Submarine Cables and the Rise of Mass Surveillance

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
(dramatic music) - There's this house in this neighborhood in New Jersey that actually isn't a house. It's hard to see, because it's behind this gate, but if you look at it from above, you'll see that it's actually a really large building. Kind of looks like a warehouse. It has dozens of air conditioning units and it's just sitting here among a sea of ordinary suburban homes. All of this is just a facade hiding this massive building that is a landing station for AT&T, the place where these massive undersea cables that connect the world, hit the eastern seaboard. (suspenseful music) We now know for certain that the U.S. government spies on those cables with the help of companies like AT&T. And according to a leaked map from the NSA, they process all the data that they collect somewhere in New Jersey in a facility called Pinecone. Lining up these maps points to this secretive disguised building as one of the best candidates for where this surveillance is being processed. But there's a lot more of these hidden buildings around the country. Thanks to leaked NSA documents and some thorough investigative reporting, we now know some of their locations. Like the fake house in New Jersey, these other cable spy facilities blend in as benign, nondescript buildings avoiding any undue attention along the streets of New York or San Francisco or Dallas. These few hundred cables that connect our world contain an unfathomable amount of data, all of our communication, all of our connections, and it would seem impossible that any government agency would be able to spy on it all, impossible, that is, if we didn't have solid proof that they do. So let me tell you the story of the cables that connect our planet and show you that if you can tap into them, you can watch the world and they have, and they've been doing it for a long time. - [Reporter 1] 320 million records every day. - [Reporter 2] What we're talking about here is a total revolution of the whole concept of war. - Collect it all, exploit it all. (TV static) - Now is the moment where I say thank you to the sponsor of today's video. I'm very grateful for sponsors. I wouldn't be able to do this job and make independent journalism if we didn't have sponsors. So thank you Incogni for sponsoring today's video. Incogni is actually quite relevant to today's video, because Incogni is super-interested in data privacy. We live in a world where there's an entire secretive industry dedicated to collecting information about you and no, this isn't the NSA spying on you. This is for-profit corporations who spy on you in any way they can, so they can sell that to other companies who can then market to you, who can into your phone, who can try to make you buy things. I find this incredibly frustrating and violating that my personal information is bought and sold on an open market. Luckily, we have rights to make this not happen. The problem is the process of making it not happen is very complicated and this gets me to Incogni. Incogni is a service that does this for you. You sign up for Incogni and you give them permission to go out into the world on your behalf and take you off as many lists as they can. The first thing they do, and this is very satisfying, is they scan to see all of the lists that you're on and they show it to you on this really nice dashboard so you can see, oh my God, I'm on dozens if not hundreds of these marketing lists. And then they start the process of securing your privacy, of getting your email and your address and your phone number off these lists. It's a process and Incogni will keep you updated on the progress. They even have a tally of all of the lists that you've been removed from, which is insanely satisfying to keep an eye on. Because of Incogni, I learned that here in the U.S. there's this other massive problem, which are these people search sites where you can search for people and it will pull up as much information as the site has on you. I don't like that. Incogni sniffed this out for me and is taking me off of these lists. Thank you, Incogni, I'm very grateful for it. So there's a link in my description. It's incogni.com/Johnny Harris and you can go over sign up for Incogni and try it out for 30 days and get a full refund if you don't think it's useful, totally risk-free. I'm really grateful to Incogni for sponsoring our journalism in this video, but I'm also grateful that they exist, because I am so tired of my inbox and my phone and my mailbox being full of garbage. Okay, with that we're jumping back into the video about the government version of collecting your data. (videotape clicks) We laid the first copper cable across the Atlantic Ocean in 1858. It connected Ireland to Canada. They sent the first telegram across this wire and it took 18 hours to arrive, which was like light-speed back then. The cable broke three weeks later, but even still, it was a huge success, a revolution for a world whose progress hinged on being more and more connected. - [Narrator] Through a single cable, only an inch and a quarter thick, which lies on the ocean bed. - [Johnny] The planet would be linked up by many more of these cables draped along the ocean floor, allowing us to call people across the world and eventually allowing us to access information through webpages hosted on servers far, far away. - An online network called internet. - Today, there are 1.4 million kilometers worth of cables linking us all up and they transfer a ton of data, like the fastest cables can transfer 224 terabytes per second, and the amount of data being sent around the world doubles every two to three years. Unsurprisingly, there's a whole industry dedicated to just laying down these cables and then monitoring them and repairing them when they break. Sometimes they get broken by fishing trawlers or anchors or natural disasters. Sometimes they even get broken by sharks, though that's pretty rare, but sometimes these cables are broken on purpose. There's this island right off the coast of China, but it technically belongs to Taiwan, the country that China has vowed to eventually absorb into their own. Needless to say, there's a lot of tension here and in the last five years, the cables of this little island have accidentally been broken 27 times, which is a lot for cables. China denies that they had any part in these 27 accidents. They say it's just an unfortunate fishing or anchor incident, but I'm suspicious. - [Reporter 3] Officials fear that Matsu is just a warning and that internet connections to the whole of Taiwan could be under threat. - Sometimes it's unclear who attacks these cables. Like a few years ago when somebody ripped out a two and a half mile piece of this cable that connects Norway to the island of Svalbard. Other times it's very clear who's cutting the cables. Like when the United States was at war with Saddam Hussein in the nineties and they cut Saddam's cable so that he couldn't communicate. I mean, cutting the communication cables of your enemy is an old strategy. They were doing that way back in the American Civil War, but the more interesting approach to me isn't just sabotage. There's another way that you can use cables to your advantage if you are a great power trying to control things. (electronic music) If you have access to submarine cables, which governments and militaries do, you can scrape through the insulation of this cable. You can splice in another cable and you can duplicate the signal and hear everything your enemy is saying. (people speaking in foreign language) The British Navy did this to a German submarine cable out here in the middle of the Atlantic, during World War I. The Germans suspected that they were being listened to, so they sent all their communication as complex codes, but the British had very smart code breakers and they were able to decrypt all of this and discover a lot of Germany's secrets, and they discovered this secret plan that Germany had to ally with Mexico and invade the United States. This is one reason why the U.S. ended up joining the war, and it all happened because of submarine cable tapping. (uptempo beat music) World War II took cable tapping to a whole new level. A more connected world meant more opportunities for vital military information to leak out. So the U.S. created a new agency where they would tap in and monitor hundreds of thousands of civilian telegrams and phone calls flowing through both the mail, but also through these submarine cables. I mean, think about it, it was a scary time. It was global war, it was mass destruction, so mass surveillance on your people felt necessary in the name of national security. - [Reporter 4] Even the insides of envelopes are scrutinized for hidden writing by these sensors. - This agency was shut down after World War II, but the seeds of mass surveillance were now planted. (techno music) A few years later, President Harry Truman creates a new secret department, the National Security Agency or NSA. Their job was to secretly collect and analyze communication happening in the country, communication that was not meant for them, spying on communication of all kinds, all in the name of national security. By the time the United States and the Soviet Union are locked in a Cold War, spying becomes even more valuable, even more of a priority for these governments, and once again, underwater cables become a target. The Americans built this entire spy submarine, which had a secret space set aside for intelligence officers and a giant computer. They called this space the bat cave. Of course, they did, a bunch of military dudes on a submarine and they've got their secret computers, like, "We're in the bat cave." I can totally see it. This submarine called the USS Halibut had a little mini-submarine-looking thing that was actually not a mini-submarine, but rather a pressurized chamber full of special gas that divers would just sit in there and breathe. It was pressurized to feel like the deep ocean so that these divers could go out into the ocean and be 400 feet under the surface and their bodies were ready for the pressure. They used this to secretly navigate to underwater cables. The one we know about happened over here right off the coast of Eastern Russia. The divers would leave their pressurized gas chamber. They would navigate this big, clunky electric listening device onto the cable. It's basically a giant 20' recorder that would tap into the cable and record everything passing through. They somehow parsed through the dozens of different signals, specific phone calls between Soviet officials, but of course, this is the analog days, so the storage on this device would fill up, so they had to go back with their little bat cave submarine every few months to replace the tape. They did this for 10 years. This was called Operation Ivy Bells, and we talked about it a little bit in the whole deep dive we did on submarines. But boy, it just never ceases to blow my mind how resource-intensive this operation was. (water bubbles) Anyway, through this tapping on the Soviet cable, the Americans learned just how scared the Soviets were by the buildup of nuclear weapons. This helped them negotiate a slowdown in the nuclear arms race and even helped lead to the end of the Cold War according to one expert. By the early nineties, the Cold War was over. - [President Clinton] The change of centuries, the dawning of a new millennium. - But then came a world changing attack into the ultraconnected internet age. - This new law that I signed today will allow surveillance of all communications used by terrorists, including emails, the internet, and cell phones. This government will enforce this law with all the urgency of a nation at war. It is now my honor to sign into law the USA Patriot Act of 2001. (audience applauds) - In 2006, a leaked document revealed that in a nondescript building in San Francisco behind this random yellow door labeled 641A, the NSA had set up this harmless-looking box that tapped into the fiber optic cables that traversed the Pacific Ocean into Asia. The phone company AT&T had agreed to let them siphon off the traffic that was moving through their cables. This seemed kind of nuts that the U.S. was tapping a cable where all of our communication goes through, but we had no idea what was coming. In 2013, Edward Snowden, an NSA contractor unleashed one of the biggest leaks in American history. - This is the greatest hemorrhaging of a legitimate American secrets in the history of the Republic. - And that is what we have been looking through. I mean, there's a lot more documents, but we sifted through and found the documents that show us that it wasn't just one cable in San Francisco being tapped. The NSA was targeting every single cable that touched the United States, a huge amount of global traffic, email, text messages, phone calls. They had cooperation from all these telecommunication and tech companies to do this. Microsoft, Yahoo, Google, Facebook, PalTalk? The hell is PalTalk? Who knows, but the NSA was tapping their cables. YouTube, Skype, AOL, and even Apple by 2012, and their goal in all of this, well, according to one of these slides, the goal was to sniff it all, know it all, collect it all, process it all, exploit it all, partner it all. In other words, according to another leaked slide, to master the internet. There's this one spreadsheet in all of these leaked documents that really said it, here it is. This is a list, a spreadsheet of some of the cables that the NSA had access to, we literally know which ones. I mean, we have the data of all of these cables. We could literally map all of these from the southern cross cable that connects California to Australia, to the Apollo cable that connects New York to France, to the tiny cables that connect Puerto Rico to the British Virgin Islands. All in all, by 2009, the NSA had stuck a probe in hundreds of submarine cables all around the globe. Oh, and they didn't do it alone. The NSA partnered with the OG masters of Cable-tapping, the British. - Since the 1940s, GCHQ and its American equivalence have had a relationship that is unique in the world. - Okay, so there's a weird loophole thing here. U.S. law allows the NSA to track anyone outside of the United States, but there are restrictions when it comes to tracking American citizens. So to get around that, they turn to their British counterparts, the GCHQ. So over the course of a couple years in the early 2010s, the NSA is paying 100 million pounds in secret money to gain access to all of this data, this data that they call a gold mine to exploit, hundreds of thousands of names, over 76,000 geocoordinates, 194 million messages collected per day. And unlike the NSA, the British could actually spy on American targets, but the point is they were in it to collect it all. - If information arrives in the UK from the United States, it's governed by our laws. The system works as intended. (suspenseful music) - Okay, okay, yeah, it's a lot of data, but what can you do with 600 million phone events worth of data? That's way too much for any human to actually process, and this is where it gets kind of nuts to me. We've got this slide, which by the way, I know that we're dealing with really top secret documents, but they all have clip-art and these templatized Windows 95-looking titles, freaking love it. (jazzy drum music) This slide, this complicated, wonky, wonky slide with this flow chart is the answer to what they do with all of this data, but here's basically how it works. So the NSA gets all of this data of all of our communication, either from cables or from phone companies. They funnel it through this central processing facility called Pinecone. This is presumably where they're processing a lot of this data and trying to find patterns. The NSA says that their job is to find suspected terrorists or other people who want to do harm to national security. And to do this, they use computers and algorithms to make links between suspected terrorists and their immediate network, the people they call, the people they talk to, where they are. They say they only hold on to those records and they throw out everything else. We don't know if that's true, but let's just assume it is. And then once it's all processed and sorted, it goes into a little searchable database called XKeyscore, which is a very clunky name, but hey, great graphic design once again. This is basically like a internal search engine that catalogs all of the metadata that has been assigned to all of this call message geolocation information and makes it searchable. So you could pull up a person, a suspected terrorist, and you could find everything you need to know about who they talk to, where they are, what their emails say, or in their words, anything you wish to extract. It's all searchable on this convenient platform. This allows them to do searches like let's look for an Arabic font, Google query coming out of the tribal areas of Pakistan, and boom, they're linked in. It's all right here in XKeyscore the database. Because of the globally connected world, the NSA now has access to this person. They can see what messages they're sending. They can see where they are right now, assuming they have their phone, all searchable in this convenient database, accessible to agencies from other countries and all over the world. The whole assumption here is that in order to find your target, the terrorist, the spy, whatever, you need to access all of the information, this turns metadata into a weapon of modern warfare. - We kill people based on metadata, but that's not what we do with this metadata. (suspenseful music) - This revelation, all of these documents, this whole Snowden drama was a big deal for a lot of reasons. One of the things it did is it made the location of cables really important. Most of the cables were going through the United States, but after this leak, countries started to look for alternative routes that bypassed the United States, like this one that connects Brazil to South Africa and then goes on to Asia. So over the last decade since these leaks, the U.S. has become less and less the epicenter of cable connection, and you guessed it, there's another player in town who wants access to cables, China. (suspenseful music) China is rapidly building out their worldwide network of cables, and they're doing this through Chinese state-owned companies like Huawei. And this is adding yet another front in this emerging Cold War tension between great powers that want to lead the global system. It turns out that controlling and spying on cables is a requirement for global leadership in 2023, who knew? But unlike the U.S. who purports to protect privacy and civil liberties, but secretly violates them, China doesn't even pretend. China has built a society off of mass surveillance and control of information. Like here's actual footage of how China tracks the movement of its population through visual recognition, through cataloging every face, every car. Information is power in this day and age, and just a couple years ago, the U.S. formed a new special unit with intelligence and regulation officials. It's a group called Team Telecom, and their job is to assess any new projects, any new cables, and make sure that they aren't going to threaten or weaken U.S. interests. For example, there was this one cable that was supposed to connect LA to Hong Kong. It was being built by Google and Facebook, and they were into the project, hundreds of millions of dollars into the project, and this Team Telecoms shut it down, too risky. We can't have our fiber optic cables going too close to China less they spy on us. This is making the map look really weird. You used to only have to have one major set of cables connecting countries, but now you're starting to see duplicates. The Chinese lines and the American lines, each building out their own network, not connecting to each other. It's like the perfect symbol of the tension that is rising between these two superpowers. The bifurcated world that we're moving into. China is connecting these small remote islands laying down cables. And these islanders are happy to have fast internet, even if it comes from China and is probably being tapped. The continent of Africa, the U.S. and China are both laying down competing lines. The country's caught in the middle of this understand what's going on. Two, aspiring hegemons vying for power, each involved in spying and sucking up information in their own way, but I guess it's worth it, because it means faster internet, it means connection to the world. Russia is even trying to get in on this with their aptly named Polar Express cable. And even though the old school tapping into cables in the middle of the ocean to spy on your neighbor is kind of outdated now, there's some evidence that Russia might be still doing this. They've got this one ship called the Yantar. It's a surface ship that is generally understood to be a spy vessel, and it's been spotted on the surface above where we know submarine cables are near Ireland or near Syria. Some think that they're just tapping into them like the old days, maybe using one of these mini-submarines. But even if they're not tapping into them, they're very presence above the cable is kind of a threat. They could cut this cable at any moment. The U.S. who is very good at submarines has its own spy vessels, the most secretive one being the USS Jimmy Carter, and we have no idea what it's up to. Security experts speculate that it's probably tapping into cables for some reason, somewhere at the bottom of the ocean. But a lot of people in the industry are like, "No, that's so old days, why bother?" It's so much easier to just tap into them on land. You get way more data and you don't have to go to the bottom of the ocean. Meanwhile, the private companies in charge of these cables have started to up their own defenses. They're taking all these extra precautions, including sending out these submarine drones that just spend their time tracing along the bottom of the ocean, babysitting these cables and making sure that there's no damage or tampering going on. So I feel like I'm gonna say what I've said a bunch on the channel lately, which is we are entering a new chapter in geopolitics. A globalized world is hyperconnected, but suddenly and unexpectedly, we're seeing a new set of divisions, countries not trusting each other anymore. Nations wanting to create their own separate systems, both economically, militarily, but also with the infrastructure of the internet. A chapter where countries now are more skeptical than ever, especially great powers, great powers that are building their own infrastructure so that they can communicate and control information, not trusting the other half of the world to handle their data. We see Navies with secret ships that cost close to a $1 billion a piece, and then we see everyone else caught in the middle. And in the end, most of us just want fast internet connection with friends around the world and a feeling that we're safe. (suspenseful music) All right, thanks for watching today's video. Just a little nugget here. We did this video, because we did the deep dive on submarines a few months ago. I don't know if anyone saw that, but it was in that reporting that we came across the spying element of all of this. And I remember I asked all of you, do you want me to do this video? And you all said, yes. I got like so many comments that were like, "Yes." And so, we did it. And that is one thing I love about YouTube and being an independent journalist on YouTube is that I get to just ask you, I'm talking to you and be like, "Hey, do you want this?" And you're like, "Yes." And I go, "Okay," and I make it. And there's no corporate middleman who decides what we make. We make what you guys wanna see. So as always, you can pitch us ideas and we will hear them. For those who want to support more fully in our kind of more intimate community, we have a Patreon called the Newsroom. The Newsroom is a place where you can support what we do here, but you also get in on a few benefits, including an extra behind the scenes video every month where you get to see all of the people and the processes and the shenanigans that happen here in the studio. We have a big team and you get to meet them, if you are a member of the newsroom. You get access to my scripts, you get access to Tom Fox music. But really you get access to the warm fuzzy feeling that you're supporting a YouTube channel that is trying to make rigorous journalism in a time where facts and truth are kind of eroding. So if that floats your boat, we would love your support. We also have luts and presets, which are like the thing we use to color our videos and our photos. You could buy those and they help support the channel. We have a poster that I designed. I'm super into map projections, all the different ways you can show a map shape, and I made a beautiful poster that has it. If you have that poster, I think a lot of you have purchased that poster, we actually sold out and we're reprinting a new batch, so they should be in there. Don't quote me on that because they could be sold out again. But anyway, if you have that poster, tag me or something, I wanna see what it looks like out in the wild. I looked at it on a screen for months and now I have some here, but I don't know what it looks like out in the wild, so share it with me. I think that's it. Anyway, that's all I've got. Thank you all for being here, and I'll see you in the next video, bye-bye. - [Narrator] Although the calls through the cable will be from many nations, in many tongues, the cable itself speaks a single language to all that is the language of friendship and cooperation between the men and women of France, West Germany, England, and the United States who conceived and brought to completion the cable to the continent.
Info
Channel: Johnny Harris
Views: 835,117
Rating: undefined out of 5
Keywords: Johnny Harris, Johnny Harris Vox, Vox Borders, Johnny Harris Vox Borders, Vox, submarines, sub, cables, ocean, military, security, undersea, war, data, internet, surveillance, usa, china, russia, spy
Id: 2P3P5OkGt8Q
Channel Id: undefined
Length: 26min 31sec (1591 seconds)
Published: Wed Aug 16 2023
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.