US Accuses Russia Of Interfering With Undersea Cables

Announcing new sanctions against Russia, the US Treasury Department accused Moscow of "tracking undersea communications cables" and imposed punitive measures on a St. Petersburg firm that it says provided underwater diving equipment to Russia's Federal Security Service (FSB). 

The announcement this month followed warnings by US and other Western officials about Russian activities in recent years near undersea cables that serve as conduits for nearly all global telecommunications data.

"We are now seeing Russian underwater activity in the vicinity of undersea cables that I don't believe we have ever seen," US Navy Rear Admiral Andrew Lennon, the commander of NATO's submarine forces, said in December. 

Britain's military chief, Sir Stuart Peach, said in December that Russia could pose a major threat to NATO by attacking undersea cables critical for international trade and the Internet. He warned that economies could be hit "immediately and potentially catastrophically" if the cables were severed or otherwise disrupted. 

But just how vulnerable is this network of cables, known as the "backbone of the global Internet," to sabotage and other manipulation?

The location of cables, which are roughly the diameter of a garden hose, along the ocean floor offers a modicum of security from actors who would intentionally try to damage them.

"It's not that it's much more difficult to sever cables in the deep ocean, it's just that the primary forms of interference are less likely to happen," writes Nicole Starosielski an associate professor at New York University and author of the 2015 book The Undersea Network. 

"The sea is so big and the cables are so narrow, the probability isn't that high that you'd run across one," Starosielski adds.
Experts say that the multiple paths for telecommunications traffic via the cables also offer security: If a single cable were broken, in most cases that traffic would be rerouted around different parts of the network.

Anchors, Fishing Gear, And…Sharks?
As of early 2018, there were an estimated 448 submarine cables, totaling more than 1 million kilometers in length, operating throughout the world, according to TeleGeography, a Washington-based market research firm. This network, however, includes so-called "chokepoints" where crucial cable routes converge, according to a 2010 study by the Institute of Electrical and Electronics Engineers and the EastWest Institute think tank.

"A single disaster in such an area could cause catastrophic loss of regional and global connectivity," the report said. 
Starosielski told Wired in May, however, that "the amount of anxiety about somebody sabotaging a single cable or multiple cables is overblown."

"If somebody knew how these systems worked and if they staged an attack in the right way, then they could disrupt the entire system. But the likelihood of that happening is very small. Most of the concerns and fears are not nearly a threat at all," she said. 

Undersea cables are, in fact, damaged regularly, with experts estimating between 100 and 200 such incidents each year. Two of the main causes are less exotic than state sabotage; namely, anchors dragging across the seabed and fishing gear that gets tangled up with the cables, experts say.

There have been incidents of sharks biting deep-sea fiber-optic cables, though the Britain-based International Cable Protection Committee (ICPC) recorded no such incident between 2007 and 2014. 

In 2013, the Egyptian coast guard arrested three divers who authorities said were cutting through a cable near Alexandria, though officials did not indicate a motive. 

Almost all undersea cables are privately owned, and the ICPC, which has more than 170 members from more than 60 countries, has called for action by governments around the world to safeguard the deep-ocean networks. 

Deep-Sea Espionage
Undersea cables have also been targeted for surveillance purposes. The United States tapped Soviet cables in the Sea of Okhotsk during the Cold War, and documents leaked by former US National Security Agency (NSA) contractor Edward Snowden indicated that US and British intelligence had gained access to data transmitted in undersea cables.

In September 2015, the United States monitored the Russian research vessel Yantar (pictured) as it traveled to Cuba along the US East Coast. The New York Times cited US Navy as saying that it carried submersible crafts capable of diving and cutting undersea cables. 

An official Russian government publication has openly discussed Yantar's surveillance capabilities.

"Yantar has devices aboard intended for deep-sea tracking, as well as equipment for connecting to top-secret communications cables," the official newspaper of the Russian parliament said in October. 

The US Treasury Department, which identified the St. Petersburg underwater equipment company as Divetechnoservice, did not explicitly specify any connection between it and the Yantar Baltic Shipyard, which built the Yantar research vessel. 

However, Russian government procurement documents, as well as arbitration records, show that Divetechnoservice signed contracts in 2012 with the shipyard to produce and test a one- and two-man deep-water submersible capable of operating at depths up to 1,000 meters (3,000 feet). And the company's website includes photographs of the submersible crafts.

RFERL

You Might Also Read: 

Can Russian Submarines Cut Off the Internet?:

Cyber Spying All At Sea:

« Using Machine Learning To Spot Photoshopped Images
Police Advice On Cybercrime & Online Safety »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

French Expert Center Against Cybercrime (CECyF)

French Expert Center Against Cybercrime (CECyF)

CECyF is a centre of excellence for countering cybercrime in France.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI) is recognized as Thailand’s leader in cyber investigations and digital forensics.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

CSIOS Corp.

CSIOS Corp.

At CSIOS we help our customers achieve and sustain information and cyberspace superiority through a full range of defensive and offensive cyberspace operations and cybersecurity consulting services.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

CyberGate Technologies

CyberGate Technologies

CyberGate Technologies is a world-class, customer focus cyber security service and consultancy company operating the UK, Europe, Middle East, and Africa.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.

Upwind Security

Upwind Security

Upwind delivers comprehensive cloud security, precisely when and where it’s most critical.

SafetyDetectives

SafetyDetectives

SafetyDetectives' mission is to give our readers accurate and valuable information so they can make informed decisions about staying safe, secure and protected on the internet.