Can Russian Submarines Cut Off the Internet?

Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict.

The issue goes beyond old worries during the Cold War that the Russians would tap into the cables, a task American intelligence agencies also mastered decades ago. The alarm today is deeper:

The ultimate Russian hack on the United States could involve severing the fiber-optic cables at some of their hardest-to-access locations to halt the instant communications on which the West’s governments, economies and citizens have grown dependent.

While there is no evidence yet of any cable cutting, the concern is part of a growing wariness among senior American and allied military and intelligence officials over the accelerated activity by Russian armed forces around the globe. At the same time, the internal debate in Washington illustrates how the United States is increasingly viewing every Russian move through a lens of deep distrust, reminiscent of relations during the Cold War.

Russia watchers have long been aware of the threat, says Keir Giles, associate fellow of the Russia and Eurasia Programme at think tank Chatham House. However, he added that cutting the US off from the web would probably be impossible because of the number of connections going in and out of the country.

"I very much doubt that anyone would think of cutting off the US," he comments. "It is only going to work in locations where the Internet geography is going to create a vulnerability in communications."

But, Mr Giles adds that there are parts of the world where such action might be considered viable. Ukrainian telecoms providers reported disruptions to a key Internet exchange point and cable connections during Russian military activity in the Crimean peninsula in 2014.

The incident is mentioned in a Chatham House report on Russian information war tactics, which is being published later this year.

"They can interfere with internet infrastructure in order to gain complete control of the information available in specific regions," says Mr Giles, who adds that while much information about current naval activity in this vein is highly classified, the tactic does seem plausible. 

More cables are being laid as worldwide demand for Internet access grows and some states are known to have developed capabilities to tap cables in undersea locations, and the US is reported to have done this in the 1970s.

What's more, documents leaked by NSA whistleblower Edward Snowden allege that intelligence agencies like GCHQ and the NSA can intercept data communications at listening sites such as Bude in Cornwall, where a major transatlantic cable comes ashore in the UK.

Fibre optic cables traversing entire oceans, for example, carry disproportionately large swathes of the world's Internet traffic. Some of the heightened Russian naval activities have now being detected, in deep-sea locations.

In 2008, a series of cable disruptions were detected in the Middle East, which were subsequently attributed to clumsily dropped anchors in the Mediterranean and seas off the United Arab Emirates and Oman.

A few years later however, in 2013, Egypt arrested three divers who were found cutting through a major internet cable servicing parts of Europe, Africa, the Middle East and Asia.

NYT:      BBC

 

« Australia Lagging in Cyber War
Poaching On the Rise For Big Data Professionals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

INE

INE

INE is a premier provider of Technical Training for the IT industry.

Inveteck Global

Inveteck Global

Inveteck Global is a Ghana-based cyber security firm providing strategic guidance and technical solutions to all our clients to best serve their individual needs.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Digistor

Digistor

Digistor is a leading manufacturer of industrial-grade flash storage products, secure storage products, and Removable Secure Data Storage.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.