The Internet Has a Physical Body and It Is Vulnerable
There is a persistent myth that the internet exists in the cloud — ethereal, distributed, impossible to disrupt. The reality is that 95% of intercontinental data traffic, including financial transactions worth $10 trillion daily, flows through approximately 550 undersea fiber optic cables lying on the ocean floor. These cables are typically the diameter of a garden hose, often buried in shallow coastal waters but exposed on the deep ocean floor, and they represent the single most consequential infrastructure vulnerability in the modern world. In 2026, state actors have moved from surveilling these cables to actively threatening them.
The Cable Map and Its Chokepoints
Undersea cables are not uniformly distributed. They concentrate at chokepoints dictated by geography, economics, and historical routing decisions. The Strait of Malacca, the Red Sea, the English Channel, the Luzon Strait between Taiwan and the Philippines, and the approaches to major landing stations in New York, Marseille, Mumbai, and Singapore represent critical nodes where cable density creates both redundancy and concentrated vulnerability. An adversary does not need to cut every cable. Severing a cluster of cables at a single chokepoint can isolate entire regions from the global internet and financial system.
The Luzon Strait: Ground Zero
The Luzon Strait carries 90% of the cable traffic connecting Northeast Asia — Japan, South Korea, Taiwan — to the rest of the internet. These cables transit waters where Chinese naval forces operate daily and where a Taiwan contingency would concentrate military activity. In any conflict scenario involving Taiwan, these cables would be among the first casualties, whether through deliberate sabotage or collateral damage from naval operations. The concentration of critical communications infrastructure in contested waters represents a strategic vulnerability that has no adequate redundancy solution.
🔒 Protect Your Digital Life: NordVPN
Your internet traffic travels through undersea cables that state actors actively monitor. Intelligence agencies have tapped these cables since the Cold War. NordVPN encrypts your data end-to-end, ensuring that even if cable traffic is intercepted, your communications remain private.
Incidents and Escalation Patterns
The pattern of suspicious cable incidents has accelerated dramatically since 2023. The Nord Stream pipeline sabotage in 2022 demonstrated that undersea infrastructure could be attacked with impunity — no state has been publicly held accountable. Since then, cable breaks near Taiwan, in the Baltic Sea, off the coast of Norway, and in the Red Sea have exhibited characteristics inconsistent with accidental anchor strikes or natural causes. Russian research vessels and Chinese fishing fleets have been observed operating near cable routes immediately before disruptions. Attribution remains difficult because the ocean is vast, cable breaks can look accidental, and the forensic evidence degrades rapidly in saltwater.
The Russian Submarine Threat
Russia operates the world's most capable fleet of submarines designed for undersea infrastructure operations. The Losharik and its replacement platforms can operate at depths exceeding 6,000 meters — well below the depth of most cable routes. The Main Directorate of Deep-Sea Research (GUGI) operates these vessels outside normal naval command structures, providing plausible deniability. NATO has tracked Russian submarine activity near cable routes in the North Atlantic, Norwegian Sea, and Mediterranean with increasing frequency since 2024. The question is not whether Russia can cut undersea cables. It is when and under what circumstances Moscow would choose to exercise that capability.
Surveillance: The Cable Tapping Problem
Cutting cables is the blunt instrument. Tapping them is the sophisticated one. The NSA's cable tapping program, revealed by Edward Snowden in 2013, demonstrated that signals intelligence agencies have been intercepting undersea cable traffic for decades. Fiber optic tapping requires physical access to the cable and sophisticated optical splitting equipment, but it is technically achievable and has been operationally demonstrated. Chinese and Russian intelligence services are assessed to have developed comparable capabilities. The cables are not just vulnerable to disruption — they are active intelligence collection platforms for every major signals intelligence agency on earth.
Defense and Resilience Measures
Governments have begun responding to the cable threat with varying degrees of urgency. NATO established the Critical Undersea Infrastructure Coordination Cell in 2023 and has expanded its mandate annually since. The United Kingdom created a dedicated cable protection vessel fleet. The United States is investing in cable route diversification and landing station hardening. Japan and Australia are funding new cable routes that avoid the most contested chokepoints. Private cable operators — primarily the tech giants Google, Meta, Microsoft, and Amazon, which now own or co-own the majority of new cable capacity — are investing in route redundancy and rapid repair capabilities.
The Repair Gap
There are approximately 60 cable repair ships in the world. A coordinated attack on multiple cables would overwhelm global repair capacity within hours. Repair operations take days to weeks depending on depth and damage extent. During that time, traffic would reroute through surviving cables, creating congestion that degrades service quality for entire continents. Financial markets would experience latency increases that could trigger algorithmic trading failures. Military communications that transit commercial cable infrastructure — and a surprising volume does — would be disrupted. The repair gap is the unsolved problem in cable resilience, and no amount of investment in current ship-building timelines can close it before 2030.
The Satellite Alternative Myth
Satellite constellations like Starlink are sometimes cited as a backup to undersea cables. They are not. Total global satellite bandwidth in 2026 is approximately 5 terabits per second. A single modern undersea cable carries 250 terabits per second. All existing and planned satellite constellations combined cannot replace even a small fraction of undersea cable capacity. Satellites provide critical connectivity for remote areas and military operations, but they are not a substitute for cables and will not be for decades, if ever. The cables are irreplaceable, and defending them is not optional.
Strategic Implications
The undersea cable vulnerability inverts traditional assumptions about geography and power projection. Nations that once derived security from ocean barriers now face threats through those same oceans. The infrastructure that enables global commerce and communication is simultaneously the infrastructure that an adversary can hold at risk with relatively modest capabilities. A submarine, a remotely operated vehicle, or even a modified fishing vessel can threaten cables that carry trillions of dollars in daily transactions. This asymmetry — cheap threats against expensive infrastructure — is the defining characteristic of undersea cable warfare in 2026, and no government has yet developed a comprehensive strategy to address it.
