Tag
undersea cable security

China’s Undersea Cable Sabotage
By Mercy A. Kuo
Insights from Raymond Powell.

Another Severed Submarine Cable Raises Alarm in Taiwan
By Brian Hioe
A series of incidents, both at home and in Europe, stoked concerns about Chinese attempts to disrupt telecommunications in Taiwan.

Chinese Vessel Suspected of Damaging European Submarine Cables
By Shannon Tiezzi
European officials have suggested that the severing of two separate cables in the Baltic was “sabotage.” The Yi Peng 3 is the prime suspect.

Securing Submarine Cables: A Critical Imperative for Indo-Pacific Stability
By Jihoon Yu
Submarine cables are the unsung heroes of the digital age, enabling the connectivity that drives economic growth and societal development.

Undersea Cables are Increasingly Critical and Vulnerable
By Rajeswari Pillai Rajagopalan
Undersea cables must be understood as critical infrastructure, and their vulnerability – to intentional tampering and accidental damage – acknowledged.
Page 1 of 1