How the Internet Works and Why the Answer is Alarming

A map of the global oceanic telecommunications network. Potential vulnerabilities of the Internet’s physical infrastructure are extensive and largely unknown. (Wikimedia Commons/Rarelibra)

Where does the Internet come from?

Think about this question for a moment. While the answer may seem obvious, the John Q. Public will likely stumble through an explanation of satellite technology and “Wi-Fi clouds” as though the Internet were some fantastical intangibility. In a way it is; the Internet is a remarkable human invention – used by 81% of Americans on a daily basis – yet our understanding is remarkably limited. This je ne sais pas quoi that makes the world go round is in fact a physical architecture; 500,000 miles of undersea fiber-optic cables connect the US and Singapore, Egypt and Brazil, Japan and India. These cables, which carry 90% of Internet data around the world, are vulnerable.

How do these cables work? On a micro scale, the email you send from a coffee shop in San Francisco to your colleague in Beijing travels overland to an Internet exchange facility operated by a telecommunications company, then through their facility, across the Pacific Ocean in two-inch fiber-optic cable laid along the ocean floor, out through another exchange facility in Shanghai, and overland to your colleague’s computer. And by the way, minute strands of glass carrying data via light at different wavelengths transmit that very email. For the technologically naïve, the process of sending an email certainly is magical, but it is also tangible.

What are probable threats to the cable system?

(1) Natural disasters. One would think that telecommunication cables are secure; however, the vast majority of cables lie on the ocean floor, exposed to everything from shark bites to cyclones. In 2006, an underwater landslide between Taiwan and the Philippines inflicted damage on 19 of 20 nearby cables. 90% of the region’s Internet capacity was cut for a period ranging from one to thirty days.

(2) Accidents. The most common cause of cable damage is an accident. For instance, fishing vessels often rip lines when removing cages and nets. Larger vessels slice cables with their anchors, accounting for 70% of all incidents. However, even the most innocent damaging of a cable can have major ramifications. For instance, a 75-year-old woman in Georgia (the country) severed an underground Internet cable while digging for copper in her backyard. The result? The entire state of Armenia was without Internet for five hours.

(3) Attack on the underwater cables. The image of an Al-Qaeda operative in scuba gear cutting wires off the shores of New York City is as fantastical as it is frightening. The cables transmit such high voltage that an attempt to snip the cable with wire cutters would be suicidal. However, the threat of a terrorist attack on cables is still very real. Terrorists could drag a ship’s anchor, deploy a bomb, or use some other means to impair the cables. The location of every cable is publicly available information (because ships and fishermen need to know where not to drop anchor), and thus targeting the cables becomes a matter of creativity and execution.

(4) Attack on the exchange facility. Cables typically emerge from the ocean at private telecommunication exchange facilities, which, despite being heavily guarded, are vulnerable to attacks. For instance, Verizon Terremark’s headquarters in Miami contain 90% of the telecommunication cables between North and Latin America, servers for Facebook and the US Department of Defense, and vital infrastructure for global financial transactions. Were Terremark’s facilities to be compromised, everything from your bank account to US national security would be threatened. In short, global operations on a micro and macro scale would be compromised.

internet
Left: The New York Stock Exchange. (Kevin Hutchinson/Wikimedia Commons) Right: A Google server facility (Sivaserver/Creative Commons). An attack on the Internet’s physical infrastructure affecting either system would have disastrous global consequences.

How can American Internet security be bolstered?

Shortly after his first inauguration, President Obama highlighted the potential risks of a web-operated world: “America’s economic prosperity in the 21st century will depend on cybersecurity. And this is also a matter of public safety and national security. We count on computer networks to deliver our oil and gas, our power and our water. We rely on them for public transportation and air traffic control. Yet we know that cyber intruders have probed our electrical grid and that in other countries cyber attacks have plunged entire cities into darkness.”

An attack on oceanic cables could cripple infrastructure and threaten national security plunging the nation into darkness. So how can the US limit attacks? For one, the US must increase cyber security funding in both the physical and network dimensions of the Internet system. The US government is aware of threats of cyber attacks, such as malware infiltrating nuclear facilities or worms penetrating electrical infrastructure. However, physical attacks, though less likely, could be far more damaging. Thus, the protection of cables must be a priority, and at least the partial responsibility, of the US security community rather than private telecommunication companies. Second, redundancy of the cable system will limit the potency of any terrorist attack. Currently, when one cable is severed, telecommunications are routed around the crippled zone. Though Internet service may be delayed, the global system remains fully operational. At certain “choke points” throughout the world, such as near the Suez Canal where only three cables connect the Mediterranean to East Africa and South Asia, a series of cable breaks would be catastrophic. Thus, greater cable redundancy across a variety of geographic zones is imperative in an effort to eliminate the “choke point” threat.

In sum, the US government must pay greater attention to physical Internet security. As it stands now, an enemy with a boat may be the greatest single threat facing domestic – and global – operations.

Comments

Thomas D. Armstrong

Thomas D. Armstrong earned dual BA degrees in History and International Relations from the University of Southern California. During his time at USC, Thomas twice traveled to China, including a Critical Language Scholarship from the US Department of State to intensively study Mandarin at Suzhou University. Additionally, Thomas studied European foreign and security policy at Vrije Universiteit Brussel and interned at the Egmont Institute, a Belgian think tank. In recognition of his international pursuits and scholarship while on campus, including a thesis on the Sino-American relationship during World War II, Thomas was honored as a USC Global Scholar. From 2014-2015, he served as the Editor-in-Chief of Glimpse from the Globe. Thomas currently works for a cyber-economic consulting practice in the Washington, DC area.