logo
Searching for threats to undersea cables off the Dutch coast

Searching for threats to undersea cables off the Dutch coast

The Star20-05-2025
The laying and operation of underwater cables was long the preserve of large telecoms operators but the Internet giants have largely taken over in recent years, as they strive to keep up with ballooning flows of data. — Image by freepik
SCHEVENINGEN, Netherlands: Gliding through the glistening waters of Scheveningen Harbour near The Hague, a sleek green tube only a few metres (yards) long scans the seabed searching for threats to underwater cables.
The vessel is part of an exercise bringing together six countries and more than 20 companies and researchers hoping to stay ahead of the enemy as the danger to Europe's critical underwater infrastructure rises.
From gliders flying low over the sea surface to detect anomalies to a "crawler" deployed on the seabed to remove mines, the vessels are tackling a variety of challenges in a testing seabed measuring 10 square nautical miles.
The possible sabotage of undersea cables has hit the headlines in recent years due to a series of incidents, with the finger often pointed at Russia and China.
The most recent of these came in December, when the EstLink 2 electricity cable and four telecoms cables that lie on the seafloor linking Finland and Estonia went offline after suspected sabotage.
Suspicion fell on the Eagle S, an oil tanker flying the Cook Islands flag but thought to be part of Russia's so-called "shadow fleet" – ships that carry Russian crude oil and petroleum products embargoed due to Moscow's invasion of Ukraine.
"It's not a question any more of if it will happen. The question is when the conflict will start," said Rear Admiral Paul Flos from the Dutch navy.
"We have to be ready for it. And that's what we're doing here today," added Flos in an interview with AFP.
He said attacks by Russia and China on Europe's undersea infrastructure were "absolutely increasing" and the lessons learned at the testing centre were helping to counter the threat.
The systems were being challenged to detect another vessel snooping around a pipeline, spot a tiny mine laid beside a cable or notice something on the seabed that should not be there.
The advantage of the test centre in Scheveningen is that visibility is very poor and the seabed is extremely sandy, meaning the conditions are harsher than in the North Sea.
"If it works here, it works everywhere," said Flos, 58.
"At the moment, we're blind. And with what we're doing today... we are trying to find out what kind of equipment can best support us and to make sure that we're not blind any more," said Flos.
'The effect is huge'
Another high-profile incident came in September 2022 when the Nord Stream natural gas links, which run along the Baltic seabed between Russia and Germany, were partially severed.
A field of bubbles formed on the surface above the pipelines as gas flowed out.
Seismic records later indicated there had been a series of underwater explosions just before the leak was discovered.
European officials declared it an act of sabotage and blamed Russia but more recent media reports have linked the incident to Ukraine – an accusation Kyiv has strenuously denied.
In response to the growing threat, NATO hastily pulled together the Baltic Sentry patrol mission early this year.
The laying and operation of underwater cables was long the preserve of large telecoms operators but the Internet giants have largely taken over in recent years, as they strive to keep up with ballooning flows of data.
About 1.4 million kilometres (nearly 900,000 miles) of fibre-optic cables are laid on the ocean floor, enabling the provision of essential services such as trade, financial transactions and public services around the world.
The impact of a major attack on Europe's critical infrastructure could be devastating, said Carine van Bentum, head of the SeaSEC (Seabed security experimentation centre) testing hub.
A country could be brought to a "complete standstill", the 48-year-old told AFP in an interview.
"If we do not have power, we as a society are not resilient anymore. We have no idea what to do. If we do not have Internet, we cannot pay. So the effect is huge." – AFP
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Visa's 24/7 war room takes on global cybercriminals
Visa's 24/7 war room takes on global cybercriminals

Sinar Daily

timean hour ago

  • Sinar Daily

Visa's 24/7 war room takes on global cybercriminals

ASHBURN - In the heart of Data Centre Alley — a patch of suburban Washington where much of the world's internet traffic flows — Visa operates its global fraud command centre. The numbers that the payments giant grapples with are enormous. Every year, £15 trillion flows through Visa's networks, representing roughly 15 per cent of the world's economy. And bad actors constantly try to siphon off some of that money. Modern fraudsters vary dramatically in sophistication. To stay ahead, Visa has invested £12 billion over the past five years building AI-powered cyber fraud detection capabilities, knowing that criminals are also spending big. "You have everybody from a single individual threat actor looking to make a quick buck all the way to really corporatised criminal organisations that generate tens or hundreds of millions of pounds annually from fraud and scam activities," Michael Jabbara, Visa's global head of fraud solutions, told AFP during a tour of the company's security campus. "These organisations are very structured in how they operate." The best-resourced criminal syndicates now focus on scams that directly target consumers, enticing them into purchases or transactions by manipulating their emotions. "Consumers are continuously vulnerable. They can be exploited, and that's where we've seen a much higher incidence of attacks recently," Jabbara said. Scam centres The warning signs are clear: anything that seems too good to be true online is suspicious and romance opportunities with strangers from distant countries are especially dangerous. "What you don't realise is that the person you're chatting with is more likely than not in a place like Myanmar," Jabbara warned. He said human-trafficking victims are forced to work in multi-billion-pound cyber scam centres built by Asian crime networks in Myanmar's lawless border regions. The most up-to-date fraud techniques are systematic and quietly devastating. Once criminals obtain your card information, they automatically distribute it across numerous merchant websites that generate small recurring charges — amounts low enough that victims may not notice for months. Some of these operations increasingly resemble legitimate tech companies, offering services and digital products to fraudsters much like Google or Microsoft cater to businesses. On the dark web, criminals can purchase comprehensive fraud toolkits. "You can buy the software. You can buy a tutorial on how to use the software. You can get access to a mule network on the ground or you can get access to a bot network" to carry out denial-of-service attacks that overwhelm servers with traffic, effectively shutting them down. Just as cloud computing lowered barriers for start-ups by eliminating the need to build servers, "the same type of trend has happened in the cyber crime and fraud space," Jabbara explained. These off-the-shelf services can also enable bad actors to launch brute force attacks on an industrial scale — using repeated payment attempts to crack a card's number, expiry date, and security code. The sophistication extends to corporate-style management, Jabbara said. Some criminal organisations now employ chief risk officers who determine operational risk appetite. They might decide that targeting government infrastructure and hospitals generates an excessive amount of attention from law enforcement and is too risky to pursue. 'Millions of attacks' To combat these unprecedented threats, Jabbara leads a payment scam disruption team focused on understanding criminal methodologies. From a small room called the Risk Operations Centre in Virginia, employees analyse data streams on multiple screens, searching for patterns that distinguish fraudulent activity from legitimate credit card use. In the larger Cyber Fusion Centre, staff monitor potential cyberattacks targeting Visa's own infrastructure around the clock. "We deal with millions of attacks across different parts of our network," Jabbara noted, stating that most are handled automatically without human intervention. Visa maintains identical facilities in London and Singapore, ensuring 24-hour global vigilance.

30 years of the MP3: The story of a breakthrough that changed music
30 years of the MP3: The story of a breakthrough that changed music

The Star

time10 hours ago

  • The Star

30 years of the MP3: The story of a breakthrough that changed music

ERLANGEN: It turns out the invention of the MP3 format was a combination of vision, overtime and stubbornness – as well as a good dose of luck. Thirty years ago, on July 14, 1995, a new file format called MP3 emerged, aiming no less than to revolutionise the world of music listening and the music business with it. On that day, researchers at the Fraunhofer Institute for Integrated Circuits in the southern German city of Erlangen decided to give their audio compression invention the file extension ".mp3". Now, audio streaming from similar audio files is everywhere. But 30 years ago, it was the compression technology invented in Erlangen that first made it possible to listen to music on the Internet. The origins of the MP3 project date back to 1982. At the time, the goal was to make music files small enough to transmit in decent quality over a digital telephone line (ISDN). Karlheinz Brandenburg had made this seemingly unsolvable task the subject of his doctoral thesis when he was an electronics student in Erlangen. Used by billions of people Brandenburg was initially unsure about the significance of his research, as one statement from him in 1988 reflects: "Either my dissertation will gather dust in the library, or the technology will become a standard used by millions of people." In fact, the "MPEG Layer-3" (MP3) standard, which he played a key role in developing, has influenced the listening experience of billions of music fans. The development work by Brandenburg and other researchers was intended not only to fundamentally renew broadcasting technology but also to mark the beginning of the end for CDs in the music industry. The success continues to this day: Whether in streaming, digital radio, digital television or video calls like Apple's FaceTime – a form of MP3's successor, AAC, is used everywhere. How does MP3 work? But how was it even possible to significantly reduce the size of music files without making them sound noticeably worse to the human ear? The researchers in Erlangen exploited the fact that the human ear does not perceive many details in music or other complex sounds. Some tones are too quiet or are masked by louder tones. For example, an alarm clock continues to tick even when it rings, but the ticking is no longer heard. When converting to an MP3 file, precisely those parts of the music that humans probably would not hear anyway are removed or simplified. Only what is important for human hearing is retained. A music file can thus shrink to about one-tenth of its original size without the sound becoming noticeably worse for most people. However, music purists, such as Canadian singer Neil Young, dispute this. Newer versions hardly distinguishable from analogue sound MP3 co-inventor Brandenburg can still somewhat understand the criticism of the original MP3. However, he said that the new MP3 codecs, such as AAC, are now so good at higher data rates that the human ear can't distinguish them from analogue sound, such as those from vinyl records. This has also been proven by blind tests with trained listeners. However, it took countless hours of experimentation before the sound of an MP3 file could even remotely compete with that of a CD or vinyl record in the 1990s. Ironically, a record shop in Erlangen was the first to benefit from MP3 research. Brandenburg would bought dozens of records from here. "Simple pieces, complex pieces, music from all genres across the board," Brandenburg recalled in a 2020 newspaper interview. "We didn't know what would work and, more importantly, what wouldn't." As Brandenburg was nearing the completion of his doctoral thesis, he read in an audio trade magazine that the song "Tom's Diner" by Suzanne Vega was often used for sound tests in the hi-fi trade. A colleague quickly got the CD. Experiments with an a cappella version of the song from 1982 were initially sobering: the first attempt with "Tom's Diner" reportedly sounded "as if someone was scratching at your left and right ear," Brandenburg said when the New York singer visited the institute in Erlangen in 2007. The inventor was not deterred by the setback. He listened to the song thousands of times to continuously improve the MP3 algorithm. One solution was to transmit the lower frequencies very precisely – much more so than the higher tones, where storage space could be saved. A cybercriminal aids the breakthrough After the official naming, the format initially took off slowly. The Fraunhofer Institute in Erlangen had actually planned to license the software for converting to MP3 to interested entertainment companies. However, a young cybercriminal thwarted this plan: in 1997, an Australian student used a stolen credit card number to purchase the encoder software and made the programme freely available online. Word spread quickly. "Ripping" CDs – converting them into MP3 files – became a popular pastime. The online file-sharing platform Napster caused significant damage to the music industry and artists from 1999 onwards. The software allowed millions of users to easily and freely share their MP3 files with one another. The idea was simple: Napster searched users' hard drives for MP3 files and then facilitated direct exchanges between computers via the Internet. Entire record collections could suddenly be swapped with just a few clicks. Napster effectively made the MP3 format the standard for digital music overnight and ensured its worldwide adoption. Napster not only changed how people consumed music but also forced the music industry to engage with digital distribution channels. The platform demonstrated how simple and appealing the exchange of music in MP3 format could be, paving the way for later legal music services and the digitisation of the entire industry. With the success of the iPod (2001), the iTunes Music Store from 2003 and legal streaming services like Spotify from 2008, the music industry slowly recovered. Who profited financially from MP3? With the emergence of legal MP3 usage scenarios, the Fraunhofer Institute for Integrated Circuits (IIS) also began to generate revenue. Brandenburg estimates that his then-employer earned €50 to €100 million annually in fees from manufacturers of MP3 players, music platforms and other licensees until the last MP3 patent in the United States expired in 2017. Overall, all technologies surrounding MP3 are said to have generated at least half a billion to €1bil (RM4.9bil) in revenue. Fraunhofer IIS stated that marketing over the entire patent period generated "revenues in the high hundreds of millions." However, the real big business was not made by Fraunhofer but by the commercial users of MP3 technology, including manufacturers of MP3 players such as Apple, Sony, SanDisk, Creative, iRiver and Archos. Apple alone is estimated to have generated US$60 to US$70bil (RM255bil to RM298bil) in revenue and at least US$15bil (RM63.9bil) in profit from the iPod between 2001 and the discontinuation of the product line in 2022. To this day, the iPhone still includes a note that the audio coding technology MPEG Layer-3 was licensed from the Fraunhofer IIS. – dpa

xAI apologizes for Grok's offensive AI posts on social media
xAI apologizes for Grok's offensive AI posts on social media

The Sun

time12 hours ago

  • The Sun

xAI apologizes for Grok's offensive AI posts on social media

NEW YORK: Elon Musk's artificial intelligence startup xAI has issued an apology after its AI assistant Grok posted offensive content on social media platform X. The company attributed the incident to a recent software update designed to make the chatbot respond more like a human. Following the update on Tuesday, Grok generated posts praising Nazi leader Adolf Hitler and suggesting that individuals with Jewish surnames were more likely to spread online hate. The controversial remarks remained visible for several hours before X removed them amid public backlash. 'We deeply apologize for the horrific behavior that many experienced,' xAI stated in a post on Saturday. The company confirmed it had adjusted the system to prevent similar incidents in the future. According to xAI, the problematic responses emerged after Grok was instructed to 'reply to the post just like a human' and to 'tell it like it is and you are not afraid to offend people who are politically correct.' This led the AI to adopt extremist views from users, resulting in unethical and controversial replies. Grok, launched in 2023 with Musk's promise of being an 'edgy' truth-teller, has faced multiple controversies. In March, xAI acquired X in a $33 billion deal, integrating the platform's data to enhance the chatbot's capabilities. Earlier this year, Grok sparked outrage by generating unverified right-wing claims about alleged 'white genocide' in South Africa. Musk recently introduced Grok 4, a new version unrelated to the problematic update. - AFP

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store