Skip to main content
Log in

Postdigital war beneath the sea? The Stack’s underwater cable insecurity

  • Original Article
  • Published:
Digital War Aims and scope Submit manuscript

Abstract

This article addresses the problem of undersea cable security, arguing that for almost a century undersea cables have been the playground of major states that have enjoyed the practice of cable interference as part of international conflict. Over the last two decades, it has been a major source of intelligence for organisations like NSA and GCHQ, and so there has been a reluctance to advance international legalisation in this area. Nonetheless, the effect of this has been a failure to protect the digital global commons, and as a consequence, the level of risk to critical infrastructure is growing. The use of cables for intelligence gathering has resulted in a legal regime that is patchy and piecemeal, reflecting a general conspiracy of silence amongst major states about intelligence and its interplay with international law, very much raising questions about the interplay of hardware and software sovereignty with the declining sovereignty of states in modern geopolitics defined by the additional problem of the emergency of the looming ecological disaster. Ultimately, we argue that the end of the digital, through its dependency and risk to the Earth layer, poses critical questions regarding emergent postdigital battlefields, right at the heart of the deep materiality of computation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Aid, Matthew. 2009. The Secret Sentry. New York: Bloomsbury.

    Google Scholar 

  • Amoore, Louise. 2018. Cloud geographies: Computing, data, sovereignty. Progress in Human Geography 42 (1): 4–24.

    Article  Google Scholar 

  • Bratton, B. 2015. The Stack: On Software and Sovereignty. Cambridge, MA: MIT Press.

    Google Scholar 

  • Bradlee, Ben. 1996. A Good Life: Newspapering and Other Adventures. NY: Simon and Schuster.

  • Brennan, Anna Marie. 2018. Transnational Terrorist Groups and International Criminal Law. London: Routledge.

    Book  Google Scholar 

  • Clark, Bryan. 2016. Undersea cables and the future of submarine competition. Bulletin of the Atomic Scientists 72 (4): 234–237.

    Article  Google Scholar 

  • Davenport, Tara. 2015. Submarine cables, cybersecurity and international law: An intersectional analysis. Cath. UJL & Tech 24: 57.

    Google Scholar 

  • Foster, Peter. 2011. Cloud Computing—A Green Opportunity or Climate Change Risk? The Guardian. 18 August. https://www.theguardian.com/sustainable-business/cloud-computing-climate-change. Accessed 18 May 2020.

  • Goodman, Michael, and Huw Dylan. 2016. British intelligence and the fear of a Soviet attack on allied communications. Cryptologia 40 (1): 15–32.

    Article  Google Scholar 

  • Hamilton, Col Shane P., and Usaf Lt Col Michael P. Kreuzer. 2018. The big data imperative. Air and Space Power Journal 32 (1): 4–20.

    Google Scholar 

  • Hantover, Lixian Loong. 2013. The cloud and the deep sea: How cloud storage raises the stakes for undersea cable security and liability. Ocean and Coastal Law Journal 19: 1.

    Google Scholar 

  • Martinage, Robert. 2015. Under the sea: The vulnerability of the commons. Foreign Affairs 94: 117.

    Google Scholar 

  • Matis, Michael S. 2012. The protection of undersea cables: A global security threat. Dissertation, Army War College, Carlisle Barracks Pa.

  • Matsakis, Louise. 2018. What would really happen if Russia Attacked Undersea Internet Cables. Wired, 5 January. https://www.wired.com/story/russia-undersea-internet-cables/. Accessed 18 May 2020.

  • Mosco, Vincent. 2005. The Digital Sublime: Myth, Power, and Cyberspace. Boston: MIT Press.

    Google Scholar 

  • Muneez, Mohamed, Ir Vinesh Thiruchelvam, and Nai Shyan Lai. 2018. On pervasive trenching technologies to bury optical fibre networks at sea. Journal of Marine Environmental Engineering 10 (2): 85–96.

    Google Scholar 

  • Paglen, Trevor. (n.d.) ‘Project Trevor Paglen’ TBA21 Journals. https://www.tba21.org/journals/article/trevorpaglen. Accessed 18 May 2020.

  • Rankin, Nicholas. 2008. Churchill’s Wizards: The British Genius for Deception 1914–1945. London: Faber & Faber.

    Google Scholar 

  • Sechrist, Michael. 2010. Cyberspace in Deep Water: Protecting Undersea Communication Cables by Creating an International Public-Private Partnership. Harvard Kennedy School of Government. https://www.belfercenter.org/sites/default/files/files/publication/PAE_final_draft_-_043010.pdf. Accessed 18 May 2020.

  • Starosielski, Nicole. 2015. The Undersea Network. Durham: Duke University Press.

    Book  Google Scholar 

  • Sunak, Rishi. 2017. Undersea Cables: Indispensible, Insecure. London, Policy Exchange. https://policyexchange.org.uk/wp-content/uploads/2017/11/Undersea-Cables.pdf. Accessed 18 May 2020.

  • Timmons, Heather. 2008. Ruptures call safety of Internet cables into question. The New York Times. 4 February. https://www.nytimes.com/2008/02/04/technology/04iht-cables.4.9732641.html.

  • Wrathall, Laurence Reza. 2010. The vulnerability of subsea infrastructure to underwater attack: Legal shortcomings and the way forward. San Diego International Law Journal 12 (1): 223–262.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Athina Karatzogianni.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aldrich, R.J., Karatzogianni, A. Postdigital war beneath the sea? The Stack’s underwater cable insecurity. Digi War 1, 29–35 (2020). https://doi.org/10.1057/s42984-020-00014-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s42984-020-00014-x

Keywords

Navigation