Undersea Telecoms Cables Are Interception Targets

A report by right-leaning think tank Policy Exchange highlights how global undersea cables are poorly protected, and suggests that Britain should lead the way in remedying this.

The report, titled 'Undersea Cables: Indispensable, insecure' written by Conservative MP Rishi Sunak, discusses how easily cable-based communications can be disrupted, and the past and potential future threats to their continued function.

Cables carrying data are essential to modern communications but lack both physical and legal protections, according to Sunak.

Their locations are freely available to the public in order to prevent accidental damage by shipping, but the laws governing them are lax. He described the current laws as "far more suited to the comparatively peripheral role the infrastructure played in the '70s and '80s, than to the indispensable status they now hold in the internet age".

The age of those laws means that enforcement agencies struggle to deal with suspects and offenders with appropriate severity, said Sunak, who added that the need for reform has been ignored by national governments because the cables are often managed by private companies rather than nation states, and therefore slip under the gaze of legislators.

The risk of severed cables is compounded by the aggregation of cables into "dangerously concentrated" choke points. 
Examples of this are the Luzon Strait between Taiwan and the Philippines, which connects several eastern countries and the US, or a single building in Alexandria, Egypt, which holds the meeting point of five transnational cables.

This kind of infrastructure damage could appeal to terrorists, Sunak writes, indicating a foiled Al-Qaeda attack in 2007, meant to target an Internet exchange in London, as proof of this.

As well as terrorists, he points at Russia as the other major threat. He cites the severing of the main cable leading into the Crimean Peninsula when Russia annexed the region in 2014. 

The operation of Russian submarines along cable routes, and the use of the Yantar-class "intelligence ship", which carries two submarines believed to be capable of destroying cables or tapping them for information. 

Sunak recommended that government departments should focus on cable protection in future reviews, and that undersea cables should be designated as critical national infrastructure. Others involved updating international law and military codes to ensure legal protection, and the construction of new cables in diverse locations to act as backups.

Another recommendation pointed to Australia and New Zealand's Cable Protection Zones, where ships cannot fish or anchor, and can only sail through under supervision by the Coast Guard. Britain should "encourage the establishment" of such zones in the Suez and the Mediterranean to protect connections with the Middle East, Sunak wrote.

In his concluding remarks in the report, Sunak said: "Disrupting cables is not only possible and surprisingly easy, but it can have significantly negative consequences for our security and prosperity. "Despite this backdrop, there has historically been minimal state involvement in the sector, despite its strategic importance."

The Register:    Cable Data Map: Greg Mahlknecht

You Might Also Read:

Can Russian Submarines Cut Off the Internet?:

Cyber Spying All At Sea:

Forget Trident & Welcome To Cyber Warfare:

 

« Cyber Criminals Are The New Mafia
Russia Will Build A Separate Internet Directory »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

GV

GV

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Ribbon Communications

Ribbon Communications

Ribbon Communications delivers global communications software and network solutions to service providers, enterprises, and critical infrastructure sectors.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Diligent

Diligent

Diligent's SaaS GRC platform gives leaders a connected view of governance, risk, compliance and ESG across their organization.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

Alcatel-Lucent Enterprise (ALE)

Alcatel-Lucent Enterprise (ALE)

We are Alcatel-Lucent Enterprise. Our mission is to make everything connect with digital age networking, communications and cloud solutions.

Scope AI

Scope AI

Scope AI is an innovative technology company specializing in quantum security and machine learning.