Blog

Welcome to Pioneer Consulting’s Blog showcasing insights and developments from within the submarine fiber optic telecommunications industry. All Blogs are written by one our core team of experts.

  • May 23, 2022
    Vulnerability of Key Infrastructure
    By Howard Kidorf When I think of the protection key infrastructure, I think of bridges, tunnels, ports, airports, the facilities necessary for military and civil order, and the scattered facilities that supply food and energy in the form of electricity and hydrocarbons. As many have pointed out in this era of COVID-mandated travel restrictions, the infrastructure upon which the Internet depends is, similarly, fundamental to the operations of nearly all economies in the developed and developing world. With this in mind, I would like to introduce two key focuses of everything having to do with the connectivity that we so enjoy (assuming that we enjoy our work and not just the addictive games we play online): data centers and undersea cable. Data centers are where a massive deployment of computers and memory supply the services that we call the Internet. (A later article will discuss these wonders of the modern world.) Undersea cables are the means by which most of these data centers are connected to each other. A data center is relatively easy to physically protect. Barbed-wire fencing, armed guards, man-trap security doors, and biometrics are some of the tools of the trade. These work quite effectively. (Protecting against a software invasion is much trickier.) The connections between data centers, however, are required to make the web a worldwide operation. Some of the headline uses for these cables include the Society for Worldwide Interbank Financial Telecommunications (backbone of the international banking system) and military uses for some countries to project power around the world. Given society’s bedrock dependence on undersea cable, it is quite reasonable to ask if these undersea cables are vulnerable? The short answer is yes. To dig in, we have to ask: vulnerable to what? Espionage? Vandalism? Malicious, non-war sabotage? Wartime acts? If you are wondering about vulnerability to espionage, the answer is that tapping optical fiber is relatively easy. This is not my business, but it strikes me that every submarine cable comes to the beach. At the beach, the cables usually enter a manhole to allow a splice of the marine cable to a cable variety more conducive to terrestrial installation and maintenance. Between the beach manhole and a cable station building or data center there is often hundreds or thousands of meters of land cable. Hence, the question is not really “are submarine cable tappable” it is really “what is the best way to get access to the information on undersea cables.” Is this information accessible? Yes. Every member of the of the information security business that I have spoken to has said that information in transit is vulnerable to interception. (The current solution to this problem is encryption.) Are cables secure from being cut? Absolutely not! More than 200 major cables are repaired every year with most of them damaged by man-made activity (usually anchors or fishing). Cables are cut so often, in fact, that all operators of global networks plan not just one back-up path, but between 2 to 4 back-up paths. The multiple paths are necessary due to the very real probability that two or more cables contributing to a point-to-point connection are cut. It is not until there are 4 or 5 paths between data centers before the assurance of at least one with sufficient capacity is operating. All telecom operators consider these probabilities very carefully to protect their revenue streams (did I just imply that Google and Facebook are telecom operators? My bad!). Back to vandalism and malicious, non-war sabotage? Yes, undersea cables are vulnerable in the same sense that any power transmission line is vulnerable. These assets are long and distributed over a very long space. In both cases, power and telecom, there is (or should be) a lot of redundancy in the network. Hence an outage on one or two links is inconvenient, but not devastating. Another observation is that damage to the outside plant takes a link out of service. However, damage to the cable is usually easily repaired. Damage to the terminal stations, is a completely different story. When I am asked about cable security, I usually make sure there is plenty of time to talk about restoration plans. Most governments regulate undersea cables as assets that have national security implications. Hence, there are lots of formal permitting and licensing requirements. Attached to these licenses come operating requirements such as who can own the facilities, who can enter the cable station, what equipment may be deployed, and perhaps most importantly, visibility into the nation’s international facilities and the ability to intervene in their operations if necessary. This leads to the question of the vulnerability in times of war. The bottom line is that if an adversary sees value in cutting some, or all, of the cables belonging to its enemy, there is little standing in their way. Today’s situation hasn’t changed since the British ringed the world with telegraph before the end of the 1800s. Upon the outbreak of World War One, the British performed possibly the first information-warfare operation by dredging for, and cutting, all the German submarine telegraph cables. (The British also intercepted all German communications on the British cables that continued to operate.) Little has changed since the summer of 1914 except for: a) the increased use of physical diversity as protection, b) use of satellite backup for critical communications, c) diverse ownership and use of modern cables, d) availability of accurate data on locations of cables. These factors all are important of when and how to target undersea cables in a time of all-out war. Seeking answers to your questions about undersea cable security, please contact us.
  • March 2, 2022
    Content Delivery Chain Trends and Evolution (3 of 3)
    In this post, we examine the main trends in the content delivery chain and how the role of some parties is evolving.
  • February 8, 2022
    How Subsea Cables Fit into Content Delivery Chain (2 of 3)
    This blog is second in a series of three blogs related to Content Distribution. In this post, we will take a look at where the various parties involved in this content delivery chain are physically located and how they interconnect to each other.  Also, the role of subsea cable systems in this architecture will be described.
  • February 1, 2022
    End-to-End Content Delivery Chain (1 of 3)
    This blog is first in a series of 3 blogs by Bertrand Clesca on the content delivery chain.
  • January 2, 2022
    Is Elon Musk going make Undersea Cables Obsolete?
    If I had a satellite in low earth orbit for each time I have heard this question, I may have a constellation of birds that rivals the 30,000 planned by Elon Musk’s Starlink.
  • Far Away Cableship
    December 16, 2021
    Content Provider-Led/Enabled Cable Systems
    With seemingly insatiable bandwidth needs across the globe, major content providers (Facebook, Google, and, to a lesser extent, Amazon and Microsoft) are more involved than ever in the building of long-haul subsea cable systems.

Contact Pioneer Consulting

Telephone: +1 978 357 3605

Fax: +1 501 648 9354

info@pioneerconsulting.com

Legal Address: 221 River Street, 9th Floor, Hoboken, New Jersey 07030 USA