Can Russian Submarines Cut Off the Internet?

Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict.

The issue goes beyond old worries during the Cold War that the Russians would tap into the cables, a task American intelligence agencies also mastered decades ago. The alarm today is deeper:

The ultimate Russian hack on the United States could involve severing the fiber-optic cables at some of their hardest-to-access locations to halt the instant communications on which the West’s governments, economies and citizens have grown dependent.

While there is no evidence yet of any cable cutting, the concern is part of a growing wariness among senior American and allied military and intelligence officials over the accelerated activity by Russian armed forces around the globe. At the same time, the internal debate in Washington illustrates how the United States is increasingly viewing every Russian move through a lens of deep distrust, reminiscent of relations during the Cold War.

Russia watchers have long been aware of the threat, says Keir Giles, associate fellow of the Russia and Eurasia Programme at think tank Chatham House. However, he added that cutting the US off from the web would probably be impossible because of the number of connections going in and out of the country.

"I very much doubt that anyone would think of cutting off the US," he comments. "It is only going to work in locations where the Internet geography is going to create a vulnerability in communications."

But, Mr Giles adds that there are parts of the world where such action might be considered viable. Ukrainian telecoms providers reported disruptions to a key Internet exchange point and cable connections during Russian military activity in the Crimean peninsula in 2014.

The incident is mentioned in a Chatham House report on Russian information war tactics, which is being published later this year.

"They can interfere with internet infrastructure in order to gain complete control of the information available in specific regions," says Mr Giles, who adds that while much information about current naval activity in this vein is highly classified, the tactic does seem plausible. 

More cables are being laid as worldwide demand for Internet access grows and some states are known to have developed capabilities to tap cables in undersea locations, and the US is reported to have done this in the 1970s.

What's more, documents leaked by NSA whistleblower Edward Snowden allege that intelligence agencies like GCHQ and the NSA can intercept data communications at listening sites such as Bude in Cornwall, where a major transatlantic cable comes ashore in the UK.

Fibre optic cables traversing entire oceans, for example, carry disproportionately large swathes of the world's Internet traffic. Some of the heightened Russian naval activities have now being detected, in deep-sea locations.

In 2008, a series of cable disruptions were detected in the Middle East, which were subsequently attributed to clumsily dropped anchors in the Mediterranean and seas off the United Arab Emirates and Oman.

A few years later however, in 2013, Egypt arrested three divers who were found cutting through a major internet cable servicing parts of Europe, Africa, the Middle East and Asia.

NYT:      BBC

 

« Australia Lagging in Cyber War
Poaching On the Rise For Big Data Professionals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Lima Networks

Lima Networks

LIMA design and deliver IT Infrastructure solutions and services including managed Security Monitoring services.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

Procsima Group

Procsima Group

Procsima Group was created to help you achieve good IT management and security excellence.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

Cyber Risk International

Cyber Risk International

Cyber Risk International offer CyberPrism, a B2B SaaS solution that empowers businesses to perform a self-assessment of their cyber security program.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

Certera

Certera

Certera is a modern and affordable SSL Certificate, Code Signing Certificate, and Cyber Security Services provider.

One Step Secure IT

One Step Secure IT

One Step provide Managed IT Services, Cybersecurity Protections, and Compliance to businesses in the USA nationwide.