Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
The Military The Internet

Why Is Russia's Suspected Internet Cable Spy Ship In the Mid-Atlantic? (forbes.com) 107

"Russia's controversial intelligence ship Yantar has been operating in the Caribbean, or mid-Atlantic, since October," writes defense analyst H I Sutton this week in Forbes.

He adds that the ship "is suspected by Western navies of being involved in operations on undersea communications cables." Significantly, she appears to be avoiding broadcasting her position via AIS (Automated Identification System). I suspect that going dark on AIS is a deliberate measure to frustrate efforts to analyse her mission. She has briefly used AIS while making port calls, where it would be expected by local authorities, for example while calling at Trinidad on November 8 and again on November 28. However in both cases she disappeared from AIS tracking sites almost as soon as she left port...

Yantar has been observed conducting search patterns in the vicinity of internet cables, and there is circumstantial evidence that she has been responsible for internet outages, for example off the Syrian coast in 2016.

Yantar is "allegedly an 'oceanographic research vessel'," notes Popular Mechanics, in a mid-November article headlined "Why is Russia's spy ship near American waters?"

A study by British think tank Policy Exchange mentioned that the ship carried two submersibles capable of tapping undersea cables for information -- or outright cutting them, the Forbes article points out. "Whether Yantar's presence involves undersea cables, or some other target of interest to the Russians, it will be of particular interest to U.S. forces."
This discussion has been archived. No new comments can be posted.

Why Is Russia's Suspected Internet Cable Spy Ship In the Mid-Atlantic?

Comments Filter:
  • by Anonymous Coward

    hope your crypto is working

    • by gl4ss ( 559668 )

      well.. for who.

      anyways if they do break the cable US forces for sure know it was them. it's just the civvies that won't know for sure. usa knows where the cables are and where the ship is.

  • It should be fairly straightforward to encrypt all the communication going across one of these cables, making tapping impossible.

    • by aliquis ( 678370 )

      making tapping impossible.

      Less probable.

      • Less probable.

        No, encryption has nothing to do with tapping.

        Unless the attacker decides not to bother tapping the line at all because it's encrypted, then there's no connection between the two.

        And frankly, knowing it's encrypted won't stop anyone with the resources to tap an undersea cable. They'll do it, scoop up everything and get to work decrypting it, which they'll eventually be able to do. Sooner or later.

        • Re: (Score:3, Informative)

          You are making a pedantic distinction over trivialities of word definition.

          Wiretapping is usually understood to mean listening in on a conversation (or other communication). If you physically intercept the the communication link, but because of encryption you can't listen in, in a very real sense you are not tapping.

          Merriam Webster, [merriam-webster.com] for example: wiretapping is "interception of the contents of communication through a secret connection to the telephone line of one whose conversations are to be monitored usu

          • Re:Tapping (Score:5, Informative)

            by JustAnotherOldGuy ( 4145623 ) on Saturday December 07, 2019 @04:18PM (#59495894) Journal

            If you physically intercept the the communication link, but because of encryption you can't listen in, in a very real sense you are not tapping.

            That's just wrong. You are tapping the line, you just can't understand what's being said on the line. You have to tap the line before you can decrypt or understand what's being said.

            If you can't decrypt it, then you are not intercepting the contents.

            No, that's not correct. In fact it's ridiculously wrong. The word "intercept" doesn't have anything to do with readability. You can intercept traffic you can't read.

            Let's say you tap a line and record the (encrypted) communications, even though you can't decrypt the traffic.

            A year later, you find the key and now you can decrypt the traffic. Are you going to jump up and say, "Hey, I just tapped their line!"?

            No, you'll say "I just decrypted the data we intercepted from the tap we put on the undersea cable last year."

            • A year later, you find the key and now you can decrypt the traffic

              Except you won't find the key in a year. This is not some Tom Cruise movie.

              • by Bert64 ( 520050 )

                Maybe not through brute force, but perhaps through espionage or some other leaks?

                • by Blymie ( 231220 )

                  There have been flaws discovered in all forms of encryption, over the years. These flaws have been shown to weaken those forms of encryption, often leading to their deprecation.

                  Pre-0-day vulnerabilities abound. To assume that the *current* form of encryption you use is safe, is not logical. It's only safe from those that don't know what vulnerabilities surely exist, but have not been discovered by the public at large. Granted, some vulnerabilities are man-in-the-middle required, but others did assist in

                  • There have been flaws discovered in all forms of encryption, over the years.

                    Please provide a link to the flaws discovered in AES256.

                    The NSA, and similar agencies spend trillions on hiring encryption specialists right out of University, and just let them play, theorize, and learn

                    That knowledge works both ways. The NSA can no doubt propose encryption that they would consider unbreakable.

                    • Please provide a link to the flaws discovered in AES256.

                      We will as soon as they're discovered. Or are you claiming that AES256 is perfect and has no flaws and will never be broken?

                    • No, but if someone is claiming that all forms of encryption have flaws, then I'd like to see some proof, otherwise it's just intellectual laziness.

                • Maybe not through brute force, but perhaps through espionage or some other leaks?

                  Exactly. They don't necessarily have to crack something to get the key. It may just be a matter of money or idealism or any of a hundred other ways.

              • They don't necessarily have to crack something to get the key. It may just be a matter of paying some money or appealing to their idealism or any of a hundred other ways.

            • What part of "pedantic distinction over trivialities of word definition" did you need to be explained?

              • What part of "pedantic distinction over trivialities of word definition" did you need to be explained?

                The kind you apparently don't understand, and therefore use to deflect from the fact that you've been shown to be wrong.

          • by Anonymous Coward

            You are making a pedantic distinction over trivialities of word definition.
            Wiretapping is usually understood to mean listening in on a conversation (or other communication)

            But "literally" is generally understood to mean "figuratively" too, and is documented in the same source you also quoted from.

            I'd have to agree with JustAnotherOldGuy, you can tap a line if it's data is plain text or encrypted either way, the data itself makes no difference to the physical act of getting data off a wire.

            I also disagree with your stance in whole, a language of words where not a single one of them has any meaning would both be very useless and pointless to bother with.

            I prefer words to mean s

            • I also disagree with your stance in whole, a language of words where not a single one of them has any meaning would both be very useless and pointless to bother with.

              If we're going to have a contest if who can piss pedantry further up the wall than the other guy, if a language is a means of conveying information or meaning between entities, then a language of words without meaning wouldn't actually be a language, would it?

          • "If you can't decrypt it, then you are not intercepting the contents."

            With your bizarre quantum interception logic, when you decrypt a communication years later, the interception goes back in time and happens when you tapped the cable?

            LOL... bruh, please.

          • You are making a pedantic distinction over trivialities of word definition.

            You're also carefully slipping between the word being used ("tapping") and the word you're interested in ("wiretapping"). As a method of getting something out of a conduit, "tapping" has a subset which involves wires, electrical currents and voltages which is called, in some countries, "wiretapping". For example, I routinely tap into fluid-filled pipes to extract information from pressure variations in the pipe's contents. I also tap

        • Re:Tapping (Score:5, Insightful)

          by religionofpeas ( 4511805 ) on Saturday December 07, 2019 @04:11PM (#59495876)

          They'll do it, scoop up everything and get to work decrypting it, which they'll eventually be able to do

          Modern symmetric encryption is pretty much unbreakable, and can be upgraded to a stronger version when needed. And figuring out the contents of 20 year old data is pretty much going to be useless. Recording all the data is going to be tricky too, especially on board a ship.

          • And figuring out the contents of 20 year old data is pretty much going to be useless.

            The NSA, CIA, FBI, etc routinely record and store stuff they can't read. They hope to read it one day whether by cracking or by getting

              Unbuttoning old communications even from long ago can be immensely valuable in figuring out what happened and who did what, and then using that information to move forward and fill in more of the story/puzzle.

            • Agreed. Recording undecipherable traffic is a big part of picture, that way you have something to read when someone finally screws up and sends a key in the open.
          • Recording all the data is going to be tricky too, especially on board a ship.

            That needs a deal more work I knew people who were collecting petabyte data sets daily in the mid-winter North Atlantic in the 1990s. You might call it magic, but we called it broadband seismic.

            Of course, you couldn't read the data in the office. Not until the regular helicopter arrived to change crew members and swap new blank reels of tape for old valuable rolls of tape. Up thread, I mention traffic analysis. Standard Operating

        • Perhaps AI could be trained to be really good at breaking encryption?

    • It would be pretty straightforward, and it would reduce the capacity by roughly 20%. The exact overhead depends on many assumptions. Best case you lose about 10%.

      • by LubosD ( 909058 )
        If you don't introduce padding, then no. And honestly, I think in case of undersea cables that carry packets of milions of users, revealing the exact size of individual packets isn't much of a deal.
        • Without padding, I can read and potentially change the plaintext. It's a very big deal. The padding had better be done right, too. Get it wrong and you've got POODLE, Lucky 13, etc.

          Anyway you've got the headers even if you wanted easily breakable encryption for the illusion of security.

          Fortunately, anything sensitive should already be encrypted well before it gets to the transatlantic cable.

      • by mysidia ( 191772 ) on Saturday December 07, 2019 @03:44PM (#59495792)

        They just need to pair up MACsec transceivers at each end of each connection, and the overhead is more like 1%.

        • About half of the frames on the internet are about 88 bytes - all those acks. Add 24-56 bytes of Macsec overhead, that's something like 30% overhead on half the frames.

          The other half of the frames average about 500-600 bytes. So around 5%-10% overhead on those. We assume that all of the equipment involved can handle the extra large frames for large transfers. If instead adding the Macsec requires fragmentation, it gets worse.

          • by AHuxley ( 892839 )
            Thats a free 10%-20% - that was for the next upgrade capacity sale...
            Encryption now would reduce the ability to sell "free" data as a capacity upgrade...
          • You assume that packets are enctrypted individually. If encryption/decription happens at both ends of the cable one can encrypt the data stream to reduce the encryption overhead.

            • Can you think of why encrypting billions of packets, and terabytes of data, with one key would be a very bad idea?

              Do you think there might be a reason IPSec etc encrypt packets? What happens when packet loss is 0.01%? How much data needs to be flushed from the entire cable and resent several thousand times per second?

              What does this do to security and do attacks like Sweet32 teach us anything?

              • Can you think of why encrypting billions of packets, and terabytes of data, with one key would be a very bad idea?

                If your encryption is good, it doesn't matter that it's with a single key.

                • by Blymie ( 231220 )

                  No encryption is secure. Just because we don't know of the latest vulnerability, latest weakness with 'what we use', doesn't mean it isn't there. One must assume it is broken (by someone), vulnerable in some way, leading to decryption.

                  Its only value is to 'raise the bar' for the 'common man' to fuck with you, and perhaps for wide-spread, easy surveillance. That's it.

                  State-actors have specific targets of interest. Immense resources can be placed on decrypting their traffic. When you spend billions (and

                  • One must assume it is broken (by someone), vulnerable in some way, leading to decryption.

                    By that logic, one must also assume that changing your key doesn't help.

                    State-actors have specific targets of interest. Immense resources can be placed on decrypting their traffic.

                    In this case, state-actors also have immense resources to make sure their encryption is safe.

                    • "Break in key and get everything" is ONE issue.

                      Another issue is that the more data I have encrypted with a key, the easier it is to break it. By a very significant amount of "easier". Again, see Sweet32 for an example.

                      I recently broke RSA using a similar concept of reuse (see Chinese Remainder Theorem). The system had that design flaw and the reuse allowed me to decrypt the messages. I'm not a state actor, I'm one guy. I can and do execute attacks like Sweet32 and CRT when someone has poor encryption pr

                    • State-actor level resources are needed when the encryption is done right, with perfect forward secrecy

                      Obviously. But that's not a problem for a transatlantic cable where the USA has great interest in keeping it secure.

                    • And you're suggesting that because the USA has a great interest in keeping it secure, they should intentionally misconfigure it such that even *I* can break it? Anyone iny masters-level encryption class could break it if you use the same key for terabytes of data, and we can control some of the data by generating our own cross-Atlantic traffic. That's exactly the kind of thing professor Lee would assign.

                      If I'm understanding you correctly, your logic is "it's very important, so let's make sure we do it com

          • by mysidia ( 191772 )

            Add 24-56 bytes of Macsec overhead,

            Its 24 bytes per frame. 32 bytes is the maximum overhead; only if the use of a secure channel identifier is required and enabled.

            half of the frames on the internet are about 88 bytes - all those acks

            TCP can and will carry data payloads back with ACKs; this is 88 bytes only if a return direction is not being utilized during a TCP connection --
            what you're saying only applies to the side where a transmission path is barely being used; Well, yeah.

            If you only use a g

            • Thanks. Everything you said makes sense except I want yo make sure I'm understanding what you're saying here:

              > TCP can and will carry data payloads back with ACKs; this is 88 bytes only if a return direction is not being utilized during a TCP connection

              You're talking about when there is significant data flow in both directions of a single TCP session, correct?

              Most of the internet traffic is of course the web. Most of the bandwidth being video. Send a 24-byte request, get a 30,000,000 byte response. That

      • by gtall ( 79522 )

        Nah, just use the cables route Twitter traffic. Then invite the Russians to tap the hell out it, they'll gain nothing of import.

  • by nospam007 ( 722110 ) * on Saturday December 07, 2019 @02:46PM (#59495616)

    Why do you rob banks?

    Because that's where the money is.

    • I believe Willie Sutton originally made this statement. That doesn't mean Mr. Kelly didn't repeat it.
    • Because that's where the money is.

      Willie Sutton, he's my Spirit Animal.

    • by AmiMoJo ( 196126 )

      This is probably misdirection though. I mean if the media is reporting it then they didn't do a very good job of hiding where the tap is, and presumably a Western sub will be along soon to check their work and remove it if necessary.

      It's cable tapping even a thing these days? I mean it wouldn't be hard to just encrypt the whole link and make any tap worthless.

      • "It's cable tapping even a thing these days? I mean it wouldn't be hard to just encrypt the whole link and make any tap worthless."

        It's not for listening. They attach a sub to the cable with hundreds of little bots with tiny keyboards posting fake news on Facebook. So nobody can tell from where it comes.

      • by ghoul ( 157158 ) on Saturday December 07, 2019 @11:48PM (#59496774)

        Myabe they are removing taps put by the US on cables going to Cuba? And being obvious about their location to send a message they found the US with its hand in the cookie jar

        • by AmiMoJo ( 196126 )

          That does sound plausible, although again you have to wonder why the US is able to tap these cables which should be encrypted. I suppose the US has the legal power to compel disclosure of any encryption keys.

  • There's no particular reason that a cable cutter couldn't be left behind on a timer to provide a little more deniability.

    • by sglines ( 543315 )

      That's what I was thinking. If we retaliate against the Russians for interfering with the US elections and cut them off they can retaliate by cutting us off. In that case, I would hope that a US Sub would accidentally sink that ship.

  • by fafalone ( 633739 ) on Saturday December 07, 2019 @03:00PM (#59495666)
    The Five Eyes already tapped most of the undersea cables and everything else, not sure how anyone can get mad Russia wants the same access.
  • Venezuela (Score:3, Interesting)

    by alvinrod ( 889928 ) on Saturday December 07, 2019 @03:10PM (#59495680)
    If it really is on some kind of mission it's probably in connection with Venezuela given the location of the vessel as well as Russia's support for Maduro. If they're trying to intercept communications from some of the opposition groups it wouldn't surprise me at all.
  • It should be sunk to prevent any accidents.

  • Why indeed? It's all hands on deck time for Team Orange.

  • Reddit et al., are all-a-buzz about Russians now. What happened to Ukraine hysteria? Isn't Russian hysteria so-last-year now?

    • by DogDude ( 805747 ) on Saturday December 07, 2019 @03:18PM (#59495704)
      Russia has been a threat to the US and other countries for as long as Putin's been in charge. What happens on Reddit is irrelevant to the real world.
      • by qaz123 ( 2841887 )
        How is it a threat to the US?
        • by Anonymous Coward
          Well Putin is a threat to the Baltic states (Estonia, Latvia and Lithuania), and if Russia invades those NATO countries would Washington risk a nuclear war or risk losing US global leadership?
        • by DogDude ( 805747 )
          Interfering in our elections is a pretty big threat. It looks like that threat is clearly playing out now, as our foreign relations, military morale, and economy all are quickly going into the toilet. The US is the most vulnerable as it's been in recent history right now, I'd say.
          • by AHuxley ( 892839 )
            People all over the USA went to vote, the vote was counted and ... free and fair elections...
            Want to win a US election? Talk to more US citizens who can vote in many different states...
            Winning...
            • by Anonymous Coward

              People all over the USA didn't bother to vote and stayed home.
              Not voting came first.
              Hillary came second on popular vote. (but that means nothing Trump won where it counts)
              Trump came third.

              Nice thriving democracy you got there...

              • by AHuxley ( 892839 )
                AC it was the USA... "popular vote" is not the number of states needed AC...
                AC "People all over the USA didn't bother to vote and stayed home."... That was the freedom they have.
                Again AC, want to win, talk to more US citizens in actual US states and win the needed states :)
          • > Interfering in our elections is a pretty big threat

            You should see how much they spent on FB and Twitter ads!

            https://youtu.be/LhxMvmX9WlA [youtu.be]

            • by ABEND ( 15913 )

              You should put a disclaimer next to the link for that video! The globalism-uber-alles types who down-rated my preceding comment will be triggered by that video.

              Anyhow, right from the Steele Dossier we have an idea what that economic super power Russia is spending for its intelligence operations: "Tens of thousands of dollar." http://thesteeledossier.com/

          • Interfering in our elections is a pretty big threat.

            Yeah, I'm pretty sure that the American interference in the current British election is really pissing off the Cons. Just about every time Trump opens his mouth and says something about Britain, the polls move a couple of percent from Conservative to Labour.

      • Russia has been a threat to the US and other countries for as long as Putin's been in charge.

        Russia has been a threat to the US and other countries much longer than that. Since the 19th Century (well, not the US in the 19th Century, since the US then was of no importance to Russia before WW2), at least....

  • All superpower splicing cable right and left. The us is suspected to have done it quite a few years ago.
  • It'd be a shame if something happened to it, like if it got blown up and sent to the bottom of the ocean.

  • As a everything science lifer, I am a bit puzzled by lack of imagination manifested in each and every discussion on Yantar and generally Russian oceanographic vessels.

    People blinded by "gas station masquerading as a state" rubish are forgetting those people may be smarter than "two minutes attention span" commenters can fathom. Maybe same people think they, or maybe MIC, already know everything worth knowing, or possible to know? Maybe they think Russians can only do same things already invented or done by

    • by Anonymous Coward

      Why disable the transponders then?

      • by dragisha ( 788 )

        Why disable the transponders then?

        If I was her captain, and I assure you I am not :), I will probably find gazillion reasons to turn my transponder off. If not for anything else, then to spook people watching my every step.

        Every day practice shows transponder is something used at captain's whim. Especially when out of shipping routes. Every other day you find in news this or other ship or aircraft did turn her/its/whatever transponder. Try googling something like "baltic sea transponder".

  • Why? (Score:5, Funny)

    by VonSkippy ( 892467 ) on Saturday December 07, 2019 @04:10PM (#59495874) Homepage

    I want to know how come the US (and Russian and probably ever other major government) can tap a fiber cable miles under the ocean without either end of the fiber being able to detect it yet my ISP can't repair a broken fiber that's 8 feet under ground without days of pissing and moaning?

    • by Bimkins ( 242641 )

      Cost.

      The government can do pretty much anything, including an undetected tapping of undersea cables, if they’re willing to pay the cost to do it. They want the ability to intercept or disrupt communications, and they don’t want people to know it’s them. They’ll pay that price (and have already done so many times, no doubt).

      Your cable company simply doesn’t want to pay the extra costs to provide uninterrupted service while conducting repairs.

    • by AHuxley ( 892839 )
      Its one device placed by NSA, GCHQ, Russia....
      Re "my ISP can't repair"
      Thats having a truck, crew, van, team in every city ready to "work" hard 24/7... just to be ready for a cut in services.
      No "ISP"/"telco" wants to pay for such teams waiting 24/7 on standby.
      So they pay a wage to just enough staff to keep the telco working within the "contract" while making a profit.
      Not setting a 24/7 business product? No van waiting.
      Consumer service? Thats "days" to get "the" one team thats doing work now ready for
  • Thought that would be further North and East, huh?
    Of course, since it hosts mini-subs capable of going down 20000 ft. I guess it can mess with cables just about anywhere.
    https://en.wikipedia.org/wiki/... [wikipedia.org]

    An idea of course dreamed-up originally by the Christians In Action during the 70s
    https://en.wikipedia.org/wiki/... [wikipedia.org]

    Meanwhile, not to worry, at 15 Kt. and no armament, I'm sure the USAF or USN will eliminate this "threat" within hours of it being deemed vital to do so.
    Probably being used as a training target

  • by Weirsbaski ( 585954 ) on Saturday December 07, 2019 @04:52PM (#59495970)
    As others have pointed out, there's not much to gain in tapping undecryptable communications.

    So maybe they're putting remote-control explosives on lines? If war would ever break out, one of the first priorities is to disrupt enemy communications...
    • by AHuxley ( 892839 )
      NATO and the USA would flip to their trusted commercial satellite networks... all in place and ready for the massive new "war" time bandwidth buy by the US gov.
      Russia can do nothing against all the commercial satellite networks can it...
      They are all private property and so far up in space.... well away from anything Russia has the tracking and range for....
      The Russians are going to have to answer to the Wests commercial satellite networks... if they did stop the US and NATO war time communication networ
    • This was exactly my first thought. I'm pretty sure that any attempt to penetrate today's fiber optic cables would be detected. But placing remotely triggerable explosive charges is probable undetectable. I wonder what method would be used to trigger them though.

  • by Kobun ( 668169 ) on Saturday December 07, 2019 @05:06PM (#59496012)
    That the US has for parking the Jimmy Carter wherever it is at.
  • Good idea, how do they overcome all the different and multiple layers of encryption?

    MiM can't be the answer.

  • There are a lot of other interesting things in the ocean. For example, - missing planes, ships, ore deposits, animals, plants, etc.
  • Would be a shame if the vessel were sunk. People not knowing it's there and all.

Genetics explains why you look like your father, and if you don't, why you should.

Working...