Legal Intelligence (LEGINT)



Legal Intelligence (“LEGINT”) is a new, original term, used in Defensive Hybrid Intelligence. It does not appear in existing intelligence doctrine, academic literature, or private sector risk management frameworks.

LEGINT is defined as the lawful identification, collection, fusion, and interpretation of information relevant to the creation, interpretation, application, evolution, and enforcement of legal norms around the world. It enables a structured comprehension of the legal vectors inherent in hybrid threats, and provides a framework for guiding proportionate, defensible, and strategically aligned institutional responses across fragmented, overlapping, and multi jurisdictional regulatory environments.

Hybrid campaigns mix coordinated cyber operations, information manipulation, economic coercion, supply chain interference, regulatory destabilization attempts, and actions by state or state proxied actors operating below the threshold of armed conflict. They design complex legal consequences across national and international legal orders. LEGINT integrates early warning intelligence designed to detect, interpret, and forecast the legal vectors exploited by such attacks, and the legal countermeasures that can be employed.

LEGINT includes the continuous monitoring of legislative signals, supervisory communications, regulatory stress scenarios, doctrinal trends, administrative emergency powers, and international legal frameworks relevant to national security, sovereignty, digital resilience, and public order protections. These signals must be subject to structured analysis to assess their authority, normative weight, operational implications, and their role in shaping the legal perimeter within which hybrid adversaries operate. A critical component is the identification of legal asymmetries and regulatory vulnerabilities that hybrid actors may seek to weaponize, including gaps in jurisdictional reach, inconsistencies in enforcement mechanisms, deficiencies in cross border cooperation, and ambiguities in crisis response mandates.

LEGINT may use predictive modelling to forecast how legal orders are likely to react when confronted with hybrid destabilization campaigns. This includes anticipating the activation of emergency legal frameworks, the imposition of sanctions or restrictive measures, the adoption of accelerated rulemaking, the strengthening of supervisory mandates, the modification of attribution standards, and the judicial interpretation of state responsibility, due diligence obligations, or corporate liability in the context of hybrid operations.

LEGINT plays a critical role in assessing the legality, proportionality, and foreseeable consequences of defensive measures undertaken by private entities in response to hybrid attacks. It contributes to the evaluation of the legal thresholds for invoking specific countermeasures, crisis management processes, incident reporting obligations, and cross border cooperation mechanisms, while ensuring alignment with constitutional guarantees, fundamental rights, and public international law constraints.

As an intelligence discipline, LEGINT must have a forward looking character. It includes legal risk forecasting based on legislative intent, regulatory consultations, policy announcements, political dynamics, judicial trends, and systemic shifts in the regulatory ecosystem. LEGINT must provide predictive insight into the direction, scope, and intensity of legal and supervisory interventions, contributing to strategic planning.

In operational terms, LEGINT transforms raw legal information into structured analytical outputs capable of supporting legal strategy, compliance management, risk assessment, and board level decision making.


Is LEGINT another name for legal research?

LEGINT extends far beyond traditional legal research. It integrates methodologies derived from:

1. Intelligence analysis. It is the transformation of fragmented, uncertain, and often ambiguous data, drawn from multiple sources, into reasoned judgments about current and future affairs that are material to business, obligations, exposures, and governance responsibilities.

This is very important in a hybrid threat environment, as hybrid actors deliberately use and develop information ambiguity, legal uncertainty, and jurisdictional complexity as strategic tools.

With intelligence analysis, boards and senior management make better decisions on the likelihood and the impact of being targeted, the modus operandi of adversaries, on what has happened in other organizations, the options they have for reporting or escalation, or whether a pattern of activity constitutes a violation of sanctions, data protection law, critical infrastructure mandates, or national security legislation.

Hybrid adversaries often operate through deniable proxies, exploit legal grey zones, and synchronize cyber, informational, economic, and regulatory levers to achieve cumulative effect. The analyst applies structured techniques, such as link analysis, temporal sequencing, hypothesis testing, deception detection, and scenario construction, to determine whether the available facts indicate intentional coordination.

Link analysis is used to map relationships between actions, actors, institutions, timelines, and legal instruments, revealing hidden connections or patterns of influence.

Temporal sequencing examines the order and timing of events, such as legal amendments, regulatory actions, media narratives, or geopolitical developments, to identify whether the sequence reflects natural evolution or deliberate orchestration.

Hypothesis testing provides a disciplined method for evaluating alternative explanations, ensuring that assessments remain balanced and evidence driven.

Deception detection helps identify whether certain legal or regulatory moves are being masked, misrepresented, or framed in a way that misleads stakeholders or obscures true motives.

Scenario construction allows the analyst to model potential outcomes, anticipate how adversaries might use legal pathways as instruments of pressure or disruption, and determine the organisation’s defensive posture in each scenario.

Together, these techniques enable the LEGINT analyst to reduce uncertainty, mitigate cognitive bias, and give institutions a better understanding of how legal dynamics may be weaponised in hybrid campaigns.


2. Comparative law. It is the methodical examination of legal norms, institutional architectures, enforcement models, and doctrines across different jurisdictions for the purpose of identifying convergences, divergences, normative conflicts, and regulatory asymmetries. Through comparative analysis, LEGINT clarifies how similar legal problems are addressed across legal orders, and assesses the implications of cross-border regulatory interaction, extraterritoriality, and mutual recognition mechanisms for the entity’s legal position.

Hybrid campaigns, orchestrated by states or state proxied actors, systematically exploit gaps, inconsistencies, and ambiguities across different legal systems. These campaigns rely on the fact that legal systems vary in their definitions of prohibited behaviour, their attribution standards, their thresholds for triggering emergency powers, and their institutional capacities to detect and disrupt adversarial activity. With comparative law, analysts map how hybrid actors could use these transnational differences in their campaigns.

Comparative law provides the analytical tools to identify vulnerabilities. It clarifies, for example, how national security legislation is structured in one jurisdiction compared to another, how incident reporting obligations vary across critical sectors, how public authorities interpret due diligence and oversight duties, how sanctions law is enforced, and how courts approach questions of attribution, corporate liability, and state responsibility in ambiguous operational environments.

Comparative law contributes directly to early warning and anticipatory governance. By examining legislative developments, judicial reasoning, and supervisory priorities across multiple jurisdictions, the analyst can detect emerging trends that hybrid actors might exploit, or that regulators may soon enforce.

Hybrid campaigns thrive in environments where legal norms evolve unevenly. Comparative law is a compass guiding institutions through the fragmentary, contested, and rapidly evolving normative landscape in which hybrid threats operate.


3. Jurisprudence. It is the body of principles, methods, and reasoning through which courts interpret and apply the law. It includes the doctrines that judges develop over time, the interpretive frameworks they use to resolve ambiguity or conflict in legal texts, and the conceptual foundations that underpin the legal system as a whole.

In very simple words, jurisprudence is the legal thinking of courts, how judges understand the law, how they justify their decisions, and how those decisions create patterns that influence future cases. It is the intellectual architecture that determines what the law means in practice, beyond what is written in statutes or regulations.

In simple words, if legislation is the written rule, jurisprudence is how the rule actually works when applied to real disputes, shaping rights, obligations, and expectations across the legal system.

Jurisprudence covers how constitutional principles constrain legislative and regulatory power, how administrative bodies justify their decisions, and how courts review such decisions for proportionality, rationality, or procedural integrity. Through jurisprudence, we also understand how judicial doctrines evolve in response to systemic risk, cross border harm, or national security considerations.

Hybrid threats lead to legal disputes that challenge traditional assumptions about attribution, causation, responsibility, and evidentiary sufficiency. Courts and regulators must interpret legal norms in ways that preserve both the integrity of the legal order and the protections afforded by due process and the rule of law. Jurisprudence provides the conceptual tools necessary to analyse how such interpretations are likely to develop.

Hybrid campaigns often target the grey zones of jurisprudence, areas where legal doctrine is unsettled, where judicial standards are evolving, or where institutional competencies overlap. For instance, questions concerning the attribution of cyber operations to states or state proxies raise jurisprudential issues in administrative law, public international law, and evidentiary doctrine.

Courts may be asked to interpret whether circumstantial technical indicators, intelligence assessments, behavioural patterns, or adversarial capabilities meet legal thresholds of proof. Jurisprudence guides the analysis of how courts have treated analogous evidentiary challenges in contexts such as terrorism, organised crime, sanctions enforcement, or covert foreign influence.

Jurisprudence is important for understanding judicial responses to disinformation campaigns, and lawfare, where adversarial actors use legal processes strategically to burden institutions, trigger investigations, or generate reputational damage. Courts in different jurisdictions adopt varying standards for identifying abuse of process and litigation. Jurisprudence enables the analysts to trace how doctrines concerning procedural fairness, good faith, and abuse of rights develop in response to such tactics, and to forecast how courts may recalibrate these doctrines when confronted with sophisticated hybrid campaigns designed to undermine institutional trust, or regulatory credibility.

The trend toward resolving regulatory challenges through litigation, particularly in areas such as data protection, competition law, financial regulation, and critical infrastructure protection, means that courts play an expanding role in determining the limits of regulatory power in response to hybrid threats. Jurisprudence examines how courts balance fundamental rights, economic freedoms, and due process guarantees against national security, public order, and systemic risk mitigation. It reveals patterns in judicial reasoning that indicate when courts may strike down regulatory measures as disproportionate, insufficiently reasoned, or procedurally flawed.

Jurisprudence also provides insights into the standards of proof and evidentiary burdens applicable in hybrid threat scenarios. Hybrid campaigns often involve covert or deniable behaviour that does not produce the type of evidence traditionally expected in civil or administrative proceedings. Courts may be required to accept probabilistic evidence, behavioural indicators, or intelligence assessments as sufficient to justify regulatory action or liability. Jurisprudence determines the conditions under which such evidence is admissible, the degree of scrutiny applied to it, and the safeguards necessary to protect against misuse.

Jurisprudence is a foundational pillar of LEGINT. It is the structure and process through which institutions can anticipate judicial behaviour, calibrate their compliance strategies, and maintain defensible governance, in an era where legal systems themselves have become arenas of strategic contestation.


4. Regulatory theory. Jurisprudence is about the interpretation of law. Regulatory theory is about the design and operation of regulatory systems. It examines how legislators craft regulatory objectives, how agencies exercise delegated authority, how supervision is structured, how enforcement decisions are made, and how regulatory institutions behave in practice.

Regulatory theory studies power, incentives, enforcement tools, administrative decision making, institutional capacity, and risk based supervision. It answers how regulators enforce rules, shape markets, direct behaviour, and manage systemic or emerging risks—including hybrid threats.

Jurisprudence studies how courts interpret the law. Regulatory theory studies how regulators develop, implement and enforce the law.

Jurisprudence is retrospective. It focuses on the justification of legal decisions. Regulatory theory focuses on strategic governance, risk management, incentives, and institutional behaviour.

In the context of hybrid threats, the divergence becomes even clearer.

Jurisprudence addresses how courts interpret attribution, evidence, due diligence, liability, state responsibility, and oversight duties arising from hybrid operations. It determines how legal principles adapt when adversarial behaviour exploits ambiguity, deniability, or new technologies.

Regulatory theory explains how regulators respond to hybrid campaigns. How they expand mandates, tighten enforcement, reinterpret risk based expectations, activate emergency powers, or integrate national security considerations into supervisory practice. It reveals how hybrid threats modify supervisory priorities long before any judicial review occurs.

Jurisprudence and regulatory theory are complementary. Both are important for LEGINT, as they illuminate different dimensions of the legal environment.


5. Geopolitical legal risk forecasting. It is the process of assessing how political, security, economic, technological, and intergovernmental developments are likely to influence legal systems, regulatory behaviour, supervisory priorities, and institutional exposure.

It extends beyond conventional political analysis by examining how geopolitical dynamics reshape the legal responsibilities, strategic vulnerabilities, and operational constraints of entities functioning within complex and often contested regulatory environments.

Within LEGINT, geopolitical forecasting is applied to anticipate how international tensions, hybrid operations, sanctions regimes, cross border digital dependencies, and shifts in strategic alliances may influence legislative priorities, supervisory expectations, judicial interpretations, and the activation of crisis management frameworks.

Hybrid adversaries exploit political tensions, regulatory asymmetries, legal fragmentation, and institutional uncertainties to achieve strategic objectives. Geopolitical legal risk forecasting enables institutions to anticipate when such hybrid operations are likely to occur, which vectors are most probable, and how legal obligations will be activated as a result.

Geopolitical legal risk forecasting is a foundational pillar of LEGINT. It integrates geopolitical understanding with legal analysis, transforming political signals into actionable foresight about regulatory, judicial, and supervisory consequences.

It equips institutions to anticipate the legal terrain on which future conflicts, including covert, overt, hybrid, and traditional, will unfold. In an age where law has become a theatre of geopolitical competition and where hybrid actors deliberately exploit legal systems to achieve strategic objectives, geopolitical legal risk forecasting improves institutional resilience, regulatory defensibility, and strategic autonomy.


No, there is no overlap

The architecture of Legal Intelligence (LEGINT) ia based on five foundational pillars: Intelligence analysis, comparative law, jurisprudence, regulatory theory, and geopolitical legal risk forecasting. Each pillar is rooted in its own intellectual tradition, institutional logic, and analytical purpose. Together, they form an integrated framework capable of anticipating legal, regulatory, and hybrid threat developments across fragmented and contested jurisdictions. Although these pillars inevitably interact, their domains are neither redundant nor interchangeable. Their interaction strengthens LEGINT. Their distinction preserves its analytical precision.

Intelligence Analysis is the methodological backbone of LEGINT. It provides the structured processes through which raw information, signals, and fragmentary indicators are collected, evaluated, and transformed into decision ready assessments. This is different from traditional legal research, which seeks to clarify what the law currently includes. Intelligence analysis anticipates emerging legal, regulatory, or adversarial conditions. It gives LEGINT the tradecraft for systematic inference, hypothesis testing, and the production of defensible analytic judgments. It is through this pillar that the other four become operational.

Comparative Law offers the cross jurisdictional dimension of LEGINT. It examines how legal systems differ in structure, interpretation, enforcement, and institutional behaviour. It identifies regulatory asymmetries, conflicts of law, inconsistent enforcement thresholds, and jurisdictional gaps that adversaries may exploit and that institutions must anticipate. Comparative law provides the basis for understanding how hybrid threats manoeuvre between legal systems, how regulatory divergence generates risk, and how legal obligations may collide across borders. It ensures that LEGINT comprehends the full complexity of the normative environment in which transnational entities operate.

Jurisprudence examines the doctrines, reasoning methods, precedents, and principles through which courts assign meaning to legal norms. Jurisprudence is distinct from both intelligence analysis and comparative law because it concerns the intellectual processes through which adjudicatory bodies justify decisions, resolve ambiguity, and develop legal doctrine. It reveals how courts respond to emerging risks, including hybrid operations, in domains such as attribution, liability, evidentiary sufficiency, oversight duties, fundamental rights, and emergency powers. Jurisprudence shows how legal meaning evolves and defines the boundaries within which regulators, legislators, and institutions must operate.

Regulatory Theory studies how regulators develop, apply, and enforce rules, calibrate supervision, exercise discretion, and enforce compliance. Its focus is regulatory behaviour. Regulatory theory explains the mechanisms through which regulators respond to systemic threats, adjust enforcement intensity, reinterpret obligations, or activate exceptional powers. It is through regulatory theory that LEGINT anticipates supervisory reactions to hybrid campaigns, geopolitical shocks, or failures of governance. If jurisprudence explains how courts think, regulatory theory explains how regulators act.

Geopolitical Legal Risk Forecasting is a strategic layer of LEGINT. It analyses how geopolitical conditions, the distribution of power, international tensions, sanctions regimes, technological competition, security alliances, and hybrid operations, translate into legal and regulatory consequences. It is not political analysis. It is the disciplined forecasting of how geopolitical developments will reshape law, enforcement, and institutional exposure.

Together, the five pillars produce the integrated, anticipatory, and strategically oriented model of legal intelligence. They capture the full spectrum of forces shaping the modern legal environment.



LEGINT example: Hybrid threats and the European Health Data Space (EHDS).

Training use: It will be integrated in the LEGINT training modules.
Structured discussion: It will be used as a facilitated discussion case.
Board level awareness. Focus on strategic implications.


What is the European Health Data Space (EHDS)?

The EHDS, established under Regulation (EU) 2025/327, introduces a sector-specific data space for health, and creates an EU-wide legal, technical, and governance architecture for electronic health data. It enables access, sharing, and reuse of electronic health data. It was adopted on 11 February 2025, and published in the Official Journal of the EU on 5 March 2025.

In legal terms, the Regulation defines the European Health Data Space as a harmonized framework governing the processing, access, exchange, and secondary use of electronic health data in the Union. Electronic health data is an umbrella concept covering personal and, in specified cases, non-personal information generated in health care ecosystems, including medical imaging, laboratory results, electronic prescriptions and dispensations, discharge summaries, and other records stored in electronic health record systems.

The term also covers certain data produced by medical devices and wellness applications in clinical workflows, or otherwise designated under the Regulation’s scope. These definitional boundaries matter because they trigger distinct rights, duties, and interoperability obligations across the EHDS’s two functional pillars: primary use for care, and secondary use for non-care purposes.

The EHDS introduces a patient-centric model that ensures individuals can access their health data promptly, obtain it in portable digital formats, control professional access, and benefit from cross-border exchange via a common EU infrastructure. Member States must align their national electronic health record systems to an EU-level exchange format and common specifications so that patient summaries, ePrescriptions, eDispensations, imaging and reports, laboratory and other diagnostic reports, and discharge letters are interoperable across borders. The EHDS establishes enforceable duties on health providers and system vendors, with the Commission empowered to adopt detailed common specifications to ensure technical convergence.

Secondary use of health dada is the processing of electronic health data for purposes other than the direct provision of care, such as public health, statistics, regulatory oversight, education, research, innovation, health technology assessment, and the training, testing, and evaluation of algorithms. Access for secondary use is mediated by newly designated national Health Data Access Bodies. Data users obtain access through a data-permit regime that imposes strict purpose limitation, secure-environment processing, and a prohibition on attempts at re-identification. Secondary use is permitted only inside a ring-fenced legal and technical environment, with the Health Data Access Bodies instructed to balance societal benefits with strong procedural and technical safeguards.

Not all non-care processing is allowed. The final text prohibits access and processing for advertising or marketing, for decisions that are detrimental to a natural person or that exclude individuals or groups from insurance or credit, and for other discriminatory or harmful downstream uses. In practice, this means that even if a requester could frame an activity as research or innovation, access will be refused where the foreseeable application crosses these red lines.

Governance under the EHDS is layered. At the national level, Health Data Access Bodies are responsible for receiving and evaluating access applications for secondary use, issuing data permits, supervising secure processing environments, and enforcing the sector-specific obligations that sit alongside the GDPR. At the Union level, the Commission ensures interoperability through common specifications and coordinates the cross-border infrastructures. This split requires organizations to map their multi-regulator engagement model carefully. Data protection authorities remain competent to supervise GDPR compliance, whereas Health Data Access Bodies oversee the sectoral access regime, fees, and permit conditions.

Security, confidentiality, and integrity controls are preconditions for access. Health Data Access Bodies require processing to occur only within accredited secure processing environments, with controls that address identity management, access management, audit logging, output vetting to minimize disclosure risks, and tested anonymization, or privacy-enhancing techniques where appropriate. Access bodies can impose purpose-specific technical limitations, such as disabling export of raw microdata.

The EHDS is part of a broader EU data strategy. It must be read alongside the Data Governance Act and the Data Act, both of which influence data-sharing mechanics, access to non-personal and co-generated data, and interoperability obligations.


On the negative side: The 3 main vulnerabilities introduced by EHDS.

EHDS introduces massive cross-border data flows of one of the most sensitive data categories under GDPR, health data. To do this, it forces interoperability, connectivity, and standardisation of APIs and cross border exchange.

Many hospitals and health providers are suddenly moving from closed, local systems to open, interoperable, API exposed platforms. This is where cybersecurity lags behind.


1. EHDS increased the attack surface. Until recently, many hospitals and healthcare providers operated largely in isolation. Patient records were stored on local servers, often inside closed networks designed to support clinical workflows, not remote connectivity. Many of these systems are outdated, but their lack of exposure acted as a protective layer. Attackers needed physical proximity or insider knowledge to breach them.

EHDS changes this completely. By design, it forces healthcare providers, electronic health record vendors, research bodies, and national authorities to interconnect. The regulation introduces cross border data exchange through national gateways and requires EHR systems to expose standardized APIs that allow external systems to retrieve, transmit, or process patient data. In simple words, systems that were never meant to communicate with the outside world must now become fully accessible and interoperable.

The transition from closed, proprietary systems to open, standardized, and externally reachable interfaces creates new entry points for attackers. Once a hospital connects to the EHDS ecosystem, its digital perimeter is no longer limited to the hospital network. It now includes national exchange nodes, authentication and access services, research data access bodies, and the external entities entitled to request or process the data. Every additional connection increases exposure, and every partner in the ecosystem becomes a potential weak link.

Because the standards are harmonized across Europe, attackers no longer face a fragmented landscape of highly customized hospital networks. Standardization means predictability. If an attacker learns how to exploit an API implementation in one Member State, the same knowledge can be reused against institutions across the EU. What previously required a local intrusion becomes a remote, repeatable attack.

EHDS encourages more entities to access data, including researchers, hospitals, pharmaceutical companies, national digital health authorities. More users mean more credentials to manage, more authentication transactions, and more opportunities for phishing, misconfiguration, or credential theft. The result is a larger technical attack surface, and a larger organizational attack surface.

EHDS accelerates connectivity much faster than it improves governance and resilience. Hospitals are being required to operate as cross-border data hubs, but they are not equipped with the level of cybersecurity governance, monitoring, or operational continuity systems that exist in more mature sectors such as finance. Banks have cyber fusion centers and incident response playbooks. Many hospitals struggle to patch their servers without interrupting critical medical services.

Once interoperability is established, a compromise of a national gateway or a widely used EHR vendor could cascade across multiple countries. EHDS transforms what used to be isolated cyber incidents into the possibility of systemic healthcare disruption.


2. Legacy IT infrastructure.

Hospitals did not evolve like banks or telecom providers. They acquire technology slowly, through decades of procurement cycles, mergers, equipment donations, and incremental upgrades. The result is an environment where critical systems (including life critical) run on outdated hardware and unsupported operating systems.

Medical technology vendors traditionally prioritize safety and stability over cybersecurity. If a device is certified to perform a clinical function, any modification to its operating system, firmware, or configuration could require a new regulatory approval process. For this reason, it is not unusual to find radiology equipment, laboratory systems, or ventilator management platforms running on versions of Windows that are long past end of support. These systems cannot be patched like typical IT equipment. The vendor may forbid changes, the device may lack the computing power to run modern security software, or the hospital cannot afford downtime because patients depend on the system every day. In some cases, the manufacturer has ceased to exist.

Hospitals often do not have a complete inventory of their digital environment. They may not know which devices run outdated components, or which applications depend on vulnerable libraries. When a vulnerability emerges, the first challenge is not remediation but basic discovery. In many entities in the scope of EHDS, nobody can answer the simple question: Where exactly are we using this?

This lack of transparency is aggravated by the absence of a software bill of materials (SBOM) tradition in the medical technology industry. Hospitals become dependent on vendors to evaluate and correct vulnerabilities, and some vendors in this industry take months, if not years, to issue a fix. EHDS, with its focus on interoperability, does not address this foundational dependency problem.

EHDS introduces a new dependency model. Hospitals must now trust that their own legacy systems, the systems of other hospitals, third-party vendors, and national data access bodies all apply security consistently. The weakest among them becomes the doorway for attackers. A cybercriminal does not need to breach the best-protected node in a data exchange chain; they only need to find the least protected.

Digital transformation normally requires modernization first and connectivity second. EHDS reverses the sequence. It mandates connectivity first and leaves modernization to happen later, if at all.

EHDS assumes that outdated infrastructure can participate in a highly integrated European data space. The reality is different, and we are deeply concerned.


3. Vulnerabilities at the API layer.

To make patient information portable across borders and usable for secondary purposes such as research and innovation, EHDS requires healthcare systems, EHR vendors, and national authorities to expose standardized APIs, through which information flows. They are involved in how an external system requests health data, how identities are authenticated, how exchanges are logged, and how permissions are granted or revoked. APIs become a frontline of cyberattacks.

In a closed hospital environment, the internal electronic health record system is accessed only by physicians and staff. Once APIs are introduced, that same system becomes reachable by multiple external entities, like national gateways, certified apps, researchers, and foreign healthcare providers. What was previously an internal function is now a remotely callable service. Every API endpoint becomes a potential doorway. Attackers only need to exploit weaknesses in the API layer from the outside.


Hybrid threats, and the vulnerabilities introduced by the European Health Data Space.

Hybrid threats are not cyber threats. They target resilience, not infrastructure. Adversaries aim to destabilize societies, erode trust in institutions, and weaken strategic autonomy. Health data is uniquely powerful in this regard. It is personal, politically sensitive, and economically valuable.

By connecting healthcare providers, public authorities, researchers, and private companies into a unified data ecosystem, EHDS brings speed and efficiency into a sector historically built on compartmentalization. But this transition introduces vulnerabilities that can be exploited in a hybrid conflict.

Before EHDS, health data typically resided in national or even local systems, fragmented and technologically inconsistent. Fragmentation was not efficient, but it provided a natural barrier against systemic failure. EHDS eliminates fragmentation. It introduces a single digital entry point and a standardized framework. A breach in one location, can propagate through the system and reach datasets that were never intended to be exposed to external threats. Attackers no longer need to compromise thousands of separate systems. A strategic breach at a single weak point can unlock highly sensitive personal and genetic data, clinical histories, and population level research datasets.

The hybrid threat dimension introduces weaponization of information, perception, and influence. In a crisis, adversaries could leak or manipulate EHDS data to fuel panic, distrust, or fear. Hybrid operations exploit social vulnerabilities. By targeting the credibility of EHDS, attackers can undermine public confidence.

The health sector is becoming a battlefield in hybrid warfare, where perception is as important as infrastructure. The EU can mitigate these risks by ensuring that cybersecurity, oversight, and governance in hospitals evolve at the same speed as data flows.

The European Health Data Space represents a leap forward for public health and research. But in a world defined by hybrid conflict, the question is not whether EHDS will be attacked, but whether Europe will be ready when it happens.


Hybrid risks and EHDS. A (very) simple example.

An adversarial state wants to weaken public trust in the European Union and influence political decisions. Instead of a direct cyberattack on EU institutions, they choose a softer target, a regional hospital in an EU Member State participating in the EHDS.

The hospital runs outdated network equipment and has no mature governance system. But it has been connected via EHDS APIs to the national health data hub and, through it, to the EHDS cross border infrastructure.

The hybrid operation begins with a compromised medical device vendor that sends a legitimate but altered software update. An administrator installs the update and the malware designed to silently harvest authentication credentials used for API access.

With those credentials, the attackers gain controlled access to the hospital’s local patient data system. But their real objective is not just patient data theft.

They begin modifying selected data points inside the clinical datasets that feed research projects, adjusting medication histories, altering lab results by small percentages, and introducing anomalies into anonymized research datasets related to new treatment studies. The changes are subtle enough to pass most automated consistency checks.

In parallel, the attackers exfiltrate a small amount of genuine patient data containing sensitive diagnoses, including public figures.

Then, when the dataset has already propagated through EHDS to multiple research centers in other EU countries, phase two begins.

Note: Adversaries target scientific processes. By injecting small, targeted distortions into lab results or patient histories, an attacker can delay research by introducing conflicting findings across research centres. Delays and contradictions slow innovation and raise costs for developers, which is an effective non kinetic way to weaken an adversary’s medical or pharmaceutical competitiveness without overt attack.

When manipulated datasets later surface with inconsistent results, the first casualty is credibility. Governments, hospitals, and universities may find themselves compelled to halt projects, launch expensive audits, or retract publications. Those corrective actions, even when successful, leave scars, as funding dries up, partnerships fray, and political opponents weaponize the uncertainty. For an actor pursuing influence or political objectives, eroding trust in health authorities produces strategic dividends that outlast the initial tamper.

The attackers leak the stolen personal records and altered research documents in social media channels and news outlets they control. They accompany the leaked data with a claim that EHDS allows unauthorized political profiling of citizens, including tracking of medical conditions without consent.

Social media accounts, including botnets posing as Europeans, repeat and amplify the narrative, framing EHDS as a surveillance tool and an invasion of privacy.

Researchers then realize that the corrupted datasets are producing inconsistent results. A high-profile research institution publicly questions the integrity of the EHDS data pipeline. Politicians, under pressure, call for suspending participation in EHDS until citizen privacy can be guaranteed. The narrative spreads far beyond the original hospital incident.

By the time investigators trace the source to a single compromised local hospital, the strategic damage is done. Confidence in EHDS governance drops, ongoing research projects are stalled, and Member States begin to question participation in the data space.

The adversary did not need to shut down a single server or destroy infrastructure. They combined cyber intrusion, data manipulation, targeted leaks, and disinformation to achieve a geopolitical goal, to weaken cohesion and trust in a major EU project.

Hospitals must stop thinking about cyber risk as an IT problem and start treating EHDS era threats as multi domain problems that require a hybrid defence culture.

Hybrid stress testing is the practical bridge between culture and governance. It is a deliberately messy, multi-actor exercise that combines realistic cyber intrusions, data-integrity attacks, supply-chain disruptions, targeted leaks, disinformation amplification and physical pressure on staff or facilities. The goal is to gain experience in how failures propagate across people, processes and technology.

Information sharing and external partnerships are essential. Hospitals must be part of national and cross border threat sharing communities. Early warning from another hospital in another Member State can prevent propagation. Establish legal and operational channels for sharing TTPs (tactics, techniques and procedures), and forensic findings that respect patient privacy but enable coordinated defence.


European Health Data Space (EHDS) vs. General Data Protection Regulation (GDPR). Who wins?

The General Data Protection Regulation (GDPR) is a horizontal fundamental rights regulation, designed to govern all processing of personal data. It establishes principles, legal bases, rights, and supervisory machinery for any controller or processor, irrespective of sector.

The GDPR is lex generalis. This means general law, the broader, background norm that applies across a field unless and until a lex specialis (special law) regulates a subset of that field.

The European Health Data Space (EHDS) is a sectoral regulation for health data. It establishes a governance, access, and interoperability framework to organize how electronic health data must be exchanged and, under controlled conditions, reused for specified purposes.

The EHDS is lex specialis. This means special law, that governs the conditions under which electronic health data are to be accessed, processed, and exchanged.

Lex specialis derogat legi generali means “the more specific law takes precedence over the more general law.” In legal reasoning, it is a canon for resolving collisions between two valid norms of the same rank that regulate the same factual situation.

Where a concrete overlap exists, the specific rule governs within the boundaries of its subject-matter, while the general rule continues to apply outside that perimeter. This is precedence to the extent of the conflict.

The GDPR is the horizontal baseline for all personal-data processing in the Union. The EHDS is the sector-specific system for electronic health data. When the facts trigger the EHDS, processing must satisfy the GDPR’s legality and safeguards and, in addition, the EHDS’s sectoral conditions, like processing inside accredited secure environments. Where EHDS scope is not triggered, the GDPR operates alone as the lex generalis. Where it is triggered, the EHDS governs with qualified precedence inside its field, and the GDPR continues to apply cumulatively.



LEGINT example: The EU Space Act vs. the European Space Law (EUSL)

We have an interesting development in European space governance, after the introduction of the EU Space Act and the continued absence of a long anticipated European Space Law (EUSL). These two initiatives, distinct in their legal character, ambition, and practical implications, serve fundamentally different roles in the evolving space policy of the European Union.

The EU Space Act, formally proposed by the European Commission on 25 June 2025, is a draft Regulation intended to address the growing geopolitical, cyber, and physical risks to the European Union’s space infrastructure and services.

The Act is not designed to codify or harmonize all aspects of space activities within the Union. It represents a legislative response to vulnerabilities exposed by recent geopolitical developments, particularly the weaponization of space assets, rising threats to satellite infrastructure, and dependencies on non-EU technology providers.

The Space Act introduces mandatory obligations for certain space operators, both public and private, whose services are deemed essential for the functioning of critical infrastructures or the internal market. It mandates comprehensive risk assessments, the establishment of security protocols, and the implementation of incident reporting frameworks. The Act enhances coordination between Member States and EU institutions, especially in crisis response and cyber threat mitigation. It gives the European Commission supervisory and enforcement authority, and this is a move toward central oversight in domains traditionally managed at the national level.

The Space Act is not the European Space Law that many industry stakeholders, legal scholars, and national regulators have anticipated for over a decade. The European Space Law, often referred to by the acronym EUSL, has long been envisioned as a foundational legal framework that would codify a comprehensive set of rules governing space activities across the EU. Such a law would go far beyond resilience and security. It would aim to harmonize fragmented national space legislations, establish a clear system for licensing, liability, and registration, and regulate emerging areas such as space traffic management, in-orbit servicing, space resource utilization, and environmental sustainability in outer space.

The EUSL is needed for the internal market. The current patchwork of national laws within the EU creates regulatory uncertainty for space operators, launch service providers, and satellite manufacturers. Some Member States, such as France, Germany, and Luxembourg, have developed sophisticated national space laws, while others lag behind. A European Space Law would provide mutual recognition of authorizations, ensure uniform standards of due diligence and safety, and enhance the EU’s strategic autonomy by reducing legal and economic dependencies on non-European jurisdictions.

So, what has happened? The EU Space Act is reflecting the urgency of protecting European space infrastructure from emerging threats. It is an operational law, driven by policy imperatives linked to resilience, cybersecurity, and geopolitical defense. The European Space Law remains a plan, referenced in Commission communications and policy papers, yet never formally drafted or proposed. The European Parliament and certain Member States have called for a comprehensive EUSL, but the political appetite for harmonizing national space regimes remains tempered by sovereignty concerns and legal complexity.

The EU Space Act, as a Regulation, would be directly applicable in all Member States once adopted and published in the Official Journal of the EU. The anticipated European Space Law, was expected to include both Regulations and possibly Directives, requiring transposition into national law and offering greater flexibility in implementation but also more potential for legal divergence during the harmonization process.

From a compliance and risk management standpoint, the EU Space Act introduces compliance obligations, especially in areas such as cybersecurity, incident reporting, and operational resilience. However, in the absence of a broader EUSL, firms operating across multiple jurisdictions must continue to navigate divergent national laws for issues such as liability, registration, licensing conditions, and insurance requirements.

The EU Space Act is a crucial (but partial) step forward, filling an urgent policy need without addressing the broader legal vacuum that only a full European Space Law can resolve. Until the European Space Law is drafted and enacted, the governance of space in Europe will remain an evolving mosaic, shaped by both national autonomy and collective ambition.



LEGINT Example. September 17, 2024, early identification of the proposed EU Cloud and AI Development Act


What is the EU Cloud and AI Development Act?

The proposed EU Cloud and AI Development Act aims to strengthen Europe's leadership in cloud computing and artificial intelligence (AI), by establishing a robust regulatory framework for high-performance computing resources and digital infrastructure. It seeks to address the growing demands of AI applications while promoting innovation, interoperability, and a competitive internal market, ensuring Europe's technological sovereignty and long-term economic resilience.

The proposed Act complements existing EU regulations, such as the Artificial Intelligence Act (AI Act), which provides a legal framework for AI development and use within the EU.


October 20, 2025, Commission work programme 2026, planned timing of the Commission’s proposal for a Cloud and AI Development Act: Q1 2026





In the Commission work programme (CWP), every initiative has:

1. A type (“legislative”, “non-legislative”, “evaluation”),

2. A legal basis (here, Article 114 TFEU), and

3. An indicative timing (like Q1 2026).

When an item is marked “legislative”, it means the Commission intends to present a legislative proposal to the European Parliament and the Council during that quarter, in this case, between January and March 2026.


09 April 2025 - 04 June 2025, European Commission, CALL FOR EVIDENCE FOR AN IMPACT ASSESSMENT, EU Cloud and AI Development Act

This document aims to inform the public and stakeholders on the Commission's future legislative work so they can provide feedback on the Commission's understanding of the problem and possible solutions and give any relevant information that they may have, including on possible impacts of the different options.

Current estimates and projections of European computing infrastructure point to a gap between available capacity and needs, in particular to accommodate the demands stemming from AI. The 2024 Draghi report recognizes the importance of increasing computational capacity in the EU as a critical component of a mature data economy which underpins many established and emerging digital use cases, particularly for AI development. Against this backdrop, the Cloud and AI Development Act is one of the headline digital policies outlined in the 2025 Competitiveness Compass and listed in the Mission letter to Executive Vice-President Henna Virkkunen alongside a single EU-wide cloud policy for public administrations and public procurement. This initiative is part of the actions foreseen in the AI Continent Action Plan.

Training, fine-tuning, and running AI models demand massive computational resources. While training requires large centralised computational capacity, the more decentralised cloud and edge computing are key enablers of smaller fine-tuning operations and of inference. Data centres play a key role in housing and running the necessary devices and equipment. The EU currently lags behind the US and China in terms of available data centre capacity. The initiative aims to tackle the currently unfavourable conditions for the private sector to close this capacity gap in a way that prioritises highly sustainable solutions.

To this end, the initiative seeks to address the problems that currently inhibit the expansion of the EU’s data centre capacity. These include difficulties in accessing natural resources (energy, water, land), as well as complicated and slow permitting processes, with approaches differing between Member States. The construction process is highly capital-intensive, creating barriers of entry for new players, and can be negatively affected by difficulties in obtaining technology components and capital. The energy and water consumption of data centres is rising and expanding capacity can further strain such resources, particularly in view of the current strong geographical concentration of data centres in the North-West of the EU. Technological innovation in data centre equipment and operations promises significant resource savings but remains underexploited. At the same time, high energy prices negatively affect the competitiveness of the sector in the EU.

Another problem that the initiative seeks to tackle is the lack of a competitive EU-based offer of cloud computing services at sufficient scale to serve highly critical use cases with particularly high security needs, as found in various economic sectors and the public sector.

09 April 2025 - 04 June 2025, European Commission, CALL FOR EVIDENCE FOR AN IMPACT ASSESSMENT, EU Cloud and AI Development Act


The EU Cloud and AI Development Act in the Draghi report on EU competitiveness

On September 17, 2024, Mario Draghi, former President of the European Central Bank and Prime Minister of Italy, presented his report on the future of European competitiveness to the European Parliament in Strasbourg. The event was a significant moment, marking a comprehensive assessment of Europe's economic standing and offering strategic recommendations to enhance its global position.

The event was attended by Members of the European Parliament (MEPs), European Commission President Ursula von der Leyen, and other high-ranking EU officials. European Parliament President Roberta Metsola extended the invitation to Draghi and facilitated the session.

Draghi was commissioned by the European Commission to provide an independent analysis of Europe's competitiveness. His report aimed to diagnose current challenges and propose actionable strategies to ensure sustainable economic growth and resilience in the face of global shifts.

Draghi highlighted that Europe faces a rapidly changing global landscape, with slowing world trade, geopolitical fragmentation, and accelerated technological change. He emphasized that Europe's openness and dependencies make it particularly vulnerable to these shifts.

To address these challenges, Draghi proposed focusing on three main areas:
- closing the innovation gap with the United States and China,
- implementing a cohesive plan for decarbonization and competitiveness, and
- enhancing security while reducing dependencies.

He stressed the need for coordinated industrial policies, significant investments, and streamlined decision-making processes.

Draghi emphasized the necessity for the European Union to enhance its technological infrastructure and reduce dependencies on non-EU cloud service providers. He proposed the establishment of an EU Cloud and AI Development Act to create a unified framework aimed at bolstering Europe's capabilities in high-performance computing, artificial intelligence, and quantum technologies. This initiative seeks to harmonize cloud architecture requirements and procurement processes across member states, fostering a more competitive environment for European businesses.



Henna Virkkunen’s confirmation hearing, and the EU Cloud and AI Development Act.

A confirmation hearing is a formal procedure in which a nominated candidate for a high-level public position is questioned by a legislative body before being approved for the role. These hearings are commonly used to ensure that nominees are qualified, competent, and aligned with the policies and goals of the organization they will serve.

In the European Union, nominees for the Commission, including Executive Vice-Presidents and Commissioners, must be vetted by the European Parliament to assess their ability to perform their roles. Each nominee presents their vision and policy priorities during a public hearing. Members of the European Parliament (MEPs) ask questions about their policy focus, potential conflicts of interest, and strategy for implementing EU goals. A vote of confidence follows, determining whether the nominee can take office.

Henna Virkkunen’s confirmation hearing was an opportunity for MEPs to evaluate her qualifications, policies on AI, quantum technology, and cybersecurity, and her overall fitness for the role.

As of February 21, 2025, Henna Virkkunen serves as the Executive Vice-President for Tech Sovereignty, Security, and Democracy in the European Commission. She assumed this role on December 1, 2024, under the leadership of President Ursula von der Leyen.

In this capacity, Virkkunen is responsible for enhancing the European Union's technological independence, securing critical digital infrastructure, and promoting democratic values in the digital realm. Her portfolio includes overseeing digital and frontier technologies, implementing strategies to achieve Europe's 2030 Digital Decade targets, and developing initiatives such as the EU Cloud and AI Development Act.

According to Virkkunen, key technologies that will shape our future are AI, quantum, cloud, semiconductors and space technologies. She said: "To improve cloud services and to upscale our high‑performance computing capacity in an energy‑efficient way, I will propose the EU Cloud and AI Development Act. The Act will allow even the smallest businesses to access advanced AI services."







LEGINT example: Consequences of the EU–US clash over the Digital Services Act (DSA), and what is next for the Digital Markets Act (DMA).

Training use: It will be integrated in the LEGINT training modules.
Structured discussion: It will be used as a facilitated discussion case.
Board level awareness. Boards should treat EU digital regulation not as a compliance project, but as a geopolitical exposure category.


On Tuesday 23 December 2025, the United States Department of State announced the imposition of visa restrictions on five European individuals whom it accused of engaging in actions that allegedly undermined freedom of expression and targeted U.S. based digital platforms. According to the U.S. authorities, the measures were adopted under existing immigration powers allowing the denial of entry to foreign nationals whose conduct is deemed contrary to U.S. foreign policy interests. The State Department stated that the affected individuals had been involved in activities described as efforts to pressure or coerce American technology companies into suppressing lawful speech.

This is part of a broader policy position of the U.S. administration, which framed the actions as a response to what it characterised as an expanding pattern of foreign regulatory interference in the operation of U.S. based digital services. The U.S. government asserted that certain European regulatory initiatives, including those linked to the European Union’s Digital Services Act, had the practical effect of restricting lawful expression and imposing extraterritorial constraints on American companies.

Among the Europeans whom the U.S. State Department barred from entering the United States, is Thierry Breton, former European Commissioner for Internal Market, responsible during his term for supervising EU digital regulation including the Digital Services Act. He has also been a prominent figure in public discussions about platform regulation.

On Wednesday, 24 December 2025, the European Commission responded. This took the form of an official statement, reacting to the U.S. decision announced the previous day. In that statement, the European Commission expressed serious concern about the U.S. action and warned that it could take appropriate measures in response if necessary. The Commission characterised the U.S. move as unjustified, and stated that it was assessing the implications carefully.

The European Commission reaffirmed that the individuals targeted by the U.S. visa restrictions had acted within the scope of their professional and institutional responsibilities, and in accordance with European law. It rejected the assertion that their actions amounted to censorship, emphasising instead that the EU’s digital regulatory framework, including the Digital Services Act, is grounded in democratically adopted legislation and aims to ensure transparency, accountability, and the protection of fundamental rights online.

Commission officials underlined that freedom of expression is a core value of the European Union, and stated that EU digital legislation does not authorise political censorship or discrimination against lawful speech. They stressed that the regulation of online platforms falls within the sovereign competence of the European Union and that external pressure or unilateral measures against European officials were unacceptable.

No immediate retaliatory measures were announced.

The statement marked the formal indication that the dispute evolves beyond a political disagreement, into a broader diplomatic escalation.


But how did we get there?


Phase 1 (2022–2024). The Digital Services Act was formally adopted on 19 October 2022. It was published in the Official Journal of the European Union on 27 October 2022.

On 25 August 2023 the DSA began applying to entities designated as Very Large Online Platforms (VLOPs) and Very Large Online Search Engines (VLOSEs), following their formal designation by the European Commission in April 2023.

On 17 February 2024 the majority of the DSA’s provisions became applicable across the EU.

Very Large Online Platforms (VLOPs) and Search Engines (VLOSEs) became subject to mandatory risk assessments (Article 34), mitigation measures (Article 35), algorithmic transparency, and independent audits.

For the first time, the EU exercised extraterritorial regulatory power over U.S. based platforms, through digital governance. This was a structural shift.


Phase 2 (2024). The European Commission starts enforcing the act, and this includes requests for information to designated platforms, formal scrutiny of systemic risk assessments, and preparatory steps toward investigations under Articles 66–72 DSA.

During the second quarter of 2024, the Commission publicly confirmed that it had initiated formal proceedings against several major online platforms, and required detailed documentation on content moderation systems, algorithmic recommender systems, and advertising transparency. Also, the Commission begun assessments of compliance with Articles 34 and 35 (systemic risk and mitigation measures).

From mid 2024 onward, the Commission’s enforcement expanded into ongoing audits and compliance dialogues, preparation for potential imposition of interim measures, and preparation for administrative fines and periodic penalty payments where non compliance is established.


Phase 3 (Late 2024–2025). The regulatory disagreements escalated into geopolitical confrontation.

The U.S. administration accused EU regulators of censoring American speech, and targeting U.S. companies. Visa bans were imposed on EU figures involved in DSA enforcement. Public statements framed the DSA as a threat to free expression.

This marked the first time digital regulation triggered diplomatic retaliation.


Strategic consequences (opinion, legal intelligence).

As regulatory systems diverge, platforms will be forced to deliver different content depending on the user’s location. In practice, this means:

1. EU users will see content filtered, labelled, ranked, or restricted in accordance with EU law (DSA obligations, risk mitigation, systemic harm controls).

2. U.S. users will see a broader range of speech protected under the First Amendment, with fewer legally mandated removals.

3. Platforms will apply geo-based governance, (not just geo-blocking). There will be different moderation rules, transparency notices, recommender logic, and enforcement thresholds depending on jurisdiction.

What is lawful and visible in one region may be constrained in another, on the same platform.

This results in fragmented digital experiences, where the internet is jurisdiction specific. The global internet is moving to parallel regulatory realities, shaped by sovereignty and geopolitical differences, not technology.

Previously collaborative areas, including cybersecurity, misinformation response, platform governance, are now politicised. This increases compliance costs, legal uncertainty, and enforcement unpredictability. It is important to understand that:

1. Cybersecurity. For years, cybersecurity cooperation was based on the assumption of shared threat perception. Governments, CERTs, and private companies exchanged threat intelligence to counter ransomware, botnets, and state sponsored attacks. This cooperation depended on trust and technical neutrality.

Today, that trust is eroding. Cybersecurity measures are increasingly framed through a national security and sovereignty lens. Information sharing could be constrained by political considerations, and technical findings can be reinterpreted as strategic accusations.

2. Misinformation and disinformation. Efforts to counter disinformation were originally justified as protecting democratic processes and public safety. Over time, they have become entangled with debates over political bias, censorship, and state influence. As a result, measures once seen as neutral risk mitigation, are now seen as ideological enforcement.

3. Platform governance. Platform governance once revolved around technical standards, content moderation protocols, and due diligence processes. Today, it increasingly signals political alignment.

A platform’s compliance approach may now be interpreted as alignment with European regulatory sovereignty, or alignment with U.S. free speech approach.

When regulatory cooperation erodes, coordination mechanisms weaken. Shared early warning systems, joint enforcement initiatives, and trust based information exchanges become harder to sustain. This increases fragmentation, reduces resilience against malicious actors, and raises systemic risk across the digital ecosystem.

What is emerging is not simply regulatory divergence, but a competition of governance models. Cybersecurity, content moderation, and platform accountability are no longer neutral technical fields, they become arenas in which broader geopolitical values are contested.


Consequences of the EU–US clash over the Digital Markets Act (DMA)

The U.S. measures were directed at the Digital Services Act (DSA), not the Digital Markets Act (DMA). The sanctions and public statements were specifically linked to content moderation, speech governance, and alleged censorship.

Why does this matter for the DMA? The DMA is structurally more threatening to U.S. commercial interests than the DSA. If political pressure was applied over content moderation, it logically follows that economic regulation affecting trillion dollar firms could provoke equal or stronger reactions.

In simple words, market structuring regulation (DMA) logically carries greater escalation risk. This creates a chilling effect around DMA compliance costs for multinational firms.


The DMA directly targets a small group of companies designated as gatekeepers, and directly affects the business models of predominantly U.S. based firms.

Under the DMA, non compliance can trigger fines of up to 10–20% of global turnover.

For the EU, this is about restoring regulatory sovereignty. For the U.S., it raises concerns about discrimination against its largest technology firms. This divergence is shaping a world in which companies must operate under two parallel digital legal orders.

The designation of gatekeepers by the European Commission (companies meeting quantitative thresholds related to turnover, market capitalisation, and user reach), triggered binding obligations affecting core business models, including app stores, online advertising, operating systems, and digital marketplaces. From a U.S. perspective, this phase transformed regulatory concern into concrete commercial risk.

Following the designation of gatekeepers, the European Commission began intensive supervisory engagement with gatekeepers. Companies were required to submit compliance reports, adapt technical architectures, and alter long standing business practices.

U.S. policymakers and industry representatives increasingly framed these measures as disproportionate, discriminatory, and protectionist. The DMA directly affects revenue models, data flows, and platform integration strategies.

By mid-2024, the DMA had become an important topic in U.S.– EU trade discussions, with American officials expressing concern that the regulation functioned as a de facto industrial policy targeting U.S. firms.

As enforcement actions progressed, the DMA became a symbol of regulatory divergence. U.S. officials increasingly framed the DMA as an extraterritorial assertion of regulatory power, and a constraint on innovation and market driven competition.

At the same time, EU institutions reaffirmed that the DMA was a neutral, rules based framework grounded in competition law, and essential to restoring contestability in digital markets.

The dispute evolved from a legal disagreement into a political and economic confrontation over the governance of the digital economy.


U.S. based firms structurally affected by the Digital Markets Act (DMA).


1. Alphabet (Google). This firm is affected by the Digital Markets Act (DMA) perhaps more than any other company in the world, because its entire business model is built on precisely the kinds of structural advantages the DMA is designed to neutralise. The impact is systemic.

The DMA targets companies that control core platform services and can leverage that control across markets. Alphabet is uniquely exposed because it simultaneously controls:

a. A dominant search engine (Google Search).

b. A dominant mobile operating system (Android).

c. A dominant browser (Chrome).

d. A dominant mobile app distribution channel (Google Play).

e. A dominant digital advertising ecosystem (Search, Display, YouTube).

Very few (if any) firms combine all of these layers. The DMA was effectively written to prevent precisely this kind of cross market leverage.

Google Search is an infrastructure layer for the internet. Under the DMA, google cannot favour its own services in rankings, and it must provide fair and non discriminatory access to competing services.

Android is both an operating system and a distribution gatekeeper. The DMA treats this combination as structurally risky.

Key impacts include mandatory allowance of alternative app stores and payment systems, limits on tying Google services to Android licensing, and reduced ability to pre install or privilege Google apps. This weakens Google’s control over the user journey and undermines its ability to reinforce dominance through ecosystem design.

The DMA does not threaten Alphabet’s existence, but it fundamentally reshapes how the company can operate in Europe.


2. Apple. Apple’s business model is built on controlled ecosystems. Its commercial success is based on vertical integration:

a. Hardware (iPhone, iPad, Mac).

b. Operating systems (iOS, iPadOS, macOS).

c. App distribution (App Store).

d. Payments (in-app purchases, Apple Pay).

e. Services (music, video, cloud, subscriptions).

This ecosystem is deliberately closed and curated. The DMA directly targets precisely this type of structural control, because it creates persistent gatekeeping power.

The DMA challenges Apple’s control over distribution and monetisation. The most disruptive DMA obligations for Apple are those that affect app distribution, as Apple must allow alternative app stores and direct app downloads on iOS in the EU. Developers must be allowed to use alternative in app payment methods, weakening Apple’s commission based revenue model.


3. Meta (Facebook, Instagram, WhatsApp). Facebook, Instagram, WhatsApp, and Messenger function as a tightly integrated ecosystem where user data, behavioral signals, and advertising infrastructure reinforce one another.

The DMA directly challenges this model by restricting the combination of personal data across services without explicit user consent, cross platform profiling for advertising purposes, and the ability to leverage dominance in one service to reinforce another.

The DMA aims to limit how data flows between platforms, by imposing interoperability and choice requirements. For Meta, this weakens the self reinforcing dynamics that sustain its dominance.

Meta’s revenues depend overwhelmingly on targeted advertising. DMA provisions affect the lawful basis for combining user data across services, and the ability to personalise ads without explicit consent.


4. Amazon. Amazon is heavily affected by the DMA. According to the act, there is conflict of interest when a platform simultaneously operates a dominant marketplace infrastructure and competes against the businesses that depend on that infrastructure.

Amazon’s core structural advantage is that it sits at the centre of the transaction, the logistics layer, the advertising layer, and the data layer. As a marketplace gatekeeper, it can influence discoverability, pricing dynamics, delivery expectations, and consumer trust signals. The DMA targets the ability of a gatekeeper to leverage control of a core platform service to privilege its own downstream products and services or to disadvantage rivals.

Operating the marketplace gives Amazon access to granular, real-time data about third-party sellers’ performance, consumer demand patterns, conversion rates, and pricing. The DMA constrains how a gatekeeper may use non public business user data generated through platform activity, because such use can allow the platform to replicate successful products, undercut sellers, or selectively compete in high-margin categories. In practical terms, this changes Amazon’s permissible internal data governance and may require separation, access controls, or demonstrable purpose limitation around seller data.

Amazon’s ecosystem includes tied and bundled advantages that reinforce lock in. Prime membership, fulfillment services, preferred logistics, and advertising tools create a system in which sellers can feel compelled to adopt Amazon’s ancillary services to remain competitive. The DMA’s logic challenges platform practices that steer business users into specific ancillary services or create de facto dependency.


5. Microsoft. Microsoft’s power lies in infrastructure. Its power comes from being deeply embedded in how organisations operate, including operating systems, productivity software, cloud infrastructure, identity management, and enterprise collaboration.

The DMA targets Microsoft’s control over foundational digital layers. Microsoft controls several core platform service” under the DMA:

a. Windows (operating system).

b. Microsoft 365 / Office (productivity ecosystem).

c. Azure (cloud infrastructure).

d. LinkedIn (professional networking).

e. Microsoft Teams (communications and collaboration).

The DMA challenges Microsoft’s ability to preinstall and privilege its own services within Windows, to bundle productivity, communication, and cloud tools, and to use default settings to reinforce ecosystem lock-in.

Microsoft’s dominance is also derived from deep data integration across services. The DMA’s emphasis on interoperability and data portability affects cross-service analytics and AI integration.

The structural impact of DMA to Microsoft is less existential than for Apple or Google, but still material.


U.S.– EU relations, DMA strategic consequences (opinion, legal intelligence).

Below is a structured assessment of the most plausible developments, framed in strategic terms, not political rhetoric.

1. Regulatory divergence and functional decoupling. A deeper divergence may emerge as companies adapt differently to EU and U.S. regulatory expectations.

Under this scenario, firms maintain EU specific product architectures to comply with DMA obligations. U.S. product architectures evolve differently, shaped by domestic legal standards and market incentives. Cross border digital uniformity erodes.

This does not require political escalation. It emerges organically from incompatible legal frameworks. Over time, it normalises a two track digital economy.

2. Politicisation and trade retaliation. After DMA enforcement, particularly through high profile penalties or structural remedies, the U.S. frames EU actions as discriminatory trade barriers.

Possible consequences include retaliatory measures under U.S. trade law, and scrutiny of EU firms operating in the U.S.

3. Judicialisation of the dispute. Companies may challenge DMA enforcement decisions before EU courts, while U.S. stakeholders pursue litigation or constitutional challenges at home related to foreign regulatory reach. Over time, judicial interpretation could shape the practical boundaries of the DMA.

This process would be slow, technical, and legally complex, but stabilising in the long term.

DISCLAIMER: The analysis presented here is provided for informational and educational purposes only. It does not express support for, or opposition to, any government, regulatory authority, political position, or policy approach. The objective is to assist risk, compliance, legal, and governance professionals in understanding evolving regulatory, legal, and geopolitical developments that may affect their professional responsibilities.

This content is intended to facilitate informed decision making by highlighting structural trends, regulatory interactions, and potential areas of operational impact. It does not constitute legal advice, policy advocacy, or an endorsement of any particular regulatory framework or political position. The perspectives discussed reflect an analytical assessment of publicly available information, and should be interpreted in the context of risk awareness, compliance preparedness, and strategic foresight only.



LEGINT Collection. Legal developments in the European Union.

1. The NIS 2 Directive

2. The Digital Operational Resilience Act (DORA)

3. The Critical Entities Resilience Directive (CER)

4. The European Data Act

5. The European Data Governance Act (DGA)

6. The European Cyber Resilience Act (CRA)

7. The Digital Services Act (DSA)

8. The Digital Markets Act (DMA)

9. The European Chips Act

10. The Artificial Intelligence Act

11. The Artificial Intelligence Liability Directive

12. The Framework for Artificial Intelligence Cybersecurity Practices (FAICP)

13. The EU Cyber Solidarity Act

14. The Digital Networks Act (DNA)

15. The European ePrivacy Regulation

16. The European Digital Identity Regulation

17. The European Media Freedom Act (EMFA)

18. The Corporate Sustainability Due Diligence Directive (CSDDD)

19. The Systemic Cyber Incident Coordination Framework (EU-SCICF)

20. The European Health Data Space (EHDS)

21. The European Financial Data Space (EFDS)

22. The Financial Data Access (FiDA) Regulation

23. The Payment Services Directive 3 (PSD3), Payment Services Regulation (PSR)

24. The Internal Market Emergency and Resilience Act (IMERA)

25. The Digital Fairness Act

26. The European Cyber Defence Policy

27. The Strategic Compass of the European Union

28. The European Space Law (EUSL)

29. The European Space Act

30. The EU-US Data Privacy Framework

31. The European Cloud and AI Development Act

32. The European Quantum Act

33. The EU Biotech Act

34. The EU Cyber Diplomacy Toolbox



Read more:

Defensive Hybrid Intelligence

Defensive Hybrid Intelligence, Principles

1. Collection

2. Fusion

3. Interpretation

4. Decision


George Lekatis


This website is developed and maintained by Cyber Risk GmbH as part of its professional activities in the fields of risk management and regulatory compliance.

Cyber Risk GmbH specializes in supporting organizations in understanding, navigating, and implementing complex European, U.S., and international risk related regulatory frameworks.

Content is produced and maintained under the professional responsibility of George Lekatis, General Manager of Cyber Risk GmbH, a well known expert in risk management and compliance. He also serves as General Manager of Compliance LLC, a company incorporated in Wilmington, NC, with offices in Washington, DC, providing risk and compliance training in 58 countries.


Cyber Risk GmbH, some of our clients