Submarine fiber optic cables: can spies access strategic information?

17
Submarine fiber optic cables: can spies access strategic information?

Today the Internet has become something so commonplace for us that we can’t even imagine how people used to live without it. However, it is worth recalling that the Global Network is not only about video, games, communication and other entertainment. It also transmits the most important data of strategic importance for certain countries.

Currently, 99 percent of Internet traffic is transmitted via fiber optic cables that run along the bottom of seas and oceans and connect continents. This method of data transmission is tens of times more practical and cheaper than satellite. However, international undersea telecommunications have their weak point.



In particular, information transmitted through them can be intercepted by a potential adversary who has the appropriate technical capabilities.

To understand how information is stolen, you need to understand the very principle of transmission over optical fiber.

So, a cable laid overland has 144 optical fibers, while its underwater part has 8. Data is converted using a laser into light signals, and at the output - again into information. In a second, up to 10 billion such light zeros and ones can “slip through” one fiber.

At the same time, there is one caveat. The light signal tends to fade. Therefore, special amplifiers are installed every 80 km of the submarine cable.

It is the latter that are the weak point, where spies, using special devices, connect to several fibers, which pass through the amplifier individually, and not in a bundle, and begin collecting information.

At the same time, the main difficulty for those who steal data is its colossal volume. Even if one optical fiber is half-loaded, approximately 10 terabytes of data will be collected in an hour. The last ones need to be placed somewhere and quickly deciphered, so that the next ones can be written down in their place.

However, this will not be a problem if the connection is made from a submarine. At one time there were rumors that the Americans were stealing information from intercontinental highways at the bottom of the sea from the USS Jimmy Carter nuclear submarine.

Typically, the US authorities did not officially refute this information.

As a result, in this case, information from a spy device connected to an amplifier could be transmitted in real time on board the submarine, and from there it could also be sent online to American servers for further processing and decryption.

17 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. +6
    29 February 2024 13: 05
    So, a cable laid overland has 144 optical fibers, while its underwater part has 8. Data is converted using a laser into light signals, and at the output - again into information. In a second, up to 10 billion such light zeros and ones can “slip through” one fiber.

    fool Hand face.
    Was this written by an undertrained neural network for unfinished schoolchildren? What a shame.
    1. +1
      29 February 2024 13: 36
      The submarine Jimmy Carter (hull number SSN-23), completed for service on February 19, 2005. The $3,2 billion submarine is equipped with classified equipment for listening to fiber optic cables.
      Some experts suggest installing fiber optic splitters.
    2. +1
      1 March 2024 10: 31
      Quote: bk316
      Was this written by an undertrained neural network for unfinished schoolchildren? What a shame.

      What got you so excited?
      1. -1
        3 March 2024 14: 05
        Particles of something or something are written with a hyphen: “excited something”
  2. 0
    29 February 2024 13: 10
    Today the Internet has become something so commonplace for us that we can’t even imagine how people used to live without it. However, it is worth recalling that the Global Network is not only about video, games, communication and other entertainment. It also transmits the most important data of strategic importance for certain countries.

    What is this about? What does the cable connection have to do with it?
    Everything that is transmitted over the Internet is initially public. And you don’t have to go to the bottom of the ocean, it’s enough to connect to any thousands of devices in networks that include routers on the way from the source to the recipient of information. Therefore, everything that needs to be made private is encrypted. No other way.
    1. +1
      29 February 2024 13: 13
      Quote: bk316
      Therefore, everything that needs to be made private is encrypted. No other way.

      The authors live in that antiquity when it was possible to connect to a telephone cable and listen to the voice. That now everything that is possible is already hellishly encrypted with powerful cryptographic algorithms is unknown to them. Thus, listen, and don’t listen to any sense.
      1. +1
        1 March 2024 10: 39
        Quote: BlackMokona
        The authors live in that antiquity when it was possible to connect to a telephone cable and listen to the voice. That now everything that is possible is already hellishly encrypted with powerful cryptographic algorithms is unknown to them. Thus, listen, and don’t listen to any sense.

        However, technologies for connecting to fiber optic networks exist. It’s probably not in vain that billions were invested in this.
    2. 0
      1 March 2024 10: 35
      Quote: bk316
      Everything that is transmitted over the Internet is initially public.

      laughing
      Oha, yes, your communication with the bank in the application is amazingly public! Mail correspondence at all levels is also very public, probably...
      1. 0
        3 March 2024 23: 56
        There is no difficulty in mirroring traffic at an exchange point. Mirroring is included as a standard feature of many carrier-grade routers. If you really need it, you can patch the hardware and get the desired functionality. You can get between subscribers and launch a “Man in the Middle” attack.
        To combat this, private tunnels or the tls protocol are used.
    3. +1
      1 March 2024 10: 45
      Quote: bk316
      And you don’t have to go to the bottom of the ocean, it’s enough to connect to any thousands of devices in networks that include routers on the way from the source to the recipient of information.

      A network is a network because it has many nodes and routes. It is impossible to calculate which specific routers the required data packet will go through; it is also impossible to get into the devices at the end sections of the communication line, because they are under guard. But there is no alternative to the route via the fiber optic cable, for example from the EU to the USA. Therefore, it is guaranteed that you can intercept the desired data packet there, and do it very secretly.
      1. 0
        3 March 2024 23: 59
        But there is no alternative to the route via the fiber optic cable, for example from the EU to the USA
        We came to the exchange point, turned on traffic mirroring on the media converter, filtered - a brief description of the architecture of the Prizma system.
        1. 0
          4 March 2024 08: 28
          Quote from barbos
          We came to the exchange point, turned on traffic mirroring on the media converter, filtered - a brief description of the architecture of the Prizma system.

          HOW to get there, if the final and large nodal points are in the Colonel’s office, and the intermediate ones are several out of millions, and constantly change in a random order, how to find them?
          1. 0
            April 1 2024 01: 38
            In general, the exchange point is a small stationary building. You can get there with your feet. This was mainly done when installing the appropriate equipment.
  3. +4
    29 February 2024 13: 15
    So, a cable laid overland has 144 optical fibers, while its underwater part has 8

    What is the truth?
    Is this the standard?
    Did they not deliver enough glass to my office (I have 16 fibers)?
    Fear God. If you retype something with automatic translation, at least read what comes out.
    By the way, I'm almost sure that chatpt wrote THIS. And the “author” fed him the article and gave him the task of translating
    and reduce. You shouldn't do this while the AI ​​is doing it poorly.
    1. 0
      29 February 2024 14: 09
      Is it true. Why do you need 16 more fibers? One is enough for the office.
  4. +3
    29 February 2024 13: 19
    Can not. Any sensitive information is encrypted. As a rule, in two layers - first at the application level, then at the VPN level.
  5. 0
    29 February 2024 17: 14
    The key thing to protect data is developing new encryption protocols & algorithms.
    Almost all encryption protocols, Algorithms & VPN protocols are developed in the west.
    So decryption 'may be' possible. American NSA is famous for breaking encryption protocols & algorithms.

    encryption protocols eg.
    SSL / TLS
    IPsec
    SSH
    PGP
    encryption algorithms eg.
    3DES
    BEA
    RSA
    VPN protocols eg.
    openvpn
    wire guard
    IKEv2

    Russia & China must develop their own (a) encryption protocols (b) encryption algorithms & (c) VPN protocols to prevent western data interception.