Feeds

Three simultaneously cut undersea cables under repair

Traffic disrupted between Europe and Middle East

  • alert
  • submit to reddit

Security for virtualized datacentres

Ships have begun repair work on three undersea cables that carry voice and internet traffic between Europe and the Middle East and Asia after they were severed on Friday.

A robot submarine dispatched by France Telecom has arrived at a location in the Mediterranean Sea where it will locate the ends of two broken cables and bring them to the surface and reconnect them, the BBC reports. A separate ship commissioned by Reliance Communications of India is on its way to repair the third cable, Reuters said. The companies said the work wasn't likely to be completed until the end of the year, a delay that means communications in the Middle East and parts of South Asia could remain spotty.

A submarine robot named Hector is beginning the repairs on the SeaMeWe-3 and SeaMeWe-4, which are cables owned by a consortium of telecommunications companies and operated by France Telecom. A third cable known as FLAG is under separate ownership and operated by a unit of Reliance. The cables were cut within a few minutes of each other, sparking theories that a a fishing net or anchor of a single ship cut all three.

Internet communications to the same region took a major hit in January when four underseas cables were seriously damaged in less than a week. The number of failures in such a short period of time stoked conspiracy theories that they were the result of saboteurs, but experts say it's not uncommon to experience multiple breaks in region given the narrowness and shallowness of the route the cables take.

"The odds are whatever cut one cable cut the other two at the same time, be it a fishing boat, or be it an anchor," said Stephan Beckert, a research director at the TeleGeography Research Group, which provides consulting to major network operators.

For the time being, some companies are re-routing traffic between Europe and Asia, and between Europe and the Middle East, through the US or other out-of-the-way destinations. Companies that don't have redundancy contingencies in place are simply unreachable.

Telecommunications companies are in the process of building four new cables in the region, which are slated to be up and running in the next nine to 18 months, Beckert said. Until then, damage to any of the cables currently in use is likely to result in significant disruptions. ®

Internet Security Threat Report 2014

More from The Register

next story
TEEN RAMPAGE: Kids in iPhone 6 'Will it bend' YouTube 'prank'
iPhones bent in Norwich? As if the place wasn't weird enough
Consumers agree to give up first-born child for free Wi-Fi – survey
This Herod network's ace – but crap reception in bullrushes
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Sea-Me-We 5 construction starts
New sub cable to go live 2016
New EU digi-commish struggles with concepts of net neutrality
Oettinger all about the infrastructure – but not big on substance
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
EE coughs to BROKEN data usage metrics BLUNDER that short-changes customers
Carrier apologises for 'inflated' measurements cockup
Comcast: Help, help, FCC. Netflix and pals are EXTORTIONISTS
The others guys are being mean so therefore ... monopoly all good, yeah?
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.