Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Home affairs' R10 ID fee is forcing companies to rethink identity verification

      Standard Bank joins smart ID push with fee-free launch

      11 February 2026
      Zscaler assets seized from South African data centres

      Zscaler assets seized from South African data centres

      11 February 2026
      SA app wants to end guesswork in online grocery shopping - We Need Milk CEO Arjan van den Berg

      SA app wants to end guesswork in online grocery shopping

      11 February 2026
      Absa appoints M-Pesa boss to lead personal and private banking - Sitoyo Lopokoiyit

      Absa appoints M-Pesa boss to lead personal and private banking

      11 February 2026
      David Ellison just won't quit

      David Ellison just won’t quit

      11 February 2026
    • World
      EU regulators take aim at WhatsApp

      EU regulators take aim at WhatsApp

      9 February 2026
      Musk hits brakes on Mars mission

      Musk hits brakes on Mars mission

      9 February 2026
      Crypto firm accidentally sends R700-billion in bitcoin to its users

      Crypto firm accidentally sends R700-billion in bitcoin to its users

      8 February 2026
      AI won't replace software, says Nvidia CEO amid market rout - Jensen Huang

      AI won’t replace software, says Nvidia CEO amid market rout

      4 February 2026
      Apple acquires audio AI start-up Q.ai

      Apple acquires audio AI start-up Q.ai

      30 January 2026
    • In-depth
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
    • TCS
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
    • Opinion
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      South Africa’s new fibre broadband battle

      20 January 2026
      AI moves from pilots to production in South African companies - Nazia Pillay SAP

      AI moves from pilots to production in South African companies

      20 January 2026
      South Africa's new fibre broadband battle - Duncan McLeod

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » In-depth » The cloud under the ocean

    The cloud under the ocean

    By The Conversation5 November 2015
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    A submarine cable system coming ashore in Fiji
    A submarine cable system coming ashore in Fiji

    Recently, a New York Times article on Russian submarine activity near undersea communications cables dredged up Cold War politics and generated widespread recognition of the submerged systems we all depend upon.

    Not many people realise that undersea cables transport nearly 100% of transoceanic data traffic. These lines are laid on the very bottom of the ocean floor. They’re about as thick as a garden hose and carry the world’s Internet, phone calls and even television transmissions between continents at the speed of light. A single cable can carry tens of terabits of information per second.

    While researching my book The Undersea Network, I realised that the cables we all rely on to send everything from e-mail to banking information across the seas remain largely unregulated and undefended. Although they are laid by only a few companies (including the American company SubCom and the French company Alcatel-Lucent) and often funnelled along narrow paths, the ocean’s vastness has often provided them protection.

    The fact that we route Internet traffic through the ocean — amid deep-sea creatures and hydrothermal vents — runs counter to most people’s imaginings of the Internet. Didn’t we develop satellites and Wi-Fi to transmit signals through the air? Haven’t we moved to the cloud? Undersea cable systems sound like a thing of the past.

    The reality is that the cloud is actually under the ocean. Even though they might seem behind the times, fibre-optic cables are actually state-of-the-art global communications technologies. Since they use light to encode information and remain unfettered by weather, cables carry data faster and cheaper than satellites. They crisscross the continents too — a message from New York to California also travels by fibr-optic cable. These systems are not going to be replaced by aerial communications anytime soon.

    The biggest problem with cable systems is not technological — it’s human. Because they run underground, underwater and between telephone poles, cable systems populate the same spaces we do. As a result, we accidentally break them all the time. Local construction projects dig up terrestrial lines. Boaters drop anchors on cables. And submarines can pinpoint systems under the sea.

    Most of the recent media coverage has been dominated by the question of vulnerability. Are global communications networks really at risk of disruption? What would happen if these cables were cut? Do we need to worry about the threat of sabotage from Russian subs or terrorist agents?

    The answer to this is not black and white. Any individual cable is always at risk, but likely far more so from boaters and fishermen than any saboteur. Over history, the single largest cause of disruption has been people unintentionally dropping anchors and nets. The International Cable Protection Committee has been working for years to prevent such breaks.

    The Wacs cable coming ashore in 2011 north of Cape Town (image: Aki Anastasiou)
    The Wacs cable coming ashore in 2011 north of Cape Town (image: Aki Anastasiou)

    As a result, cables today are covered in steel armour and buried beneath the seafloor at their shore-ends, where the human threat is most concentrated. This provides some level of protection. In the deep sea, the ocean’s inaccessibility largely safeguards cables — they need only to be covered with a thin polyethylene sheath. It’s not that it’s much more difficult to sever cables in the deep ocean, it’s just that the primary forms of interference are less likely to happen. The sea is so big and the cables are so narrow, the probability isn’t that high that you’d run across one.

    Sabotage has actually been rare in the history of undersea cables. There are certainly occurrences (though none recently), but these are disproportionately publicised. The World War 1 German raid of the Fanning Island cable station in the Pacific Ocean gets a lot of attention. And there was speculation about sabotage in the cable disruptions outside Alexandria, Egypt in 2008, which cut 70% of the country’s Internet, affecting millions. Yet we hear little about the regular faults that occur, on average, about 200 times each year.

    Redundancy provides some protection
    The fact is it’s incredibly difficult to monitor these lines. Cable companies have been trying to do so for more than a century, since the first telegraph lines were laid in the 1800s. But the ocean is too vast and the lines simply too long. It would be impossible to stop every vessel that came anywhere near critical communications cables. We’d need to create extremely long, “no-go” zones across the ocean, which itself would profoundly disrupt the economy.

    Fewer than 300 cable systems transport almost all transoceanic traffic around the world. And these often run through narrow pressure points where small disruptions can have massive impacts. Since each cable can carry an extraordinary amount of information, it’s not uncommon for an entire country to rely on only a handful of systems. In many places, it would take only a few cable cuts to take out large swathes of the Internet. If the right cables were disrupted at the right time, it could disrupt global Internet traffic for weeks or even months.

    The thing that protects global information traffic is the fact that there’s some redundancy built into the system. Since there is more cable capacity than there is traffic, when there is a break, information is automatically rerouted along other cables. Because there are many systems linking to the US, and a lot of Internet infrastructure is located here, a single cable outage is unlikely to cause any noticeable effect for Americans.

    Any single cable line has been and will continue to be susceptible to disruption. And the only way around this is to build a more diverse system. But as things are, even though individual companies each look out for their own network, there is no economic incentive or supervisory body to ensure the global system as a whole is resilient. If there’s a vulnerability to worry about, this is it.The Conversation

    • Nicole Starosielski is assistant professor of media, culture and communication at New York University
    • This article was originally published on The Conversation


    Nicole Starosielski Wacs
    WhatsApp YouTube Follow on Google News Add as preferred source on Google
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleCrimson Peak takes high-gothic crown
    Next Article MTN toys with idea of dual-Sim phones

    Related Posts

    Bandwidth bonanza: the undersea cables that connect SA to the world

    Bandwidth bonanza: the undersea cables that connect South Africa to the world

    12 July 2024
    Starlink is already at capacity in some African cities

    Subsea cable cuts hit Africa again, causing major disruption

    12 May 2024
    Severed West African internet cables repaired

    Severed West African internet cables repaired

    30 April 2024
    Company News

    Why Acer is the strategic choice for South Africa’s educational future

    11 February 2026
    Fyndae is building Africa's human verification layer for community security and collaboration

    Fyndae wants to turn lost-item recovery into Africa’s trust infrastructure

    11 February 2026
    How NEC XON tackled identity risk for a major telco - Michael de Neuilly Rice

    How NEC XON tackled identity risk for a major telco

    11 February 2026
    Opinion
    South Africa's skills advantage is being overlooked at home - Richard Firth

    South Africa’s skills advantage is being overlooked at home

    29 January 2026
    Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

    Why Elon Musk’s Starlink is a ‘hard no’ for me

    26 January 2026
    South Africa's new fibre broadband battle - Duncan McLeod

    South Africa’s new fibre broadband battle

    20 January 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts

    Why Acer is the strategic choice for South Africa’s educational future

    11 February 2026
    Home affairs' R10 ID fee is forcing companies to rethink identity verification

    Standard Bank joins smart ID push with fee-free launch

    11 February 2026
    Zscaler assets seized from South African data centres

    Zscaler assets seized from South African data centres

    11 February 2026
    Fyndae is building Africa's human verification layer for community security and collaboration

    Fyndae wants to turn lost-item recovery into Africa’s trust infrastructure

    11 February 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}