US Accuses Russia Of Interfering With Undersea Cables

Announcing new sanctions against Russia, the US Treasury Department accused Moscow of "tracking undersea communications cables" and imposed punitive measures on a St. Petersburg firm that it says provided underwater diving equipment to Russia's Federal Security Service (FSB). 

The announcement this month followed warnings by US and other Western officials about Russian activities in recent years near undersea cables that serve as conduits for nearly all global telecommunications data.

"We are now seeing Russian underwater activity in the vicinity of undersea cables that I don't believe we have ever seen," US Navy Rear Admiral Andrew Lennon, the commander of NATO's submarine forces, said in December. 

Britain's military chief, Sir Stuart Peach, said in December that Russia could pose a major threat to NATO by attacking undersea cables critical for international trade and the Internet. He warned that economies could be hit "immediately and potentially catastrophically" if the cables were severed or otherwise disrupted. 

But just how vulnerable is this network of cables, known as the "backbone of the global Internet," to sabotage and other manipulation?

The location of cables, which are roughly the diameter of a garden hose, along the ocean floor offers a modicum of security from actors who would intentionally try to damage them.

"It's not that it's much more difficult to sever cables in the deep ocean, it's just that the primary forms of interference are less likely to happen," writes Nicole Starosielski an associate professor at New York University and author of the 2015 book The Undersea Network. 

"The sea is so big and the cables are so narrow, the probability isn't that high that you'd run across one," Starosielski adds.
Experts say that the multiple paths for telecommunications traffic via the cables also offer security: If a single cable were broken, in most cases that traffic would be rerouted around different parts of the network.

Anchors, Fishing Gear, And…Sharks?
As of early 2018, there were an estimated 448 submarine cables, totaling more than 1 million kilometers in length, operating throughout the world, according to TeleGeography, a Washington-based market research firm. This network, however, includes so-called "chokepoints" where crucial cable routes converge, according to a 2010 study by the Institute of Electrical and Electronics Engineers and the EastWest Institute think tank.

"A single disaster in such an area could cause catastrophic loss of regional and global connectivity," the report said. 
Starosielski told Wired in May, however, that "the amount of anxiety about somebody sabotaging a single cable or multiple cables is overblown."

"If somebody knew how these systems worked and if they staged an attack in the right way, then they could disrupt the entire system. But the likelihood of that happening is very small. Most of the concerns and fears are not nearly a threat at all," she said. 

Undersea cables are, in fact, damaged regularly, with experts estimating between 100 and 200 such incidents each year. Two of the main causes are less exotic than state sabotage; namely, anchors dragging across the seabed and fishing gear that gets tangled up with the cables, experts say.

There have been incidents of sharks biting deep-sea fiber-optic cables, though the Britain-based International Cable Protection Committee (ICPC) recorded no such incident between 2007 and 2014. 

In 2013, the Egyptian coast guard arrested three divers who authorities said were cutting through a cable near Alexandria, though officials did not indicate a motive. 

Almost all undersea cables are privately owned, and the ICPC, which has more than 170 members from more than 60 countries, has called for action by governments around the world to safeguard the deep-ocean networks. 

Deep-Sea Espionage
Undersea cables have also been targeted for surveillance purposes. The United States tapped Soviet cables in the Sea of Okhotsk during the Cold War, and documents leaked by former US National Security Agency (NSA) contractor Edward Snowden indicated that US and British intelligence had gained access to data transmitted in undersea cables.

In September 2015, the United States monitored the Russian research vessel Yantar (pictured) as it traveled to Cuba along the US East Coast. The New York Times cited US Navy as saying that it carried submersible crafts capable of diving and cutting undersea cables. 

An official Russian government publication has openly discussed Yantar's surveillance capabilities.

"Yantar has devices aboard intended for deep-sea tracking, as well as equipment for connecting to top-secret communications cables," the official newspaper of the Russian parliament said in October. 

The US Treasury Department, which identified the St. Petersburg underwater equipment company as Divetechnoservice, did not explicitly specify any connection between it and the Yantar Baltic Shipyard, which built the Yantar research vessel. 

However, Russian government procurement documents, as well as arbitration records, show that Divetechnoservice signed contracts in 2012 with the shipyard to produce and test a one- and two-man deep-water submersible capable of operating at depths up to 1,000 meters (3,000 feet). And the company's website includes photographs of the submersible crafts.

RFERL

You Might Also Read: 

Can Russian Submarines Cut Off the Internet?:

Cyber Spying All At Sea:

« Using Machine Learning To Spot Photoshopped Images
Police Advice On Cybercrime & Online Safety »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Cambray Solutions

Cambray Solutions

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

Rimini Street

Rimini Street

Rimini Street is a global provider of enterprise software support products and services, and the leading third-party support provider for Oracle and SAP software products.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

VISO Cyber Security

VISO Cyber Security

VISO provide Cyber Security Consulting and CISO as a Service to companies who need to augment their leadership teams with information security expertise.

Cyber Risk International

Cyber Risk International

Cyber Risk International offer CyberPrism, a B2B SaaS solution that empowers businesses to perform a self-assessment of their cyber security program.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.