Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Fishing Nets May Be the Greatest Security Threat to the Internet [Video]

b2ap3_thumbnail_internet_under_the_sea_400.jpgMany countries around the world have access to the Internet, but have you stopped to consider how this service is deployed and connected to countries on different continents? Well, this is only made possible by the countless miles of wire laid beneath the surface of the ocean, all around the world. In fact, it’s somewhat unnerving to think that international communications depend on the structural integrity of cables submerged at the bottom of the sea.

Like a mighty sea serpent, the Internet’s cables snake around the globe, connecting countries and online infrastructures to ensure global communication. The majority of transoceanic communications, including phone calls, emails, and just about any Internet transmission, is dependent on the well-being of these cables. As reported by WIRED, the first telegraph wire was initially laid across the Atlantic Ocean in 1866, and others soon followed, laid across common trade routes. In the 1950s, the standard for overseas cabling shifted to coaxial cables, which were capable of carrying telephone conversations. Today, the world uses fiber-optic cables that are used to transfer enormous amounts of data relatively quickly.

Here’s a video of how these cables are laid:

And a map of where they’re all located:

As you can expect, these Internet cables have become important staples for how society communicates on an international scale. Still, doesn’t it seem strange that such important pieces of technology are left at the mercy of the ocean? Most people don’t bother to remember that the cables exist until a problem happens and a connection goes down. More often than not, people only take interest in the cables when something goes wrong with them, but it’s a fairly common occurrence for submarines and international powers to take an interest in them.

As reported by WIRED, the following problems are fairly common threats for the Internet cables: seismic activity, various undersea creatures (namely sharks - you know, the scary ones with teeth), and international intervention. By far, though, the most common problem for the undersea cables comes in the form of ship anchors and fishing nets. Between the two, they make up about 60 percent of all cable destruction. This is the primary reason why most sea charts will mark the location of these wires; since, as you can imagine, cutting them has some pretty dire consequences.

Cutting undersea cables would probably make for a great sabotage trick for an international conflict, but such activities haven’t occurred since the previous World War. These days, the cables are typically left untouched and forgotten about, though occasionally the media will make a scene about submarines sniffing around near the cables. What are your thoughts on these undersea cables? Do you think there should be a more efficient manner of deploying information across the world? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Managed IT Services Windows Phishing Upgrade Outsourced IT Data Backup Ransomware Windows 10 Server Save Money Data Recovery Cloud Computing Office Windows 10 Passwords Chrome Virtualization Gadgets Saving Money Holiday Social Media Tech Term Microsoft Office Managed IT Services Automation Managed Service Operating System Computers Facebook Artificial Intelligence Cybercrime Hacking Internet of Things BYOD Wi-Fi Mobile Device Management Networking Health IT Support Managed Service Provider Remote Spam Office 365 Covid-19 Telephone Systems Alert Information Information Technology Social Engineering Mobility Router BDR Bandwidth Employer-Employee Relationship Recovery Encryption Data Breach Applications Big Data Remote Monitoring Law Enforcement Mobile Computing App History Application Password Money Human Resources Remote Computing Mobile Office Government Blockchain Private Cloud How To Paperless Office Office Tips Training Managed IT VPN Data Storage Apps Patch Management Two-factor Authentication Google Drive Servers Mouse HaaS Avoiding Downtime Data Security Flexibility Marketing WiFi IT solutions Entertainment Wireless Website Budget Bring Your Own Device Data Management Gmail Work/Life Balance Infrastructure Voice over Internet Protocol Settings Vulnerability Windows 7 Word Education Physical Security Virtual Reality Safety Apple Data Protection Sports HIPAA Social Vendor Management Redundancy Keyboard User Error Meetings Vendor Managed Services Display Risk Management Telephone System Hacker Staff Software as a Service Save Time Machine Learning Remote Work The Internet of Things Employee/Employer Relationship Connectivity Lithium-ion battery USB RMM Cleaning Conferencing Firewall Scam End of Support SaaS IT Management Remote Worker Internet Exlporer Cryptocurrency Botnet IT Plan Procurement Workplace Strategy Network Congestion Net Neutrality PDF eWaste Unsupported Software Help Desk Comparison Proactive IT Printing Charger CES Best Practice Virus YouTube Compliance Computer Care Managed Services Provider Business Technology Content Management Unified Threat Management Black Market Wearable Technology OneNote Retail Current Events Hard Drives Access Control Computer Accessories Telephony Instant Messaging Database Robot Samsung Virtual Assistant Excel Remote Workers Document Management Authentication Solid State Drive Wireless Technology Biometrics Virtual Desktop Value Processor How to Downtime Printer Spam Blocking Bluetooth Electronic Medical Records Hard Drive Data storage Update DDoS Automobile SharePoint Hiring/Firing Google Docs Identity Theft Computing Computing Infrastructure Going Green IT Consultant Customer Service Environment Humor Business Intelligence Fax Server Augmented Reality Battery Fraud Shadow IT Digital Signage Worker Legal Audit Procedure Public Computer Saving Time Consultant Tablet Smart Tech Trending Amazon Regulations dark theme Domains Shopping Politics Transportation Google Search Addiction Analytics Advertising Rootkit IT Infrastructure Recycling Computer Fan AI IaaS FinTech Maintenance Wiring Best Available Bing Practices Notifications Amazon Web Services Workers Social Network WIndows 7 Bloatware Benefits Cache Investment Safe Mode Criminal FENG Employees IBM Employee/Employer Relationships GDPR Tablets Hosted Computing Relocation Online Shopping Flash Windows 365 Entrepreneur Smart Technology ISP Wireless Internet ROI File Sharing Video Games Video Conferencing Software Tips Sales Shortcut Supercomputer Bitcoin Camera Worker Commute Shortcuts Inventory Specifications PowerPoint Evernote Windows Media Player Sync Point of Sale Emails Personal User Experience Cost Management Cryptomining Wire Social Networking Scalability Travel Supply Chain Management Monitoring Batteries Printers Business Owner Millennials Wireless Charging NarrowBand Windows 8.1 Netflix Digitize Managing Stress Two Factor Authentication Smart Office Windows Server 2008 R2 Search Running Cable Root Cause Analysis HBO Customer relationships Knowledge Virtual Private Network Memory Music Cameras iPhone Workforce Cables Skype Email Best Practices IT Assessment Manufacturing Data loss Outlook Computer Tips Leadership Managed IT Service Project Management Troubleshooting Security Cameras Nanotechnology Files Telecommuting Biometric Security Cortana Chromecast Start Menu Virtual CIO OneDrive Peripheral Loyalty Science Digital Signature Screen Mirroring Uninterrupted Power Supply Frequently Asked Questions Digital Security Cameras Using Data Warranty Books Printer Server Colocation 5G HVAC Google Apps Mobile Windows 10s Copiers Cast Quick Tip Customer Relationship Management Analysis Monitor Distributed Denial of Service Tip of the week Ergonomics webinar Administrator Analyitcs Emergency Smartwatch Devices Employer Employee Relationship OLED Enterprise Content Management Professional Services Public Cloud Development Programming PCI DSS Assessment Virtual Machine MSP Accountants Reputation Streaming Media Credit Cards Tech Support Windows Server 2008 2FA Fiber Optics Microchip Content Employee Thought Leadership Cabling Password Management Techology Password Manager Laptop Tools Antivirus Messaging Policy Television Hypervisor Windows 8 Customers Multi-Factor Security Dark mode IT service Trend Micro Search Engine Audiobook Twitter Default App NIST Business Mangement Touchpad SMS

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code