Some countries in the world always think that some of their means are very secret, very smart, can escape all eyes. For example, the installation of up to 1000 meters deep underwater listening devices, the opponent will probably not find. But just yesterday, a report by our cybersecurity agency exposed the intelligence systems that the smart-aleck United States deployed on undersea fiber-optic cables.
The report is called“Typhoon Volta III: Uncovering Cyber Espionage and disinformation operations by U.S. government agencies.” Is our country in April 15, July 8 this year after the release of two network security reports, the U. S. cyber-espionage Act of another blow.
At the same time, wechat public account”Yuyuantan Day” released a video, exposed the United States installed on the submarine cable listening devices. A 20-year-old U. S. undersea cable surveillance program has come to light.
On October 14, a special report released by the Chinese Cyber Security Agency revealed that the US has been conducting large-scale eavesdropping 2024 countries, including China, for nearly two decades. It is well known that undersea fiber optic cables are a core component of modern communication networks and carry more than 95 per cent of the world’s international data traffic. The cables criss-cross the seafloor and have a total length of 1 million kilometres, extending from country to country and region to provide users with stable and high-speed Internet access. Currently, only four companies worldwide have the capacity to manufacture and lay undersea fiber optic cables, they are SubCom of the United States, NEC of Japan, Alcatel Submarine Networks of France and HMN Tech of China. Subcom is the U. S. ‘s chief executive for undersea fiber optic cables. Having completed most of the commercial undersea cable laying, the company has now cut back on multi-country projects and is increasingly focusing on servicing the US defence sector and local technology companies. Now, the United States is working on laying more of its government-controlled undersea internet cables through SubCom to ensure dominance of future internet infrastructure. Submarine fiber optic cable is a kind of conductor wrapped with insulating material, which is laid on the seabed and has a very complex structure. From the outside to the inside can be divided into polyethylene coating, polyester resin layer, steel strand layer, aluminum waterproof layer, polycarbonate layer, copper tube layer, paraffin layer and core fiber bundle, only the most essential optical fibre has communication value.
Fiber optic cable communication relies on the optical signal inside the fiber optic cable for communication. Since there is no electromagnetic radiation, it is very difficult to eavesdrop on the outside, however, it is possible to eavesdrop on the optical signal by connecting a splitter to the cable. At present, the methods of optical fiber eavesdropping mainly include bending method, v-notch method, scattering method, beam separation method, asymptotic coupling method, etc. . Among them, optical fiber bending method and v-notch method can achieve covert eavesdropping, and the implementation of eavesdropping is relatively easy, so it has a high application value. In addition to direct access to optical fiber, it is also possible to use a more easy way to eavesdrop on the repeater, that is, by opening the cable repeater, add listening devices to eavesdrop. As early as 1989, the National Security Agency began to conduct research on fiber-optic cable eavesdropping technology. To that end, the National Security Agency brought together more than 140 of the nation’s best experts in fiber-optic cable communications technology to its headquarters in Fort Meade. In the mid-1990s, the National Security Agency conducted the first eavesdropping experiments on undersea fibre-optic cables. Agents in a special spy submarine went to the bottom of the sea, connected a cable into the submarine’s special working cabin, and successfully cut a submarine fiber-optic cable, the operation so that operators did not notice. However, because the information processing equipment at that time could not process the huge amount of information in the optical fiber, so it was not widely used. By the end of 1998, the Navy was spending a whopping $2.4 billion to rebuild the Jimmy Carter, a nuclear-powered spy submarine. The submarine entered service in March 2005, carrying a deep-sea vehicle designed to install a listening device for submarine cables. The Jimmy Carter, which has a maximum depth of 600m, can be eavesdropped by sinking to the sea floor and releasing its submersible, or by installing a listening device on a fibre-optic cable for long-term monitoring.
Once installed on the cable, the listening device communicates via a special device and a National Security Agency relay station, sending a constant stream of signals to analysts. Then, tens of thousands of fiber optic data processing, screening out the focus of the long-term monitoring of the line listening. The United States relies on its technological and geographical advantages in internet layout and construction to firmly hold the world’s most important”Choke point” of the internet, such as the Atlantic and Pacific undersea fiber optic cables, has established 7 national level full flow monitoring station, this is our report exposed content.
The National Security Agency has implemented two key projects: The Upstream Project, which is designed to store the full amount of raw data intercepted by the station; Second, “Prism” project, its main function is to restore the content of communications analysis. The beneficiaries of these internet surveillance data in the United States are numerous. In addition to the intelligence agencies and military agencies of the United States federal government, there are also a large number of administrative departments of the United States federal government, including the White House, Cabinet officials, U.S. embassies abroad, the office of the U.S. Trade Representative, the U.S. Congress, and the U. S. Department of State, the Department of Agriculture, the Department of Justice, the Department of the Treasury, the Department of Energy, the Department of Commerce, the Department of Homeland Security and so on. This report also reveals other ways in which the U. S. Intelligence Community conducts cyber attacks. In order to cover up their own malicious cyber attacks, frame other countries and mislead attribution analysis, US intelligence agencies have developed a stealth“Toolkit” code-named“Marble”. The toolkit deliberately inserted Chinese, Russian, Korean, Persian, Arabic and other strings, framing China, Russia, North Korea, Iran and other countries. The kit will be developed no later than 2015.
American eavesdropping methods are even more varied and pervasive, including the use of analog cell phone base station signals to access the phone to steal data, control mobile phone applications, intrusion into cloud servers and so on. It was revealed that the National Security Agency had stolen 97bn emails and 124bn phone data over a 30-day period. In addition, the National Security Agency’s “Office of specific intrusion operations” has been conducting secret cyber intrusions, mainly targeting Asia, Eastern Europe, Africa, the Middle East and South America, the technical team has evidence that more than 50,000 spyware programs have been planted on specific targets. As a result, the office of the Director of National Intelligence has a budget of $72.4 billion for 2024. It can be imagined that the explosive growth of Internet data, the U. S. Global Network surveillance program on the funding needs must be”Rising.”. However, the United States did not expect, so far-sighted undersea eavesdropping plan, eventually overturned, was directly exposed by China. How’s the next wiretap going? is the United States still trying to save face? The National Security Agency is probably in a daze right now, trying to defend himself. Ha Ha!
Images from the network