Hack the EU: IT security cuts cause concern

Source: EUobserver (EUOBSERVER) i, published on Monday, May 20 2013, 9:03.
Auteur: Andrew Rettman

BRUSSELS - A plan to cut spending on IT security in the EU diplomatic corps is causing concern among officials who handle classified files.

According to the European External Action Service's (EEAS i) draft budget for 2014, seen by EUobserver i, spending on secure communications is to go down from €10.8 million this year to €8.3 million next year - a drop of 23 percent.

An additional one page memo, also seen by this website, gives more detail.

It says the EEAS will slash funds for the so-called Solan secure network from €1.7 million to zero.

It will also cut investment on secure IT in its intelligence-sharing office, Intcen, from €700,000 to zero.

Its budget for secure phones and other kit for EU diplomats overseas will fall from €647,000 to €487,000.

Among other measures, spending on Opswan - a network which connects the EEAS in Brussels with its satellite image centre in Torrejon, Spain - will go from €1.5 million to €774,000.

At the same time, it will spend €2.3 million more on private sector IT consultants.

EEAS spokesman Michael Mann said: "IT investments are multi-annual and vary from year to year. The proposed budget for 2014 reflects the very tight budget environment."

He indicated that Solan will be replaced by a new network.

"It is natural that, as a new organisation, the EEAS should review its needs in this area and consider different options. For the future, these could include … new replacement systems," he noted.

Some of the measures make sense.

Opswan is a back-up system which is rarely used.

Private sector firms give valuable advice on whether EU systems are keeping up to date with ever-changing threats.

But some of the decisions are causing worry.

EEAS staff use four ways to circulate classified documents.

They use the so called New Communications Network (NCN) to encrypt "restricted," "confidential" and "secret" files before sending them to and from their 140 foreign embassies as attachments in emails on the open Internet.

They use Acid - software developed by a French company - to encrypt "restricted" documents before emailing them to each other or to the EU Council, the member states' secretariat in Brussels.

They use Solan to circulate "confidential" and "secret" files in the EU capital.

Solan is an air-gapped network - a set of computers and cables which is physically cut off from the Internet.

If an EEAS official wants to switch a document from NCN to Solan, they download it onto a USB stick, then upload it onto the air-gapped network.

"Top secret" files - the highest classification - are circulated by hand only.

One EU contact said that instead of cutting back on IT security, the EEAS should be upgrading NCN.

The European Commission created it in 2006 when its foreign delegations' main task was to oversee aid projects.

But EEAS embassies have a more political role, making them into a target for hostile intelligence services.

"NCN encryption is not up to standard and has never been accredited by member states' national security authorities," the EU source noted.

"I am pretty sure that all the reports sent in from delegations in sensitive places, such as Mali or Lebanon, are being read by the Russians and by the Chinese," the contact added.

The decision to cut Solan might also cause problems.

If the EEAS creates a new network, it will have to be accredited by all 27 member states before they authorise its use in the Council.

The process can take years.

In the meantime, EEAS and Council staff would have to put "confidential" and "secret" files on USB sticks or on paper and carry them between various buildings in the EU quarter in Brussels.

According to the Belgian intelligence service, there is no shortage of spooks in the EU capital who might be keen to intercept them.

In terms of the general IT security environment, the EEAS has already been hacked at least once.

On 8 March 2011, commission and EEAS email passwords were compromised in what the commission described as a "serious" and "targeted" attack.

Staff were temporarily blocked from accessing work emails from home and obliged to change their passwords.

On 14 January this year, Russian IT security firm Kaspersky Lab unveiled details of a cyber-espionage operation which it called Red October.

Alex Gostev, a Kaspersky Lab expert, told EUobserver, that Red October targeted Acid and Chiasmus, another EU-accredited encryption software.

"Any encryption software is as secure as the passwords used to encrypt the documents or the private keys. If these are stolen, encryption is broken. This is exactly what Red October was targeting - documents with extensions from these programmes," he said.

Meanwhile, Cert EU, a new commission unit of about 12 people who monitor attacks on all EU institutions, is currently sending out some 50 alerts a month.

"The overall trend of the threat … seems to be increasing, both in frequency and in the level of sophistication," a commission spokesman, Antony Gravili, said.

For his part, Raj Samani, a specialist from US-based IT security firm McAfee, said iPhones - beloved by EEAS staff - are a risk because the manufacturer, Apple, has no control over potential malware in the applications which people download onto them.

He warned EU officials on using social media, such as Facebook or Twitter, because they expose personal data which can help hackers to find weak spots.

He also said air-gapped networks, such as Solan, are not foolproof.

He noted that Stuxnet - a malware discovered in 2010 which is designed to harm industrial control systems - got into one air-gapped facility when somebody plugged in a compromised USB stick.

"Even a network that has no connection to the world wide web is not safe anymore," he said.


Tip. Klik hier om u te abonneren op de RSS-feed van EUobserver