SHADOW
I. The Unpunished Crime
In November 2024, two undersea cables in the Baltic Sea were severed — the BCS East-West Interlink between Sweden and Lithuania, and C-Lion1 between Finland and Germany. A Chinese cargo vessel, the Yi Peng 3, had sailed over the cable routes at the relevant time. The ship anchored for weeks in international waters north of the Øresund. It could not be boarded. No state could compel it to enter port. China permitted no inspection. Eventually the ship sailed away.
In October 2023, the Balticconnector gas pipeline between Finland and Estonia and a further data cable were damaged. The vessel presumed responsible, the NewNew Polar Bear, was also Chinese and had also been active with an anchor. Again: no prosecution, no consequences.
Nord Stream in 2022 was more spectacular, but the pattern is the same: maritime infrastructure sabotage goes unpunished because proof is lacking. Not because nobody knows who did it — but because current international law requires proof that cannot be obtained from the seabed.
This is not a failure of justice. It is a structural gap in the system — and it is being systematically exploited.
II. The Geometry of Impunity
More than 400 undersea cables today carry over 95 percent of global internet traffic. Added to this are pipelines, power cables, data lines. They run along the seabed — invisible, largely unmonitored, in international waters where no police patrol.
A modern ROV (Remotely Operated Vehicle) can sever a cable within hours. Repair takes weeks to months and costs millions. The ratio of attack effort to repair effort is astronomically in favour of the saboteur — much like the Berlin high-voltage cable brought down by a fire, whose repair took a week.
The attribution problem makes this asymmetry still greater. A ship that sails at night without a transponder over a cable route while dragging an anchor leaves no fingerprints. Even if satellites tracked the ship — which is technically possible today, but legally insufficient — the question remains: Was it intentional? Was it negligent? Was it coincidence? Without an answer, no prosecution. Without prosecution, no deterrence.
The current system waits for proof. SHADOW does not.
III. What Is Already Possible Today
The attribution problem is already largely solved technically — simply not exploited politically.
SAR satellites (Synthetic Aperture Radar) detect metal hulls at sea regardless of weather and regardless of whether a transponder is active. Commercial providers including Iceye, Capella Space and Planet Labs offer near-real-time coverage. Optical satellites provide image identification. RF-sensing satellites from companies HawkEye 360 and Unseenlabs detect radar emissions and radio signals — every ship transmits, even if it does not transmit AIS. Cross-referencing these sources allows every ship on every ocean to be identified, tracked and linked to its entry into any port in the world.
This is already being done — for sanctions enforcement, fisheries monitoring, insurance cover. Russia's so-called shadow fleet of an estimated 600 to 700 tankers has been fully mapped by organisations including Lloyd's List Intelligence and the Kyiv School of Economics. It is known which ships fulfil which functions. Nothing is done.
AIS — the Automatic Identification System — is already mandatory under the SOLAS Convention for all ships over 300 GRT on international voyages. Switching it off is not a grey area; it is a documented regulatory violation. What is lacking is not the norm. What is lacking is the consequence.
IV. The SHADOW Principle — Reversal of the Burden of Proof
SHADOW stands for Systematic Hostile Activity Deterrence through Warrant-less Observation and Response.
The core principle is reversal of the burden of proof.
The current system asks: Can we prove that this ship sabotaged the cable? Since the answer is almost never yes, the ship goes unpunished.
SHADOW asks differently: Did this ship deactivate its transponder in a cable protection zone? This question is answerable — through satellite data, through the absence of AIS signals, through RF tracking. Those who operate without transponders in a designated protection zone have already made a decision that carries consequences — regardless of what they did or did not do.
That reverses the logic. Not: Prove your innocence of a specific act. Rather: Explain why you switched off your transponder. That is a fundamentally different demand — and a fundamentally answerable one.
V. The Three Elements of SHADOW
First element: Cable protection zones with presence obligation. A coalition of states — beginning with EU members and NATO partners — declares designated cable corridors in international waters to be zones with mandatory transponder operation. Every ship transiting these zones must keep its AIS active. Those who do not are identified by satellite, recorded, and placed on a list. No exceptions for military vessels of friendly states — those who want exceptions register in advance. Silent transit without transponder is treated as a regulatory violation, not a minor infraction.
Second element: Right of visit for transponder-dark ships. Coalition states agree among themselves — and anchor this in a multilateral protocol — the right to stop, identify and inspect transponder-dark ships on the high seas. Legal basis: UNCLOS Article 110 permits the right of visit against ships that cannot demonstrate nationality or whose identity is unclear. A ship without a transponder that does not immediately demonstrate its identity upon request qualifies for this category. This is not an extension of international law — it is the consistent application of existing norms to a new reality.
Third element: Permanent tracking and graduated consequences. Ships once intercepted without transponders in protection zones are permanently entered in a monitoring database — open, public, accessible to every port operator, insurer and bank. Consequences are graduated: first violation — port denial in all coalition states until clarification. Repeat violation — permanent port denial. Uncooperative conduct during identification — immediate sanctioning of the flag state if it protects the ship. Not as punishment for a proven act, but as consequence for documented suspicious behaviour.
VI. The Burden of Proof Reversal — Legally and Politically
The reversal of the burden of proof is the most unusual and most important element of SHADOW. It is legally contestable — and nevertheless defensible.
In criminal law: in dubio pro reo. No one must prove their innocence. SHADOW is not criminal law. It is preventive law and security law — and in this domain, reversal of the burden of proof is already established.
Banking law: an institution that cannot explain unusual transactions loses its licence — without a criminal offence being proven. Sanctions law: OFAC places ships and companies on sanctions lists based on connection patterns and behavioural indicators — not based on verdicts. Arms trade: a country that cannot demonstrate satisfactory end-use control receives no export licence. Wherever prevention interests predominate, the burden of explanation lies with the affected party.
The question is not: is SHADOW legally immaculate? The question is: is the status quo — complete impunity for documented infrastructure sabotage — tolerable? And if the answer is no, which instrument protects better without escalating?
SHADOW does not escalate militarily. It does not confine people. It does not threaten retaliation. It only says: those who sail without transponders declare themselves suspect. And suspects bear the burden of explanation.
VII. The Shadow Fleet and Its Vulnerability
SHADOW targets a concrete, already existing structure: the Russian shadow fleet.
This fleet — an estimated 600 to 700 tankers and cargo ships that have handled Russian energy exports since the western oil sanctions from 2022 — operates systematically without or with manipulated transponders. Its ships fly flags of Panama, Gabon, Palau, the Marshall Islands — states with minimal regulatory interest. They are operated by shell companies in Dubai, Hong Kong and Singapore. They are no longer served by western banks and insurers — in theory.
In practice gaps remain: ships without insurance still enter port because harbour authorities do not consistently check. Fuel deliveries to ships without clear identity still occur because the market continues. SHADOW closes these gaps not through more bureaucracy but through a simple rule: those who cannot present a reliable tracking protocol are not welcome in any coalition port. No fuel. No cargo discharge. No repair. No communication.
This affects not only the shadow fleet. It affects every state or private actor that uses the instrument of transponder-dark navigation — whether for sabotage, for sanctions evasion or for reconnaissance. The rule applies equally to all, and demands nothing unreasonable from anyone: an active transponder.
VIII. Interdiction — Practical and Political
The question of whether ships should physically be interdicted is the most sensitive in SHADOW — and it must be answered honestly.
Physical interdiction on the high seas carries escalation potential. When a warship stops a Chinese or Russian merchant vessel, that is not merely a legal question, it is a political decision. The Yi Peng 3 case illustrates this: Denmark could have interdicted the ship in its territorial waters — it chose not to, for political reasons.
SHADOW resolves this dilemma through prioritisation: physical interdiction is the last resort, not the first. The primary mechanism is identification through satellite data and entry in the public monitoring database. Interdiction comes into play when a ship enters coalition waters — where coastal state jurisdiction applies, where no high-seas interdiction is needed. Every coalition port is a potential identification point.
The question is not: do we want to interdict Chinese ships in the Atlantic? The question is: do we want ships that operated without transponders in designated cable protection zones to subsequently load and unload in Hamburg, Rotterdam and Antwerp? That question can be answered politically — without military confrontation at sea.
IX. What SHADOW Is Not
SHADOW is not a naval blockade. It does not exclude anyone from shipping — it merely demands compliance with a rule that already applies. AIS obligation is SOLAS, not SHADOW.
SHADOW is not an act of war. Port denial is a recognised instrument of state sovereignty applied daily — against ships without insurance, without health certificates, without cargo documentation. SHADOW adds one further category: documented transponder-dark operation in protection zones.
SHADOW is not collective punishment for flag states. It targets specific ships with specific documented behaviour. A Chinese ship that correctly sails with its transponder active is unaffected by SHADOW.
SHADOW is also not naive. It does not fully solve the attribution problem. A determined state actor intent on sabotaging cables will find ways — submarines, ROVs, covert operations. SHADOW makes that harder, more expensive and more risky. It makes the easiest form of sabotage — the accidentally-intentional dragging of an anchor — sufficiently costly that it ceases to be worthwhile.
X. SHADOW and the Series of Civilisational Deterrence
SHADOW follows the logic of the three preceding concepts — and adds a new dimension.
NUET neutralises nuclear blackmail through automatic isolation: those who use nuclear weapons are cut off from the world economy — without vote, without decision, without hesitation. RIEGEL neutralises the conventional threat of the Suwalki Gap through geometric reciprocity: those who close the gap close themselves in. MESH neutralises hybrid land-based infrastructure sabotage through decentralisation: those who destroy a node destroy only a node.
SHADOW neutralises hybrid maritime infrastructure sabotage through reversal of the burden of proof: those who operate without transponders in protection zones henceforth bear the burden of explanation — permanently, publicly, with tangible consequences.
The common denominator of all four concepts is the same: they do not wait for proof of malicious intent. They create structures in which the precondition for hostile action is already sanctioned. Not: punish the act. Rather: make preparation for the act costly enough that the act does not take place.
That is not retaliation. That is architecture.
XI. What Must Be Done
First: A coalition of EU and NATO states declares designated cable corridors as protection zones with mandatory transponder operation and documentation requirements. The zones are marked on public nautical charts. Every ship transiting them is recorded.
Second: A multilateral protocol — not UN-dependent, but as a coalition agreement like the Proliferation Security Initiative — establishes the right of visit for transponder-dark ships in coalition waters and the right of identification on the high seas.
Third: A public, open database — accessible to every port operator, insurer and bank in the coalition — records all ships documented as having operated without transponders in protection zones. Port denial in all coalition ports is the automatic consequence — not a political decision, but an algorithm.
Fourth: Cable repair capacity is treated as strategic infrastructure. Currently there are approximately 60 cable-laying vessels worldwide. NATO states collectively own a handful. Those who can repair cables quickly remove the effect from the saboteur — and complement SHADOW with MESH logic: the attack is not only sanctioned, it becomes inconsequential.
Fifth: Flag states that protect ships with documented SHADOW violations are placed in a separate category — with corresponding consequences for their overall trade relations with the coalition. This creates political pressure on states like Panama, Gabon and Palau to clean up their ship registries. Not through sanctions, but through a simple message: those who protect sabotage vessels lose access to the world's largest single market.
Those who sail without transponders declare themselves suspect.
Suspects bear the burden of explanation.
That is not a verdict. That is arithmetic.
SHADOW — Systematic Hostile Activity Deterrence through Warrant-less Observation and Response — is the fourth concept in the series of civilisational deterrence, following NUET (Nuclear Use Exclusion Treaty), RIEGEL (Reciprocal Immediate Geostrategic Enclosure and Lockdown) and MESH (Modular European Security through Horizontal resilience). All four concepts follow the principle of architecture rather than threat: hostile action is not retaliated against, but sanctioned by the structure of the situation before the act occurs.
The series appears on beyond-decay.org — constructive proposals for a world that needs them.
Nuremberg / San Francisco, March 2026