ctipilot.ch

Europol EU Anti-Scam Platform — weekly LE-only fraud intelligence, EC3+EFECC operational hub

policy · policy:europol-anti-scam-platform-2026

Coverage timeline
1
first 2026-05-18 → last 2026-05-18
Briefs
1
1 distinct
Sources cited
8
6 hosts
Sections touched
1
weekly_summary
Co-occurring entities
5
see Related entities below

Story timeline

  1. 2026-05-18CTI Weekly Summary — 2026-W21 (Mon 18 – Sun 24, 2026)
    weekly_summaryConsolidated in weekly summary for week 2026-W21

Where this entity is cited

  • weekly_summary1

Source distribution

  • computerweekly.com2 (25%)
  • helpnetsecurity.com2 (25%)
  • amlintelligence.com1 (12%)
  • correctiv.org1 (12%)
  • home-affairs.ec.europa.eu1 (12%)
  • heise.de1 (12%)

Related entities

All cited sources (8)

Items in briefs about Europol EU Anti-Scam Platform — weekly LE-only fraud intelligence, EC3+EFECC operational hub (3)

Europol EU Anti-Scam Platform — weekly law-enforcement-only fraud intelligence; EC3 + EFECC operational hub [SINGLE-SOURCE: AML Intelligence]

From CTI Weekly Summary — 2026-W21 (Mon 18 – Sun 24, 2026) · published 2026-05-18 · view item permalink →

Europol launched the EU Anti-Scam Platform (~29 April 2026) at the European Anti-Financial Crime Summit. The platform produces weekly law-enforcement-only briefings (via SIENA) covering prevalent fraud types, financial losses, victim demographics, scammer TTPs, and transaction footprints. Swiss fedpol and KOBIK have Europol liaison access via bilateral agreements; financial intelligence outputs may feed into MROS/AMLA channels. Swiss financial sector entities under AMLA supervision should note this as an emerging source of new suspicious-transaction-report typologies. [SINGLE-SOURCE]

Europol IOCTA 2026

From CTI Weekly Summary — 2026-W19 (May 04 – May 10, 2026) · published 2026-05-11 · view item permalink →

The Internet Organised Crime Threat Assessment 2026 (published 2026-04-28) was Europol's first IOCTA to identify the interweaving of state-sponsored hybrid threats with criminal actors as the defining strategic risk for EU public-sector defenders. The cross-finding pattern between IOCTA's framing and the rest of 2026-W19 is unusually direct: the WorldLeaks / ShinyHunters operator family targeting government identity registries and politically significant EU media entities, the named-cluster attribution on Polish water OT to APT28 + APT29 + UNC1151 sharing initial access tradecraft with hacktivist information operations, and the Bauman / GRU pipeline investigation (§ 7) all illustrate the convergence IOCTA flagged. For public-sector procurement and identity-management functions specifically, IOCTA's identification of public institutions, major technology companies, and EU citizens' personal data as primary risk targets matches the week's incident concentration exactly. (Europol IOCTA, 2026-04-28; daily 2026-05-06 first coverage).

Europol shadow-IT — LIBE committee MEPs call for mandate-expansion pause; EDPS sanctioning toolkit identified as binary

From CTI Weekly Summary — 2026-W19 (May 04 – May 10, 2026) · published 2026-05-11 · view item permalink →

The Correctiv / Solomon / Computer Weekly joint investigation (2026-05-05; first covered 2026-05-07) drove a material EU-legislative response within the window. On 8 May the LIBE committee met to discuss the disclosure; multiple MEPs — German Left MEP Özlem Alev Demirel, Belgian Green MEP Saskia Bricmont, German S&D MEP Birgit Sippel — called on the Commission to pause any expansion of Europol's mandate until parliamentary intervention powers and independent supervision are strengthened (Computer Weekly, 2026-05-08). EDPS chief Wojciech Wiewiórowski told the LIBE meeting that EDPS enforcement has a binary-only toolkit — soft admonishments or hard processing-cessation orders — with no intermediate sanctions, and that enlarging Europol without strengthening EDPS sanctioning power would be counterproductive. Why this is obligations-changing: the European Commission's 2026 work programme envisages a new Europol Regulation proposal in Q2 2026, meaning the parliamentary backlash lands directly in the legislative window. Per Correctiv's investigation, the EDPS closed monitoring of the CFN platform in February 2026 despite 15 of 150 remediation recommendations remaining unimplemented — a decision now facing retrospective scrutiny (Correctiv investigation, 2026-05-05).

Background, restated from § 5: a Correctiv / Solomon / Computer Weekly joint investigation revealed that Europol's CFN (Computer Forensic Network, since 2012) and "Pressure Cooker" (Internet Referral Unit) data-processing platforms — holding ≥ 2 PB — operated outside EU data-protection oversight for over a decade (Correctiv, 2026-05-05 · Computer Weekly investigation, 2026-05-05 · daily 2026-05-07). Multiple categorised security deficiencies were identified in the 2019 internal assessment including absent administrative usage logs and inability to track data access or detect unauthorised modifications. What defenders need to do differently: agencies contributing intelligence to Europol-adjacent information-sharing chains (SIE, SIENA, Europol Platform for Experts) should treat the documented control deficiencies (absent audit logs, missing event monitoring, inability to track data access or detect unauthorised modifications, ineffective role assignment) as an ongoing data-integrity and confidentiality risk rather than a closed historical finding; internal audit functions should re-confirm closure evidence on regulator-mandated remediation tasks rather than rely on regulator monitoring termination as confirmation of remediation completeness.