Summary

European investigators allege that the Chinese-owned ship Yi Peng 3 deliberately dragged its anchor to sever two Baltic Sea undersea data cables connecting Lithuania-Sweden and Finland-Germany.

While the Chinese government is not suspected, officials are probing possible Russian intelligence involvement.

The ship’s suspicious movements, including transponder shutdowns and zig-zagging, suggest deliberate action.

The vessel, linked to Russian trade since March 2024, was carrying Russian fertilizer when stopped.

NATO warships surround the ship, but international maritime laws limit investigators’ access.

  • FuglyDuck@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    27 days ago

    True, but gaining physical access to the repeater is going to still be difficult, and I would be shocked if there’s not some type of switch that triggers an alarm when it’s accessed. It would also be extremely difficult to upload fresh firmware to it in place- at least, or without removing it to a dry environment.

    (Maintenance would just upload it through the data connection.)

    It would be easier (and probably actually profitable…) to gain access to it during manufacture. This was the legitimate concerns about 5g infrastructure being made in china.

    Regardless, it’s almost certainly more cost effective to get hooks into the IT guy maintaining the system than any physical attack.

    • catloaf@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      27 days ago

      Even if there are tamper sensors (unlikely, for something on the seabed built by cheapskate telcos), you could very likely trip it or just take it offline, and they’d attribute it to normal wear and tear from the ocean and its denizens.

      Also, you can tap fiber optic lines by bending them, no cuts required. This seems unlikely for undersea cables, considering the size and weight and thickness of sheathing, but isn’t impossible.