Can Russian Submarines Cut Off the Internet?

Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict.

The issue goes beyond old worries during the Cold War that the Russians would tap into the cables, a task American intelligence agencies also mastered decades ago. The alarm today is deeper:

The ultimate Russian hack on the United States could involve severing the fiber-optic cables at some of their hardest-to-access locations to halt the instant communications on which the West’s governments, economies and citizens have grown dependent.

While there is no evidence yet of any cable cutting, the concern is part of a growing wariness among senior American and allied military and intelligence officials over the accelerated activity by Russian armed forces around the globe. At the same time, the internal debate in Washington illustrates how the United States is increasingly viewing every Russian move through a lens of deep distrust, reminiscent of relations during the Cold War.

Russia watchers have long been aware of the threat, says Keir Giles, associate fellow of the Russia and Eurasia Programme at think tank Chatham House. However, he added that cutting the US off from the web would probably be impossible because of the number of connections going in and out of the country.

"I very much doubt that anyone would think of cutting off the US," he comments. "It is only going to work in locations where the Internet geography is going to create a vulnerability in communications."

But, Mr Giles adds that there are parts of the world where such action might be considered viable. Ukrainian telecoms providers reported disruptions to a key Internet exchange point and cable connections during Russian military activity in the Crimean peninsula in 2014.

The incident is mentioned in a Chatham House report on Russian information war tactics, which is being published later this year.

"They can interfere with internet infrastructure in order to gain complete control of the information available in specific regions," says Mr Giles, who adds that while much information about current naval activity in this vein is highly classified, the tactic does seem plausible. 

More cables are being laid as worldwide demand for Internet access grows and some states are known to have developed capabilities to tap cables in undersea locations, and the US is reported to have done this in the 1970s.

What's more, documents leaked by NSA whistleblower Edward Snowden allege that intelligence agencies like GCHQ and the NSA can intercept data communications at listening sites such as Bude in Cornwall, where a major transatlantic cable comes ashore in the UK.

Fibre optic cables traversing entire oceans, for example, carry disproportionately large swathes of the world's Internet traffic. Some of the heightened Russian naval activities have now being detected, in deep-sea locations.

In 2008, a series of cable disruptions were detected in the Middle East, which were subsequently attributed to clumsily dropped anchors in the Mediterranean and seas off the United Arab Emirates and Oman.

A few years later however, in 2013, Egypt arrested three divers who were found cutting through a major internet cable servicing parts of Europe, Africa, the Middle East and Asia.

NYT:      BBC

 

« Australia Lagging in Cyber War
Poaching On the Rise For Big Data Professionals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Agesic

Agesic

Agesic is an institution that leads the development of the Digital Government and the Information and Knowledge Society in Uruguay.

Totalsec

Totalsec

Totalsec is a Grupo Salinas company with a team of professionals in cybersecurity and information security providing Security Consulting, Solutions Integration, and Managed Security Services.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

Data Protection Commission (DPC)

Data Protection Commission (DPC)

The Data Protection Commission (DPC) is the national independent authority responsible for upholding the fundamental right of individuals in the EU to have their personal data protected.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

VinCSS

VinCSS

VinCSS Internet Security Services JSC is a leading organization working in the field of researching, developing, producing products as well as providing cyber security services.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.

Swick Technologies (SWICKtech)

Swick Technologies (SWICKtech)

SWICKtech offer IT managed services to increase IT security, stability, and performance for your organization.