Ensuring Compliance with the EU CER Directive: Protecting Critical Fiber Optic Infrastructure

The European Union’s cybersecurity directive (NIS2) became legally binding across all EU member states on October 17, 2024. On the same day, member states were also required to outline measures for implementing the Critical Entities Resilience (CER) Directive, which takes effect in January 2025. Operators of critical fiber optic networks must adapt to ensure compliance.
This article explores how thorough risk analysis, proactive risk-reduction strategies, and continuous effectiveness checks are pivotal to meeting these directives.
Key technologies like fiber integrity monitoring and physical threat detection will be examined, alongside real-world applications in wind farms and pipelines. The article will also outline how these solutions can extend to sectors such as perimeter security, offering actionable insights for operators to strengthen their infrastructure resilience.
Directives Demand Change
The CER Directive has been adopted by the European Union (EU) to enhance the resilience of critical infrastructure and entities that provide essential services. The directive was adopted in December 2022, requiring member states to enact national legislation before coming into effect in October 2024. The previous Critical Infrastructure Directive (2008) is now superseded as the new CER Directive reflects the evolving security landscape characterized by increased cyber threats, climate change impacts, and geopolitical tensions.
To fully address the resilience of those entities that are critical for the proper functioning of the internal market, the directive creates an overarching framework that addresses the resilience of critical entities in respect of all hazards, whether natural or man-made, accidental or intentional.
The directive applies to essential services broadly grouped into 10 key sectors, including energy, transport, banking, health, water supply, and digital infrastructure –ensuring these entities can withstand and recover from a wide range of disruptions. Its scope includes both physical and digital risks, emphasizing a holistic approach to resilience.
Key to the CER Directive is the requirement for member states to identify “critical entities” based on their significance to the functioning of society and the economy. These entities must conduct risk assessments, implement security measures, and report significant incidents to the relevant authorities.
The directive aligns closely with the EU’s Network and Information Security Directive (NIS2), ensuring an integrated approach to both physical and cybersecurity.
NIS2 is the EU-wide legislation on cybersecurity that provides legal requirements to enhance the overall level of cybersecurity within the EU. Coming into force in 2023 (member states had until October 2024 to transpose the directive into law), NIS2 replaces the earlier 2016 rules to reflect increased digitization and evolving cybersecurity threats.
By expanding the scope of the cybersecurity rules to new sectors and entities, NIS2 further improves the resilience and incident response capacities of public and private entities, competent authorities and the EU as a whole.
Among its provisions, NIS2 mandates that member states have a Computer Security Incident Response Team (CSIRT) and a competent national network and information systems (NIS) authority. Similar to the CER directive, NIS2 promotes a culture of security across information-centric sectors that are vital for economies and society in general such as energy, transport, water, banking, financial market infrastructures, healthcare and digital infrastructure.
Fiber Optics are Critical to Infrastructure
Clearly, with the nature and amount of data they carry, fiber optic networks must be considered to be critical infrastructure for the purposes of both directives. This means that operators of these networks must embrace new measures and implement comprehensive risk management processes.
Primarily, this involves conducting thorough risk assessments, planning and executing risk-reducing measures, and regularly confirming their effectiveness. Wherever measures are found to be inadequate, additional steps must be taken to minimize any impact upon the economy or society.
Fiber Integrity: The physical integrity of the fiber is of prime importance, along with controlling access to the cable itself. Operators must be able to detect and localize fiber damage and / or breaks, and other incidents that could negatively impact operation. Many operators use an optical network monitoring system on their dark and lit fiber optic links. As well as assessing damage, the ONMSi system can also assess overall fiber health and monitor for degradation over time.
Maintaining fiber integrity also requires operators to restrict access to cables and identify any breaches. For this, passive, maintenance-free sensors are often used to monitor access points, manholes and distribution boxes to alert operators about any access – legitimate or unplanned / unauthorized. This approach to access monitoring can be implemented with the same fiber monitoring system and many consider this to be essential to meet the requirements of the directives.
Threat Detection: Ideally, potential breaches of any critical infrastructure will be detected before the cable is reached. Another area is of interest is physical threat detection for critical infrastructure. This entails real-time detection, notification, and location of threats, third party interference, perimeter intrusions, and anomalies anywhere along the infrastructure.
Fiber optic sensing technologies such as Distributed Acoustic Sensing (DAS) are valuable due to their ability to differentiate between various types of disturbances, such as mechanical or manual digging near cables. Additionally, DAS can be used for virtual fencing or to provide proximity alerts that will detect people or vehicles approaching infrastructure.
DAS technology is essential in ensuring regulatory compliance and operational security, mitigating the risk of accidental damage or deliberate third-party interference by identifying and pinpointing threats.
Besides the physical security, operators must be mindful of data integrity and network availability as well. While fiber optics cannot be ‘eavesdropped’ in the same way that copper cables can, there are still risks to data being disrupted or networks rendered unavailable. For any data network, accurate timing of clock signals and synchronization throughout the network are critical to ensure basic functioning and operation. Any disruption to the Precision Timing Protocol (PTP), or the timing (clock) information it distributes, can lead to data loss, disrupting a network and rendering it unavailable.
Techniques such as high-precision timing analysis and synchronization verification can prevent this loss of data and disruption of the network itself, thus minimizing failure risks and ensuring the reliability of critical communication systems. This verification is crucial for maintaining the integrity of modern communication networks, including 5G.
Critical Infrastructure in Real-Life Scenarios
Renewable energy installations, such as wind farms, are providing an ever-increasing level of electrical power. This will only increase in the future, making these facilities a crucial component of energy infrastructure. Ensuring the reliability and efficient operation of these installations is paramount, and fiber sensing technology is instrumental in day-to-day operation.
Using the unique properties of optical fibers, operators can detect changes in temperature, strain, and acoustic vibration (sound) along the length of a fiber. With these fibers already integrated into the infrastructure of wind farms the structural health and operating conditions can be continuously monitored remotely.
By requirement, turbines are located where wind is consistent – either remote onshore locations or, increasingly, offshore where they have to endure waves, tidal forces, tectonic activity, and corrosive saltwater. In either scenario they are connected to the main national power grid through array cables and export cables which are critical for getting energy to where it is needed. Techniques such as Distributed Strain Sensing (DSS) and Distributed Acoustic Temperature Sensing (DTS), or a combined temperature and strain measurement (DTSS,) monitor changes in strain and temperature to provide valuable data on the structural integrity of these cables, often allowing a repair or remedial action to be effected before a complete failure occurs.
By utilising fiber already embedded into or bonded onto those cables, DSS, DTS or DTSS can be used to monitor cable integrity, detecting issues such as depth of burial changes for underground cables, stress and strain due to movement or icing, mechanical damage, or thermal anomalies. Understanding cable temperature is also critical to optimise cable power transfer, too much power and you risk overheating and potentially melting cables, so operators use DTS to calculate the Real Time Thermal Rating (RTTR) of cables which enables them to maximise/optimise power transfer while preserving the operational life of the cables.
Offshore turbine power cables are also subject to some unique risks such as damage from ship’s anchors or fishing trawlers. Distributed Acoustic Sensing (DAS) can detect threats in the environment around infrastructure, like disturbances caused by fishing gear or ship anchors, providing proximity warnings and identifying potential risks. As this is done in real-time, operators can take immediate action to mitigate the impact, such as intercepting or rerouting vessels or triggering an investigation to identify which vessel was in the areas so that any damage claims can be made against the operator, cable repairs at sea can be a costly thing.
With the continuous data available on the condition of the turbines, cables and other aspects of the power infrastructure, operators can see change as soon as it happens and track any degradations over time. This allows operators to predict when and where maintenance is needed, preventing unexpected failures, reducing downtime and saving the significant costs associated with total failure.
Pipelines are equally critical in transporting energy in the form of a liquid or gas. Given the volatile nature of these substances, ensuring the safety and integrity of pipelines is paramount. Here also, fiber sensing technology offers unparalleled capabilities for real-time monitoring and early detection of potential issues. Recognizing the benefits of this technology, it has become mandatory to include fiber sensing for new pipelines and in some cases retrofitting the technology to existing infrastructure.
By embedding fiber optic cables nearby or attaching them to pipelines, operators can continuously monitor the structural health and operational conditions of these critical assets. A huge advantage of fiber sensing technology is the ability to detect leaks at an early stage using either DAS or DTS depending on what the pipeline is transporting. In some cases, a mix of both is used.
Unlike traditional inspections that require personnel and equipment to be transported to remote and often inhospitable regions, fiber sensing can be performed remotely. Additionally, fiber sensing is less likely to miss a small leak in the way that an engineer could.
Similar to power cables, fiber sensing can monitor any changes to the structural integrity of pipelines due to environmental factors, operational pressures, and aging infrastructure. It can also use DAS to detect unauthorized activities such as digging or tampering, thereby preventing sabotage and theft.
Regular monitoring and maintenance based on fiber sensing data can significantly extend the lifespan of pipelines. By identifying and addressing potential issues early, operators can prevent the deterioration of pipeline materials and ensure their long-term integrity. This proactive approach not only enhances safety but also maximizes the return on investment for pipeline infrastructure.
Conclusion
Fiber sensing technology is continually evolving, with constant innovation enhancing capabilities and increasing sensitivity. Most recently, technologies such as DAS have enabled even greater sensitivity and accuracy in detecting changes along pipelines and cables. Now, operators can differentiate between various types of disturbances, such as vehicle movements, manual versus mechanical digging, and leaks, offering a very comprehensive monitoring solution.
Fiber sensing technology is transforming the way we monitor and maintain remotely located energy infrastructure. Its ability to provide real-time, continuous data on the condition of assets offers significant advantages in terms of safety, efficiency, and cost-effectiveness.
As fiber sensing continues to advance, operators can expect even greater improvements in energy infrastructure monitoring and management thereby ensuring the integrity and longevity of critical infrastructure, safeguarding both the environment and their investments.
Douglas Clague, Solutions Marketing Manager - Fiber Optic Field Test – VIAVI Solutions.

CISA and Partners Issue Fast Flux Cybersecurity Advisory

The Cybersecurity and Infrastructure Security Agency (CISA) joined the National Security Agency (NSA) and other government and international partners to release a joint Cybersecurity Advisory (CSA) that warns organizations, internet service providers (ISPs), and cybersecurity service providers about fast flux enabled malicious activities that consistently evade detection. The CSA also provides recommended actions to defend against fast flux.
An ongoing threat, fast flux networks create resilient adversary infrastructure used to evade tracking and blocking. Such infrastructure can be used for cyberattacks such as phishing, command and control of botnets, and data exfiltration. This advisory provides several techniques that should be implemented for a multi-layered security approach including DNS and internet protocol (IP) blocking and sinkholing; enhanced monitoring and logging; phishing awareness and training for users; and reputational filtering.
 "Threat actors leveraging fast flux techniques remain a threat to government and critical infrastructure organizations. Fast flux makes individual computers in a botnet harder to find and block. A useful solution is to find and block the behavior of fast flux itself,” said CISA Deputy Executive Assistant Director for Cybersecurity Matt Hartman. “CISA is pleased to join with our government and international partners to provide this important guidance on mitigating and blocking malicious fast flux activity. We encourage organizations to implement the advisory recommendations to reduce risk and strengthen resilience."
The authoring agencies encourage ISPs, cybersecurity service providers and Protective Domain Name System (PDNS) providers to help mitigate this threat by taking proactive steps to develop accurate and reliable fast flux detection analytics and block fast flux activities for their customers.
Additional co-sealers for this joint CSA are Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand National Cyber Security Centre (NCSC-NZ).

More than 300 arrests as African countries clamp down on cyber threats

Authorities in seven African countries have arrested 306 suspects and seized 1,842 devices in an international operation targeting cyber attacks and cyber-enabled scams.
The arrests were made as part of Operation Red Card (November 2024 – February 2025) which aims to disrupt and dismantle cross-border criminal networks which cause significant harm to individuals and businesses. In particular, the operation targeted mobile banking, investment and messaging app scams. The cases uncovered during the operation involved more than 5,000 victims.
As part of the crackdown, Nigerian police arrested 130 people, including 113 foreign nationals, for their alleged involvement in cyber-enabled scams such as online casino and investment fraud. The suspects, who converted proceeds to digital assets to conceal their tracks, were recruited from different countries to run the illegal schemes in as many languages as possible. Nigerian authorities have established that some of the people working in the scam centres may also be victims of human trafficking, forced or coerced into criminal activities. Overall, the investigation led to the seizure of 26 vehicles, 16 houses, 39 plots of land and 685 devices.
In a significant case from South Africa, authorities arrested 40 individuals and seized more than 1,000 SIM cards, along with 53 desktops and towers linked to a sophisticated SIM box fraud scheme. This setup, which reroutes international calls as local ones, is commonly used by criminals to carry out large-scale SMS phishing attacks.
In Zambia, officers apprehended 14 suspected members of a criminal syndicate that hacked into victims’ phones. The scam involved sending a message containing a malicious link which, when clicked, installed malware to the device. This allowed hackers to take control of the messaging account, and ultimately the phone, giving them access to banking apps. The hackers were also able to use the victim’s messaging apps to share the malicious link within conversations and groups, enabling the scam to spread.
During the operation, Rwandan authorities arrested 45 members of a criminal network for their involvement in social engineering scams that defrauded victims of over USD 305,000 in 2024 alone. Their tactics included posing as telecommunications employees and claiming fake ‘jackpot’ wins to extract sensitive information and gain access to victims’ mobile banking accounts. Another method involved impersonating an injured family member to ask relatives for financial assistance towards hospital bills. Overall, USD 103,043 was recovered and 292 devices were seized.

Aviation, maritime and telecoms agencies raise alarm over increase in jamming and spoofing of satellite navigation systems

Increasing incidents of interference with aviation, maritime and other satellite telecommunications services mean states must urgently enhance the protection of a critical radio-frequency band, the International Civil Aviation Organization (ICAO), International Telecommunication Union (ITU) and International Maritime Organization (IMO) said with “grave concern" in a joint statement.
These cases of harmful interference are in the form of jamming and spoofing that disrupt Global Navigation Satellite Systems (GNSS) operating in the frequency bands allocated to the Radio Navigation Satellite Service (RNSS).
Global Navigation Satellite Systems are constellations of Earth-orbiting satellites that provide positioning, navigation and timing services worldwide that are critical for the safety and efficiency of civilian aircraft, maritime vessels, humanitarian assistance vehicles, as well as for time synchronization of telecommunications networks.
"Global Navigation Satellite Systems are critical to our safety on land, at sea and in the air," said ITU Secretary-General Doreen Bogdan-Martin. “Member States should ensure the uninterrupted operation of these systems for everyone's safety and the resilience of essential services that our lives depend on."​
The joint statement cosigned by the three UN agencies requests Members States to:
- protect the RNSS from transmissions that can adversely cause harmful interference degrading, interrupting or misleading signals used for civilian and humanitarian purposes;
- reinforce resilience of the systems which rely on RNSS for navigation, positioning and timing in relation to this type of interference;
- retain sufficient conventional navigation infrastructure for contingency support in case of RNSS outages and misleading signals, and develop mitigation techniques for loss of services;
- increase collaboration between radio regulatory, civil aviation, maritime, defence and enforcement authorities; and
- report cases of harmful interference affecting RNSS to the appropriate telecommunication, aeronautical and maritime authorities, and to the ITU Radiocommunications Bureau, to enable the monitoring of the situation.
“Protecting radiocommunications systems from harmful interference is at the core of ITU's mandate," said Mario Maniewicz, Director of the ITU Radiocommunication Bureau. “We call on our Members to make responsible use of the radiofrequency spectrum, which is a precious, natural and shared resource we rely on for communicating, travelling and working in our daily lives."
Jamming is an unnecessary transmission, or the transmission of superfluous signals, or the transmission of signals without identification.
Spoofing is the broadcast of GNSS-like signals that can cause a GNSS receiver in a vessel or aircraft to calculate erroneous positions and provide false guidance.

Tackling cybercrime: common challenges and legislative solutions identified by Europol and Eurojust

The latest joint report by Europol and Eurojust, Common Challenges in Cybercrime, explores the persistent and emerging issues that hinder cybercrime investigations. This year’s edition not only identifies key obstacles—particularly in the field of digital evidence—but also examines how new legislative measures could help address them.
The report highlights several pressing challenges faced by law enforcement, including the overwhelming volume of digital data, the risk of data loss, and the persistent barriers to accessing critical information due to legal and technical constraints. The increasing use of anonymisation services has further complicated efforts to track criminal activities online.
To help mitigate these challenges, the report explores the impact of new EU legislative tools, such as the e-Evidence Package, the Digital Services Act, and the EU AI Act. These instruments aim to facilitate data access, improve cross-border cooperation, and enhance investigative capabilities. However, their effectiveness will largely depend on how they are implemented and integrated into existing operational strategies.
The report also underscores the value of the strategic cooperation between Europol and Eurojust, highlighting initiatives such as the SIRIUS Project, which has strengthened collaboration in cybercrime investigations. These efforts continue to play a crucial role in helping law enforcement agencies navigate an increasingly complex digital landscape.
While challenges remain, the report emphasises the potential of these new legislative measures to strengthen the fight against cybercrime. Equipping law enforcement with the right tools and ensuring their effective use in investigations will be key to staying ahead of evolving cyber threats.

NSA, CISA, FBI, and International Partners Release Cybersecurity Advisory on “Fast Flux,” a National Security Threat

CISA—in partnership with the National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand’s National Cyber Security Centre (NCSC-NZ)—released joint Cybersecurity Advisory Fast Flux: A National Security Threat (PDF, 841 KB). This advisory warns organizations, internet service providers (ISPs), and cybersecurity service providers of the ongoing threat of fast flux enabled malicious activities and provides guidance on detection and mitigations to safeguard critical infrastructure and national security.

“Fast flux” is a technique used to obfuscate the locations of malicious servers through rapidly changing Domain Name System (DNS) records associated with a single domain name. This threat exploits a gap commonly found in network defenses, making the tracking and blocking of malicious fast flux activities difficult.

The authoring agencies strongly recommend adopting a multi-layered approach to detection and mitigation to reduce risk of compromise by fast flux-enabled threats. Service providers, especially Protective DNS providers (PDNS), should track, share information about, and block fast flux as part of their provided cybersecurity services. Government and critical infrastructure organizations should close this ongoing gap in network defenses by using cybersecurity and PDNS services that block malicious fast flux activity.

MS-ISAC Releases New Report Highlighting the Critical Role of Information Sharing in National Security

MS-ISAC recently released a new report titled “Strengthening Critical Infrastructure,” highlighting the growing cyber threats to critical infrastructure and the essential role of information sharing between state and local government organisations in national security. The report brings awareness to a surge of attacks by nation-state-affiliated and other criminal groups targeting state, local, tribal, and territorial (SLTT) installations that often contribute to undermining public trust.

The unrelenting attacks facing U.S. critical infrastructure, when successful, have significant and costly direct impacts on government services and undermine American’s confidence in the nation’s ability to defend itself. Critical infrastructure underpins nearly all aspects of society and the threats that critical infrastructure faces require a national-level response. MS-ISAC draws awareness to the critical role that SLTT and information sharing organisations play in providing this response in the report:

“Information Sharing and Analysis Centers (ISACs) provide significant support to many SLTT organisations. For instance, ISACs like WaterISAC and the Electricity ISAC support SLTT organisations in those SLTT sub-sectors as part of the broader water and electricity critical infrastructure sectors, respectively.”

MS-ISAC’s report is very helpful in understanding the relationship between SLTT and information sharing organisations and how these relationships provide a critical service to the various sectors they oversee. In other words, information sharing is critical for the organisations that make up the critical services American citizens rely on.

Improving Red Teaming for Critical Infrastructure Protection: A Comprehensive Approach

By Aurora García, a journalist and consultant specializing in security and cybersecurity.

In the world of cybersecurity, the term “Red Team” traditionally refers to simulated adversaries tasked with testing a system’s defenses. However, as the threat landscape becomes increasingly sophisticated and multifaceted, the approach to Red Team operations must evolve. Protecting critical infrastructure is no longer just about technological defenses; it requires a holistic approach that encompasses both technical and human aspects.
A true Red Team operation must go beyond conventional penetration tests and vulnerability assessments. It needs to integrate every aspect of an organization’s security posture, involving not only IT departments but also human, operational, and strategic layers of the organization. Cybersecurity is not only about firewalls, encryption, and penetration tests. It’s about understanding the vulnerabilities that extend to organizational processes, behaviors, and decision-making. When it comes to critical infrastructure, these vulnerabilities can have far-reaching consequences beyond the digital realm.
Understanding the Full Scope of Red Teaming
When executed correctly, Red Team missions simulate real-world threats by evaluating not only the technology but also the behaviors, processes, and policies that could be exploited by adversaries. We live in an era where social engineering, misinformation, and internal threats are increasingly common tactics used by attackers. The human factor, whether intentional or not, remains the most significant vulnerability in any cybersecurity strategy. From spear-phishing to poorly implemented security protocols, organizations are often their own worst enemies.
In the context of critical infrastructure, where the stakes are particularly high, Red Team engagements must go beyond identifying technical flaws. Effective Red Teams must operate with the understanding that human vulnerabilities, communication breakdowns, and organizational inertia can be just as dangerous as any exploited firewall or malware. For this reason, a successful Red Team mission should include training and simulations at all levels of the organization, ensuring that the response to cyber threats is unified and well-coordinated.
Example of Planets: An Integrated Model for Critical Infrastructure
To illustrate how a comprehensive approach can be effectively applied, we can refer to the Planets system, which I developed specifically for protecting critical infrastructure in a bank. Planets is a system based on the TIBER-EU framework, designed to overcome the limitations of conventional Red Team missions.
The model consists of several “planets” that work in coordination, covering all aspects of protection. Épsilon, the first planet, is made up of a multidisciplinary team that conducts a thorough risk assessment of the bank, considering not only technological threats but also criminal trends and operational characteristics of the client. The next step is the Gamma planet, which prepares the infrastructure for Alpha to identify vulnerabilities before the real attack takes place. Finally, Omega executes the simulated attack in its final phase, while Delta focuses on threat prospecting, anticipating potential criminal products and developing strategies to stay one step ahead of attackers.
This integrated approach allows Red Team teams to not only assess threats but also act proactively, incorporating both human and technological elements into a much more realistic simulation.
Beyond the Screen: Incorporating Human Elements into Red Team Missions
When designing Red Team missions, it’s essential to think of them as real-world scenarios. Cyberattacks rarely occur in isolation; they are often part of a broader strategy designed to exploit both technology and human systems. A Red Team should consider how an attacker might use social engineering tactics, internal threats, and even the media to manipulate situations to their advantage. The key to success is not just understanding how to penetrate a network, but anticipating how an adversary might exploit a weak link within the organization’s human framework.
At its core, Red Teaming is about creating the most accurate and complete model possible of the adversary’s potential behavior. By integrating human intelligence into the process, Red Teams can simulate more realistic threats that go beyond traditional technical penetration tests. The result is not only identifying vulnerabilities but better preparing the organization for a coordinated and multifaceted attack.
Adapting Red Teaming to the Evolving Threat Landscape
The global cybersecurity environment is rapidly changing, and the protection of critical infrastructure is no longer a passive activity. Organizations must anticipate and stay ahead of evolving threats. By leveraging intelligence-driven Red Team operations, companies can design security strategies that are adaptive and proactive.
The next step in the evolution of Red Teaming is not simply improving technical capabilities but developing a deeper understanding of how adversaries operate on all fronts. Red Team members should come from diverse fields, not just cybersecurity professionals, but also behavioral analysts, communication experts, and even crisis management specialists. Only through a multidisciplinary approach can Red Team missions provide the most realistic and insightful assessments of critical infrastructure defenses.
In the face of increasingly complex threats, Red Teams must embrace both the technical and human aspects of cybersecurity. The goal is not merely to simulate attacks but to understand how vulnerabilities can be exploited across a wide spectrum of organizational activities.
By focusing on the integration of both technical and human elements, Red Teams can help organizations transition from a reactive security posture to a proactive one, ensuring that critical infrastructures remain secure and resilient in the face of evolving threats.

ITU and ESA agree on optimising satellite communications

The International Telecommunication Union (ITU) and the European Space Agency (ESA) have announced a collaborative effort to improve mitigation measures against harmful interference in satellite systems.

The joint initiative, reflecting United Nations objectives under the 2030 Agenda for Sustainable Development, aims to ensure the sustainable and efficient use of limited space-based communication resources.

Both organisations recognise growing complexities in managing finite spectrum and orbital resources. An agreement signed in Barcelona, Spain, formalises their plans for closer cooperation on key issues for global digital communications.

Under the agreement, ITU and ESA will work together on:

  • Sustainable and efficient spectrum use: Ensuring that radio frequency spectrum for satellite systems is utilised in a responsible and effective manner.
  • Development of space-based monitoring technologies: Exploring and potentially developing advanced technologies for monitoring the use of radio frequencies to identify and geolocate sources of harmful interference.
  • Exchange of information and expertise: Facilitating knowledge-sharing between the two organisations to enhance space communication systems and regulatory frameworks.

Space-based communication technologies are increasingly crucial for global connectivity, scientific research, and emergency response systems. At the same time, growing numbers of satellites and increasing risks of signal interference necessitate innovative, increasingly complex, and highly coordinated spectrum management solutions.

“Innovation and regulations are key to facilitate and preserve access to spectrum-orbit resources free from harmful interference,” said Mario Maniewicz, Director of ITU Radiocommunications Bureau. “This agreement is the first step towards a series of joint ESA-ITU efforts to ensure sustainability of space radio-communications systems.”

Preserving radio waves for all

ITU, as the UN specialised agency for information and communication technologies, has long been at the forefront of coordination among countries and regions on radio frequencies and satellite orbits worldwide. ITU Resolution 189 (Rev. Bucharest, 2022) emphasises the importance of transparency and confidence-building in outer space activities.

ESA, an intergovernmental organisation established in 1975, supports space research and technology development for peaceful and scientific purposes. Together, ITU and ESA aim to strengthen international efforts in satellite monitoring and interference mitigation, ensuring reliable and sustainable access to satellite communication services worldwide.

“Promoting the responsible use of spectrum and preserving it from interferences is key to ensure the viability of our operators and ultimately the service delivered to their customers,” said Laurent Jaffart, ESA’s Director of Connectivity and Secure Communications. “Together with ITU, we will promote the importance of ensuring the sustainability of this limited and valuable resource and will collaborate towards establishing good practices for its responsible use for the benefit of society and businesses.”

A step towards a sustainable digital future

By combining their expertise and resources, ITU and ESA could set a precedent for enhanced cooperation in the field of satellite communications.

“The shared commitment to responsible spectrum management and technological innovation marks a significant step toward a sustainable digital future for everyone,” said Mr Maniewicz. “This initiative underscores the importance of international collaboration in addressing the challenges and opportunities presented by space technologies.”

Maniewicz and Jaffart signed for their respective organisations at the Mobile World Congress (MWC2025 Barcelona).

As the demand for satellite-based services continues to grow, partnerships like this will help maintain the integrity and accessibility of global communication networks.

ITU and ESA have reaffirmed their dedication to a future where space technologies contribute positively to societal progress and sustainable development.

Major Nuclear Repository Adopts New Fully Searchable Digital Platform

The IAEA’s International Nuclear Information System, a multi-million strong digital library, has been further strengthened with the addition of a modern repository platform.

Founded in 1970, the International Nuclear Information System (INIS) Repository hosts a massive library of nearly five million reports, books, scientific articles, conference papers and other knowledge products covering topics in nuclear science, reactor technology, materials science, medical applications, decommissioning, and all other areas the IAEA is involved in.

Using Invenio, an open-source platform developed by the European Organization for Nuclear Research (CERN) and tailoring it to its own needs the Agency was to make advancements in automation and accessibility as well as a major increase in capacity for handling new knowledge product entries in INIS. The new functionalities built with the platform allow INIS to connect with other repositories, facilitating the sharing of content and expanding the utility of all participating databases. INIS will be the first large repository to implement full-text search with Invenio – searching both the metadata and the text of a PDF.

“In today’s knowledge-based economy, information is considered one of the most valuable resources. It is critical for research, innovation, decision making, efficiency and productivity, knowledge sharing and continuous learning,” said Dibuleng Mohlakwana, Head of the IAEA’s Nuclear Information Section. “This new platform will help INIS expand its role as a global player in open science improving its capabilities as an information hub that facilitates the pursuit of nuclear science for peaceful purposes.”

INIS relies on contributions from more than 130 countries and 11 international organizations, with well over 100 000 new knowledge products being added each year.  INIS staff supplement national contributions by harvesting information from some of the largest publishers, including Elsevier, Nature-Springer and the Institute of Physics.

The landscape of scientific publishing has changed greatly in the years since INIS was founded, with an increasing emphasis on open access. Publishers are providing more information and making it freely available, while repositories such as arXiv, the Directory of Open Access Journals, PubMed, etc. have made scientific knowledge more accessible than ever before.

“One of the great things about this platform is that whatever we develop here can be shared with all the other organizations. So not only are we sharing scientific information with the world, but we’re also sharing what we develop with Invenio,” said Astrit Ademaj, Nuclear Systems Support Analyst and Project Manager for the implementation of Invenio. INIS is the first large repository to implement full-text search – searching both the metadata and the text of a PDF.

Knowledge products entered into Invenio will be automatically categorized and tagged with descriptors. This had previously been done manually in what had been a highly time-consuming endeavour. This work will now primarily be handled by NADIA (Nuclear Artificial intelligence for Document Indexing and Analysis), an AI tool developed by the IAEA. Previously, contributors sent their entries using a unique language and format. Now a user-friendly form is provided, so specialized knowledge and training are no longer necessary.

"Many of the items available on INIS are quite fascinating," said Brian Bales, INIS Coordinator. “One of the most popular recent additions is the Prospective Study Bluebook on Nuclear Energy to Support Low Carbon – a cooperative effort between nuclear companies in China and France to address the challenges of climate change. Over the last 5 years, we’ve added over 600 000 such knowledge products.”

1 2 3 4 57