On Tuesday, a pair of Tu-142 Bears made their way toward the USS Ronald Reagan while the carrier was undertaking drills with South Korean forces, and a quartet of Hornets launched to intercept. Multiple communication attempts went unanswered and the Bears ended up roaring over the USS Ronald Reagan at 500 feet with the Hornets in tow.
Navy officials characterized the interactions as safe.
The aircraft involved were the maritime reconnaissance and anti-submarine warfare variants of the venerable Tu-95 Bear bomber. These aircraft remain very real threats to American carrier strike groups during a time of hostilities. They are downright intimidating when a pair of them come sweeping over the deck at 500 feet.
Meanwhile, hundreds of feet below the sea’s surface, Russian subs are reported to be lurking around major undersea communications cables at an alarming frequency. This has folks at the Pentagon worried that the Russians could cut the cables, or manipulate the information flow in such a way that it could sever civilian, and to some degree, military data transmissions This would in effect blind America from the world’s maelstrom of communication and data flow.
Last month the new Russian spy vessel Yantar, which has known deep-sea submersible capabilities, sailed down the U.S. eastern seaboard and towards Cuba on a route with multiple critical communications cables, the final one running near U.S. Naval Base Guantanamo Bay.
All this sounds very sinister. What if Russia were to tap our communications, or even worse, cut them off totally in a spot so deep it would be challenging to repair? What if they have placed devices to do so that could be triggered at any time? What if those Tu-142 Bears were armed and we let them just carpet bomb our aircraft carrier? The list of worries goes on and on.
The truth is that the U.S. is guilty of these same actions and many more. We have been tapping undersea communications system for decades. We even have a full-on highly modified Seawolf Class submarine that is built to accomplish those exact operations, but without anyone ever being able to detect them.