Can Russian Submarines Cut Off the Internet?

Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict.

The issue goes beyond old worries during the Cold War that the Russians would tap into the cables, a task American intelligence agencies also mastered decades ago. The alarm today is deeper:

The ultimate Russian hack on the United States could involve severing the fiber-optic cables at some of their hardest-to-access locations to halt the instant communications on which the West’s governments, economies and citizens have grown dependent.

While there is no evidence yet of any cable cutting, the concern is part of a growing wariness among senior American and allied military and intelligence officials over the accelerated activity by Russian armed forces around the globe. At the same time, the internal debate in Washington illustrates how the United States is increasingly viewing every Russian move through a lens of deep distrust, reminiscent of relations during the Cold War.

Russia watchers have long been aware of the threat, says Keir Giles, associate fellow of the Russia and Eurasia Programme at think tank Chatham House. However, he added that cutting the US off from the web would probably be impossible because of the number of connections going in and out of the country.

"I very much doubt that anyone would think of cutting off the US," he comments. "It is only going to work in locations where the Internet geography is going to create a vulnerability in communications."

But, Mr Giles adds that there are parts of the world where such action might be considered viable. Ukrainian telecoms providers reported disruptions to a key Internet exchange point and cable connections during Russian military activity in the Crimean peninsula in 2014.

The incident is mentioned in a Chatham House report on Russian information war tactics, which is being published later this year.

"They can interfere with internet infrastructure in order to gain complete control of the information available in specific regions," says Mr Giles, who adds that while much information about current naval activity in this vein is highly classified, the tactic does seem plausible. 

More cables are being laid as worldwide demand for Internet access grows and some states are known to have developed capabilities to tap cables in undersea locations, and the US is reported to have done this in the 1970s.

What's more, documents leaked by NSA whistleblower Edward Snowden allege that intelligence agencies like GCHQ and the NSA can intercept data communications at listening sites such as Bude in Cornwall, where a major transatlantic cable comes ashore in the UK.

Fibre optic cables traversing entire oceans, for example, carry disproportionately large swathes of the world's Internet traffic. Some of the heightened Russian naval activities have now being detected, in deep-sea locations.

In 2008, a series of cable disruptions were detected in the Middle East, which were subsequently attributed to clumsily dropped anchors in the Mediterranean and seas off the United Arab Emirates and Oman.

A few years later however, in 2013, Egypt arrested three divers who were found cutting through a major internet cable servicing parts of Europe, Africa, the Middle East and Asia.

NYT:      BBC

 

« Australia Lagging in Cyber War
Poaching On the Rise For Big Data Professionals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

SiteLock

SiteLock

SiteLock is a global leader in website security solutions. We provide affordable, cybersecurity software solutions designed to allow small to midsize businesses to operate without fear of an attack.

Information Network Security Agency (INSA) - Ethiopia

Information Network Security Agency (INSA) - Ethiopia

INSA's vision is to realize a globally competent National Cyber capability which plays a key role in protecting the national interests of Ethiopia.

European Recruitment

European Recruitment

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

NSIDE Attack Logic

NSIDE Attack Logic

NSIDE Attack Logic simulates real-world cyber attacks to detect vulnerabilities in corporate networks and systems.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.