Feeds

Three simultaneously cut undersea cables under repair

Traffic disrupted between Europe and Middle East

  • alert
  • submit to reddit

The essential guide to IT transformation

Ships have begun repair work on three undersea cables that carry voice and internet traffic between Europe and the Middle East and Asia after they were severed on Friday.

A robot submarine dispatched by France Telecom has arrived at a location in the Mediterranean Sea where it will locate the ends of two broken cables and bring them to the surface and reconnect them, the BBC reports. A separate ship commissioned by Reliance Communications of India is on its way to repair the third cable, Reuters said. The companies said the work wasn't likely to be completed until the end of the year, a delay that means communications in the Middle East and parts of South Asia could remain spotty.

A submarine robot named Hector is beginning the repairs on the SeaMeWe-3 and SeaMeWe-4, which are cables owned by a consortium of telecommunications companies and operated by France Telecom. A third cable known as FLAG is under separate ownership and operated by a unit of Reliance. The cables were cut within a few minutes of each other, sparking theories that a a fishing net or anchor of a single ship cut all three.

Internet communications to the same region took a major hit in January when four underseas cables were seriously damaged in less than a week. The number of failures in such a short period of time stoked conspiracy theories that they were the result of saboteurs, but experts say it's not uncommon to experience multiple breaks in region given the narrowness and shallowness of the route the cables take.

"The odds are whatever cut one cable cut the other two at the same time, be it a fishing boat, or be it an anchor," said Stephan Beckert, a research director at the TeleGeography Research Group, which provides consulting to major network operators.

For the time being, some companies are re-routing traffic between Europe and Asia, and between Europe and the Middle East, through the US or other out-of-the-way destinations. Companies that don't have redundancy contingencies in place are simply unreachable.

Telecommunications companies are in the process of building four new cables in the region, which are slated to be up and running in the next nine to 18 months, Beckert said. Until then, damage to any of the cables currently in use is likely to result in significant disruptions. ®

The essential guide to IT transformation

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE accused of silencing customer gripes on social media pages
Hello. HELLO. Can EVERYTHING EVERYWHERE HEAR ME?!
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
Shoot-em-up: Sony Online Entertainment hit by 'large scale DDoS attack'
Games disrupted as firm struggles to control network
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
Broadband slow and expensive? Blame Telstra says CloudFlare
Won't peer, will gouge for Internet transit
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.