
invite exploitation by Moscow, which has not         it sends out questionnaires to national border
been shy to use criminal networks for geopo-         authorities helping them work through their
litical purposes. Criminal motorcycle gangs and      shortfalls, before simulating crisis scenarios in
smugglers are known to be closely linked to the      a select few member states. The trouble is that
government. The danger is heightened in spots        national authorities are reluctant to share in-
where the EU shares a border with Russia itself      formation about their vulnerabilities with the
and where the demarcation is not always ac-          EU and its agencies. Member states fear both
cepted. Member state border disputes are a field     leaks and censure. Governments have there-
where the EU specifically does not have compe-       fore insisted that the Frontex vulnerability as-
tence (Article 77(4) TFEU).                          sessments should remain narrow in scope and
                                                     that the results should not be shared widely
                                                     – even with other member states. This makes

3    Richard Milne, “Moller-Maersk Puts Cost of Cyber Attack at up to $300m”, Financial Times, August 16, 2017, https://www.ft.com/
     content/a44ede7c-825f-11e7-a4ce-15b2513cb3ff.
CHAPTER 1 | Flows and borders                                                                                                      13

it extremely difficult for Frontex to produce a                       the border into Bulgaria. As for Finland, in
comprehensive picture of Schengen’s vulner-                           2016 it experienced a sudden influx of Afghan,
abilities. The borders agency has focused its                         Bangladeshi and Indian migrants from Russia,
efforts instead on creating a database which al-                      who were presumably being helped across the
lows member states to see whether they meet                           border by Russian security services.
common norms when it comes to staffing levels
and capabilities.                                                     Most of these states have a strong history of
                                                                      border guarding. Their models may be civil-
The Commission is now incentivising member                            ian, but they often bear the hallmarks of the
states to be more forthcoming about their vul-                        heavily-militarised East-West Cold War divi-
nerabilities. It has announced that it will base                      sion. In some cases, the border services would
future procurement decisions on the results of                        even revert from the ministry of the interior to
the Frontex vulnerability assessments.4 But if                        the defence ministry in the event of an attack.
member states are indeed slowly opening up,                           Austria has a history of neutrality of course
it is probably for a different reason. They hope                      - but precisely because of this history, it has
to influence Frontex and the Commission. The                          often deployed its troops in domestic tasks
Commission has begun a three-step process                             such as border support. Likewise Finland was
to create a European border strategy. In March                        able to maintain military patrols at its eastern
2018, it published pointers on ‘Integrated                            border to the Soviet Union by mirroring them
Border Management’. Frontex has just drafted                          at its Western border to Sweden and Norway.
a capability-development strategy to match.                           Some of these five states are either newcom-
And each member state is drawing up a relevant                        ers to Schengen or, in the case of Bulgaria and
national strategy. Governments, particularly in                       Romania, still waiting to enter. They all feel
the east and south, see in this a means to bring                      that they have a new perspective to bring to
hybrid vulnerabilities onto the EU agenda.                            Schengen’s original north-western core.
Schengen, it should be remembered, began life
as an initiative of five north-western member
states, and its strategic outlook is still largely
attuned to Luxembourg’s priorities circa 1995.
                                                                      Why are the EU’s
                                                                      borders a target?
A whole string of EU member states is eager
for Frontex to step up its response to hybrid                         In opinion polls, Europeans still rank the
threats. And it just so happens that they have                        Schengen free movement regime as one of their
been hosting the EU presidency between them                           favourite aspects of EU integration. Abroad,
since 2017. Estonia, Bulgaria, Austria, Romania                       too, the EU’s most popular policies involve cre-
and Finland have all experienced acute border                         ative approaches to border liberalisation – visa
vulnerabilities. Tallinn is currently construct-                      freedom, ‘mobility partnerships’, enlargement.
ing a fence designed to reinforce its eastern                         The fact that the EU’s border regime enjoys
border after an Estonian official was abducted                        high international standing makes it a target
by Russians there in 2014. Bulgaria suspects                          for attack by rival powers. Liberal border re-
Russia of supporting anti-migrant vigilan-                            gimes like the EU’s can be readily portrayed as
tes with equipment and anti-Muslim rhetoric.                          a threat to domestic and international securi-
Sofia also had to watch as Turkey withdrew                            ty, and Schengen is a particularly experimen-
from a repatriation agreement in 2015 only                            tal version of border liberalisation. This allows
to push large numbers of Iraqi Kurds across                           revanchist states like Russia or Turkey to play

4   This creates a financial inducement for member states to be properly open about their border shortfalls: if member states show
    Frontex that they lack a certain border capability, then the EU will finance its purchase. Under the new Multi-annual Financial
    Framework, the EU would pour considerable new resources into border management. The Commission has proposed to dedicate
    €21 billion to border management, including a new Integrated Border Management Fund (IBMF) worth more than €9 billion. But
    there is a risk that these inducements might backfire - that member states exaggerate their shortfalls in order to get access to
    European funds.
14                                                              Protecting Europe | The EU’s response to hybrid threats

       Figure 2 – Hybrid threat-related initiatives

                                                                     11 JANUARY 2013
                                                                     EUROPOL’s European
                                                                     Cybercrime Centre (EC3)
                                                                     established

                                                                     7 FEBRUARY 2013
                                                                     Cybersecurity strategy of
                                                                     the EU: an open, safe and
                                                                     secure cyberspace

                                                                     JUNE 2013
                                                                     Integrated Political Crisis
13 MARCH 2004                                                        Response arrangements
EU Agency for Network                                                established
and Information Security
established
                                                                                                  19-20 MARCH 2015
                                                                                                  EEAS East StratCom
                                              30 MARCH 2009                                       Taskforce established
                                              Communication on
                       11 JULY 2007           critical information                                28 APRIL 2015
                       Green Paper on         infrastructure                                      The European Agenda
                       bio-preparedness       protection                                          on Security
            2006
2004

                      2007

                                             2009
                                 2008

                                                                     2013

                                                                                                 2015
                                                          2012

                                                                                  2014

            12 DECEMBER 2006                               11 SEPTEMBER 2012
            Communication                                  Computer
            on the European                                Emergency
            Programme for                                  Response Team
            Critical                                       (CERT-EU)
            Infrastructure                                 established
            Protection                                                             5 MAY 2014
                                                                                   Communication on a new
                                                                                   EU approach to the
                                  8 DECEMBER 2008                                  detection and mitigation
                                  Council Directive on the                         of CBRN-E risks
                                  identification and
                                  designation of European                          28 MAY 2014
                                  critical infrastructures and                     European Energy Security
                                  the assessment of the need                       Strategy
                                  to improve their
                                  protection
                                                                                   24 JUNE 2014
                                                                                   EU Maritime Security
                                                                                   Strategy

                                                                                   16 DECEMBER 2014
                                                                                   EU Maritime Security
                                                                                   Strategy Action Plan
CHAPTER 1 | Flows and borders                                                                                15

                                       11 APRIL 2017                30-31 JANUARY 2018
                                       European Centre of           European Commission
6 APRIL 2016                           Excellence for Countering    (DG SANTE) table top
Communication for a joint              Hybrid Threats established   exercise (Exercise
framework on countering                                             Chimera) on hybrid
hybrid threats: an EU                  7 JUNE 2017                  threats
response
                                       Communication on a
                                       strategic approach to        6 FEBRUARY 2018
APRIL 2016                             resilience in the EU’s       Cyber platform for
EEAS Hybrid Fusion Cell                external action              education, training,
established                                                         evaluation and exercise in
                                       19 JUNE 2017                 the ESDC established
27 APRIL 2016                          Council conclusions on a
Regulation on the General              framework for a joint EU     22 MARCH 2018
Data Protection                        diplomatic response to       European Council
Regulation                             malicious cyber activities   conclusions on the
                                       (‘Cyber Diplomacy            Salisbury attack
25 JUNE 2016                           Toolbox’)
A Global Strategy for the                                           26 APRIL 2018
EU’s Foreign and Security              7 SEPTEMBER 2017             Communication on
Policy                                 EU CYBRID 2017 cyber         tackling online              19 FEBRUARY 2019
                                       defence exercise             disinformation: a            Council conclusions on
6 JULY 2016                                                         European approach            securing free and fair
                                       13 SEPTEMBER 2017                                         European elections
Directive concerning
measures for a high                    Proposal for a Regulation    13 JUNE 2018
common level of security               to establish a framework     Report on the                MARCH 2019
of network and                         for the screening of         implementation of the        Rapid Alert System for
information systems                    foreign direct investments   joint framework on           disinformation
across the Union                       into the EU                  countering hybrid threats    established
2016

                                       2017

                                                                    2018

                                                                                                 2019

7 JULY 2016                            13 SEPTEMBER 2017            26 JUNE 2018
EU operational protocol                Joint communication on       Communication on
for countering hybrid                  resilience, deterrence and   increasing resilience and
threats (‘EU Playbook’)                defence: building strong     bolstering capabilities to
                                       cybersecurity for the EU     address hybrid threats
8 JULY 2016
Joint declaration on                   28 SEPTEMBER –               10 JULY 2018
EU-NATO cooperation                    4 OCTOBER 2017               Joint declaration on
                                       Parallel and Coordinated     EU-NATO cooperation
14 SEPTEMBER 2016                      Exercise (PACE17) on
Regulation on the
                                       cyber and hybrid threats     5-23 NOVEMBER 2018
European Border and                                                 EU Hybrid Exercise 2018
Coast Guard                            18 OCTOBER 2017
                                       Action plan to enhance       5 DECEMBER 2018
26 OCTOBER 2016                        preparedness against
                                                                    Action plan against
                                       CBRN security risks
Space Strategy for Europe                                           disinformation

14 NOVEMBER 2016                       NOVEMBER 2017                10 DECEMBER 2018
                                       EEAS StratCom South
Implementation Plan on                                              EU Agency for
                                       established
Security and Defence                                                Cybersecurity established

6 DECEMBER 2016                        NOVEMBER 2017
                                       EEAS StratCom Western
42 common proposals for
                                       Balkans Taskforce
EU-NATO cooperation
                                       established
endorsed by the Council of
the EU
                                       11 DECEMBER 2017
                                       Council decision
                                       establishing Permanent
                                       Structured Cooperation
16                                                                                   Protecting Europe | The EU’s response to hybrid threats

a double game. They can politicise Schengen’s                            the streets in protest. Frontex faces a constant
border-bending attributes to portray the EU as                           battle over its image, and the European External
a threat to international stability but also as a                        Action Service (EEAS) now deals with borders
precedent to challenge their own, post-im-                               and migration in its strategic communications.
perial borders. Likewise Daesh may politicise
the EU’s experiments with territoriality in a                            It must be remembered also that Schengen it-
bid to gain legitimacy for its own state-like                            self is part of a critical infrastructure system
attributes.5                                                             which criss-crosses the whole territory of the
                                                                         EU. Schengen operates a ‘networked border’
All this makes the EU’s border system a tar-                             system. Schengen members are able to loosen
get in its own right. Still, the present chapter                         their border controls because someone else –
should not be read in isolation from the other                           another member state, a third country, an air-
two case-studies in this Chaillot Paper. A hybrid                        line, a bank – has carried out a document check
attack at the Schengen border would almost                               in advance of the traveller’s arrival. Documents
certainly link to the other two phenomena dealt                          are checked against a whole panoply of identi-
with in this paper – to vulnerabilities in the                           ty databases. The EU is currently centralising
EU’s critical infrastructure (‘nuts and bolts’)                          and interlinking these databases, leaving the
and its political infrastructure (‘hearts and                            system prey to a hack attack or disinformation
minds’). Borders are by nature peripheral. But                           operation. Physical attack is not inconceivable,
one typical characteristic of hybrid warfare is                          either. Very few sites in Europe have the right
that its ‘centre of gravity’ is the enemy’s civil-                       physical attributes to house large databases – a
ian population. And so a hybrid action confined                          secluded environment, often near to a lake for
to the border – say an attack on infrastructure                          cooling purposes. The EU’s sites are clustered
there - is unlikely to have the desired impact                           in Strasbourg, backed up in Austria, and hun-
on the popular imagination. To be effective, a                           dreds of miles from the EU agencies which ac-
border attack would likely need to link up to a                          tually manage them.
political disinformation campaign or an attack
on critical infrastructure. It must play on soci-
eties’ fears.

This has already come to pass. The terrorist                             POLICY RESPONSE:
                                                                         ADDRESSING
attacks in Paris in November 2015 seemed de-
signed to undermine popular confidence in EU

                                                                         FOUR BORDER
border control. The perpetrators went out of
their way to register at refugee centres on their

                                                                         WEAKNESSES
way across Europe: they wanted EU citizens to
believe the migration flows had been infiltrat-
ed by foreign terrorists. In fact the perpetrators
were EU citizens returning from the fighting                             Policymakers have identified four different sets
in Syria. Two months later it was Russia play-                           of problems with the EU’s border resilience:
ing the game. Russian television reported that                           in the way it manages its borders, the EU has
a Russian-German girl, ‘Lisa’, had been beaten                           shown itself to be too narrow, too fragmented,
and raped in Berlin by recently-arrived immi-                            too blurred and too top-down. These vulnera-
grants of Middle-Eastern origin. The story was                           bilities are being plugged.
false, but it did not prevent the Russian foreign
minister from accusing German authorities of
a cover-up or Russian-Germans from taking to

5    Deon Geldenhuys, “The Islamic State (IS): An Exceptional Contested State”, Austral: Brazilian Journal of Strategy and International
     Relations, vol. 6, no. 12 (2017), pp. 9-35.
CHAPTER 1 | Flows and borders                                                                                                17

Narrow: expanding                                                      and Situation Centre (INTCEN) which analyses
                                                                       threats beyond the EU’s border which may im-
oversight of EU borders                                                pinge on the EU. The Commission’s Directorate
                                                                       General for Human Resources and Security (DG
The EU’s first vulnerability derives from the                          HR) is often overlooked in favour of DG HOME,
fact that the Schengen border is extremely long                        the Directorate General for Home Affairs. But
and spans the external sea and land borders of                         DG HR specifically assesses the risk posed
26 European nations. It winds its way round                            to EU staff and buildings, and this is impor-
the Portuguese Azores and Spanish Canaries,                            tant because it takes into account the fact that
taking in the jagged Greek islands and skirting                        the EU itself can be a target of smugglers and
the Russian exclave of Kaliningrad. It inherits                        criminals. For crisis situations, there is also
many of its member states’ territorial anoma-                          the Integrated Political Crisis Response (IPCR)
lies. And, thanks to the way Schengen was initi-                       the EU’s response coordination mechanism.
ated by a sub-set of EU member states, it some-                        The member states chose to trigger the IPCR in
times winds its way through the territory of the                       2015, and the IPCR began producing weekly sit-
EU itself. The logical step for the EU has been to                     uational reports on migration flows jointly with
increase surveillance across the entirety of the                       the Strategic Analysis and Response (STAR) ca-
Schengen border and strengthen common op-                              pability in DG HOME.
erational procedures for all EU members.
                                                                       All of these various systems have had teething
Some years ago, the EU put in place a com-                             problems. These reveal some fairly basic defi-
prehensive border surveillance system run                              cits in the capacity of EU institutions and mem-
by Frontex’s Situational Awareness and                                 ber states even to agree on what they are look-
Monitoring Division. The Eurosur Fusion                                ing at. Take those weekly situational reports.
Service (EFS) today uses this surveillance infor-                      They were plagued by different national inter-
mation as the basis for more than a dozen ana-                         pretations of statistical definitions. There were
lytical products (including vessel-tracking and                        no clear categories to differentiate between
maritime simulations). EFS is capable of iden-                         irregular migrants who had been picked up on
tifying a suspicious vessel in the Mediterranean                       islands and those on the mainland of a mem-
by the fact, say, that it has switched off its                         ber state – something important in Greece. Nor
ship-to-shore communications. To chart the                             could authorities agree what day events had
vessel’s likely course towards Europe, EFS will                        occurred. Most national border authorities log-
use weather simulations and data from previ-                           ically defined a calendar ‘day’ from 12am, but
ous suspicious crossings. Frontex’s European                           some started the clock when their first shift
Patrol Network and maritime Joint Operations                           began – 5am, say. It also turned out that some
will supplement this picture by flagging up                            small Schengen territories – small islands –
yachts sitting unusually heavily in the water                          had no capacity to input data into Schengen
and other suspicious sightings. EFS also makes                         systems or indeed to properly apply its rules.
use of the EU’s military capabilities, including                       And there was even a certain degree of confu-
the Madrid-based Satellite Centre to which the                         sion about which states are even included in the
borders agency has seconded staff.                                     Schengen Area for statistical purposes.6

The EU complements Frontex’s surveillance                              With those problems fixed, the EU is under
capabilities with other European agencies and                          pressure to expand its borders code so as to en-
institutions. There is the Migrant Smuggling                           sure that member states not only watch their
Centre, an intelligence-led hub housed in                              borders, but also know how to respond to the
Europol. And there is the EEAS’s Intelligence                          problems they flag up. The Schengen Borders

6   Romania and Bulgaria are not members of Schengen, but will likely be included in the area for the purposes of the Visa
    Information System, leading to statistical complications.
You can also read