• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechThreat Sheet

Data Sheet—Saturday, October 31, 2015

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
October 31, 2015, 12:48 PM ET
Germany Mecklenburg-Western Pomerania Baltic Sea - undersea cable to Hiddensee island
(GERMANY OUT) Germany Mecklenburg-Western Pomerania Baltic Sea - undersea cable to Hiddensee island (Photo by Jens Köhler/ullstein bild via Getty Images)Photograph by Jens Köhler—ullstein bild/Getty Images

At the bottom of the ocean floor rest the cables that make the Internet possible. Strange though it may seem, the world is strung together like a gigantic submarine zither. Optical fiber pipes—plucked by users everywhere—carry our music, our chatter, our data across the globe.

One can understand why American defense officials might be worried then, that a Russian spy ship has been snooping around these wired routes. As a New York Times article earlier this week suggested, one cannot rule out the possibility of a devastating attack against these vital lines—”the ultimate Russian hack on the United States,” if you will. The Pentagon, for one, has certainly contemplated such a doomsday event.

Should the rest of us be concerned? I asked Doug Madory, director of Internet analysis at Dyn Research, who keeps close tabs on the performance of Internet infrastructure, for his thoughts. He maintains that these networks—though they suffer cable breaks somewhat regularly (especially in shallow, anchor-prone waters)—are phenomenally resilient. A concerted attack, however, might pose a bigger problem.

“If someone did sever cables in the most extreme Hollywood scenario,” he said, “any kind of international commerce or communications could be severely impacted.” Still the greatest impact, he suggested, might be psychological.

“It does sound a little James Bond,” he added. “But I guess that’s what the Navy is paid to defend against.”

Such telecom attacks have a precedent—if not yet at the scale imagine by the Times. A spate of mysterious cable cuts hit California this year. Saboteurs in Gabon recently sliced submarine wires amid a labor dispute. And the Egyptian Navy arrested divers who damaged undersea lines with explosives while apparently scavenging for scrap metal in 2013. Madory describes these events and others in a blog post of his own here.

I mulled these incidents and incursions while visiting AT&T’s global network operations center earlier this week. (More on that to come.) There I had a birds-eye view of the company’s webwork of wired and wireless links—as well as a squid’s-eye view of its undersea cable system. That submarine network appeared on screen as a tangled ball of seaweed, shaded an algal green.

“I swear I didn’t set that up,” the tour guide told me, grinning as he motioned toward the display. There was not a jot of red to be found. (Green means “good” connection; red means “problem.”) At least for now, I presume, the network must be doing okay.

So there’s your Oct. 31, technologic apocalypse scenario. Happy Halloween—read on for more news.

Robert Hackett

@rhhackett

[email protected]

Welcome to the Cyber Saturday edition of Data Sheet, Coins2Day’s daily tech newsletter. Coins2Day reporter Robert Hackett here. You may reach me via Twitter, Cryptocat, Jabber, PGP encrypted email, or however you (securely) prefer. Feedback welcome.

THREATS

U.S. To deploy special ops in Syria. The United States will send ground troops to the conflict-ridden country in order to combat the self-identified Islamic State. The commandos will number fewer than 50. (NBC)

Senate approves CISA bill. The cybersecurity information sharing act will encourage business and government agencies to share information related to hacking attacks. Privacy advocates contend that the act is a surveillance bill by a different name. (Coins2Day)

EU clears Snowden. The European Parliament voted to drop criminal charges against NSA whistleblower Edward Snowden and to grant him asylum. The vote was nearly split at 285-281. (Coins2Day)

Military blimp goes rogue. A surveillance airship broke free of its moorings in Maryland, drifted 150 miles while tailed by F-16 fighter jets, and crash-landed in rural Pennsylvania. The U.S. Has spent $2.7 billion on the JLENS blimp program to date. (LA Times)

Internet traffic can be misrouted. Hackers packing the right equipment can redirect Internet traffic anywhere they like. The attack involves a flaw in the language—known as “border gateway protocol”—used by routers to shuttle data packets. (WSJ)

Intel to sell Stonesoft. Just two years after buying the computer firewall-maker for nearly $400 million, Intel is set to sell it off. Defense firm Raytheon-Websense plans to pick the unit up. (Coins2Day)

Cisco to buy Lancope. The networking giant plans to acquire this cybersecurity firm for more than $450 million. Lancope specializes in monitoring computer networks for malicious activity. (Coins2Day)

Tor releases encrypted chat tool. The non-profit has debuted an instant messenger that will allow users to chat privately, anonymously, and off-the-record. The app is in its beta version. (Wired)

Share today's Data Sheet with a friend:
http://coins2day.com/newsletter/datasheet/

Looking for previous Data Sheets? Click here.

ACCESS GRANTED

Coins2Day senior writer Barb Darrow explains Oracle's security conundrum.

At Oracle OpenWorld this week, company execs spent a good chunk of their stage time talking about security. The remarks come just weeks after Oracle, which had no comment on this story, released an eyebrow-raising set of 154 security fixes in a Critical Patch Update covering many of its key products. An IT consultant who works with federal agencies on Oracle implementations said this update was nothing short of a scandal because Oracle’s “entire product fleet was affected: pretty much every database, middleware web and app server. Everything." The specialist requested anonymity because he works with the company’s customers. Read the rest on Coins2Day.com.

TREATS

Cyber SATs. For military recruitment. (NextGov)

Help wanted. Chinese hacker job openings! (Onion)

Roll the dice! Passwords, only $2 a pop. (Coins2Day)

DIY time. Build a secure burner laptop. (Vice Motherboard)

Millennials on cybersecurity.Confident ignoramuses? (Federal Computer Week)

FORTUNE RECON

I went to a cryotherapy spa—here's why I'm not going back by Sue Callaway

This European dictator is the bond market's best friend by Chris Matthews

Scrapping China's one-child policy won't help it's demographic time bomb by Stuart Gietel-Basten

The stock that ate Wall Street by Joshua Brown

Best Buy CEO on how to lead a corporate turnaround (without making employees hate you) by Jen Wieczner

ONE MORE THING

For shame! Websites that prohibit people from using strong passwords. Less than 12 characters? No special characters?Submit offenders here. (Tumblr)

EXFIL

“He suggested that it might be nice if, at the end of the game, you got to shake hands with all your enemies in the hospital.”

007 GoldenEye game director Martin Hollis, describing a fax he received from Mario creator Shigeru Miyamoto that included a series suggestions for Nintendo's video game adaptation of the seventeenth James Bond film. Hollis spoke at a gaming festival in the UK this week about how his former employer, game developer Rare, landed a partnership with the Japanese company to design a game for the Bond franchise in the mid-'90s. His team ultimately decided against the bedside scene. (Guardian)

By the way, I plan to attend a pre-screening of Spectre— the latest installment of the MI6 spy series—next week. Stay tuned for a review.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.