Iceberg in Greenlandic waters in June 2016. Photo: United States Department of State Bureau of Oceans and International Environmental and Scientific Affairs
Undersea cables have grown in popularity and usage in recent years, with some 380 underwater cables in operation around the world, spanning a length of over 1.2 million kilometers (745,645 miles).1)Griffiths J. (2019). The global internet is powered by vast undersea cables. But theyre vulnerable. CNN, 26 July, https://www.cnn.com/2019/07/25/asia/internet-undersea-cables-intl-hnk/index.html, accessed 17 January 2022
These cables are heavily important to the Wests national and international defense and security initiatives given the amount of business conducted through them and the services they can provide to many industries. This is illuminated by the fact that Alphabet (the parent company of Google), Microsoft, Amazon, and Meta (formerly Facebook) have all become involved in undersea cable development and are on track to become primary financiers and owners of the web of undersea internet cables connecting the richest and most bandwidth-hungry countries, according to analysts and undersea cable engineers. Yet most of these cables rest along the shores of the Atlantic and Pacific Oceans, connecting North America, Europe, Asia, and Africa.2)Mims C. (2022) Google, Amazon, Meta and Microsoft Weave a Fiber-Optic Web of Power. The Wall Street Journal, 15 October, https://www.wsj.com/articles/google-amazon-meta-and-microsoft-weave-a-fiber-optic-web-of-power-11642222824, accessed 17 January 2022
Many undersea cables are starting to advance farther north, entering the region of the Arctic circle. This past December, the US-based telecommunications company Far North Digital joined with the Finnish company Cinia to develop a 16,500 kilometer submarine internet cable [under the sea]connecting the Atlantic and Pacific Ocean through the perilous Arctic Archipelago.3)Khalili J. (2021) New submarine cable will blast data between Japan and Europe through Arctic waters. TechRadar, 22 December, https://www.techradar.com/news/new-submarine-cable-will-blast-data-between-japan-and-europe-through-arctic-waters, accessed 17 January 2022 In August, Reuters reported that the Russian state-owned telecommunications company Morsviasputnik had begun laying its first undersea fibre optic communications cable over Russias long northern coast from the village of Teriberka, on the Barents Sea, to the far eastern port of Vladivostok to supply stable internet in Arctic port towns as well as the Kamchatka peninsula and Sakhalin.4)Stolyarov G. (2021) Russia starts operation to lay undersea fibre optic cable through Arctic. Reuters, 26 August, https://www.reuters.com/technology/russia-starts-operation-lay-undersea-fibre-optic-cable-through-arctic-2021-08-06/, accessed 17 January 2022 China has also been expanding into the Arctic Circle, developing their cyber, trade, and economic capacities.5)Khorrami N. (2020) Data Hunting in Subzero Temperatures: The Arctic as a New Frontier in Beijings Push for Digitial Connectivity. The Arctic Institute, 04 August, https://www.thearcticinstitute.org/data-hunting-subzero-temperatures-arctic-new-frontier-beijing-push-digital-connectivity/, accessed 18 January
There is an increased measure of data usage coming through undersea cables, which includes sensitive and important data, and utilizes poor security measures to secure these lines from foreign actors. With this large national security threat, the U.S. and international organizations need to take action.
It is clear that many in the public see the Arctic Circle as a frozen, icy tundra when, in actuality, the region is quite imperative to international security and business. According to Scientific American climate change and an accelerating loss of Arctic sea ice during summer months have opened the possibility of northern cable routes while many nations would favor less U.S.-centric cable routes and additional backup lines to avoid U.S. surveillance and disruptions in service.6)Hsu J. (2016) An Internet Cable Will Soon Cross the Arctic Circle. Scientific American, 01 June, https://www.scientificamerican.com/article/an-internet-cable-will-soon-cross-the-arctic-circle/, accessed 17 January From an economic and political perspective, there is clearly a desire from non-Western nations to circumvent the United States and acquire their own methods of telecommunications contact.
The Center for Strategic & International Studies (CSIS) has found that threats from foreign powers (like Russia) can come in the form of cutting off military or government communications in the early stages of a conflict, eliminating internet access for a targeted population, sabotaging an economic competitor, or causing economic disruption for geopolitical purposes alongside tapping [these cables] to record, copy, and steal data, which would be later collected and analyzed for espionage. CSIS commentary also found that Russia could be able to stage cyberattacks against these data pipelines which could disrupt or divert data traffic, or even execute a kill click deleting the wavelengths used to transmit data.7)Morcos P. & Colin Wall (2021) Invisible and Vital: Undersea Cables and Transatlantic Security. CSIS, 11 June, https://www.csis.org/analysis/invisible-and-vital-undersea-cables-and-transatlantic-security, accessed 19 January
Already, Russia has been heavily involved in developing their abilities to tap undersea cables and have also been accused of playing a role in the outage of the furthest north undersea fiberoptic cable located between mainland Norway and the Svalbard archipelago in the Arctic Ocean.8)Newdick T. (2022) Undersea Cable Connecting Norway With Arctic Station Has Been Mysteriously Severed. The Drive, 10 January, https://www.thedrive.com/the-war-zone/43828/undersea-cable-connecting-norway-with-arctic-satellite-station-has-been-mysteriously-severed, accessed 17 January 2022
Publicly, it is unknown exactly how effective foreign powers are at tapping Western undersea cables, the amount of damage this can inflict upon a nation necessitates the United States take steps to protect themselves from these problems. A recent 2021 report by the Atlantic Council highlighted this issue, stating, authoritarian governments, especially in Beijing, are reshaping the Internets physical layout through companies that control Internet infrastructure, to route data more favorably, to route data more favorably, gain better control of internet chokepoints, and potentially gain espionage advantage while also describing how private companies and industry as a whole are becoming more aware of these network security risks.9)Sherman J. (2021) Cyber defense across ocean floor: The geopolitics of submarine cable security. Atlantic Council, 13 September, https://www.atlanticcouncil.org/in-depth-research-reports/report/cyber-defense-across-the-ocean-floor-the-geopolitics-of-submarine-cable-security/#introduction, accessed 17 January 2022
These efforts at defense may come in the form of international law and policy, and joint efforts at stopping intrusions.
Simply put, the U.S. government needs to take immediate and intense action. Writing for DefenseNews, Nadia Schadlow, a senior fellow at the Hudson Institute and former Deputy National Security Advisor for strategy, and Brayden Helwig, an intern with DefenseNews, are that, First, the U.S. government should take more responsibility for repairing undersea infrastructureClassifying cable repairs as matters of national security and developing a public-private operational plan that includes a division of resources to repair them is one step toward reducing the response time to a disruption or an attack in addition to creating tax incentives for private industry to secure cable landing stations, while investing in technologies that detect and deny undersea espionage.10)Schadlow N & Brayden Helwig (2020) Protecting undersea cables must be made a national security priority. DefenseNews, 01 July, https://www.defensenews.com/opinion/commentary/2020/07/01/protecting-undersea-cables-must-be-made-a-national-security-priority/, accessed 17 January 2022
Tactics like what has been described by Schadlow and Helwig would assist in better protecting the United States from cyberattacks and undersea threats by foreign actors, while also helping the international community by assisting the private sector, which controls most of these cables.
From an international perspective, there is a great need for more legal statutes governing undersea cables and the threats posed to these systems, as their jurisdiction in somewhat of a gray area. Garrett Hinck, a PhD student at Columbia University, wrote about this in 2017 for the Lawfare blog. Hinck finds that with regards to underwater cable law, despite the existence of both the 1884 Convention on the Protection of Submarine Cables and the 1982 U.N. Convention on the Law of the Sea there is very little that governs the usage of undersea cables in wartime or when damaged. He writes that, relatively little attentionhas focused on the legal frameworks that govern the networks of glass and steel that form the literal backbone of our internetIn practice, the lack of legal disputes involving attacks on cables leaves their legality uncertain.11)Hinck G. (2017) Cutting the Cord: The Legal Regime Protecting Undersea Cables. Lawfare, 21 November, https://www.lawfareblog.com/cutting-cord-legal-regime-protecting-undersea-cables, accessed 19 January 2021
Establishing a clear and official set of international guidelines for how undersea cables operate within wartime or in regards to international threats by both state and non-state actors is imperative to better securing them from threats, not only those of national security importance, but also those of human security importance.
In terms of joint cooperation, this can come across primarily in the form of government-private sector collaboration and interstate cooperation. CSIS, in their brief of undersea cable security, advocated for the U.S. government to conduct bilateral confidential dialogues with its main European partners, in particular, the United Kingdom and France, to exchange information on their threat perspective and analysis, their respective cable projects, and the national measures implemented to protect them while NATO should work on a collective assessment of both the potential vulnerabilities to undersea cables in the Euro-Atlantic region and the implications of disruptions for allied operations.12)Morcos P. & Colin Wall (2021) Invisible and Vital: Undersea Cables and Transatlantic Security. CSIS, 11 June, https://www.csis.org/analysis/invisible-and-vital-undersea-cables-and-transatlantic-security, accessed 19 January
From a private sector-government standpoint, Schadlow and Helwig in their article for DefenseNews also argue for private industry tax incentives to secure cable landing stations, while investing in technologies that detect and deny undersea espionage.13)Schadlow N & Brayden Helwig (2020) Protecting undersea cables must be made a national security priority. DefenseNews, 01 July, https://www.defensenews.com/opinion/commentary/2020/07/01/protecting-undersea-cables-must-be-made-a-national-security-priority/, accessed 17 January 2022 Pierre Morcos and Colin Wall, writing a commentary for the Center for Strategic and International Studies, note, national governments should also ensure that operating companies implement the highest standards. As a first step, allies should encourage operators to adhere to voluntary guidelines, most notably those provided by the International Cable Protection Committee (ICPC), an industry forum for cable owners and some governments that develops standard procedures If voluntary standards fail to incentivize companies to invest adequately in cybersecurity, allies should consider defining mandatory requirements, as recently decided in the United States for oil and gas pipelines following the ransomware attack against Colonial Pipeline.14)Morcos P. & Colin Wall (2021) Invisible and Vital: Undersea Cables and Transatlantic Security. CSIS, 11 June, https://www.csis.org/analysis/invisible-and-vital-undersea-cables-and-transatlantic-security, accessed 19 January
These forms of defense against state actors would greatly bolster the overall national security framework of the West. They would allow companies, global powers, and international organizations to deter hostile state actors like Russia and China while improving global security. Furthermore, they would allow for clarity going forward in terms of the open sea, the Arctic Circle, and international law while also preserving the Arctic Circle for purely business and scientific development as opposed to military action.
The Arctic Circle is a key resource for wealth, having an abundance of oil and gas in addition to being valuable territory for fishing and scientific exploration. With undersea cables, they provide economically beneficial routes for faster data accumulation while allowing for an increased ability to share information, conduct business deals, and communication between governments and the private sector. Undersea cables require protection from hostile state actors and non-state actors who see these cables as a way to advance their own geopolitical goals. By strengthening international law, having governments join with the private sector and other friendly governments, and making a stronger cybersecurity program, the Arctic Circles undersea cables will be more effectively protected from harm and allow for a peaceful sharing of information.
Alan Cunningham is a graduate of Norwich University and the University of Texas at Austin, attaining an MA in International Relations, a BA in History and a BS in Radio-Television-Film respectively. He plans to join the U.S. Navy as an Officer in 2022 and has worked in both the fields of finance and journalism, focusing on international/national security, military affairs, and foreign policy. He has been published in the Jurist, Security Magazine, ModernDiplomacy, and The Diplomat among others.
See more here:
Underneath the Ice: Undersea Cables, the Arctic Circle, and International Security - The Arctic Institute
- Google researchers have cracked a key internet security tool - Recode [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Letter: Internet security is in jeopardy - INFORUM [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- New internet security device launched to safeguard schools against child abuse - Phys.Org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster - Gizmodo [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Data from internet-connected teddy bears held ransom, security expert says - Fox News [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Emsisoft Internet Security 2017.2.0.7219 - TechCentral.ie [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- What you need to know about 'Cloudbleed,' the latest internet security bug - Globalnews.ca [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Google cracks longtime pillar of internet security - MarketWatch [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- BullGuard | Internet Security and Antivirus protection ... [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet Storm Center - SANS Internet Storm Center [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet-connected 'smart' devices are dunces about security - ABC News [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Derry internet security expert warns that advanced internet technology 'a risk to us all' - Derry Now [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Firewall Test, Web Tools and Free Internet Security Audit ... [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security in the spotlight: How is the internet safer today than it was 20 years ago? - Mobile Business Insights (blog) [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Jim Mullen: Unsocial internet security | Columnists | auburnpub.com - Auburn Citizen [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security company launches a perfume line to promote cybersecurity - Mashable [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Internet security - Wikipedia [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Are you undermining your web security by checking on it with the wrong tools? - The Register [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bruce Schneier on New Security Threats from the Internet of Things - Linux.com (blog) [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Carpe Diem: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Motivation Monday: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Medical records of 26m patients at risk because of GP surgeries' failing internet security - The Sun [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Free Internet Security | Why Comodo Internet Security Suite ... [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Internet Security Software | Trend Micro USA [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Fix crap Internet of Things security, booms Internet daddy Cerf - The Register [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Internet of Things security: What happens when every device is smart and you don't even know it? - ZDNet [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- CUJO is cuter than Wall-E, and it's the only internet security device you'll ever need - Yahoo News [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- The Senate just voted to undo landmark rules covering your Internet privacy - Washington Post [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- What the Cloudbleed disaster says about the state of internet security - Information Age [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Google Has Declared Symantec Harmful To Internet Security - UPROXX [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Internet Security Analysts: North Korea Is Planning a Global Bank Heist - Breitbart News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Internet Security Firm Confirms WikiLeaks 'Vault 7' At Least 40 Cyberattacks Tied to the CIA - The Ring of Fire Network [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected devices - ZDNet [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- A Global Industry First: Industrial Internet Consortium and Plattform Industrie 4.0 to Host Joint IIoT Security ... - Business Wire (press release) [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- Mucheru urges private sector to boost investment in internet security - The Standard (press release) [Last Updated On: April 25th, 2017] [Originally Added On: April 25th, 2017]
- Cloudflare debuts a security solution for IoT - TechCrunch [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Russian-controlled telecom hijacks financial services' Internet traffic - Ars Technica [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Avira Internet Security Suite v15.0.26 - TechCentral.ie [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- NSA To Limit Some Collection Of Internet Communication - NPR [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- Report Indicates '10 Concerts' Facebook Trend Could Compromise Your Internet Security - Complex [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- "Improving the World" through Internet Security: Chatting with David Gorodyansky, CEO of AnchorFree - Huffington Post [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Don't Fall For This Tech Support Scam Targeting PC Users - KTLA [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Yikes! Antivirus Software Fails Basic Security Tests - Tom's Guide [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Watch Hackers Sabotage an Industrial Robot Arm - WIRED [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Decoding Internet Security: Spear phishing - Washington Post [Last Updated On: May 5th, 2017] [Originally Added On: May 5th, 2017]
- From the Desk of Jay Fallis: To internet vote, or not to internet vote - BarrieToday [Last Updated On: May 7th, 2017] [Originally Added On: May 7th, 2017]
- Crippling cyberattack continues to spread around the world - Los Angeles Times [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Cyber Security Experts: Russia Disproportionately Targeted by Malware - Voice of America [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- The Latest: 29000 Chinese institutions hit by cyberattack - ABC News [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- Cyberattack Aftershock Feared as US Warns of Its Complexity - New York Times [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- This week's poll: Priorities for improving internet security - The Engineer [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Akamai Releases First Quarter 2017 State of the Internet / Security Report - PR Newswire (press release) [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Do Macs get viruses? - PC Advisor [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Massive Ransomware Attack Underscores Threats To Internet Security - Benzinga [Last Updated On: May 19th, 2017] [Originally Added On: May 19th, 2017]
- Security News This Week: Hoo-Boy, Mar-a-Lago's Internet Is Insecure - WIRED [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Internet security firm calls for law to compel information sharing to ... - The Star, Kenya [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Check It Out: No need to unplug after reading books on internet security - The Columbian [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- How to beat security threats to 'internet of things' - BBC News - BBC News [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Best Mac antivirus 2017 - Macworld UK [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Avira, Kaspersky Top Windows 10 Antivirus Tests - Tom's Guide [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Paranoid about internet security? Here are the most secure OS options - The American Genius [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Blockchain Offers Hope for the Broken Internet - Fortune [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- New uses for RFID and security for the internet of things - Phys.Org [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Security Best Practices for the Internet of Things - Web Host Industry Review [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Internet infrastructure security guidelines for Africa unveiled - Premium Times [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- In addressing internet security issues, make sure to provide solutions - Minneapolis Star Tribune [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Whistic Partners with the Center for Internet Security to Extend the ... - PR Web (press release) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet Security Alliance: NIST framework metrics should focus on threats - Inside Cybersecurity (subscription) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China cyber-security law will keep citizens' data within the Great Firewall - The Register [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Cyber security: Africa gets Internet security guidelines - TheNewsGuru [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China to Implement Its First Law on Internet Security After Ransomware Attack - Sputnik International [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Decoding Internet Security: Ransomware - Washington Post [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet security upgrade on course - Business Daily (press release) (blog) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- What's the Safest Laptop For Internet Security? - HuffPost [Last Updated On: June 2nd, 2017] [Originally Added On: June 2nd, 2017]
- Every Day Is Internet Security Day - The Chief-Leader [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- 5 Reasons why internet security is crucial in 2017 - Techworm [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- Are Pop-Ups An Internet Security Threat? - Good Herald [Last Updated On: June 4th, 2017] [Originally Added On: June 4th, 2017]
- 3 Ways Software Programs Can Help With Internet Security in 2017 - Geek Snack [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- Inside Social Security: Make every day your internet security day - Santa Ynez Valley News [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- SOCIAL SECURITY: Every day is internet security day - Palm Beach Post [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]