Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Reviews

    Fiber cable choke points

    By
    Eric Lundquist
    -
    February 7, 2008
    Share
    Facebook
    Twitter
    Linkedin

      At the start of World War I, the British cut the German transatlantic cables which required the Germans to reroute their transatlantic messages via U.S. or Swedish lines. You can read a synopsis of the cutting, the intercept of the rerouted cable traffic, the breaking of the German code and the resulting tensions between the U.S. and Germany over a memo (the Zimmerman telegram) seeking to draw Mexico into a the war against the U.S. at this site which features a history of cryptography.

      I bring up this bit of ancient history to show that cable cutting has been a news item for a long time. Recently there has been a spate of broken fiber optic cables linking Europe to the Middle East that has led to lots of conspiracy theories ranging from special purpose built U.S, submarines to simply really bad luck.

      A couple of points to consider

      One. It used to be thought that tapping into fiber was difficult, almost impossible. Not true, fiber optic tapping is easier than tapping copper. You can get all the tap products you need for under $1,000.

      Easy to tap is one thing but getting to the cable under a thousand feet of water is quite another. But remember, the purpose of tapping a data line is to get the information without anyone knowing. Sending a submarine (even the U.S.S. Jimmy Carter) around the world to slice up fiber cable and leave the cut cable lying on the ocean floor would be obvious and ridiculous. If you just want to cut cable, you could drag an anchor in the cable area and slice away all day.

      Despite satellite transmission and multicable routes around the world, internet traffic is still restricted to a couple of bottlenecks. Cables from Europe to the Middle East generally head down the Suez Canal. If those cables are lost, then the routes become more complicated and often include round the world routing which even in these days of increased speed creates some significant latency. The KDDI map of undersea cables is a little out of date, but shows what a chokepoint the Suez is for cable. I’m not saying that the recent cuts might not have involved conspirators, but groups of related events don’t always translate into conspiracy.

      One takeaway from the recent fiber cuts is to reconfirm that despite the robust nature of the Internet, the Internet is not invulnerable and greater data rates means that fiber will be the transport mechanism for a long time to come

      Avatar
      Eric Lundquist
      Since 1996, Eric Lundquist has been Editor in Chief of eWEEK, which includes domestic, international and online editions. As eWEEK's EIC, Lundquist oversees a staff of nearly 40 editors, reporters and Labs analysts covering product, services and companies in the high-technology community. He is a frequent speaker at industry gatherings and user events and sits on numerous advisory boards. Eric writes the popular weekly column, 'Up Front,' and he is a confidant of eWEEK's Spencer F. Katt gossip columnist.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×