A high-security critical infrastructure facility with power lines and communication towers. A security guard holding a flashlight stands near surveillance cameras while a drone hovers overhead, monitoring the site at dusk.
Home /
Share

As the boundaries between peace and conflict blur in the era of grey-zone and hybrid competition, protecting critical infrastructure has become one of the defining security challenges of the 21st century. Systems such as power grids, transportation networks, communication channels, water supplies, and energy pipelines form the backbone of modern society. They support economic stability, safeguard public safety, and underpin national security.

These networks are also deeply interdependent. A disruption in one sector often cascades into others, amplifying its impact. A power grid failure can halt trains, disrupt communications, and cripple emergency services. The consequences of sabotage or disruption extend far beyond financial costs — they can create societal instability, trigger environmental damage, and result in the loss of life.

As threats grow more sophisticated — ranging from cyberattacks to physical sabotage of undersea cables — the need for stronger defenses is clear. Protecting these vital systems requires a mix of advanced technologies, informed policymaking, and international cooperation.

Updated February 2026

Since this article was first published, the threat to critical infrastructure has escalated dramatically. The IISS documented over 50 Russian-linked sabotage incidents across Europe from 2022 to mid-2025 — a 246% increase from 2023 to 2024 alone. At least 11 undersea cables were severed in the Baltic Sea between November 2024 and early 2025, prompting NATO to launch Operation Baltic Sentry in January 2025. Separately, at least 11 cable incidents occurred around Taiwan, with Chinese-crewed vessels suspected of deliberate anchor-dragging. Germany foiled a Russian-linked parcel-bomb plot targeting NATO logistics networks in May 2025. The EU has launched new initiatives to stress-test energy networks and enhance intelligence-sharing on hybrid threats.

Sources: IISS Research Paper →   Atlantic Council →   SIPRI Analysis →


Understanding the Threat Landscape

State-Sponsored Actors

Nation-states represent the most capable and persistent threat to critical infrastructure. Countries like Russia, China, Iran, and North Korea have developed sophisticated cyber and physical capabilities to target the essential systems of adversaries. Russia’s GRU, in particular, has been linked to a sustained campaign of sabotage across Europe since 2022, targeting energy grids, communication cables, military logistics, and transportation networks as part of a broader hybrid warfare strategy tied to the conflict in Ukraine.

These operations often fall below the threshold of armed conflict — designed to impose costs and create disruption while maintaining plausible deniability. Russia’s escalating sabotage campaign includes GPS jamming across Nordic airspace, arson attacks on warehouses linked to Ukrainian aid, and the systematic severing of undersea cables and pipelines in the Baltic Sea. China, meanwhile, has been implicated in suspected cable-cutting operations around Taiwan using civilian-flagged vessels with dragged anchors — a grey-zone tactic that exploits gaps in maritime law enforcement. State-sponsored cyber operations are equally concerning. The 2020 SolarWinds breach demonstrated how nation-state actors could infiltrate critical government and corporate networks through supply chain vulnerabilities, remaining undetected for months.

Terrorist and Militant Organizations

Terrorist groups and armed non-state actors target infrastructure to cause mass disruption, generate fear, and undermine state authority. Pipeline sabotage in the Niger Delta by groups like the Movement for the Emancipation of the Niger Delta (MEND) has cost Nigeria billions in lost revenue annually, while attacks on power infrastructure in Iraq and Syria by ISIS sought to collapse basic services and create governance vacuums. Even relatively unsophisticated attacks — cutting power lines, contaminating water supplies, bombing transportation hubs — can have cascading effects when infrastructure networks are interdependent.

Insider Threats

Employees or contractors with legitimate access to sensitive systems can exploit that access for purposes ranging from ideological sabotage to personal grievance. In 2013, a targeted attack on the Metcalf transmission substation in California — where attackers used sniper fire to destroy 17 transformers — exposed critical vulnerabilities in the physical security of the U.S. power grid. Insider threats extend to digital environments, where trusted individuals may compromise sensitive systems through intentional action or negligence. Organizations address these risks through enhanced screening, continuous activity monitoring, and workplace cultures that encourage reporting of suspicious behavior.

Hacktivists and Cybercriminals

Cybercriminal organizations, driven primarily by financial gain, increasingly target critical infrastructure through ransomware and extortion. The 2021 Colonial Pipeline attack demonstrated how a single ransomware incident could shut down the largest fuel pipeline in the United States, causing fuel shortages across the southeastern states and triggering panic buying. Hacktivist groups, meanwhile, use cyberattacks to advance political or ideological causes. While their capabilities are generally less sophisticated than state actors, their attacks on government websites, utilities, and communication platforms can still cause significant disruption — particularly when timed to coincide with geopolitical crises.

Natural and Accidental Risks

Not all infrastructure disruptions are deliberate. Extreme weather events, equipment aging, and human error account for a significant share of outages and failures. However, natural risks and deliberate sabotage often interact: aging infrastructure is more vulnerable to attack, and climate-driven events can mask or complicate attribution of suspicious incidents. Between 100 and 200 subsea cable faults occur annually from environmental causes and marine activity, which is precisely why state actors use anchor-dragging tactics — the damage is plausibly deniable.


Regional Case Studies

Africa: Pipeline Sabotage in Nigeria

Nigeria, Africa’s largest oil producer, faces persistent pipeline sabotage driven by economic grievances and environmental degradation. Militant groups frequently target oil infrastructure across the Niger Delta — more than 1,100 cases of pipeline vandalism were reported in 2022 alone. The Nigerian National Petroleum Corporation estimates that sabotage costs the country billions of dollars in lost revenue annually. Pipeline attacks also create severe environmental and health crises, as oil spills contaminate rivers, groundwater, and farmland. Groups such as MEND have used sabotage not only as a weapon but as a negotiating tool — demonstrating how infrastructure attacks serve both tactical and strategic purposes in irregular conflicts.

Europe: The Baltic Undersea Cable Campaign

The Baltic Sea has become the most active theater for infrastructure sabotage in Europe. Since 2022, at least ten subsea cables connecting Nordic and Baltic states have been cut, with seven incidents occurring between November 2024 and January 2025 alone. The pattern began with the September 2022 Nord Stream pipeline explosions, then escalated through the October 2023 Balticconnector pipeline rupture (linked to the Chinese-crewed vessel Newnew Polar Bear), the November 2024 severing of Finland-Germany and Sweden-Lithuania fiber-optic cables, and the December 2024 cutting of the Estlink 2 power cable between Finland and Estonia. Finland seized a Russian-owned vessel, the Eagle-S, suspected of the Estlink 2 damage, and identified it as part of Russia’s “shadow fleet” of sanctions-evading tankers. NATO responded by launching Operation Baltic Sentry in January 2025, deploying allied naval assets to monitor and deter further attacks on critical undersea infrastructure.

Asia: Cyberattacks on Indian Power Grids

India has experienced multiple cyberattacks targeting its power grid, attributed by cybersecurity researchers to Chinese state-linked groups. These intrusions probed grid management systems in critical nodes, likely to map vulnerabilities for potential exploitation during a future crisis. The attacks highlighted the growing intersection of cyber espionage and infrastructure pre-positioning — where adversaries establish persistent access to critical systems that can be activated for sabotage on command.

Latin America: Venezuela’s Grid Collapse

Venezuela’s 2019 nationwide blackout left millions without electricity for days. The government attributed the incident to cyber sabotage of the Guri Dam, which supplies most of the country’s power, though independent investigations could not verify these claims. Regardless of cause, the event exposed how deteriorating governance and poor maintenance make infrastructure catastrophically vulnerable — a condition that both state and non-state adversaries can exploit.

United States: The Colonial Pipeline Attack

The May 2021 ransomware attack on Colonial Pipeline remains the most significant cyber infrastructure incident in U.S. history. The DarkSide ransomware group forced the shutdown of the 5,500-mile pipeline carrying 45% of the East Coast’s fuel supply. The immediate impact included fuel shortages across southeastern states, average gasoline price spikes of 6 cents per gallon, and panic buying that emptied thousands of gas stations. Colonial Pipeline paid a $4.4 million ransom (partially recovered by the FBI), and the broader supply chain disruptions lasted weeks. The attack demonstrated how a single cyber intrusion could cascade into a nationwide economic and logistical crisis.


Legal and Policy Frameworks

CISA (U.S. Cybersecurity and Infrastructure Security Agency)

The Cybersecurity and Infrastructure Security Agency (CISA) serves as the United States’ primary federal body for infrastructure protection. CISA identifies and mitigates vulnerabilities, conducts red team assessments, and provides resources for both public and private sectors to strengthen their cybersecurity posture. In response to the surge in ransomware attacks following Colonial Pipeline, CISA launched the StopRansomware.gov platform — a centralized hub providing tools and guidance for prevention and response. CISA’s National Risk Management Center develops strategies for managing risks to the 16 designated critical infrastructure sectors and coordinating responses to significant disruptions.

European Union’s NIS2 Directive

The EU’s updated Network and Information Security Directive (NIS2), which entered force in October 2024, significantly expanded the scope and enforcement of cybersecurity requirements across member states. NIS2 applies to “essential entities” — including energy, transport, banking, healthcare, and digital infrastructure operators — requiring them to implement comprehensive risk management measures, report significant incidents within 24 hours, and face substantial penalties for non-compliance. The directive also strengthened cross-border coordination through the EU-CyCLONe network, designed to manage large-scale cyber incidents affecting multiple member states simultaneously.

International Cooperation

Infrastructure protection increasingly requires international coordination. NATO’s creation of a Critical Undersea Infrastructure Cell in 2023, followed by Operation Baltic Sentry in 2025, represents the alliance’s most significant commitment to infrastructure defense. The Budapest Convention on Cybercrime facilitates international cooperation on cybercrime prosecution, while the ITU’s Global Cybersecurity Agenda provides frameworks for developing nations to build defensive capabilities. However, significant gaps remain — particularly in maritime law, where UNCLOS provisions make it difficult for coastal states to board and investigate vessels suspected of cable sabotage in exclusive economic zones without flag-state permission.


Emerging Technologies and Defenses

Defensive technologies are evolving in response to the escalating threat. AI-driven monitoring systems can now detect anomalies in real time across power grids and communication networks, identifying potential cyberattacks or physical disruptions before they cascade. Blockchain technology is being explored for securing supply chain data and preventing tampering with critical systems. Quantum-resistant encryption is under development to counter the future threat of quantum computing breaking current cryptographic standards.

In the undersea domain, new seabed monitoring sensors and autonomous underwater vehicles are being deployed to detect suspicious activity near cables and pipelines. The UK’s Operation Nordic Warden, launched in early 2025, uses AI to analyze maritime data and flag shadow fleet vessels operating near critical infrastructure. Lithuania has pioneered public-private partnerships between its armed forces and electricity transmission operators to coordinate infrastructure defense — a model other nations are studying.

The historical record offers perspective. States and resistance movements have targeted infrastructure for strategic advantage for centuries — from Operation Gunnerside’s destruction of Norway’s heavy water plant in 1943 to modern cyber operations. What has changed is the scale of interdependence and the speed of cascading failure. Understanding both the theory and history of irregular warfare and the technical realities of modern infrastructure is essential for developing effective defenses.


// Key Infrastructure Attacks

Critical Infrastructure Sabotage Timeline: 2021–2025

May 2021
Colonial Pipeline ransomware — DarkSide group shuts down the largest U.S. fuel pipeline. $4.4M ransom paid. Fuel shortages across southeastern states.
September 2022
Nord Stream 1 & 2 explosions — Underwater blasts destroy sections of both gas pipelines from Russia to Germany. Seismic monitors detect detonations.
October 2023
Balticconnector pipeline ruptured — Finland-Estonia gas pipeline and data cable severed simultaneously. Chinese-crewed Newnew Polar Bear identified.
November 2024 – January 2025
BALTIC CABLE SURGE — Seven undersea cables severed in 3 months. Finland-Germany, Sweden-Lithuania fiber-optics cut. Estlink 2 power cable destroyed. Finland seizes Russian shadow fleet vessel Eagle-S. NATO launches Operation Baltic Sentry.
February 2025
Taiwan cable incidents — Chinese-crewed vessels suspected of severing telecom cables linking Taiwan to the US, South Korea, and Japan. 11+ incidents since 2023.
May 2025
German parcel-bomb plot foiled — Russian-linked plot targeting NATO logistics networks intercepted. IISS documents 25 sabotage incidents against NATO infrastructure in first 5 months of 2025.
50+
Sabotage Incidents (2022–25)
246%
Increase 2023→2024
$4.4M
Colonial Ransom
$9T
Daily Trade via Subsea Cables

// Further Reading
IISS — The Scale of Russian Sabotage Operations Against Europe’s Critical Infrastructure →
The most comprehensive open-source database of Russian sabotage operations across Europe, documenting 50+ incidents.
Atlantic Council — How the Baltic Sea Nations Have Tackled Suspicious Cable Cuts →
Detailed analysis of NATO and national responses to undersea infrastructure threats.
CISA — Cybersecurity and Infrastructure Security Agency →
U.S. federal agency for critical infrastructure protection, risk management, and cybersecurity guidance.
SIPRI — A Legislative Route to Combat Sabotage of Undersea Cables →
Expert analysis on UNCLOS gaps and how coastal states can legally protect submarine cables.
More on The Resistance Hub
Timothy Brown

Timothy Brown

Tim Brown spent two decades supporting and countering resistance movements across three continents. His work brought him to the heart of small nations fighting to remain free or resist terrorism and lawlessness. He writes under a pen name to explore the moral geometry of power: how the weak confront the strong, how belief sustains defiance, and how the will to endure outlasts occupation. His work aims to make the complex understandable and see the present in light of the theory and doctrine of the past.

Editorial Policy →

Updated · · Editorial Policy →
Affiliate As an Amazon Associate and affiliate partner, The Resistance Hub earns from qualifying purchases at no extra cost to you.