'Speargun' program is fantasy, says cable operator

We just might notice if you cut our cables


The washup from yesterday's Dotcom-Snowden-Greenwald saga rolls on, with Southern Cross Cable Network angrily denying that New Zealand's spooks, the NSA, or anybody else for that matter has worked a tap into its cables.

The company's response came in response to Glenn Greenwald's accusation that New Zealand's Government Communications Security Bureau was involved in inserting taps onto the SCCN cable underwater.

In describing an operation identified in Edward Snowden's documents as “Speargun”, Greenwald clearly believes the taps were inserted underwater. Here is a quote from an interview he gave to the Australian Broadcasting Corporation's The World Today program on Monday, September 16:

“You would not go into the ocean and tap into those cable lines, unless this program has been implemented and approved beyond just the business plan stage” (emphasis added).

This, Southern Cross has said in a statement sent to media, is “total nonsense”. CEO Anthony Briscoe notes that to install any such device would mean cutting the cable – something that not only the cable operator would notice, but also any of its customers that weren't buying a protected service to give them access to both SCCN routes.

“It is a physical impossibility to do it without us knowing”, Briscoe says in the statement. “There isn't a technology in the world, as far as I am aware, that can splice into an undersea fibre optic cable without causing a serious outage and sending alarms back to our network operations centre that something's wrong”.

It's no secret that cable operators have to agree to cooperate with law enforcement as a condition of their licenses – such documents are published by the FCC in the US.

Southern Cross' statement acknowledges this: “Southern Cross is obligated to comply with the well-established and public lawful surveillance requirements in the Communications Assistance for Law Enforcement Act and related laws in the United States,” the statement says. “However there is no equipment installed in the New Zealand or United States landing stations, or on the cable itself, which could result in mass interception of communications.”

The Register notes that snooping of traffic from other submarine cables is carried out at on-shore facilities, such as we documented here. ®

Similar topics


Other stories you might like

  • Suspected phishing email crime boss cuffed in Nigeria
    Interpol, cops swoop with intel from cybersecurity bods

    Interpol and cops in Africa have arrested a Nigerian man suspected of running a multi-continent cybercrime ring that specialized in phishing emails targeting businesses.

    His alleged operation was responsible for so-called business email compromise (BEC), a mix of fraud and social engineering in which staff at targeted companies are hoodwinked into, for example, wiring funds to scammers or sending out sensitive information. This can be done by sending messages that impersonate executives or suppliers, with instructions on where to send payments or data, sometimes by breaking into an employee's work email account to do so.

    The 37-year-old's detention is part of a year-long, counter-BEC initiative code-named Operation Delilah that involved international law enforcement, and started with intelligence from cybersecurity companies Group-IB, Palo Alto Networks Unit 42, and Trend Micro.

    Continue reading
  • Broadcom buying VMware could create an edge infrastructure and IoT empire
    Hypervisor giant too big to be kept ticking over like CA or Symantec. Instead it can wrangle net-connected kit

    Comment Broadcom’s mooted acquisition of VMware looks odd at face value, but if considered as a means to make edge computing and the Internet of Things (IoT) more mature and manageable, and give organizations the tools to drive them, the deal makes rather more sense.

    Edge and IoT are the two coming things in computing and will grow for years, meaning the proposed deal could be very good for VMware’s current customers.

    An Ethernet switch that Broadcom launched this week shows why this is a plausible scenario.

    Continue reading
  • Ex-spymaster and fellow Brexiteers' emails leaked by suspected Russian op
    A 'Very English Coop (sic) d'Etat'

    Emails between leading pro-Brexit figures in the UK have seemingly been stolen and leaked online by what could be a Kremlin cyberespionage team.

    The messages feature conversations between former spymaster Richard Dearlove, who led Britain's foreign intelligence service MI6 from 1999 to 2004; Baroness Gisela Stuart, a member of the House of Lords; and Robert Tombs, an expert of French history at the University of Cambridge, as well as other Brexit supporters. The emails were uploaded to a .co.uk website titled "Very English Coop d'Etat," Reuters first reported this week.

    Dearlove confirmed his ProtonMail account was compromised. "I am well aware of a Russian operation against a Proton account which contained emails to and from me," he said. The Register has asked Baroness Stuart and Tombs as well as ProtonMail for comment. Tombs declined to comment.

    Continue reading

Biting the hand that feeds IT © 1998–2022