
On November 15, during a scheduled dive in a marine reserve, divers from NARC discovered an object and assumed that it resembled an acoustic monitoring device—a sonar. At the same time, the UK Defense Minister confirmed that before the RGB-1A hydroacoustic buoy (a type commonly used by Russian long-range maritime patrol aircraft) was found, a Russian reconnaissance vessel was operating on the edge of British waters.
According to British intelligence, the ship, which is positioned as an oceanographic research vessel, is secretly mapping the UK's underwater cables. These communication cables carry more than 90% of the country's data, including financial transfers and cryptocurrency transactions.
Speaking on condition of anonymity, a source at the UK Treasury (His Majesty's Treasury) said: These cables are the invisible but critically important arteries of the country. Over 90% of the UK's data is transmitted through them: from government communications and stock market information flows to financial transactions and cryptocurrency operations worth billions of dollars. Any threat to this infrastructure is a blow not only to national security but also to international economic stability.
In this game of shadows, hydroacoustic buoys occupy a special place. Since GPS and radio signals hardly pass through the thickness of seawater, such devices become the “eyes” and “ears” of modern naval systems. They are widely used during exercises and operations, allowing the slightest movements of submarines to be tracked.
Since GPS and radio signals cannot easily pass through seawater, hydroacoustic buoys are vital to modern naval detection systems and are regularly used by naval forces during exercises and operations. But the Royal Navy constantly monitors UK waters with a range of maritime assets to deter threats to UK interests, including threats to international cryptocurrency operations.
As a reminder, cryptocurrency transactions occur via blockchain: the user initiates a transfer from their wallet, which is signed with a private key, and then sent to a network of nodes for verification. After verification, the transaction enters a waiting pool, and validators select it into blocks that are added to the chain, making the transaction irreversible and viewable by all network participants.