Undersea Communications Cables Cut

Two Internet cables between Germany and Finland, and Lithuania and Sweden have both experienced sudden outages. Located in northern Europe, the Baltic Sea is an active commercial shipping route and is ringed by nine countries, including Russia. The affected countries, all members of NATO,  are saying that it is unlikely to be accidental. 

This has happened in the same waterway in which a major gas pipeline and other undersea cables were previously  damaged in mysterious circumstances in 2022. 

Now,  Germany’s defence minister, Boris Pistorius, has said that the severing of an undersea communications cable between Helsinki and the German port of Rostock is likely to be an act of sabotage.

The telecoms cable which connects Helsinki to the German port of Rostock stopped working on the 18th November, while Finland’s state-controlled cybersecurity and telecoms company Cinia says that Internet link between Lithuania and Sweden’s Gotland island went out of service at about on Sunday 17th November. 

Finland and Germany said in a joint statement that they were “deeply concerned about the severed undersea cable” and were investigating “an incident that immediately raises suspicions of intentional damage”.

This latest incident comes at a time of heightened tensions in the region. President Biden has authorised the use of US supplied long range missiles by Ukraine against military targets in Russia. “Safeguarding our shared critical infrastructure is vital to our security and the resilience of our societies,” Germany and Finland said.

Cinia has said that a repair vessel had been sent to the scene although did not yet know how long it would take to fix the issue, adding that it typically takes between five and 15 days for submarine cables to be repaired. Meanwhile, a German investigation into the 2022 Nord stream gas pipelines explosions is still underway.

Cinia   |   Barrons   |   BBC   |   Guardian   |    Computing  |   CNN    |   Silicon Republic   |   

Image:  Ideogram

You Might Also Read: 

Internet Cable To Encircle Africa:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Musk Sues Microsoft Over OpenAI
Cyber Monday Is Not The Same As Black Friday »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Pentesec

Pentesec

Pentesec is a security specialist offering professional services, managed security services and expertise within an extensive range of security technologies.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

NASK

NASK

NASK is a National Research Institute under the supervision of the Chancellery of the Prime Minister of Poland. Our key activities involve ensuring security online.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.