Fact-checked by Grok 2 weeks ago

Fiber tapping

Fiber tapping is a technique for intercepting optical signals in optic cables by diverting a fraction of the transmitted —typically 5-10%—without severing the fiber or substantially attenuating the primary signal, which continues with 90-95% transmission efficiency to the destination. This process leverages the physics of propagation, including or macro-bending to induce controlled leakage, enabling signal extraction for or purposes. Employed legitimately in optical network management to assess data integrity, bandwidth utilization, and fault locations via passive taps that introduce minimal insertion loss—often under 1 dB—fiber tapping supports proactive diagnostics in high-capacity telecommunications infrastructures. However, the same non-intrusive methods facilitate covert data exfiltration, where adversaries access unencrypted payloads at interception points such as splice enclosures or buried conduits, exploiting the difficulty of detecting subtle optical perturbations in long-haul links. Detection relies on advanced tools like optical spectrum analyzers or to identify anomalies such as unexpected power drops or phase shifts, though sophisticated taps can evade routine checks, highlighting inherent trade-offs between fiber's high-speed, low-loss transmission and its tamper susceptibility compared to electrical alternatives.

Technical Fundamentals

Principles of Optical Fiber Communication

Optical fibers transmit data by modulating light signals—typically from lasers or light-emitting diodes—through a composed of a central surrounded by a cladding layer. The , usually made of silica doped with for higher (approximately 1.46), carries the light, while the cladding ( around 1.45) confines it via . This reflection occurs when light strikes the core-cladding at an greater than the , defined by as \theta_c = \sin^{-1}(n_2 / n_1), where n_1 and n_2 are the refractive indices of the and cladding, respectively, preventing leakage into the cladding. Fibers operate in single-mode or multimode configurations based on core diameter and . Single-mode fibers, with core diameters of 8–9 μm, support one propagation mode, enabling low-dispersion transmission over distances up to 100 km using sources at wavelengths like 1310 nm or 1550 nm. Multimode fibers, featuring larger cores (typically 50 or 62.5 μm), allow multiple light paths or modes, suitable for shorter links (up to 2 km) with light-emitting diodes or vertical-cavity surface-emitting at 850 nm, though limits bandwidth. Common operating wavelengths—850 nm for multimode, 1310 nm and 1550 nm for single-mode—exploit low-attenuation "windows" in silica, where and minimize signal (e.g., ~0.2–0.3 /km at 1550 nm). arises primarily from , material by impurities like OH ions, and bending losses, while —chromatic (wavelength-dependent velocity) in single-mode and modal (path-length differences) in multimode—broadens pulses, degrading bit rates over distance. These impairments necessitate (e.g., erbium-doped fiber amplifiers at 1550 nm) and dispersion compensation for high-capacity systems exceeding 10 Gbps.

Mechanisms of Signal Interception

Signal interception in fiber optic tapping extracts a portion of the guided from the core of the while permitting the bulk of the signal to propagate to its destination with minimal disruption. This process capitalizes on the waveguiding properties of optical fibers, where light undergoes at the core-cladding boundary due to the core's higher , typically around 1.46 for silica cores compared to 1.44 for cladding. A small extends beyond the core into the cladding, decaying exponentially with distance, which enables mechanisms without severing the . One fundamental mechanism is evanescent field coupling, where a secondary or detector is positioned in close proximity to the target , allowing overlap of their s. This requires polishing or thinning the claddings of both fibers to within micrometers of their cores, facilitating power transfer governed by coupled-mode theory; coupling efficiency varies with overlap length, inter-fiber distance (often 1-5 micrometers), and , typically extracting 1-10% of the signal power with insertion losses under 1 dB for the main path. Another mechanism involves macro-bending the to radii below the (around 10-20 mm for standard single-mode fibers at 1550 nm), causing radiation losses as modes escape the core into the cladding and beyond, where the leaked light can be captured by an external or coupled into a receiving . This induces measurable , often 0.5-2 dB depending on bend tightness and duration, but allows non-permanent taps if the bend is reversible. Simulations of bend-induced demonstrate power extraction proportional to the bend angle and mode field diameter. In invasive approaches, occurs via spliced directional couplers or fused biconic tapers, where the is cleaved and a splitter inserted, directing a fixed (e.g., 90/10) of to the port while the remainder continues; such couplers achieve low excess loss (<0.2 ) through precise fusion and tapering to enhance evanescent overlap. These methods ensure the tapped signal mirrors the original in and where applicable, though they introduce permanent discontinuities detectable by optical time-domain reflectometry.

Historical Development

Origins and Early Techniques

Fiber optic tapping emerged in the late 1970s and early 1980s alongside the deployment of practical optical fiber communication systems, following the invention of low-loss silica fibers in 1970 by researchers at Corning Glass Works. The first commercial fiber optic link was installed in 1977 by AT&T in Chicago, transmitting live telephone traffic over 1.5 miles at 45 Mbps. As these systems proliferated for secure military and civilian communications, interception techniques were developed to exploit vulnerabilities, primarily in laboratory and defense research settings where physical access was feasible. Early efforts focused on invasive methods due to the nascent state of non-destructive components. Invasive tapping typically involved cutting the , stripping the cladding, and splicing in a directional coupler or splitter to divert 1-10% of the while minimizing to the main link, often below 0.5 to avoid detection. Fused biconical taper (FBT) couplers, created by twisting, heating, and elongating two adjacent fibers to form a region, enabled precise splitting ratios and were demonstrated for signal division in the mid-1970s, adapting components for . These couplers operated on principles, allowing a port to extract signal without fully disrupting transmission, though requiring skilled to maintain and prevent excessive . Military applications drove much of this innovation, with discussions of tapping feasibility appearing in defense conferences by the mid-1980s. Non-invasive precursors, such as macro-bending the beyond its (typically 10-20 mm for early multimode fibers at 850 nm), exploited radiation losses from the to couple out detectable light, a studied during fiber loss characterization in the . This method, while causing measurable (0.1-1 per bend depending on and ), allowed temporary interception without permanent cable modification, though it risked fiber damage or heightened scattering. Early demonstrations leveraged photodetectors to capture leaked light, proving viable for short-term in controlled environments before commercial clip-on devices emerged. Such techniques underscored the inherent vulnerabilities of early systems, prompting parallel research into detection via optical time-domain reflectometry.

Evolution in the Digital Age

The proliferation of fiber optic networks during the 1990s internet boom transformed telecommunications, with fibers carrying over 99% of international data traffic by the early 2000s, necessitating advanced interception methods to handle high-volume digital signals. Early invasive techniques, reliant on physical cable cuts, gave way to scalable approaches exploiting the centralized backbone architecture of global networks, enabling bulk signal acquisition without proportional increases in operational footprint. A pivotal development occurred through U.S. intelligence programs, exemplified by the NSA's Upstream collection initiated under the FISA Amendments Act of 2008, which authorized taps on domestic optic cables to capture communications transiting the . These efforts involved partnerships with providers like to access high-capacity fibers, copying data streams for content and extraction, marking a shift to of digital traffic rather than discrete analog interceptions. Snowden's 2013 disclosures revealed the program's scope, including taps on undersea cables and international links, highlighting how infrastructure's role as the 's "backbone" facilitated unprecedented data harvesting. Concurrently, technical innovations in non-invasive tapping emerged to accommodate dense (DWDM) systems, which multiplied capacity to terabits per second by the . Methods such as fiber bending for evanescent wave coupling and optical clip-on devices allowed interception with minimal —often under 1 —preserving amid surging exceeding 100 Gbps per . These advancements, rooted in optical physics principles like disruption, reduced detectability compared to earlier beam-splitting taps, aligning with the digital era's emphasis on covert, high-throughput . State actors, including counterparts in programs like the UK's , similarly leveraged such techniques on transatlantic fibers, underscoring fiber tapping's evolution into a cornerstone of in an interconnected world.

Tapping Techniques

Invasive Methods

Invasive fiber optic tapping methods necessitate direct physical access to the cable and involve severing the fiber to integrate a tapping apparatus, such as an optical directional coupler or splitter, prior to rejoining the segments through splicing techniques. This approach, also termed intrusive tapping, contrasts with non-invasive variants by mandating disconnection of the transmission path, thereby inducing a detectable service outage. Such methods have been documented in technical analyses since at least the early 2010s, with practical implementation requiring specialized tools for precision cutting, device insertion, and low-loss reconnection. The primary procedure entails using a to create flat-end cuts on the segments, inserting the coupler—which diverts a portion of the light signal (typically 1-10% of ) to a secondary output for interception—followed by to restore continuity. , the preferred reconnection method for minimal signal degradation, employs an to thermally the prepared ends, yielding insertion losses as low as 0.02-0.1 per under optimal conditions. Alternatively, mechanical aligns fibers via a V-groove fixture with index-matching , though it incurs higher losses of 0.1-0.3 and is less durable for long-term taps. The entire operation can be executed by proficient technicians in under one minute, minimizing outage duration to evade immediate alerts, though any interruption risks activation of alarms. These techniques exploit maintenance access points or exposed cable runs, where the inserted coupler enables passive extraction of without active signal regeneration, preserving bit rates if losses remain below 1 total. However, the permanence of splice-induced or reflections—measurable via —facilitates post-tap detection using optical time-domain reflectometers (OTDRs), which trace discontinuities with sub-meter resolution. Invasive taps have been analyzed in contexts for their efficacy in controlled environments, such as operations targeting undersea or terrestrial trunks, but their detectability limits covert utility compared to bending-based alternatives.

Non-Invasive Methods

Non-invasive tapping methods extract optical signals without severing the , avoiding detectable interruptions in continuity. These techniques leverage physical proximity or induced optical losses to divert a fraction of the guided light, often resulting in below typical monitoring thresholds, such as less than 0.5 . The macrobending approach involves curving the to a that exceeds the for , causing radiation losses that can be captured by adjacent detectors. This method requires access to the cable exterior but preserves the core integrity, enabling extraction of signal portions while limiting main through controlled bend geometry. Practical implementations demand precise control—typically on the order of millimeters for single-mode fibers—to tapped power against detectable . Evanescent wave coupling utilizes the overlapping electromagnetic fields outside the fiber core by positioning a secondary or polished fiber in close contact, often within microns, to transfer evanescent energy. This non-destructive coupling avoids mechanical alteration of the primary fiber but necessitates cladding exposure or specialized alignment fixtures, with efficiency highly sensitive to separation distance and matching. Additional variants include -based , such as induced or Brillouin scattering triggered by external probes, which noninvasively samples backscattered light for signal reconstruction. These methods generally yield lower signal-to-noise ratios compared to invasive alternatives, complicating demodulation, particularly for high-bit-rate or encrypted transmissions.

Detection and Monitoring

Traditional Detection Approaches

Traditional detection approaches for optic tapping primarily rely on monitoring changes in optical signal parameters, such as levels and , which can indicate unauthorized access points. These methods detect taps by identifying deviations from baseline performance metrics, often caused by extraction or insertion losses inherent in interception techniques. For instance, invasive taps that involve bending or clipping the typically introduce measurable , allowing detection through continuous surveillance at network endpoints. Systems employing in-line couplers or photodetectors at receivers track transmitted ; a sudden drop exceeding normal variability—often on the order of 0.1 to 1 depending on tap efficiency—signals potential intrusion, as taps divert a fraction of the signal (e.g., 1-10% in clip-on devices) while aiming to minimize overall loss. However, these thresholds must account for environmental factors like fluctuations or aging connectors, which can produce false positives if not calibrated against historical data. Optical Time Domain Reflectometry (OTDR) represents another foundational technique, injecting short pulses into the fiber and analyzing backscattered to map profiles and locate anomalies. Traditional OTDR setups, operational since the , resolve taps by detecting localized events or reflection spikes at intrusion sites, with spatial resolution down to meters over distances up to 100 km using standard single-mode fibers at 1550 nm wavelengths. For example, a bend-induced tap might appear as an excess of 0.5-2 , distinguishable from splices or natural bends via trace comparison against pre-installation baselines. Limitations include reduced to low- non-invasive taps (e.g., those under 0.1 ) and the need for manual or periodic scans, which delay response compared to continuous monitoring. Multi-wavelength OTDR variants enhance detection by cross-referencing at different bands (e.g., 1310 nm and 1550 nm), isolating tap-induced from chromatic effects. Physical inspection and access controls complement these optical methods in traditional setups, involving routine visual checks of routes for signs of tampering, such as exposed sheathing or unauthorized splices. While less automated, this approach verifies anomalies flagged by power or OTDR data, as empirical studies show that 70-80% of detected taps in controlled tests correlate with visible physical alterations. Overall, these techniques prioritize simplicity and integration with existing infrastructure but struggle against sophisticated, low-impact taps designed to evade threshold-based alerts, necessitating hybrid use with baseline establishment and periodic recalibration for reliability.

Advanced Fiber Optic Sensing

Advanced fiber optic sensing techniques leverage the intrinsic properties of optical s to enable distributed, real-time monitoring for intrusions, including those associated with tapping attempts. These methods transform the fiber itself into a continuous , detecting perturbations such as vibrations, strains, or acoustic signals caused by physical access, bending, or cutting required for signal interception. Unlike traditional point-based sensors, distributed systems provide along kilometers of cable, allowing precise localization of events without additional deployment. A primary approach is (DAS), which employs coherent backscattering of pulses to measure phase shifts induced by dynamic strains from external vibrations. DAS systems illuminate the fiber with a narrow-linewidth and analyze backscattered to detect acoustic events with sensitivities down to microstrain levels, achieving resolutions of 1-10 meters over distances exceeding 50 kilometers. This enables identification of tapping-related activities like digging or clamping, as demonstrated in field tests where DAS distinguished intrusion signals from ambient noise using algorithms such as transforms. Phase-sensitive optical time-domain reflectometry (φ-OTDR) represents another advanced technique, utilizing a coherent, narrow-linewidth source to probe the fiber and detect variations in Rayleigh backscattered signals. By sending pulsed light and correlating changes across multiple traces, φ-OTDR achieves high-sensitivity detection with spatial resolutions under 10 meters and ranges up to 131.5 kilometers, as shown in experiments identifying simulated intrusions via differential analysis. Enhancements like multiplexing further reduce noise and improve event , mitigating false alarms from environmental factors while locating potential sites with centimeter-level precision. These sensing modalities integrate for , classifying threats such as fiber bending for clip-on taps versus overt cuts, with reported detection probabilities exceeding 95% in controlled trials. However, challenges persist in distinguishing subtle non-invasive taps from natural disturbances, necessitating systems combining and φ-OTDR with complementary metrics like Brillouin for strain-temperature discrimination. Deployment in networks has been validated for securing , where early detection prevents by alerting operators to unauthorized access before signal compromise occurs.

Countermeasures

Physical and Access Controls

Physical protections for fiber optic cables emphasize hardening infrastructure to deter or complicate unauthorized access required for invasive tapping methods, such as or . Common practices include burying cables underground in conduits or using armored sheathing in vulnerable areas to resist cuts, excavations, or environmental exposure that could facilitate tampering. Tamper-evident on enclosures and splice vaults provide visual indicators of intrusion attempts, enabling prompt detection during routine inspections. These measures are particularly critical for (OSP) networks, where cables span long distances and are exposed to potential physical threats like or deliberate . Access controls restrict entry to authorized personnel at key points such as data centers, network terminals, and maintenance vaults, minimizing opportunities for invasive interventions. Biometric , keycard systems, and security personnel enforce layered , often combined with restricted zones defined by fencing and locked barriers. In high-security environments, such as supporting , these controls align with standards requiring continuous logging of access events to audit potential breaches. While not foolproof against state-level actors, such protocols significantly raise the barrier to entry for opportunistic or less sophisticated adversaries seeking to physically fibers.

Cryptographic and Protocol Protections

End-to-end encryption of data payloads transmitted over fiber optic networks renders intercepted signals via tapping unintelligible, as the ciphertext requires the corresponding for decryption, thereby neutralizing passive eavesdropping threats regardless of the physical interception method. (AES) with 256-bit keys, often integrated via protocols like , secures IP-based traffic in optical transport systems, ensuring and against unauthorized access. Layer 1 encryption, applied directly at the optical , modulates encrypted data into light signals before transmission, offering protocol-agnostic protection with negligible overhead and compatibility with dense (DWDM) infrastructures. This approach encrypts all traffic transparently, including overhead bits, and supports high-throughput rates up to 100 Gbps per wavelength without performance degradation. Quantum key distribution (QKD) enhances cryptographic security by generating symmetric keys via quantum channels over fiber, exploiting the and measurement disturbance to detect tapping attempts, as any interception introduces detectable errors in the quantum states. Systems like those using decoy-state protocols have demonstrated secure key rates over 48 km of fiber, with real-time alarms triggered by anomalies indicative of . Protocol-level safeguards complement through mechanisms like (TLS) version 1.3 for session and integrity verification, preventing replay or modification attacks on optical links, while Optical Transport Network (OTN) framing includes optional headers to validate signal origins. Physical layer security techniques, such as optical coding and spread-spectrum modulation, further obscure signals at the level, increasing the of even if raw optical power is leaked during tapping.

Applications

Legitimate Uses in Intelligence and Law Enforcement

Fiber optic tapping serves legitimate purposes in gathering by enabling (SIGINT) agencies to monitor foreign communications transiting international cables. The U.S. (NSA), for example, collaborates with telecommunications firms to access data flows via programs like FAIRVIEW, established in 1985, which taps fiber optic links at domestic and international choke points such as cable landing stations. Similarly, the UK's Government Communications Headquarters (GCHQ) deploys intercept probes on fiber-optic cables as part of operations built progressively from approximately 2008 to 2013, targeting non-British communications for threats. These efforts operate under statutory authorizations, including the U.S. (FISA) Section 702, which permits collection on foreign targets outside U.S. territory to counter , , and proliferation risks. In contexts, fiber tapping facilitates court-authorized intercepts for criminal investigations, ensuring compliance with . Under the Communications Assistance for Law Enforcement Act (CALEA) enacted in 1994, U.S. carriers must design networks, including fiber-based systems, to support real-time delivery of call content and to agencies like the FBI upon valid warrants. Non-intrusive techniques, such as passive optical splitters or network taps, allow interception of specific target traffic on fiber trunks without service interruption, often implemented at provider facilities or via portable devices in operations. This capability has proven essential in dismantling and networks by capturing voice, , and routed over fiber . Internationally, standards from bodies like guide fiber-enabled , requiring network operators to handover intercept-related information (IRI) and content via standardized interfaces. In practice, agencies leverage these for targeted probes rather than bulk collection, distinguishing from intelligence applications by narrower scopes tied to . Such uses underscore fiber tapping's role in balancing investigative needs against safeguards, though implementation details remain classified to preserve operational efficacy.

Exploitation by Adversaries and Criminals

![Diagram of a fiber optic tap device][float-right] Nation-state adversaries, particularly those from and , have been accused of exploiting fiber optic tapping to intercept communications for . U.S. officials have warned that subsea cables are vulnerable to monitoring and tampering by , with mutual accusations between and of tapping cables to spy on data traffic. For example, fears of Chinese have driven U.S. interest in Asia's expanding cable networks, where state actors could gain access to vast amounts of international data flows. Russian naval operations, including deployments, have targeted undersea cables to hunt of adversaries, enabling signal intelligence collection without overt disruption. These operations often involve non-invasive methods such as deploying optical splitters or clip-on couplers to divert a portion of the light signal from fiber optic cables, allowing interception of encrypted or unencrypted . State-sponsored actors prioritize high-capacity international links, including undersea cables that carry over % of global data, to extract on , economic, and diplomatic activities. Such tapping provides adversaries with bulk access to and , facilitating long-term campaigns that evade traditional detection. Non-state criminals, though less frequently documented in large-scale tapping, exploit networks for data theft and financial gain, often targeting terrestrial . Methods mirror those of states, using bent-fiber couplers to siphon signals containing sensitive information like financial records or , leading to breaches that undermine corporate and . While incidents of outright cutting for scrap dominate criminal reports—such as a 200% rise in vandalism in —purposeful tapping enables stealthy without service disruption, posing risks amplified by the difficulty in attributing non-destructive intrusions. groups may collaborate with insiders to access points, harvesting data for or black-market sales, though empirical cases remain sparse compared to state efforts due to the technical sophistication required.

Regulatory Frameworks

In the United States, the Communications Assistance for Law Enforcement Act (CALEA), enacted in 1994 and implemented through Federal Communications Commission (FCC) regulations, mandates that telecommunications carriers, including those providing fiber optic broadband services, design and maintain networks capable of enabling lawful electronic surveillance upon court order. This includes provisions for real-time interception of communications content and call-identifying information, but explicitly exempts carriers from decrypting end-to-end encrypted communications originated by end-users. Recent FCC rulings, such as the January 2025 order, have reinforced carriers' obligations to secure fiber networks against unauthorized interception, extending CALEA's scope to address cybersecurity threats while balancing law enforcement needs. Facilities-based providers must comply with technical standards set by bodies like the FBI's National Domestic Communications Assistance Center to facilitate intercepts without compromising overall network privacy outside targeted surveillance. In the , of fiber optic communications is governed by national laws harmonized through (ETSI) specifications, stemming from a 1995 Council Resolution that requires operators to provide interception interfaces for crime prevention, including . These frameworks mandate judicial or administrative authorization for intercepts, with data protection reinforced by the and (GDPR), though implementation varies by . The has ruled against indiscriminate bulk interception of fiber-optic traffic, as in the 2018 case involving UK practices, deeming them violations of Article 8 of the absent strict necessity and proportionality safeguards. The NIS2 Directive, effective October 2024, imposes cybersecurity resilience requirements on critical fiber infrastructure operators, indirectly supporting interception capabilities while enhancing detection of unauthorized taps. Internationally, protections against fiber tapping, particularly for subsea cables carrying over 95% of global data traffic, rely on outdated treaties like the Convention for the Protection of Submarine Telegraph Cables, which prohibits willful damage but does not explicitly address signal interception. Convention on the (UNCLOS) provides territorial and high-seas safeguards against physical interference, yet lacks enforcement mechanisms for covert tapping by state actors, leaving reliance on domestic laws or bilateral agreements. In jurisdictions like the , subsea cable landing licenses under the Cable Landing License Act require operators to adhere to national surveillance statutes, enabling government access for foreign intelligence but prohibiting unauthorized private interception. Gaps in global frameworks have prompted calls for updated multilateral rules to deter adversarial tapping, though no binding treaty specifically regulates digital signal interception as of 2025.

Balancing Security and Privacy Claims

Proponents of fiber optic tapping for argue that intercepting signals on high-capacity backbone cables is essential for detecting and disrupting threats such as , , and foreign intelligence operations, where traditional methods fall short due to the volume and speed of digital communications. For instance, the U.S. National Security Agency's (NSA) Upstream collection program, authorized under Section 702 of the (FISA) as amended in 2008, enables the copying of flowing through domestic fiber optic cables to target non-U.S. persons abroad, with claims that it has contributed to thwarting specific plots by providing real-time intelligence on encrypted or high-volume data streams. officials maintain that such measures are narrowly tailored, subject to FISA Court oversight, and include minimization procedures to discard irrelevant U.S. persons' data, thereby preserving privacy while addressing causal risks from adversaries who exploit the same infrastructure for attacks. Critics, including organizations, contend that the inherent nature of fiber tapping—capturing entire data streams from cables carrying up to 99% of international communications—inevitably results in bulk incidental collection of domestic communications, eroding Fourth Amendment protections without individualized warrants and enabling potential into unrelated surveillance. Revelations from in 2013 highlighted NSA taps on fiber links between and data centers, as well as partnerships like FAIRVIEW with telecom providers such as to access unencrypted traffic on U.S. backbone cables, raising empirical concerns about overcollection: for example, Upstream has acquired over 500 million selectors targeting foreign communications annually, with documented instances of querying U.S. persons' data exceeding 200,000 times in some years despite safeguards. These practices, critics argue, prioritize speculative security gains over verifiable harms, as bulk interception lacks evidence of proportionate threat neutralization compared to targeted alternatives, and historical abuses underscore risks of politicized misuse absent robust, transparent auditing. Efforts to balance these claims include legislative reforms and judicial reviews, such as the of 2015, which curtailed some NSA programs but preserved Section 702's fiber-based upstream authority, renewed in 2018 and 2023 with added reporting requirements on U.S. person queries to enhance accountability. Internationally, frameworks like the EU's impose stricter consent and limits on cable operators, yet gaps persist for subsea fibers lacking dedicated oversight, prompting calls for proportionality tests that weigh empirical threat data against privacy intrusions. Ultimately, the tension reflects a causal reality: while tapping's aids in an era of asymmetric threats, its scope demands verifiable efficacy metrics and independent verification to mitigate privacy erosions, as unchecked expansions have historically correlated with reduced rather than enhanced safety.

Controversies

Government Surveillance Practices

Governments, including those of the and , have utilized optic tapping to conduct bulk interception of communications data traversing international and domestic networks. This involves installing optical splitters on lines to divert a portion of the signal to without disrupting the primary transmission, enabling the capture of both content and from vast streams of and telephony traffic. The U.S. (NSA) operates programs such as Upstream, which intercepts data directly from the fiber optic backbone carrying communications between data centers and across borders. Disclosed through leaks by in 2013, Upstream collects signals from undersea cables and terrestrial links, processing them for foreign intelligence purposes under authorities like Section 702 of the FISA Amendments Act. Additional NSA efforts, including OAKSTAR and FAIRVIEW, target specific cable landing stations in cooperation with telecommunications providers, routing intercepted traffic to NSA facilities for filtering and storage. In the United Kingdom, Government Communications Headquarters (GCHQ) runs the Tempora program, initiated in 2011, which probes over 200 transatlantic and other international fiber optic cables landing on British shores. Tempora buffers full content for up to three days and metadata for 30 days, allowing retrospective searches shared with NSA and other Five Eyes allies. These practices have drawn controversy for enabling warrantless access to data of non-targets, including citizens, raising concerns over proportionality and oversight despite legal frameworks like the UK's Investigatory Powers Act. Similar capabilities exist in other nations; for instance, Australia's taps fiber links under programs revealed in documents, while reports indicate bulk by governments landing undersea cables in their territories. These operations underscore a reliance on physical access to chokepoints in global fiber infrastructure, often justified by but criticized for minimal and potential overcollection.

Notable Incidents and Their Implications

In 2013, documents leaked by Edward Snowden revealed the United Kingdom's Government Communications Headquarters (GCHQ) operated the Tempora program, which intercepted data from over 200 transatlantic fiber-optic cables landing in the UK. By 2011, the program processed communications from at least 46 cables simultaneously, handling up to 21 petabytes of data per day at speeds of 10 gigabits per second per cable, including 600 million telephone events daily. Access was achieved through intercept probes installed at cable landing stations in cooperation with commercial telecom partners, allowing storage of full content for 30 days and metadata for 3 days, with subsequent filtering to manage volume. Similarly, the U.S. (NSA), in collaboration with , conducted operations under the program targeting private fiber-optic links between overseas data centers of and . These interceptions, occurring outside U.S. , captured unencrypted traffic—including emails, audio, video, and —yielding 181 million new records in a 30-day period as of January 2013. The method involved undisclosed taps on dedicated fiber lines, exploiting the lack of between data centers at the time, despite companies' claims of robust internal security. These incidents underscored the of fiber-optic to state-level , particularly at accessible points like landing stations and private network junctions, where physical access enables non-invasive optical splitting without immediate detection. They prompted tech firms to accelerate adoption and audit internal links, reducing low-hanging fruit for bulk collection, though challenges persist for and transit traffic. Policy-wise, revelations fueled international scrutiny of alliances' surveillance practices, leading to legal challenges under frameworks like the U.S. and calls for greater transparency in cable access agreements, while highlighting tensions between imperatives and individual rights.

Recent Developments

Emerging Threats to Subsea and Terrestrial Networks

Subsea optic networks, which carry over 99% of international data traffic, have become focal points for state-sponsored amid escalating geopolitical rivalries, particularly between the and adversaries like and . Between 2024 and mid-2025, at least 44 damages were publicly reported, with several incidents exhibiting patterns suggestive of deliberate interference rather than accidental causes such as anchors or gear. For instance, in November 2024, two critical optic cables—one linking to and another to —were severed in the , prompting German authorities to classify the events as , potentially linked to tactics by . Similarly, a Chinese-flagged vessel, Yi Peng 3, was implicated in damaging cables in the same region in December 2024, heightening European concerns over Beijing's role in undermining . These acts not only disrupt connectivity but create opportunities for undetected , where adversaries could in devices to intercept signals during repairs or at vulnerable stations, exploiting the cables' clustered routes and limited physical protections. In the , at least 11 undersea cable damages have occurred since 2023, coinciding with heightened Chinese military activities and raising alarms over potential preemptive to isolate in a conflict scenario. Such threats extend beyond outright cuts to sophisticated interception techniques, including the deployment of or specialized vessels for non-destructive , which bends or clips fibers to without immediate detection. Physical hardening of cables remains challenging due to depth and length constraints—spanning thousands of kilometers—leaving systems reliant on monitoring innovations like acoustic sensors to detect intruders, though these are not foolproof against determined actors. Geopolitical flashpoints, including the and Arctic routes, amplify risks, as state actors could leverage fleets or "shadow" repair ships for covert access, underscoring the causal link between territorial ambitions and infrastructure vulnerabilities. Terrestrial fiber networks, while more distributed and thus harder to fully disrupt, face emerging threats from localized physical intrusions and insider-enabled , often integrated with operations for hybrid attacks. Unlike subsea cables, land-based fibers buried along rights-of-way or in conduits are susceptible to excavation by unauthorized actors, enabling the installation of passive taps that split light signals with minimal signal loss—devices capable of capturing terabits of data per second undetected for extended periods. In regions with lax perimeter security, such as remote rural spans or urban conduits, adversaries including nation-states and groups have exploited pretexts for splicing, as evidenced by increased reports of anomalous signal in high-value networks. State actors, mirroring subsea tactics, may target chokepoints like data centers or national backbones; for example, Russian-linked operations in have probed terrestrial links adjacent to energy grids, blending physical probes with for comprehensive exfiltration. Detection relies on optical time-domain reflectometry and intrusion sensors, but emerging low-profile taps using advanced evade these, posing risks to military and financial data flows where redundancy is incomplete. Overall, terrestrial threats escalate in contested areas, where dual-use invites , though their accessibility allows for swifter repairs compared to oceanic counterparts.

Innovations in Secure Fiber Technologies

Advancements in fiber optic security have focused on both protections and quantum-enhanced protocols to mitigate risks. (DAS) systems, leveraging Rayleigh backscattering in fiber cables, enable real-time detection of physical disturbances indicative of tapping attempts, such as micro-bends or evanescent coupling, with localization accuracy down to meters. These systems analyze phase shifts in backscattered light to identify anomalies, offering continuous over tens of kilometers without requiring additional infrastructure. Quantum key distribution (QKD) represents a by exploiting to generate keys that inherently reveal attempts through disturbance of states. In QKD protocols like , any interception alters quantum measurements, triggering key discard and alerting parties, thereby preventing undetected data extraction even if physical access to the fiber is gained. Recent implementations have extended QKD viability over standard telecom fibers; for instance, a December 2024 trial by Retelit, Telebit, and ThinkQuantum over 50 km of deployed fiber demonstrated secure key rates exceeding 1 Mbps while detecting potential taps via loss monitoring. Further innovations integrate QKD with high-speed classical channels, as in the April 2025 integrated and communication (IEAC) , which achieves terabit-per-second with quantum-secured keys, reducing latency overhead from traditional . Layer-1 optical solutions, embedded in transponders, combine QKD with decoy-state protocols to counter photon-number-splitting attacks and , issuing alarms upon detected signal beyond baseline losses. These technologies prioritize detection over absolute prevention, as physical tapping remains feasible but becomes probabilistically futile against quantum safeguards.

References

  1. [1]
    Topic: How To Tap Fiber Optic Cables
    A typical tap passes 90-95% of the light and diverts 5-10%, often enough to run a separate receiver, certainly at the transmitter end.
  2. [2]
    [PDF] Optical Fiber Tapping: Methods and Precautions - ResearchGate
    In this paper we highlight a number of known fiber tapping methods. We report simulation of optical characteristics of a fiber being tapped by 'bend' method and ...
  3. [3]
    [PDF] White Paper: Understanding Fiber Optic Network Tapping - Anixter
    TAPs divert a small portion of the light in the fiber from the network receiving device to the monitor- ing equipment, which results in a slight dB loss in the ...
  4. [4]
    Fiber Tapping and Data Security: Unraveling the Potential Threats ...
    Dec 6, 2023 · Tapping involves covertly accessing fiber optic cables to intercept transmitted data. This can be done in various ways, and the tapping points ...
  5. [5]
    [PDF] fiber-tapping-detection-onmsi-optical-network-monitoring-system ...
    One significant threat to data on optical communication networks is fiber tapping. Once someone accesses fibers in a cable or transition/splice point, they can ...
  6. [6]
    Optical fiber tapping: Methods and precautions - IEEE Xplore
    In this paper we highlight a number of known fiber tapping methods. We report simulation of optical characteristics of a fiber being tapped by `bend' method.Missing: technique | Show results with:technique<|separator|>
  7. [7]
    Optical Network Tapping - Siemon
    Jan 25, 2024 · Optical Network Tapping, also known as packet tapping or network monitoring, is a technique used to verify the performance and integrity of data streams.
  8. [8]
    Total Internal Reflection In Optical Fiber
    Optical fiber uses the optical principle of "total internal reflection" to capture the light transmitted in an optical fiber and confine the light to the core ...
  9. [9]
    Fiber Optic Basics - Newport
    They have a central core surrounded by a concentric cladding with slightly lower (by ≈ 1%) refractive index. Optical fibers are typically made of silica with ...
  10. [10]
    Total Internal Reflection (TIR) - FiberLabs Inc.
    Jul 5, 2021 · Total Internal Reflection (TIR) is a phenomenon in optics, by which light experiences complete reflection at an interface between two media.
  11. [11]
    25.4: Total Internal Reflection - Physics LibreTexts
    Feb 20, 2022 · Fiber optics involves the transmission of light down fibers of plastic or glass, applying the principle of total internal reflection. ...Fiber Optics: Endoscopes to... · The Sparkle of Diamonds
  12. [12]
    Single-Mode vs. Multi-Mode Fiber Optic Cables - Multilink, Inc
    The difference between single mode and multimode fiber is core size, distance, and light source. Single mode (8–9 μm core) uses a laser to carry one light mode ...Missing: principles | Show results with:principles
  13. [13]
    Single Mode vs Multimode Fiber: What's the difference? - PATCHBOX
    Jun 15, 2022 · Single Mode is used to send signals at great distances – up to 100km until the signal needs to be re-amplified. This makes it ideal in WAN applications.Missing: principles | Show results with:principles<|separator|>
  14. [14]
  15. [15]
  16. [16]
    Understanding Wavelengths In Fiber Optics
    Wavelength is the color of light. Fiber optics uses infrared wavelengths, typically 850, 1300, and 1550 nm, due to lower attenuation.
  17. [17]
  18. [18]
  19. [19]
    Dispersion in Optical Fiber-Understanding its Impact on ... - HFCL
    Sep 8, 2023 · In simple terms, dispersion is a phenomenon where different colors or components of a wave travel at different speeds through a material, ...
  20. [20]
  21. [21]
    (PDF) Optical fiber tapping: Methods and precautions - ResearchGate
    In this paper we highlight a number of known fiber tapping methods. We report simulation of optical characteristics of a fiber being tapped by 'bend' method.
  22. [22]
    Fiber tap monitor based on evanescent coupling - Google Patents
    In a fiber, for example, a portion of the optical energy can “leak” through the interface between the fiber core and the cladding via an evanescent field that ...
  23. [23]
    [PDF] How Fused Fiber Optic Couplers Work - Newport
    In the FBT process the cores of two identical parallel fibers are so close to one another that the evanescent wave can “leak” from one fiber core into the other ...<|control11|><|separator|>
  24. [24]
    History of Optical Fiber
    Jun 6, 2016 · Early glass fiber work dates to Roman times, with the first optical telegraph in the 1790s. In 1930, images were transmitted through fibers, ...
  25. [25]
    Fiber Optic History Timeline - Electrical Contractor Magazine
    Oct 18, 2023 · Who invented fiber optics for communications? When did fiber optics first come out? How has fiber optic technology changed over the years?
  26. [26]
    Fiber Couplers – optical fiber - RP Photonics
    This article treats fiber couplers of the first type, coupling light from fibers to fibers. ... It may also be called a tap coupler, particularly if only a ...What is a Fiber Coupler? · Coupling Loss
  27. [27]
    Fibre-optic cables: the present and future of digital technology
    Fibre-optic cables are responsible for 99% of the data and voice traffic that flows across the internet, making them the backbone of global digital.Missing: fiber era
  28. [28]
    Does the NSA Tap That? What We Still Don't Know About the ...
    Jul 22, 2013 · There have been tantalizing bits of evidence that the NSA is tapping fiber-optic cables that carry nearly all international phone and Internet data.
  29. [29]
    Upstream vs. PRISM - Electronic Frontier Foundation
    In upstream surveillance, the NSA's partners like AT&T tap into the high capacity fiber optic cables that carry Internet traffic and copy all of the data ...
  30. [30]
    NSA files decoded: Edward Snowden's surveillance revelations ...
    Nov 1, 2013 · As well as fiber-optic cables in the US, the NSA has access to data gathered by close intelligence partners such as Britain's GCHQ. The Snowden ...
  31. [31]
    Declassified Documents Prove NSA Is Tapping the Internet - WIRED
    Aug 21, 2013 · Today's revelation follows disclosures by NSA leaker Edward Snowden, who highlighted other NSA-backed spy programs, including one called ...
  32. [32]
    [PDF] SURVEILLANCE AFTER SNOWDEN - Henry Jackson Society
    Upstream collection refers to the NSA tapping into the underwater fibre-optic cable networks (the internet backbone) that carry telephone and internet data ...<|separator|>
  33. [33]
    It's Easier Than You Think to Tap High-Speed Fiber Optics
    Jun 1, 2024 · Fiber optic tapping involves accessing the light signals traveling through a fiber optic cable, allowing for the interception of data without ...
  34. [34]
    [PDF] Optical Fiber Communication Network Eavesdropping and ...
    A partial optical signal that is reflected by the grating in the optical fiber of another optical fiber captures the hidden eavesdropping of the target fiber.<|separator|>
  35. [35]
    [PDF] Single Fiber Fusion Splicing - Corning
    The three basic fiber interconnection methods are: de-matable fiber-optic connectors, mechanical splices and fusion splices.
  36. [36]
    Fiber Optic Splicing: A Complete Guide - Jonard Tools
    Apr 4, 2025 · Fusion splicing is the most common and permanent method, where two fiber ends are fused together using heat, typically from an electric arc.
  37. [37]
    Optical network security: Technical analysis of fiber tapping ...
    Understanding the mechanisms used for fiber tapping provides greater insight into ways of actively detecting unauthorized optical intercepts or compromised ...
  38. [38]
    Fiber-optic tapping via induced scattering | IEEE Journals & Magazine
    Oct 31, 1989 · Abstract: A noninvasive and potentially inexpensive method for fabricating a passive linear tapped optical waveguide bus is described.Missing: invasive | Show results with:invasive
  39. [39]
    Long-distance fiber-optic Φ-OTDR intrusion sensing system
    Distributed optical fiber sensors (DOFS) have a great potential for use in intrusion detection as they utilize the optical fiber itself as both transmission ...
  40. [40]
    Optical network security: technical analysis of fiber tapping ...
    Understanding the mechanisms used for fiber tapping provides greater insight into ways of actively detecting unauthorized optical intercepts or compromised ...Missing: surveillance | Show results with:surveillance
  41. [41]
    Distributed Acoustic Sensing (DAS) | C-OTDR
    DAS systems detect strain changes and vibrations along optical fibers. This highly sensitive technology is used for monitoring critical infrastructure.
  42. [42]
    Recent Advances in Phase-Sensitive Optical Time Domain ...
    Jan 22, 2021 · Phase-sensitive optical time domain reflectometry (Ф-OTDR) is an effective way to detect vibrations and acoustic waves with high sensitivity.
  43. [43]
  44. [44]
    Effectiveness of Fiber Optic Distributed Acoustic Sensing (DAS) in ...
    Apr 16, 2023 · DAS systems use a laser light to illuminate a segment of optical fiber, and then detect the backscattered light from the fiber using a ...<|separator|>
  45. [45]
    Silicon photonic integrated interrogator for fiber-optic distributed ...
    Feb 26, 2024 · 1. INTRODUCTION. Distributed acoustic sensing (DAS) is a fiber optic sensing technology that enables the measurement of dynamic strain signals ...
  46. [46]
    Ultra-long high-sensitivity Φ-OTDR for high spatial resolution ...
    May 30, 2014 · An ultra-long phase-sensitive optical time domain reflectometry (Φ-OTDR) that can achieve high-sensitivity intrusion detection over 131.5km fiber with high ...
  47. [47]
    Frequency multiplexed coherent φ-OTDR | Scientific Reports - Nature
    Sep 9, 2021 · Phase measuring φ-OTDR sensors are designed to measure the optical phase accumulated over different sections of the fiber, since this phase will ...<|control11|><|separator|>
  48. [48]
    Practical Aspects of Perimeter Intrusion Detection and Nuisance ...
    Jun 8, 2023 · ... phase-sensitive optical time-domain reflectometry ( \Phi -OTDR). The ability to eliminate nuisance alarms without compromising the ...
  49. [49]
    A fiber optic sensing intrusion detection method based on WPD ...
    The Phase-Sensitive Optical Time-Domain Reflectometer (Φ-OTDR) offers several advantages, including high sensitivity, large dynamic range, long sensing range, ...
  50. [50]
    Ensuring Resilient, Secure, and Future-Ready Fiber Infrastructure
    Physical security is the first line of defense in fiber network security & protection. Key measures include securing network terminals, data centers, and access ...<|separator|>
  51. [51]
    The Role of Fiber Optic Networks in Critical Infrastructure - HFCL
    May 17, 2025 · Protecting fiber optic cables from physical tampering, such as cuts or vandalism, is essential to prevent service disruptions and data breaches.
  52. [52]
    Securing Fiber Outside Plant Networks: Safeguarding Critical ...
    Aug 5, 2023 · In this article, we will explore essential strategies ISPs can adopt to enhance the security of their fiber OSP networks. Understanding the ...
  53. [53]
    4 Access Control Strategies for Critical Infrastructure Security
    4 Access Control Strategies for Critical Infrastructure Security · 1. Implement Advanced Authentication Methods · 2. Continuous Monitoring and Anomaly Detection.
  54. [54]
    Infrastructure Security Explained: Threats and Protection Strategies
    Jun 30, 2025 · Physical access controls such as locked doors and fences, security cameras, tamper detection and biometrics security. Environmental protections ...
  55. [55]
    Fiber Optic Network Security Protocols | Cybersecurity Solutions
    Mar 22, 2024 · Key security protocols include data encryption techniques, network monitoring solutions, and using methods like AES and PKI for encryption.
  56. [56]
    How can you secure your optical fiber network from cyber attacks?
    Sep 14, 2023 · Some examples of secure protocols are Secure Sockets Layer (SSL), Internet Protocol Security (IPsec), or Transport Layer Security (TLS).
  57. [57]
    What is Layer 1 Encryption? - Ribbon Communications
    Layer 1 encryption (L1E or L1 Encryption) secures all communication traffic on the in the optical transport layer using a highly secure public key-exchange ...Missing: level | Show results with:level
  58. [58]
    Layer-1 Encryption over DWDM - PacketLight Networks
    PacketLight's Layer-1 encryption is transparent to the traffic without any degradation to the DWDM link performance or to the QoS of transferred data.
  59. [59]
    Encryption at Layer 1: Fiber Optic – Syserso Networks
    Layer 1 encryption takes place directly on the fiber and protects data traffic without any noticeable impact on performance or latency. This ensures data ...
  60. [60]
    [PDF] Quantum Key Distribution - PacketLight Networks
    The solution is also able to detect fiber- tapping attempts and raises an alarm. PacketLight's Layer-1 encryption is embedded into its transponders and ...
  61. [61]
    Experimental demonstration of confidential communication with ...
    Nov 4, 2021 · However, we will show that the quantum modulated signal is very sensitive to the classical fiber tapping attack and it can be detected ...
  62. [62]
    [PDF] Secure Communication in Fiber-Optic Networks
    Optical encryption and optical coding can effectively protect the confidentiality of the physical layer network and satisfy the high speed requirements of ...<|separator|>
  63. [63]
    Physical Layer Security in Multimode Fiber Optical Networks - Nature
    Feb 17, 2020 · In this paper, a novel approach to enhance the information security in fiber optical networks using physical layer security (PLS) is introduced, ...<|separator|>
  64. [64]
    The NSA's Hidden Spy Hubs in Eight U.S. Cities - The Intercept
    Jun 25, 2018 · AT&T is the only company involved in FAIRVIEW, which was first established in 1985, according to NSA documents, and involves tapping into ...
  65. [65]
    GCHQ taps fibre-optic cables for secret access to world's ...
    Jun 21, 2013 · The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where ...
  66. [66]
    Communications Assistance for Law Enforcement Act
    CALEA is intended to preserve the ability of law enforcement agencies to conduct electronic surveillance while protecting the privacy of information outside the ...Missing: fiber optic
  67. [67]
    What is CALEA and Why is it Important to Broadband Providers
    CALEA requires facilities-based broadband providers to be ready to assist law enforcement agencies in performing real-time lawful intercepts if requested.
  68. [68]
    Network TAPs and Government Surveillance - Datacom Systems
    Sep 11, 2020 · Network taps are physical hardware that capture all traffic between devices, providing key access points for government surveillance and data ...
  69. [69]
    Lawful Intercept Standards — NDCAC - FBI
    The information listed below represents the lawfully-authorized electronic surveillance technical standards and specifications published by United States-based ...Missing: fiber optic
  70. [70]
    [PDF] Telecommunications security; Lawful Interception (LI) - ETSI
    The handover interface port 2 shall transport the intercept related information (IRI) from the NWO/AP/SvP's IIF to the. LEMF. The delivery shall be performed ...Missing: fiber cables
  71. [71]
    Using International Gateways for Lawful Interception - SS8 Networks
    Jun 22, 2022 · Using International Gateways for Lawful Interception and the challenges Law Enforcement agencies face as they work to apprehend criminals.
  72. [72]
    The FCC wants to ban Chinese tech from the undersea cables that ...
    Jul 17, 2025 · ... cables against foreign adversaries, like China ... "Spy agencies can readily tap into cables landing on their territory ...
  73. [73]
    U.S. officials warn companies that undersea telecom cables are ...
    May 20, 2024 · Subsea cables are vulnerable to sabotage and espionage, and Beijing and Washington have accused each other of tapping cables to spy on data or ...
  74. [74]
    How China and Russia could hobble the internet - The Economist
    Jul 11, 2024 · Indeed, fear of Chinese espionage is one reason why America has taken such a keen interest in Asia's rapidly growing cable infrastructure.
  75. [75]
    [PDF] Tapping of fibre networks - ZyberSafe
    An attacker who gains access to the fibre cables can utilise some simple techniques to intercept all traffic transmitted through the cable. Fibre optic networks ...
  76. [76]
    Spy Subs Still Hunting Cable Traffic in the Deep - SpyTalk
    May 8, 2022 · Spy Subs Still Hunting Cable Traffic in the Deep. Undersea cables ... cables carrying the military communications of America's adversaries.
  77. [77]
    Fact of the Week: Missouri Has Seen a 200 Percent Annual Increase ...
    Jul 21, 2025 · Over the last year, Missouri has seen a 200 percent increase in the number of broadband crimes.Missing: tapping criminals
  78. [78]
    47 U.S. Code § 1002 - Assistance capability requirements
    A telecommunications carrier shall not be responsible for decrypting, or ensuring the government's ability to decrypt, any communication encrypted by a ...
  79. [79]
    FCC Responds to Cybersecurity Threats with CALEA Ruling
    Jan 29, 2025 · ... Law Enforcement Act (CALEA) requires telecommunications carriers to secure their networks from unlawful access and interception of ...
  80. [80]
    Lawful Interception (LI) - ETSI
    LI implementation is required by the European Council Resolution from 19951 which allows for LI to prevent crime, including fraud and terrorism. The ETSI ...
  81. [81]
    New U.K. Law Fails European Court Standards on Mass Interception ...
    Sep 27, 2018 · The European Court of Human Rights issued a major judgment in three consolidated cases challenging the UK government's mass interception program.<|separator|>
  82. [82]
    Ensuring Compliance with the EU CER Directive: Protecting Critical ...
    Apr 23, 2025 · The European Union's cybersecurity directive (NIS2) became legally binding across all EU member states on October 17, 2024. On the same day, ...
  83. [83]
    Submarine Cables - International Framework - NOAA
    The application of international law to submarine cables began with the International Convention for the Protection of Submarine Telegraph Cables offsite link.
  84. [84]
    The Hidden Kraken: Submarine Internet Cables and Privacy ...
    Nov 27, 2023 · The first is that the United States government appears able to directly tap into these cables and intercept all internet communications that ...
  85. [85]
    International law doesn't adequately protect undersea cables. That ...
    Jan 25, 2024 · International law doesn't adequately protect undersea cables. That must change. Undersea cables are important tools for transmitting sensitive ...<|control11|><|separator|>
  86. [86]
    What the NSA Means by “Targeted” Surveillance Under Section 702
    To accomplish Upstream surveillance, the NSA copies (or has its agents like AT&T copy) Internet traffic as it flows through the fiber-optic backbone. This ...
  87. [87]
    Privacy, Technology & National Security - INTEL.gov
    The government balances security and privacy, adapting to changing technology, while legal frameworks like the Constitution and FISA govern collection ...
  88. [88]
    Reports that NSA taps into Google and Yahoo data hubs infuriate ...
    Oct 31, 2013 · Files obtained from Edward Snowden suggest NSA can collect information sent by fibre optic cable between Google and Yahoo data hubs 'at will'.
  89. [89]
    NSA Spying FAQ - Electronic Frontier Foundation
    It also includes the claims of direct access by the NSA to the Internet content and records of our communications carried on the fiberoptic cables of AT&T.
  90. [90]
    Five Things to Know About NSA Mass Surveillance and the Coming ...
    Apr 11, 2023 · Section 702 of the Foreign Intelligence Surveillance Act allows for blatant abuses of privacy. Tell your representative it must expire. Source: ...Missing: fiber optic<|separator|>
  91. [91]
    The NSA Continues to Violate Americans' Internet Privacy Rights
    Aug 22, 2018 · The unconstitutional surveillance program at issue is called PRISM, under which the NSA, FBI, and CIA gather and search through Americans' international emails ...Missing: fiber optic
  92. [92]
    FISA's Section 702 & the Privacy Conundrum: Surveillance in the ...
    Oct 25, 2017 · Downstream collection involves NSA collecting communications “to” or “from” a target whereas upstream collection involves the NSA collecting ...
  93. [93]
    Domestic Surveillance Techniques - Our Data Collection Program
    By tapping into the worldwide network of undersea cables, our OAKSTAR, STORMBREW, BLARNEY and FAIRVIEW systems can process data as it flows across the internet.
  94. [94]
    NSA Documents Released to the Public Since June 2013 - ACLU
    An NSA training slide about the collection of internet and phone data from fiber-optic cable networks via the UPSTREAM program. Read more. Press 1. 6/29/2013
  95. [95]
    On 6/5, 65 Things We Know About NSA Surveillance That We Didn't ...
    Jun 5, 2014 · ... leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting dragnet surveillance on millions of innocent
  96. [96]
    Edward Snowden: Leaks that exposed US spy programme - BBC
    Jan 17, 2014 · BBC News retraces the leaks by ex-CIA contractor Edward Snowden, which led to the revelation of America's extensive surveillance programme.
  97. [97]
    U.K. Spy Agency Secretly Taps Over 200 Fiber-Optic Cables, Shares ...
    Jun 21, 2013 · The British spy agency GCHQ has secretly tapped more than 200 fiber-optic cables carrying phone and internet traffic and has been sharing data ...
  98. [98]
    GCHQ tapped fibre-optic cables for data, says newspaper - BBC News
    Jun 22, 2013 · The UK has tapped fibre-optic cables that carry global communications and gathering vast amounts of data, the Guardian reports.
  99. [99]
  100. [100]
  101. [101]
    How Bulk Interception Works - Medium
    Sep 30, 2016 · The Government Communications Headquarters (“GCHQ”), the UK signals intelligence agency, conducts bulk interception by tapping undersea fiber ...Missing: lawful enforcement
  102. [102]
    NSA infiltrates links to Yahoo, Google data centers worldwide ...
    Oct 30, 2013 · The NSA's principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency's British counterpart, the ...
  103. [103]
    Submarine Cable Security at Risk Amid Geopolitical Tensions &amp
    Jul 17, 2025 · ... threats, such as sabotage or surveillance. As a result, cables frequently cluster around or at the same landing site –– raising the threat ...Missing: tapping | Show results with:tapping
  104. [104]
    Germany blames 'sabotage' as two undersea fiber cables cut in the ...
    Nov 19, 2024 · The German government has blamed an act of sabotage for the cutting of two important undersea fiber optic cables, one connecting connecting Finland and Germany.
  105. [105]
    A Chinese-Flagged Ship Cut Baltic Sea Internet Cables. This Time ...
    Dec 3, 2024 · The anchor of a Hong Kong–flagged, Chinese-registered vessel named NewNew Polar Bear damaged two subsea data cables and a gas pipeline in the Baltic Sea.
  106. [106]
    Safeguarding Subsea Cables: Protecting Cyber Infrastructure ... - CSIS
    Aug 16, 2024 · Electronic protection in the form of an end-to-end encryption system also reduces the risk of surveillance, tapping, and spying. The U.S. ...Missing: cryptographic | Show results with:cryptographic
  107. [107]
    As undersea cables break off Europe and Taiwan, proving sabotage ...
    Mar 10, 2025 · Since 2023, there have been at least 11 cases of undersea cable damage around Taiwan and at least 11 such incidents in the Baltic Sea, according ...
  108. [108]
    Subsea fibre cables can 'listen out' for sabotage - BBC
    Mar 17, 2025 · But there's relatively little one can do to protect a cable from sabotage, in terms of physical strengthening. Today's fibre optic cables ...
  109. [109]
    [PDF] Submarine Cables Face Increasing Threats Amid Geopolitical ...
    Jul 17, 2025 · Taiwan almost certainly remain the primary geopolitical drivers of sabotage threats to submarine cables. ... cables has become a new threat ...Missing: emerging | Show results with:emerging
  110. [110]
    [PDF] In the Shadows of Global Fiber Networks: - Arqit
    May 23, 2024 · Both terrestrial and underwater cables are vulnerable to spying and sabotage as intercepting these data links can provide access to a treasure ...
  111. [111]
    What lies beneath: the growing threat to the hidden network of ...
    Aug 8, 2024 · The US and its allies have also expressed serious concern that adversaries could tap into the undersea cables to obtain “personal information, ...
  112. [112]
    Fiber Optic Perimeter and Data and Netword Security
    FFT's advanced fibre optic-based sensing solutions monitor and protect critical assets and infrastructure. Designed for intrusion detection, condition ...
  113. [113]
    Breakthrough in Quantum Security for High-Speed Data Networks
    May 28, 2025 · How does QKD prevent fiber tapping? In today's telecommunications, people tap fiber all the time to steal information because we're not using ...
  114. [114]
    Retelit, Telebit, and ThinkQuantum Trial Quantum Key Distribution ...
    Dec 17, 2024 · The trial demonstrated QKD's ability to provide unbreakable encryption by tapping into the principles of quantum mechanics. Unlike traditional ...
  115. [115]
    Integrated encryption and communication framework achieves ...
    Apr 21, 2025 · A novel integrated encryption and communication (IEAC) framework that combines robust security with high-capacity transmission performance.