Fiber optic cable eavesdropping is now possible using repurposed earthquake detection technology, according to researchers who disclosed their findings at USENIX Security 2024. A team from the University of Michigan and collaborators demonstrated that Distributed Acoustic Sensing (DAS)—a method originally designed to monitor seismic activity—can recover intelligible speech from fiber optic cables with minimal physical access. The attack exploits the vibrations that travel through cables when people speak nearby, converting those vibrations into reconstructed audio using trained neural networks.
Key Takeaways
- Fiber optic cable eavesdropping requires just 20 cm of exposed cable and a commercially available DAS interrogator unit costing $10,000–$50,000.
- AI neural networks trained on speech spectrograms achieve 80–90% word accuracy in lab tests, with 10–20% word error rates on real fiber.
- The attack works through walls and up to 1 meter away from the cable; no modifications to the target’s network are needed.
- Standard single-mode fiber optic cables used in homes and businesses worldwide are vulnerable; affects 1+ billion FTTH users globally.
- Method disclosed publicly at USENIX Security 2024 with code available on GitHub; vulnerability affects 50+ countries with fiber-to-home infrastructure.
How Fiber Optic Cable Eavesdropping Works
The attack exploits a physical property of fiber optic cables: they vibrate when sound waves hit them. A DAS interrogator—a commercial device typically used by utilities and researchers to monitor earthquakes and pipeline integrity—sends light pulses down the fiber and measures the phase shifts caused by these vibrations. The interrogator samples the returning light at rates exceeding 100 kHz, capturing detailed vibration signatures along the cable’s length. These signatures are then fed into a convolutional neural network trained on mel-spectrograms of human speech, which reconstructs audio waveforms with approximately 1–2 second latency. Researchers achieved 92% accuracy after just 20 minutes of channel calibration, meaning an attacker needs only a brief listening period to tune the system before beginning surveillance.
The vulnerability stems from how DAS measures Rayleigh backscattering—the subtle reflection of light from microscopic impurities in the fiber. When vibrations disturb those impurities, the phase of the reflected light shifts minutely. Standard equipment used for legitimate infrastructure monitoring can detect these shifts with enough precision to reconstruct speech. The neural network component is the innovation: it bridges the gap between raw vibration data and intelligible words, effectively turning the cable into an acoustic sensor. This represents a significant departure from traditional eavesdropping methods, which typically require either line-of-sight access (like laser microphones) or proximity to electrical emissions (like TEMPEST attacks).
Why This Vulnerability Affects Billions of Users
Fiber-to-the-Home (FTTH) infrastructure is now standard in over 50 countries, connecting more than 1 billion users worldwide. Most of these installations use standard single-mode fiber optic cables—the same G.652 type cables vulnerable to DAS-based eavesdropping. The cables typically run from street-level splice boxes into homes and businesses, often with exposed sections near routers or wall-mounted patch panels. An attacker needs only 20 cm of exposed cable; they do not need to cut or disconnect anything, making the attack nearly invisible. The fiber sits passively in walls and conduits, requiring no power source and generating no detectable signals that traditional security sweeps (RF frequency analysis, for instance) would catch.
Unlike previous fiber-based attacks that required active network compromise or line-of-sight positioning, fiber optic cable eavesdropping exploits the physical medium itself. This means users with encrypted Wi-Fi, strong passwords, and updated security patches remain vulnerable. The attacker bypasses the entire network layer and targets the infrastructure layer instead. Researchers demonstrated that the method works through walls if vibrations propagate through the building’s structure, expanding the attack surface beyond just routers. For anyone with FTTH service, this represents a fundamental security gap that cannot be patched through software updates alone.
The Equipment and Cost Barrier
The primary obstacle to widespread fiber optic cable eavesdropping is equipment cost. A DAS interrogator unit—the laser-based device that sends pulses down the fiber and measures backscattering—typically costs between $10,000 and $50,000 from vendors like OptaSense or AP Sensing. These devices are commercially available to researchers, utilities, and infrastructure companies, but not to casual threat actors. The interrogator must be connected to the fiber via a 50/50 optical coupler, and the entire setup requires a GPU-equipped computer (such as an NVIDIA RTX 40-series card, roughly $500+) to run the neural network inference in real time. The researchers trained their model on publicly available speech datasets, meaning the AI component does not represent a significant technical barrier once someone has the interrogator.
However, the cost structure creates an interesting asymmetry. While $10,000–$50,000 is prohibitive for individual criminals, it is well within reach for state-level actors, organized crime syndicates, or well-resourced corporate competitors. Rental options exist through companies specializing in DAS equipment, further lowering the barrier for temporary surveillance operations. The researchers’ decision to disclose the method and publish code on GitHub was deliberate—they argued that the vulnerability already existed in deployed infrastructure and that transparency would accelerate defensive responses from network operators and equipment manufacturers.
Comparing Fiber Optic Cable Eavesdropping to Other Spy Methods
Fiber optic cable eavesdropping offers distinct advantages over traditional surveillance techniques. A laser microphone requires clear line-of-sight to a reflective surface (like a window) and works best outdoors; fiber optic cable eavesdropping works indoors and through walls if vibrations propagate through the structure. TEMPEST attacks—which intercept electromagnetic emissions from electronics—require much closer physical proximity and only work on active electronic devices; DAS targets the passive fiber infrastructure itself. Traditional bugs and hidden microphones need power sources and batteries, making them detectable during maintenance or physical inspections; a DAS attack requires only temporary physical access to the cable itself, leaving no persistent device behind. The method also achieves significantly better signal-to-noise ratio through obstacles compared to laser microphones, making it more reliable in real-world environments.
The comparison to laser microphones is particularly striking. While both techniques exploit physical properties to recover sound, DAS operates at a fundamentally different layer of infrastructure. A laser microphone is a point-source attack targeting a specific window or reflective surface; DAS turns the entire fiber network into a distributed microphone array. This means a single interrogator connected to a fiber segment can potentially monitor multiple rooms or areas where that fiber passes through, depending on vibration propagation patterns. The passive nature of the attack—requiring no active transmission from the attacker’s equipment that could be detected by RF monitoring—makes it substantially harder to defend against using conventional security tools.
What Happens Next: Mitigation and Response
The USENIX Security 2024 disclosure has prompted discussions among network operators and equipment manufacturers about potential mitigations. Physical security around exposed fiber segments—such as conduit protection or tamper-evident sealing—represents the most straightforward defense. Some operators are exploring acoustic damping materials that could reduce vibration transmission through cables, though this approach remains experimental. At the software level, network operators could implement additional authentication or monitoring on DAS equipment itself, though this does not address attackers who gain physical access to fiber segments.
The fundamental challenge is that DAS technology serves legitimate purposes in earthquake early-warning systems, pipeline monitoring, and distributed fiber sensing. Disabling or restricting DAS would eliminate valuable infrastructure monitoring capabilities. Instead, the focus has shifted toward physical security hardening and awareness among facility managers. The researchers emphasized that this is not a remote attack—it requires physical access to the fiber cable—which limits the threat model to attackers who can reach infrastructure near the target location. For high-value targets (government facilities, corporate headquarters, sensitive research institutions), this represents a credible threat. For the general population, the risk is lower but not negligible, particularly in shared buildings where multiple parties have access to cable routes.
Can fiber optic cable eavesdropping be detected?
Detecting an active DAS eavesdropping attack is difficult because the interrogator sends light pulses down the fiber in ways that mirror legitimate monitoring traffic. However, facility managers can physically inspect exposed fiber segments for signs of unauthorized couplers or splitters. Network operators can also implement monitoring on their own DAS equipment to detect unusual access patterns or data extraction. Traditional RF sweeps will not detect a DAS interrogator since it uses optical rather than radio signals.
Does encrypted Wi-Fi protect against fiber optic cable eavesdropping?
No. This attack targets the physical fiber infrastructure, not the Wi-Fi network itself. Encryption, strong passwords, and network security measures are irrelevant because the attacker is recovering sound vibrations from the cable, not intercepting network traffic. The vulnerability exists at the infrastructure layer, below the network layer where Wi-Fi security operates.
How long does it take to set up a fiber optic cable eavesdropping attack?
Once an attacker has physical access to exposed fiber and the DAS interrogator in place, the system requires approximately 20 minutes of calibration to achieve high accuracy. The interrogator must sample the cable’s response to ambient vibrations, and the neural network must adapt to the specific acoustic properties of that cable segment. After calibration, the system can begin reconstructing speech with 80–90% word accuracy under clean conditions.
The disclosure of fiber optic cable eavesdropping represents a wake-up call for infrastructure operators worldwide. While the attack requires specialized equipment and physical access, the combination of ubiquitous fiber deployment, legitimate DAS technology, and advancing AI makes this a real vulnerability that cannot be ignored. The research team’s decision to publish their findings transparently reflects the security principle that hidden vulnerabilities are more dangerous than disclosed ones. Network operators, facility managers, and policymakers now face the challenge of securing physical fiber infrastructure without compromising the legitimate monitoring capabilities that modern infrastructure depends on.
Edited by the All Things Geek team.
Source: TechRadar


