It may sound far-fetched at first, but there’s a growing fear of the damage a newly aggressive Russia might inflict in a time of tension or conflict simply by damaging or cutting the undersea cables that carry almost all of the West’s internet traffic.
The New York Times reported that Russian submarines and spy ships were aggressively operating near the vital undersea cables. Could they be preparing for a new form of warfare?
The perfect global cyber attack could involve severing the fibre-optic cables at some of their hardest-to-access locations in order to halt the instant communications on which the West’s governments, military, economies and citizens have grown dependent. Effectively this would cripple world commerce and communications, destabilise government business and introduce uncertainty into military operations. A significant volume of military data is routed via this internet backbone.
The fibre-optic cables that carry the majority of the globe’s internet traffic follow designated paths under the oceans. To cause world chaos, all that is needed is some “wire cutters” (realistically a submarine with a depth charge would do). This is not rocket science and there will be no need for clever hackers.Telegeography, Author provided
While there is no evidence yet of any “cable snipping”, there is concern among senior US and allied military and intelligence officials over the accelerated activity by Russian armed forces around the globe. At the same time, the internal debate in Washington illustrates how the US is viewing Russian moves with distrust. Surveillance activity shows a significant increase in Russian activity along the known routes of the cables and more than a dozen officials confirmed in broad terms that it had become the source of significant attention in the Pentagon.
Talking to the BBC’s Gordon Corera, the deputy director of the US National Security Agency (NSA), Richard Ledgett, warned of the increasing danger of destructive cyber-attacks by nation states in addition to criminal organisations. A concerted cyber-attack against another nation state can result in the breaking down of society and the loss in ability to defend itself. Information warfare (IW) is an extension of electronic warfare, but importantly it embraces cyber warfare.
More than 50% of effort in future conflicts will be in both cyberspace and electromagnetically in the ether – this will be known as “information warfare”. It will disrupt radio communications, radar and intelligence surveillance, military command and control, weapon systems control, aircraft navigation, national infrastructures, emergency services, and all internet communication. Severing internet backbone networks will cause major worldwide disruption causing widespread suffering without firing a single shot in anger.
In March 2003, allied forces led by the US began Operation Iraqi Freedom. In the first few days of that conflict an information war took place that completely neutralised the ability of Iraq to use the electromagnetic spectrum and the internet. Its armed forces and its civilian infrastructure was virtually paralysed. The conflict lasted just 43 days and Iraq had a formidable and well equipped military.
Russia has long realised that this “soft” warfare, is the equal partner to the familiar hard-weapons side and is planning to spend billions perfecting techniques required. Cyberwarfare has become an important weapon in the military arsenal.
Attack on EstoniaDavid Stupples, Author provided
In April 2007, denial of service (DoS) attacks targeted Estonian websites including the Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country’s disagreement with Russia on the relocation of the Bronze Soldier of Tallinn (a Soviet war grave monument) together with Soviet war graves in Tallinn.
Cyber analysts concluded that the cyber-attack on Estonia was well planned and sophisticated with no precedent. Although Russia vehemently denied involvement the foundations for future IW were becoming established. Military strategists worldwide study the attack to for its inclusion into an order of battle, and to develop mitigating measures.
Georgia was next
Military and government strategists did not have to wait long for another example of information warfare. On July 20 2008, just prior to the Russian military invasion of Georgia to support the self-proclaimed republics of South Ossetia and Abkhazia, a massive Russian-based internet DoS attack against Georgia began. Targets for the DDOS attack included websites of the Georgian president, Mikheil Saakashvili, the OSInform news agency and OS radio station. It was also reported that key sections of Georgia’s internet traffic had been rerouted through servers based in Russia and Turkey, where the traffic was either blocked or diverted – effectively closing the internet in Georgia for the duration of hostilities.
There was also circumstantial evidence that the Baku–Tbilisi–Ceyhan pipeline control system was targeted by a sophisticated computer virus similar to Stuxnet which led to an uncontrolled pressure incident. The Russian government again distanced itself from any cyber involvement and blamed the Russian criminal fraternity. However, observers have acknowledged that the resources needed for this level of attack point to a nation state involvement.
Ukraine as electronic war lab
The escalating military conflict in Ukraine has featured a mirrored cyberwar between the two sides with DDOS and malware attacks against public websites, banks, radio and television channels and public utilities. At the same time Ukrainian forces have grappled with formidable Russian electronic warfare capabilities.David Stupples, Author provided
Russia has deployed its new multi-functional Krasukha-4 electronic warfare systems to support Ukrainian separatists and “volunteer” Russian combat troops. It is the Krasukha-4 that has been deployed to Syria. Russia has again denied any involvement in the Cyber-attack and blames criminal organisations. But this is the first time a fully integrated IW has been witnessed.
Lieutenant-General Ben Hodges, the commander of the US army in Europe, has described the Russian capability as “eye watering” and confirmed that US army personnel from NATO are working alongside their counterparts in the Ukrainian army to gain first-hand experience of information warfare from a state-based adversary.
Is Russia is developing the capability to repeat Operation Iraqi Freedom on a global scale? If its investment in information warfare is any measure we should be concerned – this investment in information warfare is not being matched by the US and Europe combined.
Western leaders should be made aware that we need to accelerate our development of information warfare capability and train more people to deal with it, but above all we should stop isolating Russia in the world and putting it in a position where it feels the need to cash in on this investment.
Professor David Stupples specialises in research and development of radar systems and electronic warfare. For a number of years he undertook research in this area at the Royal Signals and Radar Establishment (RSRE) at Malvern in the UK followed by surveillance and intelligence systems research for the UK Government. He then spent three years developing surveillance systems and satellites for Hughes Aircraft Corporation in the US. In his early career, Dr David Stupples was employed in radar and EW by the Royal Air Force. Later, he was a senior partner with PA Consulting Group where he was responsible for the company's consultancy work in surveillance technology.
At City University London his research is now firmly focused in electronic warfare and radar counter measures. He is working with industry on low probability of intercept radars under the ELINT banner. David Stupples is an active member of the Association of Old Crows