Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Post Office on the brink of collapse

      Post Office on the brink of collapse

      13 March 2026
      New policy direction targets South Africa's municipal broadband logjam - Solly Malatsi

      New policy direction targets South Africa’s municipal broadband logjam

      13 March 2026
      How electronic warfare is threatening ships and their crews

      How electronic warfare is threatening ships and their crews

      13 March 2026
      Rand slumps for second week

      Rand slumps for second week

      13 March 2026
      Parliament opens nominations for Icasa council seats

      Parliament opens nominations for Icasa council seats

      13 March 2026
    • World
      Musk launches Macrohard in cheeky nod to Microsoft - Elon Musk

      Musk launches Macrohard in cheeky nod to Microsoft

      12 March 2026
      Europe is building an alternative to Microsoft Office

      Europe is building an alternative to Microsoft Office

      11 March 2026
      Microsoft bets on Anthropic as it loosens ties with OpenAI

      Microsoft bets on Anthropic as it loosens ties with OpenAI

      10 March 2026
      World hit by worst oil shock since the 1970s

      World hit by worst oil shock since the 1970s

      9 March 2026
      iStore prices MacBook Neo at R11 999 in South Africa

      Apple debuts MacBook Neo to challenge Windows PCs, Chromebooks

      5 March 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      5 March 2026
      TCS+ | Bolt ups the ante on platform safety - Simo Kalajdzic

      TCS+ | Bolt ups the ante on platform safety

      4 March 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
    • Opinion
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » World » Fears Russia could sabotage global Internet

    Fears Russia could sabotage global Internet

    By The Conversation29 October 2015
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    russia-640

    It may sound far-fetched at first, but there’s a growing fear of the damage a newly aggressive Russia might inflict in a time of tension or conflict simply by damaging or cutting the undersea cables that carry almost all of the West’s Internet traffic.

    The New York Times reported that Russian submarines and spy ships were aggressively operating near the vital undersea cables. Could they be preparing for a new form of warfare?

    The perfect global cyberattack could involve severing the fibre-optic cables at some of their hardest-to-access locations in order to halt the instant communications on which the West’s governments, military, economies and citizens have grown dependent.

    Effectively, this would cripple world commerce and communications, destabilise government business and introduce uncertainty into military operations. A significant volume of military data is routed via the Internet backbone.

    The fibre-optic cables that carry the majority of the planet’s Internet traffic follow designated paths under the oceans. To cause global chaos, all that is needed is some “wire cutters” (realistically a submarine with a depth charge would do). This is not rocket science and there will be no need for clever hackers.

    While there is no evidence yet of any “cable snipping”, there is concern among senior US and allied military and intelligence officials over the accelerated activity by Russian armed forces around the globe. At the same time, the internal debate in Washington illustrates how the US is viewing Russian moves with distrust. Surveillance activity shows a significant increase in Russian activity along the known routes of the cables and more than a dozen officials confirmed in broad terms that it had become the source of significant attention in the Pentagon.

    Talking to the BBC’s Gordon Corera, the deputy director of the US National Security Agency, Richard Ledgett, warned of the increasing danger of destructive cyberattacks by nation states in addition to criminal organisations. A concerted cyberattack against another nation state can result in the breaking down of society and the loss in ability to defend itself. Information warfare (IW) is an extension of electronic warfare, but importantly it embraces cyberwarfare.

    More than 50% of effort in future conflicts will be in both cyberspace and electromagnetically in the ether — this will be known as “information warfare”. It will disrupt radio communications, radar and intelligence surveillance, military command and control, weapon systems control, aircraft navigation, national infrastructures, emergency services, and all Internet communication. Severing Internet backbone networks will cause major worldwide disruption causing widespread suffering without firing a single shot in anger.

    In March 2003, allied forces led by the US began Operation Iraqi Freedom. In the first few days of that conflict, an information war took place that completely neutralised the ability of Iraq to use the electromagnetic spectrum and the Internet. Its armed forces and its civilian infrastructure was virtually paralysed. The conflict lasted just 43 days and Iraq had a formidable and well-equipped military.

    Russia has long realised that this “soft” warfare is the equal partner to the familiar hard-weapons side and is planning to spend billions perfecting techniques required. Cyberwarfare has become an important weapon in the military arsenal.

    cable-640

    Attack on Estonia
    In April 2007, denial-of-service (DOS) attacks targeted Estonian websites including the Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country’s disagreement with Russia on the relocation of the Bronze Soldier of Tallinn (a Soviet war grave monument) together with Soviet war graves in Tallinn.

    Cyber analysts concluded that the cyberattack on Estonia was well planned and sophisticated, with no precedent. Although Russia vehemently denied involvement the foundations for future IW were becoming established. Military strategists worldwide study the attack to for its inclusion into an order of battle, and to develop mitigating measures.

    Military and government strategists did not have to wait long for another example of IW. On 20 July 2008, just prior to the Russian military invasion of Georgia to support the self-proclaimed republics of South Ossetia and Abkhazia, a massive Russian-based Internet DOS attack against Georgia began. Targets for the distributed DOS attack included websites of the Georgian president, Mikheil Saakashvili, the OSInform news agency and OS radio station. It was also reported that key sections of Georgia’s Internet traffic had been rerouted through servers based in Russia and Turkey, where the traffic was either blocked or diverted — effectively closing the Internet in Georgia for the duration of hostilities.

    There was also circumstantial evidence that the Baku-Tbilisi-Ceyhan pipeline control system was targeted by a sophisticated computer virus similar to Stuxnet, which led to an uncontrolled pressure incident. The Russian government again distanced itself from any involvement and blamed the Russian criminal fraternity. However, observers have acknowledged that the resources needed for this level of attack point to a nation-state involvement.

    The escalating military conflict in Ukraine has featured a mirrored cyberwar between the two sides with distributed DOS and malware attacks against public websites, banks, radio and television channels and public utilities. At the same time, Ukrainian forces have grappled with formidable Russian electronic warfare capabilities.

    Russia has deployed its new multi-functional Krasukha-4 electronic warfare systems to support Ukrainian separatists and “volunteer” Russian combat troops. It is the Krasukha-4 that has been deployed to Syria. Russia has again denied any involvement in the cyberattack and blames criminal organisations. But this is the first time a fully integrated IW has been witnessed.

    Lieutenant-General Ben Hodges, the commander of the US army in Europe, has described the Russian capability as “eye watering” and confirmed that US army personnel from Nato are working alongside their counterparts in the Ukrainian army to gain first-hand experience of information warfare from a state-based adversary.

    Is Russia is developing the capability to repeat Operation Iraqi Freedom on a global scale? If its investment in IW is any measure, we should be concerned — this investment is not being matched by the US and Europe combined.

    Western leaders should be made aware of the need to accelerate development of IW capability and train more people to deal with it. They should stop isolating Russia in the world and putting it in a position where it feels the need to cash in on this investment.The Conversation

    • David Stupples is professor of electrical and electronic engineering and director of electronic warfare at City University London
    • This article was originally published on The Conversation
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    David Stupples National Security Agency Nato NSA Richard Ledgett
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleTshwane free Wi-Fi reaches a million users
    Next Article MPs declare war on cable thieves

    Related Posts

    NSA chief accuses China of ‘very aggressive’ hacking strategy

    31 May 2024
    China accuses US of hacking Huawei servers

    China accuses US of hacking Huawei servers

    20 September 2023

    Likely new NSA boss warns of AI dangers

    21 July 2023
    Company News
    Households still under big pressure, Altron Fintech index shows

    Households still under big pressure, Altron Fintech index shows

    13 March 2026
    How AI is changing the way we work - Angela Ho, Obsidian Systems

    How AI is changing the way we work

    12 March 2026
    Domains.co.za introduces complete domain protection service

    Domains.co.za introduces complete domain protection service

    12 March 2026
    Opinion
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026
    VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

    VC’s centre of gravity is shifting – and South Africa is in the frame

    3 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Post Office on the brink of collapse

    Post Office on the brink of collapse

    13 March 2026
    New policy direction targets South Africa's municipal broadband logjam - Solly Malatsi

    New policy direction targets South Africa’s municipal broadband logjam

    13 March 2026
    How electronic warfare is threatening ships and their crews

    How electronic warfare is threatening ships and their crews

    13 March 2026
    Rand slumps for second week

    Rand slumps for second week

    13 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}