๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page
  • What is the backbone of the internet?
  • What are the major undersea cable routes?
  • Internet's Physical Infrastructure and Privacy

Was this helpful?

  1. Privacy Engineering Field Guide Season 1
  2. Chapter 2 : How the internet works?

Physical Infrastructure

The Internet backbone may be defined by the principal data routes between large, strategically interconnected computer networks and core routers of the Internet.

PreviousChapter 2 : How the internet works?NextNetwork and Protocols

Last updated 2 years ago

Was this helpful?

Everything starts with basic electrical signals that travel through . This is the first infrastructure of the internet.

What is the backbone of the internet?

So for you who think the internet is provided by satellites and all the computers are connected to each other through satellites, at least what Elon Musk is doing with , but since the 60s it's actually cables underground and even under the oceans.

These cables form the underground infrastructure and are used to send and receive information to various systems.

More than 550,000 miles of flexible undersea cables about the size of garden watering hoses carry all the world's emails, searches, and tweets.

What are the major undersea cable routes?

The Euro-Atlantic area is the oldest undersea cable route and carries traffic between the two biggest economic hubs with dozens of cables, the majority of which are between the United States, the United Kingdom, and France.

THE ASIA-AFRICA-EUROPE cable travels 15,500 miles along the seafloor, connecting Hong Kong to Marseille, France. As it snakes through the South China Sea and toward Europe, the cable helps provide internet connections to more than a dozen countries, from India to Greece.

Internet's Physical Infrastructure and Privacy

This global network of undersea cables provides the high-bandwidth connections needed for a wide range of activities vital for our modern society, from financial transactions to global communications.

Therefore we see state actors who control the bandwidth to lower the internet speed to intolerable, or totally disconnect a country from the internet by cutting these cables to plunge millions of citizens offline.

There might be also other more aggressive strategies like eliminating internet access for a targeted population, sabotaging an economic competitor, or causing economic disruption for geopolitical purposes.

In 2012, the only cable connecting Bangladesh to the international network was cut off and they lost their internet for nearly a month.

In July 2005, a portion of the submarine cable that provided Pakistan's major outer communications became defective, disrupting almost all of Pakistan's communications with the rest of the world, and affecting approximately 10 million Internet users.

In March 2007, pirates stole a submarine cable afflicting Vietnam's Internet users with far slower speeds. The thieves attempted to sell the 100 tons of cable as scrap.

Governments also attempt to block websites โ€œfor national security, the restoration of public order, and the prevention of crimesโ€. They cripple oversight of internet blocking orders, as part of creating digital cages around their their citizens.

This is worrisome because it allows governments to make copies of everything that transverses these cables, if they wanted to.

A lawsuit filed by the operator of Wikipedia and other organizations challenges the US government's mass online surveillance programs, claiming that tapping into the Internet "backbone" is illegal.

The lawsuit was filed in Maryland federal court by the Wikimedia Foundation, Amnesty International USA, Human Rights Watch and other organizations.

It said the effort by the National Security Agency and other intelligence services "exceeds the scope of the authority that Congress provided" and violates US constitutional guarantees.

Now we will take a deeper dive into how each of these components works.

Did you know? These cables are literally being which now they are protected by various layers to withstand the dangers of deep dark oceans.

These cable networks are laid and maintained by various governments and giant companies. Such projects are usually undertaken by multiple companies due to the large cost of investment. use each other's networks in an efficient manner rather than using foreign servers to allow foreign states to sniff their traffic.

There are also cables, called which are located not on the oceans but on the land.

We are going to be talking about layers pretty soon and just remember that the physical infrastructure of the internet is formed by "". Layer 1 consists of these cables and physical components hence it's called the as well.

There are also intelligence agencies that insert during the cable manufacturing process, targeting onshore landing stations and facilities linking cables to networks on land, or tapping the cables at sea.

Britain is, geographically, in an ideal position to access to cables as they emerge from the Atlantic, so there is cooperation between the NSA and GCHQ. Beyond that partnership, there are the other members of the "".

eaten by fish, like sharks
Internet Service Providers (ISPs)
Terrestrial Cables
Layer 1
Physical Layer of the Internet
backdoors
Five Eyes
๐ŸŽ“
๐Ÿ›ฐ๏ธ
wires in our cables
Starlink
97% of all internet traffic runs through this hidden infrastructure of thousands of miles of fiber optic cables that zig-zag our ocean floors.
It has been revealed that the explosion of the ultimate PETs, at the end of Battle for Earth, caused some Shadow Matter to release up into the atmosphere, causing Shadow Matter to be spread through the remaining human population. - Journals of Order of Epoch, 2234
Slide from a Glimmerglass presentation on how undersea cables signals are tapped
Page cover image