The Unseen Battlefield: How Computer Science and Geopolitics Collide in the Defense of Undersea Cables
In the silent, crushing depths of our oceans lies the true backbone of the 21st-century world: a sprawling, continent-spanning network of undersea fiber-optic cables. These conduits, often no thicker than a garden hose, are the unsung heroes of our digital age, carrying over 99% of all international data. From trillions of dollars in daily financial transactions to sovereign military communications and the very fabric of the internet, our global society is woven together by these submerged information superhighways. Yet, this critical infrastructure, largely out of sight and out of mind, represents one of the most significant and complex frontiers in the intersection of computer science and international security.
The defense of these vital assets is a multi-layered challenge, waged on physical and digital fronts simultaneously. It is a domain where the abstract logic of algorithms meets the harsh realities of marine environments and the murky depths of geopolitical competition. The security of this network relies not just on naval patrols and hardened landing stations, but on a sophisticated arsenal of computer science-driven technologies—from AI-powered threat detection and quantum encryption to autonomous robotic patrols. This article delves into the intricate world of undersea cable defense, exploring the technologies, the threats, and the complex web of international cooperation and competition that defines this critical, invisible battlefield.
A Legacy of Connection and Conflict: The Historical Context of a Modern-Day Arterial Network
The story of undersea cables is not a new one; it is a narrative that has been unfolding since the mid-19th century. The first successful transatlantic telegraph cable, laid in 1858, was a marvel of its time, reducing the transmission of a message from weeks to mere minutes. This revolutionary technology, initially carrying simple telegraph signals on copper wires, fundamentally altered the landscape of global communication, diplomacy, and commerce.
The evolution of this technology has been relentless. The initial copper cores gave way to coaxial cables for telephone traffic in the 1950s, a development that included the deployment of some of the most reliable vacuum tube amplifiers ever designed to boost signals across oceanic distances. The modern era, however, belongs to fiber optics. Beginning in the 1980s, these glass threads, transmitting data as pulses of light, offered a quantum leap in capacity, enabling the internet-driven, data-hungry world we inhabit today. A modern fiber-optic cable can carry terabits of data per second, a capacity thousands of times greater than that of satellites, which, despite their visibility, play a minor role in transoceanic data transmission due to higher latency and lower bandwidth.
This historical progression has always been shadowed by security concerns. From the earliest days, nations understood the strategic value of these connections. During World War I, one of the first acts of hostility by the British was to cut Germany's undersea telegraph cables, effectively severing its direct communication with the outside world and forcing it to rely on wireless signals that could be intercepted. This act of strategic denial underscored a fundamental truth that persists to this day: control the cables, and you control the flow of information.
Today, the stakes are immeasurably higher. The global network comprises approximately 1.2 million kilometers of cable, with over 500 active or planned systems. These are no longer just telegraph or telephone lines; they are the circulatory system of the global economy and the nervous system of international security. Military forces, such as that of the United States, rely heavily on this privately-owned infrastructure to transfer sensitive data from conflict zones to command centers. A disruption in this flow, as seen in 2008 when cable breaks off the coast of Egypt drastically reduced US drone flights in Iraq, can have immediate and direct consequences for military operations on the ground.
The ownership model has also evolved. While historically dominated by telecommunications consortia, today's landscape sees tech giants like Amazon, Google, Meta, and Microsoft as major owners or lessors of undersea bandwidth, reflecting the immense data transfer needs of cloud computing. This confluence of private ownership, critical government reliance, and escalating geopolitical tensions creates a uniquely complex and vulnerable ecosystem.
The Modern Threat Matrix: A Two-Pronged Assault on Undersea Infrastructure
The threats facing this vital network are twofold, existing in both the physical and the digital realms. While accidental damage has historically been the most common issue, the rise of sophisticated state and non-state actors has brought the specter of malicious attacks into sharp focus.
The Physical Battlefield: From Anchors to Sabotage
The most frequent cause of cable disruption is accidental damage. Each year, between 100 and 200 faults are reported globally, with the majority attributed to commercial fishing and shipping activities. Trawlers dragging nets across the seabed and ships dropping anchor in poorly charted or congested areas account for a significant portion of these incidents. Natural disasters, such as underwater earthquakes and landslides, also pose a significant risk, as demonstrated by an outage in West Africa in March 2024 attributed to seismic activity.
However, it is the threat of intentional damage that raises the most alarm in international security circles. The strategic vulnerability of these cables is not lost on potential adversaries. Concerns have been repeatedly raised about nations like Russia and China developing capabilities to conduct malicious attacks. Russia's specialized intelligence ships, like the Yantar, and its fleet of deep-sea submersibles are believed to be actively mapping critical infrastructure on the seabed, potentially as a precursor to sabotage in a time of conflict. An attack could be designed to "disrupt Western life and gain leverage," a concern that has grown since the 2022 invasion of Ukraine.
Recent incidents have highlighted the ambiguity and challenge of attribution in this domain:
- The Red Sea, 2024: In February and March 2024, at least four major submarine cables were damaged in the Red Sea, a critical chokepoint for data traffic between Europe and Asia. Initial speculation pointed to deliberate sabotage by Houthi rebels, who had been attacking commercial shipping in the area. However, the more likely cause was determined to be the dragging anchor of the Rubymar, a commercial vessel that was itself damaged by a Houthi missile attack and subsequently sank. This incident, while likely accidental in its direct mechanism, demonstrated how regional conflicts can create a cascade effect, leading to severe disruptions of critical global infrastructure. The incident impacted an estimated 25% of traffic in the region, forcing data to be rerouted through longer and more congested paths.
- The Matsu Islands, 2023: In February 2023, two submarine cables connecting Taiwan's Matsu Islands to its main island were severed, an act attributed to Chinese fishing and cargo vessels. This left the islands' residents with severely limited internet connectivity for nearly 50 days, highlighting the vulnerability of island territories and the potential for such disruptions to be used as a form of "gray-zone" aggression, short of outright military conflict.
- The Baltic Sea, 2022 & 2024: A series of incidents in the Baltic Sea, including damage to cables connecting Finland, Estonia, and Sweden, have been attributed to a Chinese cargo vessel dragging its anchor. These events, along with the 2022 sabotage of the Nord Stream gas pipelines, have heightened European awareness of the vulnerability of their undersea infrastructure.
These cases illustrate a critical challenge: the difficulty in distinguishing between accidents and deliberate acts, providing plausible deniability for aggressors.
The Digital Battlefield: Breaching the Gates of Global Data
While physical attacks are a significant concern, the cybersecurity of the submarine cable ecosystem presents an equally, if not more, complex challenge. The targets are not just the cables themselves, but the entire infrastructure that supports them, from the landing stations where they connect to terrestrial networks to the sophisticated software that manages the flow of data.
Cable Landing Stations (CLS): The Vulnerable Nexus: The CLS is the point where the immense data-carrying capacity of a submarine cable is funneled into the domestic internet infrastructure. These sites are high-value targets. A physical attack on a CLS could be devastating, but the cyber threats are more insidious. The U.S. Office of the Director of National Intelligence (ODNI) classifies the risk of cyberattacks against landing stations as "high." These stations house critical equipment, including Power Feeding Equipment (PFE) and Submarine Line Terminal Equipment (SLTE), which are essential for the cable's operation. A successful intrusion could allow an attacker to intercept data, disrupt traffic, or even gain control over the network management systems. Security at these hardened facilities is paramount, encompassing physical access controls, video surveillance, and robust cybersecurity measures to protect against both external hacking and insider threats. Network Management Systems (NMS) and Operations Centers (NOCs/SOCs): The flow of data through submarine cable networks is managed by sophisticated Network Management Systems, often operated from centralized Network Operations Centers (NOCs). Increasingly, these systems are remotely controllable, which introduces new vectors for cyberattacks. A "nightmare scenario" for security experts involves an attacker gaining administrative control of an NMS. This could allow them to monitor, divert, or even delete the wavelengths used to transmit data, effectively causing a "kill click" that blinds a portion of the network.To counter these threats, cable operators rely on a combination of NOCs, which focus on network performance and uptime, and Security Operations Centers (SOCs), which are dedicated to monitoring for and responding to cyber threats. A modern, security-aware NOC for a subsea cable system provides 24/7 monitoring, fault management, performance analysis, and security oversight, often adhering to international standards like ISO 27001. These centers are the nerve centers of the network, employing cyber threat intelligence and sophisticated analytics to proactively identify and mitigate risks.
Data Interception and Espionage (Tapping): The idea of "tapping" a fiber-optic cable on the deep seabed is technically challenging and expensive, but not beyond the capabilities of a well-resourced state actor. However, a more feasible approach for intelligence gathering is to compromise the data at or near the cable landing stations, where the optical signals are converted and processed. Even with strong encryption, the threat of "Store Now, Decrypt Later" (SNDL) attacks is a growing concern. In an SNDL attack, an adversary captures vast amounts of encrypted data with the expectation that future advances in computing, particularly the development of quantum computers, will allow them to break the encryption and access the stored information. Network Protocol Exploitation: The internet's routing infrastructure itself can be weaponized. Border Gateway Protocol (BGP), the protocol that manages how packets are routed across the internet, is notoriously insecure. Through "BGP hijacking," an attacker can illegitimately reroute internet traffic, forcing data that would normally travel through a secure submarine cable to pass through infrastructure under their control for inspection or manipulation. This type of attack highlights how vulnerabilities in the higher layers of the internet protocol stack can be used to undermine the security of the physical infrastructure.The Computer Scientist's Arsenal: A High-Tech Defense in the Deep
Defending this vast and vulnerable network requires a sophisticated fusion of technologies, drawing heavily on cutting-edge developments in computer science. The defense is multi-layered, addressing both the physical security of the cables and the cybersecurity of the data they carry.
Defending the Physical Cable: Sensors, AI, and Autonomous Systems
The first line of defense is knowing what is happening around the cables in real-time. This requires turning the passive infrastructure into an active sensor network.
Distributed Acoustic Sensing (DAS): This transformative technology effectively turns a fiber-optic cable into a continuous string of thousands of virtual microphones. DAS works by sending laser pulses down a spare "dark fiber" within the cable and analyzing the backscattered light. Tiny vibrations or strain on the cable—caused by a ship's anchor dragging, a submarine passing nearby, or even seismic activity—alter the backscattered light in a measurable way. By analyzing these changes using advanced signal processing algorithms, operators can detect and precisely locate a disturbance with a spatial resolution of just a few meters over distances of up to 150-200 kilometers.From a computer science perspective, DAS involves:
- Signal Processing: Sophisticated algorithms are needed to filter out background noise from the vast amount of data generated and to identify the unique acoustic signatures of different events (e.g., distinguishing a fishing trawler from an underwater vehicle).
- Machine Learning: AI models can be trained on these acoustic signatures to automatically classify threats and alert operators to anomalous activity, such as a vessel loitering in a restricted area or exhibiting unusual movement patterns near a cable.
- Autonomous Navigation: AUVs must navigate in a GPS-denied environment. They use a combination of Inertial Navigation Systems (INS), Doppler Velocity Logs, and advanced algorithms like Simultaneous Localization and Mapping (SLAM) to determine their position. For cable inspection, they can use sensor fusion techniques, combining data from magnetic sensors that detect the cable's electromagnetic field with sonar and computer vision to track the cable's path.
- Computer Vision and Machine Learning: Onboard cameras, coupled with machine learning algorithms (often Convolutional Neural Networks), allow an AUV to visually detect a cable on the seafloor, identify signs of damage such as abrasions or excessive bending, and flag anomalies for human review. This automates a process that would otherwise be painstakingly manual.
- Intelligent Mission Planning: Advanced AUVs can autonomously plan their inspection routes. For example, if a cable's location is only approximately known, the AUV can execute a search pattern, detect the cable, and then automatically plan a new trajectory to follow it, all without human intervention.
Securing the Data: A Multi-Layered Cyber Defense
Protecting the data that transits the cables requires a defense-in-depth cybersecurity strategy, implementing security controls at multiple layers of the network stack.
Encryption at the Core: The fundamental defense for data confidentiality is encryption. Several protocols are used to secure traffic over and between cable networks:- MACsec (Layer 2): Media Access Control Security operates at the data link layer, encrypting traffic on a hop-by-hop basis between two connected devices (e.g., within a cable landing station or between a CLS and a data center). Because it operates at a low level and is often implemented in hardware, MACsec offers very high performance and low latency, protecting against threats like eavesdropping and man-in-the-middle attacks on a specific link.
- IPsec (Layer 3): Internet Protocol Security operates at the network layer and is commonly used to create secure "tunnels" across untrusted networks, such as the public internet. It provides end-to-end security between networks or hosts and is a foundational technology for many Virtual Private Networks (VPNs).
- TLS (Layers 4-7): Transport Layer Security is the encryption protocol that secures most of the web traffic we use daily (seen as HTTPS). It operates at the application layer, providing end-to-end encryption between a client and a server.
A comprehensive security architecture will use a combination of these protocols. For example, data might be encrypted with TLS at the application level and then transported through an IPsec tunnel that is, in turn, running over a series of MACsec-protected physical links.
Software-Defined Networking (SDN): SDN is a network architecture that separates the network's control plane (which decides where traffic goes) from the data plane (which forwards the traffic). This allows for centralized, software-based management of the entire network. From a security perspective, SDN offers significant advantages for submarine cable networks. A centralized SDN controller has a holistic view of the network, enabling intelligent and automated security policy enforcement. If a threat is detected on one part of the network, the controller can instantly re-route traffic, isolate the affected segment, or apply new security rules across the entire infrastructure, providing a level of agility and responsiveness that is difficult to achieve with traditional network architectures. The Quantum Frontier: Preparing for a New Paradigm: The most significant long-term threat to current data security is the advent of quantum computers. A sufficiently powerful quantum computer could theoretically break many of the mathematical algorithms that underpin today's public-key encryption standards, rendering much of our secure communication vulnerable. This has spurred a two-pronged development effort in the computer science community to create "quantum-safe" security.- Quantum Key Distribution (QKD): QKD is a technology that uses the principles of quantum mechanics to securely distribute cryptographic keys. It works by encoding key information onto individual photons. According to the laws of quantum physics, any attempt by an eavesdropper to observe these photons in transit will inevitably disturb their state, which can be detected by the legitimate users. This allows for the creation of a shared secret key with provable security against eavesdropping. Successful QKD transmissions have been demonstrated over deployed submarine fiber optic cables, including a 96-km link between Malta and Sicily, proving its feasibility in real-world infrastructure. However, significant challenges remain, including distance limitations and the difficulty of integrating QKD systems with existing networks that contain optical amplifiers, which disrupt the fragile quantum states.
- Post-Quantum Cryptography (PQC): PQC, also known as quantum-resistant cryptography, involves developing new cryptographic algorithms that are thought to be secure against attacks by both classical and quantum computers. Unlike QKD, which requires new quantum hardware, PQC is based on mathematical problems that are believed to be hard for even quantum computers to solve. These algorithms can be implemented on existing classical computer systems, making them a more readily deployable solution for upgrading the security of submarine cable traffic in the near term. The National Institute of Standards and Technology (NIST) is in the process of standardizing several PQC algorithms to prepare for this transition.
The Geopolitical Chessboard: International Law, Alliances, and a New Era of "Cable Diplomacy"
The defense of undersea cables cannot be achieved by technology alone. It requires a robust framework of international law, strategic alliances, and coordinated policy.
The Law of the Sea and Its Gaps: The primary international treaty governing the oceans is the 1982 United Nations Convention on the Law of the Sea (UNCLOS). UNCLOS grants all states the freedom to lay and maintain submarine cables on the high seas and on the continental shelf. It also requires states to enact laws that make it a punishable offense to willfully or through culpable negligence break or injure a submarine cable. However, UNCLOS has significant limitations. It primarily governs the actions of states and their flagged vessels, and it lacks effective enforcement mechanisms, especially for acts of sabotage in international waters where attribution is difficult. Furthermore, it does not adequately address the actions of non-state actors or the complex cybersecurity threats that have emerged since the treaty was drafted. The Role of International and Regional Bodies:- The International Cable Protection Committee (ICPC): Founded in 1958, the ICPC is the leading organization representing the owners of 98% of the world's undersea telecommunications cables. It plays a crucial role in promoting the security and resilience of this infrastructure by developing and sharing best practices for cable route planning, installation, and protection. The ICPC facilitates information exchange between industry and governments and advocates for legal frameworks that protect cables.
- NATO: The North Atlantic Treaty Organization has increasingly recognized the vulnerability of undersea infrastructure as a key security challenge. In 2023, NATO established a Maritime Centre for the Security of Critical Undersea Infrastructure. This center aims to enhance threat monitoring, share best practices among allies, and deter potential aggressors. NATO's involvement signals the securitization of this domain and a collective will to defend these vital assets.
- The European Union: The EU has also launched its own action plan to bolster the security of its submarine cables. This plan focuses on four pillars: prevention, detection, response/repair, and deterrence. Key initiatives include funding for new "smart" cables with integrated sensors, creating an integrated surveillance mechanism using satellite and naval intelligence, and establishing a reserve fleet of cable repair vessels. The EU has allocated hundreds of millions of euros through programs like the Connecting Europe Facility (CEF) Digital to support these efforts.
- FCC Licensing: Any cable landing in the United States requires a license from the Federal Communications Commission (FCC). This licensing process has become a key tool for national security reviews. The FCC is currently in the process of a major overhaul of its submarine cable rules for the first time in over two decades, proposing stricter requirements for cybersecurity risk management plans, more detailed reporting on foreign ownership, and expanded oversight.
- The Committee for the Assessment of Foreign Participation in the United States Telecommunications Services Sector (CAFPUSTSS): Known informally as "Team Telecom," this interagency committee, chaired by the Attorney General and including the Secretaries of Defense and Homeland Security, reviews FCC applications for national security and law enforcement risks. The committee was formalized by an executive order in 2020 and now has a structured process and timelines to assess potential threats from foreign ownership or control of telecommunications infrastructure, including submarine cables. This process has been used to impose security agreements on companies or, in some cases, to recommend the denial of applications involving entities deemed to be a high risk, particularly those with ties to China.
- Legislative and Programmatic Efforts: Congress has also taken action, introducing legislation like the Undersea Cable Control Act to prevent foreign adversaries from acquiring technologies related to cable construction and maintenance. Programs like the Cable Security Fleet were created to ensure the availability of trusted, U.S.-flagged vessels for cable repair in times of national emergency, although funding for such programs can be a subject of political debate.
This complex interplay of international law, alliances, and national regulations forms the governance layer of undersea cable defense, shaping investment, deployment, and security standards on a global scale.
Conclusion: Securing the Digital Lifelines of a Connected World
The vast, silent network of undersea cables is a testament to human ingenuity and a cornerstone of our interconnected world. Yet, its fragility presents one of the most pressing and multifaceted security challenges of our time. The defense of this critical infrastructure is not merely a matter of naval hardware or physical barriers; it is a battle fought with the tools of computer science. It is fought with algorithms that can hear a threat miles away through the whispers of light in a glass fiber, with autonomous robots that can navigate the crushing depths to perform delicate repairs, and with cryptographic protocols designed to withstand the theoretical power of computers that do not yet exist.
The intersection of computer science and international security in this domain is profound. The development of AI-driven monitoring, autonomous systems, and quantum-safe cryptography is a race to stay ahead of adversaries who are constantly seeking new ways to exploit physical and digital vulnerabilities. Simultaneously, the geopolitical landscape is being redrawn along these very cable routes, with nations engaging in a new form of "cable diplomacy" and competition to control the physical infrastructure that underpins the digital world.
Moving forward, ensuring the security and resilience of this network will require a holistic and collaborative approach. This means continued investment in research and development of defensive technologies. It requires strengthening international legal frameworks and fostering deeper cooperation between governments and the private companies that own and operate this infrastructure. It demands a clear-eyed assessment of the risks posed by both state and non-state actors and the development of robust strategies for deterrence and response.
The digital lifelines that crisscross the ocean floor are too vital to be taken for granted. Their protection is a shared responsibility, a continuous effort to secure not just strands of glass, but the very foundation of our global economy, our international security, and our shared digital future. The battle for the deep is underway, and its outcome will be determined not only in the corridors of power but in the lines of code that protect our world's unseen and indispensable arteries.
Reference:
- https://www.mdpi.com/1424-8220/16/8/1335
- https://www.mdpi.com/1996-1073/16/17/6172
- https://journals.aps.org/prapplied/abstract/10.1103/PhysRevApplied.20.044052
- https://www.pnas.org/doi/10.1073/pnas.1818752116
- https://www.mdpi.com/2077-1312/12/11/2002
- https://www.researchgate.net/publication/3927638_Autonomous_underwater_vehicles_for_submarine_cable_inspection_experimental_results
- https://www.marketsandmarkets.com/ResearchInsight/ai-impact-analysis-on-submarine-cable-system-industry.asp
- https://www.aspi.org.au/opinion/reconsider-using-undersea-cables-military-sensors
- https://www.numberanalytics.com/blog/ultimate-guide-submarine-networks-optical-communications
- https://www.pipelinepub.com/network-evolution-and-optimization/cable-landing-stations/2
- https://www.leadventgrp.com/blog/big-data-and-ai-in-submarine-power-cable-monitoring-and-predictive-maintenance
- https://www.mitre.org/sites/default/files/2024-05/PR-24-0996-DSR-Subsea%20Cables.pdf
- https://www.preprints.org/manuscript/202408.1568/v1
- https://www.megaport.com/blog/comparing-encryption-in-transit-options/
- https://www.clearnetwork.com/security-soc-vs-network-operations-center-noc/
- https://journalwjarr.com/sites/default/files/fulltext_pdf/WJARR-2025-0460.pdf
- https://www.researchgate.net/publication/388420509_Underwater_Cyber_Warfare_Submarine_Communications_Cables_Architecture_and_Cybersecurity_Analysis
- https://thinkpalm.com/blogs/software-defined-networking-sdn-the-future-of-network-management-and-security/
- https://xsitemodular.com/the-cable-landing-station-is-critical-infrastructure/
- https://totaltele.com/cyber-and-other-threats-to-submarine-cables/
- https://qbn.world/tackling-challenges-in-qkd-integration-and-eavesdropping-insights-and-recommendations-from-the-squad-workshop/
- https://indigotg.com/subsea/
- https://techneconomyblog.com/2025/04/01/submarine-cable-sensing-for-strategic-infrastructure-defense-and-arctic-deployment/
- https://subtelforum.com/into-the-future-quantum-technologies-and-the-impact-on-the-resilience-of-the-subsea-cable-system/
- https://maritimeindia.org/underwater-domain-awareness-for-and-by-submarine-communication-cables/
- https://www.apsensing.com/media/1813/download/2025-03%20Enhancing%20Coastal%20Critical%20Infrastructure%20Protection%20with%20Distributed%20Acoustic%20Sensing%20-%20Drapp%20B._DAS_Critical_Infrastructure_Subsea_Cables.pdf?v=1
- https://www.ciena.com/insights/what-is/What-Is-SDN.html
- https://validate.perfdrive.com/?ssa=9efe8781-e3e3-cc6e-f187-f221ac322b2d&ssb=80274288593&ssc=https%3A%2F%2Fopg.optica.org&ssi=bdc1faf8-d3hy-c59c-5508-931d55f06161&ssk=botmanager_support@radware.com&ssm=70455038912667893132181903861931&ssn=001690838200c03e012644b12486190fe5aa8a2eac5a-13df-38fe-da15f4&sso=4c221fe-d6c1-9934aaf01bb6314ea4fc0110e56ea0a3f7a749f3a8c2bdcc&ssp=26134565001750906903175092170859610&ssq=60168184343564301263243434803855936907747&ssr=MTI0LjIxNy4xODkuMTMx&sst=python-requests%2F2.32.3&ssv=&ssw=
- https://www.researchgate.net/publication/381000734_AI-enhanced_subsea_maintenance_for_improved_safety_and_efficiency_Exploring_strategic_approaches/fulltext/6658b0dc0b0d284574757e16/AI-enhanced-subsea-maintenance-for-improved-safety-and-efficiency-Exploring-strategic-approaches.pdf
- https://www.nsa.gov/portals/75/documents/resources/everyone/csfc/capability-packages/MSCCPv1.1_20180626.pdf
- https://www.researchgate.net/publication/376836814_DEVELOPMENT_OF_AUTONOMOUS_UNDERWATER_VEHICLE_AUV_BASED_ON_ROBOTIC_OPERATING_SYSTEM_FOR_FOLLOWING_UNDERWATER_CABLE
- https://www.eiva.com/about/what-we-do/auv-onboard-processing-navigation
- https://iquarobotics.com/use-case-sparus-ii-auv-for-critical-underwater-infrastructure-inspection
- https://www.ciena.com/insights/articles/unlocking-the-macsec-puzzle.html
- https://semiengineering.com/secure-networking-with-macsec-ipsec-and-tls/
- https://www.scribd.com/document/851200061/Interview-questions
- https://maritimafrica.com/en/the-quantum-revolution-and-submarine-cable-cybersecurity-a-looming-challenge/
- https://www.a-star.edu.sg/i2r/research/I2RTechs/research/i2r-techs-solutions/distributed-acoustic-sensing-for-maritime
- https://www.imillerpr.com/news/inoc-launches-noc-services-for-subsea-cable-companies/
- https://www.mdpi.com/1099-4300/25/12/1572
- https://acikerisim.uludag.edu.tr/server/api/core/bitstreams/a414b712-45eb-480f-b33f-114ef7a74e8f/content
- https://www.researchgate.net/publication/3913763_Autonomous_underwater_vehicle_navigation_scheme_for_cable_following
- https://subtelforum.com/te-subcom-announces-new-network-operations-center-solution/