It is said that the European Union border security program is full of holes

Photo of author

By [email protected]


It is claimed that the program used by the European Union’s border security forces to prevent undocumented immigrants and suspected criminals from traveling in the region is full of holes and exposed to electronic attacks. The SCINGEN Information System for the second generation (SIS II) is the information technology system and the joint database between most European Union states for law enforcement and public security. According to a new cooperation between Bloomberg And the unhappy investigation Lighthouse reportS, SIS II – which has been used since 2013 – suffers from “thousands” of cybersecurity issues, to the extent that the European Union auditors were put in place in a report submitted last year.

The report indicates that there is no evidence of any data theft, but the “excessive number” of accounts that do not need to reach the database means that it can be exploited somewhat easily. During its initial launch, the main additions to SIS II included fingerprints and photographs in alerts, and in 2023 it was the program Through data and improvements that have been promoted to their current functions, including the ability to indicate when someone is deported from a country. Bloomberg Representatives spoke to Roman Lano, a legal researcher in the European Union monitoring called statewatch, who warned that the attack would be “catastrophic, may affect millions of people.”

SIS II is now working on an isolated network, but it will be published soon in the European Union Which will make the biometric details a condition for individuals traveling to the areas associated with Schengen when it comes into effect, most likely later this year. Since ES will be connected to the Internet, the penetration on the SIS II database will become much easier.

Bloomberg and beacon Note that although most of the 93 million SIS II regiments’ records related to things like stolen vehicles, there are about 1.7 million interconnected people. He adds that people usually do not realize that their details are recorded in the database until the law is involved, so if the information is leaked, individuals may find that it is easier to evade the authorities.

SIS II’s development and maintenance is managed by a Paris -based contractor called Sopra Steria. According to the report, with the reporting of the weaknesses, they took between eight months and the following half a decade. This is although it is bound to fix problems that are of decisive importance within two months of the launch of the correction.

A spokesman for the Sopra Steria did not respond Bloomberg Regarding the detailed list of allegations related to the security holes of Sis II, but he said in a statement printed in the report that the European Union protocols had been adhered to. “As a major component of the European Union security infrastructure, SIS II is subject to strict legal, regulatory and contractual frameworks,” he said. “The role of Sopra Stera has been implemented according to these frameworks.”

The European Union, Lieza, the European Union agency, which oversees large-scale information technology systems such as SIS II, is regularly directing duties to foreign consulting companies instead of building their internal technology, according to the investigation. The review accused the agency of not informing its administration of the security risks that were marked, which she responded to saying that all the regimes under its administration “are subject to continuous risk assessments, surveying normal weakness, and testing security.”



https://s.yimg.com/ny/api/res/1.2/N.CccDjk9JNMU3GaOqbqig–/YXBwaWQ9aGlnaGxhbmRlcjt3PTEyMDA7aD04MDg-/https://s.yimg.com/os/creatr-uploaded-images/2025-07/d75b54a0-575c-11f0-bfe7-efae0a0f2e27

Source link

Leave a Comment