Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center
New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems
Abstract
Undersea cables are among the most critical technologies supporting today's global data and voice communications. Long-standing physical vulnerabilities to attack persist: cable landing stations, for example, cluster high-value cable systems at single geographic points, but without the physical protections provided to other critical infrastructure such as telecommunication data centers. With an increasing number of cable operators using remotely-controlled network management systems, operators have introduced additional risk of large-scale cyber attacks, adding new urgency to securing all potential points of compromise, both the physical sites and well as the logical infrastructure. While individually governments and industries have taken some steps to address such matters, much work remains. Collaboration on fortifying security with new regulatory and voluntary action, working through existing bodies such as Team Telecom under the Committee on Foreign Investment in the United States, and the International Cable Protection Committee, should accelerate.
For more information on this publication:
Please contact
Science, Technology, and Public Policy
For Academic Citation:
Sechrist, Michael. “New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems.” Discussion Paper, 2012-03, Science, Technology, and Public Policy Program, Belfer Center, February 2012.
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Analysis & Opinions
- The National Interest
Intel Is Reeling: Why Should the Government Save It?
Analysis & Opinions
Will Dreams for Equality Be Deferred by Gaps in Technology?
Journal Article
- Foreign Affairs
The End of Cyber-Anarchy?
In the Spotlight
Most Viewed
Analysis & Opinions
- Project Syndicate
If Trump Returns
Belfer Center for Science and International Affairs, Harvard Kennedy School
- Belfer Center Fellow Peter Ajak Navigates Challenges from Lost Boy to South Sudanese Activist
Paper
- Belfer Center for Science and International Affairs, Harvard Kennedy School
Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It
Abstract
Undersea cables are among the most critical technologies supporting today's global data and voice communications. Long-standing physical vulnerabilities to attack persist: cable landing stations, for example, cluster high-value cable systems at single geographic points, but without the physical protections provided to other critical infrastructure such as telecommunication data centers. With an increasing number of cable operators using remotely-controlled network management systems, operators have introduced additional risk of large-scale cyber attacks, adding new urgency to securing all potential points of compromise, both the physical sites and well as the logical infrastructure. While individually governments and industries have taken some steps to address such matters, much work remains. Collaboration on fortifying security with new regulatory and voluntary action, working through existing bodies such as Team Telecom under the Committee on Foreign Investment in the United States, and the International Cable Protection Committee, should accelerate.
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Analysis & Opinions - The National Interest
Intel Is Reeling: Why Should the Government Save It?
Analysis & Opinions
Will Dreams for Equality Be Deferred by Gaps in Technology?
Journal Article - Foreign Affairs
The End of Cyber-Anarchy?
In the Spotlight
Most Viewed
Analysis & Opinions - Project Syndicate
If Trump Returns
Belfer Center for Science and International Affairs, Harvard Kennedy School
-Belfer Center Fellow Peter Ajak Navigates Challenges from Lost Boy to South Sudanese Activist
Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School
Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It