Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Fishing Nets May Be the Greatest Security Threat to the Internet [Video]

b2ap3_thumbnail_internet_under_the_sea_400.jpgMany countries around the world have access to the Internet, but have you stopped to consider how this service is deployed and connected to countries on different continents? Well, this is only made possible by the countless miles of wire laid beneath the surface of the ocean, all around the world. In fact, it’s somewhat unnerving to think that international communications depend on the structural integrity of cables submerged at the bottom of the sea.

Like a mighty sea serpent, the Internet’s cables snake around the globe, connecting countries and online infrastructures to ensure global communication. The majority of transoceanic communications, including phone calls, emails, and just about any Internet transmission, is dependent on the well-being of these cables. As reported by WIRED, the first telegraph wire was initially laid across the Atlantic Ocean in 1866, and others soon followed, laid across common trade routes. In the 1950s, the standard for overseas cabling shifted to coaxial cables, which were capable of carrying telephone conversations. Today, the world uses fiber-optic cables that are used to transfer enormous amounts of data relatively quickly.

Here’s a video of how these cables are laid:

And a map of where they’re all located:

As you can expect, these Internet cables have become important staples for how society communicates on an international scale. Still, doesn’t it seem strange that such important pieces of technology are left at the mercy of the ocean? Most people don’t bother to remember that the cables exist until a problem happens and a connection goes down. More often than not, people only take interest in the cables when something goes wrong with them, but it’s a fairly common occurrence for submarines and international powers to take an interest in them.

As reported by WIRED, the following problems are fairly common threats for the Internet cables: seismic activity, various undersea creatures (namely sharks - you know, the scary ones with teeth), and international intervention. By far, though, the most common problem for the undersea cables comes in the form of ship anchors and fishing nets. Between the two, they make up about 60 percent of all cable destruction. This is the primary reason why most sea charts will mark the location of these wires; since, as you can imagine, cutting them has some pretty dire consequences.

Cutting undersea cables would probably make for a great sabotage trick for an international conflict, but such activities haven’t occurred since the previous World War. These days, the cables are typically left untouched and forgotten about, though occasionally the media will make a scene about submarines sniffing around near the cables. What are your thoughts on these undersea cables? Do you think there should be a more efficient manner of deploying information across the world? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Virtualization Tech Term Saving Money Holiday Gadgets Social Media Chrome Managed Service Managed IT Services Automation Microsoft Office Computers Facebook Artificial Intelligence Operating System Cybercrime BYOD Internet of Things Mobile Device Management Networking IT Support Wi-Fi Hacking Health Information Spam Office 365 Telephone Systems Alert Remote Information Technology Managed Service Provider Covid-19 Router BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Remote Monitoring Mobile Computing Law Enforcement Application App History Password Money Big Data Data Breach Human Resources Encryption Applications Mobile Office Government How To Private Cloud Office Tips Managed IT Data Storage Training Patch Management VPN Apps Blockchain Paperless Office Remote Computing Flexibility Mouse HaaS Data Security Marketing WiFi Infrastructure IT solutions Avoiding Downtime Voice over Internet Protocol Entertainment Website Budget Wireless Vulnerability Bring Your Own Device Data Management Work/Life Balance Windows 7 Gmail Word Settings Servers Two-factor Authentication Google Drive Sports HIPAA Employee/Employer Relationship Remote Work Social Redundancy Connectivity RMM Keyboard User Error Meetings USB Risk Management Hacker Save Time Data Protection The Internet of Things Conferencing Lithium-ion battery Cleaning Scam Vendor Firewall Managed Services End of Support Vendor Management Display Education Physical Security Virtual Reality Telephone System Staff Software as a Service Apple Safety Machine Learning Compliance Hard Drive Computer Accessories Network Congestion PDF Update eWaste OneNote Computer Care Current Events Proactive IT Telephony Google Docs Identity Theft Samsung Computing Best Practice YouTube Printer Wearable Technology Black Market Value Bluetooth Retail Hard Drives Spam Blocking Instant Messaging Electronic Medical Records Augmented Reality Digital Signage Fraud Robot Excel Document Management Solid State Drive Biometrics Wireless Technology Hiring/Firing Remote Worker How to Virtual Desktop Downtime IT Consultant Cryptocurrency Procurement Humor Net Neutrality DDoS Data storage Workplace Strategy Automobile SharePoint Comparison Help Desk Business Intelligence Printing CES Computing Infrastructure Audit Going Green Worker IT Management Customer Service Environment Business Technology Managed Services Provider Content Management Botnet Access Control Database Battery IT Plan Fax Server Shadow IT Virtual Assistant Legal Remote Workers Authentication SaaS Unsupported Software Internet Exlporer Processor Virus Charger Unified Threat Management Bloatware Peripheral Sync Digital Signature Emails Digital Security Cameras Warranty Managing Stress Using Data Copiers HVAC 5G Google Apps Relocation Tablets Entrepreneur Two Factor Authentication Quick Tip Analysis Cameras Netflix Smartwatch Video Games Root Cause Analysis Ergonomics Administrator Devices Development Enterprise Content Management OLED Worker Commute HBO Shortcut Knowledge Music Cost Management PCI DSS MSP Virtual Machine Experience Skype Accountants Thought Leadership Employee Scalability Data loss Credit Cards Social Networking 2FA Microchip Fiber Optics Messaging Password Management Cabling Business Owner Outlook Password Manager Leadership Troubleshooting Multi-Factor Security NarrowBand Policy Hypervisor Start Menu Printer Server Twitter Running Cable Search Screen Mirroring Loyalty Dark mode Search Engine Trend Micro Books SMS NIST Default App Frequently Asked Questions Business Mangement iPhone Memory Windows 10s Trending Procedure Saving Time Mobile Smart Tech Addiction Google Search Cast Amazon dark theme Shopping Emergency AI IT Infrastructure Tip of the week Recycling Files webinar Public Cloud Chromecast Employer Employee Relationship FinTech Wiring Professional Services Practices Bing Cache Amazon Web Services Assessment Science Social Network Uninterrupted Power Supply Safe Mode Investment Windows Server 2008 Criminal Colocation Employees GDPR Employee/Employer Relationships Tools Hosted Computing Wireless Internet ISP Distributed Denial of Service Online Shopping Customer Relationship Management Monitor Television Windows 365 Analyitcs Video Conferencing File Sharing Consultant ROI Specifications Programming Sales Camera Bitcoin Inventory Analytics Shortcuts Wire Cryptomining Evernote Reputation Public Computer Point of Sale Streaming Media Personal Tech Support Transportation Supply Chain Management Best Available Content Regulations Travel Antivirus Techology Computer Fan Millennials Laptop Rootkit Monitoring Printers WIndows 7 Batteries Smart Office Wireless Charging Customers Windows 8.1 Windows 8 Digitize Benefits Windows Server 2008 R2 Audiobook IT service Workers FENG Workforce Touchpad Customer relationships Virtual Private Network Manufacturing Cables IBM Email Best Practices Tablet IT Assessment Smart Technology Politics Flash Domains Advertising Telecommuting Windows Media Player Computer Tips Project Management User Managed IT Service Nanotechnology PowerPoint Security Cameras OneDrive Biometric Security IaaS Software Tips Cortana Maintenance Supercomputer Virtual CIO Notifications

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code