A Vulnerable Network: Undersea Internet Cable Attacks

By Tony M. Damico
2009, Vol. 1 No. 11 | pg. 1/1

Multiple undersea internet cables were mysteriously severed and subsequently gained significant attention in the beginning of 2008. The attacks on those cables highlighted the enormous amount of internet traffic that uses the undersea cable system, which carries many times more traffic than the satellite system does.

The focus on the undersea internet and its growth and protection have become much more of a main stage topic since February 2008. The events occurred over a series of days and were carried out predominantly in Middle Eastern waters. Many countries had their internet services dramatically reduced as a result of the attacks.

From late January to early February, as many as nine undersea internet cables were severed. Dr. Richard Sauder wrote an interesting review of the information provided by various reporting agencies on these events.

  • Quoting the New York Times, Dr. Sauder stated, “During the height of the disruption, some 70 percent of the Egyptian Internet was down” (2008).
  • Here, Dr. Sauder quotes CNN when discussing the first two cables that were severed, “[The two cables] account for as much as three-quarters of the international communications between Europe and the Middle East“ (2008).
  • An English Daily in the UAE, the Khaleej Times, offered this statistic, “An estimated 1.7 million Internet users in the UAE have been affected by the recent undersea cable damage, an expert said yesterday, quoting recent figures published by TeleGeography, an international research Web site.” The Times also mentioned a key point to this paper, “Almost 90 per cent of Internet traffic is routed through undersea cables and only 10 per cent is done through the satellite” (2008).

These points outline the importance of undersea cable technology and its protection. How we manage security issues revolving around the maintenance and use of these giant cables will play a major role in the continuity and future use of the net.

Building new alliances and agreements that are contemporary with the technology that now exists related to the Internet has to be considered a major issue confronting government today. The very fact that most of the cable attacks occurred in Middle Eastern waters carries many political implications. While many unrelated sources have claimed that Iran was the target of these events, many countries suffered major reductions in internet traffic capabilities as well.

Various reporting agencies discussed the following list of undersea internet cables that were compromised during that short timeframe in early 2008:  A cable off of Marseille, France;  two off of Alexandria, Egypt; one off of Dubai, in the Persian Gulf; one off of Bandar Abbas, Iran in the Persian Gulf; one between Qatar and the UAE, in the Persian Gulf; one in the Suez Canal, Egypt; and a cable near Penang, Malaysia.

Additionally, an initially unreported cable cut on 23 January 2008 affected the following undersea internet cables: the SeaMeWe-4 (South East Asia-Middle East-Western Europe-4) near Penang, Malaysia; the FLAG Europe-Asia near Alexandria; FLAG cable near the Dubai coast; FALCON undersea internet cable near Bandar Abbas in Iran; and SeaMeWe-4, also near Alexandria (Kaleej, 2008).

The impact of these cables being severed is summed up nicely by Computer Weekly: “As the undersea cables carry about 95% of the world’s telephone and internet traffic, any widespread internet downtime can have devastating economic implications” (2008). With dozens of new cables to be laid in the next few years, as reported by PC Pro in July of 2008, any disruption in the cables will have massive impact on internet users.

Conversely, one could argue that with more cables being laid, some redundancy will occur so that the increased number of undersea cables will ensure greater continuity in times of cable breakdown. In any event, protecting these cables has become more of a hot topic after theses attacks. The idea that submarines may carry men close enough to the cables to cut or otherwise damage them brings other goals to mind. A possibility exists that during the downtime of the cables, monitoring devices may be attached to gain some amount of unrestricted access to the transmissions running through the cable.

Competing governments have a direct pecuniary interest in the construction, laying, and maintenance of these cables. Control of or influence on these cables by any one entity could dramatically impact internet availability for a given population as well as information access by various governments.

The undersea cable network still carries most internet traffic and is still growing. The issue is not in building the cables, but in protecting them. Many traditional agreements between nations regarding information transfer and jurisdiction will come under fire as this unbridled communication network grows and its security becomes more and more of an international concern.


References

Sauder, R. (2008). Connecting the many undersea dots. Retrieved Nov 30m 2008, from http://www.cyberspaceorbit.com/ConnectingTheDots.htm

Khaleej Times Online. (2008). Cable damage hits 1.7m internet users in UAE. Retrieved November 30, 2008, from http://www.khaleejtimes.com/DisplayArticle.asp?xfile=data/theuae/2008/February/theuae_February155.xml§ion=theuae

PCPRO. (2008). Internet cable laying boom. Retrieved on November 30, 2008, from http://www.pcpro.co.uk/news/210999/internet-cablelaying-boom.html Clarke, R. (2007). Breakpoint. New York: Berkeley Books.

Suggested Reading from Inquiries Journal

As the sophistication of cyber criminals continues to increase, their methods and targets have also evolved. Instead of building the large Internet worms that have become so familiar, these criminals are now spending more time concentrating on wealth gathering crimes, including fraud and data theft. An online article from CyberMedia India Online Ltd., suggests that because home users often have the poorest security measures in place, they have become... MORE»
Advertisement
The Conceptual Access-Network Thesis proposed suggests that the development or success of any new internet-based product, service, or technology will ultimately be contingent upon how well it satisfies the criterion of providing... MORE»
In the last few years the Internet has borne witness to and facilitated a great deal of social and societal change. From Hilary Clinton's positive 2010 address; ‘Remarks on Internet Freedom', to the Tunisian and Egyptian revolutions that showcased the power of social media, the internet, its use and power, has been at the... MORE»
Sitting at home reading one night, you come across the term “WikiLeaks.” Unaware of its meaning, you exhale forcefully, knowing what’s next. Donning a dark black hoodie, you walk out to the street and down to an abandoned alley that you know well, carefully finding the entrance that few know about. Inside the secret room, there are eleven individuals bathed in the electric glow of computer screens: you've found your neighborhood... MORE»
Submit to Inquiries Journal, Get a Decision in 10-Days

Inquiries Journal provides undergraduate and graduate students around the world a platform for the wide dissemination of academic work over a range of core disciplines.

Representing the work of students from hundreds of institutions around the globe, Inquiries Journal's large database of academic articles is completely free. Learn more | Blog | Submit

Follow IJ

Latest in Computer Science

2009, Vol. 1 No. 11
The earliest form of cryptography was the simple writing of a message, as most people could not read (New World, 2007). In fact, the very word cryptography comes from the Greek words kryptos and graphein, which mean hidden and writing, respectively... Read Article »
2015, Vol. 7 No. 10
Considering information is the most valuable asset of any organization, information security is one of the most important areas for every business and individual. Looking at the big picture, approximately 86% of all websites had a serious vulnerability... Read Article »
2012, Vol. 4 No. 04
Today, we live in the aftermath of the Internet revolution. Humanity has never before been more interconnected or had as much access to the same tools and information. As a driving force behind globalization and modern progress, the Internet enables... Read Article »
2009, Vol. 1 No. 11
With the explosion of the use of the Internet for nearly all forms of negotiable instrument exchange, the constant transmission of time sensitive and vital corporate communications, and the ubiquitous presence of malicious software writers, verifying... Read Article »
2009, Vol. 1 No. 11
As the sophistication of cyber criminals continues to increase, their methods and targets have also evolved. Instead of building the large Internet worms that have become so familiar, these criminals are now spending more time concentrating on wealth... Read Article »

What are you looking for?

FROM OUR BLOG

Finding Balance in Graduate School
How to Use Regression Analysis Effectively
How to Manage a Group Project (Video)