Following the failure of the C-Lion1 submarine data cable between Finland and Germany, calls for a sabotage contingency plan are growing louder. A significant external force caused the break. This could be an anchor or a large fishing net dragging on the seabed, or sabotage.
TEXT: ALFRED MONTERIE IMAGE: ENVATO
Northern European intelligence services have previously pointed to the use of Russian fishing boats for military purposes. Russian submarines have also been regularly spotted near high-tech cables.
The Finnish and German foreign ministers expressed their concern about the incident in the Baltic Sea. They warned of the dangers of hybrid warfare by malicious (state) actors. Although there is no direct evidence of sabotage, the authorities are considering the possibility.
The 1,170km fibre-optic cable terminates in Rostock, where Navo has recently opened a new naval base. Russia has already protested against this. The debate on the protection of critical infrastructure has been reignited.
German Defence Minister Boris Pistorius believes the damage to the submarine cable was sabotage. ‘Nobody believes that these cables were cut accidentally.’ Lithuanian forces have since stepped up surveillance of their waters, as In addition to the cable between Finland and Germany, a cable between Sweden and Lithuania has also been cut.
Submarine cables are a vital part of international communications. There have been several incidents in recent years, including the alleged cutting of submarine cables by Houthi rebels in the Red Sea.
Of all global internet traffic, 97 per cent is carried by submarine cables. Internet traffic was not noticeably affected by the failure of the submarine cable between Finland and Germany.
Edition #07 – January 2025
Welcome to 2025
Cybersec completes Netherlands and returns to Asia January 2025
Cybersec, where global cybersecurity leaders connect
Hybrid warfare moves to submarine cables
Cédric Herregodts: ‘Data classification is becoming increasingly important in cyber training’
Eset: AI-Native prevention for tomorrow’s threats. MDR – EPP – Threat Intelligence
Cybersec Europe Awards open for entries
CISO and CIO converge
HarfangLab – Your Endpoints > Out Protection. Empower your analysts, overcome threats.
European watchdog ECCO to monitor major software vendors
Four European laws relevant to cybersecurity
EC publishes Cyber Resilience Act
DORA, with the d of ‘data’ and the a of ‘automate’
ThreatLocker: An Endpoint protection platform that puts tech experts in control.
Four insights from a ransomware negotiator
Travel&Tech 2025: Race against Cybercrime.