Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      How AI agents are reshaping banking in South Africa - Lindelani Ramukumba, Absa

      How agentic AI is reshaping banking in South Africa

      5 April 2026
      South Africa's 5G boom is bypassing rural areas: Icasa

      South Africa’s 5G boom is bypassing rural areas: Icasa

      5 April 2026
      WhatsApp is eating South African operators' revenue

      WhatsApp is eating South African operators’ revenue

      4 April 2026
      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

      4 April 2026
      Gaping holes in South African government cyber defences

      Gaping holes in South African government cyber defences

      2 April 2026
    • World
      Amazon in talks to buy satellite operator Globalstar

      Amazon in talks to buy satellite operator Globalstar

      2 April 2026

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
    • In-depth
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
    • TCS
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » World » Fears Russia could sabotage global Internet

    Fears Russia could sabotage global Internet

    By The Conversation29 October 2015
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    russia-640

    It may sound far-fetched at first, but there’s a growing fear of the damage a newly aggressive Russia might inflict in a time of tension or conflict simply by damaging or cutting the undersea cables that carry almost all of the West’s Internet traffic.

    The New York Times reported that Russian submarines and spy ships were aggressively operating near the vital undersea cables. Could they be preparing for a new form of warfare?

    The perfect global cyberattack could involve severing the fibre-optic cables at some of their hardest-to-access locations in order to halt the instant communications on which the West’s governments, military, economies and citizens have grown dependent.

    Effectively, this would cripple world commerce and communications, destabilise government business and introduce uncertainty into military operations. A significant volume of military data is routed via the Internet backbone.

    The fibre-optic cables that carry the majority of the planet’s Internet traffic follow designated paths under the oceans. To cause global chaos, all that is needed is some “wire cutters” (realistically a submarine with a depth charge would do). This is not rocket science and there will be no need for clever hackers.

    While there is no evidence yet of any “cable snipping”, there is concern among senior US and allied military and intelligence officials over the accelerated activity by Russian armed forces around the globe. At the same time, the internal debate in Washington illustrates how the US is viewing Russian moves with distrust. Surveillance activity shows a significant increase in Russian activity along the known routes of the cables and more than a dozen officials confirmed in broad terms that it had become the source of significant attention in the Pentagon.

    Talking to the BBC’s Gordon Corera, the deputy director of the US National Security Agency, Richard Ledgett, warned of the increasing danger of destructive cyberattacks by nation states in addition to criminal organisations. A concerted cyberattack against another nation state can result in the breaking down of society and the loss in ability to defend itself. Information warfare (IW) is an extension of electronic warfare, but importantly it embraces cyberwarfare.

    More than 50% of effort in future conflicts will be in both cyberspace and electromagnetically in the ether — this will be known as “information warfare”. It will disrupt radio communications, radar and intelligence surveillance, military command and control, weapon systems control, aircraft navigation, national infrastructures, emergency services, and all Internet communication. Severing Internet backbone networks will cause major worldwide disruption causing widespread suffering without firing a single shot in anger.

    In March 2003, allied forces led by the US began Operation Iraqi Freedom. In the first few days of that conflict, an information war took place that completely neutralised the ability of Iraq to use the electromagnetic spectrum and the Internet. Its armed forces and its civilian infrastructure was virtually paralysed. The conflict lasted just 43 days and Iraq had a formidable and well-equipped military.

    Russia has long realised that this “soft” warfare is the equal partner to the familiar hard-weapons side and is planning to spend billions perfecting techniques required. Cyberwarfare has become an important weapon in the military arsenal.

    cable-640

    Attack on Estonia
    In April 2007, denial-of-service (DOS) attacks targeted Estonian websites including the Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country’s disagreement with Russia on the relocation of the Bronze Soldier of Tallinn (a Soviet war grave monument) together with Soviet war graves in Tallinn.

    Cyber analysts concluded that the cyberattack on Estonia was well planned and sophisticated, with no precedent. Although Russia vehemently denied involvement the foundations for future IW were becoming established. Military strategists worldwide study the attack to for its inclusion into an order of battle, and to develop mitigating measures.

    Military and government strategists did not have to wait long for another example of IW. On 20 July 2008, just prior to the Russian military invasion of Georgia to support the self-proclaimed republics of South Ossetia and Abkhazia, a massive Russian-based Internet DOS attack against Georgia began. Targets for the distributed DOS attack included websites of the Georgian president, Mikheil Saakashvili, the OSInform news agency and OS radio station. It was also reported that key sections of Georgia’s Internet traffic had been rerouted through servers based in Russia and Turkey, where the traffic was either blocked or diverted — effectively closing the Internet in Georgia for the duration of hostilities.

    There was also circumstantial evidence that the Baku-Tbilisi-Ceyhan pipeline control system was targeted by a sophisticated computer virus similar to Stuxnet, which led to an uncontrolled pressure incident. The Russian government again distanced itself from any involvement and blamed the Russian criminal fraternity. However, observers have acknowledged that the resources needed for this level of attack point to a nation-state involvement.

    The escalating military conflict in Ukraine has featured a mirrored cyberwar between the two sides with distributed DOS and malware attacks against public websites, banks, radio and television channels and public utilities. At the same time, Ukrainian forces have grappled with formidable Russian electronic warfare capabilities.

    Russia has deployed its new multi-functional Krasukha-4 electronic warfare systems to support Ukrainian separatists and “volunteer” Russian combat troops. It is the Krasukha-4 that has been deployed to Syria. Russia has again denied any involvement in the cyberattack and blames criminal organisations. But this is the first time a fully integrated IW has been witnessed.

    Lieutenant-General Ben Hodges, the commander of the US army in Europe, has described the Russian capability as “eye watering” and confirmed that US army personnel from Nato are working alongside their counterparts in the Ukrainian army to gain first-hand experience of information warfare from a state-based adversary.

    Is Russia is developing the capability to repeat Operation Iraqi Freedom on a global scale? If its investment in IW is any measure, we should be concerned — this investment is not being matched by the US and Europe combined.

    Western leaders should be made aware of the need to accelerate development of IW capability and train more people to deal with it. They should stop isolating Russia in the world and putting it in a position where it feels the need to cash in on this investment.The Conversation

    • David Stupples is professor of electrical and electronic engineering and director of electronic warfare at City University London
    • This article was originally published on The Conversation
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    David Stupples National Security Agency Nato NSA Richard Ledgett
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleTshwane free Wi-Fi reaches a million users
    Next Article MPs declare war on cable thieves

    Related Posts

    NSA chief accuses China of ‘very aggressive’ hacking strategy

    31 May 2024
    China accuses US of hacking Huawei servers

    China accuses US of hacking Huawei servers

    20 September 2023

    Likely new NSA boss warns of AI dangers

    21 July 2023
    Company News
    Synthesis helps financial enterprises transform with new Gemini Enterprise - Digicloud Africa

    Synthesis helps financial enterprises transform with new Gemini Enterprise

    2 April 2026
    The next churn wave is already in your contact centre conversations - CallMiner

    The next churn wave is already in your contact centre conversations

    2 April 2026
    Mining's problem isn't output, it's execution - Workday

    Mining’s problem isn’t output, it’s execution – Workday

    1 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    How AI agents are reshaping banking in South Africa - Lindelani Ramukumba, Absa

    How agentic AI is reshaping banking in South Africa

    5 April 2026
    South Africa's 5G boom is bypassing rural areas: Icasa

    South Africa’s 5G boom is bypassing rural areas: Icasa

    5 April 2026
    WhatsApp is eating South African operators' revenue

    WhatsApp is eating South African operators’ revenue

    4 April 2026
    DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

    DeepSeek V4 to run on Huawei silicon as China builds its own AI stack

    4 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}