Executive Summary
The strategic convergence between Russia, Iran, and China poses a growing systemic threat to the European Union. Despite differing regional agendas, these three powers are increasingly aligned in key areas such as cybersecurity, military technology transfers, intelligence cooperation, and disinformation campaigns. Their coordinated efforts undermine the EU’s critical infrastructure, weaken its strategic autonomy, and erode trust in democratic institutions by targeting sectors such as energy, finance, healthcare, and electoral integrity. Although the EU has implemented sanctions and reinforced its cybersecurity framework, it continues to address these actors largely in isolation, failing to recognize the cumulative security impact of their trilateral cooperation. Particular vulnerabilities include the transfer of advanced knowledge and dual-use technologies via academic and industrial partnerships with China, the use of hybrid warfare tactics by Iran—including cyberattacks and propaganda—and Russia’s ongoing infiltration of European digital networks and information ecosystems. To address this, the EU must adopt a coherent, forward-looking strategythat moves beyond fragmented responses. This entails the establishment of a centralized threat assessment hub coordinating intelligence from Member States, the restriction of academic and technological partnerships with high-risk third countries, the reinforcement of cyber resilience through joint infrastructure protection drills with NATO, and the creation of a targeted investment mechanism to reduce dependency on foreign critical technologies. These concrete instruments, when integrated, can strengthen Europe’s defense capabilities, reduce strategic dependencies, and safeguard its democratic and technological sovereignty.
Policy Recommendations
- The EU should adopt a coherent strategy to counter foreign interference, especiallyconsidering threats originating from China, Russia and Iran.
- The EU should implement the European Parliament’s recommendations on protecting democratic processes from disinformation, fake news and external influence.
- It is imperative to strengthen the EU’s cyber defense systems, boost resources to counter cyberespionage by China, Russia and Iran and deepen its cooperation with NATO on critical infrastructure protection.
- The balance between cooperation and protection must be upheld, especially in light of the academic and cultural cooperation with countries such as China.
Introduction
The growing cooperation between China, Russia, and Iran in the fields of cybersecurity and intelligence represents a systemic threat to the stability and security of the European Union. Although these three states differ in their geopolitical priorities, they converge around a shared strategic objective: to weaken the European Union by destabilizing it across multiple domains, ranging from military pressure to technological interference. This trilateral alignment is underpinned by several key mechanisms, including the exchange of intelligence, the transfer of advanced technologies, coordinated cyberattacks, and mutual political and technological support. China, in particular, provides Russia and Iran with dual-use technologies—such as semiconductors, surveillance systems, and software employed in intelligence operations—thereby acting as a technological enabler for their subversive agendas. Joint efforts extend to the realm of information warfare, notably disinformation campaigns aimed at undermining democratic institutions within the EU and eroding the political and social cohesion of its member states. While Russia plays a leading role in launching cyberattacks and penetrating Western institutions, Iran contributes through both cyber capabilities and ideological amplification, particularly via proxy networks and targeted disinformation. China, meanwhile, facilitates systemic disruption through long-term knowledge and technology extraction, and by enabling the operational capacity of its partners through advanced infrastructure. Thus, each actor contributes differently: Russia leads tactical cyber aggression, Iran amplifies narratives and supports militant proxies, and China sustains the strategic backbone through access, innovation, and industrial leverage. Although the EU has acknowledged some of these risks, significant blind spots remain—particularly in areas of academic, technological, and economic cooperation—where mechanisms of infiltration often go unnoticed. These blind spots are systematically exploited, not only through espionage and disinformation, but also through legitimate-seeming collaborations in science, trade, and infrastructure. Against this backdrop, the coordinated actions of Russia, Iran, and China constitute one of the most pressing challenges to European security, necessitating a comprehensive and unified response.
Evidence and dimensions of the tripartite cooperation
An analysis of available sources indicates that the cooperation between Russia, Iran, and China stems from a shared strategic calculus. Each of these states views the European Union as a geopolitical adversary and a structural barrier to the realization of their respective ambitions on the international stage.
Cybersecurity: Russia, Iran, and China – Cooperation and Threats to the European Union"
In recent years, trilateral cooperation in the cyber domain has intensified. Russia, Iran, and China have been exchanging cyber technologies, conducting joint hacking operations, coordinating ransomware attacks, and launching disinformation campaigns targeting strategic sectors of the EU economy. This section examines the mechanisms of this cooperation in order to identify the key threats and their implications for Europe’s digital security.
Russia, Iran, and China are actively developing joint cyberattack strategies. In January 2025, Iran and Russia signed a comprehensive strategic partnership agreement that includes provisions for cybersecurity collaboration. This agreement focuses on coordinated efforts to counter the misuse of information and communication technologies and to manage national internet segments, thereby expanding state control over the digital space[1]. Meanwhile, China and Russia have deepened their cybersecurity partnership by aligning their technical capacities and legal frameworks. Their goal is to promote a new cyber order based on state sovereignty and collective security, positioning themselves as leaders in the global digital arena[2]. The U.S. Office of the Director of National Intelligence (ODNI) has consistently identified Russia, China, and Iran as persistent cyber threats. According to the 2025 Threat Assessment Report, these states possess both the technical capabilities and political intent to launch operations targeting critical infrastructure and democratic institutions. The 2025 Threat Assessment highlights these nations' capabilities and willingness to launch cyber operations that could disrupt U.S. national security[3]. Iran has implemented Russian techniques to mask cybercrime and is using China's digital surveillance model to create its own sanctions evasion and surveillance systems[4]. Between 2021 and 2024, cyberattacks by Iranian hackers increased by 40%, with the majority targeting EU state institutions and the financial sector. China, in turn, provides Russia and Iran with advanced espionage technologies and tools that are used to attack European critical infrastructure systems[5]. In 2022, Chinese surveillance systems enabled the infiltration of European telecommunications networks and financial services. In addition, Russia and China regularly launch cyberattacks on the European energy, financial and transport sectors[6]. In 2023, more than 60% of cyberattacks against EU institutions originated from entities linked to Russian and Chinese cybercriminal groups. One of the most destructive attacks was the infection of the power system in Central Europe, which led to many hours of power outages[7]. Iran also plays a key role in the development of cybercrime in the EU. In 2022, Iranian hackers launched 140 ransomware attacks on organizations in the EU, generating financial losses of more than €1.2 billion. These attacks mainly affected the health, banking, and transportation sectors, and were designed to encrypt data and extort ransom[8]. Russian and Chinese intelligence agencies cooperate intensively in the areas of cyberespionage, data interception and infiltration of EU information systems[9]. In 2023, 25% of detected data breaches in the EU resulted from actions sponsored by third countries, mainly China and Russia. Iran provides hacking tools to take over administrative accounts in European organizations[10]. One of the examples is the 2023 operation in which Iranian hackers used forged security certificates to gain access to EU banking systems, causing the data of 4 million users to be leaked. In addition to the hacking attacks, Russia, Iran and China are conducting coordinated disinformation campaigns to further destabilize Europe[11]. In 2022, more than 500 disinformation campaigns were detected that aimed to undermine EU citizens' trust in their governments and international institutions. In 2023, a media campaign was organized to spread information about alleged "secret agreements" between EU governments and pharmaceutical corporations[12].
In conclusion, Russia, Iran, and China are not only exchanging technologies to facilitate cybercrime but are also executing coordinated digital operations that directly threaten the European Union. The greatest danger lies in the proliferation of ransomware, cyberespionage, and disinformation activities—tools deliberately used to destabilize the EU economy and disrupt societal cohesion by undermining trust in public institutions and critical sectors such as healthcare.
Knowledge and Technology Transfer: Cooperation between Russia, Iran, and China and the Threats to the European Union.
The transfer of knowledge and technology between Russia, Iran, and China constitutes a key pillar of their joint strategy to enhance geopolitical influence and mitigate the impact of Western sanctions. This cooperation operates through formal state partnerships as well as informal and opaque channels—including “private” actors, front companies, and academic institutions—often routed through jurisdictions such as Hong Kong to mask state involvement. China, for example, has provided Russia with critical components such as microelectronics and processors essential for the production of missiles and precision-guided munitions. In exchange, Russia has shared advanced military technologies with China, including submarine and stealth capabilities. Similarly, Iran has supplied Russia with ballistic missiles, potentially receiving sensitive technological assistance in exchange[13]. The consequences of this strategic partnership are particularly severe for the European Union, which academic, research, and industrial institutions are not only targeted directly, but are often exploited through seemingly legitimate joint projects.The European Parliament has explicitly acknowledged that foreign interference and espionage activities have intensified within EU academic institutions, with China, Russia, and Iran identified as primary perpetrators.[14] Due to the strategic value of their advanced scientific research and technological innovation, these institutions have become prime targets for foreign intelligence activities. The European Parliament has acknowledged that EU universities are being targeted by foreign interference and espionage, notably from China, Russia, or Iran. These actions calling for concrete actions such as stricter eligibility criteria for EU-funded research projects, the creation of a centralized risk assessment mechanism, enhanced background checks for foreign-affiliated researchers, and stronger enforcement of export controls in sensitive technological domains. Despite warnings from MI5 about potential espionage threats, several British universities have continued collaborations with Chinese institutions linked to the defense sector[15].
Russia and Iran have been developing intensive academic and research cooperation for years. Between 2017 and 2019, more than 35,000 Chinese students studied in Russia, and more than 20,000 Russians studied in China[16]. This figures, while notable, remain significantly lower than Chinese student populations in countries such as the United States (over 350,000 during the same period) and in Germany (over 35,000 annually), highlighting the strategic—not commercial—dimension of these cooperation. Exchange programs include fields such as artificial intelligence, cryptography, and advanced information systems, which can have both civilian and military applications. As part of the Shanghai Cooperation Organization University and BRICS University, these countries fund research on cybersecurity, quantum engineering and military systems[17]. While presented as academic partnerships, they serve as mechanisms for the transfer of strategic knowledge that may be leveraged in hybrid warfare. For the European Union, such cooperation poses a growing threat, as it facilitates the accumulation and circulation of sensitive expertise among actors known to challenge the international rules-based order. The integration of academic infrastructure into broader geopolitical strategies risks undermining Europe’s technological edge and security architecture.
The European Union finds itself at the center of global technological competition. In 2023, as many as 25% of cyberattacks on academic institutions in the EU were aimed at stealing quantum engineering and artificial intelligence research[18]. The leakage of such technologies may result in a significant increase in the military potential of Russia, Iran and China, which in the long run will weaken the strategic advantage of the West.
Transfer of Military and Industrial Technologies
A key pillar of strategic cooperation between Russia, Iran, and China is the transfer of military and dual-use industrial technologies. China has supplied Russia with 90% of imported microelectronics components, which are crucial for the Russian defense industry[19]. In addition, China has provided Russia with parts for missile systems and drones, helping to modernize its military equipment[20]. Iran also plays a significant role in the Russian defense industry, providing Moscow with more than 4,600 Shahed drones that have been used on the Ukrainian front[21]. In return, Russia provides Iran with radar systems, combat aircraft, and air defense technologies[22]. In addition, Iran and Russia have started building a drone factory in Tatarstan, which is expected to produce 6,000 drones by 2025[23]. Not only the military sector, but also the industrial sector is the subject of intensive cooperation. China has increased its share of the Russian machinery and machine tool market from 13% in 2017 to 90% in 2023[24]. This dependency allows Russia to evade Western sanctions and keep military production high. Iran and Russia are also working on payment systems that bypass SWIFT, allowing them to trade in rubles and riyals[25]. Such mechanisms weaken the effectiveness of EU sanctions, increasing the economic self-sufficiency of these countries.
Sino-Iranian support for Russia.
After Russia's invasion of Ukraine in 2022, cooperation on the sharing of military and industrial technologies between Russia, China and Iran has become a key element of the Kremlin's survival strategy, which has come under Western sanctions. Iran provides Russia with drones, China supports the modernization of the Russian defense industry, and Moscow returns the favor by providing advanced military technologies to partners. As a result, the threat to both the stability of the region and European security is increasing[26]. China is the most important supplier of electronic components to the Russian defense industry. In 2023, 90% of the microelectronics imported by Russia came from China, which was crucial for the modernization of its armed forces[27]. China also supplies ball bearings, machine tools, and precision machinery, which are essential for the production of tanks and combat aircraft[28].In addition, Russia and China are developing cooperation in the production of combat drones. In the first half of 2023, Chinese companies provided Russia with drones worth $14.5 million. Although Beijing officially denies reports that it directly supports the Russian military, an analysis of import statistics indicates that military equipment arrives in Moscow through intermediary companies in Hong Kong[29]. Iran, in turn, plays a key role in supplying Russia with combat drones. Since 2022, Moscow has received at least 4600 Shahed-136 drones, which have been used to attack Ukrainian cities and critical infrastructure[30]. In 2024, Iran has also supplied Russia with 400 Fateh-110 ballistic missiles, capable of striking targets at distances of up to 700 kilometers (approximately 435 miles).
In an effort to reduce dependence on external suppliers, Russia and Iran have jointly initiated the construction of a drone production facility in Tatarstan, with a projected output of 6,000 drones annually by 2025. These new industrial facilities are expected to enable Moscow to sustain its military operations in Ukraine, while simultaneously enhancing Iran’s capacity to expand arms exports to other countries in the Middle East. Moscow, however, is not merely a beneficiary in this partnership; in exchange for drones and missiles, it provides Iran with advanced radar systems, combat aircraft, and sophisticated air defense technologies. Iran received Russian attack helicopters, radars and fighter planes, which significantly increased its defense capabilities[31]. In 2023, Iran assisted Russia in constructing a drone production facility in Yelabuga, located in the Alabuga Special Economic Zone, with the aim of producing approximately 6,000 Shahed-136 drones by mid-2025. The facility is intended to ensure a continuous supply of drones for Russia’s military operations in Ukraine, while simultaneously enhancing Iran’s capacity to increase arms exports to other Middle Eastern countries[32]. Given Tehran's ambitions to become a dominant power in Central Asia, strengthening its military potential should not be underestimated. Iran views the region as a strategically vital sphere of influence. According to the Institute for the Study of War, Tehran considers much of Central Asia to be part of its "near abroad"—a space where it seeks to assert both cultural and strategic presence. This perspective drives Tehran's efforts to establish a stronger presence in the area[33]. Russia, in turn, shares its expertise in the modernization of drones and missile systems, enabling Iran to improve its indigenous technological capabilities. As a result, Tehran is not only reinforcing its own defense posture, but also expanding its ability to export modern weapons systems to partners such as Syria and the Yemeni Houthis. China also benefits from this trilateral exchange. It continues to gain access to advanced Russian military technologies, particularly in the areas of aircraft engines and missile systems. Notably, more than 40% of China’s current fighter jet fleet still relies on Russian engines[34]. While Beijing has taken steps to reduce this dependency, including efforts to develop its own advanced propulsion technologies, it remains unable to achieve full self-sufficiency in this sector[35].
The transfer of military technology between Russia, Iran and China poses a serious threat to the European Union. In 2023, Russia used Chinese components to modernize more than 200 tanks and produce modern fire control systems. This enhancement of Russia’s offensive capabilities risks escalating conflicts in Eastern Europe and further deteriorating the security situation in Ukraine. Iran, in turn, may utilize newly acquired technologies to threaten European maritime infrastructure in the Mediterranean and to advance its missile program—developments that raise significant concerns for both the EU and NATO. In January 2025, the Islamic Revolutionary Guard Corps (IRGC) conducted the "Prophet Muhammad" naval exercise in the Persian Gulf. The exercise featured the deployment of advanced combat drones such as the Mohajer-6 and Ababil-5, equipped with AI-enhanced Qaem and Almas missiles. These systems successfully destroyed simulated targets, demonstrating Iran’s growing capacity to integrate artificial intelligence and high-precision technologies into its military operations[36]. In March 2025, Iran participated in the "Security Belt-2025" joint naval exercises alongside Russia and China in the Gulf of Oman. The drills involved more than 20 warships and featured a series of coordinated operations, including simulated maritime attacks, joint search and rescue missions, and vessel inspection procedures. The primary objective was to enhance military interoperability among the three states and to signal their increasing coordination in strategic maritime zones[37]. Iran has also incorporated Russian-made long-range air defense systems, such as the S-300, into its own military exercises. In February 2025, these systems were deployed to intercept simulated hostile targets, demonstrating Iran’s growing capacity to integrate advanced foreign technologies into its national defense architecture[38].
The trilateral military-technical cooperation between Russia, Iran, and China—particularly in the field of weapons systems and joint exercises—carries significant implications for global and regional security. Such developments are particularly alarming in light of Iran’s provision of ballistic missiles to Russia and China’s continued supply of dual-use components that are critical to sustaining Russian defense production[39]. In this trilateral framework, China provides Russia with key electronic components, Iran supplies drones and ballistic missiles, and in return, Moscow shares advanced military technologies with both partners. This reciprocal exchange has significantly enhanced the military capabilities of all three countries. Moreover, their increasingly assertive defense and foreign policies pose a growing challenge to the stability and security of the European Union.
Espionage: Cooperation between Russia, Iran, and China and Its Threats to the European Union
Intelligence cooperation between Russia, Iran, and China represents one of the most critical threats to the security of the European Union. This trilateral partnership has intensified efforts to spy on European governmental, academic, and corporate institutions. The scope of this cooperation encompasses a wide range of intelligence practices, from traditional methods such as agent recruitment and institutional infiltration to advanced cyber techniques, including data exfiltration and the manipulation of public opinion through social media platforms. Key mechanisms driving this partnership include the coordinated exchange of surveillance technologies, the execution of joint cyber operations, and mutual support in orchestrating large-scale disinformation campaigns. Collectively, these activities pose an escalating threat to the internal stability and strategic autonomy of the European Union and its member states. The European External Action Service (EEAS) identifies Russia and China as the principal foreign actors engaged in information manipulation that undermines both EU security and democratic governance. According to EEAS reports, such activities involve disinformation, information distortion, and deliberate interference in the EU’s information space[40]. A joint report by MERICS, Chatham House, and the German Marshall Fund analyzes the growing strategic alignment between China and Russia and its implications for European security. The report underscores the deepening cooperation in the fields of military technology, cybersecurity, and disinformation—areas that collectively pose a destabilizing risk to the European region[41]. Moreover, Russia, Iran, and China are engaged in regular intelligence exchange, which enhances their capacity to conduct coordinated operations against the European Union and NATO structures more effectively. Intelligence documents from 2023 reveal that Tehran and Moscow are conducting joint operations to infiltrate Western academic and research institutions[42]. In turn, the Chinese Ministry of State Security (MSS) cooperates with the Russian FSB in analyzing the activities of European foreign policy think tanks[43].
Cyberspace has become a central domain of intelligence cooperation between Russia, Iran, and China[44]. In 2023, Chinese state-sponsored hackers conducted 104 cyberattacks targeting European government institutions and high-tech corporations[45]. In one of the largest attacks in 2022, Chinese cybercriminals broke into the systems of the EU's technology research agency, stealing data on artificial intelligence and cryptography[46]. Simultaneously, Russian hackers—often operating in coordination with Iranian cyber units—have conducted operations against European critical infrastructure. In a high-profile case, they infected power grid systems in several EU member states, causing regional disruptions. Analysts from Europol and NATO report that recent cyberattacks attributed to Russia, Iran, and China have not only disrupted critical economic sectors in the EU but have also exposed vulnerabilities in the Union’s defensive and response mechanisms—suggesting a potential intent to probe Europe’s cyber resilience[47]. According to Europol’s 2025 annual report, the European Union is facing an increase in politically motivated cyberattacks and sabotage, primarily driven by state actors such as Russia[48]. The report details how “hybrid threat” networks are increasingly collaborating with organized crime groups to destabilize the EU. These operations include sabotage, arson, cyber intrusions, data theft, migrant smuggling, and other forms of strategic criminal activity. EU and Polish officials have publicly cited examples of recent cyberattacks on hospitals and acts of arson linked to Russian military intelligence. The report further highlights the evolving nature of these threats, emphasizing the use of artificial intelligence in cybercrime and the recruitment of young people for online fraud schemes. Europol warns that such hybrid threats are designed to undermine democratic institutions, social cohesion, and the rule of law within the European Union[49]. In December 2024, NATO announced a series of new measures aimed at strengthening the protection of Europe’s critical infrastructure, following a wave of sabotage-related incidents, including data cable disruptions in Sweden, Finland, and other locations. NATO Secretary General Mark Rutte identified Russia and China as potential sources of these threats and stressed the importance of enhanced intelligence sharing and infrastructure defense across member states. As part of these efforts, a dedicated maritime exercise known as “Frozen Winds” was conducted, involving the use of underwater drones and minesweeper vessels to improve detection and monitoring capabilities in vulnerable maritime zones. These initiatives reflect NATO’s growing recognition of the strategic risks posed by state-sponsored cyber and hybrid operations aimed at destabilizing the region[50].
China and Russia have been conducting intelligence operations for years, the aim of which is to acquire modern technologies from Europe. Since 2000, 224 cases of Chinese espionage against Western scientific institutions and technology companies have been documented[51]. An example of such an operation was the infiltration of a German university of technology in 2021, where Chinese agents obtained data on modern materials for semiconductor production[52]. Iran, in turn, uses its intelligence networks to obtain knowledge from European technical universities. Between 2019 and 2023, Iranians conducted infiltration operations at least 10 universities in the EU, which allowed them to gain access to research on missile technologies[53]. Russia, Iran and China regularly recruit agents in Europe, using various methods of pressure. In 2022, a Russian spy network in EU institutions was discovered that had access to classified documents on sanctions imposed on Moscow[54]. China, in turn, infiltrates European technology corporations, recruiting employees to illegally transfer patents and industrial secrets. Between 2015 and 2021, more than 1200 cases of intellectual property theft were disclosed by European courts[55]. Russia, Iran and China are conducting coordinated disinformation operations aimed at weakening the unity of the European Union. In 2023, the European External Action Service (EEAS) documented over 750 incidents of Foreign Information Manipulation and Interference (FIMI) within the European Union. These coordinated disinformation campaigns were designed to erode public trust in EU institutions, undermine support for sanctions against Russia, and destabilize the political landscape of member states[56]. In 2023, Russian influence operations reached more than 50 million users in Europe[57]. Iran focuses on anti-EU propaganda, especially in the context of Middle East policy. In 2022, Iranian state media conducted a disinformation campaign against EU sanctions imposed on Tehran[58]. In April 2025, the French government formally accused the Russian military intelligence agency, GRU, of orchestrating a series of cyberattacks between 2021 and 2024. These attacks targeted various French entities, including government ministries, local authorities, aerospace and financial sectors, and notably, an organization involved in organizing the 2024 Paris Olympic and Paralympic Games. The French cybersecurity agency, ANSSI, reported that these cyberattacks were carried out by the hacking group APT28, also known as Fancy Bear, which is linked to the GRU. The primary objective of these operations was intelligence gathering, particularly in the context of Russia's ongoing war in Ukraine. The French Foreign Ministry specifically identified GRU Unit 20728 as responsible for these activities. France condemned these destabilizing actions and emphasized its commitment to collaborating with international partners to counter such malicious cyber behavior[59].
The intelligence cooperation between Russia, Iran, and China constitutes one of the most serious and multidimensional threats to the European Union. Their coordinated activities encompass cyberattacks, academic infiltration, agent recruitment, and large-scale disinformation campaigns targeting critical institutions and societal trust. In response, the European Union must significantly enhance its security posture by strengthening counterintelligence capabilities, investing in cybersecurity and data protection infrastructure, and adopting a more strategic approach to limiting foreign influence in key economic and political sectors.
The European Union’s Response to Trilateral Cooperation between Russia, Iran, and China
Strategic Awareness of the Threat
The European Parliament report (A9-0164/2022) draws attention to the growing awareness of the threats posed by Russia, China, and Iran to the European Union’s security and democratic resilience[60]. However, the report also highlights a persistent gap between the recognition of specific risks and the acknowledgment of the broader strategic challenge arising from the trilateral cooperation among these actors. According to the document, Russia’s war against Ukraine has fundamentally reshaped the EU’s security outlook, leading to an unprecedented mobilization of military, economic, and diplomatic resources. The report identifies China’s economic and diplomatic support for Russia as a potential long-term threat to European security. Iran’s destabilizing role is also addressed, particularly in relation to arms transfers to Russia and state-sponsored cyber activities. Nevertheless, the European Union’s institutional response remains selective and, at times, fragmented. In response to China’s indirect support for Russia’s war effort, the EU has introduced targeted sanctions against Chinese entities involved in the provision of dual-use goods to Russia. These steps, while significant, have been implemented with caution—reflecting the Union’s broader strategic considerations and complex economic interdependence with China. Notably, in 2024, the EU proposed new sanctions on Chinese companies supplying sensitive technologies to Russia, marking a deliberate shift towards more assertive policy measures[61].
The European Union’s awareness of the threat posed by the trilateral cooperation between Russia, Iran, and China is reflected in its measures across five key areas: sanctions and countermeasures, military and intelligence cooperation, cybersecurity, diplomacy, and economic policy. However, given the EU’s strong identity as an economic bloc, addressing these security challenges often requires reconciling protective measures with entrenched business interests. Recent policy debates highlight the need for clearer legal frameworks and stronger enforcement mechanisms to ensure that security imperatives are not overridden by economic considerations—particularly in sensitive sectors such as energy, critical technologies, and infrastructure. Recognizing the growing challenge to its security and strategic autonomy, the EU has adopted a broad set of measures aimed at limiting the influence of these actors and reducing their ability to carry out aggressive operations. A central pillar of this strategy involves the imposition of economic and financial restrictions. These measures include asset freezes and travel bans targeting individuals and entities supporting Russian aggression, the disconnection of Russian banks from the SWIFT system, export bans on military and dual-use technologies, as well as trade restrictions in the energy, transport, and raw materials sectors[62]. In addition, the European Union is cooperating with global digital platforms to curb the spread of false or misleading content promoting Russo-Chinese narratives—particularly those that delegitimize EU’s support for Ukraine, portray Western sanctions as ineffective, and amplify anti-NATO sentiments. Since 2022, this cooperation has intensified in response to coordinated disinformation waves following Russia’s full-scale invasion of Ukraine and amid China’s parallel efforts to frame the EU as economically dependent and geopolitically divided. This initiative complements broader disinformation countermeasures and reflects the EU’s commitment to safeguarding the integrity of its information environment[63].
The third pillar of the Union’s strategic response involves sanctions targeting Iranian entities responsible for arms transfers. These measures address Iran’s active support for Russia, including the delivery of combat drones and technological assistance to its defense sector. The EU has imposed restrictions on Iranian companies involved in the production and export of weapons and has banned the export of technologies that could reinforce Iran’s military capabilities[64]. In addition, the European Union has strengthened intelligence cooperation with the United States and the United Kingdom to more effectively monitor and counter Iranian activities in the military and intelligence domains. This coordination focuses on three key priorities: deepening strategic ties with NATO, enhancing transatlantic intelligence sharing, and advancing the EU’s strategic autonomy in the field of defense. Within the broader framework of EU–NATO cooperation, particular emphasis has been placed on improving the coordination of military operations, including the development of rapid response capabilities among member states[65]. A third joint EU–NATO declaration is planned with the aim of strengthening the coherence and coordination of collective defense efforts across Europe[66]. In parallel, the European Union is working to enhance intelligence sharing between member states and EU institutions. Notably, recent reports emphasize the need to increase both the financial and technological capacities of EU-level intelligence structures. This is part of a broader effort to reinforce the Union’s strategic autonomy—understood as the ability to act independently in defense matters while maintaining strong partnerships with NATO and other allies. The importance of investing in the European defense industry and developing military capabilities based on domestic resources is also highlighted[67]. The European Union has also taken concrete steps to strengthen cybersecurity and counter hybrid threats, particularly in response to Russian and Chinese state-sponsored disinformation and cyberattacks. As part of its efforts to combat disinformation, the EU is reinforcing the role of the East StratCom Task Force, which monitors and counters coordinated propaganda campaigns originating from Russia and China. For example, in 2024, the Task Force exposed multiple disinformation waves related to EU sanctions policy and vaccine safety, highlighting how false or manipulated content is used to amplify hostile narratives. The Task Force distinguishes between broader strategic narratives—such as framing the EU as weak or divided—and specific disinformation incidents that involve verifiably false claims designed to mislead or incite public distrust.[68]
To counter the manipulation of public opinion through social media and other dissemination tools, the EU is also developing strategic communication frameworks aimed at increasing societal resilience to external influence[69]. Established under the NIS 2 Directive, the European Cyber Crisis Liaison Organization Network (EU-CyCLONe) facilitates cooperation among national authorities responsible for cyber crisis management. The network is designed to ensure a coordinated and timely response to large-scale cybersecurity incidents across the European Union[70]. Recognizing the growing threat landscape, the EU has emphasized the need to further enhance its defense capabilities against cyberattacks. This includes the development of a systemic approach to early threat detection and response mechanisms, involving all member states in a unified framework[71]. In its foreign policy, the European Union also highlights the importance of reducing economic dependence on China—particularly in critical areas such as supply chains, advanced technologies, and access to rare earth elements. To address this, the EU is working to diversify sources of raw materials and strengthen its own industrial base. At the same time, it underscores the need to intensify cooperation with democratic partners to avoid strategic dependencies on authoritarian regimes. This multi-dimensional support for Ukraine is not only a response to Russia’s direct military aggression but also forms part of the EU’s broader strategy to counter the systemic threat posed by the trilateral alignment of Russia, Iran, and China, which jointly seek to undermine European security and stability. Parallel to these efforts, the EU has consistently provided support to Ukraine in the form of military, financial, and humanitarian assistance. This includes arms deliveries under the European Peace Facility (EPF), reflecting a broader commitment to regional security and stability. As part of a broader assistance package, the so-called "Team Europe"—comprising the European Union and its Member States—has mobilized a total of €143 billion in support of Ukraine. This amount includes macro-financial assistance, allocations from the Ukraine Facility, humanitarian aid, and military support delivered both through the European Peace Facility (EPF) and directly by individual Member States[72]. In the field of humanitarian assistance, the European Union has delivered over 154,000 tonnes of in-kind aid, including medical equipment, field hospitals, temporary shelters, school buses, ambulances, and nearly 8,900 power generators. This support has been coordinated via the EU Civil Protection Mechanism, with the participation of 35 countries[73].
Deficits in Threat Perception and Strategic Awareness
There are several areas in which the European Union has yet to fully recognize or respond to the long-term threat posed by the trilateral cooperation between Russia, Iran, and China. The first area of concern lies in the absence of a decisive EU response to China’s dual strategic role. Despite China’s consistent support for Russia—both economically and diplomatically—the EU remains reluctant to frame China as a systemic adversary. As a result, critical economic dependencies persist, particularly in the fields of advanced technology and strategic raw materials, while the Union lacks a long-term strategy to reduce these structural vulnerabilities. The second area relates to the EU’s limited response to Iranian hybrid tactics. While official documents acknowledge Iran’s activities in cyberspace, its military partnerships, and its provision of unmanned aerial vehicles (UAVs) to Russia, the corresponding EU countermeasures remain fragmented and insufficient. However, the most fundamental weakness is the lack of a unified recognition of the coordinated threat posed by the trilateral cooperation itself.Although the EU acknowledges interactions among Russia, Iran, and China, it continues to address them primarily in bilateral or isolated terms. Consequently, there is no comprehensive EU policy framework that accounts for the cumulative and systemic impact of their strategic alignment on European security.
Recommendations
To effectively address the complex and evolving threats posed by foreign interference—particularly from the People’s Republic of China—the European Union must adopt a coherent and forward-looking strategy. Such a strategy should integrate existing policy instruments, promote institutional alignment, and enhance coordination among Member States and EU bodies. The following recommendations outline concrete measures aimed at strengthening the Union’s resilience against disinformation, espionage, and other forms of hybrid interference.
First, the European Union should take active steps to counter foreign interference by implementing the recommendations and initiatives outlined in the various European Parliament resolutions concerning interference in democratic processes within the EU, including disinformation.
Second, the European Union should pursue a more coordinated and strategic approach to the protection of critical infrastructure at the EU level, particularly in response to growing risks associated with Chinese influence. This includes limiting external control, countering hybrid threats such as cyberattacks, disinformation campaigns, surveillance of the Chinese diaspora, and espionage operations originating from and taking place within the EU. This approach must prioritize security considerations over purely economic interests and involve close cooperation with international partners to promote a global, open, stable, and secure cyberspace. To that end, the EU should increase resourcesallocated to both EU institutions and Member States for defending against cyberespionage conducted by the People’s Republic of China and formally call on China to cease such activities.
Furthermore, the EU should enhance cooperation with NATO and like-minded partners to reduce the risk of espionage and interference in critical infrastructure—particularly assets with military relevance. Finally, Key EU institutions—such as the European Commission and its executive agencies managing Horizon Europe and other research frameworks—should be urged to halt funding and collaboration with Chinese companies involved in sectors of critical and strategic importance, including artificial intelligence, quantum computing, semiconductors, and cybersecurity. Recent reviews have shown that several Chinese entities have participated in EU-funded projects despite growing security concerns.[74]
Finally, the European Union should ensure a unified and coherent approach to cultural and academic cooperation with China, with safeguards in place to prevent undue influence stemming from Chinese financial involvement. This includes investigating the current state of research cooperation between EU and Chinese institutions to ensure that such partnerships are not being exploited as channels of foreign interference by the People’s Republic of China.
While the EU should continue to monitor allegations that Confucius Institutes have been used to disseminate propaganda and restrict academic freedom, greater emphasis must be placed on addressing broader and more impactful channels of influence—such as state-sponsored partnerships with major research institutions, technology transfer through joint ventures, and covert operations involving Chinese enterprises embedded within critical infrastructure sectors.In addition, ongoing scrutiny should focus on how Chinese state-linked actors may exert indirect influence over research agendas, funding streams, and self-censorship practices within European higher education institutions—particularly in areas related to sensitive topics such as human rights and technological cooperation. Enhanced transparency around partnerships and funding sources remains crucial to safeguarding academic integrity.
Conclusion
The trilateral alignment of Russia, Iran, and China presents a multifaceted and evolving threat to the European Union’s security, stability, and strategic autonomy. While these actors pursue distinct national agendas, their overlapping interests—whether in the realm of cyber warfare, disinformation campaigns, military cooperation, or economic leverage—create a cumulative destabilizing effect. Russia remains the primary source of direct military aggression and tactical cyberattacks; Iran reinforces destabilization through proxy networks and ideological amplification; and China plays a critical role by facilitating technological advancement, strategic infiltration, and economic entanglement.
The European Union’s response has developed across several dimensions: reinforcing cybersecurity and counterintelligence, strengthening its cooperation with NATO and like-minded partners, rethinking its approach to foreign influence in critical sectors, and supporting Ukraine as a frontline of defense against systemic aggression. However, gaps remain—notably in balancing economic interests with security imperatives, ensuring resilience against sophisticated hybrid tactics, and maintaining unity among Member States in the face of complex external pressures.
Going forward, the EU must continue to sharpen its threat perception, streamline its policy instruments, and foster a culture of strategic foresight. Only a coordinated and comprehensive strategy, acknowledging the distinct yet complementary roles of Russia, Iran, and China, can safeguard Europe’s democratic institutions, technological sovereignty, and geopolitical stability.
Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or European Research Executive Agency (REA). Neither the European Union nor the granting authority can be held responsible for them. |
[1] See, Antoniuk,
D. “Iran and Russia deepen cyber ties with new agreement”, The Record, https://therecord.media/russia-iran-cyber-ties-agreement, last accessed 24.04.2025.
[2] See, AnuPriya.
"China and Russia Strengthen Cybersecurity" CyberPress, 2024. https://cyberpress.org/china-and-russia-strengthen-cybersecurity/, last accessed 24.04.2025.
[3] See, Anonymous.
"ODNI 2025 Threat Assessment Notes Threats from Russia, China, Iran, North
Korea Targeting Critical Infrastructure, Telecom", Industrial Cyber, 2025,
https://industrialcyber.co/reports/odni-2025-threat-assessment-notes-threats-from-russia-china-iran-north-korea-targeting-critical-infrastructure-telecom/, last accessed 24.04.2025.
[4] See, Lavrova,
D. “Iran's cybersecurity threatscape for 2021-H1 2024”, Positive Technologies,
2024, https://global.ptsecurity.com/analytics/iran-s-cybersecurity-threatscape-for-2021-h1-2024, last accessed 24.04.2025.
[5] See, “PRC
State-sponsored Cyber Activity: Actions for Critical Infrastructure Leaders”,
Cybersecurity & Infrastructure Security Agency (CISA), 2024, https://www.cisa.gov/sites/default/files/2024-03/Fact-Sheet-PRC-State-Sponsored-Cyber-Activity-Actions-for-Critical-Infrastructure-Leaders-508c_0.pdf, accessed 24.04.2025.
[6] See, Van Rij,
A. "Can Europe Stop the Quartet of Chaos?" Chatham House, 2024. https://www.chathamhouse.org/publications/the-world-today/2024-12/can-europe-stop-quartet-chaos, last accessed 24.04.2025.
[7] See,
“Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations”, The
Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure
Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3),
2024, https://www.cisa.gov/sites/default/files/2024-08/aa24-241a-iran-based-cyber-actors-enabling-ransomware-attacks-on-us-organizations_0.pdf, last accessed 24.04.2025.
[8] See, Lavrova,
D. “Iran's cybersecurity threatscape for 2021-H1 2024”, Positive Technologies,
2024, https://global.ptsecurity.com/analytics/iran-s-cybersecurity-threatscape-for-2021-h1-2024, last accessed 24.04.2025.
[9] See,
"Chinese Espionage: Surveying the Landscape of U.S.-China Relations"
Center for Strategic and International Studies, 2023. https://www.csis.org/programs/strategic-technologies-program/survey-chinese-espionage-united-states-2000, last accessed 24.04.2025.
[10] See, Lavrova,
D. “Iran's cybersecurity threatscape for 2021-H1 2024”, Positive Technologies,
2024, https://global.ptsecurity.com/analytics/iran-s-cybersecurity-threatscape-for-2021-h1-2024, last accessed 24.04.2025.
[11] See, Van Rij, A. "Can Europe Stop the Quartet of Chaos?"
Chatham House, 2024.
https://www.chathamhouse.org/publications/the-world-today/2024-12/can-europe-stop-quartet-chaos,
last accessed 24.04.2025.
[12] See, Lavrova,
D. “Iran's cybersecurity threatscape for 2021-H1 2024”, Positive Technologies,
2024, https://global.ptsecurity.com/analytics/iran-s-cybersecurity-threatscape-for-2021-h1-2024, last accessed 24.04.2025.
[13] See,
"Moscow Beholden to Beijing in Anti-Western Axis, Says Nato Chief"
The Times, 2024. https://www.thetimes.com/world/article/china-russia-iran-north-korea-nato-chief-jens-stoltenberg-kjz8z3rvr, last accessed 24.04.2025.
[14] See, “Resolution of 1 June 2023 on foreign interference in all
democratic processes in the European Union, including disinformation
(2022/2075(INI)) [P9_TA(2023)0219]”, European Parliament, 2023, https://www.europarl.europa.eu/doceo/document/TA-9-2023-0219_EN.html, last accessed 09.05.2025.
[15] See,
“Universities Continue Deals with China Despite MI5 Warning over Spying.” The
Times, 2025. https://www.thetimes.com/uk/defence/article/universities-continue-deals-with-china-despite-mi5-warning-over-spying-3fbszj8df; Hess, A. “Espionage at European Universities: 'We Must Be Vigilant,
Though Not Paranoid'.” Euronews, 2024. https://www.euronews.com/my-europe/2024/11/28/espionage-in-european-universities-we-must-be-vigilant-though-not-paranoid, last accessed 24.04.2025.
[16] See, Guan, G.
"Thirty Years of China–Russia Strategic Relations: Achievements,
Characteristics and Prospects" China International Strategy Review, 2022. https://link.springer.com/article/10.1007/s42533-022-00101-6, last accessed 24.04.2025.
[17] See, Guan, G.
"Thirty Years of China–Russia Strategic Relations: Achievements,
Characteristics and Prospects" China International Strategy Review, 2022. https://link.springer.com/article/10.1007/s42533-022-00101-6, last accessed 24.04.2025.
[18] See, Guan, G.
"Thirty Years of China–Russia Strategic Relations: Achievements,
Characteristics and Prospects" China International Strategy Review, 2022. https://link.springer.com/article/10.1007/s42533-022-00101-6, last accessed 24.04.2025.
[19] See, Rooke, J.
"China’s Strategic Complicity and the Hidden Engine Behind Russia’s War
Effort" NATO Association of Canada, 2024. https://natoassociation.ca/special-report-chinas-strategic-complicity-and-the-hidden-engine-behind-russias-war-effort/, last accessed 24.04.2025.
[20] See, Bergmann,
M.; Snegovaya, M.; Dolbaia, T. and Fenton, N. "Collaboration for a Price:
Russian Military-Technical Cooperation with China, Iran, and North Korea"
Center for Strategic and International Studies, 2024. https://www.csis.org/analysis/collaboration-price-russian-military-technical-cooperation-china-iran-and-north-korea, last accessed 24.04.2025.
[21] See, Bergmann,
M.; Snegovaya, M.; Dolbaia, T. and Fenton, N. "Collaboration for a Price:
Russian Military-Technical Cooperation with China, Iran, and North Korea"
Center for Strategic and International Studies, 2024. https://www.csis.org/analysis/collaboration-price-russian-military-technical-cooperation-china-iran-and-north-korea, last accessed 24.04.2025.
[22] See, Bergmann,
M.; Snegovaya, M.; Dolbaia, T. and Fenton, N. "Collaboration for a Price:
Russian Military-Technical Cooperation with China, Iran, and North Korea"
Center for Strategic and International Studies, 2024. https://www.csis.org/analysis/collaboration-price-russian-military-technical-cooperation-china-iran-and-north-korea, last accessed 24.04.2025.
[23] See, Bergmann,
M.; Snegovaya, M.; Dolbaia, T. and Fenton, N. "Collaboration for a Price:
Russian Military-Technical Cooperation with China, Iran, and North Korea"
Center for Strategic and International Studies, 2024. https://www.csis.org/analysis/collaboration-price-russian-military-technical-cooperation-china-iran-and-north-korea, last accessed 24.04.2025.
[24] See, Rooke, J.
"China’s Strategic Complicity and the Hidden Engine Behind Russia’s War
Effort" NATO Association of Canada, 2024.
https://natoassociation.ca/special-report-chinas-strategic-complicity-and-the-hidden-engine-behind-russias-war-effort/,
last accessed 24.04.2025.
[25] See, Bergmann, M.; Snegovaya, M.; Dolbaia, T. and Fenton, N.
"Collaboration for a Price: Russian Military-Technical Cooperation with
China, Iran, and North Korea" Center for Strategic and International
Studies, 2024. https://www.csis.org/analysis/collaboration-price-russian-military-technical-cooperation-china-iran-and-north-korea,
last accessed 24.04.2025.
[26] See, Sytas, A.
"China Aids Russian Drone Production with Smuggled Western Parts, Says
Estonia", Reuters, 2025. https://www.reuters.com/world/china-aids-russian-drone-production-with-smuggled-western-parts-says-estonia-2025-02-12, accessed 24.04.2025.
[27] See, Bergmann,
M.; Snegovaya, M.; Dolbaia, T. and Fenton, N. "Collaboration for a Price:
Russian Military-Technical Cooperation with China, Iran, and North Korea"
Center for Strategic and International Studies, 2024. https://www.csis.org/analysis/collaboration-price-russian-military-technical-cooperation-china-iran-and-north-korea, last accessed 24.04.2025.
[28] See, Bergmann,
M.; Snegovaya, M.; Dolbaia, T. and Fenton, N. "Collaboration for a Price:
Russian Military-Technical Cooperation with China, Iran, and North Korea"
Center for Strategic and International Studies, 2024. https://www.csis.org/analysis/collaboration-price-russian-military-technical-cooperation-china-iran-and-north-korea, last accessed 24.04.2025.
[29] See, Bergmann,
M.; Snegovaya, M.; Dolbaia, T. and Fenton, N. "Collaboration for a Price:
Russian Military-Technical Cooperation with China, Iran, and North Korea"
Center for Strategic and International Studies, 2024. https://www.csis.org/analysis/collaboration-price-russian-military-technical-cooperation-china-iran-and-north-korea, last accessed 24.04.2025.
[30] See, Bergmann,
M.; Snegovaya, M.; Dolbaia, T. and Fenton, N. "Collaboration for a Price:
Russian Military-Technical Cooperation with China, Iran, and North Korea"
Center for Strategic and International Studies, 2024. https://www.csis.org/analysis/collaboration-price-russian-military-technical-cooperation-china-iran-and-north-korea, last accessed 24.04.2025.
[31] See, Bergmann,
M.; Snegovaya, M.; Dolbaia, T. and Fenton, N. "Collaboration for a Price:
Russian Military-Technical Cooperation with China, Iran, and North Korea"
Center for Strategic and International Studies, 2024. https://www.csis.org/analysis/collaboration-price-russian-military-technical-cooperation-china-iran-and-north-korea, last accessed 24.04.2025.
[32] See, “How
Iran's Drones Supercharged Russia's 1,000-Day Fight in Ukraine.” Iran
International, 2024. https://www.iranintl.com/en/202411197064, last accessed 24.04.2025.
[33] See, Harmer, C.
Iranian Naval and Maritime Strategy. Washington, DC: Institute for the Study of
War, 2013. https://www.understandingwar.org/report/iranian-naval-and-maritime-strategy, last accessed 24.04.2025.
[34] See, Mahshie,
A. “Dependence on Russian Aircraft Engines Could Prompt China to ‘Fix Their
Problem.’” Air & Space Forces Magazine, May 19, 2022. https://www.airandspaceforces.com/china-air-force-may-take-a-hit-due-to-dependence-on-russian-aircraft-engines, last accessed 24.04.2025.
[35] See, “China
Ends Reliance on Russian Engines, Fully Embraces Indigenous Aircraft
Technology.” China Arms, 2023. https://www.china-arms.com/2023/09/china-ends-reliance-on-russian-engines/, last accessed 24.04.2025.
[36] See, “Iran
Demonstrates AI-Powered Missiles Launched from Drones in Persian Gulf Show of
Force.” Army Recognition, 2025. https://armyrecognition.com/news/army-news/2025/iran-demonstrates-ai-powered-missiles-launched-from-drones-in-persian-gulf-show-of-force, last accessed 24.04.2025.
[37] See, Jackson,
W. “China, Russia and Iran Show Off Naval Abilities with Joint Drills in Gulf
of Oman.” Straight Arrow News, 2025. https://san.com/cc/china-russia-and-iran-show-off-naval-abilities-with-joint-drills-in-gulf-of-oman, last accessed 24.04.2025.
[38] See, "Iran
Uses Russian-Made Defence Systems in Military Exercise" Middle East
Monitor, 2025. https://www.middleeastmonitor.com/20250205-iran-uses-russian-made-defence-systems-in-military-exercise, last accessed 24.04.2025.
[39] See, Deutsch,
A. and Hafezi, P. “Exclusive: Iran Sends Russia Hundreds of Ballistic Missiles,
Sources Say.” Reuters, 2024. https://www.reuters.com/world/iran-sends-russia-hundreds-ballistic-missiles-sources-say-2024-02-21/, last accessed 24.04.2025.
[40] See,
"Information Integrity and Countering Foreign Information Manipulation and
Interference (FIMI)", European Union External Action Service (EEAS), 2025.
https://www.eeas.europa.eu/eeas/information-integrity-and-countering-foreign-information-manipulation-interference-fimi_en, last accessed 24.04.2025.
[41]See, Sabanadze,
N.; Vasselier, A. and Wiegand, G. “China-Russia Alignment: A Threat to Europe's
Security” Mercator Institute for China Studies (MERICS), 2024, https://merics.org/en/report/china-russia-alignment-threat-europes-security, last accessed 24.04.2025.
[42] See,
"Chinese Espionage: Surveying the Landscape of U.S.-China Relations"
Center for Strategic and International Studies, 2023. https://www.csis.org/programs/strategic-technologies-program/survey-chinese-espionage-united-states-2000, last accessed 24.04.2025.
[43] See, "Chinese Espionage: Surveying the Landscape of U.S.-China
Relations" Center for Strategic and International Studies, 2023. https://www.csis.org/programs/strategic-technologies-program/survey-chinese-espionage-united-states-2000, last accessed 24.04.2025.
[44] See, “Countries
Shore Up Their Digital Defenses as Global Tensions Raise the Threat of
Cyberwarfare.” Euronews, 2025. https://www.euronews.com/next/2025/04/21/countries-shore-up-their-digital-defenses-as-global-tensions-raise-the-threat-of-cyberwarf, last accessed 24.04.2025.
[45] See,
“Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations”, The
Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure
Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3),
2024, https://www.cisa.gov/sites/default/files/2024-08/aa24-241a-iran-based-cyber-actors-enabling-ransomware-attacks-on-us-organizations_0.pdf, last accessed 24.04.2025.
[46] See,
“Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations”, The
Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure
Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3),
2024, https://www.cisa.gov/sites/default/files/2024-08/aa24-241a-iran-based-cyber-actors-enabling-ransomware-attacks-on-us-organizations_0.pdf, last accessed 24.04.2025.
[47] See, "European Union Serious and
Organised Crime Threat Assessment: The Changing DNA of Serious and Organised
Crime", European Union Agency for Law Enforcement Cooperation, 2025, https://www.europol.europa.eu/cms/sites/default/files/documents/EU-SOCTA-2025.pdf; Michaels, D. and Cullison, A. "As Russia
and China Rewrite Rules of War, NATO Adapts Its Game Plan ", The Wall
Street Journal, 2024, https://www.wsj.com/world/europe/as-russia-and-china-rewrite-rules-of-war-nato-adapts-its-game-plan-76432a2e, last accessed 08.05.2025.
[48] See, "European Union Serious and
Organised Crime Threat Assessment: The Changing DNA of Serious and Organised
Crime", European Union Agency for Law Enforcement Cooperation, 2025, https://www.europol.europa.eu/cms/sites/default/files/documents/EU-SOCTA-2025.pdf last accessed 08.05.2025.[49] See, O'Carroll,
L. "Russia Criminal Networks Drive Increase in Sabotage, Says
Europol" The Guardian, 2025. https://www.theguardian.com/technology/2025/mar/18/russia-criminal-networks-drive-increase-sabotage-europol, last accessed 24.04.2025.
[50] See, Moody, O.
Waterfield, B. "Finland-Sweden Cables Damage NATO", The Times, 2024. https://www.thetimes.com/world/europe/article/finland-sweden-cables-damage-nato-fd7lmlpts?msockid=3a63b5a771696c9c05b0a07270486d66, last accessed 24.04.2025.
[51] See, “China:
The Risk to Academia” Federal Bureau of Investigation, U.S. Department of
Justice, 2019. https://www.fbi.gov/file-repository/counterintelligence/china-risk-to-academia-2019.pdf/view, last accessed 24.04.2025.
[52] See, “China:
The Risk to Academia” Federal Bureau of Investigation, U.S. Department of
Justice, 2019. https://www.fbi.gov/file-repository/counterintelligence/china-risk-to-academia-2019.pdf/view, last accessed 24.04.2025.
[53] See, “China:
The Risk to Academia” Federal Bureau of Investigation, U.S. Department of
Justice, 2019. https://www.fbi.gov/file-repository/counterintelligence/china-risk-to-academia-2019.pdf/view, last accessed 24.04.2025.
[54] See, "Chinese Espionage: Surveying the Landscape of U.S.-China
Relations" Center for Strategic and International Studies, 2023. https://www.csis.org/programs/strategic-technologies-program/survey-chinese-espionage-united-states-2000, last accessed 24.04.2025.
[55] See, “China:
The Risk to Academia” Federal Bureau of Investigation, U.S. Department of
Justice, 2019. https://www.fbi.gov/file-repository/counterintelligence/china-risk-to-academia-2019.pdf/view, last accessed 24.04.2025.
[56] See,
"Information Integrity and Countering Foreign Information Manipulation and
Interference (FIMI)", European Union External Action Service (EEAS), 2025.
https://www.eeas.europa.eu/eeas/information-integrity-and-countering-foreign-information-manipulation-interference-fimi_en, last accessed 24.04.2025.
[57] See, Van Rij,
A. "Can Europe Stop the Quartet of Chaos?" Chatham House, 2024. https://www.chathamhouse.org/publications/the-world-today/2024-12/can-europe-stop-quartet-chaos, last accessed 24.04.2025.
[58] See,
“Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations”, The
Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure
Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3),
2024, https://www.cisa.gov/sites/default/files/2024-08/aa24-241a-iran-based-cyber-actors-enabling-ransomware-attacks-on-us-organizations_0.pdf, last accessed 24.04.2025.
[59] See, “Russia – Attribution of cyber attacks on France to the Russian
military intelligence service (GRU)”, French Ministry for Europe and Foreign
Affairs, 2025, https://www.diplomatie.gouv.fr/en/country-files/russia/news/2025/article/russia-attribution-of-cyber-attacks-on-france-to-the-russian-military; Irish, J. “France accuses Russian
intelligence of repeated cyber attacks since 2021”, Reuters, 2025, https://www.reuters.com/world/europe/first-france-accuses-russian-intelligence-repeated-cyber-attacks-2025-04-29/, last accessed 09.05.2025.
[60] See,
McAllister, D. and Loiseau, N. “Report on a European Parliament Recommendation
to the Council and the Vice-President of the Commission / High Representative
of the Union for Foreign Affairs and Security Policy on the EU’s Foreign,
Security and Defence Policy after the Russian Invasion of Ukraine.
A9-0164/2022” European Parliament, 2022. https://www.europarl.europa.eu/doceo/document/A-9-2022-0164_EN.html, last accessed 24.04.2025.
[61] See, Teo,
Chian-Wei. "EU Proposes Sanctions on Chinese Firms for Helping
Russia" Bloomberg, 2024. https://www.bloomberg.com/news/newsletters/2024-11-26/eu-proposes-sanctions-on-chinese-firms-for-helping-russia, last accessed 24.04.2025.
[62] See,
"Information Integrity and Countering Foreign Information Manipulation and
Interference (FIMI)", European Union External Action Service (EEAS), 2025.
https://www.eeas.europa.eu/eeas/information-integrity-and-countering-foreign-information-manipulation-interference-fimi_en; “Iran: EU Widens Restrictive
Measures in View of Iran Support of the Russian War of Aggression Against
Ukraine and Lists One Individual and Four Entities.” Council of the European
Union, 2024. https://www.consilium.europa.eu/en/press/press-releases/2024/11/18/iran-eu-widens-restrictive-measures-in-view-of-iran-support-of-the-russian-war-of-aggression-against-ukraine-and-lists-one-individual-and-four-entities/, last accessed 24.04.2025.
[63] See,
"Information Integrity and Countering Foreign Information Manipulation and
Interference (FIMI)", European Union External Action Service (EEAS), 2025.
https://www.eeas.europa.eu/eeas/information-integrity-and-countering-foreign-information-manipulation-interference-fimi_en; Missiroli, A.; Gaub, F.; Popescu,
N. and Wilkins, J.J. “Strategic communications: East and South”
Foundation Robert Schuman, 2016, https://www.robert-schuman.eu/en/european-issues/0415-strategic-communications-east-and-south, last accessed 24.04.2025.
[64] See, “Iran: EU Widens Restrictive Measures in View of Iran Support of
the Russian War of Aggression Against Ukraine and Lists One Individual and Four
Entities.” Council of the European Union, 2024. https://www.consilium.europa.eu/en/press/press-releases/2024/11/18/iran-eu-widens-restrictive-measures-in-view-of-iran-support-of-the-russian-war-of-aggression-against-ukraine-and-lists-one-individual-and-four-entities/, last accessed 24.04.2025.
[65] See, Zandee,
D.; van der Meer, S. and Stoetman, A. “EU-NATO Cooperation: What Has Been
Achieved So Far?” Clingendael Institute, 2021. https://www.clingendael.org/pub/2021/countering-hybrid-threats/3-eu-nato-cooperation-what-has-been-achieved-so-far/; “The EU's Response to Hybrid Threats: An Assessment of the EU Hybrid
Toolbox. EPRS ATA 2025/769524” European Parliament, 2025, https://www.europarl.europa.eu/RegData/etudes/ATAG/2025/769524/EPRS_ATA%282025%29769524_EN.pdf, last accessed 24.04.2025.
[66] See, Clapp, S.
"Strategic Compass for Security and Defence" European Parliament,
2023. https://www.europarl.europa.eu/thinktank/en/document/EPRS_ATA(2023)739333; “NATO and European Union Leadership Sign Third Joint Declaration.”
North Atlantic Treaty Organization (NATO), 2023, https://www.nato.int/cps/en/natohq/news_210523.html, last accessed 24.04.2025.
[67] See, Cook, L.
“The EU Wants to Break Its Security Dependency on the US and Buy More European
Weapons.” AP News, 2025. https://apnews.com/article/eu-defense-us-ukraine-industry-ammunition-weapons-ea03077814f9113b548d7281f32a11b5, last accessed 24.04.2025.
[68] “Final Report – Outputs and Outcomes of a Community-Wide Effort: Task
Force on the 2024 European Parliament Elections”, European Digital Media
Observatory (EDMO), 2024, https://cedmohub.eu/wp-content/uploads/2024/08/Final-Report-%E2%80%93-EDMO-TF-EU24.pdf, last accessed 09.05.2025.[69] See, Cook, L.
“The EU Wants to Break Its Security Dependency on the US and Buy More European
Weapons.” AP News, 2025. https://apnews.com/article/eu-defense-us-ukraine-industry-ammunition-weapons-ea03077814f9113b548d7281f32a11b5, last accessed 24.04.2025.
[70] See, “CyCLONe
Executives Meeting.” European Union Agency for Cybersecurity (ENISA), 2023. https://www.enisa.europa.eu/events/cyclone-executives-meeting, last accessed 24.04.2025.
[71] See, “EU
Countries Test Their Ability to Cooperate in the Event of Cyber Attacks.”
European Commission, 2020. https://digital-strategy.ec.europa.eu/en/news/eu-countries-test-their-ability-cooperate-event-cyber-attacks, last accessed 24.04.2025.
[72] See, Peters, T.
and Almeida, A.L. “State of play: EU support to Ukraine Payments, reform and
investment, use of immobilised Russian assets”, European Parliamentary Research
Service (EPRS), 2025, https://www.europarl.europa.eu/RegData/etudes/BRIE/2025/769573/EPRS_BRI%282025%29769573_EN.pdf, last accessed 24.04.2025.
[73] See, “EU
Assistance to Ukraine” Delegation of the European Union to the United States,
European External Action Service, 2025. https://www.eeas.europa.eu/sites/default/files/documents/2025/2025.02.21%20EUDEL%20WAS%20Two-Pager%20on%20EU%20Assistance%20to%20Ukraine%20%28February%29.pdf, last accessed 24.04.2025.
[74] European Commission. (2025). International
cooperation with China in research and innovation. Retrieved from https://research-and-innovation.ec.europa.eu/strategy/strategy-research-and-innovation/europe-world/international-cooperation/bilateral-cooperation-science-and-technology-agreements-non-eu-countries/china_en