Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Fishing Nets May Be the Greatest Security Threat to the Internet [Video]

b2ap3_thumbnail_internet_under_the_sea_400.jpgMany countries around the world have access to the Internet, but have you stopped to consider how this service is deployed and connected to countries on different continents? Well, this is only made possible by the countless miles of wire laid beneath the surface of the ocean, all around the world. In fact, it’s somewhat unnerving to think that international communications depend on the structural integrity of cables submerged at the bottom of the sea.

Like a mighty sea serpent, the Internet’s cables snake around the globe, connecting countries and online infrastructures to ensure global communication. The majority of transoceanic communications, including phone calls, emails, and just about any Internet transmission, is dependent on the well-being of these cables. As reported by WIRED, the first telegraph wire was initially laid across the Atlantic Ocean in 1866, and others soon followed, laid across common trade routes. In the 1950s, the standard for overseas cabling shifted to coaxial cables, which were capable of carrying telephone conversations. Today, the world uses fiber-optic cables that are used to transfer enormous amounts of data relatively quickly.

Here’s a video of how these cables are laid:

And a map of where they’re all located:

As you can expect, these Internet cables have become important staples for how society communicates on an international scale. Still, doesn’t it seem strange that such important pieces of technology are left at the mercy of the ocean? Most people don’t bother to remember that the cables exist until a problem happens and a connection goes down. More often than not, people only take interest in the cables when something goes wrong with them, but it’s a fairly common occurrence for submarines and international powers to take an interest in them.

As reported by WIRED, the following problems are fairly common threats for the Internet cables: seismic activity, various undersea creatures (namely sharks - you know, the scary ones with teeth), and international intervention. By far, though, the most common problem for the undersea cables comes in the form of ship anchors and fishing nets. Between the two, they make up about 60 percent of all cable destruction. This is the primary reason why most sea charts will mark the location of these wires; since, as you can imagine, cutting them has some pretty dire consequences.

Cutting undersea cables would probably make for a great sabotage trick for an international conflict, but such activities haven’t occurred since the previous World War. These days, the cables are typically left untouched and forgotten about, though occasionally the media will make a scene about submarines sniffing around near the cables. What are your thoughts on these undersea cables? Do you think there should be a more efficient manner of deploying information across the world? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 15 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Communication Business Continuity IT Support Smartphones Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Business Management Users Upgrade Windows Phishing Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Gadgets Social Media Saving Money Holiday Tech Term Chrome Virtualization Automation Managed Service Microsoft Office Managed IT Services Computers Facebook Artificial Intelligence Cybercrime Operating System Internet of Things BYOD Wi-Fi Mobile Device Management Health Networking IT Support Hacking Alert Information Technology Covid-19 Information Managed Service Provider Spam Office 365 Telephone Systems Remote Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Router BDR App History Mobile Computing Data Breach Application Password Money Human Resources Encryption Big Data Applications Remote Monitoring Law Enforcement Office Tips Private Cloud Training Blockchain Managed IT VPN Paperless Office Apps How To Remote Computing Mobile Office Data Storage Patch Management Government WiFi Wireless IT solutions Servers Entertainment Website Budget Gmail Bring Your Own Device Data Management Settings Work/Life Balance Data Security Two-factor Authentication Infrastructure Voice over Internet Protocol Mouse HaaS Google Drive Vulnerability Flexibility Avoiding Downtime Windows 7 Word Marketing Vendor Management The Internet of Things Lithium-ion battery Save Time Vendor USB Managed Services Telephone System Display Staff Software as a Service Cleaning Firewall Machine Learning Connectivity Remote Work Employee/Employer Relationship Virtual Reality End of Support Apple RMM Physical Security Education Social Safety User Error HIPAA Sports Redundancy Meetings Keyboard Conferencing Data Protection Scam Risk Management Hacker Help Desk CES Botnet Printing IT Plan Document Management DDoS Printer Solid State Drive Wireless Technology Business Technology Content Management Bluetooth How to Downtime Unsupported Software Access Control SharePoint Managed Services Provider Virtual Assistant Charger Data storage Database Authentication Automobile Compliance Customer Service OneNote IT Consultant Computer Care Environment Remote Workers Computing Infrastructure Current Events Fax Server Processor Going Green Telephony Samsung Update Humor SaaS Hard Drive Value Google Docs Battery Shadow IT Identity Theft Spam Blocking Electronic Medical Records Legal Computing Network Congestion Internet Exlporer eWaste Hiring/Firing Augmented Reality Fraud PDF Remote Worker Digital Signage Wearable Technology Virus Proactive IT Cryptocurrency Retail Hard Drives Instant Messaging Unified Threat Management Best Practice Business Intelligence Robot Computer Accessories Excel YouTube Audit Worker Procurement Black Market Biometrics Net Neutrality IT Management Comparison Workplace Strategy Virtual Desktop File Sharing Computer Fan Rootkit Employees Search Employee/Employer Relationships iPhone Camera ISP Inventory Specifications Windows 365 Evernote Benefits Video Conferencing Science ROI Wire Workers Shortcuts FENG Travel Sales Bitcoin Personal Files Printers Cryptomining IBM Millennials Point of Sale Wireless Charging Distributed Denial of Service Smart Technology Customer Relationship Management Printer Server Supply Chain Management Chromecast Flash Smart Office Monitoring Analyitcs Batteries Programming Digitize Colocation Virtual Private Network Uninterrupted Power Supply Software Tips Supercomputer Workforce Windows 8.1 Emails Cables Windows Server 2008 R2 Sync Customer relationships Monitor Email Best Practices IT Assessment Project Management Manufacturing Nanotechnology Telecommuting Antivirus Netflix Cortana Two Factor Authentication Windows 8 Managed IT Service Reputation Security Cameras Streaming Media Root Cause Analysis Digital Signature IT service Computer Tips Virtual CIO Content Music OneDrive Warranty Biometric Security Tech Support HBO Knowledge Google Apps Peripheral Techology Tablet Laptop Skype HVAC Using Data Customers Data loss Analysis Domains Digital Security Cameras Audiobook Troubleshooting Copiers Administrator 5G Outlook Devices Leadership Consultant IaaS Maintenance Analytics Quick Tip Touchpad Start Menu Enterprise Content Management MSP Smartwatch Screen Mirroring Accountants Loyalty Ergonomics Bloatware Best Available Politics Books Development Advertising Microchip OLED Frequently Asked Questions Thought Leadership Credit Cards Password Management Windows 10s Password Manager WIndows 7 PCI DSS Tablets Virtual Machine Mobile Fiber Optics Employee Notifications Cast Multi-Factor Security 2FA Entrepreneur Emergency Messaging Search Engine Cabling Tip of the week Twitter webinar NIST Public Cloud Business Mangement Employer Employee Relationship Shortcut Policy Hypervisor Professional Services Cost Management Trend Micro Relocation Smart Tech Assessment Trending Dark mode Amazon Social Networking SMS Default App Windows Server 2008 Addiction Recycling User PowerPoint Procedure Video Games Windows Media Player Saving Time Tools Shopping Wiring Google Search Practices Television dark theme Worker Commute Amazon Web Services Running Cable Experience AI IT Infrastructure Cache Safe Mode Bing Criminal Managing Stress FinTech Scalability Memory Social Network GDPR Hosted Computing Public Computer Business Owner Online Shopping Transportation Cameras Investment NarrowBand Regulations Wireless Internet

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code