US Accuses Russia Of Interfering With Undersea Cables

Announcing new sanctions against Russia, the US Treasury Department accused Moscow of "tracking undersea communications cables" and imposed punitive measures on a St. Petersburg firm that it says provided underwater diving equipment to Russia's Federal Security Service (FSB). 

The announcement this month followed warnings by US and other Western officials about Russian activities in recent years near undersea cables that serve as conduits for nearly all global telecommunications data.

"We are now seeing Russian underwater activity in the vicinity of undersea cables that I don't believe we have ever seen," US Navy Rear Admiral Andrew Lennon, the commander of NATO's submarine forces, said in December. 

Britain's military chief, Sir Stuart Peach, said in December that Russia could pose a major threat to NATO by attacking undersea cables critical for international trade and the Internet. He warned that economies could be hit "immediately and potentially catastrophically" if the cables were severed or otherwise disrupted. 

But just how vulnerable is this network of cables, known as the "backbone of the global Internet," to sabotage and other manipulation?

The location of cables, which are roughly the diameter of a garden hose, along the ocean floor offers a modicum of security from actors who would intentionally try to damage them.

"It's not that it's much more difficult to sever cables in the deep ocean, it's just that the primary forms of interference are less likely to happen," writes Nicole Starosielski an associate professor at New York University and author of the 2015 book The Undersea Network. 

"The sea is so big and the cables are so narrow, the probability isn't that high that you'd run across one," Starosielski adds.
Experts say that the multiple paths for telecommunications traffic via the cables also offer security: If a single cable were broken, in most cases that traffic would be rerouted around different parts of the network.

Anchors, Fishing Gear, And…Sharks?
As of early 2018, there were an estimated 448 submarine cables, totaling more than 1 million kilometers in length, operating throughout the world, according to TeleGeography, a Washington-based market research firm. This network, however, includes so-called "chokepoints" where crucial cable routes converge, according to a 2010 study by the Institute of Electrical and Electronics Engineers and the EastWest Institute think tank.

"A single disaster in such an area could cause catastrophic loss of regional and global connectivity," the report said. 
Starosielski told Wired in May, however, that "the amount of anxiety about somebody sabotaging a single cable or multiple cables is overblown."

"If somebody knew how these systems worked and if they staged an attack in the right way, then they could disrupt the entire system. But the likelihood of that happening is very small. Most of the concerns and fears are not nearly a threat at all," she said. 

Undersea cables are, in fact, damaged regularly, with experts estimating between 100 and 200 such incidents each year. Two of the main causes are less exotic than state sabotage; namely, anchors dragging across the seabed and fishing gear that gets tangled up with the cables, experts say.

There have been incidents of sharks biting deep-sea fiber-optic cables, though the Britain-based International Cable Protection Committee (ICPC) recorded no such incident between 2007 and 2014. 

In 2013, the Egyptian coast guard arrested three divers who authorities said were cutting through a cable near Alexandria, though officials did not indicate a motive. 

Almost all undersea cables are privately owned, and the ICPC, which has more than 170 members from more than 60 countries, has called for action by governments around the world to safeguard the deep-ocean networks. 

Deep-Sea Espionage
Undersea cables have also been targeted for surveillance purposes. The United States tapped Soviet cables in the Sea of Okhotsk during the Cold War, and documents leaked by former US National Security Agency (NSA) contractor Edward Snowden indicated that US and British intelligence had gained access to data transmitted in undersea cables.

In September 2015, the United States monitored the Russian research vessel Yantar (pictured) as it traveled to Cuba along the US East Coast. The New York Times cited US Navy as saying that it carried submersible crafts capable of diving and cutting undersea cables. 

An official Russian government publication has openly discussed Yantar's surveillance capabilities.

"Yantar has devices aboard intended for deep-sea tracking, as well as equipment for connecting to top-secret communications cables," the official newspaper of the Russian parliament said in October. 

The US Treasury Department, which identified the St. Petersburg underwater equipment company as Divetechnoservice, did not explicitly specify any connection between it and the Yantar Baltic Shipyard, which built the Yantar research vessel. 

However, Russian government procurement documents, as well as arbitration records, show that Divetechnoservice signed contracts in 2012 with the shipyard to produce and test a one- and two-man deep-water submersible capable of operating at depths up to 1,000 meters (3,000 feet). And the company's website includes photographs of the submersible crafts.

RFERL

You Might Also Read: 

Can Russian Submarines Cut Off the Internet?:

Cyber Spying All At Sea:

« Using Machine Learning To Spot Photoshopped Images
Police Advice On Cybercrime & Online Safety »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

CryptTalk

CryptTalk

CryptTalk is an easy-to-use secure communication service.

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

Spinnaker Support

Spinnaker Support

Spinnaker Support is a premier global provider of on-premise and cloud-based enterprise software support services.

Persona

Persona

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.