Operation Ivy Bells

Total Page:16

File Type:pdf, Size:1020Kb

Operation Ivy Bells The Most Audacious Spy Operation in the History of the US Navy! Operation Ivy Bells Yakov M. Hirschson At the height of the Cold War, several US intelligence agencies For nearly a decade, American officials had access to Russia’s joined with the Navy to conduct a spy operation as covert as it greatest secrets and knew precisely what malicious plans the was audacious. Highly skilled and specially trained divers snuck Soviet leaders were conspiring against them. When the Soviets into Soviet waters and attached a sophisticated electronic discovered the secret, American lives were placed in jeopardy. bugging device to an underwater Soviet cable. Read the gripping account of Operation Ivy Bells. 104 | ZMAN • March 2012 ZMAN • Adar 5772 | 105 bitter cold front blanketed the eastern A Risky Mission shores of the Soviet Union on that underwater war activity at the Navy Awintry night when the USS Halibut, a The National Security Agency (NSA) intelligenceby Captain Jamesdivision. Bradley, Bradley director was ofa Navy submarine, secretly slipped into the was created in 1952 to oversee electronic heavily guarded Soviet waters deep in the surveillance activity around the world. It war as captain of a small warship that Sea of Okhotsk to carry out an incredible is the largest agency in America’s broad World War II veteran who served in the mission. intelligence community, as well as one of served as commander of a transport ship The submarine proceeded silently to the the most secretive. It has twice as many participated in the Pacific theater. He prearranged point and then ground to a halt. employees as the CIA and carries the submarine service. Later still he became A handful of Navy divers emerged from the highest budget of any individual spy agency in the Vietnam War and later he joined the decompression chamber and dived to the anywhere in the world. was promoted to his position as director The NSA is capable of eavesdropping ofa navalunderwater espionage war officeractivity. and in 1966 he This was a very risky operation. The on any telephone call placed anywhere In his new position, Bradley was Seasea floorof Okhotsk to carry is outhuge, Operation covering Ivy an Bells. area of in the world and can read any e-mail, constantly dreaming of ways to break into 600,000 square miles in the northwestern fax, text message or any other form of the Soviet intelligence centers. One day in 1970 he had a brainstorm. He studied Threat Operations Center of the NSA at Fort Meade, Maryland, the Siberian shore. At that point in the Cold the NSA was primarily preoccupied with the map of the Sea of Okhotsk and its where America's analysts eavesdrop on conversations and Pacific, and is surrounded on three sides by turningcommunication. its satellites, During super-computers the Cold War,and surrounding territories. On one side in analyze possible threats to the US. waters to be Soviet territory, and it protected latest bugging devices to spy on America’s the city of Petropavlovsk lay a missile itsWar borders the Soviet aggressively, Union had barring declared entry these to greatest enemy, the Soviet Union. The NSA submarine base while on the opposite any foreign ships and certainly not granting was even able to listen to the conversations side in the city in Vladivostok, home to the access to American military vessels. Soviet leaders held on their car phones with The Soviet Navy had even planted a the Kremlin! coast, was the headquarters of its navy’s network of listening devices on the sea Although, unlike the CIA, the NSA does Soviet Union’s largest port on the Pacific Bradley knew that the two unwanted guests. Since the sea was the information, relying instead exclusively on headquartersPacific fleet. were in constant contact sitefloor of toregular warn navalthem maneuvers, of the presence the entire of electronicnot send itseavesdropping, men into the the field life ofto ancollect NSA and he imagined that communications area was patrolled by both surface and operative is still not guaranteed. The reason between the two were carried by an underwater craft. The chances of an enemy for this is that NSA agents must accompany undersea cable that stretched from the ship, silently slipping into these waters, military personnel to the front lines as they carrying out a successful operation and install the devices and then listen in to them headquarters and from there all the way Satellite dishes used for eavesropping on international then departing without being discovered, wherever this service may be wanted, thus onmissile to Moscow. base across the sea to the fleet communications at NSA’s UK listening post. were virtually nil. putting them into the battlefront. At NSA “Imagine if we could send a submarine There is no doubt that had the Russian Navy discovered the American submarine is a special memorial to the NSA agents who in its protected waters it would have sunk lostheadquarters their lives in in Fort the Meade,line of duty. Maryland, there toin tohear attach every a microphone conversation to thatcarried cable,” by the vessel immediately. Even worse, there Operation Ivy Bells was masterminded Bradley thought to himself. “We’d be able was a good chance that the Halibut, the most sophisticated submarine in the US Navy’s collectthe cable. accurate We’d know reports exactly of the what strengths Soviet arsenal, would fall into the hands of the andmilitary weaknesses leaders ofare Soviet thinking. military We forces.could Soviets and reveal priceless technological secrets—including the details of Operation Russian navy’s maneuvers in the Sea of Ivy Bells in which it was now engaged. OkhotskWe could and learn at the the same details time aboutwe would the considered the potential The idea opened up the possibility Still, US Navy officials oflearn accessing about Russia’s a gold militarymine of plans.” intelligence overwhelmingly worthwhile that US leaders were dying to get their benefitsthat they of this were mission prepared to be soto hands on. There were just a few small An aerial view of the super-secret NSA headquarters. risk everything in the attempt. Map of the Okhotsk Sea where Operation Ivy Bells took place. problems with Bradley’s inspiration. 106 | ZMAN • March 2012 ZMAN • Adar 5772 | 107.
Recommended publications
  • THE BULLYTIN Official News Letter of Field Marshal Shellhole
    THE BULLYTIN Official News Letter of Field Marshal Shellhole JUNE 2017 Dear Readers, This will be my last “GO” at “the Bullytin” as duty calls elsewhere for now, thank you to those who took the time to read it. To all who provided articles and photographs your contributions were always greatly appreciated. Best wishes to you all Yours Aye – The Editor Moth Johnny Demetroudes. Australia's First National Boer War Memorial in Canberra 1 The 31st May is the anniversary of the signing of the Treaty of Vereeniging that ended the South African War in 1902. In 2017, 115 years from the day peace was concluded, the completed Australian National Boer War Memorial will be dedicated in ANZAC Parade Canberra. – Article supplied by Moth Renaud Booysen – Gorgeous Wrecks Shellhole. http://www.bwm.org.au/site/Boer_War_Day2017.php 2 Somme sketches: British soldier’s beautiful pencil drawings detailing life on the Western Front revealed in stunning artwork - By Rachael Burford For Mailonline Lieutenant Morris Meredith Williams filled 15 sketch books while serving on the Western Front during WW1 He drew at every opportunity and there are some shocking sights, including a body caught in barbed wire His drawings are included in book An Artist's War along with letters Lt Williams sent to his wife Alice Williams Lt Williams served in the 17th Battalion of the Welsh Regiment in France from 1916 until the end of the war A Tommy's drawings showing life on the front line during the First World War are set to be published for the first time.
    [Show full text]
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]
  • Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • An International Forum for the Expression of Ideas and Opinions
    ISSN 1948-3031 #47 Defense & Nontraditional Cable Systems N o ve 09 mber 20 IN THIS ISSUE: Revisiting Blind Man’s Bluff: Inside Operation Ivy Bells An international forum for the expression of ideas and opinions pertaining to the submarine telecoms industry Welcome to the 47th edition industry that helped transform and SubTel Forum is an imperfect medium, of Submarine Telecoms Forum, our shape the world’s past. and we have surely made our share of Defense & Nontraditional Cable mistakes; but we continue to hope that Systems issue. It seems fitting to me that in this week in the long run we have helped our when we celebrate both the end of the industry in some small way. Though I have a piece of The Wall held in plastic “War to end all Wars” and the felling our faces may change, our goals remain. atop the bookshelf next to my desk. of the Berlin Wall, that we can also Happy Anniversary (whichever one It sits above my terra cotta Jaguar (a celebrate in a much less nobler fashion you choose to celebrate). model), and both remind me daily of the 8th anniversary of SubTel Forum. the benefactor, the co-founder of this rag we fondly called SubTel Forum. I When Ted and I established our also have a small clockwork tin toy little magazine, we did so with two that reminds me of my schoolboy visit key principles from the outset. We to Moscow and Leningrad during the promised then, and annually I reaffirm Brezhnev years – a very different world to you, our readers: from the one today.
    [Show full text]
  • Submarine Cables, Cybersecurity and International Law: an Intersectional Analysis
    Catholic University Journal of Law and Technology Volume 24 Issue 1 Article 4 December 2015 Submarine Cables, Cybersecurity and International Law: An Intersectional Analysis Tara Davenport Yale Law School Follow this and additional works at: https://scholarship.law.edu/jlt Part of the Admiralty Commons, Communications Law Commons, First Amendment Commons, Fourth Amendment Commons, International Law Commons, Internet Law Commons, Law of the Sea Commons, Military, War, and Peace Commons, National Security Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Tara Davenport, Submarine Cables, Cybersecurity and International Law: An Intersectional Analysis, 24 Cath. U. J. L. & Tech (2015). Available at: https://scholarship.law.edu/jlt/vol24/iss1/4 This Article is brought to you for free and open access by CUA Law Scholarship Repository. It has been accepted for inclusion in Catholic University Journal of Law and Technology by an authorized editor of CUA Law Scholarship Repository. For more information, please contact [email protected]. SUBMARINE CABLES, CYBERSECURITY AND INTERNATIONAL LAW: AN INTERSECTIONAL ANALYSIS Tara Davenport* The international community’s ever-increasing reliance on the Internet and web-based information and communications technologies (“ICT”) has meant that cybersecurity is becoming one of the most pressing concerns in the 21st century. The International Telecommunications Union (“ITU”)1 has defined cybersecurity to mean “the collection of tools, policies, security concepts,
    [Show full text]
  • A Submarine Replacement Project for Canada
    A Submarine Replacement Project For Canada Cdr K.H. Coffen JCSP 38 PCEMI 38 Master of Defence Studies Maîtrise en études de la défense Disclaimer Avertissement Opinions expressed remain those of the author and Les opinons exprimées n’engagent que leurs auteurs do not represent Department of National Defence or et ne reflètent aucunement des politiques du Canadian Forces policy. This paper may not be used Ministère de la Défense nationale ou des Forces without written permission. canadiennes. Ce papier ne peut être reproduit sans autorisation écrite. © Her Majesty the Queen in Right of Canada, as © Sa Majesté la Reine du Chef du Canada, représentée par represented by the Minister of National Defence, 2018. le ministre de la Défense nationale, 2018. CANADIAN FORCES COLLEGE – COLLÈGE DES FORCES CANADIENNES JCSP 38 – PCEMI 38 2011 – 2012 MASTER OF DEFENCE STUDIES – MAÎTRISE EN ÉTUDES DE LA DÉFENSE A Submarine Replacement Project For Canada Cdr K.H. Coffen “This paper was written by a student “La présente étude a été rédigée par un attending the Canadian Forces College stagiaire du Collège des Forces in fulfilment of one of the requirements canadiennes pour satisfaire à l'une des of the Course of Studies. The paper is a exigences du cours. L'étude est un scholastic document, and thus contains document qui se rapporte au cours et facts and opinions, which the author contient donc des faits et des opinions alone considered appropriate and que seul l'auteur considère appropriés et correct for the subject. It does not convenables au sujet. Elle ne reflète pas necessarily reflect the policy or the nécessairement la politique ou l'opinion opinion of any agency, including the d'un organisme quelconque, y compris le Government of Canada and the gouvernement du Canada et le ministère Canadian Department of National de la Défense nationale du Canada.
    [Show full text]
  • Central Intelligence Agency FOIA Request Logs, 2000-2005
    Central Intelligence Agency FOIA request logs, 2000-2005 Brought to you by AltGov2 www.altgov2.org/FOIALand ... , Calendar Year 2000 FOIA Case Log Creation Date Case Number Case Subject 03-Jan-00 F-2000-00001 IMPACT VISA CARD HOLDERS 03-Jan-0O F-2000-00003 WILLIAM CHARLE BUMM JSC RADEL, LTD; ELTEK COMPANY WIDEBAND SYSTEMS DIGITAL FREQUENCY DISCRIMINATOR; ED 03-Jan-00 F-2000-00004 BATKO OR BATKO INTERNATIONAL; COLONEL SERGEY SUKARAEV 03-Jan-0O F-2000-00005 INFO ON FATHER 04-Jan-00 F-2000-00006 JOHN CHRISLAW 04-Jan-00 F-2000-00007 1999 BOMBING OF CHINESE EMBASSY IN BELGRADE, YUGOSLAVIA. 04-Jan-00 F-2000-00008 COMMANDER IAN FLEMING 04-Jan-00 F-2000-00009 MALCOLM X AND ELIJAH MUHAMMAD AND HIS SON, AKBAR MUHAMMAD AND THE NATION OF ISLAM 04-Jan-00 F-2000-00010 WILLIAM STEPHENSON 04-Jan-00 F-2000-00011 SIX DECEASED INDIVIDUALS WITH CRIMINAL BACKGROUND 04-Jan-00 F-2000-00012 INFO ON ARGENTINA 04-Jan-00 F-2000-00013 ENRIQUE FUENTES LEON, MANUEL MUNOZ ROCHA, AND ERNESTO ANCIRA JR. 04-Jan-00 F-2000-00014 SOVIET ESPIONAGE IN AND AGAINST THE UNITED STATES 04-Jan-00 F-2000-00015 SOVIET ESPIONAGE IN AND AGAINST THE UNITED STATES SPECIFIC INFO ON CIA POSITIONS RELATING TO THE INFORMATION SYSTEMS CONTACTS AND 04-Jan-00 F-2000-00016 PURCHASING- OFFICERS 04-Jan-00 F-2000-00017 MKULTRA CDROMS 04-Jan-00 F-2000-00018 CIA PROJECTS ON OR AROUND 9 APRIL 1959 04-Jan-00 F-2000-00019 JERZY PAWLOWSKI 04-Jan-00 F-2000-00020 PERSONNEL FILES OF ALDRICH AMES 05-Jan-00 F-2000-00026 PERSONNEL FILES OF ALDRICH AMES 05-Jan-00 F-2000-00027 32 PAGE LETTER AND TWO TDK TAPES ON HER PROBLEMS 05-Jan-00 F-2000-00028 EMERSON T.
    [Show full text]
  • Contested Seas: Maritime Domain Awareness in Northern Europe
    COVER PHOTO ADOBE STOCK MARCH 2018 1616 Rhode Island Avenue NW Washington, DC 20036 202 887 0200 | www.csis.org Lanham • Boulder • New York • London 4501 Forbes Boulevard Contested Seas Lanham, MD 20706 301 459 3366 | www.rowman.com Maritime Domain Awareness in Northern Europe PROJECT DIRECTOR Kathleen H. Hicks AUTHORS Andrew Metrick Kathleen H. Hicks ISBN 978-1-4422-8067-0 Ë|xHSLEOCy280670z v*:+:!:+:! A Report of the CSIS INTERNATIONAL SECURITY PROGRAM Blank MARCH 2018 Contested Seas Maritime Domain Awareness in Northern Europe PROJECT DIRECTOR Kathleen H. Hicks AUTHORS Andrew Metrick Kathleen H. Hicks A Report of the CSIS INTERNATIONAL SECURITY PROGRAM Lanham • Boulder • New York • London About CSIS For over 50 years, the Center for Strategic and International Studies (CSIS) has worked to develop solutions to the world’s greatest policy challenges. Today, CSIS scholars are providing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organization headquartered in Washington, D.C. The Center’s 220 fulltime staff and large network of affiliated scholars conduct research and analysis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M. Abshire and Admiral Arleigh Burke, CSIS was dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. Since 1962, CSIS has become one of the world’s preeminent international institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global health and economic integration.
    [Show full text]
  • Secrets Haunt the Still-Classified Operation Ivy Bells, a Daring Cold War Wiretapping Operation Conducted 400 Feet Underwater
    By Matt Blitz Mar 30, 2017 Secrets haunt the still-classified Operation Ivy Bells, a daring Cold War wiretapping operation conducted 400 feet underwater. It's the summer of 1972 and the U.S. is in the middle of pulling off the most daring, covert, and dangerous operation of the Cold War. Only a few months before, the signing of SALT I (Strategic Arms Limitations Treaty) limited the number of nuclear missiles of the world's two largest superpowers. Yet even with this well-publicized US/Soviet détente in place, a submerged American submarine rests mere miles from the Russian coastline. At the bottom of the Sea of Okhotsk, the U.S. nuclear submarine Halibut silently listens to the secret conversations of the Soviet Union. With the Kremlin completely unaware, Navy divers emerge from a hidden compartment (referred to as the "Bat Cave") and walk along the bottom of the sea in complete darkness, wiretapping the Soviet's underwater communications line. America wiretapped this particular Soviet communications cable for maybe a decade or more— and many details remain classified. It was the U.S.'s most ambitious wiretapping operation, until this point, in its entire history. This was Operation Ivy Bells. Shipyard model of the USS Halibut (SSGN-587), Nov. 18, 1957. U.S. Navy / Darryl L. Baker Battle Plans and Mistresses Down below the sea surface, the intel is flooding in. With the divers' taps in place, American communication techs onboard the Halibut gather a wide range of intelligence, from operational tactics to Soviet commanders' conversations with their mistresses.
    [Show full text]
  • The Central Intelligence Agency: an Encyclopedia of Covert Ops, Intelligence Gathering
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/314835756 3 short articles in Jan Goldman, ed., The Central Intelligence Agency: An Encyclopedia of Covert Ops, Intelligence Gathering... Chapter · December 2015 CITATIONS READS 0 144 1 author: Priscilla Roberts City University of Macau 551 PUBLICATIONS 85 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Frank Altschul, 1887-1981: A Political and Intellectual Biography View project China, Hong Kong, and the Long 1970s: Global Perspectives View project All content following this page was uploaded by Priscilla Roberts on 25 March 2017. The user has requested enhancement of the downloaded file. The Central Intelligence Agency The Central Intelligence Agency An Encyclopedia of Covert Ops, Intelligence Gathering, and Spies VOLUME 1 Jan Goldman, Editor Copyright © 2016 by ABC-CLIO, LLC All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except for the inclusion of brief quotations in a review, without prior permission in writing from the publisher. Library of Congress Cataloging-in-Publication Data The Central Intelligence Agency: an encyclopedia of covert ops, intelligence gathering, and spies / Jan Goldman, Editor. pages cm ISBN 978-1-61069-091-1 (pbk. : alk. paper) — ISBN 978-1-61069-092-8 (ebook) 1. United States. Central Intelligence Agency—Encyclopedias. 2. Intelligence service— United States—Encyclopedias. I. Goldman, Jan. JK468.I6C457 2016 327.1273003—dc23 2013042649 ISBN: 978-1-61069-091-1 EISBN: 978-1-61069-092-8 20 19 18 17 16 1 2 3 4 5 This book is also available on the World Wide Web as an eBook.
    [Show full text]
  • Historical Dictionary of United States Intelligence (Historical Dictionaries of Intelligence and Counterintelligence)
    03-370 (1) Front 3/18/04 12:51 PM Page ii 05-398 (1) FM.qxd 10/20/05 6:13 AM Page i HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE SERIES Jon Woronoff, Series Editor 1. British Intelligence, by Nigel West, 2005. 2. United States Intelligence, by Michael A. Turner, 2006. 05-398 (1) FM.qxd 10/20/05 6:13 AM Page ii 05-398 (1) FM.qxd 10/20/05 6:13 AM Page iii Historical Dictionary of United States Intelligence Michael A. Turner Historical Dictionaries of Intelligence and Counterintelligence, No. 2 The Scarecrow Press, Inc. Lanham, Maryland • Toronto • Oxford 2006 05-398 (1) FM.qxd 10/20/05 6:13 AM Page iv SCARECROW PRESS, INC. Published in the United States of America by Scarecrow Press, Inc. A wholly owned subsidiary of The Rowman & Littlefield Publishing Group, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 www.scarecrowpress.com PO Box 317 Oxford OX2 9RU, UK Copyright © 2006 by Michael A. Turner The author, a former CIA employee, submitted this manuscript to the CIA’s Publication Review Board, which reviewed it to assist the author in eliminating classified information. The board posed no security objection to the book’s publication. This review, however, should not be construed as official release of information, confirmation of accuracy, or an endorsement of the author’s views. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the publisher.
    [Show full text]
  • Arctic Connect Project and Cyber Security Control, ARCY Informaatioteknologian Tiedekunnan Julkaisuja No
    Informaatioteknologian tiedekunnan julkaisuja No. 78/2019 Martti Lehto, Aarne Hummelholm, Katsuyoshi Iida, Tadas Jakstas, Martti J. Kari, Hiroyuki Minami, Fujio Ohnishi ja Juha Saunavaara Arctic Connect Project and cyber security control, ARCY Informaatioteknologian tiedekunnan julkaisuja No. 78/2019 Editor: Pekka Neittaanmäki Covers: Petri Vähäkainu ja Matti Savonen Copyright © 2019 Martti Lehto, Aarne Hummelholm, Katsoyoshi Iida, Tadas Jakstas, Martti J. Kari, Hiroyuki Minami, Fujio Ohnishi, Juha Saunavaara ja Jyväskylän yliopisto ISBN 978-951-39-7721-4 (verkkoj.) ISSN 2323-5004 Jyväskylä 2019 Arctic Connect Project and Cyber Security Control, ARCY Martti Lehto Aarne Hummelholm Katsuyoshi Iida Tadas Jakštas Martti J. Kari Hiroyuki Minami Fujio Ohnishi Juha Saunavaara UNIVERSITY OF JYVÄSKYLÄ FACULTY OF INFORMATION TECHNOLOGY 2019 EXECUTIVE SUMMARY The submarine communication cables form a vast network on the seabed and transmit massive amounts of data across oceans. They provide over 95% of international tele- communications—not via satellites as is commonly assumed. The global submarine network is the “backbone” of the Internet, and enables the ubiquitous use of email, social media, phone and banking services. To these days no any other technology than submarine cables systems has not been such a strategic impact to our society without being known it as such by the people. This also means that it is at the same time a very interesting destination for hackers, cyber attackers, terrorist and state actors. They seek to gain access to information that goes through the networks of these continents that are connected to each other with sea cables. The main conclusion Tapping fiber optic cables to eavesdrop the information is a conscious threat.
    [Show full text]