8 May 2003. Thanks to D.
Source:
http://www.rand.org/publications/MR/MR1395/MR1395.appi.pdf
This is an appendix to A Concept of Operations for a New Deep-Diving Submarine, F. W. Lacroix, Robert W. Button, John R. Wise, Stuart E. Johnson, RAND, 2001.
http://www.rand.org/publications/MR/MR1395/
Eyeballs of US submarine cable landing stations:
Transatlantic: http://cryptome.org/cable-eyeball.htmTranspacific: http://cryptome.org/cablew-eyeball.htm
Appendix I
INTRODUCTION
The backbone of the nationsand indeed, of the worldsinformation infrastructure is now preponderantly composed of fiber optic cables. A critical element of that backbone is the worlds ever-expanding network of submarine fiber optic cables. The importance of those cables could conceivably make them a potential target or targets for other states or terrorists. This appendix briefly documents the importance of the fiber optic cable network to the United States, potential vulnerabilities in the network, and the possible ramifications for the United States of a widespread network failure brought about by an act of sabotage.
Over the past decade, the increased demand for bandwidth driven by the Internet, as well as the continuing international trend of privatization of national telecommunications industries, has outstripped by far the resources offered by satellite transmission of voice and data (Petit, 1999). Instead, the fraction of transoceanic voice and data transmitted over undersea cables has grown in the past 12 years from 2 percent to as high as 80 percent in 2000 (Mandell, 2000). As demand has grown, so have the numbers of cables on the seabed. While experts differ on whether the worlds fiber optic network faces a capacity glut or crunch,1 it is certain that demand for higher bandwidth will continue to grow, and with it, the capacity of cablesthose currently existing and those soon to be laidto grow hand in hand. Due to be completed this year, for instance, is the Southern Cross cable network, offering a quantum leap in carrying capacity in the Southern Pacific (up to 160 gigabytes per second) in a three-tiered ring totaling some 29,000 kilometers. Similarly advanced systems are due to come on-line in the North Atlantic as well, increasing the total transatlantic carrying capacity to more than 1,000 gigabytes per second, enough capacity for the contents of 200 compact discs to be transmitted every second (McClelland, 2000).
______________
1 For pieces bullish on bandwidth, see Williamson (2000), McClelland (2000), and Rowley and Ling (2000). One article suggesting a future glut is Behr (2000).
VULNERABILITIES?
These fiber optic networks offer a number of security advantages over satellite communications. Fiber optic cables are thought to be much harder to eavesdrop (Mandell, 2000) on than satellites and have more dependable installation and repair practices (Mandell, 2000). However, those fiber optic cables are in many ways significantly more vulnerable than is commonly thought. Submarine cables already face many man-made and natural dangers. Anchors dropped from ships and dredging fishing nets are two of the most common (McClelland, 2000; ICPC, 1996). The occasionally volatile nature of the seabed can expose a previously buried segment of cable (ICPC, 1996). Between 1985 and 1987, AT&T found that its first deep-sea submarine fiber optic cable (laid between the Canary Islands, Grand Canaria and Tenerife) suffered periodic outages because of frequent attacks of the Pseudocarcharias kamoharai, or crocodile shark, on the cables.2 In deep ocean, the cables often lie unprotected on the ocean floor; cables in areas closer to the shore, where seabed activity might include fishing, are usually both armored and buried some two to three feet deep in the ocean floor (ICPC, 1996). The cables need only be bent to suffer significant damage (ICPC, 1996).3
______________
2 The electric fields of which, it was thought, duplicated that of the sharks prey under attack (Martin, 2001).3 Any sharp bend will cause [fibers] to crack and signals to be lost (ICPC, 1996). Even a slight bend may cause the cables to suffer significant drop-off in the strength of the signal (Held, 1999).
Security is an important issue, because these cables are an increasingly vital element of the global economy. As one analyst has noted, the increase in demand is being driven primarily from data traffic from Web-enabled applications . . . undersea cables are becoming an integral part of the everyday telecommunications infrastructure in a world that has no boundaries (Carlson, 2000). In short, an intentional systemwide disruption of fiber optic cables could cause significant commercial damage.
In particular, the ability of overseas firms to get reliable, real-time data regarding U.S. marketsand vice versacould be substantially curtailed, potentially sparking a panic. In addition, an increasing amount of U.S. military communications occurs over these commercial networks. Disruption could significantly impede these communications. In all cases, of course, action would be taken to shift transmissions from the disrupted networks to other cables and satellite transmissions. But, as discussed above, the current satellite capacity is far exceeded by bandwidth demand. As we will see below, this problem becomes even more marked when examining the case of an island, such as Taiwan.
Potential Vulnerabilities
In recent years, wiring companies have focused on redundancy as an important aspect of the cable network. While early fiber optic cables were point-to-point systems, modern systems are configured as loops, connecting two landing stationsat least 100 kilometers away from one anotherin one country to two in another. Because it would be unlikely for an isolated nautical eventa sudden shift in the seabed on which the cables rest, for instance, or an inadvertent break caused by a fishing net or a ships anchorto affect both cables, the systems are thought of as secure (Williams, 2000).
However, the desire for security against inadvertent nautical events may have been counterproductive. When seeking adequate termination points for cables, companies have faced a relative paucity of suitable sites (relatively isolated from heavy fishing activity and strong ocean currents), particularly on the East Coast (see Table I.1). Because of this lack of sites, and given the considerable effort in digging a trench on the seabed for the last kilometers of the cable, then tunneling from the ocean bed up into a beach manhole, to bring the cable ashore, cable companies have, again, especially on the East Coast, repeatedly placed cable termination points on the same shore (Chave, 2000).4
______________
4 The authors are indebted to Doctor Chave for his patient description of this process.
The results of this stacking can be seen in Table I.1. Of 10 cable systems with a total capacity of about 206 gigabytes per second (assuming that TAT 14 begins operations as planned in 2001), six terminate in only one of the same three cities, Tuckerton, Manasquan, and Manahawkin, New Jersey. Onea self-healing loopterminates in both Tuckerton and Manasquan. A sixth terminates in both Manasquan and Charlestown, Rhode Island. Theoretically, an attack on two or three of these sitesat the point where the cables come together in the undersea trench before coming ashorecould cause enormous damage to the entire system. For instance, a successful attack on trenches in Tuckerton and Manasquan and Charlestown would eliminate all but 11 gigabytes per second of carrying capacity in that regiona 95 percent cut.
Similarly, all submarine cables but one terminating in the south of the United States terminate at one of three points in Florida: Vero Beach, Palm Beach, and Hollywood.
Of course, it is important not to overstate the potential problem. After all, the United States is not isolatedsome transmissions could be rerouted through systems in Canada and South and Central America. However, given that the vast majority of transatlantic and transpacific cables terminate in the United States, the prospect of a concerted attack on these cables is troubling.
Moreover, this point yields an interesting counterexample: that of Taiwan. Unlike the United States, Taiwan would be unable to depend on a vast overland information infrastructure beyond its borders in the event of damage to its fiber optic lifelines. A recent example of the chaos potentially caused by communications outages is that of Australia. One cut cable in the SEA-WE-ME-3 network leading from Australia to Singapore caused Australias largest Internet providerTelstrato lose up to 70 percent of its Internet capacity (Miller, 2000; LaCanna, 2000; Park, 2000a and 2000b).
As seen in Table I.2, a recent survey of the number of international submarine cables reaching Taiwan is particularly disconcerting. Four out of five undersea fiber optic cables reaching Taiwan do so at either Fangshan or Toucheng (the fifth, a self-healing loop reaches Taiwan at both, meaning that both cables would have to be damaged for Taiwan to be cut off). Two more planned cables have landing areas at Fangshan. Only one planned cable is due not to land at either Fangshan or Toucheng. In short, Taiwans ability to send and receive data over submarine cables might be significantly impaired by an attack on cables leading into either landing area. A well-orchestrated set of undersea attacks on the cable trenches at both locations might well have a sudden and calamitous effect on Taiwans ability to communicate with the outside world. This information may well have increased relevance in light of Chinas renewed emphasis on information warfare.
Conclusion
By 1969, analysts had perceived vast potential military and economic benefits
in cables exploitation (IISS, 1969). With the explosion in importance
of fiber optic networks (see figures I.1, I.2, I.3, and I.4 to compare the
growths of satellite communications, cable, communications, and submarine
cable bandwidth), this potential has been realized and will continue to grow;
at the same time, however, so will the attendant vulnerability. The submarine
fiber optic cable network is of great importance to the United States (see
Figures I.5 and I.6 for a glance at the cables terminating on each coast).
Moreover, constraints on cable laying mean that several cables are likely
to be bundled together, offering a potentially lucrative target for sabotage.
In most industry publications, however, little attention is given to the possibility of deliberate attack on the fiber optic network. Indeed, one of the few discussions of the possibility says simply that while undersea cables could be cut, the practice of burying the in-shore segments makes this difficult; the mid-ocean portions are hard to find without a map and help from shore-based monitoring stations (Mandell, 2000).
Given the above, however, it is clear that more attention should be paid to the potential for deliberate attacks on the global fiber optic cable network (see figures I.7 and I.8 for a look at some of the cables terminating in Asia and Europe). Currently, for instance, shore authorities have positioned radars and occasionally scheduled flyovers for areas in New Jersey that might be targeted (Chave, 2000).
The NR-2 with the capacity to maneuver and search on the seabed may be the most valuable asset of all in monitoring the status and security of cables terminating in the United States and on the shores of our allies.