Critical

🎯 Mercenary Spyware in Member States

The European Parliament’s PEGA inquiry documented abuses of Pegasus/Predator-class spyware across the EU, warning of fundamental-rights erosion and rule-of-law risks.

PEGA Committee Findings
EU Parliament Inquiry
Scope: systemic abuse patterns; export-control gaps; weak redress
Outcome: recommendations to Commission & Member States; limited binding follow-up to date
Predatorgate (Greece) & regional clusters
Greece / Intellexa / Predator
Context: infections targeting politicians & journalists; ongoing judicial inquiries and press investigations
Critical

πŸ“‘ Telecom Signalling Exploits (SS7/Diameter)

EU cyber authorities have flagged persistent signalling-layer risks across SS7/Diameter; mitigations vary by carrier, with roaming and interconnect as soft spots.

ENISA Guidance
EU Agency for Cybersecurity
Focus: regulatory guidance, national oversight prompts, vulnerability disclosure practices
Moderate

πŸ—‚οΈ Data Brokers & Cross-Border Demands

GDPR curbs data-broker excesses, but enforcement is uneven; new EDPB guidance clarifies how EU firms must handle third-country authority data requests.

EDPB β€” Article 48 Guidance
EU Data Protection Board
Key point: non-EU court orders don’t create legal basis for EU transfers; use MLAT or EU law pathways
Moderate

πŸ“Ί Platform Governance & EU Enforcement

The DSA applies across the EU (Feb 2024). VLOPs/VLOSEs must assess systemic risks and offer user choice (e.g., non-profiling feeds); enforcement is ramping via the Commission & national regulators.

Guardrails

βš–οΈ AI Act, eIDAS 2.0 & Institutional Oversight

The AI Act (2024/1689) phases in obligations by risk tier. eIDAS 2.0 (notably QWACs) remains debated for browser trust models. EDPS continues to litigate institutional data-processing powers (e.g., Europol scope).

πŸ•ΈοΈ Corruption Network Visualization (EU)

Relationships between spyware vendors, data brokers, telecoms, platforms, and EU/national authorities. Drag nodes to explore.

Legend: ● Authorities ● Vendors ● Brokers ● Platforms ● Telecom/Programs

πŸ”— Key Relationships (EU)

Spyware ecosystem (PEGA)

Core: Member-state services ↔ NSO/Intellexa-class vendors ↔ domestic political targets; export-control circumvention.

Telecom signalling

Core: SS7/Diameter interconnect ↔ roaming exposure; NRAs push mitigations; audits uneven.

Data-broker + platform loop

Flow: Apps/SDKs β†’ aggregators β†’ adtech & public buyers; GDPR limits + EDPB Article 48 guidance for third-country demands.

πŸ“… Signal-Power Evolution Timeline (EU)

2016–2019: Early EU warnings on SS7

ENISA and national regulators flag interconnect insecurities; guidance begins to emerge.

2021–2023: Spyware scandals crest

Poland/Hungary/Spain cases; Greece’s Predatorgate triggers PEGA inquiry & recommendations.

Feb 2024: DSA takes effect EU-wide

Systemic risk duties for VLOPs/VLOSEs; user choice & auditing obligations.

2024–2025: AI Act adopted; oversight tussles

Risk-tiered AI obligations phase-in; EDPS litigates scope vs. Europol; eIDAS 2.0 QWAC debate continues.

⚑ Immediate Stop-Gap Actions (EU-aligned)

Adopt now; designed to dovetail with GDPR/DSA/AI Act and ENISA guidance.

πŸ›‘οΈ Spyware Controls (PEGA-aware)
  1. Judicial authorization + necessity/proportionality for any invasive tool.
  2. Public DPIA and quarterly aggregated reports per Member State program.
  3. Vendor NDAs cannot override disclosure to courts/DPAs/EP oversight.
πŸ“‘ Signalling/Interconnect Hardening
  1. Carrier attestations on SS7/Diameter defences; roaming-edge audits.
  2. Annual third-party testing with public summaries; incident stats.
πŸ—‚οΈ Data-Broker Containment
  1. No acquisition of location/behavioral datasets without clear legal basis; DPIA + minimization.
  2. Article 48 compliance playbook: reject direct third-country orders; route via MLAT/EU law.
πŸ“Ί Platform Governance
  1. DSA-consistent risk logs; β€œno informal pressure” policy with audit trails.
  2. Political ad transparency + user choice for non-profiling feeds.
πŸ›οΈ Institutional Oversight
  1. Independent panels incl. civil society & technologists for high-risk tooling.
  2. Whistleblower-safe portals; contractor debarment for pattern violations.

πŸ“‹ Implementation Toolkit (Model Resolution / By-law)

Edit inline; then copy or download. Text aligns to EU law refs cited above.