Report: Submarine Cables at Risk of Nation-State Sabotage, Spying
Overview
In a recent report, intelligence company Recorded Future highlights the increasing risks to submarine telecommunication cables, including the potential for deliberate sabotage and spying by nation-state threat actors. As the backbone of the global economy and telecommunications, submarine cables are responsible for transmitting an estimated 99% of all intercontinental internet traffic, including financial transactions and sensitive government and military communication. With the number of undersea cables doubling over the past decade, reaching 529 cable systems in operation today, the vulnerability of these cables is a growing concern.
Nation-State Threats
The report emphasizes that intentional attacks from state-sponsored groups pose the most damaging risk to submarine cables, outweighing accidental damage caused by ship anchors or fishing vessels. Of particular concern is the increasing number of Chinese-owned companies operating cables, which allows China to control digital flows and dictate the location of new cables. This control creates new opportunities for intelligence collection through the landing stations that China controls, potentially compromising the security of the cables themselves.
Similarly, Russia’s interest in mapping the submarine cable system raises concerns about potential sabotage or disruption. The report notes that Russia represents a physical security threat to submarine cables, particularly those in the North Sea region, as cutting a cable could lead to disruptions and, if it occurs in deepwater, the impact would be even greater due to longer repair times. State-sponsored threat actors, with their sufficient resources, have the capability to identify and sever a cable in deepwater.
Geopolitical Drivers
Recorded Future points out that major geopolitical developments, such as Russia’s war against Ukraine and China’s coercive actions toward Taiwan, are key drivers of the near-term risk environment for submarine cables. These developments heighten the likelihood of intentional damage or sabotage, as the timing and target of an attack can disproportionately affect countries and companies that rely on specific cable systems.
Hyperscalers and Digital Sovereignty
The report also highlights the increasing role that hyperscalers like Amazon, Google, Meta, and Microsoft are playing in the development and ownership of the global cable network. While this may provide benefits in terms of connectivity and capacity, it raises concerns about market monopolies and digital sovereignty. As these hyperscalers become more involved in the cable network, there is a potential for their dominance to compromise the security and independence of the infrastructure.
Editorial: Protecting Global Communication Infrastructure
The vulnerabilities and threats surrounding submarine cables are a significant concern, given their critical role in global communication and the economy. As the reliance on these cables continues to grow, it becomes imperative to address the risks and enhance security measures to protect them from intentional sabotage and spying.
Enhancing Security Measures
To protect submarine cables, measures need to be taken at various levels. Firstly, governments and international bodies should collaborate to ensure that adequate regulations and standards are in place to safeguard the infrastructure. Increased oversight and coordination in the manufacturing, deployment, and maintenance of submarine cables can help mitigate the risks associated with nation-state threats.
Collaboration among Stakeholders
Furthermore, collaboration among stakeholders, including cable operators, hyperscalers, and cybersecurity companies, is crucial in identifying and responding to potential threats. Sharing intelligence and best practices can contribute to a collective defense posture. Additionally, the development of robust monitoring systems and the implementation of advanced encryption technologies can help detect and deter unauthorized access or tampering.
Promoting Digital Sovereignty
It is also important to promote digital sovereignty and diversity in the ownership of submarine cables. Relying on a few dominant operators or countries increases the vulnerability of the entire system. Encouraging competition and supporting the development of alternative cable routes and landing stations can reduce the leverage that any single actor may have over global communication infrastructure.
Advice: Internet Security for Individuals
While the responsibility for protecting submarine cables primarily lies with governments, organizations, and international bodies, individuals can also take steps to improve their internet security and privacy.
Encryption and Secure Communication
Using encryption technologies, such as Virtual Private Networks (VPNs) and secure messaging apps, can help individuals safeguard their online communications. Encrypting data before it travels through submarine cables adds an extra layer of protection and reduces the risk of interception or tampering.
Strong Passwords and Two-Factor Authentication
Using strong, unique passwords and enabling two-factor authentication (2FA) can significantly enhance the security of online accounts. By adding an extra layer of verification, 2FA ensures that even if a password is compromised, unauthorized access to accounts is mitigated.
Keeping Software Up to Date
Regularly updating software and devices with the latest security patches helps protect against known vulnerabilities that threat actors may exploit. Software updates often include important security fixes that address potential weaknesses.
Being Mindful of Phishing Attempts
Being cautious of suspicious emails, links, and attachments can protect individuals from falling victim to phishing attacks. Verifying the authenticity of communications and performing due diligence before sharing sensitive information or clicking on unfamiliar links is essential to prevent unauthorized access to personal data.
Using Trusted and Secure Networks
When accessing the internet, individuals should prioritize using trusted and secure networks. Public Wi-Fi networks can be vulnerable to eavesdropping and malicious attacks. Utilizing a secure and private network, such as a personal hotspot or a trusted VPN, can reduce the risk of unauthorized access to personal data.
Staying Informed
Finally, staying informed about the latest cybersecurity threats and best practices is crucial in maintaining online security. Being aware of evolving threats allows individuals to adapt their security measures and take appropriate actions to protect their digital lives.
As the reliance on submarine cables grows, it is imperative to address the threats and vulnerabilities associated with this critical infrastructure. By implementing enhanced security measures, fostering collaboration among stakeholders, and promoting individual internet security practices, we can strive to protect global communication and safeguard the interconnected world we rely on.
<< photo by Mimi Thian >>
The image is for illustrative purposes only and does not depict the actual situation.
You might want to read !
- Exploring the Urgency of Securing ICS: June 30th Deadline for CFP
- The Raging Onslaught: 8Base Ransomware Targets U.S. and Brazilian Businesses
- The Evolving Landscape: 5 Must-Knows for CISOs in Securing OT Environments
- Raising Awareness: The Rescue of 2,700 Victims Deceived into Working for Cybercrime Syndicates