The ROGUCCI Report
The ROGUCCI Report
2
ROGUCCI - THE REPORT ISSUE 1, 2010
3
ROGUCCI - THE REPORT ISSUE 1, 2010
4
ROGUCCI - THE REPORT ISSUE 1, 2010
The ROGUCCI Study and Global Summit Report has been prepared
under the auspices of the IEEE Communications Society . . .
5
ROGUCCI - THE REPORT ISSUE 1, 2010
6
ROGUCCI - THE REPORT ISSUE 1, 2010
Preface
This Report submits twelve bold Recommendations to the private sector, nation-state governments and other
stakeholders for the purpose of promoting the reliability, resilience, robustness and security of the global
interconnectivity that underpins modern society – the world’s undersea communications infrastructure. These
Recommendations are effective, achievable, and urgent.
The urgency is driven by the vital role that global electronic connectivity has in the world’s economy, society and
security. Without reliable international communications services, public welfare is endangered, economic stability is
at risk, other critical sectors are exposed, and nation-state security is threatened. The implementation of The
Report’s Recommendations will significantly reduce these and other risks.
These Recommendations are achievable, yet challenging. Each will require skill, resolve and genuine partnership
among government entities and the private sector. Stakeholders have already demonstrated acceptance of this
challenge with overwhelming support for The Recommendations during the ROGUCCI Global Summit and by a
number of the government and private sector stakeholders volunteering to work on moving the implementation of
several recommendations forward. For each Recommendation, The Report presents a concise background context, a
discussion of alternative approaches and their consequences, next steps to continue the momentum that has been
established during the ROGUCCI process, and measures to gauge progress.
Supporting the twelve recommendations, The Study documents 100 Key Observations. In addition, a major
milestone accomplished during The Study was the confirmation of a comprehensive list of intrinsic vulnerabilities of
undersea communications cable infrastructure using the Eight Ingredient (8i) Framework for Information and
Communications Technology (ICT) Infrastructure. In order to provide more information and updates on follow-up
related to The ROGUCCI Study, the IEEE Communications Society has established a web site (www.ieee-
rogucci.org).
The world’s future communications networks promise to usher in a new world of business and lifestyle-enhancing
capabilities. Many of the benefits have not yet even been imagined. The people of all continents and islands stand
to greatly benefit from the anticipated economic efficiency, citizen connectivity, functional flexibility, and speed. The
Study strongly urges nation-states, the private sector and stakeholders to chart and embark on a new course of
policy and practice that demonstrably supports highly reliable, highly resilient, and highly robust global undersea
communications cable infrastructure.
______________________
KARL FREDERICK RAUSCHER
Principal Author, ROGUCCI Report
General Chairman, ROGUCCI Global Summit
CTO & Distinguished Fellow, EastWest Institute
Bell Labs Fellow
7
ROGUCCI - THE REPORT ISSUE 1, 2010
8
ROGUCCI - THE REPORT ISSUE 1, 2010
9
ROGUCCI - THE REPORT ISSUE 1, 2010
10
ROGUCCI - THE REPORT ISSUE 1, 2010
11
ROGUCCI - THE REPORT ISSUE 1, 2010
Table of Contents
1. EXECUTIVE SUMMARY 18
2. INTRODUCTION 35
2.1 Objectives 35
2.5 Scope 40
2.5.1 Subject Matter Interest 40
2.5.2 Geography 44
2.5.3 Network Types 45
2.5.4 Infrastructure Boundaries 45
2.5.5 Technology 45
2.8 Contributors 54
3.1 Environment 60
3.1.1 Function 60
3.1.2 Intrinsic Vulnerabilities 61
3.1.3 Significant Trends 61
3.2 Power 63
3.2.1 Function 63
3.2.2 Intrinsic Vulnerabilities 64
3.2.3 Significant Trends 64
12
ROGUCCI - THE REPORT ISSUE 1, 2010
3.3 Hardware 65
3.3.1 Function 65
3.3.2 Intrinsic Vulnerabilities 66
3.3.3 Significant Trends 66
3.4 Software 70
3.4.1 Function 70
3.4.2 Intrinsic Vulnerabilities 70
3.4.3 Significant Trends 70
3.5 Network 71
3.5.1 Function 71
3.5.2 Intrinsic Vulnerabilities 71
3.5.3 Significant Trends 71
3.6 Payload 73
3.6.1 Function 73
3.6.2 Intrinsic Vulnerabilities 73
3.6.3 Significant Trends 73
3.7 Policy 75
3.7.1 Function 75
3.7.2 Intrinsic Vulnerabilities 75
3.7.3 Significant Trends 76
3.8 Human 78
3.8.1 Function 78
3.8.2 Intrinsic Vulnerabilities 78
3.8.3 Significant Trends 79
5. RECOMMENDATIONS 98
13
ROGUCCI - THE REPORT ISSUE 1, 2010
5.6 International Communications Infrastructure Standard for the Financial Sector 120
5.8 Improved Cable Protection Agreements, Standards, Policies and Regulations 127
6. SUMMARY 140
7. ACKNOWLEDGEMENTS 141
8. ACRONYMNS 143
A.2 The Historically Common vs. Very Low Probability Events 153
14
ROGUCCI - THE REPORT ISSUE 1, 2010
INDEX 184
15
ROGUCCI - THE REPORT ISSUE 1, 2010
List of Figures
16
ROGUCCI - THE REPORT ISSUE 1, 2010
List of Tables
17
ROGUCCI - THE REPORT ISSUE 1, 2010
1. EXECUTIVE SUMMARY
The Reliability of Global Undersea Communications Cable Infrastructure (ROGUCCI) Report
presents twelve Recommendations to the private sector, nation-state governments and other
stakeholders. These Recommendations, if implemented, will significantly enhance the availability,
resilience, reliability and robustness of the world’s international communications infrastructure.
This guidance is based on broad international stakeholder perspectives, international technical
policy development experience, expertise in emerging technologies and the insights captured in
The Study’s 100 Key Observations. Summary statistics of the ROGUCCI Study are as follows:
6 Continents represented
12 Recommendations articulated (Section 5)
57 Trends affecting infrastructure reliability (Section 3)
79 Intrinsic vulnerabilities considered (Section 3)
100 Key Observations (Section 4)
300+ Contributing international stakeholder experts (Section 2)
10,000+ Distinct data points researched and analyzed during study
30,000,000,000,000+ Bits per second traversing Global Undersea
Communications Cable Infrastructure (GUCCI)
Both developing and established nation-states understand the vital role of modern information
and communications technology (ICT) in providing security and stability, stimulating economic
growth, enhancing education, and fostering the expression and advancement of culture and
society. However, this ICT infrastructure is sharply devalued if it is not connected to the rest of
the world. Nation-states in every part of the globe have a critical need for continuous, reliable
and secure international connectivity. To strive for highly dependable international
communications capabilities is to face enormous technological, economic and political challenges.
To be clear, today’s undersea communications cables have provided a reliable service that is very
dependable. The service is the result of heroic technological breakthroughs and corresponding
diligence in building and operating these vast links that span our planet. Certainly, for the most
part, the countless government agencies, businesses and individuals who rely on the Internet,
global supply chains and modern financial markets everyday have been able to enjoy the luxury of
grossly under appreciating the contributions of this industry to modern society.
18
ROGUCCI - THE REPORT ISSUE 1, 2010
The consequences of the loss of international communications have proven to be severe. Indeed
several large-scale outages have occurred in recent years that have had an unacceptable impact for
those affected (see Appendix A, Appendix C). It has been observed that never before in human
history has mankind so quickly embraced – and become so completely reliant upon – new
technology, as this current generation. And it must be quickly followed with the observation
1
that it is not clear whether civilization can emerge without irreversible consequences from the
widespread catastrophic failure of such technology. Given the utter dependence, recent history
2
of failure, and the reality of latent failure modes, the imperative for The Study could not be more
urgent.
For a nation-state, or other stakeholder such as the financial sector, to simply keep pace with the
accelerating advances of the information and communications industry it must meet many
challenges. However, for a nation-state or stakeholder to ensure highly available and highly
robust global communications, it must do more – including cooperate with international partners
with the same goals. The twelve Recommendations presented in The Report prescribe critical
areas that should receive priority attention to achieve this objective. Because many of these
issues are common across many stakeholders, international cooperation and private sector-
government cooperation are repeated themes throughout The Report.
There appears to be a gap between the growing dependence on international bandwidth and the
reliability of its underpinning infrastructure at a global level. This is not so much that the reliability
of the systems is any less, but that the dependence has grown so great. The industry is keeping
up with the insatiable thirst for bandwidth with heroic advances in technology and deployment of
new systems. However, investment to ensure the resilience at a global level is outside the scope of
those building this increasingly critical international infrastructure.
There is no sufficient alternative back-up in the case of catastrophic loss of regional or global
connectivity. Satellites cannot handle the volume of traffic – the available capacity is not even
close.
1
Kissinger, Henry, Does America Need a Foreign Policy?, 2002.
2
52% of EWI Worldwide Security Conference 7 – Cybersecurity Consultation participants indicated that “the loss of global
connectivity for an extended period of time (e.g., more than a month) would be catastrophic for global society, with irreversible
consequences.” Brussels, February 2010.
19
ROGUCCI - THE REPORT ISSUE 1, 2010
Second, The Study was to be forward-looking in terms of the future needs of society, businesses
and governments. Therefore, The Study factored in numerous trends, such as regional economic
growth hotbeds, skyrocketing bandwidth demand, the shift of network control from being
“silicon”-based (hardware) to being software-based, the emerging capability to provision
bandwidth dynamically, ocean sprawl, increased piracy activity on the high seas, growing
concerns of terrorist activity worldwide, and the disappearance of national network boundaries as
a result of global interconnectivity.
Another principle was to use a worldwide spotlight. To manage discussions of this novel
perspective, a new term (GUCCI) is introduced to refer to the ‘global undersea communications
cable infrastructure.’ In addition to this focus, an appropriate awareness of nation-state
sovereignty was maintained as a consideration for the private sector operation and ownership of
individual international cable systems.
Including all of the various regional insights that were offered was another principle on which
The Study was based. This was accomplished throughout the methodology described below by
seeking and then carefully considering input received from extensive outreach conducted via
diverse means.
Yet another principle was to ensure rich representation of industry, academic and
government perspectives, with care to include both long-established companies as well as new
entrants. Thus, a wide variety of service providers, network operators and equipment suppliers
were engaged. Government perspectives were gleaned from both regulator and stakeholder
agencies. The Study also obtained input from other critical sectors that depend on the
communications sector.
Finally, the approach utilized world-class proficiency in both the technical subject matter and
broader policy areas to ensure the resulting guidance would be both realistic and achievable. The
Study utilized only individuals of the highest caliber of demonstrated competency. For example,
in the unique technical policy development arena, the small core leadership team included
individuals whose high recommendation implementation rate is a matter of public record.
Further, the subject matter expertise of the technical community included subject areas central to
The Study: network reliability and security, infrastructure protection, nation-state security,
emergency preparedness, disaster recovery, emergency communications, ad hoc emergency
networks, hardware and software quality and government-industry collaboration.
Methodology of Study
The methodology used in The Study was designed to support data gathering, validation and
analysis with the aim of developing meaningful guidance. There are several distinguishing
characteristics of The Study’s methodology. First, The Study employed a framework of the
complete list of ingredients that make up undersea communications cable infrastructure:
power, environment, hardware, software, payload, network, human and policy. The striking
advantage of using this framework is that it readily lends itself to the comprehensive listing of
intrinsic vulnerabilities, which are finite – unlike threats, which, for practical purposes, are
20
ROGUCCI - THE REPORT ISSUE 1, 2010
infinite. Present-day security approaches are for the most part founded on the threat side of the
equation, which is derived from historic experience and gathered intelligence. In contrast, the
intrinsic vulnerability approach, rooted in a detailed knowledge of the ingredients that make up a
communications network, permits profoundly higher degrees of confidence in terms of ensuring
reliability and robustness. This focus on vulnerability analysis does not exclude the use of threat
analysis, which draws extensively on observed trends and the subjective perspectives of
individuals. Rather, it uses that knowledge and supplements it with expert knowledge about the
systems that make up communications networks.
Secondly, The Study was heavily dependent on the expertise and experience of a unique
formula of individuals. Specifically, technical and operational experts, government and
financial sector stakeholders, and international policy change agents were integrated throughout
the ROGUCCI process. Experts from all facets of the communications industry were sought out
and engaged. Thousands of years of experience are represented in the contributions made. It is
worth noting that the dimension of experience that was drawn upon is not solely restricted to
years of experience, but breadth of experience as well. Experts with limited years in the industry
but with new and unique perspectives were included in The Study. Future networks will be a
collection of a diverse set of components – analyzing them requires a diverse set of perspectives.
Next, the findings of The Study were facilitated with a wide range of approaches, including
extensive literature research, face-to-face interviews, Internet forums, conference calls and a
Global Summit.
Finally, the three step process of a Study, Global Summit and then Report development and
dispatch played a key role in maintaining focus on the objective of actual improvement of the
infrastructure’s reliability. This process facilitated the development of twelve Recommendations
that are actionable and effective.
In summary, the methodology used throughout The Study is based on proven approaches for
similar highly consequential advisory undertakings regarding critical infrastructures. The 3
framework, range of experience and expertise, personal interaction and recommendation process
enabled a deep dive into the issues facing the world’s electronic connectivity, drew upon the
knowledge of those most familiar with it, and established a model for future cooperation and
sharing.
3
U.S. President’s National Security Telecommunications Advisory Committee (NSTAC) Next Generation Networks (NGN) Task
Force, 2006.
21
ROGUCCI - THE REPORT ISSUE 1, 2010
The Key Observations are presented in four broad categories: Stakeholder, Science &
Engineering, Business & Investment, and Government & Inter-Government. An example for
each of these areas is provided below. Note that each Observation is accompanied with a color
code that signals which of the eight infrastructure ingredients it is tied to.
Stakeholder.
16. Financial Sector Due Diligence. Insufficient reliability data is available for financial
sector and other stakeholders to support needed risk calculations. In order to do
appropriate diligence, stakeholders should be able make statistical predications
regarding the expected frequency and duration of outages and the range of impairments
(e.g., payload latency) that can affect their operations. However, insufficient data is
available to support such analyses.
21. Rare Glimpse of c’s Limit. Usually the speed of light makes communications appear
instantaneous for humans. However, long haul undersea cable systems provide a rare
human experience with the finite nature of the speed of light on the earth. A trip
encompassing the circumference of the earth requires approximately one tenth of a
second – a delay noticeable to a human. During cable failure alternate routes that
require routing over longer distances is common, resulting in latency that is
unacceptable for some real-time sensitive applications.4
74. Specialized Cable Ships. Cable ships and their crews are typically shared resources.
Contention for such limited resources is one of the contributing factors in extended
duration outages, particularly when multiple cuts are involved.
The speed of light is ~3.0 x108 meters/second, which would take 0.13 seconds to travel ~4.0 x 107 meters, the circumference
4
of the earth.
5
Examples include the cable-dense Luzon Strait, Strait of Malacca and Red Sea passages.
22
ROGUCCI - THE REPORT ISSUE 1, 2010
Each Recommendation is supported with a mixture of the Key Observations, knowledge and
experience of the vast expertise engaged, and validation by industry peers and stakeholders. Each
Recommendation is presented in Section 5 with a more complete context – yet in a concise
format (Figure 1).
ROGUCCI Recommendations
1 Rudimentary Geographic Diversity for Global Infrastructure
2 Prioritization for Timely Cable Repairs
3 Preparedness for Hostile Maritime Crisis
4 Best Practices and Trusted Information Sharing
5 New International Governance
6 International Communications Infrastructure Standard for the Financial Sector
7 Measurements for Stakeholder Due Diligence
8 Improved Cable Protection Agreements, Standards, Policies and Regulations
9 Government Inter-Agency Coordination for Undersea Cable Infrastructure
10 Education and Awareness of Critical Role of Undersea Communications Infrastructure
11 Mechanisms for Handling Overload Demand
12 Recognize GUCCI Catastrophic Loss as a Grand Challenge
23
ROGUCCI - THE REPORT ISSUE 1, 2010
1. Rudimentary Geographic Diversity for Cable Infrastructure
“I’ve been in the industry for almost 30 years and always wondered who is worrying about this . . . in
the early years I remember telling my wife . . . but we all seem to accept it.
But one day our hoping may run out.”
Issue
At a global level, the overall interconnectivity of the continents violates a fundamental reliability
design principle – avoid single points of failure. There are several geopolitical chokepoints that funnel
these critical cable paths together. A single disaster in such an area could cause catastrophic loss
of regional and global connectivity.
Purpose
The Recommendation addresses the issue of how to significantly improve the reliability of GUCCI by
addressing unwanted points of concentration through the deployment of geographically diverse routes.
Recommendation
Stakeholders for highly reliable and resilient international communications should actively
promote the deployment of geographically separate cable paths to avoid current single points of
failure, by serving as advocates to the nation-states controlling the lands and waters for potential
alternative, diverse paths.
Required Commitment
The effective implementation of The Recommendation requires the commitments of
stakeholders, governments, the private sector and an effective international policy change agent.
Stakeholders must commit to a course of advocacy to ensure the appropriate governments
understand the geographic concentration risk. Nation-state governments must provide access to
investors and provide assurances for timely ongoing maintenance. Finally, investors must build
out new fiber cable systems in routes providing new geographic diversity.
2. Prioritization for Timely Cable Repairs
“There is no excuse for this . . . and they are hurting the businesses and citizens
of their own country as much as anyone.”
Issue
Bureaucracy of nation-states with territorial water sovereignty too often causes extensive delays in
the restoral of service over damaged undersea communications cables. Repair times are already
long. These delays extend the approval portion from days to weeks or even months.
24
ROGUCCI - THE REPORT ISSUE 1, 2010
Purpose
The Recommendation addresses the issue of how to significantly reduce the average time needed to restore
service after cable damage by addressing the lengthy approval process for cable repair vessels to gain access to
sovereign waters.
Recommendation
Nation-state governments should implement policies and procedures to provide timely approval
to authorized cable ships seeking permission to repair damaged undersea communications cables.
Required Commitment
The effective implementation of The Recommendation requires the commitments of
governments and the private sector. Nation-state governments must conduct advance planning
in anticipation of cable damage, and elevate the priority restoration of undersea communications
cables. They must also provide an efficient and appropriately speedy process for granting
authorized repair vessels access to their sovereign waters, and be willing to compare themselves
to best-in-class benchmarks for timely issuing of permits. Cable ship operators and cable
infrastructure owners must cooperate with government requirements for information, onboard
inspections, escorts and other requests, particularly when opportunities for pro-active
engagement are presented.
3. Preparedness for Hostile Maritime Crises
Issue
Increased hostile activity around the world requires the undersea communications cable industry
to enhance its preparedness for attacks on its specialized cable ships and critical infrastructure.
In addition to the obvious danger to lives and property, such activity could cause long-term
service outages.
Purpose
The Recommendation addresses the issue of how to provide a mechanism for rapid response to hostile
activities against international communications cables or the industry’s specialized cable ships by undertaking
coordination, planning and other emergency preparedness activities.
Recommendation
Nation-state governments should cooperate with each other and private sector undersea
communications cable infrastructure owners and operators to develop maritime crisis
preparedness plans that would protect communications cable vessels that are vital to the
operation of global undersea communications cable infrastructure.
25
ROGUCCI - THE REPORT ISSUE 1, 2010
Required Commitment
The effective implementation of The Recommendation requires the commitments of
governments and the private sector. Nation-state governments must cooperate in establishing
intergovernmental agreements, participating in planning, and being part of periodic simulated
crisis exercises. Owners of cable ships must support effective planning and exercises by making
vessels and critical personnel available. Finally, nation-state governments and cable ship owners
must establish cooperative procedures for maritime crisis response.
4. Best Practices and Trusted Information Sharing
“The Summit made it clear there are real opportunities for improved cooperation.”
Issue
With the enormous challenge of protecting and advancing the reliability of GUCCI, there are
compelling reasons for ensuring that industry peers are well informed, as better awareness can be
critical in optimizing strategies for protection and reliability assurance. This information sharing
is needed on an international basis, as inter-continental undersea cables are by definition
international critical infrastructure.
Purpose
The Recommendation addresses the need to share sensitive information among industry and
government stakeholders, within a trusted environment, enabling all participants to benefit from
this shared body of knowledge that is essential to optimize network reliability and resilience.
Recommendation
The private sector should establish formal means for sharing information that can improve the
protection and rapid restoration of undersea communications cable infrastructure.
Required Commitment
The effective implementation of The Recommendation requires the commitment of the private
sector and nation-state governments. Private sector companies that own and operate undersea
communications infrastructure must jointly establish a trusted environment for sharing
information to improve the protection and rapid restoration of GUCCI. The private sector must
be willing to share threat and outage information within a trusted environment within the
industry for the common good. Nation-state governments must be willing to share threat and
other sensitive information with owners and operators of GUCCI and safeguard information
provided by the industry. Nation-state governments must be willing to share information that
will improve the protection and rapid restoration of critical infrastructure with other nation-states
as well as the owners and operators of that infrastructure within the other nation-states.
26
ROGUCCI - THE REPORT ISSUE 1, 2010
5. New International Governance
“We still have time for private sector leadership here . . . we can avoid inefficient and costly
government oversight if we better organize ourselves and cooperate better.”
Issue
The Report establishes the need for dealing with individual undersea cable systems as an
aggregate, i.e. global level. The need is based on the limited focus of commercial interests that
manage individual systems, the difficulty stakeholders have in performing due diligence in
managing their operational risk and the extremely high level of importance that this infrastructure
plays in the world. Some groups are re-examining their charters to determine how they might
address some of the new or more critical issues of the nature discussed at ROGUCCI Summit.
Observations from financial sector stakeholders were that the undersea communications industry
would benefit from a “system-wide” view, more inclusive participation in industry collaborative
programs, more structured governance, better coordination and a unified voice. Specific mission
areas for new governance would ideally include defining expectations for the industry, engaging
representative stakeholders and articulating agreements, standards, policies and regulations
(ASPR) that would advance GUCCI resilience.
Purpose
The Recommendation addresses the issue of how the undersea communications cable industry
supports the needs of its stakeholders in providing the information they need to manage their
dependence on GUCCI.
Recommendation
The private sector should establish a new international governance framework for global
undersea communications cable infrastructure to provide optimum support for its resilience
through cross-sector coordination and effectively support stakeholder interests.
Required Commitment
The effective implementation of The Recommendation requires the commitment of the private
sector and stakeholders. Stakeholders must maintain a proactive posture in engaging this critical
international infrastructure partner. Existing industry fora must evaluate their charters,
membership and commitments in light of the stakeholder and internal industry needs. Existing
industry fora must, as appropriate, be either willing to make charter and membership
representation adjustments, or be supportive of sister organizations playing new complimentary
roles. Private sector companies must provide expert and leadership resources to champion new
governance functions.
27
ROGUCCI - THE REPORT ISSUE 1, 2010
6. International Communications Infrastructure Standard for the Financial Sector
“We are completely dependent on this. We don’t have any other way.”
Issue
The world’s international undersea communications cable infrastructure continues to operate at
highly reliable levels and continues to provide tremendous service to the financial services sector.
Recommendations 4 and 7 position the communications industry to better share information and
provide needed information to the financial sector, respectively. Correspondingly, this
Recommendation calls on the financial sector to better define its needs and expectations, and to
develop a structure to organize operational risk guidance that allows both providers and users to
manage their growing global dependency on GUCCI.
The implementation of Recommendations 6 and 7 work from the two sides of the same problem.
Purpose
The Recommendation addresses the issue of how the financial sector should manage its
dependence on GUCCI, specifically in the context of an overall improved management program
for its dependence on information and communications technology in general. While one sector
is the focus in The Recommendation, it should be viewed as representative of all international
critical sectors.
Recommendation
The international financial sector should introduce a new core standard for its information and
communications technology dependence that will include guidance on assuring institutional
resilience and managing the operational risk associated with undersea communications cable
infrastructure.
Required Commitment
The effective implementation of The Recommendation requires the commitment of the
international financial sector, international undersea communications cable industry and world’s
economic leaders. The international financial sector must recognize GUCCI reliability as a
strategic priority for the stability of its operations. The international financial institutions must
commit operational risk managers to developing the details of global guidelines. The financial
sector and international communications industry must commit to a partnership to develop a
core standard that both can agree on. The financial sector members must voluntarily implement
the developed core standard. The world’s international financial authorities must utilize these
standards in their determination of ratings and other stability-related decisions.
28
ROGUCCI - THE REPORT ISSUE 1, 2010
7. Measurements for Stakeholder Due Diligence
The implementation of Recommendations 4 and 5 will create structure and spirit to enable this Recommendation to
succeed. Further, Recommendation 6 will be enabled by the implementation of this Recommendation.
Purpose
The Recommendation addresses the issue of how the undersea communications cable industry
supports the needs of its stakeholders by providing the information they need to manage their
dependence on it.
Recommendation
The private sector should establish a method of providing basic reliability performance statistics
to stakeholders.
Required Commitment
The effective implementation of The Recommendation requires the commitment of the
international undersea communications cable industry. Stakeholders must maintain a proactive
posture in engaging critical international infrastructure partners. Private sector companies must
be willing to share the outage information needed to support overall GUCCI performance
measurements, with appropriate non-disclosure agreement protections. Existing industry fora
must evaluate their charters, membership and commitments in light of the stakeholder and
internal industry needs. Existing industry fora must, as appropriate, be either willing to make
charter and membership representation adjustments, or be supportive of sister organizations
playing new complimentary roles. Private sector companies must provide expert and leadership
resources to champion new governance functions.
29
ROGUCCI - THE REPORT ISSUE 1, 2010
8. Improve Cable Protection Agreements, Standards, Policies and Regulations
“If we could just get all of the best policies from around world packaged together,
we could say, ‘Look! Here is what you can do.’ ”
Issue
The protection of undersea cables in international law is well established, dating back to the
1880s. Cable protection laws have been updated with new policy at the international level.
However, too often there is not corresponding nation-state-level policy to match the importance
established at the international level. This is of particular concern because undersea
communications cables are especially vulnerable in the transition from deep water to their landing
site. As a result, avoidable cable damage is routinely experienced.
Purpose
The Recommendation addresses the issue of how to provide better protection of deployed cable
systems using available or new policy instruments.
Recommendation
Nation-state governments should implement best practices for protecting undersea
communications cables within their sovereign waters.
Required Commitment
The effective implementation of The Recommendation requires the commitment primarily of
nation-state governments, but with important support of the private sector. Nation-state
governments must make the protection of undersea communications cable infrastructure a
priority. The private sector must assist the government in understanding the types of damage
experienced. Governments must be able to improve their protection through effective policies
and practices.
9. Government Inter-Agency Coordination for Undersea Cable Infrastructure
30
ROGUCCI - THE REPORT ISSUE 1, 2010
poor coordination among government agencies. It is understandable that each agency will have
its own primary interests. However, this often results in inconsistent policy, confusion and delays.
There are no easy solutions. Drawing attention to this problem is a first step, but it must be
followed with commitments and actions for improvements to be realized. Some of the
opportunities for progress may lie in greater education and awareness among key policy makers
and regulators, the quantification of the negative impact of uncoordinated government, the
private sector’s capture and articulation of the best practices for this area, and public recognition
of role model behavior.
Purpose
The Recommendation addresses the issue of how to transform governments’ lack of inter-agency
coordination when it comes to policy for undersea cable protection.
Recommendation
Nation-state governments and the private sector should establish a best practice model for
undersea communications cable inter-agency coordination to ensure consistent policies and
practices.
Required Commitment
The effective implementation of The Recommendation requires the commitment primarily of
nation-state governments, but with important support of the private sector. Nation-state
governments must make oversight of undersea communications cable infrastructure a priority.
The private sector must assist government in understanding observed inconsistencies and impact,
and provide role model references. Governments must be able to improve their inter-agency
coordination to provide consistent policy and speedy implementation.
10. Education and Awareness of GUCCI Critical Role
“It is not only the general public . . . this CEO of a high tech company
thought that most international communications were over satellites.”
Issue
There is a profound unawareness on the part of the general public, business enterprises, critical
sector stakeholders and government regarding their dependence on undersea communications
cable infrastructure. While the increasing rate of dependence climbs steeply, there is no
corresponding movement in consciousness of the dependence or the risks associated with it
Purpose
The Recommendation addresses the issue of how to close the profound gap between critical
dependence and awareness that stakeholders and the general public have regarding GUCCI.
31
ROGUCCI - THE REPORT ISSUE 1, 2010
Recommendation
The undersea communications cable industry should begin an outreach campaign that provides
appropriate education to government and other stakeholders regarding GUCCI function in the
stability of their operations.
Required Commitment
The effective implementation of The Recommendation requires the commitment primarily of
private sector, but with important support of stakeholders. The undersea communications cable
industry must recognize the unacceptable nature of the existing dependence-unawareness gap,
and commit to action to resolve the under-education of its dependents. Stakeholders must be
diligent in achieving appropriate levels of knowledge regarding their dependence and develop
best management practices regarding their dependence on GUCCI.
11. Mechanisms for Handling Overload Demand
“This is the sort of thing that it is better to plan for and control than the alternative.”
Issue
There are several reasons for increased vigilance regarding future infrastructure congestion. An
overload condition is a very real scenario, which may present itself intermittently in unexpected
fashion, or as a temporary situation due to a specific event. Terrestrial networks have anticipated
the need for managing overloads with the deployment of various mechanisms. How can
international coordination ensure that the communications most critical for continued
government operation and security be maintained?
Purpose
The Recommendation addresses the issue of how to prepare for traffic overload scenarios for the
global undersea communications cable infrastructure.
Recommendation
Network operators, service providers and stakeholders should develop and implement agreed
upon mechanisms for handling traffic overload conditions for undersea communications cable
infrastructure.
Required Commitment
The effective implementation of The Recommendation requires the commitment of nation-state
government and the private sector. Nation-state governments must agree that some
communications are more important than others and therefore require preferential treatment
during times of infrastructure congestion. Nation-state governments must agree with each other
on mutual preferential treatment of so-designated traffic. Nation-state governments must
provide incentives for private sector development and deployment of priority schemes. Nation-
32
ROGUCCI - THE REPORT ISSUE 1, 2010
state governments, stakeholders, network operators and service providers must securely manage
the administration of authorized priority traffic. Service providers and network operators must
implement agreed-upon overload management mechanisms.
12. Recognize GUCCI Catastrophic Loss As a Grand Challenge
Purpose
The Recommendation addresses the concern of preparing for a large-scale loss of the world’s
undersea communications cable infrastructure, by directing stakeholders to prepare for the worst
case scenario and by calling on the scientific and engineering community to respond to a new
grand challenge problem.
Recommendation
Subject Matter Experts and Stakeholders should prepare for the worst-case scenario of a
catastrophic loss of global undersea communications infrastructure by identifying best available
alternatives and operational procedures. Preparation should include scientific and engineering
research for long-term solutions.
Required Commitment
The effective implementation of The Recommendation requires the commitment of
governments, stakeholders and the private sector. Governments and other stakeholders must
encourage academic and private sector research to ensure appropriate resources are focused on
this global challenge. Scientists and engineers must be devoted to developing alternatives.
Stakeholders must conduct planning scenarios that consider true worst-case scenarios. The
financial services sector can play a lead role in helping establish the importance of this concern.
33
ROGUCCI - THE REPORT ISSUE 1, 2010
Summary
This Study submits twelve major Recommendations to the private sector, governments and other
stakeholders - especially the financial sector - for the purpose of improving the reliability,
robustness, resilience and security of the world’s undersea communications cable infrastructure.
In practical terms, these twelve Recommendations are offered as challenges to individuals. These
will be the ones who will need to make the difference when a difference is called for. The senior
leaders and subject matter experts of equipment suppliers, network operators and service
providers; the leaders and participants of the industry’s fora; researchers; consultants in small
firms; government policy makers and staff employees; IT specialists in financial firms; and many
others – all are strongly urged to include this Report in their dialogue and to do so speedily, as
the improvement opportunities described have important benefits to many throughout the world.
Likewise, the consequences have many downsides.
It is encouraging that at the time of this Report dispatch, a number of private sector interests
have indicated their willingness to take the next steps suggested for several Recommendations.
Each of The Recommendations should be considered and acted upon with urgency proportional
to the vital role that international communications networks and services will play in the future.
The critical priority for implementation is clear. Without reliable international communications
networks and services, public welfare is endangered, economic stability is at risk, other critical
sectors are exposed, and nation-state security is threatened. The implementation of this Report’s
Recommendations will significantly reduce these and other risks. Each of the twelve
Recommendations is both challenging and achievable. The intent of the ROGUCCI process
from the beginning has been to improve the world’s communications. Successful
implementation of each Recommendation will significantly improve the reliability and robustness
of communications services for the citizens around the world. However, each will require skill,
resolve and genuine partnership among government entities, stakeholders and the private sector.
This Study strongly urges the private sector, governments and other stakeholders to chart and
embark on a new course of policy and practice that forcefully advocates highly available, highly
reliable, highly robust, highly resilient and highly secure international communications
infrastructure.
34
ROGUCCI - THE REPORT ISSUE 1, 2010
2. INTRODUCTION
The ROGUCCI (ro–goo–che) process objectives, scope and methodologies are presented in this section.
This material is essential for understanding the supporting work behind The Report’s guidance. It can be
used as background and reference material for readers who prefer to focus on The Recommendations in
Section 5.
To assist with the discussion of the aggregation of individual undersea cable systems and the concept of a
single infrastructure, the term ‘GUCCI’ (goo–che) is here introduced as an acronym for ‘global undersea
communications cable infrastructure.’
2.1 Objectives
Each of these objectives was achieved as is documented in The Report. The reliability of the
infrastructure is reviewed in Section 3, Analysis of Undersea Communications Infrastructure, with the Intrinsic
Vulnerability approach that not only provides a systematic structure, but also comprehensive coverage.
Additional tutorial-level background as well as advanced information is provided in Section 4, Key
Observations. The impacts of potential failures are discussed throughout and specifically in Appendix C.
Section 5, Recommendations, provides guidance to the private and public sector for improving the reliability,
resilience and robustness of GUCCI.
While The Recommendations cover gaps needing to be addressed at a global infrastructure level, it is
important to recognize that there are many aspects of the industry that are highly effective in delivering
reliable infrastructure and services. To start, the market forces that shape the primary supply chain
interfaces between ‘the equipment supplier and network operator,’ ‘the network operator and the service
provider,’ and ‘the service provider and the end user’ have been effective in achieving the current high
levels of reliability. These market forces include immediate awareness of outages due to their observability
through service impact; competition from alternative service providers, network operators and equipment
suppliers; and an improved return on investment for highly reliable systems, networks and services6
[Figure 2].
6
Exceptions to this are described in Key Observations 71.
35
ROGUCCI - THE REPORT ISSUE 1, 2010
Technology advances as well as healthy commercial relationships have enabled this industry to grow, be
trusted, and ultimately become the underpinning of the global economy. The history of GUCCI has
witnessed its maturing with time and investments along an “S-curve” to produce resilience at a remarkable
level. This achievement is particularly noteworthy given the nature of the challenges faced, such as
extreme dimensions of length and depth, harsh environments and gigantic load. However, forces
preventing further advances are limiting the current performance level [Figure 3]. These forces involve
realms that are outside the industry’s core competencies – i.e. engineering, operations, management, legal
– and are outside the supplier-operator, operator-provider and provider-user relationships. One such
limiting outside force is geopolitical interest. These limiting forces are identified, explored and addressed
in The Study.
The dramatic increasing dependency upon GUCCI makes it imperative that these forces be overcome so
that correspondingly fresh levels of reliability, resilience and robustness can be achieved [Figure 4]. It is in
this way that the ROGUCCI process is complimentary to the many existing activities currently under way
that promote the reliability of this infrastructure. The Recommendations presented in The Report, if
implemented, will provide breakthroughs to improve reliability. Together they offer a new “S-curve”
opportunity that can build upon achievements to date and enable access to higher performance at a global
level.
36
ROGUCCI - THE REPORT ISSUE 1, 2010
37
ROGUCCI - THE REPORT ISSUE 1, 2010
First, the focus is at the global level. The first objective was to look holistically at the undersea
communications cable infrastructure, i.e. at a global level, as distinguished from a focus on individual
undersea communications cable systems, which are often international. The former considers the
aggregation of all international systems. This undertaking was significant because most reliability work in
this arena is done at the individual system level for specific deployed technology. In this way The Report
complements existing mechanisms and forces in play throughout the relationships between equipment
suppliers and network operators, between network operators and service providers, and between service
providers and customers.
Second, consideration is given to “things that can happen, that have not yet.” This is significant
because of the relatively rare frequency of failures within this infrastructure and the ever-increasing
dependence upon it. Diligent exploration was made of failure types and modes that are latent within the
infrastructure. This was accomplished through a disciplined Intrinsic Vulnerability approach and through
comprehensive coverage provided by using the Eight Ingredient (8i) Framework to ensure inclusion of all
possible contributors to downtime (Section 3).
A third distinction of the approach is openness to consider and address areas previously
“untouchable.” This brought The Study into areas beyond the current discussion of improvement areas.
Most notably, The Study addressed constraints imposed by geopolitical perceptions and realities.
A fourth difference in the approach is the ROGUCCI brain trust “formula.” This formula includes
individuals with interests, expertise and experience in three domains:
The contributions of these “breeds” were authoritative insights into the “what” (i.e. scientific and
engineering limitations and parameters), the “why” (i.e. the practical consequences and impacts), and the
“how” (i.e., convening, reframing and mobilizing for international policy change), respectively. These are
each key elements of the ROGUCCI process.
The reliability of GUCCI is absolutely essential for the basic functioning of nation-state governments, the
stability of critical stakeholders such as the international financial sector, the continued operation of
business enterprises and the daily lives of countless individual netizens. For these parties, their current high
level of dependence, their rapid rate of increased dependence and their enormous expected future dependence are
self-evident motivations for vigilance in improving the resilience of this infrastructure.
Beyond establishing that the subject matter is important, a compelling need for The Study is the profound
lack of awareness of these dependencies. Only a small minority in each of the parties above is aware of
the nature of their dependence on GUCCI.
38
ROGUCCI - THE REPORT ISSUE 1, 2010
The Study was conducted in close partnership with senior leaders of the international financial community.
This sector continues to evolve on a global basis with increased reliance on information and
communications technology (ICT), and vital dependence on resilient international connectivity. This
global connectivity translates directly into increased reliance on undersea cable infrastructure. “Financial
services executives and managers must recognize the technical complexity, risks and contractual
requirements, ongoing relationships, and recovery challenges associated with the international
telecommunications infrastructure”.7 The major gains achieved in reducing market risk through such
mechanisms as automation and compressed settlement intervals are offset by increased operational risks
through increased dependencies on ICT in general, and undersea cable infrastructure, specifically.
Improvements in the reliability of this global infrastructure will benefit international communications
users around the world – governments, private sector organizations, and individuals.
The above subsections answered the three questions about the ROGUCCI activities: What is it about?
Why is it important? and, Who cares if it is successful? This section will continue this line of thought by
answering the question: What are the measures of success?
2. Articulating actionable recommendations, that, if implemented, would reduce the likelihood, or ameliorate
the global impact of, a catastrophic undersea communications cable infrastructure failure.
The Study and Global Summit, which are described in later subsections, have begun to elevate awareness.
The engagement of hundreds of experts and stakeholders, the traffic of thousands of ROGUCCI Study
web site visits, and the high profile international Summit event have created impetus for fresh discussions.
The nature of awareness is important and is being appreciated chiefly in two dimensions: by the depth of
understanding and by those who are undertaking the understanding. In the area of depth, greater
understanding is being fostered at all stages of the awareness continuum – from the point of initial
awareness to advanced appreciation for actionable countermeasures. Those engaged in the understanding
are key. Since the private sector is largely the owner of this infrastructure, it is essential that equipment
suppliers, service providers and consortium operators are engaged.8 Owing to the fact that senior level
decisions will eventually be needed to implement The Report’s guidance, the direct participation of senior
government and industry leaders has been welcomed. Inasmuch as this is an international concern, it is
encouraging that experts and stakeholders from six continents are actively engaged. The dispatch of The
Report is expected to continue this momentum. 9 The ultimate measure of success in this area of
awareness is whether enough critical stakeholders develop an accurate sense for their vital dependence on
GUCCI.
Regarding the second measure, it is fulfilled in The Report’s presentation of twelve actionable
recommendations, that, if implemented will improve the reliability of GUCCI (Section 5).
7
Resilient International Telecommunications Guidelines for the Financial Service Sector, Pacine, Wayne and Callahan, Roger,
Financial Service Sector Coordinating Council, www.fsscc.org, 2009.
8
See Section 2.8.
9
Updates will be provided on www.ieee-rogucci.org.
39
ROGUCCI - THE REPORT ISSUE 1, 2010
2.5 Scope
This section describes the scope of The Study in terms of subject matter interests, technology, network
types, and geography.
The Report provides an expert review of the reliability of the global undersea communications cable
infrastructure. Because there exists abundant material in the public domain that covers the components
and architecture of this critical infrastructure, The Report does not attempt to duplicate that excellent body
of knowledge. Rather, the focus of The Report is on the factors promoting or impairing the
infrastructure’s reliability. The Report provides a comprehensive analysis of the intrinsic
vulnerabilities of the infrastructure, significant trends affecting these vulnerabilities and suggested
guidance on addressing latent and emerging reliability challenges. This focus on reliability, in this
context, will include the related aspects of infrastructure availability, resilience, robustness, and security.
Reliability, in its technical sense, principally that the infrastructure will perform its intended
function, in the context of the environment it was designed for, during the lifetime it was
designed for.
Robustness, principally that the infrastructure will perform its most important functions with a
minimum of variation, in the presence of stresses that are outside of its expected operating
conditions.
Resilience, principally that the infrastructure will return to performing its function after being
overcome.
Related terms that overlap the broad contour of Reliability, and that are appropriately kept in front of
mind in The Study include:
Survivability, principally that the infrastructure will be preserved in some minimum useful state
after being overcome.
The brief glossary found in Section 9 provides more detailed descriptions of terms.10
Therefore, this broadly defined infrastructure reliability includes the stakeholders’ expectations that it will
perform (a) ‘as intended’ during times absent of unusual stress, (b) ‘near as intended’ during times of
unanticipated stress, and (c) ‘returning to as intended’ after being overcome by stress.
The downtime experienced during and after a crisis contributes to the overall downtime for a specified
period of time that a reliability calculation may be desired for.11 Reliability has two chief accounting
10
Additional related terms include availability, dependability and integrity.
40
ROGUCCI - THE REPORT ISSUE 1, 2010
measuring sticks: the frequency of outages and the duration of outages. As it more directly correlated with
end user “pain”, the duration – or “downtime” metric is the single most useful means of describing the
performance of a communications system. The highest reliability is achieved when disruptive events are
recovered from quickly (short duration) and the mean time between disruptive events is very long (low
frequency of events). Conversely, the lowest reliability is experienced when disruptive events have extended
times (long duration) and the mean time between disruptive events is very short (high frequency).
In The Study, the concept of “unanticipated stresses” is different than what may be described in
contractual arrangements involving equipment suppliers, network operators and service providers for
specific, individual international cable systems. For example, earthquakes may be considered a rare event
for an individual system. But at a global level, such rare events are understood to be part of the world we
live in, and, given the dependency on GUCCI, something with which it needs to be prepared to operate.
Therefore the standard commercial legal arrangements made at an individual system level should not be
measured against what is expected by the broad user base, as that is not their intent, nor are they
wellsuited for such purpose. From a global infrastructure perspective, earthquakes are not that unusual;
nor are malicious acts of terrorists on infrastructure; nor is piracy; nor are cyber attacks.
11
Because outages or other crises are rare events for GUCCI, long duration periods are needed in order to develop statistically
meaningful reliability measurements; i.e. on the order of years when multiple systems are involved.
41
ROGUCCI - THE REPORT ISSUE 1, 2010
42
ROGUCCI - THE REPORT ISSUE 1, 2010
43
ROGUCCI - THE REPORT ISSUE 1, 2010
2.5.2 Geography
The scope of The Report is the expanse of the earth. Submarine cables connect six continents, and
traverse three oceans and several seas. While there are no currently deployed systems that span the Arctic
Ocean, this route is being studied.13
12
Used with Permission from TeleGeography.
13
Barthold, Jim, Submarine Cable to Find Northwest Passage, Suite101.com, 17 January 2010.
14
Some double counting is included for routes with multiple stops. Middles East included with African Continent in these charts.
Data provided by TeleGeography Research, 2010.
44
ROGUCCI - THE REPORT ISSUE 1, 2010
2.5.5 Technology
The scope of The Report covers optical fiber submarine cables. Earlier metallic conductor cables are
excluded as those deployed are either no longer used or their bandwidth capacity is negligible in modern
networks.
45
ROGUCCI - THE REPORT ISSUE 1, 2010
Republic of Estonia People’s Republic of China (incl. Hong Kong) United States of America
15
http://community.comsoc.org/groups/rogucci-study .
46
ROGUCCI - THE REPORT ISSUE 1, 2010
2.7.1 Venue
The Global Summit was hosted by the Dubai International
Financial Centre (DIFC), in the United Arab Emirates
(Figure 10). Dubai was chosen as The Summit venue
because of its prominent role as an emerging financial hub,
its recent experience with GUCCI failure and its strategic
geographic location in regard to GUCCI topology.16
16
Dubai and other cities in the Middle East region were affected by multiple undersea communications cable cuts that occurred
during the 12-day period of January 23 through February 3, 2008.
17
Financial institutions may apply for licenses and can be eligible for benefits such as a zero tax rate on profits, 100% foreign
ownership, no restrictions on foreign exchange or repatriation of capital, operational support and business continuity facilities.
Financial services in the DIFC are regulated to international standards by the Dubai Financial Services Authority (DFSA).
18
The stock exchange was formerly known as the Dubai International Financial Exchange or DIFX
47
ROGUCCI - THE REPORT ISSUE 1, 2010
2.7.2 Program
The Summit program progressively advanced through a detailed review of the intrinsic vulnerabilities of
the infrastructure, the stakeholder interests and the proposed recommendations. The Summit format was
highly interactive throughout in order to optimize participants’ ability to offer insights and perspectives, as
well as to influence the consensus development process. The program climax was the final day’s Summit
Council meeting. The Summit Council included senior private and public sector representatives of each
of the 6 participating continents. The Council reviewed each of the proposed recommendations, clarified
key points of articulation and laid out a strategy for implementation.
The technical agenda included a review of the eight ingredients of ICT infrastructure. For each of the
eight ingredients, a volunteer session chair had been identified earlier from the online forums. These
chairs helped facilitate discussion on the online forums and then led discussions among subject matter
expert peers in the technical program. For each ingredient, the chairs sequentially walked through a
systematic review of the intrinsic vulnerabilities, a discussion of relevant trends, a prioritization of
concerns and a discussion of proposed recommendations. The purpose of the first part of the discussion
was to be certain that no intrinsic vulnerabilities were missed and that the analysis foundation was
complete in its coverage. The purpose of the second part was to understand the dynamics that could
increase the presence of specific intrinsic vulnerabilities. For example, the increased marine activity
associated with ocean sprawl elevates the concern related to the Hardware ingredient intrinsic vulnerability
of susceptibility to damage. The third step was to call out areas of greatest concern. This was done based
both on the insights gleaned from recent trends, and, more importantly, from the comprehensive intrinsic
vulnerability review. In this way, latent failure modes were exposed and given proper attention. It can be
said that this was a way of identifying “an unprotected cockpit door scenario on September 10th” (to make
reference to September 11, 2001 terrorist attacks). This method contrasts with most reliability and
security work, which is based primarily on reacting to observed historic analogies or to gathered
intelligence. However, such approaches can fail to sufficiently protect critical infrastructure from either
manmade or natural causes, particularly when a latent failure mode is involved. The Ingredient leaders are
listed below in Table 4.
48
ROGUCCI - THE REPORT ISSUE 1, 2010
The impact agenda included presentations from stakeholders, with special emphasis on the international
financial sector. Dr. Nasser Saidi, Chief Economist of the DIFC and Stephen Malphrus, U.S. Federal
Reserve Board Chief of Staff, presented keynote addresses. In addition, other stakeholder interests were
presented from other stakeholders: regulatory agencies and the international media. The stakeholders
emphasized the devastating impact that the loss of international communications has on their operations,
often rendering them incapable of accomplishing essential services. A special concern for the
international financial sector is the unacceptability of payload latency. Delays in message delivery on the
order of milliseconds can be a harsh competitive disadvantage. Government regulators stressed the
importance of international connectivity for government operations and nation-state security. A television
news reporter described the dependency of the international media on high bandwidth services in order to
transmit news stories.
49
ROGUCCI - THE REPORT ISSUE 1, 2010
19
Dr. Carter participated via teleconference, utilizing undersea communications cable infrastructure form New Zealand.
20
While supporting the online forum discussions, Mr. Freeman was represented by Richard Krock (Bell Labs) during the Summit.
21
Cable ships are highly specialized seafaring vessels that can vary widely in their dimensions and performance capabilities.
The CS Etisalat was built to order by M/s. Masa Shipyard, Helsinki in 1990. Classified as a cable layer by the Lloyd’s Register,
the ship has a gross tonnage of 2221 with a cable uplift capacity of 700 tons and a speed of 13 knots with an endurance of 35
days. Its overall length is 74.5 meters and its maximum speed is 13 knots. It can accommodate 32 people.
50
ROGUCCI - THE REPORT ISSUE 1, 2010
cable cut crisis that had occurred the previous year.22 The crew and vessel had braved 14-foot waves in
order to act urgently in repairing damaged cables that had left the region with severely degraded
connectivity.23
22
Etisalat Management Recognizes Bravery of E-Marine Cable Repair Crews - E-Marine Heroes Successfully Restore Internet
Connection to the Gulf, www.etisalat.ae, 9 March 2008.
23
“This was an extremely difficult period for the region’s telecommunications industry. The cuts were extremely serious as
many of the Gulf countries rely on submarine cables to provide access to international markets and Internet content. Accordingly,
telephone and Internet services were seriously degraded.” Omar Bin Kalban, CEO & Managing Director of E-marine PJSC, Ibid.
51
ROGUCCI - THE REPORT ISSUE 1, 2010
An electronic audience polling system was used to enhance the ability to gauge Summit participant
sentiments in real-time. The polling system was used throughout the event to track perspectives. At the
conclusion of The Summit program, the audience was polled to gauge overall assessment of value,
commitment and interest in the event, process and future steps. As shown the Figure 16, 92% valued
their participation as “time well spent,” 91% expressed commitment to participating in follow-up activities,
90% want to see The Summit repeated, and 97% indicated that The Summit created a desire for more
effort in this area.24
Discreet feedback was also sought and captured. Several points were stressed. These include expressed
appreciation for the leadership provided by the ROGUCCI process in taking on a problem that was
outside of the industry’s ability to solve alone. One benefit that was underscored was the need filled by
the ROGUCCI process in looking at the infrastructure at a global level. Other positive feedback centered
around the value of effectively integrating the diverse disciplines and perspectives of the communications
industry, stakeholders and international policy change agents. Still others expressed gratitude for the
broad span of perspectives, which encompassed technical experts (such as those with manufacturing
functions, or operational responsibilities for networks and cable ships) and senior executive leadership
(e.g., CEOs and other decision makers). Other comments ascribed merit to the venue selection for its
relevance as a financial sector stakeholder and for its historical significance. Finally, the most heartfelt
feedback was directed toward the sense of cooperation that was achieved and the drive to commitment
for breakthroughs in the current barriers to elevate the reliability of the global infrastructure.
Feedback was also provided in areas to strengthen the ROGUCCI process. First, participants recognized
the need for effective engagement between existing, related fora and the ROGUCCI process. The process
had engaged key international groups that deal with some aspects of undersea cable infrastructure.25
However, as breakthroughs are pursued with the implementation of ROGUCCI Recommendations,
effective engagement with these and other fora, as appropriate, will be important. As described in some
of The Recommendations, the best role for these and other groups is still to be determined. They can
either make adjustments to their missions and embrace additional responsibilities, or remain on their
current course. In either case, effective complimentary relationships should be nurtured. Another
opportunity to strengthen the ROGUCCI process is to provide more clarity about the continuity of the
effort going forward. It is understood that as this is a new process there is a need to remain flexible.
24
Note that it was not the intention of the ROGUCCI process to create an ongoing event. The question regarding future annual
events was submitted from participants, who requested that the level of interest be assessed. Since the objectives of the
ROGUCCI process are focused on having a positive impact on the world’s critical infrastructure, flexibility will be maintained and
the most appropriate follow-up activities will be pursued.
25
Engagement or participation included the Financial Services Sector Coordinating Council (FSSCC), International Cable
Protection Committee (ICPC), SubOptic Conference, the IEEE Oceanic Engineering Society as well as several nation-state level
initiatives.
52
ROGUCCI - THE REPORT ISSUE 1, 2010
However, posting next steps and other follow-up materials on the ROGUCCI web site (www.ieee-
rogucci.org) can be very helpful. A third area for improvement was one expressed for the whole industry,
which needs to continue to nurture private sector-led initiatives that are facilitating collaboration with an
aim to improving the reliability of the global infrastructure.
An historic note from the Museum that commemorates the ROGUCCI Global Summit is included in the
front matter for The Report. The note reads, in part:
26
In 1870, Porthcurno began its life as an important center of international communications. It was in this year that a chain of
telegraph cables linking Britain with India was completed. Porthcurno was chosen as the landing point for the British end of this
cable link. The company that laid the cable into Porthcurno was the Falmouth Gibraltar and Malta Telegraph Company, founded
by John Pender in 1869 and one of four companies established to lay the cables in the 'chain' linking Britain and India.
www.porthcurno.org.uk
53
ROGUCCI - THE REPORT ISSUE 1, 2010
Museum Director Libby Buckley, who served as the curator of the ROGUCCI Global Summit, made
extensive photography and audio recordings. She also provided a well-received presentation on the
history of the undersea communications cable industry.
2.8 Contributors 28
The ROGUCCI process relied upon the expertise and experience of world-class experts, and industry and
government leaders from literally around the world. Engagements with these individuals took various
forms, including interviews, small and large meetings, telephone consultations, online forum discussions,
briefings and the Global Summit. Table 5 provides a summary of the many organizations that supported
this effort. The degree of support varied widely - from brief consultations with just one person on a
single important question or participation in the online forum, to efforts that involved a team of people
who took on extensive research, analysis and championing of issues. The number of people engaged
exceeded 300. The individuals and organizations that contributed to The Study have served an important
cause for the benefit of people around the world.29
27
Buckley, Libby, ROGUCCI Global Summit, Dubai 2009 Historical Note, Porthcurno Telegraph Museum, Cornwall, U.K.
February 2010.
28
Additional recognition is provided in Section 6, Acknowledgements.
29
It should not be construed that the contributing organizations or individuals agree with every aspect of The Report.
54
ROGUCCI - THE REPORT ISSUE 1, 2010
55
ROGUCCI - THE REPORT ISSUE 1, 2010
56
ROGUCCI - THE REPORT ISSUE 1, 2010
57
ROGUCCI - THE REPORT ISSUE 1, 2010
58
ROGUCCI - THE REPORT ISSUE 1, 2010
In order for a threat to have an impact, it must exercise an intrinsic vulnerability.32 A key advantage of
using the 8i Framework is that each of the ingredients has a finite set of intrinsic vulnerabilities. Thus,
these intrinsic vulnerabilities can be addressed independently of specific threat knowledge. Further, since
the intrinsic vulnerabilities are finite, using an approach based on them can provide the assurance of
comprehensive coverage that is not achievable by a threat-based approach, where threats tend to be
practically infinite because of countless permutations. Since most government and industry attention,
energy and resources are currently applied to addressing threats, the future use of the 8i approach is very
promising, as it can provide more economical and effective means of promoting high reliability and
security of information and communications infrastructure. In addition, it can bring attention to areas
that otherwise might not receive needed notice, but that can have devastating effects.
This section reviews each of the ingredients with commentary specific to the undersea communications
systems.
30
Rauscher, Karl. F., Protecting Communications Infrastructure, Bell Labs Technical Journal Homeland Security Special Issue,
Volume 9, Number 2, 2004; Proceedings of 2001 IEEE Communications Society Technical Committee Communications Quality
& Reliability (CQR) International Workshop, www.comsoc.org/~cqr .
31
ATIS Telecom Glossary, www.atis.org .
32
The communications industry has defined a threat as “anything with the potential to damage or compromise the
communications infrastructure or some portion of it.” The industry has defined a vulnerability as “a characteristic of any aspect
of the communications infrastructure that renders it, or some portion of it, susceptible to damage or compromise.” FCC NRIC VI
Homeland Security Physical Security Final Report, December 2003.
59
ROGUCCI - THE REPORT ISSUE 1, 2010
3.1 Environment
3.1.1 Function
The Environment ingredient of communications infrastructure includes buildings, trenches where cables
are buried, space where satellites orbit, locations of microwave towers and cell sites, and the floor of the
ocean. The Environment is an essential ingredient of undersea cable systems, providing the location for
the physical equipment. Because of the harsh conditions of undersea environments, undersea
communications environments are some of the most challenging across all of the broadly defined
information and communications industry. There are three types of environments for undersea
communications cable systems:
In Water - Undersea
This is the predominant environment for cable systems. It is also the most unique and challenging
because of the oceans’ extent, wide range of current, temperature and pressure conditions and difficult
access. In waters deeper than 1000-1500m, the cables are typically laid on the ocean floor. That depth
range is beyond the present limit of trawl fishing – a major cause of cable faults A unique challenge of
this environment is the high pressure.
60
ROGUCCI - THE REPORT ISSUE 1, 2010
identifiable
accessible
exposed to elements
dependence on other infrastructures
contaminate-able
subject to surveillance
continuously being altered
remotely managed
The landing station environment is heavily dependent on the people who maintain it and have access to it.
Thus the Human ingredient is one that has many interactions with the Environment. In addition, the
Environment is dependent on Power to operate equipment. When multiple parties share a location there
will be expectations regarding the behavior of other people and systems, and thus the Policy ingredient
plays a key role.
1. The identification of cable route environments is becoming easier with the proliferation of
information on the Internet.
4. Interest in deep-sea mining is increasing, with the focus on polymetallic (copper, iron,
manganese, nickel and zinc) nodules, and metallic sulfides around seamounts and hydrothermal
vents. Most of this mining interest is within the Pacific Ocean. The International Seabed
Authority (ISA) organizes and controls activities relating to mineral resources on the seabed and
ocean floor beyond national jurisdiction.
5. As onshore resources become scarce, there is an increase in coastal mining activity especially
for sand and gravel for aggregates.
61
ROGUCCI - THE REPORT ISSUE 1, 2010
6. A new type of undersea structure is the cabled ocean observatory, which is a science-based
monitoring and experimental site designed to evaluate many aspects of the ocean and seabed in
order to learn how the marine environment “ticks” and changes with time.33
7. There is an increase in the number and size of ships. This is significant because anchors have
been identified as the second major cause of cable faults. This trend has been accompanied by
changes in shipping routes to meet the needs of developing economies such as China and India. 34
8. There is increased use of ship positioning technology, which enables new, remote vessel
surveillance with Internet access.35 36
9. There is an increased trend in the establishment of marine protected areas in territorial and
international waters.37 38
10. The oceans’ responses to present and projected changes in climate have the potential to
affect the undersea cable network through intensification of natural hazards relating to [a] rising
sea level, [b] changes in the frequency and intensity of storms that will influence wave and current
effects on cables and [c] rainfall events that can increase floods to the point where river discharge
forms turbidity currents with the potential to damage cables.
In summary, undersea communications cable stakeholders should be aware of the potential impact of the
trends associated with the undersea cable environment and they should actively support existing industry
efforts of continuous innovation and improvement that could help in this area. In addition, an area for
consideration is a proposal for a study that addresses how changes to the ocean chemistry could degrade
the current projected lifespan of cables already in place or about to be laid.
33
The NEPTUNE observatory off Vancouver Island, for example, is based on a 800 km fiber optic cable system that provides
power for submarine equipment and a means to transfer environmental data back to shore in real time.
34
In 2007 there were 43,000 shipping units exceeding 1 billion dead weight tons compared to in 2005 where there were 40,000
shipping units exceeding 880 million tons, Institute of Shipping, Economics and Logistics.
35
Universal Automatic Identification System (AIS) is a short range application used by ships and Vessel Tracking Systems (VTS)
that supports the transfer of information between ships and land-based monitoring stations such as unique identification,
location, speed and course.
36
It is interesting to note that a ship dragging an anchor, which could cause multiple cable cuts, can be detected with this
technology, but if the communication to remote monitoring center relies upon a damaged cable, the transport of the detection
information may be impaired.
37
Australia, for instance, has extended protection of the Coral Sea region to cover an area of almost 1 million square kilometers:
likewise substantial areas of the North Atlantic have been identified for protection.
38
U.S. President George W. Bush established nearly 200,000 square miles (518,000 square kilometers) as a protected marine
environment area. January 2009.
62
ROGUCCI - THE REPORT ISSUE 1, 2010
3.2 Power
3.2.1 Function
The Power ingredient is vital to the operation of any communications infrastructure. Without power,
communications systems fail to operate.
Power includes four basic components: the distribution plant, the battery plant, the generator plant, and
the grounding system.
The designs often implement triplication to achieve adequate redundancy of all components in the power
system and the ability to switch any power sub-system in or out. In addition, there is a need to ensure that
maintenance practices are well designed and fully implemented. These often include practices such as
keeping fuel supplies topped up and test running generators periodically.
In addition to power needed to support the terminating electronics at landing stations, repeater
regenerators and optical amplifiers require power. This is achieved by actually using the environment –
the seawater – as a conductor to complete the circuit.40
Given the great lengths of submarine cables, the power equipment used in these applications has some
special considerations. Cables are typically powered from both ends, with opposite charges at either
termination. The repeaters are powered by the potential across them. The current completes its circuit by
passing through the metallic core of the cable and through the surrounding seawater. When the protective
barrier around the metallic core is damaged such that its insulation properties are compromised, a short
circuit occurs. The location of the short becomes the new virtual earth. However, the system can
continue to operate as long as the power feed equipment from either end can provide enough voltage to
support the required potential across each repeater. Otherwise the communications signals will reach the
repeater and, being too weak because they cannot be amplified at the unpowered repeater, fail to progress
any further. If a second loss of insulation occurs along the cable, the system will fail to operate, as there
will be no potential between the two virtual earth points. For this reason the immediate repair of shunt
faults is imperative.
39
Krock, R., Rauscher, K., Runyon, J., Hayden, P., Intrinsic Vulnerabilities of the Power Systems Supporting Communication
Networks and Expert Strategies for Defense, Bell Labs, 2007.
40
The electrical conductivity of seawater has a significant dependence on temperature, a lesser dependence on salinity, and a
relatively negligible dependence on pressure. Seawater conductivity is generally measured at 4.8 [S/m]. This compares to 63 x
6 -14
10 [S/m] for silver, the best known metallic conductor and ~10 [S/m] for air.
63
ROGUCCI - THE REPORT ISSUE 1, 2010
The Power ingredient is also heavily impacted by other infrastructures, such as commercial power and
transportation, and by other ingredients of the communications system, such as humans, environment,
and policy.
1. Submarine cable infrastructure is being extended into new areas as economies develop.
This brings the risk that, for economic reasons, insufficient redundancy is built into the
power supply system.
3. In some instances cost savings are driving less redundancy in power design than has
previously been engineered.
41
Earth potentials can be a serious threat to cable systems in areas of high magnetic-field activity. Root, H.G., Earth-Current
Effects on Communication-Cable Power Subsystems, Electromagnetic Compatibility, IEEE Transactions, Issue 2, May 1979.
64
ROGUCCI - THE REPORT ISSUE 1, 2010
3.3 Hardware
3.3.1 Function
The Hardware ingredient of communications infrastructure includes equipment frames, semiconductor
chips, electronic circuit packs and cards, and metallic and fiber optic transmission cables. While much of
the hardware is similar to landline applications, in undersea communications systems, hardware
components of particular interest are the special purpose fiber cables and inline undersea repeaters.
Oona
Räisänen
43
Figure 19. Example of Undersea Communications Cable Construction
42
Chesnoy, Jose, Undersea Fiber Communications Systems, Academic Press, London, 2002. pp. 457-461.
43
diagram from www.wikipedia.com .
65
ROGUCCI - THE REPORT ISSUE 1, 2010
logical design
physical damage
temperature range dependency
field force influence – electric, electromagnetic
adverse radiological interaction
chemical contamination
aging
The wet plant is more critical than the dry plant in terms of reliability because the MTTR is greater.
Typical MTTR values give around 2 weeks for the wet plant repair instead of 2 hours for the dry plant.
From a reliability point of view, this is why the failure rate for laser pumps used within the repeaters is a
sensitive issue for the system. For example, typical failure rates for amplifiers in terrestrial networks are
within 1000 to 10000 FIT44 compared to submarine amplifiers, which are within 10 to 100 FIT (around 2
orders of magnitude lower).
Designing ultra reliable submarine systems means that the probability of a wear-out failure occurring
during the system life must be near non-existent and the probability of random failure must be minimized
as much as possible.
Repeaters are critical equipment as they contain electronic, optical and opto-electronic components. In
addition to that, one must keep in mind that any internal damage, whatever the cause is, may directly
impact the transmission quality. Consequently, careful precautions must be taken to prevent and reduce
the risk of failure. In particular, an optical failure occurring on a specific fiber must not affect the system
performances of the other fibers. The tests required before and during the cable installation are detailed in
[ITU-T G.976].
Undersea networks require reliable and robust fiber optic systems to avoid costly repairs in the wet plant.
Moreover, considering that technologies may change during the life of the system, a maintenance scheme
should be established at the beginning of system life to ensure timely repairs during the contractual system
lifetime.
Failures occurring during the system life may be due to internal faults (shunt fault, fiber loss increase,
repeater failures, card failures, etc.) or external aggressions (e.g., anchors and fishing activities for wet plant
and mis-operation for dry plant).
1. Undersea cable systems are typically designed for a 25 year life time.45 However, as new
systems come on-line with much greater capacity, older systems are being retired prior to 25 years.
44
The Failures In Time (FIT) rate of a device is the number of failures that can be expected in one billion device-hours of
operation (once in about 114,155 years).
45
As specified in ITU-T Recommendation G.977. The usual requirement for system reliability is less than three failures
requiring cable ship intervention during the system's designed lifetime.
66
ROGUCCI - THE REPORT ISSUE 1, 2010
Thus, systems are not experiencing the increased failure rate due to aging towards the end of a
system life.
2. In recent years, it appears that submarine cable faults due to components have been
dramatically decreasing. Available data suggests that they now account for less than 10% of all
faults. 46 47 (Figure 20)
3. Advances in laser and Dense Wave Division Multiplexing (DWDM) technology have greatly
increased the volume of payload throughput in new, and already deployed, fiber cables. Upgrades
can be made to some existing systems that dramatically increase their potential useful life span.
5. There have been advances in introducing standardized equipment used in cable repair activities.
6. The repair and maintenance of undersea cables continues to rely on very specialized ships.
The availability of these vessels remains limited, the significance being that this limitation affects
the time to repair and the number of simultaneous repairs that can be performed.
7. A limiting factor for individual undersea cable capacity continues to be the combined weight
of cable and repeaters.48
46
Worldwide Trends in Submarine Cable Systems, http://www.scig.net/Section11a.pdf ; fault data from ICPC, was analyzed for
a period of 15 years.
47
Trends in Submarine Cable System Faults”, Tyco and Alcatel-Lucent, http://www.suboptic.org/Uploads/Files/WeA1.2.pdf
48
More fibers would require more repeater components and thus heavier repeater chassis. The tensile strength of the cables
limits the weight that can be hoisted during repairs.
49
Worldwide Trends in Submarine Cable Systems, http://www.scig.net/Section11a.pdf .
67
ROGUCCI - THE REPORT ISSUE 1, 2010
Low failure rates are obtained through the use of heavily screened components, close control of raw
materials, robust and simple design, careful manufacturing process and thorough quality control.
Redundant configurations are generally used to achieve the required reliability and to reduce the failure
rate of the subsystems accordingly. For example, redundant pump laser configurations are usually
employed to ensure that the amplifier reliability target is met.
The industry follows specifications developed in the mid-1990s. 50 These standards have also been
updated in the last few years, and include cable parameters (mechanical and electrical), optical repeater
parameters (power, jitter, amplification,), mechanical repeater parameters (housing, corrosion protection,
insulation, etc), cable joint parameters (optical and mechanical parameters such as splice loss, mechanical
and tensile strength) and system design characteristics.
50
ITU-T G.971 to G.978 series of standards; These standards include: [ITU-T G.971] ITU-T Recommendation G.971 (2007),
General features of optical fibre submarine cable systems, [ITU-T G.972] ITU-T Recommendation G.972 (2004), Definition of
terms relevant to optical fibre submarine cable systems, [ITU-T G.973] ITU-T Recommendation G.973 (2007), Characteristics of
repeaterless optical fibre submarine cable systems, [ITU-T G.974] ITU-T Recommendation G.974 (2007), Characteristics of
regenerative optical fibre submarine cable systems, [ITU-T G.975] ITU-T Recommendation G.975 (2000), Forward error
correction for submarine systems, [ITU-T G.975.1] ITU-T Recommendation G.975.1 (2004), Forward error correction for high
bit-rate DWDM submarine systems, [ITU-T G.976] ITU-T Recommendation G.976 (2007), Test methods applicable to optical
fibre submarine cable systems, [ITU-T G.977] ITU-T Recommendation G.977 (2006), Characteristics of optically amplified
optical fibre submarine cable systems, [ITU-T G.978] ITU-T Recommendation G.978 (2006), Characteristics of optical fibre
submarine cables, [ITU-T G.Sup.39] ITU-T G-series Recommendations – Supplement 39 (2006), Optical system design and
engineering considerations.
68
ROGUCCI - THE REPORT ISSUE 1, 2010
Figure 22. Typical failure's rate behavior during the life of a system51
In summary, equipment suppliers of cable and other system components should continue to follow and
adhere to the international standards for submarine cable systems. Industry experts should continue to
support ongoing standards activities to promote continuous improvement in reliability performance of
undersea cable components.52 In addition, undersea cable system procurements should continue to
include reliability and design specifications included in international standards.
Like everything else man-made, a given cable infrastructure has a finite life. Given that many fiber optic
cables are reaching their projected end of life, additional consideration should be given to managing the
end of life period. This can include establishing a range of probable life spans along with identifying the
limiting causes and the end of life failure modes.
51
As specified in ITU T G-series Recommendations – Supplement 41.
52
For example, ITU Study Group 15, (Optical transport networks and access network infrastructures) is currently investigating
the characteristics of optical fiber submarine cable systems. ITU is specifically asking for comments on: Specifications of
terminal equipment and optical fiber submarine cables in optical fiber repeatered submarine cable systems with various optical
amplifiers such as Erbium Doped Fiber Amplifiers (EDFAs) and Raman amplifiers; Specifications of terminal equipment and
optical fiber submarine cables in optical fiber repeaterless submarine cable systems, including systems with remotely pumped
optical amplifiers; Specifications of test methods concerning the terminal equipment, optical fiber submarine cables and other
equipment relevant to the submarine cable systems; Specifications of forward error correction (FEC) for optical fiber submarine
cable systems.
69
ROGUCCI - THE REPORT ISSUE 1, 2010
3.4 Software
3.4.1 Function
The Software ingredient of communications infrastructure includes the programs that provide both the
functionality and the fault management capabilities. Software includes the development and test loads,
version control and management, chain of control deliver, and stored software releases. Relative to the
other ingredients, the function of software in undersea cable systems is not unique.
1. Software will have more control in future networks (e.g., mesh topologies).
2. Most other areas of the ICT industry rely increasingly on outsourcing software development.
The undersea cable system software appears to be fighting that trend.
4. Software must increasingly be capable of processing complex combinations of services and co-
mingled data and control messages.
In summary, aggressive testing of software is warranted to ensure not only that it works as expected, but
that it correctly handles conditions at the boundary values and beyond. Exception handling is particularly
important for a system that “can’t” go down. Each node should be able to protect itself from a failure of
the other nodes, and from all possible stimuli regardless of how unlikely or illogical.
70
ROGUCCI - THE REPORT ISSUE 1, 2010
3.5 Network
3.5.1 Function
The Network ingredient of communications infrastructure includes the configuration of nodes and their
interconnection; network topologies and architectures; various types of networks, technology,
synchronization, redundancy, and physical and logical diversity; and network design, operation and
maintenance.
capacity limits
points of concentration (congestion)
points or modes of failure
complexity
dependence on synchronization
interconnection (interoperability, interdependence, conflict)
uniqueness of mated pairs
need for upgrades and new technology
automated control (*via software)
accessibility (air, space or metallic or fiber)
border crossing exposures
1. There is increasing network capacity being delivered with status quo physical route diversity:
There is substantial growth in capacity being made available, however it is typically not being
deployed with proportionate physical diversity – most notably due to the same landing points
being used or routes tracing the same geographic “choke points”. The significance is that
stakeholder dependency on undersea cables is increasing, which exposes them to greater negative
impact when a system failure occurs.
2. There is new undersea cable connectivity in global regions of emerging economic growth.
3. There is a parallel evolution path with generic optical networks advances such that undersea
network software will likely track closely with advances in terrestrial networks.
71
ROGUCCI - THE REPORT ISSUE 1, 2010
4. There is a move by network operators toward mesh topologies, based on non-ring protected
wavelengths which creates new levels of economic, technical and service complexity and risk. But
the economics are too attractive to the network operators to ignore.
5. There is a trend for nation-states to establish corridors for cable routes. These corridors
present a trade-off of the disadvantage of concentrating cables into a single point of failure, with
the advantages of a designated protection zone for cables with the potential for more effective
enforcement of restrictions on anchoring and trawling.
In summary, better international cooperation and coordination is needed to create more alternate paths
through sovereign waters without onerous regulatory requirements or costs. In addition, an international
framework for cable system operators, network operators and service providers to cooperate in defining
and implementing best practices would be helpful.
72
ROGUCCI - THE REPORT ISSUE 1, 2010
3.6 Payload
3.6.1 Function
The Payload ingredient of communications infrastructure includes the information transported across the
infrastructure; traffic patterns and statistics; information interception; and, information corruption. It
includes both normal data transport and signaling and network control traffic. There are special latency
considerations for payload delivery due to the long distances of undersea cable systems.
unpredictable variation
extremes in load
corruption
interception
emulation
encapsulation of malicious content
authentication (mis-authentication)
insufficient inventory of critical components
encryption (prevents observability)
2. As a percentage of the total traffic, financial services traffic is decreasing year over year.53
3. Advances in laser technology have increased the throughput capacity of existing fiber facilities.
4. Encryption algorithms are evolving and the more robust algorithms may require the most
“extra” bandwidth to carry the encryption.
5. Compression algorithms may be used more to carry only the unique information and allow
reconstruction of the payload at the far end.
53
High bandwidth applications like video and gaming require orders of magnitude more bandwidth. However, most recognize
that the new applications are less important to critical needs like economic stability.
73
ROGUCCI - THE REPORT ISSUE 1, 2010
10. Authentication needs to be more sophisticated today given the increasing sophistication of the
malicious agents.
In summary, the laws of physics do apply here. Increase in distance and retransmission will increase the
delay. Very time sensitive messages will benefit from priority on the most direct routing and perhaps
benefit from forward error correcting schemes to avoid the need to retransmit when an error is detected.
A list of the various applications, their characteristics and their requirements needs to be compiled. Since
corruption at the lowest level is always possible, forward error detection and repair is viable for cable.
Means must be developed to at least detect, if not prevent, interception either directly or indirectly from
the cable. A flip side to interception is emulation of what appears to be valid payload but may be inserted
by a “man in the middle,” a concern that must be detected and blocked. A policy needs to be established
regarding the transport of encapsulated malicious content. Sufficient authentication and authorization
needs to be performed by the access networks prior to entering the cable backbone.
74
ROGUCCI - THE REPORT ISSUE 1, 2010
3.7 Policy
3.7.1 Function
Agreements, Standards, Policies and Regulations (ASPR) is a term used to refer to the complete set of
inter-entity arrangements that are necessary for communications services. These arrangements include
national and international standards; federal, state and local regulations or other legal arrangements; or any
other agreement between entities - including industry cooperation and agreements and other interfaces
between entities.54 ASPR provides the necessary mechanisms used to anticipate, improve and control the
behaviors of entities that design, develop, implement, operate and evolve communications networks.
ASPR is abbreviated here as ‘Policy’.
Several factors make Policy a unique ingredient in undersea communications infrastructure. These factors
include the sharing of cable routes, the international scope, the jurisdiction of maritime law and law of the
sea, the influence of fishing regulations, the need for long term standards and the vital need for
coordinated speedy repairs.
54
ATIS Telecom Glossary, www.atis.org .
75
ROGUCCI - THE REPORT ISSUE 1, 2010
1. The use of Automatic Identification System (AIS) has proved invaluable in determining the
cause of some submarine cable faults and has also revealed the extent of faults caused by the
anchors of vessels that are underway. As can be seen in Table 6, the best-understood causal
distribution has changed significantly in recent years.55
2. Some nation-states require permits to be issued before cable repair operations are allowed to
commence. This process introduces delay to the repair operation that can be significant and
increases risk of multiple cable failures.56
3. There is increased concern over the risk of pirate or terrorist attacks on a cable ship on the
high seas. Given the special role of these vessels and crew in regard to global critical
infrastructure, it is unclear as to whether the international community would place the appropriate
priority on the need for quickly resolving such a crisis.
4. The failure of some coastal nation-states to comply with UNCLOS continues because they
have not enacted domestic legislation to protect submarine cables, have not updated existing
legislation to comply with UNCLOS, or do not enforce existing legislation.57
5. While there is improved cooperation amongst operators in several areas, there remains a lack
of sufficient information available to stakeholders to make appropriate statistical calculations
related to critical parameters such as expected loss of service, duration of outages and latency
impact.
6. The commercial interests of private sector equipment suppliers, network operators and service
providers continues to include effective forces for promoting the continued improvement of
undersea communications cable systems. These forces include competition, the return on
investment, drive for efficiency and thus improved quality, and the natural accountability that
55
Since 2006 cable owners have observed 21 submarine cable faults around the UK alone. There were 10 cases of anchor
damage to submarine cables and all involved vessels that had been underway with their anchors deployed. Some of these
vessels also damaged multiple cables during the same event.
56
Conflicting boundary claims compound the delays that can be caused for those states/countries requesting permits before
repair operations commence in circumstances where the estimated location of a fault falls close to or within area of conflicting
boundary claim i.e. multiple permits to repair are require. The cable owner perspective is that there is no legal or practical
reason for requiring permits before repairs are undertaken.
57
Active submarine cable systems were extensively damaged by depredations in 2007. Actions are piratical under UNCLOS
100/101 and violate UNCLOS 113. These incidents were unprecedented in the history of submarine cables and caused
tremendous disruption to the telecommunications network. A cable ship also returned to a buoyed cable, following a return to
port for operational reasons, to discover the buoy, rope and section of cable stolen. There is potential for an exceptionally long
outage if remanufacture of equipment is required to bring any depredated cable system back into service.
76
ROGUCCI - THE REPORT ISSUE 1, 2010
occurs from the observability of service outages or other impairments throughout the
communications services supply chain.
7. There is a growing number of stakeholders for which highly available and resilient undersea
communications cable infrastructure is vital. Fewer and fewer of these are direct bandwidth
customers of cable network operators. As this ratio of stakeholders-to-customers increases, there
is a growing gap between the commercial focus of the private sector and critical infrastructure
assurance needed at a global level.
8. Expectations regarding the rights of access and activity on the seafloor is changing as there is
increased interest in exploitation for mining.58
1. The global community of nations can recognize the vital priority of repairing damaged undersea
cables and eliminating the long delays for permits for repair work.59
2. The protections for cables can be strengthened. Consideration can be given to the implementation
and enforcement of minimum precautions to be taken by vessels to secure anchors prior to sea
passage. In addition, consideration should be given to enacting or updating national laws to align with
international cable protection provisions.60
4. The undersea cable industry can coordinate with relevant Government agencies to develop a protocol
that will provide a fast and coordinated response in the event of pirate attacks. As part of the protocol,
points of contact can be established for cable owners for such emergencies.
58
International Seabed Authority (ISA).
59
Consideration should be given to a) reinforcing the duty of nations to cooperate in repairs, b) reducing repair
permits/licenses/fees/guard boat requirements for all repairs to international cables beyond territorial seas, c) according cable
repair ships innocent passage status for the purpose of undertaking repairs in territorial seas.
60
e.g., UNCLOS.
77
ROGUCCI - THE REPORT ISSUE 1, 2010
3.8 Human
3.8.1 Function
The Human ingredient includes the human involvement throughout the entire lifecycle of activities related
to the communications infrastructure (design, implementation, operation, maintenance and de-
commissioning); intentional and unintentional behaviors; limitations; education and training; human-
machine interfaces; and, ethics and values.
In addition, it is helpful to consider the human dimension in two roles. The first is when it is actually a
part of the infrastructure; i.e. when humans are part of the complex chains of equipment suppliers,
network operators, and service providers of the systems. In this context the human is an ingredient that is
essential to the infrastructure. Important aspects of this role are that humans have an element of
immediate, direct control of some aspect of the infrastructure, and the infrastructure organization has
some control over the human. The other role is where the human is outside the infrastructure. In this
role the human is not an ingredient of the infrastructure, but rather may be an ingredient of another
infrastructure or may serve as a threat agent.61 In these situations, there is indirect control over the
infrastructure (as when the human is part of the shipping infrastructure), and the communications
infrastructure has considerably less control over the human (as when serving as a threat agent).
People have a vital role in the design, testing, implementation, monitoring, maintenance and repair of
undersea cable systems. Several factors make Human an ingredient deserving of special attention in
undersea communications infrastructure.
These factors include the high stakes potential associated with the payload of cable networks, the human
interface with great natural and engineering challenges, the need for highly specialized knowledge and
skills and the related need for execution of critical tasks, and the concern for sabotage or unintentional
damage.
61
The potential damage that malicious agents could inflict by attacking a relatively few number of cables is considerable, given
that these cables have such huge capacity. This can be thought of as an example relating to the ‘new asymmetric terrorist
threat’ which is causing concern to many nations; It does not take much imagination to extend upon existing published analysis
to see the parallels to undersea cable infrastructure. Maritime Critical Infrastructure Protection: Multi-Agency Command and
Control in an Asymmetric Environment, Watts, Robert B, www.hsaj.org/pages/volume1/issue2/pdfs/1.2.3.pdf;
78
ROGUCCI - THE REPORT ISSUE 1, 2010
Some of these intrinsic vulnerabilities are more present in undersea communications networks than
terrestrial networks. For example, workers on repair ships on the high seas may be away from family for
extended periods of time, exposed to unusual workplace dangers and require highly specialized expertise.
Also, undersea cable consortia are more and more competing on price to deliver large bandwidth with a
resulting focus on reducing costs. If an existing route is known to be acceptably reliable from natural or
man-made damage then there is a great commercial incentive to lay cables along the same route. This
reduction in diversity and resilience has at its root the human intrinsic vulnerability associated with
cognitive decision-making. It is interesting when looking at solutions to this vulnerability, to break this
cognitive aspect down further into the analytical performance of the decision maker and the psychological
factors that could influence the decision maker.
1. The Internet has made extensive information available to the public about undersea
communications technology, network deployments and operations.
3. Some governments now classify undersea optical fiber cables as “critical infrastructure.”
4. Over 70% of cable faults are caused by what is termed “external aggression.” Most often these
aggressions involve human activity - fishing, shipping activity. This is an example of influence
from the human ingredient outside this infrastructure.
5. In recent years, there has been increasing concern over maritime piracy and theft, the later being
motivated by fluctuations in the price of metals.62 These are examples of the human serving as the
threat agent.
6. Competitive pressures increasing with evidence from dramatically reduced prices for bandwidth
over the past decade.
7. Economic drivers to reduce cost leads to reduced diversity of cable routes and less collaboration
between consortia because of competition.
In summary, the human vulnerabilities ingredient may be the most “frustrating” one. When we find bugs
in the hardware or software, the mitigation is usually a new release with the bug removed. This is not an
option with people. After a human mistake occurs, warnings are posted on how to avoid making the
same mistake in the future, but people tend to forget and the same error occurs yet again. Therefore
mitigations need to consider preventative measures to be incorporated via avenues of the other
ingredients.63 The undersea communications cable industry and stakeholders should establish a trusted
information sharing community in order to ensure that essential infrastructure security information is
shared with peers in a timely manner.
62
Thieves may not know the difference between legacy metallic cables and fiber cables.
63
i.e. hardware and software features to assist the human in avoiding mistakes.
79
ROGUCCI - THE REPORT ISSUE 1, 2010
To ease the reading of each Observation, care has been taken to present them in a concise fashion as
shown in the figure below.
Each observation is accompanied with an indication as to which of the eight ingredients it is related to.
These indicators are provided as a color key reference in the right hand margin to assist the reader in
quickly identifying Observations of interest for specific ingredients.
80
ROGUCCI - THE REPORT ISSUE 1, 2010
The Observations are structured into four main categories, as outlined immediately below, to assist the
reader. The corresponding number of observations for each category is shown.
Stakeholder (20)
Science & Engineering (40)
Business & Investment (17)
Government & Inter-Government (23)
The Observations begin with the Stakeholder perspective. All the effort going into building and
maintaining this vast infrastructure is for their interests. Thus the Stakeholder is the primary driver for
the business and other decisions affecting GUCCI. The Stakeholders includes any user. Consistent with
the design of the ROGUCCI Study, the financial sector is emphasized here as a key stakeholder. A quick
glance at these Observations reveals that they are primarily related to the Payload ingredient, as is
evidenced from the frequent red indicators (). The Stakeholder interests are embodied in the Payload
that traverses the infrastructure. The next category used deals with principles of Science & Engineering
that enable and limit the infrastructure. The laws of the physical world are strict in their rigidity. This is
a good thing when we can harness them for technology. But they can also be constraints when they
bound a possibility. It is not surprising that many of the ingredients are in play as science and engineering
factors directly relate to each of them. The third category utilized covers the Business & Investment
aspects that react to opportunities presented by the Stakeholder drivers and Science and Engineering
enablers and limits. The Final category is the Government & Inter-Government policy, which also
shape what is do-able and not do-able. Each nation-state legitimately seeks to represent its interests in
inter-governmental engagements. There are also issues within a country that affect GUCCI. Because
ASPR are manmade, unlike scientific principles, they are artificial constraints and therefore changeable.
The ROGUCCI process, with its extensive analysis of authoritative source material in each of these
essential four categories, incorporates the nature of each as described above.
Due to rapid developments in technology and business environments, the quantitative information used in
the Observations is presented in orders of magnitude. 64 More specific information would quickly be
outdated.
For additional reading on undersea communications cable infrastructure, the reader is directed to the
material appended to The Report, the many books on the subject or specific technologies utilized, and the
Internet. The industry has maintained a discipline of recording its history and providing ample records of
its underlying science, engineering advances, systems deployed, routes traversed, landing points, regions
served, special techniques developed, maritime fleets and many other details. Much of this information is
readily available in the public domain.
The following sections present the 100 Key Observations in the four categories described above. The
reader is encouraged to make reference to them, as appropriate, when reading The Recommendations in
Section 5.
64
‘Order of Magnitude’ is an engineering and scientific method of describing quantities in approximation to emphasize the
intuitive or general meaning of the quantity with deliberately less emphasis on the precision of the measurement. The Report
uses the most common base of 10.
81
ROGUCCI - THE REPORT ISSUE 1, 2010
1. Public Unaware. Members of the general public are largely unaware of the significance
that undersea communications cable infrastructure has in their daily lives and
businesses. This dependence is very real and is evidenced in orders, transactions,
research, technical support, media updates, and many other areas of society and
business operations (Figure 25).
3. Heads in the Clouds. Many consumers and business managers incorrectly believe that
their international communications are carried via satellites links. As such, they may
have a false sense of security regarding their understanding of critical dependencies.
65
For example, the volume of international traffic through Hong Kong is doubling every ~18 months.
66
As insight into the potential steep curve ahead, AT&T reported that 3% of its iPhone users generate 40% of the data traffic on
its wireless network. These are the early adopters of what is available – bandwidth intense applications such as video and
gaming. Los Angeles Times, 10 December 2009.
82
ROGUCCI - THE REPORT ISSUE 1, 2010
5. User Expectations Are High. The nature of communications network traffic is evolving
from voice and messages to images, video, and other sophisticated applications, with
general characteristics of being larger in size and more complex. Users have quickly
extended expectations for high reliability from beyond traditional services to those that
are advanced and emerging.
7. Everybody Wants It. There are both new and more stakeholders for reliable GUCCI.
8. Pacific Rim Leadership. The steepest traffic growth area for undersea
communications is trans-Pacific connectivity.68
9. Bank on It. The financial sector’s evolution to a largely electronic infrastructure has
been accomplished through reliance on international communications.
10. “Snap to a Halt!”69 The loss of communications services has an immediate impact on
international financial services sector, which have become almost completely electronic.
11. Financial Sector Sensitivity. Due to the recent economic downturn, global leaders
have a heightened sense of appreciation for the cascading impacts of financial sector
degradation. However, they may not have a sufficient appreciation for the rapidity at
which it can occur. Degradation is conceivable through a technological failure of
international electronic connectivity that would instantaneously freeze assets and
prevent transactions.
12. The Technologically Blind. Stakeholders are typically not technically oriented and do
not focus on the technology that they are using, but rather only its ability to meet their
needs. Even if they were so inclined, because of the complexity of networks, it would be
very difficult for them to know which cable systems they are actually depending on for
specific types of communications.
13. You Get What You Pay For - Maybe. Sophisticated customers tend to distribute their
dependence across multiple cable systems. However, due to common physical paths,
this does not guarantee them of geographic diversity.
14. Two Modes of Awareness. There is wide variation of awareness within the financial
sector and among other key stakeholders regarding their dependence on undersea
cable infrastructure. The vast majority is largely unaware of the dependence and a very
small minority has an advanced appreciation.
67
The international Internet traffic growth has exceeded 100% for three regions: Middles East (160+%), Eastern Europe
(140+%) and South Asia (110+%), TeleGeography Research, 2009.
68
TeleGeography Research, 2009.
69
U.S. Federal Reserve Board chief of staff Stephen Malphrus has coined this phrase to describe the instantaneous transfer of
impact from the loss of communications services to the financial sector. Keynote Speeches, IEEE CQR International Workshop,
London, June 2006, and IEEE ROGUCCI Global Summit, October, 2009.
83
ROGUCCI - THE REPORT ISSUE 1, 2010
15. Emerging Role of Operational Risk. The Bank for International Settlements Basil II
Accord establishes operational risk as one of the three fundamental components of risk
that a bank manages. This operational risk includes losses that could stem from internal
processes, people and systems, and external events. Given the tight integration of the
financial sector with international electronic communications networks, intensified
cooperation between the financial and communications sectors is imperative.
16. Financial Sector Due Diligence. Insufficient reliability data is available for financial
sector and other stakeholders to support needed risk calculations. In order to do
appropriate diligence, stakeholders should be able make statistical predications
regarding the expected frequency and duration of outages and the range of impairments
(e.g., payload latency) that can affect their operations. However, insufficient data is
available to support such analyses.
17. Waiting. Financial sector stakeholders have expressed an eagerness for more
complete statistical information about the reliability of GUCCI.
18. Waiting for My Ship to Come In. The limited number of specialized cable repair ships
is a top concern for stakeholders in some regions. Many undersea cable systems have
a zone maintenance agreement (ZMA), in which the risks, costs and repair vessels are
managed across multiple systems.70
19. Nation-State Stakeholders. The protection and integrity of GUCCI remains a focus of
nation-states for both security and economic protection interests.71
20. Resigned to Learn the Hard Way. Those stakeholders aware of the latent
vulnerabilities of global undersea communications cable infrastructure are generally
resigned to work within the current paradigm of incremental improvement based on
lessons learned from historical outages. The expectation is that a widespread
catastrophe has to be experienced before the political will can be established to take
necessary actions to address latent vulnerabilities.72 73
70
The Atlantic Cable Maintenance Agreement (ACMA) covers the North Atlantic and South Atlantic Oceans (and also the South
Pacific on the west coast of South America; the Mediterranean Cable Maintenance Agreement (MECMA) covers the
Mediterranean Sea; and the Mutual Assistance Agreement for Pacific and Indian Ocean Cable Maintenance (PIOCMA) supports
cable systems in the Pacific and Indian Oceans (www.piocma.com).
71
The U.S. President’s National Security Telecommunications Advisory Committee (NSTAC), a Federal Advisory Committee
Act (FACA) body has included undersea cable infrastructure in its studies and guidance to the White House. NSTAC Chair
Letter to President Barak Obama and NSTAC Response to the Sixty-Day Cyber Study Group, March 2009, Pages 10-11.
(www.whitehouse.gov/files/documents/cyber/NSTAC%20Response%20to%20the%20Sixty-
Day%20Cyber%20Study%20Group%203-12-09.pdf), NSTAC Report to the President on International Communications, August
12007, page 6., An Overview of the Use of Submarine Cable Technology by UK PLC, Centre for the Protection of National
Infrastructure (CPNI), March 2006.
72
The concern with this scenario is that given the profound dependence on communications infrastructure that has developed
so rapidly, it is uncertain as to whether societies will be able to absorb the impact of catastrophic critical global infrastructure
failure with its cascading effects.
73
This mindset appears to carry across the human condition, as physician Scott Stoll notes: “Prevention is the wisest, but
hardest medicine.” www.drscottstoll.com/ .
84
ROGUCCI - THE REPORT ISSUE 1, 2010
21. Rare Glimpse of c’s Limit. Usually the speed of light makes communications appear
instantaneous for humans. However, long haul undersea cable systems provide a rare
human experience with the finite nature of the speed of light on the earth. A trip
encompassing the circumference of the earth requires approximately one tenth of a
second – a delay noticeable to a human. During cable failure alternate routes that
require routing over longer distances than normal is common, resulting in latency that is
unacceptable for some real-time sensitive applications.74
22. 99+%. Nearly all long haul inter-continental communications traffic is carried through
undersea communications cables. Less than 1% of inter-continental traffic is carried via
satellites.
23. Alternatives Are Not Up in the Air. Satellite back-up alternatives to undersea
communications cable infrastructure introduce latency that is unacceptable to real-time
sensitive modes of communications and do not have sufficient bandwidth to meet
current demands.75
25. Repeaterless Range. Recent advances in fiber optic technology support propagation
over distances of up to 500 km (~300 miles) without a repeater.
27. DWDM. A key technology for concentrating so many distinct signals in fiber optic
communications is wavelength-division multiplexing (WDM). This is a method of using
different frequencies of light to carry individual signals. This multiplexing can be
The speed of light is ~3.0 x108 meters/second, which would take 0.13 seconds to travel ~4.0 x 107 meters, the circumference
74
of the earth.
75
There are three main reasons for this. First there is a finite frequency domain within any medium. For earth-space-earth
transmissions the same “free space” is utilized; whereas each fiber optic strand provides a new complete frequency domain.
12
Second, undersea fiber optic cables are capable of much greater traffic loads - on the order of terabits (10 , or
6
1,000,000,000,000); whereas satellites offer bandwidth on the order of megabits (10 , or 1,000,000). Third, satellite
transmission paths are considerably longer and the latency introduced with this longer path (recognizable for many from news
interviews with subjects in isolated regions) is unacceptable for some critical applications, such as those associated with
financial markets.
76
However, Morse code is not binary, but rather quinary, as five elements are needed to represent all alphanumeric characters.
85
ROGUCCI - THE REPORT ISSUE 1, 2010
bidirectional over a single fiber strand. Dense WDM (DWDM) uses optical multiplexing
techniques to further increase carrying capacity.
28. Protocol Soup. Synchronous Optical Networking (SONET) and Synchronous Digital
Hierarchy (SDH) are protocols for multiplexing. They are standards that define the transfer
of multiple digital bit streams. Synchronized networking ensures precise coordination rates
across networks by the use of atomic clocks.77 Future networks will likely increasingly rely
upon Multiprotocol Label Switching (MPLS) or something similar, which is able to assign
labels to data packets independent of their protocol and forward them based solely on the
label content. MPLS can handle SONET, Ethernet and other data link layer technologies.
29. Dynamic Rerouting. Capabilities are being developed to automatically reroute traffic
with software controls when a failure is detected. This capability is based on the
availability of alternate routes and spare capacity to complete such rerouting, however.
30. Fiber Pair Count. The number of fiber pairs in a system is typically on the order of 10.78
While systems can physically contain on the order of 100 pairs, there are limiting factors.
These limitations include the maximum repeater weight that can be handled by the cable
as it is lowered into and lifted from the water. In addition, the amount of time required to
repair such a system relative to acceptable weather conditions has been cited as a
consideration.
32. High Voltage. Given the great lengths of submarine cables, the power equipment used
in these applications has some special considerations. Cables are typically powered
from both ends, with opposite charges at either termination. The electric potential
generated is in the range of 1,000 to 15,000+ Volts. Current flows are typically on the
order of 1 Ampere, with variations of no more than an order of magnitude.
33. Ground Water. The signal repeaters are powered by the potential across them. The
current completes its circuit by passing through the metallic core of the cable and
returning by way of the surrounding seawater. The ocean completes the circuit.
34. Out on Two Strikes. When the protective barrier around a cable’s metallic core is
damaged such that its insulation properties are compromised, a short circuit occurs. The
77
Prior to synchronized networks, Plesiochronous Digital Hierarchy (PDH) was used. This scheme coordinated networks to run
at nearly the same rate.
78
4 to 8 pairs are common.
79
Named after Sir Chandrasekhara Venkata Raman, who discovered the inelastic scattering of a photon in liquids, for which he
received the Nobel Prize in Physics in 1930.
86
ROGUCCI - THE REPORT ISSUE 1, 2010
location of the short becomes the new virtual earth. However, the system can continue
to operate as long as the power feed equipment from either end can produce enough
voltage to provide the minimum needed potential across each repeater. If a second loss
of insulation occurs along the cable, the system will fail to operate, as there will be no
potential between the two virtual earth points.80
35. As Thin As Your Hair. Optical fibers have a diameter on the order of 10 microns.81
The fiber is glass - typically made from silica (silicon dioxide, SiO2), which is found in
sand and quartz, and is one of the most abundant minerals on the Earth.82 The long,
thin, cylindrical strands form a waveguide that keeps light within its core as the refraction
index of the material and geometry cause the light to be reflected internally as it passes
along its length.
36. Fiber Splicing. The repair of a broken fiber strand so that it can again serve as a
continuous optical waveguide, was once thought to be impossible. It is now performed
routinely, however with a process that requires great care and precision. Fusion welding
uses heat to join two fibers end to end. The result is a joint in which light passing
through does not scatter or reflect backwards.
37. Cause Analysis. Because of limitations to monitor the vast spans of the seafloor that
host GUCCI, the root cause analysis of many outages results in imprecise conclusions.
The most frequently exercised intrinsic vulnerability is hardware’s susceptibility to
physical damage. This can be confirmed. However, the exact source of external
aggression that acted as the threat agent is often not determined. Attribution for most
outages is categorized generally as damage caused by anchors and fishing.83
80
For this reason the immediate repair of shunt faults is imperative, in order to avoid an outage.
81
Single mode; multi-mode fibers tend to be an order of magnitude larger in diameter.
82
Doping is used to achieve attenuation levels suitable for long haul distances.
83
www.iscpc.org
87
ROGUCCI - THE REPORT ISSUE 1, 2010
39. Not a Role Model Yet. The current level of industry cooperation demonstrates
significant progress, but comes short of supporting trusted sharing of outage data so that
a global reliability performance level can be calculated.84
42. Highly Reliable Components. Undersea communications software and hardware are
designed with ultra-high reliable requirements – typically some of the highest standards
in the broad ICT industry.87
43. Seeing the Light. Transmission medium switched from metallic (copper) to optical fiber
in the 1980s.
44. The Gravity of It All. The early undersea cables, which relied on an outer protective
cover of gutta-percha as an insulator, were buoyant.88
84
A role model example of private sector cooperation – including among competitors – to measure and improve infrastructure-
wide reliability performance can be seen in the nearly two decade cooperation of the ATIS Network Reliability Steering
Committee. www.atis.org/nrsc. Under non-disclosure agreement and with the use of a trusted third party, industry members
share outage data, conduct joint expert analyses on causes and produce statistical descriptions and reports.
85
Bishop, David, Architects of the Internet: Speeding Net Traffic with Tiny Mirrors, EETimes, September 2000.
86
This is keeping pace with “Nielsen’s Law”, which predicts a 50% annual increase in connection speed from a usability
perspective. Nielsen's Law of Internet Bandwidth, Nielsen, Jakob, www.useit.com/alertbox/980405.html, April, 1998.
87
Ultra-high reliability expectations were established throughout the industry’s history. For example, the first transatlantic
telephone system (TAT-1), was built in the mid-1950s by AT&T (what is now Tyco Telecommunications), along with the British
Post Office and the with the Canadian Overseas Telephone Corporation. It supported 36 analog telephone circuits
simultaneously. TAT-1 performed flawlessly for more than two decades. When it was retired in 1978, the system had not
experienced a single component failure. www.tycotelecom.com/pdfs/tyco_history.pdf
88
ROGUCCI - THE REPORT ISSUE 1, 2010
46. Like a Garden Hose. Undersea cables vary in diameter based on the manufacturer and
the extent of protection. Cables in environments with more activity (i.e. near shore lines)
call for more protection. Cables in deeper oceans require less protection.
47. Recipe for Success. The materials used in the manufacturing of undersea
communications cables are carefully selected based on many factors. These include
weight, electrical conductivity, contribution to tensile and other strength considerations,
contribution to bending radius, chemical interactions with other materials used, affects of
high pressure on them, contraction and expansion, longevity and cost.
49. Visibility Means Accessibility. Undersea cable systems, landing points and shipping
vessels are identifiable and therefore accessible.92
88
The first undersea cable, deployed in 1850, required weights to sink to the sea floor.
89
The deepest part of the ocean known to man is found in the Mariana Trench located in the Western Pacific east of the
Mariana Islands. The recorded depth extends to 11,033 meters. Water column pressures at this depth are on the order of 100
megapascals (over 15,000 psi), which is 1,000 times the standard atmospheric pressure at sea level.
en.wikipedia.org/wiki/Mariana_Trench.
90
Example shown at Alcatel-Lucent OALC4 family. Depicted are the Lightweight (LW) [17 mm], Lightweight Protected (LP) [23
mm], Single Armored (SA) [31 mm], and Double Armored (DA) [46 mm].
91
Appendix A provides examples of the range and details of information available on the Internet.
92
This is an intrinsic vulnerability of the Environment Ingredient, discussed in Section 3.
89
ROGUCCI - THE REPORT ISSUE 1, 2010
50. Looking Backwards. Most risk analysis and preparations are limited to previously
experienced failure modes. However, senior experts recognize latent modes of failure.
The consequences of a long-term outage from some of these failures could be
catastrophic.
51. Intrinsic Vulnerability Approach. Stakeholders for highly reliable and resilient global
undersea communications infrastructure would enhance their current understanding by
including systematic coverage of intrinsic vulnerabilities and actively anticipating the
potential impact of latent modes of failure.93
52. SPOFs. GUCCI has several geographic aggregation points that present latent single
points of failure. The probability of a failure to occur at one place is much higher than for
at multiple places simultaneously. Points of concentration are an intrinsic vulnerability of
the Network ingredient.94
53. Landing Sites. The landing stations and their approaches from the sea are avenues
that concentrate multiple cables and therefore present a particular concern from a
physical diversity perspective.
54. Back on Land. Terrestrial routes are being deployed as alternatives to undersea
routes.95
55. Basic Topologies. There are several geometric arrangements used for connectivity.
Factors used to determine the topology include economic, number of connection points,
and the distance. Branching is used when connectivity is needed along the way
between two points. A ring architecture provides two simultaneous transmissions and
can recover automatically when one path is cut. A collapsed ring trades reliability for
capacity. A mesh network provides more alternate pathways but has less reserve
capacity assurance. (See Figure 29.)
93
Section 3.
94
Section 3.5.2.
95
Reliance Takes Silk Road to China, Lightreading.com, 26 August 2009.
90
ROGUCCI - THE REPORT ISSUE 1, 2010
56. Collapsed Rings. Many undersea systems that were originally deployed as
Synchronized Optical Network (SONET) Rings, have been collapsed, or otherwise
opened, which results in networks without the protection of a ring topology. This is done
to increase capacity, however, it has exacted a cost on redundancy.
57. Mesh Topology. There is increased use of mesh network topologies. If designed with
spare capacity, these geometric arrangements can offer increased resilience by offering
multiple paths to maintain connectivity. If reserve capacity is not managed, then a single
failure could result in substantial impairment of service.
58. No “Plan B”. There is currently no alternative to GUCCI for providing high-speed
broadband connectivity among the continents.
59. Hurray Up - and Wait. Damaged undersea cable outages have extended durations for
three primary reasons: weather, contention for limited resources and government
permitting processes for access to sovereign waters.
60. Swelling Marine Activity. There is currently an unprecedented level of human activity
in the oceans. This includes the combined ocean sprawl in the form of wind turbines,
wave power, tidal power, hydrocarbon access, deep sea and coastal mining, deployment
of cabled ocean observatories, and an increase in the number and size of ships. An
example of a displaced activity is aquaculture development in the form of fish farms,
which are reducing deep-sea fishing activities. The reliability concern here is that
environments can be altered by human activity in a way that can be harmful to the
integrity of cables.
91
ROGUCCI - THE REPORT ISSUE 1, 2010
61. Investing Billions. Investment in new cable infrastructure for the next 3 years is
expected to exceed that of the past six. The current investment level is on the order of
$2 billion annually. This investment peaked in 2001 when investment exceeded $13
billion.96
62. Build Cost. The total initial cost to construct a long haul undersea cable system is on
the order of $100M to $1B.
63. Maintenance Cost. The annual cost to maintain an undersea cable varies across
regions. It is generally on the order of $100 to $1000 per km.97
64. Price Variation. The price for monthly bandwidth lease can vary widely depending on
the points being connected. For example, a 10 Gbps wavelength can range from the
order of $10,000 to $100,000.
65. Nothing But Time. It takes several years to plan and build a new undersea
communications cable system.
66. Competitive Differentiation. Cable system operators are very sensitive to outage data
that may reflect negatively on the perception of their system’s performance.
67. Small Community. Relative to other communications networks, the number of undersea
communications cable equipment manufacturers and system operators is small.
68. Better than the Alternative. Undersea communications cables are more economical
and generally less susceptible to damage than are terrestrial cables.98
70. Game Change. The undersea communications cable industry has shifted from one
where competition was primarily between service providers exclusive ownership of
systems to one where competition is based on bandwidth cost.
71. Business Impact Disconnect. Contracts between cable system operators and service
providers typically include Force Majeure clauses that exclude operators of any
obligation for the downtime associated with a damaged cable. This legal insulation is
understandable because the cause of cable damage is seldom attributable to cable
system operators. However, the resulting limited awareness of financial and other
96
TeleGeography Research, 2009.
97
Costs for the Pacific tend to be nearly double those for the Atlantic.
98
The NRSC has observed that cable cuts are historically the most frequent cause of widespread outages in the United States
public communications networks. www.atis.org/nrsc.
92
ROGUCCI - THE REPORT ISSUE 1, 2010
impacts of outages, isolates cable system operators from the feedback loop common to
many commercial interfaces. This isolation makes operators less aware of the growing
impact of downtime on end users.
72. The Road More Travelled. The re-use of existing cable routes is common practice for
new system deployments. The motivations are at an individual system level, being
primarily financial for the business and safety for the cable. 99 However, global
infrastructure reliability considerations are not a primary consideration.
73. Business Appetite. Business investors tend to prefer the relative low risk option of
placing cables along certain existing routes (whose safety is known) to meet new
demands, as opposed to pioneering new routes with more uncertainties. The result is
that there is less physical diversity than if more investment was made in new, alternative
routes.
74. Specialized Cable Ships. Cable ships and their crews are typically shared resources.
Contention for such limited resources is one of the contributing factors in extended
duration outages, particularly when multiple cuts are involved.
75. Paying Tolls. Many undersea cable routes involve tariffs, rights of passage fees and
similar expenses levied by nation-states.
76. Spare Capacity. With the exception of Asia-Europe routes, most routes have
considerable “unlit” capacity, though at current traffic growth rates this existing capacity
will be exhausted within a few years.100
77. Maintenance Access. Even if cable system operators were given advance permission
to enter sovereign waters, there could be new requirements placed on them at any time.
99
Planners first define the markets they want to serve, and landing points flow from this. Then they seek the shortest and safest
routes, in order to minimize cost of cable and maintenance. The shortest path to deep water is usually taken, where risks are
less, so the cable can be unarmored. In depths greater than 2,000 m cable is normally much safer and can be manufactured
without armor, thus reducing risk, maintenance, manufacturing and installation cost. Planners of early undersea cables
generally chose the shortest, safest routes between communications hubs. Consequently, distance and safety are the major
motivators in re-using routes. This leads to concentration in some areas, since alternate routes may be longer, more expensive
or more dangerous. In addition, costs to explore new routes can be avoided. Other factors include unknown risks, relationships
with new nation-states, securing rights and the extent of research associated with a new area.
100
TeleGeography Research, 2009.
93
ROGUCCI - THE REPORT ISSUE 1, 2010
79. Paperwork. The procedure for a repair vessel to obtain approval for entering waters to
restore service in some countries is very complex and can introduce significant delay in
to the repair procedure.101 It appears that for some countries the process can vary and
suggests gross lack of planning and coordination on the part of the government.
80. Confusing Boundaries. There is wide variation among countries’ claims on their
territorial rights relative to its adjacent waters.
81. Need to Go the “Extra Mile”. Several nation-states require repair vessels to obtain a
permit for the repair of communications cables, including activity that takes place beyond
a nation-state’s territorial sea, normally 12 nautical miles (NM) from the coastal baseline
(Figure 30).102 103
82. UNCLOS. The United Nations Convention on the Law of the Seas (UNCLOS) provides
special status for undersea communications cables, including special provisions for their
protection.104 105
83. EEZ. The UNCLOS establishes Exclusive Economic Zones that grant nation-states
special rights for the exploration and use of marine resources. The EEZ extends out to
200 nautical miles from its coast (Figure 30).
84. Continental Shelf Access. Nation-states are entitled to lay undersea communications
cables on the continental shelf, with conditions related to natural resources, the course
taken, navigation channels and regard for cables or pipelines already laid (Figure 30).106
107
101
Equipment supplier-provided data showed two modes of repair for faults and outages. One mode had a dramatically much
longer duration, which was due to extended permitting procedures.
102
Cable owners tend to view this as inconsistent with their rights and responsibilities under the United Nations Convention on
the Law of the Sea (1982) ("UNCLOS").
103
This is a reliability concern because this practice often increases the duration of repair times, increases maintenance costs,
and destabilizes the investment environment for this critical infrastructure: if nation-states can impose such mandates at will,
the rights of cable owners are uncertain.
104
October 1982, www.un.org/Depts/los/convention_agreements/convention_overview_convention.htm.
105
Appendix E.
106
A continental shelf is the undersea extension of a continent, which can extend out for many miles into sea.
107
UNCLOS Article 57, Submarine cables and pipelines on the continental shelf. See Appendix E.
94
ROGUCCI - THE REPORT ISSUE 1, 2010
85. Freedom of the High Seas. Freedoms spelled out for all nation-states on the high seas
specifically include one to lay undersea cables, in addition to those for navigation, over
flight, constructing artificial islands, fishing and scientific research.108
86. Intelligence Eavesdropping. The switch from metallic to fiber optic cable made the
interception of traffic over undersea cables much more difficult.
87. A Shot Across the Bows. Hostilities on the High Seas are an increasing concern for
undersea cable repair ship operators, their crews and other stakeholders.
89. A History of Importance. Undersea communications cables have been protected with
international law since the International Convention for the Protection of Submarine
Cables of 1884.
108
UNCLOS Article 87, Freedom of the high seas, Article 112, Right to lay submarine cable and pipelines. See Appendix E.
109
Burnett, Douglas, International Telecommunication Cable Repair Under UNCLOS.
95
ROGUCCI - THE REPORT ISSUE 1, 2010
91. Keep Your Hands to Yourself. Parties that damage a neighboring undersea cable
when deploying or maintaining their own cable are responsible for the cost of the
damages they cause.111
92. Anchors Away! Nation-states are to recognize when a ship has sacrificed an anchor or
fishing equipment in order to avoid damaging an undersea cable.112
93. Seabed Ownership. Part XI of the UNCLOS provides for the assignment of mineral
rights outside of the EEZs. UNCLOS set up the International Seabed Authority, an
intergovernmental organization that controls mineral activities in international seabed
areas.113
94. U.S. Not On Board. The United States has signed, but not ratified, the United Nations
Convention on the Law of the Sea. Objections to the role of the ISA have been cited as
impeding ratification. The United States is the only major maritime power to not ratify
the treaty.
95. Mining the Floor. The International Seabed Authority is experiencing a dramatically
heightened interest in the mining of seafloor minerals. 114 This is significant from a
reliability perspective as activity on the sea floor can have harmful repercussions on
cable integrity.
96. Controlled Approaches. Some nation-states have established special zones for
communications cables. Advocates emphasize the benefits that the clarity of designated
locations provides for protecting cables through restricted access. Critics raise concerns
of tighter physical concentration and of heightened awareness of the critical
infrastructure locations.
97. Good Housekeeping? Policies within nation-state governments are not coordinated.
Examples include the domains of security, regulation, commerce, environment,
transportation and windmill and mining and fishing activities.
98. Battened Down the Hatches. Those who may be most aware of the concerns from
their nation-state’s security perspective are also those whose responsibilities are highly
aligned with specific nation-state security interests. These individuals are seldom
enabled to engage international parties to discuss their concerns and propose
110
UNCLOS Article 113, Breaking or injury of a submarine cable or pipeline. See Appendix E.
111
UNCLOS Article 114, Breaking or injury by owners of a submarine cable or pipeline of another submarine cable or pipeline.
See Appendix E.
112
UNCLOS Article 115, Indemnity for loss incurred in avoiding injury to a submarine cable or pipeline. See Appendix E.
113
The ISA is based in Kingston, Jamaica. www.isa.org.jm.
114
The International Seabed Authority is an autonomous international organization established under the 1982 United Nations
Convention on the Law of the Sea and the 1994 Agreement relating to the Implementation of Part XI of the United Nations
Convention on the Law of the Sea. www.isa.org.jm
96
ROGUCCI - THE REPORT ISSUE 1, 2010
cooperative measures to protect GUCCI. Track II discussions are a possible avenue for
international critical infrastructure protection.
99. A Sea Change. The deployment of new alternative cable routes to avoid several
GUCCI geographic chokepoints would require international ASPR breakthroughs.
100. Eating Dust. Relative to the growth in stakeholder needs and the advances in
technology, progress in essential complimentary international ASPR is not keeping
pace.115
115
81% of the participants of the EWI Worldwide Security Conference 7, Multilateral Cybersecurity Consultation indicated that
“the current level of international cooperation in cyber space is far, far behind where it needs to be.” Brussels, February 2010.
97
ROGUCCI - THE REPORT ISSUE 1, 2010
5. RECOMMENDATIONS
The ROGUCCI process led to the development of twelve Recommendations. Each of these
Recommendations is actionable and, if implemented, would improve the reliability of global
communications infrastructure. These Recommendations were developed based on international
stakeholder perspectives from six continents, the insights captured from the 100 Key Observations and
expertise from across the eight ingredients of communications infrastructure. In addition, each
Recommendation was reviewed and supported by stakeholders who are vitally dependent on GUCCI.
This section presents each of the twelve Recommendations along with supporting material, which
includes a concise statement of purpose, brief background, review of benefits achieved with The
Recommendation’s implementation, required commitments, alternatives and their consequences,
suggested next steps and measures of success. Because these recommendations are intended to mobilize
individuals and organizations in effective and coordinated action, the articulation of this surrounding
guidance is considered indispensible in realizing the sought after reliability improvements.
Another noteworthy observation from Table 7 is that the private sector is more often the primary leader
than are stakeholders or governments. To be clear, given the relative constraints for governments to forge
agreements, the leadership of the private sector is imperative.
The Recommendations are deliberately written at the level of specificity presented. For example, while it
is apparent that there are organizations possibly well suited for implementing certain aspects of a given
recommendation, restraint has been used to avoid naming specific organizations as candidates. This is
done in order to preserve an open opportunity for others to take initiative and serve as leaders. There is a
lot of work to be done. All available, qualified resources are needed. Thus, other than by broad role (i.e.
private sector, stakeholder, government), the potential sources of support are quite open. Other examples
of targeted specificity are seen by the focus on the heart of required commitments, analysis of alternative
approaches and the brevity of the measures of success.
The ROGUCCI web site has been designated as a place to track ongoing progress of recommendation
implementation.
98
ROGUCCI - THE REPORT ISSUE 1, 2010
Private
ROGUCCI Recommendations Stakeholders Governments
Sector
Rudimentary Geographic Diversity for
1 1 1 1
Global Infrastructure
International Communications
6 Infrastructure Standard for the 2 1 2
Financial Sector
Measurements for Stakeholder Due
7 1 2 0
Diligence
Improved Cable Protection
8 Agreements, Standards, Policies and 2 0 1*
Regulations (ASPR)
Government Inter-Agency
9 Coordination for Undersea Cable 2 0 1*
Infrastructure
Education and Awareness of GUCCI
10 1 2 2
Critical Role
KEY
Primary Leadership Role 1
Active Supporting Leadership Role 2
Not Applicable 0
99
ROGUCCI - THE REPORT ISSUE 1, 2010
Recommendation Impact
The Recommendations deal with the full range of challenges: the normal non-crisis state, the crisis state,
and the crisis response state. Figure 31 provides a high level overview of the relationships of The
Recommendations to these three states. Here a timeline is used to show the progressive situations of
normal operation, crisis, recovery and return to normal operation. The reliability of GUCCI concerns
each of these situations, and therefore The Recommendations span the continuum.
Continuing with reference to Figure 31, the following is a brief summary of the impact of each
Recommendation’s implementation.
Recommendation 1, Rudimentary Geographic Diversity for Global Infrastructure, decisively reduces the
impact of the most severe multiple cable cuts that could be experienced.
Recommendation 2, Prioritization for Timely Cable Repairs, reduces the time associated with restoring
service after individual disruptive events, and would have very strong overall improvement on
combined GUCCI downtime.
Recommendation 3, Preparedness for Hostile Maritime Crisis, can help avoid a disruptive attack event
and also provide critical management during a crisis that may occur.
Recommendation 4, Best Practices and Trusted Information Sharing, enables higher levels of reliability
in normal conditions and also provides support for crisis and crisis recovery situations.
100
ROGUCCI - THE REPORT ISSUE 1, 2010
Recommendation 7, Measurements for Stakeholder Due Diligence, will provide much needed advances
in understanding GUCCI performance during normal, crisis and crisis recovery periods.
Recommendation 8, Improved Cable Protection Agreements, Standards, Policies and Regulations (ASPR),
will keep GUCCI in normal conditions by providing countermeasures to prevent some of the
most common forms of crises.
Recommendation 9, Government Inter-Agency Coordination for Undersea Cable Infrastructure, will assist in
optimizing the conditions that support normal conditions.
Recommendation 10, Education and Awareness of GUCCI Critical Role, will elevate the level of
understanding of how important the normal conditions are to the health of governments,
commerce and society.
Recommendation 11, Mechanisms for Handling Overload Demand, will provide robustness by enabling
the most critical traffic to be carried to its destination during periods of crisis.
Recommendation 12, Recognize GUCCI Catastrophic Loss as a Grand Challenge, will commence what
is expected to be a long journey toward solutions that will enable a more acceptable crisis
recovery from a catastrophic worldwide, or wide regional, loss of GUCCI.
116
Some Observations were included for their purely tutorial value.
101
ROGUCCI - THE REPORT ISSUE 1, 2010
Purpose
This Recommendation addresses the issue of how to significantly improve the reliability of GUCCI by addressing
unwanted points of concentration through the use of geographically diverse routes.
Background
The world’s undersea communications cable infrastructure performs at a level of reliability such that its
availability and operation are taken for granted by countless users.117 However, the dramatically increasing
dependence upon this infrastructure evokes a sense that ever-increasing diligence is needed to ensure its
reliability performance is commensurate with this dependence.118 When designing and implementing
highly reliable systems, a fundamental principle of reliability engineering is to avoid single points or modes
of failure.119 Redundancy and diversity are design techniques used to prevent any single failure causing a
system-wide failure. This is because the statistical likelihood of one failure is typically several orders of
magnitude higher than for two or more failures occurring simultaneously.120 121 The fundamental principle
of avoiding single points of failure is compromised in the world’s global undersea communications cable
infrastructure due to the aggregation of cables at certain geographic “choke points”. 122 These locations
include the Luzon Strait, 123 the ‘Suez Canal-Red Sea-Mandab Strait’ passage, 124 and the Strait of
Malacca,125 among others.126 Single points of failure are latent design weaknesses, whether or not they are
ever exposed.127 128 Recent history provides instances where this susceptibility has been exploited.129
The ideal GUCCI topology would be a mesh network with deliberate geographic diversity that wraps a
highly interconnected web around the planet. Contributing factors to the current situation include real
and perceived geographic and nation-state political barriers to preventing private sector investment in
alternate routes to avoid existing choke points.130 Hindrances include initial resistance to explore and
invest in these locations, and then uncertainty regarding access to these cables for maintenance. In
addition, economic incentives motivate undersea network installations to re-use existing paths. 131 132
117
Key Observation 42, Highly Reliable Components, Section 4.2.
118
Key Observation 2, More Bandwidth ≠ More Resilience, Section 4.1.
119
Can be abbreviated as SPOF, SMOF.
120
Context is for a system built for high reliability applications.
121
Key Observation 52, SPOFs, Section 4.2.
122
Even if redundant systems are deployed in such a way that a common aspect is aggregated in a common area, then a single
point of failure is created.
123
The body of water that connects the Philippine Sea of the western Pacific Ocean to the South China Sea, between Taiwan
and Luzon in the Philippines. The strait is about 250 km (155 miles) wide.
124
The Mandab Strait, also, Bab-el-Mandeb, Bab el Mandab, Bab al Mandab, or Bab al Mandeb meaning "Gate of Tears" in
Arabic ()ﺍاﻝلﻡمﻥنﺩدﺏب ﺏبﺍاﺏب, is the strait separating the continents of Asia (at Yemen on the Arabian Peninsula) and Africa (at Djibouti,
north of Somalia on the Horn of Africa), and connecting the Red Sea to the Indian Ocean (Gulf of Aden). The width of the Strait
is about 30 km (18 miles).
125
The Strait of Malacca is a narrow, 805 km (500 mile) stretch of water between Peninsular Malaysia (West Malaysia) and the
Indonesian island of Sumatra; the Strait is 64 km (40 miles) wide at its narrowest point.
126
Key Observation 8, Pacific Rim Leadership, Section 4.1.
127
Key Observation 50, Looking Backwards, Section 4.2.
128
Key Observation 51, Intrinsic Vulnerability Approach, Section 4.2.
129
Recent instances of multiple cables being damaged in geographically concentrated cable pathways include the Hengchun
Earthquake (December 2006), Middle East (January-February 2008), Alexandria, Egypt (December 2008) and the Typhoon
Morakat (August, 2009). See Appendix A for a description of these events.
130
Key Observation 78, Geo-politics, Section 4.4.
131
Key Observation 72, The Road More Travelled, Section 4.3.
102
ROGUCCI - THE REPORT ISSUE 1, 2010
Overland alternatives have always been a possible solution, however, such routes also have challenges
such as accessibility for initial deployment and ongoing maintenance.133
Recommendation 1
Stakeholders for highly reliable and resilient international communications should
actively promote the deployment of geographically separate cable paths to avoid
current single points of failure, by serving as advocates to the nation-states
controlling the lands and waters for potential alternative, diverse paths.
Required Commitment
To sustain the viability of The Recommendation, stakeholders, governments and the private sector must
be committed to defined courses. Specifically,
Stakeholders must commit to a course of advocacy to ensure that effective articulation of the
geographic concentration risk is understood by the appropriate governments.134
International policy change agents must effectively frame the interests for decision makers and
mobilize resources.135
Nation-state governments must provide access to investors and provide assurances for timely
ongoing maintenance.
Investors must build out new fiber cable systems in routes providing new geographic diversity.
If implemented correctly, the new routes will be of a distance similar to - or shorter than - existing routes,
so as to preserve the low latency transport required by time-sensitive users, such as the financial services
sector. Shorter routes would provide the added benefit of reduced latency and be thus more competitive
for financial markets.
132
Key Observation 73, Business Appetite, Section 4.3.
133
The most common cause of terrestrial network outages in the U.S. has traditionally been cable cuts per ATIS Network
Reliability Steering Committee (NRSC), www.atis.org.
134
Key Observation 20, Resigned to Learn the Hard Way, Section 4.1.
135
Key Observation 99, A Sea Change, Section 4.4.
103
ROGUCCI - THE REPORT ISSUE 1, 2010
o Keep the issue quiet . . . resulting in eventual exposure through natural or man-made forces, but with the
impact being greater due to increased dependence on GUCCI as time goes by.136 137
o Discourage use and dependence on global connectivity . . . would be cause for profound disadvantage to a
nation-state in terms of technological and economic development.138
o Maintain the current course . . . passively promoting increased global dependence on global infrastructure with
latent design deficiencies, the anticipated ramifications being higher likelihood of catastrophic loss of global or
regional connectivity.139
Next Steps
Suggested next steps to generate momentum toward the implementation of The Recommendation
include:
1-1. Private and public sector stakeholders should establish a guiding coalition to actively raise
awareness of existing SPOF concerns and advocate deployment of geographic diversity for cable
routes at existing choke points. A proven global policy change agent should champion this
initiative.
1-2. Financial sector and other stakeholders should articulate their need for reduced operational
risk through geographic diversity around existing infrastructure choke points.
1-3. Governments with sovereignty in regions with existing GUCCI SPOF concerns should
attract investors by providing assurances regarding access for deployment and ongoing
maintenance as well as clarity around private sector ownership rights of deployed infrastructure.
1-4. Rudimentary geographic diversity is provided at existing GUCCI choke points with the
deployment of additional communications cables taking alternative routes.
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
Geographic diversity provided: Existing undersea cable infrastructure choke points are
avoided through the deployment of cables in physically diverse routes.
Latency-competitive routes provided: The routes designated as alternatives for the existing
choke points are of similar or shorter distance so that they avoid unacceptable payload latency.
136
One approach to addressing this infrastructure design concern is to reduce awareness in order to limit its exposure to
malicious agents. The desired benefits of this approach would be minimal, as information regarding cable path routes and
points of concentration are already in the public domain. In addition, the consequences of reducing awareness of this concern
will compete with the need for broad global awareness and the need for cooperative action.
137
Gambetta, Diego, and Hertog, Steffen, Engineers of Jihad, Sociology Working Papers, Department of Sociology, University
of Oxford, 2007. This paper documents that a significant number of terrorists have advanced technical training. Thus they are
capable of accessing the existing public domain information and understanding the infrastructure implications.
138
In 2007, the total transaction volume of e-commerce in China exceeded 2 T Yuan, a 90% growth over the previous year. E-
commerce is forecast to be the main medium of commerce and about 70% of trade in 10 years. China Economic Net, November
2008.
139
Key Observation 100, Eating Dust, Section 4.4.
104
ROGUCCI - THE REPORT ISSUE 1, 2010
Purpose
The Recommendation addresses the issue of how to significantly reduce the average time needed to restore service after
cable damage. This can be done by addressing the lengthy approval process for cable repair vessels to gain access to sovereign
waters.
Background
Damaged undersea cable repairs have extended durations for three primary reasons: weather, contention
for limited resources and government permitting processes for access to sovereign waters.140 141 142 The
first is outside of human control and the second is discussed elsewhere in The Report. The third reason is
addressed here. Unlike other challenges for improving the reliability of GUCCI that deal with hard
limitations in physics and geography, very long distances, and outdoor and undersea environments,
improving the time needed to complete a process is very much a soft and controllable parameter.
The repair of a damaged undersea communications cable is a process that involves coordination between
the cable system owner, a specialized repair vessel operator and the nation-state government in whose
waters the repair operation needs to be performed. 143 144 Because of variations across nation-state
governments’ policies and procedures that grant access for repair operations, there is wide variation in
permitting approval times – from 24 hours to well over 2 months. Despite the greatly increasing
dependence on this infrastructure and resulting negative impact associated with any downtime, there has
been no meaningful change in years. On one hand, there are governments whose process is proactive and
streamlined. In these cases, speedy restoration of service has been prioritized and coordination planning
for responses to anticipated outages includes pre-approval for repair operations in designated waters.
Such coordination and planning keeps the approval process on the order of only days.145 On the other
hand, there are governments whose approval approach is reactive, uncoordinated among divisions, or
otherwise ineffective in prioritizing the restoration of service over damaged cables.146 These cases are
typified by information being requested during the approval process that could have been provided in
advance of an outage, slow and bureaucratic interactions between government agencies or ministries, and
a general unawareness of how the approval for access into waters is a priority – even though the
government may at that very time be experiencing severe negative affects from the outage.147 148 In these
cases, outage durations are unnecessarily extended by additional weeks.149
140
Key Observation 74, Specialized Cable Ships, Section 4.3.
141
Key Observation 80, Confusing Boundaries, Section 4.4.
142
Key Observation 81, Need to Go the “Extra Mile”, Section 4.4.
143
There are three possible situations: no permit required, permit required in territorial waters (typically 12 nautical miles),
permit required in disputed territorial waters.
144
If different from the government of the territorial sea, the government of the coastal area hosting the landing station is an
additional entity needing to be engaged.
145
Key Observation 77, Maintenance Access, Section 4.3.
146
Key Observation 79, Paperwork, Section 4.3.
147
Repair vessel owners have been required to provide annual reports on their companies’ business as part of one lengthy
approval process; this is information that could have been requested and provided well ahead of an outage.
148
Even in situations where all agencies of a government agree with approval for access, the carrying out of routine
administrative protocols introduce weeks of delays.
149
It is recognized that a nation-state government may need time to perform forensic analysis of a cable’s damage for its
security interests; though the time required for this activity is not as long as the delay durations here referenced. Additional
security concerns include cable repair ships performing espionage or surveying missions.
105
ROGUCCI - THE REPORT ISSUE 1, 2010
Regarding the special case of disputed territorial waters, the undersea cable industry continues to expend
considerable effort to promote ratification of the UNCLOS as a means of establishing international laws
protecting the rights of cable owners in international waters.150 The industry is encouraged that the
UNCLOS provides special status to undersea communications cables, but also recognizes that confusion
is caused by the differences between legal regimes under the UNCLOS territorial seas, Exclusive
Economic Zone (EEZs) and Continental Shelves with regard to submarine cables.151 152 153
Very long duration outages are a major concern regarding the reliability of GUCCI because they
contribute significantly to overall widespread downtime or impairment. In addition, these long duration
outages should be a major concern for the economic stability of an established or emerging nation-state,
as its business, financial transactions and many other international connectivity-dependent functions are
lost or severely impaired.154
Recommendation 2
Nation-state governments should implement policies and procedures to provide timely
approval to authorized cable ships seeking permission to repair damaged undersea
communications cables.
Required Commitment
To sustain the viability of The Recommendation, stakeholders, governments and the private sector must
be committed to defined courses. Specifically,
150
As of October 2009 there are 157 signatures.
151
Key Observations 82, UNCLOS, and 83, EEZ, Section 4.4.
152
China Institute for Marine Affairs (CIMA) and Center for Ocean Laws and Policy (COLP) Regional Workshop on Submarine
Cables Workshop Report, Beijing, PR China, May 2009.
153
The EEZ is a seazone where a nation-state has rights regarding exploration and use of marine resources (UNCLOS Part V
Article 55). The EEZ is 200 nautical miles (370 km) from the coastline. Rights associated with the continental shelf extend to
350 nautical miles (650 km) from the coastline (Article 76).
154
Since the infrastructure may cross many borders, government guarantees supporting infrastructure reliability are required,
including policies ensuring that providers will always have timely access to restore a failed part of a system. Resilient
International Telecommunications Guidelines for the Financial Service Sector, Pacine, Wayne and Callahan, Roger, Financial
Service Sector Coordinating Council www.fsscc.org, 2009.
155
Key Observation 100, Eating Dust, Section 4.4.
106
ROGUCCI - THE REPORT ISSUE 1, 2010
Another benefit of the implementation of The Recommendation is that it will increase awareness within
governments regarding the critical role of GUCCI. In addition, the carrying out of The Recommendation
will foster cooperation between governments and private sector partners.
o Focus all efforts solely on endorsing ratification of the Law of the Sea . . . forfeiting achievable progress
with less demanding instruments.
o Cable ships enter waters to begin repairs prior to permits being issued . . . placing crews and the vessels
at risk, potentially creating an incident that is interpreted as challenging nation-state sovereignty.
o Maintain status quo . . . continuing to accept critical international infrastructure outages of longer durations than
are necessary, with intensifying impact given the increasing global dependence.
Next Steps
Suggested next steps to generate momentum toward the implementation of The Recommendation
include:
2-1. Nation-state governments with best-in-class performance in facilitating speedy repair of damaged
cables should be identified and encouraged to provide their best practices to serve as references
for other governments to consider.157
2-2. Nation-state governments lacking the ability to facilitate timely authorized access to their
sovereign waters should develop policies and procedures that will enable them to achieve
performance comparable to international best-in-class benchmarks.
2-3. Cable owners and repair vessel operators should engage governments where there are new
opportunities to build pro-active permitting procedures.
156
Key Observation 34, Out on Two Strikes, Section 4.2.
157
e.g., At the time of cable system installation, the cable system operator should work with the authorizing government on
permitting procedures for future access for repairing anticipated cable damage. Ideally, the agreed procedure would include
some type of advance permitting arrangements. This Best Practice was shared at the ROGUCCI Global Summit, Dubai,
October 2009.
107
ROGUCCI - THE REPORT ISSUE 1, 2010
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
Improved cooperation: Pro-active planning between private sector and governments regarding
expectations of each critical party and associated estimated time intervals for completion.158
Reduced outage durations: The duration of damaged cable-caused outages is reduced in areas
where there are currently protracted durations due to slow permitting procedures.
158
e.g., some sort of pre-approval arrangement for cable ships operating within certain regions.
108
ROGUCCI - THE REPORT ISSUE 1, 2010
Background
A basic exposure of undersea cables and cable ships is simply that they can be identified and located.159 160
There are a number of concerns that arise from this ever-present susceptibility.
For example, one of the major causes of outages in Southeast Asia during the past decade has been the
theft of cables for interest in their metallic content for scrap resale.161 A corresponding outage trend was
observed with terrestrial networks during this time frame.162 This trend seems to have passed its peak for
now, being correlated to the previous market highs for certain metals. Another concern is the new wave
of high seas piracy. Undersea communications cable repair ships are highly specialized vessels that have a
vital role in the resilience of GUCCI.163 Pirate attacks are on the order of hundreds worldwide, and
increasing at an annual rate of about 200%.164 165 These vessels represent a limited resource and their loss
or damage could contribute to significantly longer outage repair times.166 Unfortunately both undersea
cable routes and pirate activities seem to be common at geographic chokepoints. As an example of this,
the hottest bed for pirate attacks in the world is the water off the Somali coast in the Gulf of Aden
region.167 This is the same stretch of water that hosts undersea cable routes that connect Europe to Asia.
The typical motivation of pirates is different than that of terrorists. Pirates are motivated to gain a ransom
and so their harm is limited to the threats they pose to the personnel, the vessel and the infrastructure
through extended outage durations, should the vessel be unavailable. Conversely, other malicious actors -
such as terrorists - could target and misuse these specialized vessels for harm against undersea
infrastructure.
While most vessels will have some sort of security program, today’s sophisticated pirates can likely
outmatch such defenses, leaving crews, vessels and the infrastructure in danger. In light of the industry’s
inherent exposure to malicious activity, enhanced preparedness is needed.
159
Appendix A outlines the extensive information readily available in the public domain.
160
Key Observation 49, Visibility Means Accessibility, Section 4.2.
161
Thieves may be searching for metallic cables, not able to distinguish fiber optic cables.
162
The Network Reliability Steering Committee (NRSC) special study on malicious activities is documented in the NRSC 2006-
2007 Bienniel Report, pp 24-25, ATIS, August 2008, pages 24-25. The Report documents industry consensus expert guidance
that was developed to deter theft of cables.
163
Key Observation 74, Specialized Cable Ships, Section 4.3.
164
International Maritime Bureau, July, 2009.
165
Key Observation 87, A Shot Across the Bows, Section 4.4.
166
Key Observation 18, Waiting for My Ship to Come In, Section 4.1.
167
“Somali pirates carried out a record number of attacks and hijackings in 2009, despite the deployment of international
warships to thwart them and a United Nations Security Council resolution to bring the fight against them to shore.” The Piracy
Reporting Center of the International Maritime Bureau reported counted that pirates operating across the Gulf of Aden and
along the coast of Somalia had attacked 214 vessels so far this year, resulting in 47 hijackings, a 200% increase from 2007.
Record Number of Pirate Attacks in 2009, New York Times, December 29, 2009.
109
ROGUCCI - THE REPORT ISSUE 1, 2010
Recommendation 3
Nation-state governments should cooperate with each other and private sector
undersea communications cable infrastructure owners and operators to develop
maritime crisis preparedness plans that would protect communications cable vessels
that are vital to the operation of global undersea communications cable infrastructure.
Required Commitment
To sustain the viability of The Recommendation, nation-state governments and the private sector must be
committed to defined courses. Specifically,
o Decide to leave private sector to defend itself alone . . . increasing likelihood of harm to crew, vessels, and
cable infrastructure.
o Do nothing, waiting for an event to occur and then react during this time . . . forfeiting advantages
that could have been achieved with advance planning and coordination.
110
ROGUCCI - THE REPORT ISSUE 1, 2010
Next Steps
Suggested next steps to generate momentum toward the implementation of The Recommendation
include:
3-1. Nation-states and cable system operators should convene regionally to conduct a joint threat
assessment and develop plans for responding to a hostile attack against cable infrastructure or
cable ships.
3-2. Nation-state governments and cable system operators should implement the crisis
preparedness plans developed, including 24x7 points of contact.168
3-3. Nation-state governments and cable system operators should design and conduct crisis
response exercises to evaluate the effectiveness of their plans and to provide practice for the
organizations involved.
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
Emergency contact points: Government and private sector interfaces are established and
operational.
168
An important consideration is the need for modes of communications that are non-undersea cable-based, given the scenari
os that are being addressed. Thus satellite phones should be considered for international communications.
111
ROGUCCI - THE REPORT ISSUE 1, 2010
Background
The scope of undersea cable infrastructure reliability is vast. Whether viewed as protecting the integrity of
hundreds of thousands of kilometers of cable, or from the meticulous diligence required for the
exhaustive extent of the eight ingredients, it is a very big job. However, it can also be a subtle and delicate
topic. The transmission of terabits is done in complete silence through fiber strands as thin as a human
hair.169 Another of the more quiet sides of GUCCI is the sensitive nature of some of its business.
Outages are a delicate topic because they can reflect negatively on a business reputation resulting in
disadvantageous marketplace differentiation and reduced revenues.170 Other international infrastructure
protection information can be nation-state security, where topics may include security compromises that
have happened or concerns that are insufficiently prepared for.171 While the needs for protecting sensitive
information are quite clear, there are equally compelling reasons for ensuring that industry peers are well
informed, as better awareness can be critical in strategies for protection and reliability assurance. This
information sharing is needed on an international basis – particularly for GUCCI, as inter-continental
undersea cables are by definition international critical infrastructure.
Precedents for effective information sharing in trusted environments are well established within the
communications industry. 172 In today’s world of many suppliers, owners and operators, optimum
infrastructure protection cannot be provided without effective information sharing.173
A number of organizations have agendas and active memberships that seek to develop common best
practices and address issues impeding the business of planning, installation and maintenance of undersea
cables. 174 The memberships of these communities have developed a commendable level of trust.
However their remits do not facilitate the resolution of the broader concerns of global resilience voiced by
industry peers and stakeholder participants of the ROGUCCI study group. Information exchanges are
specifically designed to encourage and facilitate this kind of debate and to develop consensus solutions,
which transcend barriers presented by commercial or political interests. With such a huge scope however,
169
Key Observation 35, As Thin As Your Hair, Section 4.2.
170
Key Observation 66, Competitive Differentiation, Section 4.3.
171
A useful point of guidance posted in the ROGUCCI web forum. An example in the cyber security space is consider when a
government agency has information about ‘the Who’, ‘the Why’, ‘the What’, ‘the When’ and ‘the How’ for a specific cyber attack.
Naturally this information is very sensitive. However the technical practitioner may be only interested in ‘the How’. By
negotiating a limited exchange of information about ‘the How’ a compromise can be found to provide more timely and accurate
exchange of information whilst still protecting sensitivities. Peter Brouggy, January 2010.
172
The ATIS Network Reliability Steering Committee (NRSC) has fostered industry cooperation that has improved the reliability
of the U.S. public networks. The NRSC has operated as a trusted information sharing environment to share analysis insights on
outages and develop voluntary, expert best practices for over 15 years (www.atis.org/nrsc). Other references include the
WARP (www.warp.gov.uk/TrustedSharing.htm ) approach that has been deployed in numerous sectors. The European Network
and Information Security Agency (ENISA) is a recently re-invented approach (www.enisa.europa.eu ).
173
Rauscher, Karl, European Commission Availability and Robustness of Electronic Communications Infrastructure (ARECI)
Report, March 2007, page 102.
174
These include the International Cable Protection Committee, the Submarine Cable Improvement Group, and the International
Jointing Consortium.
112
ROGUCCI - THE REPORT ISSUE 1, 2010
some means of partitioning information exchange is needed to bound discussions in order to ensure
relevance to all participants, yet remain sufficiently flexible to allow broad ranging and interdisciplinary
solutions. For example, those who are concerned with the mechanisms for protecting the physical
undersea cable sections will, in general, deal with different people and policies than those who are
concerned with peering arrangements. Yet both aspects have been shown to influence traffic behavior in
the event of a major failure.
With the enormous challenge of protecting and advancing the reliability of GUCCI, the private sector
needs every advantage it can get. Given the choice between the status quo, or a trusted information
sharing environment where industry and nation-state stakeholders could have the combined intelligence of
the industry, the clear choice is the later.175
Recommendation 4
The private sector should establish formal means for sharing information that can
improve the protection and rapid restoration of undersea communications cable
infrastructure.
Required Commitment
To sustain the viability of The Recommendation, the private sector and nation-state governments must be
committed to defined courses. Specifically,
Private sector companies that own and operate undersea communications infrastructure must
jointly establish a trusted environment for sharing information to improve the protection and
rapid restoration of GUCCI.
The private sector must be willing to share threat and outage information in a trusted
environment within the industry for the common good.
Nation-state governments must be willing to share threat and other sensitive information with
owners and operators of GUCCI and safeguard information provided by the industry.
Nation-state governments must be willing to share information that will improve the protection
and rapid restoration of critical infrastructure with other nation-states as well as the owners and
operators of that infrastructure within the other nation-states.
Benefits of New International Governance
Knowledge is power. Sharing information among owners, operators and the governments whose
constituencies depend on that critical infrastructure, provides decision makers with additional knowledge
and insights to help them prepare for, and react to, trends or threats. The sharing of sensitive information
will only occur and flourish in an environment characterized by openness, concern for the common good,
and most of all, trust.
The perceived benefits of establishing information exchanges include the comprehensive capture of
customer requirements, a coherent service provision to customers worldwide, the preservation of
commercial confidentiality, the development of ‘common good’ consensus outside of commercial and
political arenas and the reduction of human barriers to progress.
175
Key Observation 39, Not a Role Model Yet, Section 4.2.
113
ROGUCCI - THE REPORT ISSUE 1, 2010
o Industry stakeholders sharing only with selected partners . . . resulting in fragmented sharing and
response to attacks, and various providers of critical international infrastructure being left uninformed.
o Critical government information kept within government . . . reduces industry’s ability to prepare and
respond to concerns.
o Industry threat and outage information shared only within industry . . . leaves government interests
under-protected and eliminates potential benefits of government assistance during a crisis.
o Information sharing kept within a nation-state government . . . weakens the ability of other governments
to prepare and respond, and negatively impacts the reliability and security of all networks connected to those of the
uninformed nation-states.
o A mandated environment for information sharing not built on mutual trust . . . results in sharing only
to the extent of the mandate, potential unintended consequences, and lost opportunity to benefit from a common body
of knowledge.
Next Steps
Relative to the other Recommendations in The Report, this one takes a considerably longer time to
develop to its full potential. This is because it is based on trust and the development of trust requires time
– years. This is all the more reason for the initial steps to be taken without delay. Following are suggested
next steps that can facilitate The Recommendation’s implementation and the building of that precious
trust.
4-1. The private sector and nation-state governments should investigate, and where appropriate,
join some of the excellent information sharing organizations that already exist, learning their
methods and creating an even larger pool of knowledge, mutually benefiting all organizations.
4-2. The private sector and nation-state governments should convene to establish a trusted
environment for information exchanges centered around functional roles, such as, customer
stakeholders, government regulators, equipment suppliers, and operators.176 Existing fora should
be used as appropriate. A gap analysis should be completed to help identify where other
communities could be created. The following activities should support this step:
• Identify those areas in which cooperation is not effective through existing mechanisms and
where the establishment of information sharing and best practice development could improve
GUCCI resilience and reliability.
• Map identified gaps onto the categories that enable the appropriate expertise to be readily
identified and engaged.177
176
Those most experienced with effective information sharing emphasize the importance of getting the architectural model that
best aligns with the interests of the parties invited to participate. An additional architectural element is the flexibility to selectively
share and unshared with members of a given community. A “star” or centralized arrangement is a topology where all sensitive
information passes through an entity, which then shares with community members. An alternative is the mesh network, which
encourages information sharing directly between parties willing to share. By enabling sharing to thrive where trust exists, the
end result will be substantially more information being shared.
177
The 8i framework can serve this purpose.
114
ROGUCCI - THE REPORT ISSUE 1, 2010
• The scope and remit of the information exchange should be clearly defined.
• Trusted information sharing can only be achieved if the communities are small enough to
allow personal trust to develop. Multiple trusted sharing communities will likely be
needed.
• Participants must recognize that there are barriers to trusted information sharing and
ensure the proposals address these to ensure they are pragmatic and achievable. Typical
barriers include: lack of trust, competition law, lack of awareness, commercial pressures,
and lack of an independent facilitator or trusted third party.
• Some types of information will be more sensitive than others and some will have more
value than others. Many trusted information sharing communities start by sharing low
value, less sensitive information and as trust develops the community can move up the
value chain. This can sometimes take years to mature and therefore it is really important
to identify existing communities who already have a certain level of trust.
Figure 32. Nested Information Exchange Model178
178
Harrison, John; Hill, G, Todd, M., ROGUCCI White Paper on Best Practices and Trusted Information Sharing, Landitd, U.K.
2010.
115
ROGUCCI - THE REPORT ISSUE 1, 2010
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
Scope clarified. The industry defines the Global Undersea Communications Cable Infrastructure.
Financial services sector. The industry engages special challenges and concerns of the international
financial sector with the aim of improving the resilience schemes for systems supporting financial
services.
Best Practices developed and shared. Industry experts share best practices for promoting the
reliability, resilience and robustness of GUCCI. Information sharing is viewed as a means to an end.
The process ultimately underpins a top-level analysis of the issues that currently undermine the
resilience of the global information infrastructure.179
Smarter chain. The reliability of GUCCI is strengthened through enhanced stakeholder awareness,
and the concomitant more complete contracted services and infrastructure investment.
179
Achievement of this measure implies the establishment of effective international fora, as well as fora within nation-states (to
include private sector) that will be able to benefit from the information flowing.
116
ROGUCCI - THE REPORT ISSUE 1, 2010
Background
The Report establishes the need for dealing with individual undersea cable systems as an aggregate, i.e.
global level. The need is based on the limited focus of commercial interests that manage individual
systems, the difficulty stakeholders have in performing due diligence in managing their operational risk
and the extremely high level of importance that this infrastructure plays in the world.180
The industry has historically recognized value in coming together for discussing various aspects of its
operation. There are a number of existing organizations that represent and address some of the concerns
of interested affinity groups involved in various aspects of the undersea cable infrastructure. 181 Reliability
is within the scope of some undersea cable industry cooperative efforts. These fora have brought together
equipment suppliers, network builders and operators and other special industry players such as surveyors
and repair ship fleets. Some of them have facilitated joint studies and have provided guidance that is
made available to the industry or public, as appropriate.182 These include analyses of specific outages,
trends in outage causes, best practices for addressing them, and advocacy for international policy agendas.
Some groups are re-examining their charters to determine how they might address some of the new or
more critical issues of the nature discussed at the ROGUCCI Summit.183
However, as stakeholders better comprehend the degree of their dependence on GUCCI, they require
more from their interface with it. For example, stakeholder participants of the ROGUCCI Global
Summit emphasized that the global view provided by the ROGUCCI process needs to continue to be
championed. They identified a number of issues that would benefit from an ongoing process and efforts
to systematically and comprehensively address several cross-industry and inter-government related
problems at a global level. The increasing dependencies and criticality of this undersea infrastructure to a
broad range of stakeholders further appeared to be evidence of interest and the need for some governance
structure to better permit providers and stakeholders to address key issues in a comprehensive and
strategic manner.184 Financial sector stakeholders described this as the “system-wide” view.185 Other
observations from financial sector stakeholders were that the undersea communications industry would
benefit from more inclusive participation in industry collaborative programs, more structured governance,
better coordination and a unified voice. Specific mission areas for new governance would ideally include
defining expectations for the industry, engaging representative stakeholders and articulating ASPR that
would advance GUCCI resilience.186
180
See Introduction, Sections 2.1, to 2.3.
181
These include the Atlantic Cable Repair and Maintenance Agreement www.acmaweb.ne), International Cable Protection
Committee (www.iscpc.org), Submarine Cable Improvement Group (www.scig.net), Submarine Telecoms Forum
(www.subtelforum.com), SubOptic (www.suboptic.org) and the Universal Jointing Consortium www.ujconsortium.com.
182
Key Observation 66, Competitive Differentiation, Section 4.3.
183
Key Observation 39, Not a Role Model Yet, Section 4.2.
184
Summit participants suggested collaborative efforts to identify problems, develop alternative solutions and provide expert
guidance and leadership. Also, such work would be of distinct benefit to decision makers, who are dealing with these complex
issues, both from an educational and awareness perspective and a source of expert information.
185
The financial services sector stakeholders established the fact that it has an international view that is complete in terms of
capturing all the necessary elements that make up its system.
186
Key Observations 71, Business Impact Disconnect, Section 4.3.
117
ROGUCCI - THE REPORT ISSUE 1, 2010
Recommendation 5
The private sector should establish a new international governance framework for
global undersea communications cable infrastructure to provide optimum support for
its resilience through cross-sector coordination and effectively support stakeholder
interests.
Required Commitment
To sustain the viability of The Recommendation, the private sector and stakeholders must be committed
to defined courses. Specifically,
118
ROGUCCI - THE REPORT ISSUE 1, 2010
Next Steps
Suggested next steps to generate momentum toward the implementation of The Recommendation
include:
5-1. Existing industry fora should re-evaluate their charters and membership and make adjustments,
as appropriate.
5-2. New governance structure should be established, complimenting the existing effective functions.
5-4. Representative stakeholders are invited to be part of the new governance structure.
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
New governance structure. New governance structure and process are established that provide
effective sector-wide coordination and addresses interests of stakeholders, fostering and
facilitating the coordination of cross-sector activities and initiatives designed to improve the
resiliency of the undersea cable infrastructure and services at a global level.
Unified voice. The undersea communications cable industry has a process for discussing issues,
developing consensus and representing itself with a unified voice at a global level.
119
ROGUCCI - THE REPORT ISSUE 1, 2010
Background
The world’s international undersea communications cable infrastructure continues to operate at highly
reliable levels and continues to provide tremendous service to the financial services sector. Indeed, the
reliability of financial sector operations owes much to its ability to place extremely high confidence in its
communications service providers and their networks.
The financial services sector continues to evolve globally with increasing dependence on international
communications every step of the way.187 The sector is achieving much by reducing market risk through
such mechanisms as automation and compressed settlement intervals. On the other hand, it is raising its
operational risks in the process, by such things as increased dependency on GUCCI.188 189 The Bank of
International Settlements, Basel Committee on Banking Supervision has elevated operational risk as a
critical component of its supervisory framework.190 As with anything new, managing operational risk has
not yet been fully mastered. Indeed re-thinking is needed around business processes, resiliency planning
and continuity of operations. 191 Ideally, the information could be limited to focusing on expected
downtime for international connectivity. 192 However, depending on the thoroughness behind such
analyses, additional information may be needed, such as geographic route information for purchased
circuits and bandwidth, and equipment and service supplier information that can contribute to common
failure modes.193 194 The financial sector would benefit much from the systematic and comprehensive
perspective offered by an intrinsic vulnerability approach utilizing the Eight Ingredient (8i) Framework.
Recommendations 4 and 7 position the communications industry to better share information and provide
needed information to the financial sector, respectively. Correspondingly, this Recommendation calls on
the financial services sector to better define its needs and expectations, and to develop a structure to
organize operational risk guidance that allows users to manage their growing global dependency on
GUCCI.195 The need to manage international communications services as a priority is not new to the
financial sector. Recent activities include the development of the U.S. Financial Service Sector
Coordinating Council Resilient International Telecommunications Guidelines for the Financial Service Sector, which
underscored the imperative for improved management of the operational risk in resiliency planning.196 197
187
Key Observation 9, Bank on It, Section 4.1.
188
Key Observation 10, “Snap to a Halt!”, Section 4.1.
189
Key Observation 11, Financial Sector Sensitivity, Section 4.1.
190
Bank of International Settlement, www.bis.org .
191
Key Observation 15, Emerging Role of Operational Risk, Section 4.1.
192
Key Observation 38, Statistical Analysis, Section 4.2.
193
Key Observation 13, You Get What You Pay For – Maybe, Section 4.1.
194
Key Observation 12, The Technologically Blind, Section 4.1.
195
Key Observation 16, Financial Sector Due Diligence, Section 4.1.
196
Pacine, Wayne and Callahan, Roger, www.fsscc.org, FSSCC, 2009. Included in the document are: a description of the
undersea cable infrastructure and commonly used configurations, a description of general risks to the undersea cable
infrastructure, suggestions for analyzing requirements and risks, a description of practices that need to be considered for basic
120
ROGUCCI - THE REPORT ISSUE 1, 2010
However, such progress stops short of calling for international cooperation around a core standard and
for its voluntary utilization, which will enable the more precise management of resilience and operational
risk on a global basis. 199 A standard should appropriately incorporate the financial services sector
sensitivity to latency.200 201 Therefore, The Recommendation builds on the progress achieved to date and
defines a course that will do much to close the gap between common practices and optimum due diligence.
Recommendation 6
The international financial sector should introduce a new core standard for its
information and communications technology dependence that will include guidance
on assuring institutional resilience and managing the operational risk associated with
undersea communications cable infrastructure.
Required Commitment
To sustain the viability of The Recommendation, the private sector must be committed to defined
courses. Specifically,
The international financial sector must recognize GUCCI reliability as a strategic priority for the
stability of its operations.
The international financial institutions must commit operational risk managers to developing the
details of global guidelines.202
The financial sector and international communications industry must commit to a partnership to
develop a core standard that both can agree on.
The financial sector members must voluntarily implement the developed core standard.
The world’s international financial authorities must utilize these standards in their determination
of ratings and other stability-related decisions.203
types of service, suggestions for engaging service providers as partners in a trusted relationship at the beginning and
throughout the life cycle of operations, a discussion of contract considerations and important aspects of managing the ongoing
relationship with international telecommunications service providers.
197
Key Observation 14, Two Modes of Awareness, Section 4.1.
198
Ibid. pages 18, 20.
199
Key Observation 12, The Technologically Blind, Section 4.1.
200
Key Observation 21, Rare Glimpse of c’s Limit, Section 4.2.
201
Key Observation 23, Alternatives Are Not Up in the Air, Section 4.2.
202
central banks, markets, institutions, bank supervisors, investment firms, etc.
203
i.e. Individual financial sector regulators and the Financial Sector Assessment Program (FSAP) of the IMF and World Bank.
121
ROGUCCI - THE REPORT ISSUE 1, 2010
o Assimilate default standards and practices . . . mission critical interests will be under-represented
o Develop multiple standards . . . the financial sector will manage its operational risk inconsistently, and the
clarity of its interface with the undersea communications industry will suffer.204
o Continue status quo of attention . . . the financial sector will be unable to manage its operational risk
effectively.205
Next Steps
Suggested next steps to generate momentum toward the implementation of The Recommendation
include:
6-1. A neutral party that is a well recognized international organization should convene operational
risk managers from the international financial sector, along with other critical stakeholders and
international undersea communications cable experts to define a process for developing a global
standard for operational risk management in this area.206 The core standard development initiative
should utilize the 8i framework to ensure coverage of the full scope of what needs to be considered.207
208 209
6-2. The financial sector and communications industry should implement this process to jointly
produce a new global core standard for international communications infrastructure resilience
assurance.
6-3. The world’s senior economic leaders should promote voluntary adoption of the core standard,
and should utilize nation-state institutional implementation as decision support for its policy and
practices, as appropriate.210
204
i.e. the critical international user communities will manage their operational risk inconsistently, and the lack of consistency will
not provide clarity to potentially valuable investments by the undersea communications industry and users.
205
i.e. the critical users will manage their operational risk based on limited knowledge and information with the likely potential
that unknown risks impact their operations, and the opportunity for more clarity for potential investments will be missed.
206
Key Observation 71, Business Impact Disconnect, Section 4.3.
207
Use of the 8i Framework recommended by Dr. Nasser Saidi, DIFC Chief Economist, in his keynote address to the ROGUCCI
Global Summit, October 2009.
208
Section 3.
209
Key Observation 51, Intrinsic Vulnerability Approach, Section 4.2.
210
e.g., the G8, G20, World Bank, IMF.
122
ROGUCCI - THE REPORT ISSUE 1, 2010
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
Global Core standard. A core standard for international communications reliability is established
for the international financial sector. This standard is recognized with the similar stature of existing
core standards for the international financial sector (Appendix D).211 212
Voluntary implementation. Financial sector institutions, firms, markets and others voluntarily
implement the core standard to enhance the reliability of their international connectivity.
Decision support. The core standard is used to guide private sector investment, international
supervisory bodies and nation-state priorities.
211
e.g., the twelve core standards for Sound Financial Systems of the Financial Stability Board (Appendix X).
212
More specifically, the standard is recognized by the international financial sector supervisory bodies as best practices for
those that provide important international systemic functions that would affect global or significant institutional financial stability;
and by other critical global user communities and international service providers.
123
ROGUCCI - THE REPORT ISSUE 1, 2010
Purpose
The Recommendation addresses the issue of how the undersea communications cable industry supports the needs of
its stakeholders by providing the information they need to manage their dependence on it.
Background
Throughout the world, many stakeholders are depending on the reliability of GUCCI. But the
dependence of some stakeholders stands out for its extremely high import. One such stakeholder is the
financial sector.213 In similarity to vital dependence of the transportation sector on fuel, and agriculture on
rain, the modern financial sector cannot operate without GUCCI.
As the financial services sector continues to evolve on a global basis, increased reliance on information
and communications technology (ICT) translates directly into increased reliance on undersea cable
infrastructure. Traditionally, the focus of resilient communications has been within a continent,
specifically, the “last mile” from the institution to the first node of a robust terrestrial network. Today’s
global markets are vitally dependent on resilient international connectivity. Major gains achieved in
reducing market risk through such mechanisms as automation and compressed settlement intervals are
offset by increased operational risks through increased dependencies on ICT in general, and undersea
cable infrastructure, specifically.214
Those responsible for overseeing their institution’s exposure to operational risk cannot perform due
diligence because there is insufficient information available.215 The fundamental information that is
needed centers around a statistically based expectation of downtime for international connectivity.216
There is basic lack of published, or otherwise available, information on GUCCI reliability for stakeholders
that play critical roles in societies around the world.217 This in turn prevents advanced analysis of outages
and trend information and the formulation of a coordinated response to resilience issues.
The implementation of Recommendations 4 and 5, Best Practices and Trusted Information Sharing, and New
International Governance, respectively, will create structure and spirit to enable this Recommendation to
succeed.219 Further, Recommendation 6, International Communications Infrastructure Standard for the Financial
Sector will be enabled by the implementation of this Recommendation.
213
Key Observation 9, Bank on It, Section 4.1.
214
Key Observation 10, “Snap to a Halt!”, Section 4.1.
215
Key Observation 16, Financial Sector Due Diligence, Section 4.1.
216
Key Observation 38, Statistical Analysis, Section 4.2.
217
Key Observation 17, Waiting, Section 4.1.
218
Makris, Spilios and Lordi, Nick, Undersea Cable System Outages and Global Infrastructure Resilience: A Discussion of
Issues in Managing Third-Party Expectations, Proceedings of the IEEE CQR International Workshop, 2009.
219
Key Observation 66, Competitive Differentiation, Section 4.3.
124
ROGUCCI - THE REPORT ISSUE 1, 2010
Recommendation 7
The private sector should establish a method of providing basic reliability
performance statistics to stakeholders.
Required Commitment
To sustain the viability of The Recommendation, the private sector and stakeholders must be committed
to defined courses. Specifically,
o Governments or stakeholders force the industry to report outages . . . resulting in unwanted regulation
and cost, inefficient use of expert resources as they are needed to support compliance fulfillment, and increased
defensive posturing by the industry.
o Outage analysis continues at the current limited practice . . . accepting suboptimum industry coordination
and limiting stakeholders’ ability to manage risks.
125
ROGUCCI - THE REPORT ISSUE 1, 2010
Next Steps
Next steps to generate momentum toward the implementation of The Recommendation are suggested
below. This process should hold strict standards for the protection of commercial interests by
ensuring that no competitive disadvantage results from any part of it.220
7-1. The undersea communications industry should establish a trusted environment in which to
submit outage and other critical infrastructure reliability data. 221
7-2. The collected information should be aggregated at an industry level, where subject matter experts
from across the industry conduct joint analyses to determine statistically significant trends based on
historical events, and systematically assess intrinsic vulnerabilities that may pose latent reliability
challenges.222
7-3. The industry should provide a report on the “Health of Global Undersea Communications Cable
Infrastructure” to support its stakeholders. The Report should provide stakeholders with the essential
information that stakeholders need to perform risk management.223
7-4. Continuous improvement should be made for the steps above, increasing industry participation,
“peeling the onion” to study the next layer of problems, and confirming with stakeholders that their
need for basic information is being met.
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
Outage database. The industry sets up a database to collect outage information, ensuring that no
competitive disadvantage is gained from the process.
Joint analysis. Subject matter experts are lending expertise in collaborative efforts to understand
reliability influencers and suggest countermeasures.
Unified voice. The undersea communications cable industry produces an authoritative description
of its performance at a global level, satisfying stakeholder needs.
220
The existing trusted environment models referenced throughout the Report can be used to build confidence in the viability of
this approach.
221
Recommendation 4, Best Practices and Trust Information Sharing.
222
Section 3 provides a reference for these systematic intrinsic vulnerability analyses using the 8i framework.
223
Recommendation 6, International Communications Infrastructure Standard for the Financial Sector.
126
ROGUCCI - THE REPORT ISSUE 1, 2010
Purpose
The Recommendation addresses the issue of how to provide better protection of deployed cable systems using available
or new policy instruments.
Background
The protection of undersea cables in international law is well established dating back to the 1880s.224
Cable protection laws have been updated with new policy at the international level.225 However, too often
there is not corresponding nation-state-level policy to match the priority established at the international
level. As a result, avoidable cable damage is routinely experienced.
Undersea communications cables are especially vulnerable in the transition from deep water to their
landing site.226 This is due to the shallow water and increased activity in these areas.227 It is therefore
imperative that these cables be supported with special protection in these particular areas.
Nation-states for the most part understand the importance of GUCCI to their economy and security.228
Much of the world’s most robust economic growth is taking place in regions where there is traditionally
less attention paid to critical infrastructure protection, though this is not a problem confined to emerging
market regions.229 Some countries are moving forward with an approach to define special areas for
undersea communications cable passage.230
Since the cable infrastructure may cross many borders, government guarantees that support infrastructure
reliability are needed. Ideally, these provisions would include policies ensuring that providers will have
timely access to restore a failed part of a system.231 232
Recommendation 8
Nation-state governments should implement best practices for protecting undersea
communications cables within their sovereign waters.
224
Key Observation 89, A History of Importance, Section 4.4.
225
Key Observation 82, UNCLOS, Section 4.4.
226
Key Observation 53, Landing Sites, Section 4.2.
227
Key Observation 60, Swelling Marine Activity, Section 4.2.
228
Key Observation 19, Nation-State Stakeholders, Section 4.1.
229
Key Observation 6, Traffic Growth Is Part of Development, Section 4.1.
230
Key Observation 96, Controlled Approaches, Section 4.4.
231
Resilient International Telecommunications Guidelines for the Financial Service Sector, Pacine, Wayne and Callahan, Roger,
Financial Service Sector Coordinating Council www.fsscc.org, 2009.
232
Key Observation, 90, It Needs Some Teeth, Section 4.4.
127
ROGUCCI - THE REPORT ISSUE 1, 2010
Required Commitment
To sustain the viability of The Recommendation, nation-state governments and the private sector must be
committed to defined courses. Specifically,
o Do nothing, waiting for an event to occur and then reacting . . . forfeiting advantages that could have
been achieved with efficient government policy and practice.
Next Steps
Suggested next steps to generate momentum toward the implementation of The Recommendation
include:
8-1. Nation-states and cable system operators should convene for the purpose of identifying best
practices among the represented governments. The private sector should articulate its needs and
explain the impacts when these needs are not met.
8-2. Agreement should be sought around the articulation of the best practices shared.
8-3. The best practices should be implemented by the governments participating in the process, then
also shared with governments not participating in the process.
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
Prioritized mission: Government agencies are aligned on the priority, policies and practices for
protecting undersea communications cable infrastructure.
233
Key Observation 100, Eating Dust, Section 4.4.
128
ROGUCCI - THE REPORT ISSUE 1, 2010
Purpose
The Recommendation addresses the issue of how to transform the governments’ lack of inter-agency coordination
when it comes to policy for undersea cable protection.
Background
Effective and efficient government agency coordination is a challenge that has been around since
governments were first established. There are a number of challenges to overcome, including different
responsibilities, different – and sometimes conflicting – priorities and varying types of available resources.
While the inter-governmental coordination is also an area for concern, this Recommendation focuses on
the coordination within a single nation-state. The undersea cable industry is too often impacted by
government policies that impede its efforts to improve the reliability of its systems and services.234 One of
the primary causes of this is poor coordination among government agencies.235 It is understandable that
each organization will have its own primary interests, however, this often results in inconsistent policy,
confusion and delays.
There are no easy solutions. Drawing attention to this problem is a first step, but it must be followed with
commitments and actions for improvements to be realized. Some of the opportunities for progress may
lie in greater education and awareness among key policy makers and regulators, the quantification of the
negative impact of uncoordinated government and the private sector’s capture of the best practices for
this area, and public recognition of role model behavior.
The undersea cable industry’s frustration with the lack of intra-governmental coordination has in the past
been an accepted annoyance. However, as the importance of this international infrastructure becomes
more apparent, this avoidable barrier to reliability is increasingly unacceptable to the private sector as it
strives to improve the reliability of undersea communications cable systems.
Recommendation 9
Nation-state governments and the private sector should establish a best practice
model for undersea communications cable inter-agency coordination to ensure
consistent policies and practices.
234
Key Observation 97, Good Housekeeping?, Section 4.4.
235
Key Observation 79, Paperwork, Section 4.3.
129
ROGUCCI - THE REPORT ISSUE 1, 2010
Required Commitment
To sustain the viability of The Recommendation, nation-state governments and the private sector must be
committed to defined courses. Specifically,
o Maintain status quo . . . GUCCI remains sub optimally managed as a critical nation-state asset.
Next Steps
Suggested next steps to generate momentum toward the implementation of The Recommendation
include:
9-1. Nation-states and cable system operators should convene for the purpose of identifying best
practices among the represented governments. The private sector should articulate its needs and
explain the impacts when these needs are not met.236
9-2. Participants should seek agreements around the articulation of the best practices shared.
9-3. The best practices should be implemented, shared with governments not participating in the
process.
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
Inter-agency coordination: Government agencies are aligned on the priority, policies and
practices for supporting undersea communications cable infrastructure. 237
Policy clarity. The government and the private sector understand what the policies that affect
undersea communications cable industry are.
Authority exercised. Nation-states exercise their authority to ensure policies that will promote
undersea communications cable resilience.
236
Quantification of the affects of lack of government coordination may be a useful vehicle for conveying the importance of this
issue.
237
It is understandable that some practices may not be suitable for every situation.
130
ROGUCCI - THE REPORT ISSUE 1, 2010
Purpose
The Recommendation addresses the issue of how to address the profound gap between critical dependence and
awareness that stakeholders and the general public have regarding GUCCI.
Background
The world’s undersea communications cable infrastructure continues to operate at highly reliable levels
and continues to provide tremendous service to the daily operation and long-term growth of both
established and emerging economies in all parts of the world. GUCCI is an essential part of the modern
world.
However, there is a profound unawareness on the part of the general public, business enterprises, critical
sector stakeholders and government regarding their dependence on undersea communications cable
infrastructure.238 239 While the increasing rate of dependence climbs steeply, there is no corresponding
movement in consciousness of the dependence or the risks associated with it.240 It being imperfect, like
any other critical infrastructure, due consideration needs to be given to its priority in decisions affecting it,
ramifications of its failure and opportunities to promote its resilience.
There are times when the public is temporarily conscious of the importance of these cables.241 This is
during times when there are cable cuts that affect Internet service. Major or multiple cuts in one part of
the world can affect all parts of the world. The initial impact is typically during the first hours, until
manual re-routing can be engineered. Then the impaired throughput (slow Internet speed) is experienced
for days or weeks, depending on the event. In fact at least four incidents have had this effect in recent
years.242
Those most ‘in-the-know’ about how important this infrastructure is can be in a very difficult position.243
The traditional approach of ‘security through obscurity’ has been soundly outdated with the emergence of
the Internet. Broad and detailed information such as cable technologies, equipment manufacturers, cable
routes, repair ships, landing station sites, and more, are available for anyone with Internet access.244 What
has traditionally been a nation-state security issue has spilled far over into the laps of a much broader
community of stakeholders.245 246 247 The circumstances are compelling.248 New approaches are needed
238
Key Observation 1, Public Unaware, Section 4.1.
239
Key Observation 14, Two Modes of Awareness, Section 4.1.
240
Key Observations 5, User Expectations Are High, Section 4.1.
241
Some events even have unique Wikipedia entries for them, e.g., “2008 Submarine Cable Disruption.”
242
In order from most recent: August 2009 Typhoon Morakot, December – multiple cuts, 2008 Mediterranean Sea, January–
February Middle East, December 2006 Hengchun Earthquake, . . . each of these involved multiple simultaneous cable cuts.
243
Key Observation 98, Batten Down the Hatches, Section 4.4.
244
Key Observation 48, Information Smorgasbord, Section 4.2.
245
Key Observation 19, Nation-State Stakeholders, Section 4.1.
246
Key Observation 88, International Infrastructure, Section 4.4.
247
The author’s father worked on submarine cable system repeater systems at Bell Labs during the 1960s. The ability for these
repeater systems to identify the location of a cable cut from an adversary during the Cold War was of significant national
security interests.
248
Key Observation 22, 99+%, Section 4.2.
131
ROGUCCI - THE REPORT ISSUE 1, 2010
that properly educate stakeholders to enlist them as allies, and that are also keen to protect their and
nation-state security interests.
Recommendation 10
The undersea communications cable industry should begin an outreach campaign
that provides appropriate education to government and other stakeholders regarding
GUCCI function in the stability of their operations.
Required Commitment
To sustain the viability of The Recommendation, the private sector and stakeholders must be committed
to defined courses. Specifically,
The undersea communications cable industry must recognize the unacceptable nature of the
existing dependence-unawareness gap.
The undersea communications cable industry must commit to action to resolve the under-
education of those dependent on it.
Stakeholders must be diligent in achieving appropriate levels of knowledge regarding their
dependence and developing management best practices regarding their dependence on GUCCI.
249
Appendix B.
250
Gambetta, Diego, and Hertog, Steffen, Engineers of Jihad, Sociology Working Papers, Paper Number 2007-10, University of
Oxford, 2007.
251
Key Observation 100, Eating Dust, Section 4.4.
132
ROGUCCI - THE REPORT ISSUE 1, 2010
Next Steps
Suggested next steps to generate momentum toward the implementation of The Recommendation
include:
10-1. The private sector should assess the education gap and develop a countermeasure strategy,
which includes the main messages.
10-2. Existing industry fora should agree on what role each can play in implementing the strategy.
10-3. Stakeholders should develop a metric to measure progress in achieving critical awareness
objectives.
10-4. The private sector should work together to update the educational strategy, program and
messages, as appropriate.
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
252
Key Observation 1, Public Unaware, Section 4.1.
133
ROGUCCI - THE REPORT ISSUE 1, 2010
Purpose
The Recommendation addresses the issue of how to prepare for traffic overload scenarios for the global undersea
communications cable infrastructure.
Background
The current situation is one in which there is considerable “unlit” spare capacity on fibers within the
GUCCI.253 In addition, technological advances have enabled deployed systems to be used to deliver much
greater bandwidth than they were originally designed, and ongoing research promises continued advances
in this area.254 255 256 257 There is no immediate alarm regarding existing capacity availability.
However, there are several reasons for increased vigilance regarding future infrastructure congestion.258
First, an ever-present, intrinsic vulnerability of any communications system, network or infrastructure is its
finite capacity limitation for payload throughput. Second, the world is currently experiencing an explosive
rate of increasing demand for bandwidth, consuming spare capacity at an aggressive pace.259 Third, the
nature of the traffic is very different today. What used to be primarily voice or message content of fixed
size, is more and more becoming image and video content of nondeterministic (but very large) size.
Fourth, with the viral phenomenon of some new applications and global connectivity, there is no
guarantee that the rise in user demand based on these types of services will allow the spare capacity buffer
levels we are used to.260 For example, a major disaster or other scenario may trigger end user activity (e.g.,
sharing videos) that presents an aggregate payload above maximum capacity limits over an extended
period of time. Fifth, a cyber attack could unleash volumes of traffic or affect network control channels,
resulting in overload conditions. Finally, a loss of satellite or a significant portion of terrestrial
infrastructure could place significant expectations on GUCCI. In light of these factors, an overload
condition is a very real scenario, which may present itself intermittently in unexpected fashion, or as a
temporary situation due to a specific event.
Terrestrial networks have anticipated the need for managing overloads with the deployment of various
mechanisms. Prioritization schemes are one such mechanism.261 The International Telecommunications
Union - Telecommunications Standardization Sector (ITU-T) supports an international standard with a
five-tiered prioritization scheme.262 These mechanisms enable governments to authorize users for priority
treatment. While initially developed for basic voice calls, they currently extend to data and video
applications. Service providers can provide another type of prioritization in the form of a service level
agreement (SLA), whereby an end-user subscribes to a special premium service that ensures a specified
253
Key Observation 76, Spare Capacity, Section 4.3.
254
Key Observation 27, DWDM, Section 4.2.
255
Key Observation 28, Protocol Soup, Section 4.2.
256
Key Observation 31, Heavy Light Technology, Section 4.2.
257
Key Observation 40, Heroic Technology Breakthroughs, Section 4.2.
258
Key Observation 65, Nothing But Time, 4.3.
259
Key Observation 4, Bandwidth Thirst Management, Section 4.1.
260
Key Observation 7, Everybody Wants It, Section 4.1.
261
Government Emergency Telecommunications Service (GETS) is deployed in the U.S. to provide government-authorized
users priority treatment between access points; whereas Wireless Priority Service (WPS) provides similar treatment over the air
loop between a mobile subscriber and the cell tower.
262
Emergency Telecommunications Service (ETS) and International Emergency Preference Scheme (IEPS).
134
ROGUCCI - THE REPORT ISSUE 1, 2010
level of performance. Both of these are examples of how limited capacity is allocated along
predetermined arrangements.
In summary, GUCCI has limited capacity and it is conceivable that, like its terrestrial cousin, it may be
impaired by overload conditions. How should limited capacity be managed? How can international
coordination ensure that the communications most critical for continued government operation and
security be maintained?
Recommendation 11
Network operators, service providers and stakeholders should develop and implement
agreed upon mechanisms for handling traffic overload conditions for undersea
communications cable infrastructure.
Required Commitment
To sustain the viability of The Recommendation, nation-state governments and the private sector must be
committed to defined courses. Specifically,
Nation-state governments must agree that some communications are more important than others
and therefore require preferential treatment during times of infrastructure congestion.
Nation-state governments must agree with each other on mutual preferential treatment of so
designated traffic.
Nation-state governments must provide incentives for private sector development and
deployment of priority schemes.
Nation-state governments, stakeholders, network operators and service providers must securely
manage the administration of authorized priority traffic.
Service providers and network operators must implement agreed-upon overload management
mechanisms.
Benefits of Mechanisms for Handling Overload
When implemented, The Recommendation will provide a mechanism to ensure that the most important
traffic is carried over undersea communications cable infrastructure that is congested.
o Rely upon ability to maintain a sufficient buffer of spare capacity . . . will result in indiscriminate
blocking of traffic when overload conditions occur, as the statistical variability is ever more difficult to engineer for.
o Discourage use and dependence on global connectivity . . . would be cause for profound disadvantage to a
nation-state in terms of technological and economic development.
o Maintain the current course . . . requires accepting indiscriminate loss of traffic when overload conditions are
presented, acknowledging loss of critical communications.
135
ROGUCCI - THE REPORT ISSUE 1, 2010
Next Steps
Suggested next steps to generate momentum toward the implementation of The Recommendation
include:
11-1. The international financial community should determine the sufficiency of existing congestion
management options, including SLAs, in order to determine whether due diligence for operational risk
can be achieved, or new mechanisms are needed.
11-2. Nation-state governments should establish international agreements around GUCCI congestion
management policies and practices.
11-3. Governments should provide appropriate incentives for the development and deployment of
agreed upon mechanisms to manage overload conditions in GUCCI.
11-4. Standards development organizations (SDOs) should include GUCCI considerations in their
ongoing deliberations.
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
Overload Strategy: Stakeholders have an established strategy for effectively handling GUCCI
congestion scenarios.
136
ROGUCCI - THE REPORT ISSUE 1, 2010
Purpose
The Recommendation addresses the concern of preparing for a large-scale loss of the world’s undersea
communications cable infrastructure, by directing stakeholders to prepare for the worst case scenario and by
calling on the scientific and engineering community to respond to a new grand challenge problem.263
Background
Nearly 100% of the world’s inter-continental electronic communications traffic is carried by the undersea
cable infrastructure.264 265 There is no back-up capability should it be lost.266 Satellite capacity, if not
carrying its existing traffic, would have carrying capacity two orders of magnitude too small. 267 268
Terrestrial based routes would leave continents in isolation.269
The probability of such a failure is very low, however, it is not zero.270 271 The impact of such a failure on
international security and economic stability could be devastating. The pace at which technology has been
adopted and then depended upon is unprecedented in history. It is unclear if civilization can recover to its
previous condition from the failure of a technology that has been so rapidly adopted without a back-up
plan.272 Without GUCCI, the world’s economic financial market would immediately freeze.273 But what
would happen next? What are the options? What can be done to best prepare for this unlikely, but
possible event?
Recommendation 12
Subject Matter Experts and Stakeholders should prepare for the worst-case scenario
of a catastrophic loss of global undersea communications infrastructure by identifying
best available alternatives and operational procedures. Preparation should include
scientific and engineering research for long-term solutions.
263
A grand challenge is a fundamental problem in science or engineering, with broad applications. The fundamental physical
sciences, engineering, and mathematical underpinnings are similar for many of these problems. Examples of grand challenges
are: more efficient automobiles and airplanes, improved environmental modeling, understanding the structure of biological
molecules. A Research and Development Strategy for High Performance Computing, Executive Office of the President, Office
of Science and Technology Policy, November 20, 1987.
264
Key Observation 3, Heads in the Clouds, Section 4.1.
265
Key Observation 22, 99+%, Section 4.2.
266
Key Observation 58, No “Plan B”, Section 4.2.
267
Key Observation 23, Alternatives Are Not Up in the Air, Section 4.2.
268
Key Observation 24, Payload Volume, Section 4.2.
269
Australia; North America from Europe and Asia, etc.
270
Key Observation 50, Looking Backwards, Section 4.2.
271
Key Observation 51, Intrinsic Vulnerability Approach, Section 4.2.
272 st
Kissinger, Henry, Does America Need a Foreign Policy? Toward a Diplomacy for the 21 Century, September 2002.
273
Key Observation 10, “Snap to a Halt!”, Section 4.1.
137
ROGUCCI - THE REPORT ISSUE 1, 2010
Required Commitment
To sustain the viability of The Recommendation, governments and the private sector must be committed
to defined courses. Specifically,
Governments and other stakeholders must encourage academic and private sector research to
ensure appropriate resources are focused on this global challenge.
Scientists and engineers must be devoted to developing alternatives.
Stakeholders must conduct planning scenarios that consider true worst-case scenarios.
The financial services sector must play a lead role in establishing the importance of this concern.
o Minimize public awareness of the issue by limiting research and discussion of issue to closed
forums . . . resulting in a less rigorous effort and limited stakeholder planning.
o Discourage use and dependence on global connectivity . . . would be cause for profound disadvantage to a
nation-state in terms of technological and economic development.274
o Maintain the current course . . . passively promoting increased global dependence on global infrastructure, with
the anticipated ramifications being higher likelihood of catastrophic loss of global or regional connectivity.
Next Steps
Suggested next steps to generate momentum toward the implementation of The Recommendation
include:
12-1. Governments, industry associations and academic and other research institutions should initiate
strategic programs to address the current preparedness gap.
12-2. The international financial community should coordinate its plans for the case of a catastrophic
loss of GUCCI.
12-3. The scientific and engineering community should publish analyses of near and long-term
alternatives, highlighting promising, emerging technologies.
274
There is an abundance of studies that correlate economic growth with ICT as an essential enabler.
138
ROGUCCI - THE REPORT ISSUE 1, 2010
Measures of Success
The successful implementation of The Recommendation can be gauged by the following measures:
Long term alternative: An acceptable back up solution is developed that offsets the existing
complete dependence on GUCCI for intercontinental electronic communications.
139
ROGUCCI - THE REPORT ISSUE 1, 2010
6. SUMMARY
The ROGUCCI process introduced a fresh perspective on undersea cable infrastructure. What was new
was taking a global view of all the intercontinental connectivity and treating it as an aggregate critical
international infrastructure. It also charted a new course for conducting systematic research of the
infrastructure’s eight ingredients using the 8i Framework. This, coupled with the intrinsic vulnerability
approach, enabled a comprehensive analysis of what could go wrong with GUCCI – looking beyond what
had has been experienced to date. The process also went beyond the norms of association in convening
the industry’s technical, business and legal expertise with stakeholders and international policy change
agents. This ROGUCCI “formula” played a critical role in the development of the guidance outlined in
this report.
The next steps of the ROGUCCI process are the dispatch of this report and the call to the private sector,
academia, nation-states and other stakeholders, to initiate the implementation of The Recommendations.
The Study, Summit and Report are not designed to be limited to discussion. Rather, their intent is to have
a significant impact on the reliability of GUCCI. To this end, each of the Twelve Recommendations is
carefully prepared to present in concise executive fashion, the problem, recommendation, required
commitment, alternatives and their consequences, benefits, next steps, and measures of success.
Both the IEEE and EastWest Institute intend to continue to serve as catalysts for mobilizing resources to
implement The Recommendations. However, the challenge is for individuals, organizations and industry
associations to take up and forge ahead. Early briefings of the ROGUCCI Recommendations are very
encouraging, as enthusiastic responses from the private and public sector have been witnessed from six
continents.275
The IEEE will maintain a ROGUCCI web site to provide updates on progress being made for each of
The Recommendations and for members of the community to sustain online forum discussions.276
On behalf of the countless individuals and organizations that depend upon highly reliable, robust, resilient
and secure global communications, the author wishes to express appreciation one more time to the many
who have brought GUCCI to the performance level that has been so attained to date . . . and to thank in
advance, the many who will step up to the challenges laid out herein to ensure that GUCCI breaks
through the current limitations to achieve the new benchmark performance levels that are needed.
275
One such briefing included a presentation to the EastWest Institute “Cyber 40”, hosted at the Canadian Embassy in
Washington, D.C. on the 19th of April, 2010.
276
www.ieee-rogucci.org
140
ROGUCCI - THE REPORT ISSUE 1, 2010
7. ACKNOWLEDGEMENTS
The ROGUCCI project would not have been possible without the contributions of the many individuals and
organizations that have lent expertise, offered insights, shared concerns and offered tangible support. While the
contributing organizations are listed in Table 5 of Section 2.8, the author recognizes contributions here at an
individual level.
141
ROGUCCI - THE REPORT ISSUE 1, 2010
E-Marine
CEO Omar Jassim Bin Kalban for his hospitality, Mohamed Shameer for his logistics support for a
wonderful cable ship tour and for his photography. . . . and Tyco’s Jim Herron for supporting planning
for the cable ship tour.
TeleGeography
Alan Mauldin for his research support, Tim Stronge and Mike Owings for their sponsorship support.
Researchers
BPI TelcoData president Art Menko, Rutgers professor Dr. Mike Tortorella and Telcordia Technologies
Dr. Spilios Makris, Dr. Nick Lordi and Dr. Gail Linnell, and Harvard graduate student Steve Secrhist.
Family
Finally, my father, Joseph Rauscher Sr. (ret. Bell Labs submarine cable engineer and researcher) who made
science and engineering interesting to the sons he raised; and for my son, Konrad who prepared the
Acronym section of this Report and for making a memorable trip to Dubai; daughter Mercy for her
assistance with special photography, and daughter Grace and niece Kimberly for editing; and my wife
Laura, for her incredible patience with her husband’s intense pursuits.
142
ROGUCCI - THE REPORT ISSUE 1, 2010
8. ACRONYMNS
8i Eight Ingredient Framework for Information and Communications Technology
Infrastructure
ARECI Availability and Robustness of Electronic Communications Infrastructure Study
ASPR Agreements, Standards, Policies and Regulations
BU Branching Unit
BUTEC British Underwater Test and Evaluation Centre
C The speed of light, a constant
CQR IEEE Technical Committee on Communications Quality & Reliability
CNI: Critical National Infrastructure
CCTV Closed Circuit Television
CS Cable Ship
DCN Digital International Switching Centre
EC European Commission
EDFA Erbium Doped Fiber Amplifier
EEZ Exclusive Economic Zone
EMP Electromagnetic Protection
ETS Emergency Telecommunications Service
EWI EastWest Institute
DIFC Dubai International Financial Centre
FCC Federal Communications Commission (U.S.)
FRB Federal Reserve Board (U.S.)
FSSCC Financial Services Sector Coordinating Council
FEC Forward Error Correction
G.652 ITU recommendation number for standard single mode fiber
GETS Government Emergency Telecommunications Service (GETS)
GUCCI Global Undersea Communications Cable Infrastructure277
HF High Frequency
ICT Information and Communications Technology
ICPC International Cable Protection Committee
IEPS International Emergency Preference Service
277
This term was introduced by the ROGUCCI process, which introduced the global aggregate perspective of the infrastructure.
143
ROGUCCI - THE REPORT ISSUE 1, 2010
144
ROGUCCI - THE REPORT ISSUE 1, 2010
For example, current system platforms are commonly described as ‘highly available’ if they are operable at least “five-
nines” (e.g., 99.999% or better). This corresponds to 5.2 minutes of cumulative inoperable or downtime, per year.
Backhaul
Connection from the landing station back to the terrestrial network.
Dark fiber
Fiber that is deployed but not yet being used.
278
ATIS Telecom Dictionary. www.atis.org
145
ROGUCCI - THE REPORT ISSUE 1, 2010
Outage
A condition in which a user is completely deprived of service by the system. For a particular system or a given
situation, an outage may be a service condition that is below a defined system operational threshold, i.e., below a
threshold of acceptable performance.279
Reliability
Reliability is simply the likelihood that a system will perform its intended function within the context it was designed
to operate within.280
A measure that refers to a particular “mission.” It represents the ability of the system, subsystem, equipment,
network, or service to operate for the intended purpose, during the intended period of time. It is the probability that
given operability now, it sustains operation for a period of time. For example, the reliability of the space shuttle
would refer to it’s operability during the period of time that includes its launch, time in space and return to Earth.
Thus, reliability is often characterized as a probability or percent or may also be characterized as the Mean Time
Between Failure (MTBF).
The ability to achieve high availability is also a factor of how quickly a system, subsystem, equipment, network, or
service can be repaired or service restored when a failure occurs. Reparability or Restorability are respectively
characterized by the Mean Time To Repair or Mean Time To Restore (MTTR). First and foremost is the return to
operability of the intended function. This may occur through an equipment repair, or more likely an equipment
substitution, redundancy or alternate means for the intended use. Hence, in communications infrastructure, Mean
Time to Restore (service) is most often the key measure.
Robustness
Robustness is the property of being strong and healthy in constitution.281 It is further defined as a condition of a
system design “that remains relatively stable, with a minimum of variation, even though factors that influence
operations or usage, such as environment and wear, are constantly changing.”282 Robustness is the degree to which a
system or component can function correctly in the presence of invalid inputs or stressful environment conditions.283
Other definitions vary in (a) the emphasis they place on where the challenges come from - internal (e.g., component
failure) or external (e.g., environmental), (b) the degree to which such challenges are anticipated - ranging from
conditions slightly beyond what is expected to anything unexpected, and (c) the level of stability of functionality
maintained during the period of stress. For the purpose of The Study, the robustness of undersea communications
cable infrastructure includes:
• the ability to maintain critical functions, but not all functions
• in the context of both internal and external challenges
• when the challenges are of any degree of variability from expected conditions, but that expectations should
diminish with increased stress (e.g., a more robust system can handle more extreme forms of stress)
279
ATIS Telecom Glossary 2000, T1.523-2001, www.atis.org/tg2k/
280
A more formal definition from the ATIS Telecom Glossary. reliability: 1. The ability of an item to perform a required function
under stated conditions for a specified period of time. 2. The probability that a functional unit will perform its required function for
a specified interval under stated conditions. 3. The continuous availability of communication services to the general public, and
emergency response activities in particular, during normal operating conditions and under emergency circumstances with
minimal disruption.
281
wordnet.princeton.edu/perl/webwn.
282
www.onesixsigma.com/tools_resources/glossary/glossary_r.php
283
Institute of Electrical and Electronics Engineers. IEEE Standard Computer Dictionary: A Compilation of IEEE Standard
Computer Glossaries. New York, NY: 1990.
146
ROGUCCI - THE REPORT ISSUE 1, 2010
Sector
A group of industries or infrastructures that perform a similar function. In general, critical sectors are sectors whose
incapacitation or destruction would have a debilitating impact on the national security and the economic and social
well-being of a nation.284
Shared Ownership
Cable consortia share the ownership of cable systems and have agreements about how capacity usage will be shared.
Shunt Fault
A condition where the cable system has sustained damage to its protection insulating sheath, but is still able to
maintain potential to continue operating. The virtual earth position is established at the damaged location. Repairs
need to be conducted rapidly, because a second damaged location would mean a loss of potential, resulting in an
outage.
Threat
A threat is an attempt to exploit one or more vulnerabilities that may result in damage to, or compromise of, a
system (e.g., GUCCI), or some portion of it.285
Vulnerability
A vulnerability is an intrinsic characteristic of an infrastructure or system (e.g., GUCCI or its components) that make
it susceptible to damage or compromise if exploited by a threat.
284
International Critical Information Infrastructure Protection (CIIP) Handbook 2004, , An Inventory and Analysis of Protection
Policies in Fourteen Countries, Swiss Federal Institute of Technology, p. 227. Network Reliability and Interoperability Council VI,
Homeland Security – Physical Security (Focus Group 1A) – Prevention and Restoration Report, Issue 2, Mar. 2003, pp.27, 41,
www.nric.org/fg/nricvifg.html; Network Reliability and Interoperability Council VI, Homeland Security – Physical Security (Focus
Group 1A) – Final Report, Issue 3, Dec. 2003, www.nric.org/fg/nricvifg.html; Network Reliability and Interoperability Council VII,
Focus Group 3A – Wireless Network Reliability – Final Report, Issue 3, Sept. 2005, www.nric.org/fg/index.html; Network
Reliability and Interoperability Council VII, Focus Group 3B – Public Data Network Reliability – Final Report, Issue 3, Sept.
2005, www.nric.org/fg/index
285
Network Reliability and Interoperability Council VI, Homeland Security – Physical Security (Focus Group 1A) – Prevention
Report, Issue 1, Dec. 2002, p. 27, www.nric.org/fg/nricvifg.html;
147
ROGUCCI - THE REPORT ISSUE 1, 2010
10. REFERENCES
Alliance for Telecommunications Solutions (ATIS) Network Reliability Steering Committee, www.atis.org.
Asma Ali Zain, Cable damage hits 1.7m Internet users in UAE, Khaleej Times, February 5, 2008.
Ayadi, A. et. al., Strong Algerian Earthquake Strikes Near Capital City, Eos, Vol. 84, No. 50, December 16,
2003.
Bad Weather Obstructs Pakistan's Fiber Optic Cable Repair Work, Pakistan Times Staff Report, July 5, 2005.
Barthold, Jim, Submarine Cable to Find Northwest Passage, Suite101.com, January 17, 2010.
Bishop, David, Architects of the Internet: Speeding Net Traffic with Tiny Mirrors, EETimes, September 2000.
Borland, John, Analyzing the Internet Collapse: Multiple Fiber Cuts To Undersea Cables Show The Fragility Of The
Internet At Its Choke Points, Technology Review (MIT), February 5, 2008.
Burnett, Douglas R. and Mick P. Green, Security of International Submarine Cable Infrastructure: Time to Rethink?.
Burton, Kevin; McGee, Angela; Dibeler, Jack, Who Turned Out the Light? Burton Asset Management, 2009.
Cable-Cutting in War Time , The Pall Mall Gazette, May 11, 1898.
Cable Fault Cuts off West Africa, BBC News, July 30, 2009.
Cheng, Jacqui, Phishing Plumbs New Depths: Vietnamese Fishermen Sever Fiber Optic Lines,
www.Arstechnica.com, June 8, 2007.
Chesnoy, Jose, Undersea Fiber Communications Systems, Academic Press, London, 2002.
China Institute for Marine Affairs (CIMA) and Center for Ocean Laws and Policy (COLP) Regional
Workshop on Submarine Cables Workshop Report, Beijing, PR China, May 2009.
Choe Sang-Hun; Arnold, Wayne, Asian Quake Disrupts Data Traffic, The New York Times, December 28,
2006.
Etisalat Management Recognizes Bravery of E-Marine Cable Repair Crews - E-Marine Heroes Successfully Restore
Internet Connection to the Gulf, www.etisalat.ae, 9 March 2008.
148
ROGUCCI - THE REPORT ISSUE 1, 2010
Fried, Malcolm; Klemming, Lars, Severed Cables in Mediterranean Disrupt Communication (Update4),
www.Bloomberg.com, December 19, 2008.
Gambetta, Diego; Hertog, Steffen, Engineers of Jihad, Sociology Working Papers, Paper Number 2007-10,
University of Oxford, 2007.
Green, Green, ICPC Presentation to the ROGUCCI Global Summit, October 19, 2009.
Harrison, John; Hill, G, Todd, M., ROGUCCI White Paper on Best Practices and Trusted Information Sharing,
Landitd, U.K. 2010.
Hayyan, Faisal, Task to Detect Major Fault in Pakistan's Internet Cable Set Off, Pakistan Times, July 2005.
Heng, Ek, Typhoon Morakot Damages Several Subsea Cable Systems, www.Telecomengine.com, August 19, 2009.
Ho, Victoria, Typhoon Knocks Out Asia Telecom Cable, CNet News, August 13, 2009.
Holding, Cathy, A Global Cable Network of Fragile Links, The Independent (UK), March 10, 2009.
Hong Kong Rebounding from Recent Natural Disasters Typhoon Morakot and Earthquake, HKCOLO, October
2009.
Krangel, Eric, Egypt Goes Dark: Mediterranean Data Cables Toast, www.BusinessInsider.com, December 19,
2008.
Long, Ronán,; Moore, John Norton Moore; Nordquist, Myron H. and Wolfrum, Rüdiger; Legal Challenges
in Maritime Security. Martinus Nijhoff Publishers, 2008.
Makris, Spilios and Lordi, Nick, Undersea Cable System Outages and Global Infrastructure Resilience: A Discussion
of Issues in Managing Third-Party Expectations, Proceedings of the IEEE CQR International Workshop, 2009.
Malphrus, Stpehen, Keynote Address at ROGUCCI Global Summit, Dubai, U.A.E., October 19, 2009.
Mydans, Seth, The Day the Pixels Froze: When a Digital World Was Stopped by a Natural Disaster, The New
York Times, December 28, 2006.
NRSC 2006-2007 Biennial Report, Alliance for Telecommunications Industry Solutions (ATIS) Network
Reliability Steering Committee (NRSC), Washington, D.C., 2008.
Next Generation Networks (NGN) Task Force Report, The President’s National Security Telecommunications
Advisory Committee (NSTAC) 2006.
Proceedings of 2001 IEEE Communications Society Technical Committee Communications, Quality & Reliability
(CQR) International Workshop, www.comsoc.org/~cqr.
149
ROGUCCI - THE REPORT ISSUE 1, 2010
Rahmna, Sayeed, Bangladesh Submarine Cable Link Sabotaged Sgain, www.Groundreport.com, November 13,
2007.
Rauscher, Karl F., European Commission Availability and Robustness of Electronic Communications Infrastructure
(ARECI) Report, March 2007.
Rauscher, Karl. F., Protecting Communications Infrastructure, Bell Labs Technical Journal Homeland Security
Special Issue, Volume 9, Number 2, 2004.
Reardon, Margeurite, How Secure is the U.S. Communications Network?, CNet News, April 13, 2009.
(A) Research and Development Strategy for High Performance Computing, Executive Office of the President, Office
of Science and Technology Policy, November 20, 1987.
Singel, Ryan, Fiber Optic Cable Cuts Isolate Millions From Internet, Future Cuts Likely, Wired Magazine, January
31, 2008.
Steinglass, Matt, Undersea Cable Thieves Slow Vietnam's Internet Access, VOA News.com, June 1, 2007.
Submarine Cable: IT Ministry Preparing Load-Sharing Plan, Pak Tribune, February 14, 2006.
Zain, Asma Ali, Cable Damage Hits 1.7m Internet Users in UAE, Khaleej Times, February 5, 2008.
150
ROGUCCI - THE REPORT ISSUE 1, 2010
Even so, network outages occur. When system failures occur, traversing payload is impaired. When
alternate paths are available, the payload may be re-routed automatically, or through manual means, but
because there are limited routes available, re-routed traffic may take longer paths, which introduces latency.
Because of vast distances and limited routes available, re-routed traffic may take paths with noticeable
delays for applications with extreme sensitivity, such as competitive real-time financial transactions. Such
delays may be unacceptable.
Outage detection happens instantly, as signals travel at the speed of light. On the other hand, repair times
can be quite lengthy. Some repairs – such as those associated with hardware replacement to landing
station endpoints, power distribution equipment on shore, or software changes - can be routinely handled
in durations similar to what is involved in terrestrial network maintenance, typically measured on the order
of hours. However, repairs and maintenance on the open seas are not so easy and are measured on the
order of weeks. Here, repair times involve many critical steps – missing any one of them can jeopardize
the entire repair operation. Thus the objective is to accomplish the mission in as little time as necessary,
but to also execute in a way that ensures the highest probability of getting the job done right the first time.
The process begins with a pre-repair meeting where planning and resource estimation is performed with
all of the parties involved. As the most time in the process can be lost in the grapnel attempts for the
cable, assembling all possible data that can support an accurate location is essential to avoid lengthy
location searches. Grapnelling close to fault location is key to reducing time. Experienced crews know
that it is also worth conducting research to determine which methods have been successful in past repair
activities in the area. Selective use of remotely operated unmanned vehicles can optimize repair time. If
possible, simultaneously recovering the stray end while testing the system cable end can save time. It is
also important to have competent staff available on a 24-hour by 7-days per week basis.
286
Communications systems that are deployed in public networks are routinely designed for 5 9’s (99.999% availability); in the
mid-1990’s the 5 9’s barrier was broken when the 5ESS Switch achieved the first sustained 6 9’s performance in public
networks; this same system went on to break the 7 9’s barrier. Analysis of FCC ARMIS 43-05 data, BPI TelcoData.
287
These reasons for outage data protection are similar to those in the terrestrial-based networks. Discussion around these
points can be found in the proceedings of the ATIS Network Reliability Steering Committee (NRSC) and the FCC’s Network
Reliability and Interoperability Council (NRIC).
151
ROGUCCI - THE REPORT ISSUE 1, 2010
conducted of publicly available information on communications cable outages. In addition, insights were
gleaned from proprietary outage databases through discussions with experts. These discussions were
conducted in a way that protects the sensitive aspects of the data, yet supports the research objectives of
The Study. For example, outage analysis conclusions drawn from the research are able to confirm that
both data sources found similar relative proportions among the identified causes (e.g., fishing, anchors).
Figure 33. Pareto Analysis of Ingredient Associations with Outage Causes (%)
152
ROGUCCI - THE REPORT ISSUE 1, 2010
A Pareto analysis is presented in Figure 33. The methodology applied defines an ingredient category as a
contributor if a threat exercised one of its intrinsic vulnerabilities. Thus for a single outage event, there
may be more than one ingredient involved. Examples of this include an earthquake altering the
Environment and damaging the Hardware; or a fishing crew being unmotivated by Policy enforcement
limitations regarding restricted zones and damaging Hardware with their trawling equipment. It is readily
apparent from the chart that a few ingredients are involved to a large extent and the remaining ingredients
to a minimal extent. An encouraging observation of the Pareto analysis is that nearly half of the events
could potentially be prevented because of the association with something within human control:
agreements, standards, policies and regulations - i.e. the “Policy” ingredient.
Given the ever-increasing global dependence on undersea communications cable infrastructure, the effects
of a widespread (i.e. global or regional) outage would be history-altering. The profound reality that such
events can occur needs to be effectively communicated to stakeholders and decision makers so that
effective countermeasures can be developed and deployed to mitigate the impacts of such events. The
Countermeasure Approaches section below outlines some insights into such opportunities.
Figure 34. Portrayal of the High Probability Low Risk vs. Very Low Probability Very High Risk Events
153
ROGUCCI - THE REPORT ISSUE 1, 2010
Various reports are available in the public domain for each of these events. The focus of these reports is
on the threats involved. For the first and fourth events listed above, there is consensus on the threats that
caused the outages; for the middle two events, there is less certainty regarding the threats that caused the
outages.
In contrast to the spotlight of these public reports being on the effective threats, this analysis focuses on
the intrinsic vulnerabilities of the critical infrastructure – the susceptibility that was acted upon. The value
proposition for this approach is that it provides insights and guidance that are based on the foundational
scientific and engineering principles that are the basis of the infrastructure, and in which there can be very
high confidence relative to some of the threat-based analyses.
154
ROGUCCI - THE REPORT ISSUE 1, 2010
The earthquake resulted in catastrophic, global outages of historic proportions in the communications
industry. This exceptional impact was due to multiple undersea cables being damaged, including:
The affected regions include Taiwan, China, Hong Kong, Vietnam, Japan, Philippines and Singapore and
many other regions around the world (e.g., United States and Europe). The affected services include
substantially reduced international connectivity for telephone voice traffic, Internet access including email
and search capabilities, financial sector and other commerce traffic, and other critical services.
288
The magnitude of the earthquake has been rated as 6.7, 7.1 and 7.2 by the Central Weather Bureau (Taiwan), United States
Geological Survey, and the Japan Meteorological Agency, respectively.
289
Turbidity currents are forces of sediment-dense water that moves within another fluid of lower density. Because the speed of
the turbidity current increases with its density, these currents can increase their speed as they create erosion and pick up more
debris.
290
While the identifies of these systems is readily available in the public domain, it is not necessary to mention specific system
names in this Report.
155
ROGUCCI - THE REPORT ISSUE 1, 2010
The duration of the impact extended to approximately 2 months. Numerous specialized undersea
communications cable vessels were deployed in the repair operation to restore the damaged cables to
service.
As shown in Figure 37, the Hengchun earthquake threat exercised the intrinsic vulnerability of the
undersea environment by violently altering it. This dramatic altering of the previously safe Environment,
became a threat that exercised the intrinsic vulnerability of Hardware to be physically damaged. From a
global infrastructure perspective, the aggregated routing of different cables through the Luzon Strait
exposed the intrinsic vulnerabilities of Networks to be accessible and to have points of physical failure.
The reasons for lack of physical diversity appear to be, in part, geopolitical restrictions on the use of other
routes, exposing the intrinsic vulnerability of Policy to be lacking sufficient agreements.
291
The causes of these outages have been ascribed by different sources to: dragging ship anchors, non-anchor maritime
activity, bad weather, an earthquake, a coordinated non-government organization attack (NGO), a government-sponsored
activity using explosives, as well as others.
156
ROGUCCI - THE REPORT ISSUE 1, 2010
In addition, on February 4, it was discovered that one of the systems had been damaged again, this time
farther East near Penang, Malaysia.
The countries most impacted include Afghanistan, Bahrain, Bangladesh, Egypt, Kuwait, India, Pakistan,
Qatar, Saudi Arabia, and the United Arab Emirates, and effects were felt throughout the rest of the world
(including the United States and Europe). Impaired services include substantial reduced international
connectivity for telephone voice dialing and Internet access including email and search capabilities,
financial sector and other commerce traffic, and other critical services.
In addition to the reliability impacts described above, if the events were a coordinated malicious activity
there could be security issues that arise from the rerouting of traffic. The practice of cutting
communications cables to achieve a strategic advantage has been a practice for more than 100 years.292
292
Cable Cutting in War Time, The Pall Mall Gazette, May 11, 1898
157
ROGUCCI - THE REPORT ISSUE 1, 2010
Numerous specialized undersea communications cable vessels were deployed in the repair operation to
restore the damaged cables to service.
As shown in Figure 38, the multiple locations of the cable damage were focused in two primary areas:
Alexandria, Egypt and the perimeter of the U.A.E. Unlike the Henchung earthquake, these damages
occurred in geographically separated areas, though they were within the same region.
If the triggering threat was a natural phenomenon (i.e. an earthquake) for any of these damage areas then
the intrinsic vulnerability of alterability of the undersea Environment was exercised. In this scenario, the
dramatic altering of the previously safe Environment became a threat that exercised the intrinsic
vulnerability of Hardware to be physically damaged. If the threat was a ship anchor, then the same
intrinsic vulnerability of Hardware was exercised. Though ship anchors are a known threat to undersea
communications cables, and various Policies are in place to avoid anchor damage, the ASPR intrinsic
vulnerability of enforcement limitations permits continuous exposure of cables. A more complicated
scenario involves directed action by Human actors. This scenario could involve Human agents within the
infrastructure, who are susceptible to the intrinsic vulnerability of ethical compromise. This could be
associated with coercion, greed, malicious intent or other motivations. The Human agents could have
compromised privileged information regarding the cable infrastructure. However, as shown elsewhere in
The Report, with the abundance of critical communications cable infrastructure information available on
the Internet, privileged information would not be necessary. Such information exists in the public domain
due to the intrinsic vulnerability of information leakage that is part of ASPR processes. This information
leakage is itself propagated by the intrinsic vulnerability of ASPR to infuse vulnerabilities (i.e. requirements
for information to be part of an open proceeding).
From a global infrastructure perspective, the predominant aggregated routing of Europe-Asia through the
Red Sea passage exposed the intrinsic vulnerabilities of Networks to have points of physical failure and to
158
ROGUCCI - THE REPORT ISSUE 1, 2010
be accessible. Analysis of the reasons for the lack of physical diversity appear in part to geopolitical
restrictions, exposing the intrinsic vulnerability of Policy to be lacking sufficient agreements.
The regions most affected include northern Africa, the Middle East and the Indian subcontinent, and
Europe, while the rest of the world (including the United States and Asia) was also affected. The most
seriously affected countries were (in order) Egypt, Saudi Arabia, Maldives, Bangladesh, Sri Lanka, Sudan,
U.A.E., Lebanon, Pakistan and India.293 Impaired services included substantially reduced international
connectivity for telephone voice dialing and Internet access including email and search capabilities,
financial sector and other commerce traffic, and other critical services. Most business-to-business traffic
between Europe and Asia was rerouted through the U.S.
Specialized undersea communications cable vessels were deployed in the repair operation to restore the
damaged cables to service.
293
Based on the percentage of total routed prefixes per country. Deju Vu all Over Again: Cables Cut in the Mediterranean, Alin
Popescu, December 2008.
159
ROGUCCI - THE REPORT ISSUE 1, 2010
As shown in Figure 40, the multiple incidents of cable damage were contained within a single geographic
area: between Sicily and Tunisia. Like the Henchung earthquake, these damages occurred in a
geographically concentrated area, though the attribution to an earthquake is not clear.
If the triggering threat was a natural phenomenon (i.e. an earthquake), then the intrinsic vulnerability of
alterability of the undersea Environment was exercised. As before, the dramatic altering of the previously
safe Environment became a threat that exercised the intrinsic vulnerability of hardware to be physically
damaged. If the threat was a ship anchor, then the same intrinsic vulnerability of Hardware was exercised.
Though ship anchors are a known threat to undersea communications cables, and various Policies are in
place to avoid anchor damage, the ASPR intrinsic vulnerability of enforcement limitations permits
continuous exposure of cables. This holds similar for fishing practices that may have damaged the cables.
The affected regions include China, Singapore, the Philippines and Hong Kong. Traffic was rerouted to
back-up cables, however there was concern that the back-up cables would not be able to handle all of the
traffic.295
294
Hong Kong Rebounding from Recent Natural Disasters Typhoon Morakot and Earthquake in August, 2009, HKCOLO,
October, 2009.
160
ROGUCCI - THE REPORT ISSUE 1, 2010
Figure 42. Typhoon Morakot and Taiwan Earthquake Catastrophic Outage (2009):
(9)(12) progression of typhoon, and
(17) Earthquake
On August 17th, an earthquake off the east coast of Taiwan, amidst the Southwestern Ryukyu Islands
(Japan), damaged the cables being used as back-up. In all, nine undersea cables were damaged by the
typhoon and the earthquake, affecting service between the Chinese mainland and Taiwan, Japan, the
Republic of Korea, Singapore, the United States, and Europe.296
As shown in Figure 43, Typhoon Morakot and the Taiwan earthquake threat exercised the intrinsic
vulnerability of the undersea environment by violently altering it. This dramatic altering of the previously
safe Environment, became a threat that exercised the intrinsic vulnerability of Hardware to be physically
damaged. From a global infrastructure perspective, the aggregated routing of different cables through the
Luzon Strait exposed the intrinsic vulnerabilities of Networks to be accessible and to have points of
physical failure. The reasons for lack of physical diversity appear to be, in part, due to geopolitical
restrictions on the use of other routes, exposing the intrinsic vulnerability of Policy to be lacking sufficient
agreements.
295
http://www.computerworld.com/s/article/9136622/Typhoon_Morakot_severs_three_undersea_Internet_cables
296
http://english.peopledaily.com.cn/90001/90781/90877/6731967.html
161
ROGUCCI - THE REPORT ISSUE 1, 2010
Tables 8, 10 and 11 provide a countermeasure analysis for each of the four outages presented above. This
countermeasure analysis is not complete, but is offered to demonstrate the challenges faced in raising the
overall resilience of the undersea communications cable infrastructure and the cross-disciplinary nature of
countermeasures (e.g., a Hardware limitation may be addressed by a Policy countermeasure). Note that
for those cases where this analysis was conducted for events with an unconfirmed threat, the analysis was
completed as if any of the suggested countermeasures were applicable.
162
ROGUCCI - THE REPORT ISSUE 1, 2010
Power
Damageable Physical protection against these
Hardware
forces not feasible
Software Automatic reroutes X
Accessible
Network Provide physical diversity X X
SPoF
Payload
Human
Hengchun Earthquake
Regional geopolitical forces funnel all of the cable routes that connect North America to the regional
financial hubs of Hong Kong and Singapore through the Luzon Strait. This situation stresses the intrinsic
vulnerability of networks having single points of physical failure. To address this, progress in the ASPR
arena can help tremendously. Specifically, if agreements could be made to permit the laying of undersea
communications cables in the North-South direction in between mainland China and Taiwan, then a
geographical separation can be achieved and thus reduce the exposure of the aggregate global
infrastructure to this seismically active area. Other enhancements can be accomplished via software
capabilities and pre-arranged contractual agreements that would enable more speedy and high capacity
reroutes.
Given the reality of geographic regions of frequent high magnitude earthquakes (Figure 44), a global
review of infrastructure single points of geographic failure is highly relevant. Surely individual system
planners and designers appreciate this concern. However, the exposure of aggregated worldwide
communications resources is a problem at another level. The increasing dependence of the world’s
economic stability, as well as other interests, require that geopolitical limitations be revisited with the
mutual interests of affected parties in mind.
163
ROGUCCI - THE REPORT ISSUE 1, 2010
Reproduced with the permission of the British Geological Survey © NERC. All rights Reserved.
298
Figure 44. Earthquake Belts of the World
297
Data from the United States Geological Survey (www.usgs.gov ).
298
Data from the British Geological Survey, National Environment Research Council, www.bgs.ac.uk
164
ROGUCCI - THE REPORT ISSUE 1, 2010
165
ROGUCCI - THE REPORT ISSUE 1, 2010
In summary, countermeasures can be asymmetrical to the failure domain associated with the outage cause.
Given that subject matter experts and responsible parties have limitations with regard to their expertise
and responsibilities respectively, effective cross-discipline countermeasure proposal and development is
often insufficiently practiced in many fields. For example, a network design expert well aware of the
limitations of the geopolitical status quo, is not likely effective at having influence in that arena, despite the
fact that he may be well armed with a profound economic and commercial value proposition. A key
distinction of the ROGUCCI process was to integrate technical expertise, business leaders, stakeholders
and international policy change agents in order to be able to aggregate the maximally useful core
competencies to develop and deploy countermeasures.
166
ROGUCCI - THE REPORT ISSUE 1, 2010
1. History
2. Technology
3. Suppliers
4. Cable Systems
5. System Owners and Operators
6. Cable Landing Sites
7. Cable Routes
8. Outage Events
9. Restoration Procedures
10. Financial Dependencies
The information described below is available from published documents and the Internet.
B.1 History
The history of the world’s undersea (or submarine) communications cable infrastructure is well
documented. The industry has done an excellent job in documenting the trials and outcomes, events and
dates, discoveries and improvements, and business risks and successes. For example, the inaugural
message sent across the first trans-Atlantic cable from Queen Victoria to U.S. President Buchanan:
“England and America are united. Glory to God in the highest and on Earth, peace, good will to men.” The message
was sent as a telegraph that took over 30 hours to transmit.
167
ROGUCCI - THE REPORT ISSUE 1, 2010
The Smithsonian Institute in Washington, D.C. has previously displayed an exhibit featuring the history
and advances of undersea communications cable technology. The exhibit now takes on the form of an
online library. The advances of undersea communications cable progress continues to be documented
and includes the latest information sharing approaches - web blogs and interactive videos.
B.2 Technology
Very complete information is available to the public on the underlying science of undersea
communications cables systems. The engineering design principles and many operational practices are
likewise readily available, some even in the form of instructional videos. Figure 46 outlines the types of
information available. Note that this spans the development lifecycle from research through
manufacturing to operation.
Literally thousands of pages of information are available on these subjects. Specific examples of
technology information include the principles of light and wave theory from physics that form the basis of
optical fiber transmission, the trade-offs made in cable design construction, the reason for selecting
particular materials for specific applications, the method of manufacturing long haul cables, techniques for
field experiments to validate the predicted longevity of undersea components, the machinery and manner
of digging trenches for buried cable segments, and steady state operation.
B.3 Suppliers
The suppliers of the world’s undersea communications cable infrastructure are easily identified in publicly
available information. To varying degrees, information is available on such areas as their:
• Technology
• Manufacturing methods
• Manufacturing locations
• Customers
• Contract wins that identify the system to be built
168
ROGUCCI - THE REPORT ISSUE 1, 2010
Approximately 1,000 cable landing sites can be found on the Internet. The information provided for
these sites includes the cable system termination at the site, the equipment supplier of the system, the date
of deployment, and the cable route length.
In addition, detailed maps of cable systems can be found in the public domain. Images include:
169
ROGUCCI - THE REPORT ISSUE 1, 2010
B.8 Outages
Long haul undersea communications cable systems are designed to perform at a level described as ultra-
high reliability. However, despite all of the best planning and execution, failures of these systems still
occur. The systems are also designed to be fault tolerant, meaning that a failure can be detected and dealt
with gracefully such that there is minimal impact to the traffic being carried. This is often accomplished
by the use of the system’s spare capacity available in its paired redundant path. Increasingly, undersea
cable systems are also rerouting their traffic to other systems – either undersea or land-based.
As the frequency, duration and cause of network failures is potentially sensitive information, it is
understandable that much of this information is not available to the public. The information may be
sensitive for reasons related to direct competitive business interests (i.e. comparison among systems),
stakeholder subscriber interests (i.e. a carrier leasing space may be represented as having sub-optimum
performance through association), or nation-state security.
However, outages that have a major impact tend to be reported in public news outlets. A detailed analysis
of information publicly available on the Internet supported the following observations:
• on the order of 100 outages can be identified for the period from 2000 through 2009
• the outage locations are distributed across the globe
• outage events were found in each of the 12 months
• outage durations range from several hours to several months
• the primary causes (from the 8i Framework) of the events are associated with
o Environment
o Hardware
o Power
In addition, there are suggestions that some events could have been caused by malicious activity, thus
potentially involving the Human ingredient.
Restoration of land-based equipment is obviously likely to be less involved. This type of restoration will
most typically involve replacement of electronic hardware at the termination point or repair or
replacement of power feed equipment. The restoration for buried or submerged equipment is more
involved. When submerged equipment must be accessed, dedicated ships with specialized crew and
equipment aboard are needed.
Given the vital dependence of undersea communications cable infrastructures on specialized cable ships,
these vessels are appropriately considered a critical international asset. Public information on these ships
is available and includes information such as:
• vessel name
• country of registration
• base port
170
ROGUCCI - THE REPORT ISSUE 1, 2010
• owner
• specific function regarding cable repair
• weight capacity
• photographs
• The cost for a normalized (by distance and capacity) unit of undersea cable transmission has
dropped by 93% from 1998 to 2008.299
• The number of people affected per country for specific undersea cable cuts.
• The cost per minute, hour or day for financial trading firms, call centers communications service
providers, and other businesses.
• Estimates of the number of businesses that fail from specific undersea cable outages. 300
• Specific details describing the amount of backlog created when three are outages (medical
subscriptions, airline reservations, stock trades, orders, etc.).
299
Unit Cost of Submarine Cable Systems, TeleGeography, 2008.
300
National Archive & Records Administration.
171
ROGUCCI - THE REPORT ISSUE 1, 2010
DAMAGE: The earthquake killed 2,266, injured 10,261 and caused extensive structural damage to the
city of Bourmerdes and elsewhere in the country. The undersea landslides generated from the earthquake
cut undersea cables approximately “45 km offshore from the epicentral area and disturbed the
communications link between Europe and several other countries in Asia and the Middle East.”303 Overall,
undersea landslides damaged five communications cables.304
IMPACT: It took four cable ships six weeks to fix all the cables.305 One repair involved replacing a 120
km section of cable. All things considered, the earthquake caused an estimated $100 million in damage.306
301
ORISE Acknowledgement: This research was performed under an appointment to the U.S. Department of Homeland
Security (DHS) Scholarship and Fellowship Program, administered by the Oak Ridge Institute for Science and Education
(ORISE) through an interagency agreement between the U.S. Department of Energy (DOE) and DHS. ORISE is managed by
Oak Ridge Associated Universities (ORAU) under DOE contract number DE-AC05-06OR23100. All opinions expressed in this
paper are the author’s and do not necessarily reflect the policies and views of DHS, DOE, or ORAU/ORISE.
302
A. Ayadi, et. al., “Strong Algerian Earthquake Strikes Near Capital City,” Eos, Vol. 84, No. 50, 16 December 2003. Accessed
at http://atlas.cc.itu.edu.tr/~cakirz/papers/ayadi_etal_2003_EOS.pdf
303
Ibid.
304
ICPC, “Critical Infrastructure: Submarine Telecommunication Cables,” Accessed at
www.iscpc.org/publications/Critical_Infastructure_2009_V2.pps
305
Ibid.
306
Ibid.
172
ROGUCCI - THE REPORT ISSUE 1, 2010
DAMAGE: The breaks were significant. At the time, “Pakistan was the only country in the region that
relies on a single cable. There were no backup cable, no disaster recovery strategy and no business
continuity plan in place.”308
Despite this plan, business suffered from the lost connection. As one airline director noted, "all our
business including reservations, ticketing, check-ins and 500 agents all around the world are web-based
and it was all affected badly. We had to switch to manual work and that was very difficult for us. Besides,
we suffered severe damage to our market credibility."309
IMPACT: It took two cable repair ships over eleven days to fix the fault. According to an official from
the Pakistani Internet service providers union, 10 million online subscribers in Pakistan went without
Internet service for more than a week because of the fault.310 All e-services were affected, particularly the
burgeoning Pakistani call center industry. As the President of the Call Centres Association of Pakistan
stated, "It has definitely caused millions of dollars in potential losses and a lot of intangible damage you
cannot quantify."311
The loss of communications in a country of size and scope of Pakistan reverberated with its trading
partners. Several multinational information and communication technology contracts were cancelled,
most notably a $10-$20 million investment by Indian call centers. The Indian companies “withdrew the
offer as the lingering Internet blackout caused mistrust in India about Pakistan’s Telecom
infrastructure.”312 India could not outsource their work to Pakistan, fearing that their U.S.-based contracts
would be unfulfilled.
RECOVERY: During that outage, 50% of Internet subscribers and 20% of international phone callers
received a connection via a back-up satellite plan provided by the Pakistani Communications Cable
Limited company. The PTCL implemented an ad-hoc tiered restoration structure, providing data access
first to banks, airlines and the Pakistani stock exchange access first before all others.
EVENT: On December 26, 2006, a seminal event occurred in the undersea cable industry. An
earthquake of at least 6.7 magnitude triggered a submarine landslide near the junction of the Eurasian and
Philippine tectonic plates. Termed the Hengchun earthquake, the epicenter of the event landed directly in
307
“Submarine cable: IT ministry preparing load-sharing plan,” Pak Tribune, February 14, 2006. Accessed at
http://www.paktribune.com/news/index.shtml?134126
308
Hayyan Faisal, “Task to detect major Fault in Pakistan's Internet cable Set Off,” Pakistan Times, July 2005. Accessed at
http://pakistantimes.net/2005/07/04/top1.htm
309
“Bad weather obstructs Pakistan's Fiber Optic cable repair Work” Pakistan Times Staff Report, July 5, 2005. Accessed at
http://pakistantimes.net/2005/07/05/top6.htm
310
Faisal, Pakistan Times.
311
Ibid.
312
Omair Rasheed, “Standby Net arrangements terminated in Pakistan,”
Pakistan Times, July 6, 2005. Accessed at http://pakistantimes.net/2005/07/06/top5.htm
173
ROGUCCI - THE REPORT ISSUE 1, 2010
the middle of the heavily cabled Luzon Strait, off the coast of Taiwan. Ten aftershocks greater than 4.7
magnitude also hit the region.313 From the timing of the breaks, a turbidity current averaging a speed of
approximately 20 km/hour traveled over 330 km.314
DAMAGE: Undersea landslides severed nine out of eleven cables in the area, moving cables far away
from their original routes. A total of twenty-one faults were discovered in the nine damaged cable
systems.315 The damage extended to water depths of 4000 meters and covered many in tons of mud.316 It
took eleven cable ships (over 40% of the world’s entire fleet) until February 15th – a total of forty-nine
days or seven weeks to complete the cable repair work.317
IMPACT: The day after the earthquake, most people in Hong Kong were “just twiddling their
thumbs.”318 Taiwan’s international calling capacity to the U.S. was down to 40% its normal capacity.319
98% of Taiwan's communications with Malaysia, Singapore, Thailand and Hong Kong was also
disrupted. 320 Internet access to China, Hong Kong, Vietnam, Taiwan, Singapore, Japan and the
Philippines was seriously impaired. Banking, airline bookings, email & other services in many of these
countries, particularly Taiwan and Singapore, were either stopped or delayed.321
Financial markets and general commerce were disrupted. A South Korean domestic bank reported that
“trading of the Korean won has mostly halted due to the communication problem."322 Other “securities
traders in Hong Kong and Singapore were unable to obtain prices and complete orders… [and] dealers in
the region said they have had difficulties accessing international news providers for information.” 323
Customers also had trouble looking up various “stock prices online.”324
RECOVERY: Some traffic that couldn’t be carried on the two remaining undersea cable systems needed
to find a different route in order to reach North and South America. One solution was to re-route traffic
over terrestrial cables across Asia and through Europe. Despite these ad-hoc arrangements, some delay in
internet traffic was still apparent even two months after the earthquake.
AFTERMATH: This event forced communications carriers to avoid cable-laying in seismically active
areas when possible.
313
2006 Hengchun earthquake, Wikipedia entry, accessed at http://en.wikipedia.org/wiki/2006_Hengchun_earthquake
314
ICPC, “Critical Infrastructure: Submarine Telecommunication Cables,” Accessed at
www.iscpc.org/publications/Critical_Infastructure_2009_V2.pps
315
Ryan Singel, “Fiber Optic Cable Cuts Isolate Millions From Internet, Future Cuts Likely,” Wired Magazine, January 31, 2008.
Accessed at http://www.wired.com/threatlevel/2008/01/fiber-optic
316
Ibid.
317
Ibid.
318
Seth Mydans, “The Day the Pixels Froze: When a Digital World Was Stopped by a Natural Disaster,” The New York Times,
December 28, 2006. Accessed at http://www.nytimes.com/2006/12/28/business/28connect.html
319
Sumner Lemon, “Earthquake disrupts Internet access in Asia,” Computer World Magazine, December 27, 2006. Accessed at
http://www.computerworld.com/s/article/9006819/Earthquake_disrupts_Internet_access_in_Asia?intsrc=news_ts_head
320
Ibid.
321
“Taiwan quake causes net blackout,” Reuters. December 28, 2006. Accessed at http://www.smh.com.au/news/wireless--
broadband/taiwan-quake-causes-net-blackout/2006/12/28/1166895395104.html
322
“Asia communications hit by quake,” BBC News, December 27, 2006. Accessed at http://news.bbc.co.uk/2/hi/asia-
pacific/6211451.stm
323
Choe Sang-Hun and Wayne Arnold, “Asian Quake Disrupts Data Traffic,” The New York Times, December 28, 2006.
Accessed at http://www.nytimes.com/2006/12/28/business/worldbusiness/28quake.html?pagewanted=all
324
Ibid.
174
ROGUCCI - THE REPORT ISSUE 1, 2010
EVENTS: In November 2007, the Dhaka-Chittagong–Cox's Bazar portion of a submarine cable “was
snapped at two points near Cox's Bazar and Feni” twice in one week.325
DAMAGE: All international communications to Bangladesh were disrupted for fifteen hours during the
second outage.
IMPACT: Due to the cuts, the Bangladesh Telegraph and Telephone Board lost revenue on the order of
$70,000 per hour.326
DAMAGE: The anchors “severed the cables outside Alexandria after bad weather conditions forced
ships to moor off the coast.”329 Two of the cut cables “have a capacity close to 620 gigabits per second,” 330
leaving only one cable connecting Europe with Egypt and the Middle East in operation. The sole
remaining cable “has a capacity of 70 gigabits per second,” and could not handle the large influx in traffic.
331
IMPACT: The cuts “affected at least 60 million users in India, 12 million in Pakistan, 6 million in Egypt
and 4.7 million in Saudi Arabia.”332
In Egypt and Pakistan, “70 percent of its connection to the outside Internet and 30 percent of service to
its call-center industry, which depended less on the lines,” were lost.333 Also, “50 and 60 percent of India's
Net outbound connectivity was similarly lost on the westbound route critical to the nation's burgeoning
325
Sayeed Rahmna, “Bangladesh Submarine Cable link sabotaged again,” Groundreport.com, November 13, 2007. Accessed
at http://www.groundreport.com/Media_and_Tech/Bangladesh-Submarine-cable-link-sabotaged-again/2837950
326
Ibid.
327
Asma Ali Zain, “Cable damage hits 1.7m Internet users in UAE,” Khaleej Times, February 5, 2008. Accessed at
http://www.khaleejtimes.com/DisplayArticle.asp?xfile=data/theuae/2008/February/theuae_February155.xml§ion=theuae
328
Lewis Page, “Dubai impounds cable slicing ships: Satellite images used to ID Gulf cable miscreants,” The Register (UK),
April 14, 2008. Accessed at http://www.theregister.co.uk/2008/04/14/undersea_cable_cut_ships_nabbed/
329
Malcolm Fried and Lars Klemming, “Severed Cables in Mediterranean Disrupt Communication (Update4),” Bloomberg.com,
December 19, 2008. Accessed at http://www.bloomberg.com/apps/news?pid=20601085&sid=aBa0lTN.dcoQ
330
John Borland, “Analyzing the Internet Collapse: Multiple fiber cuts to undersea cables show the fragility of the Internet at its
choke points,” Technology Review (MIT), February 5, 2008. Accessed at http://www.technologyreview.com/web/20152/?a=f
331
Ibid.
332
Ali Zain, Khaleej Times, 2008.
333
Borland, Technology Review, 2008.
175
ROGUCCI - THE REPORT ISSUE 1, 2010
outsourcing industry.”334 Between those three countries, 2,500 networks went down during the outage
period.
IMPACT: At one point as much as 55% of voice traffic in Saudi Arabia, 52% in Egypt and 82% in India
was out of service, according to Orange.336
Again, these cuts caused massive outages; one article reported these significant outages:337 Saudi Arabia:
55% out of service; Djibouti: 71% out of service; Egypt: 52% out of service; United Arab Emirates: 68%
out of service; India: 82% out of service; Lebanon: 16% out of service; Malaysia: 42% out of service;
Maldives: 100% out of service; Pakistan: 51% out of service; Qatar: 73% out of service; Syria: 36% out of
service; Taiwan: 39% out of service; Yemen: 38% out of service; Zambia: 62% out of service.
IMPACT: 1.5 million services were interrupted, including all ATM and credit card processing; 52,000
Verizon landlines lost service.341 Although the case deals with a terrestrial cut, the situation makes the
point that such a cut can happen on land.
334
Ibid.
335
Eric Krangel, “Egypt Goes Dark: Mediterranean Data Cables Toast,” Business Insider.com, December 19, 2008. Accessed
at http://www.businessinsider.com/2008/12/egypt-goes-dark-mediterranean-data-cables-toast
336
Ibid.
337
Arsalan Tariq Mir, “Three Undersea Cables Slashed,” AMMAR-3SIXTY! Blog, Accessed at
http://ammar360.com/2008/12/20/three-major-undersea-cables-slashed/
338
Kevin Burton, Angela McGee, Jack Dibeler, “Who Turned Out the Light?” Burton Asset Management, 2009. Accessed at
http://www.thinkbam.com/thinking/WebArticles/WhoTurnedOutTheLight.pdf
339
Ibid.
340
Margeurite Reardon, “How secure is the U.S. communications network?,” CNet News, April 13, 2009. Accessed at
http://news.cnet.com/8301-1035_3-10217550-94.html?part=rss&subj=news&tag=2547-1_3-0-20
341
Burton, et al., Burton Asset Management report, 2009.
176
ROGUCCI - THE REPORT ISSUE 1, 2010
IMPACT: Internet traffic was significantly disrupted to Benin, Togo, Niger and Nigeria. Nigeria
appeared to be worst hit, as close to “70% of Nigeria's bandwidth was cut, causing severe problems for its
banking sector, government and mobile phone networks.”342
IMPACT: Qatar and Singapore suffered the greatest communications failures. In addition, cable
operators in Indonesia, the Philippines, South Korea and Japan all suffered disruptions to their
networks.346
Acts of theft and sabotage are not new. The Vietnam case in 2007 can be considered both theft and
sabotage as it was designed to earn a profit by severing optical cable systems.
Instead of recovering old cable, the companies and other fisherman started to pull up new ones. In the
end, over 500km of cables was recovered from five illegal cable ring networks, with “roughly 43 km of
fiber optic cable…belonging to a company in Singapore.”348
342
“Cable fault cuts off West Africa,” BBC News, July 30, 2009. Accessed at http://news.bbc.co.uk/2/hi/technology
343
Victoria Ho, “Typhoon knocks out Asia telecom cable,” CNet News, August 13, 2009. Accessed at
http://news.cnet.com/8301-1035_3-10308348-94.html
344
Robert Clark, “After the typhoon, quake slows net access to a crawl,” Telecomasia.net, August 19, 2009. Accessed at
http://www.telecomasia.net/content/after-typhoon-quake-slows-net-access-crawl
345
Verizon Business press release, “Verizon Business Global Mesh Network Investment Pays Big Dividends for Enterprise
Customers During Multiple Submarine Cable System Disruptions in Asia-Pacific Region; All Restorable Customer Traffic Moved
to New Routes Within Milliseconds,” M2 Newswire.com, September 18, 2009. Accessed at http://www.highbeam.com/doc/1G1-
208059844.html
346
Ek Heng, “Typhoon Morakot damages several subsea cable systems,” Telecomengine.com, August 19, 2009. Accessed at
http://www.telecomengine.com/article.asp?HH_ID=AR_5575
347
Matt Steinglass, “Undersea Cable Thieves Slow Vietnam's Internet Access,” VOA News.com, June 1, 2007. Accessed at
http://www1.voanews.com/english/news/a-13-2007-06-01-voa14-66777382.html
348
Jacqui Cheng, “Phishing plumbs new depths: Vietnamese fishermen sever fiber optic lines,” Arstechnica.com, June 8, 2007.
Accessed at http://arstechnica.com/old/content/2007/06/phishing-plumbs-new-depths-vietnamese-fishermen-sever-fiber-optic-
lines.ars
177
ROGUCCI - THE REPORT ISSUE 1, 2010
The cable thefts forced Vietnam to rely on one submarine cable for 82% of voice and data traffic.349
Other traffic was pushed to terrestrial lines and satellite, creating Internet delays for up to three months
after the thefts.350 To replace an eleven km section, Vietnam paid $5.8 million. More than the money,
Vietnam’s credibility suffered as it sought to restore itself with the rest of the world.351 The Prime Minister
of Vietnam said the theft “directly affects Vietnam’s socio-economic development, national security and
the country’s prestige in the region as well as in the world.”352
So far, press reports of criminal prosecutions are available, but no official report has been published.
Claims for compensation remain ongoing. The Prime Minister embarked on a campaign to educate the
public on the significance of submarine cables so as to avoid anymore unwarranted cable theft.
In Jamaica, “theft of copper cable was reported to have reached epidemic proportions, costing one
company over J$100m ($1.2 million) in losses and forcing them to offer J$1m ($12,000) for information
leading to the arrest of the cable thieves.”353 The problem was out of control with reports stating thieves
were stealing cable “at one end of a route while it was being replaced at the other.”354
In many of the cases, an undersea cable disruption caused severe problems to one or more countries.
Corporations lost millions, militaries lost missions, publics lost connections, and countries lost national
prestige. Since major banks can operate in upwards of 100 countries around the world, large multi-
national corporations are increasingly vulnerable to outages around the world. The problem has become
less localized and more globalized than it ever has been.
It is clear that undersea fiber-optic communications cables profoundly impact in the age of information.
For instance, nearly all international data and communications flow over undersea cables. The vast
majority of U.S. government international data traffic, at least at the unclassified level, is sent on
commercially owned and operated undersea cables. This situation is similar in almost all countries.
349
“Critical Infrastructure: Submarine Telecommunication Cables,” ICPC, Accessed at
www.iscpc.org/publications/Critical_Infastructure_2009_V2.pps
350
Ibid.
351
See Burnett, Douglas R. and Mick P. Green. "Security of International Submarine Cable Infrastructure: Time to Rethink?."
Legal Challenges in Maritime Security. Eds. Ronán Long, John Norton Moore, Myron H. Nordquist and Rüdiger Wolfrum.
Martinus Nijhoff Publishers, 2008.
352
Ibid.
353
Cathy Holding, “A global cable network of fragile links,” The Independent (UK), March 10, 2009. Accessed at
http://www.independent.co.uk/news/business/sustainit/a-global-cable-network-of-fragile-links-1640448.html
354
Ibid.
355
Ibid.
178
ROGUCCI - THE REPORT ISSUE 1, 2010
The profound importance of cables is also noted in regards to international commerce. The Chief of Staff
for the Chairman of the U.S. Federal Reserve recently stated that “when communications networks go
down, the financial services sector does not grind to a halt, rather it snaps to a halt.”356 Based on the sheer
numbers, it is easy to see why this is true. The Society for Worldwide Interbank Financial
Telecommunication (SWIFT), which describes itself as “the global provider of secure financial messaging
services,” 357 uses undersea fiber-optic communications cables to transmit financial data between 208
countries. In 2004 alone, 9 million messages and approximately $7.4 trillion a day were traded on this
network.358 Today, nearly 15 million messages a day are sent over it. The CLS Bank, which “operates the
largest multi-currency cash settlement system,” trades over 1 million transactions and over $4.7 trillion
dollars a day over the same undersea cables.359 With trillions traded daily, a multi-cable outage, especially
in a regional financial hub, like Taiwan/China/Hong Kong, has enormous ramifications on the trust and
soundness of the global financial order.
Moreover, in the 2006 Hengchun earthquake case, it took ships seven weeks to repair all disrupted cables.
When millisecond delays can lose millions in real-time trading companies, seven weeks is an eternity.
Without a fool-proof back-up plan, communications carriers and end-users can jeopardize profit and
investor confidence. Even with a sound back-up plan, the cost differential in service restoration can be
huge. In the case of Taiwan 2006, the cost of going over land was thirty times the cost of going over
water in the back-up plan.360 Additional latency is typically another problem companies’ face in these
situations too. Satellite back-up is usually not a feasible option.
Secondary effects with cable outages are also significant. A simulation in an advanced industrial country
proved just how important cables are to ancillary industries. The official involved in the simulation noted
that his government soon realized that if one or more cables went down, air traffic controllers “wouldn’t
be able to land planes because you couldn’t check who is on them.”361 In the global age of terrorism,
planes can land only after all passengers are background checked. This example is one of many proving
that cable outages have large first, second and third-order effects that can reverberate within a country,
within a region and within the international community. Governments and companies worldwide need to
do much more to protect against a future multi-cable disruption in order to avoid such effects.
356
Stephen Malphrus, “Keynote Address,” ROGUCCI Summit, Dubai, U.A.E., October 19, 2009.
357
Ibid.
358
Ibid.
359
Ibid.
360
Mick Green, ICPC Presentation to the ROGUCCI Summit, October 19, 2009.
361
Comments made by Australian official to ROGUCCI Summit members, October 22, 2009.
179
ROGUCCI - THE REPORT ISSUE 1, 2010
362
Table 12. 12 Core Standards of the Financial Sector
12 Core Standards
Macroeconomic Policy and Data Transparency
Monetary and financial policy transparency
Fiscal policy transparency
Data dissemination
Institutional and Market Infrastructure
Insolvency
Corporate governance
Accounting
Auditing
Payment and settlement
Market integrity
Financial Regulation and Supervision
Banking supervision
Securities regulation
Insurance supervision
362
Financial Stability Board, 12 Key Standards for Sound Financial Systems, www.financialstabilityboard.org/cos/key_standards
180
ROGUCCI - THE REPORT ISSUE 1, 2010
181
ROGUCCI - THE REPORT ISSUE 1, 2010
The United Nations Convention on the Law of the Seas (UNCLOS) provides special status for undersea
communications cables, including special provisions for their protection.363
Article 21. Laws and regulations of the coastal State relating to innocent passage:
1. The coastal State may adopt laws and regulations, in conformity with the provisions of this Convention
and other rules of international law, relating to innocent passage through the territorial sea, in respect of
all or any of the following: . . . (c) the protection of cables and pipelines;
Article 58. Rights and duties of other States in the exclusive economic zone
1. In the exclusive economic zone, all States, whether coastal or land-‐locked, enjoy, subject to the relevant
provisions of this Convention, the freedoms referred to in article 87 of navigation and over flight and of
the laying of submarine cables and pipelines, and other internationally lawful uses of the sea related to
these freedoms, such as those associated with the operation of ships, aircraft and submarine cables and
pipelines, and compatible with the other provisions;
182
ROGUCCI - THE REPORT ISSUE 1, 2010
Article 115. Indemnity for loss incurred in avoiding injury to a submarine cable or
pipeline
Every State shall adopt the laws and regulations necessary to ensure that the owners of ships who
can prove that they have sacrificed an anchor, a net or any other fishing gear, in order to avoid injuring a
submarine cable or pipeline, shall be indemnified by the owner of the cable or pipeline, provided that the
owner of the ship has taken all reasonable precautionary measures beforehand.
183
ROGUCCI - THE REPORT ISSUE 1, 2010
INDEX
8
E
8i
Framework,
16,
59,
80,
122,
140,
154,
170
economic,
7,
18,
20,
28,
33,
34,
47,
64,
67,
71,
72,
73,
83,
84,
90,
102,
103,
104,
106,
122,
127,
135,
137,
138,
147,
163,
166,
182
A
engineering,
22,
52,
56,
81,
85
academic,
20,
33,
138
environment,
20,
26,
40,
41,
59,
60,
61,
62,
63,
64,
78,
agreements,
23,
30,
59,
75,
99,
101,
127
94,
96,
98,
112,
113,
114,
126,
146,
156,
161
assessment,
12,
16,
52,
53,
121
events,
41,
52,
62,
63,
84,
88,
100,
102,
126,
131,
151,
awareness,
19
152,
153,
154,
157,
162,
164,
167,
170
EWI,
19,
97
exercises,
26,
110,
111
B
back-‐up,
19,
85,
107,
137
F
bandwidth,
18,
19,
20,
45,
49,
70,
73,
77,
79,
82,
85,
92,
120,
134,
177
failure,
19,
22,
33,
38,
39,
47,
48,
66,
67,
68,
69,
70,
71,
best
practices,
23,
26,
99,
100,
112,
115,
116,
124,
126,
72,
76,
77,
83,
84,
85,
86,
88,
90,
91,
102,
113,
120,
145,
149
131,
137,
138,
139,
146,
151,
152,
156,
158,
161,
bureaucracy,
24
163,
166,
170
business,
22,
81,
92,
93,
103,
117,
122
failure
modes,
19
financial
sector,
19,
22,
83,
84
financial
sector
stakeholders,
21,
27,
117
C
forum,
46,
50,
54,
112,
124,
156
cable
ships,
25,
26,
52,
106,
108,
109,
110,
111,
170
framework,
20,
21,
27,
59,
72,
114,
118,
120,
122,
capacity,
19,
45,
50,
66,
67,
71,
73,
78,
86,
90,
91,
92,
126
93,
134,
135,
137,
145,
147,
163,
170,
171
future,
7,
20,
21,
32,
34,
38,
52,
54,
59,
70,
79,
80,
88,
catastrophic
loss,
23,
33,
101,
137,
138
107,
134,
162
cause,
76,
87,
152,
154
commitment,
26,
27,
28,
29,
30,
31,
32,
33,
52,
133
G
congestion,
32,
71,
134,
135,
136
coordination,
23,
25,
27,
30,
31,
32,
72,
86,
94,
99,
101,
global
level,
19,
24,
27,
35,
36,
38,
41,
47,
52,
77,
117,
105,
109,
110,
111,
117,
118,
119,
125,
129,
130,
119,
126
135,
136,
142
Global
Summit,
4,
5,
6,
7,
21,
39,
45,
47,
48,
50,
53,
54,
core
standard,
28,
121,
122,
123
58,
83,
107,
117,
122,
141,
142,
150,
156
countermeasure,
153,
162,
163,
165
government,
7,
18,
19,
20,
21,
25,
26,
27,
30,
31,
32,
crisis,
23,
56,
99,
100,
111
34,
39,
49,
54,
59,
91,
94,
98,
105,
106,
107,
112,
114,
117,
118,
127,
128,
129,
130,
131,
132,
134,
135,
139,
156
D
Guiding
Principles,
19
damage,
25,
30,
48,
59,
60,
62,
64,
66,
76,
78,
79,
87,
92,
96,
105,
106,
107,
109,
127,
128,
147,
156,
158,
H
159,
160
delay,
22,
74,
76,
85,
94,
105,
107,
114
human,
19,
20,
22,
45,
59,
61,
63,
78,
79,
84,
85,
91,
distance,
74,
90,
93,
103,
104,
152,
155,
171
105,
112,
113,
151,
153
due
diligence,
22,
23,
29,
84,
99,
101,
120,
124
I
IEEE,
141
Information,
7,
23,
26,
55,
56,
57,
75,
89,
99,
100,
112,
114,
115,
116,
124,
126,
131,
147,
149,
165,
168
184
ROGUCCI - THE REPORT ISSUE 1, 2010
information
sharing,
26,
77,
79,
112,
113,
114,
115,
oversight,
27,
31,
118,
130
168
owners,
26,
110,
167,
169
international
cooperation,
19
ownership,
20,
47,
92,
104,
147,
169
Internet,
92
intrinsic
vulnerabilities,
7,
20,
40,
45,
46,
48,
59,
61,
64,
66,
70,
71,
73,
75,
77,
78,
79,
90,
126,
152,
153,
P
154,
156,
158,
161,
162
participant,
12,
16,
52,
53
Investment,
22,
81,
92
payload,
20,
22,
49,
59,
67,
73,
74,
78,
84,
85,
104,
134,
Ishikawa,
154,
156,
158,
160,
162
151
isolation,
33,
93,
137
personnel,
26,
60,
109,
110
piracy,
20,
41,
79,
109
K
pirates,
25,
109
planning,
25,
26,
33,
94,
98,
105,
106,
108,
109,
110,
key
observations,
7,
18,
21,
22,
23,
35,
80,
81,
98,
101,
112,
120,
121,
138,
139,
141,
151,
170
106,
117,
131
policy,
5,
7,
18,
20,
21,
24,
30,
31,
34,
38,
45,
47,
50,
52,
Kissinger,
Henry,
19,
137
54,
64,
74,
81,
103,
104,
117,
122,
127,
128,
129,
130,
165,
166,
180
Porthcurno
Telegraph
Museum,
12,
53,
54,
56,
142
L
practices,
30,
31,
32,
63,
72,
107,
112,
116,
117,
120,
landing,
60,
90,
127,
167,
169
121,
122,
123,
127,
128,
129,
130,
132,
133,
136,
latency,
22,
49,
73,
76,
84,
85,
103,
104,
121,
151
160,
168
law,
30,
75,
95,
96,
115,
127,
182
price,
92
leader,
98
priority,
19,
25,
28,
30,
31,
32,
34,
74,
76,
77,
105,
120,
leadership,
20,
27,
29,
52,
98,
117,
118,
125,
141
121,
127,
128,
130,
131,
134,
135
limitation,
67,
134,
162
private
sector,
7,
18,
19,
20,
23,
24,
25,
26,
27,
29,
30,
31,
32,
33,
34,
39,
47,
53,
76,
77,
88,
98,
102,
103,
104,
106,
107,
108,
110,
111,
113,
114,
116,
118,
M
121,
123,
125,
128,
129,
130,
132,
133,
135,
138,
maintenance,
24,
45,
63,
66,
67,
71,
78,
84,
93,
94,
102,
151,
171
103,
104,
112,
128,
130,
151,
182
probability,
33,
66,
90,
137,
138,
145,
146,
151,
153
marine
activity,
91,
127
public,
7,
19,
20,
31,
34,
35,
40,
48,
79,
81,
82,
89,
92,
measurements,
23,
29,
99,
101,
124
98,
104,
109,
112,
117,
129,
131,
132,
138,
139,
146,
151,
154,
155,
158,
167,
168,
169,
170,
171
publicly
available
information,
167
N
nation-‐state,
24,
25,
26,
30,
31,
32,
103,
106,
107,
110,
R
111,
113,
116,
127,
128,
129,
130,
135,
136
network,
20,
26,
33,
34,
35,
38,
40,
41,
45,
59,
62,
69,
regional,
19,
20,
24,
33,
101,
104,
116,
132,
138,
153,
71,
72,
73,
76,
77,
78,
79,
82,
83,
90,
91,
102,
103,
163
112,
114,
117,
121,
124,
134,
135,
145,
146,
151,
regulations,
23,
30,
59,
75,
99,
101,
127
152,
166,
170
repairs,
23,
24,
99,
100,
105,
107
network
operators,
20,
33,
34,
35,
38,
41,
72,
76,
77,
restoration,
25,
26,
105,
106,
113,
156,
170
78,
135
risk,
7,
22,
24,
27,
28,
29,
34,
39,
64,
66,
72,
74,
76,
84,
non-‐disclosure
agreement,
29,
88,
125
90,
93,
103,
104,
107,
117,
120,
121,
122,
124,
125,
126,
136,
138,
163
robustness.,
21
O
role
model,
31,
88,
129,
130
routes,
22,
24,
33,
44,
62,
71,
72,
75,
79,
81,
85,
86,
90,
operation,
20,
25,
32,
38,
63,
66,
71,
76,
78,
100,
102,
93,
97,
102,
103,
104,
109,
131,
132,
137,
145,
151,
105,
110,
117,
131,
135,
146,
151,
156,
158,
159,
156,
161,
163,
169
168,
182
operational
risk,
29,
84,
120,
122
optic,
62,
65,
66,
69,
85,
86,
95,
109,
145,
174,
176,
S
177,
178,
179
optical,
68,
69,
86,
87,
91,
144
satellites,
19
outage,
125,
126,
146,
151,
152,
155,
157,
159,
161,
science,
22,
57,
81,
85,
137,
150
167,
170
scope,
19,
35,
40,
44,
45,
75,
112,
115,
117,
118,
122,
overload,
23,
32,
99,
101,
134,
135,
136
125,
173
185
ROGUCCI - THE REPORT ISSUE 1, 2010
security,
7,
18,
19,
20,
21,
23,
32,
33,
34,
40,
48,
49,
55,
terrorist,
20,
48,
63,
76,
78
56,
59,
79,
82,
84,
96,
97,
98,
101,
105,
109,
110,
topology,
47,
90,
91,
102,
114
112,
114,
116,
127,
131,
132,
135,
137,
144,
147,
trusted
information
sharing,
23,
26,
57,
99,
100,
112,
148,
149,
150,
151,
157,
165,
169,
170,
172,
178
115,
124,
149
sensitive,
22,
26,
66,
70,
74,
85,
92,
103,
112,
113,
114,
115,
116,
145,
152,
170
service
providers,
20,
32,
33,
34,
35,
38,
39,
41,
72,
76,
U
78,
92,
120,
121,
123,
135,
169
UNCLOS,
94,
144
single
points
of
failure,
22,
24,
90,
94,
102,
103
United
Nations,
15,
94,
96,
109,
144,
182
software,
20,
59,
70,
71,
79,
86,
88,
151,
163
sovereignty,
20,
24,
98,
104,
107
stakeholder,
18,
19,
20,
27,
29,
48,
49,
50,
52,
71,
81,
V
97,
98,
112,
116,
117,
118,
119,
124,
125,
126,
133,
virtual
earth,
63,
87,
147
138,
170
vulnerabilities,
12,
13,
61,
63,
64,
66,
70,
71,
73,
75,
78,
standard,
23,
28,
99,
101,
120,
122,
124,
126,
146
165
statistics,
18
survivability,
40
W
T
water
zones,
16,
95
technology,
18,
19,
28,
29,
33,
38,
39,
40,
54,
62,
65,
67,
71,
73,
79,
81,
82,
83,
85,
86,
88,
97,
120,
121,
122,
Z
124,
137,
145,
146,
152,
168,
177
zone,
47,
72,
84,
182
terrestrial,
32,
33,
90,
134,
137
territorial
water,
24
186