top of page

Expanding Communication Network

Updated: Aug 23

Lt Col Amit Sharma, SM (retd.)

DRASInt | Leadership, Security Management and Vigilance


At a time when global communication is essential for economic, military, and societal operations, China's involvement in the infrastructure that facilitates this communication is subject to growing scrutiny. This piece delves into China's investments in submarine cables, land-based networks, and developments in Low Earth Orbit (LEO) satellite technology, establishing China as a significant player in the worldwide network. It also discusses the weaknesses and geopolitical consequences linked to these infrastructures, especially in case of interruptions to Chinese communication systems.


Introduction

 

The global communication landscape is undergoing rapid transformation, with significant implications for international relations, commerce, and security. China has emerged as a pivotal player, investing heavily in under sea cables, terrestrial networks, and satellite communication. This article aims to analyze China’s strategic initiatives in these areas, assess the implications for global connectivity, and highlight the associated risks and vulnerabilities.

 

Under sea Cables Expanding Influence 

 

Under sea cables form the backbone of global communication, carrying the vast majority of intercontinental data traffic. Recognizing their strategic importance, China has made substantial investments in this critical infrastructure. Chinese companies, often state-owned or closely tied to the government, are actively involved in laying and maintaining these undersea cables, not only in the Asia-Pacific region but globally. Key Chinese players in the under sea cable industry include:-

 

  1. Telecom - One of the largest telecommunications companies in China, China Telecom plays a significant role in both domestic and international cable projects.

  2. Mobile International - A subsidiary of China Mobile, involved in several global under sea cable projects.

  3. Unicom - Another major telecommunications provider with stakes in multiple international cable systems.

  4. HMN Tech (formerly Huawei Marine Networks) - Specializes in under sea cable networks, involved in laying cables that connect China to various parts of the world.

 

Major Under sea Cable Routes

  

Asia-Africa-Europe 1 (AAE-1) - Spanning approximately 25,000 kilometers, this cable connects Asia, Africa, and Europe through key landing points in the following towns and cities:

 

  1. Asia-Hong Kong, Mumbai, Chennai (India)

  2. Africa-Djibouti, Mombasa (Kenya)

  3. Europe-Marseille (France), London (United Kingdom), Lisbon (Portugal)

     

These cities enhance global telecommunications and facilitate efficient data transmission across interconnected regions.

 

Southeast Asia-Middle East-Western Europe 6 (SEA-ME-WE 6) - A 20,000 km cable system connecting Southeast Asia, the Middle East, and Western Europe, with landing points in:

 

  1. Southeast Asia-Singapore, Penang, Kota Bahru (Malaysia), Batam, Jakarta (Indonesia), Chonburi, Bangkok (Thailand)

  2. South Asia-Cox's Bazar (Bangladesh), Mumbai, Chennai (India), Colombo (Sri Lanka), Karachi (Pakistan)

  3. Middle East-Dubai (United Arab Emirates), Muscat (Oman)

  4. Western Europe-Alexandria (Egypt), Marseille (France), Rome, Catania (Italy)


In China, these cables typically terminate in major coastal cities, including:

  

  1. Shanghai-A major hub for international and domestic telecommunications.

  2. Hong Kong-A critical endpoint, known for its role as a global financial center and a key entry point for data traffic.

  3. Qingdao-A strategic location for cables connecting China with Japan and South Korea.

  4. Guangzhou-An important endpoint for cables linking Southeast Asia with China.

 

These endpoints are crucial for maintaining China’s global data connectivity and enhancing its control over international communication routes.

 

Terrestrial Networks

 

China has well-established and strategically designed land-based networks. Internally, China has made significant investments in fiber optic infrastructure, establishing a highly interconnected network that connects major cities, data centers, and rural areas. This network is essential for internal communication and economic growth. Major stakeholders in land-based networks include:

 

  1. China Telecom-Dominates the domestic fiber optic network.

  2. China Mobile-Operates one of the world’s largest mobile networks, supported by extensive fiber infrastructure.

  3. China Unicom-Plays a major role in both domestic and international network operations.

  4. ZTE and Huawei-Provide essential equipment and technology for building and maintaining these networks.

 

Internationally, China’s Belt and Road Initiative (BRI) has expanded terrestrial networks into Central Asia, Africa, and Europe. Through this initiative, Chinese companies are building or upgrading infrastructure in partner countries, ensuring that Chinese networks extend beyond its borders, thus enhancing China’s influence in these regions and providing alternative data routes.

 

Collaborations

 

Chinese companies have partnered with foreign entities in under sea cable projects, including:-

 

  1. India-Bharti Airtel collaborates with Chinese companies on cable routes connecting India to China and other parts of Asia.

  2. Pakistan-Pakistan Telecommunication Company Limited (PTCL) has partnered with Chinese firms in projects like the AAE-1 and the Pakistan East Africa Cable Express (PEACE) cable.

  3. Bangladesh-Bangladesh under sea Cable Company Limited (BSCCL) has partnered with HMN Tech on the SEA-ME-WE 4 and SEA-ME-WE 5 projects.

  4. United States-Despite geopolitical tensions, Google and Facebook have historically engaged in joint ventures with Chinese companies on under sea cable projects like the Pacific Light Cable Network (PLCN).

 

Satellite Communication - LEO

 

  1. While under sea cables and terrestrial networks form the core of China’s communication infrastructure, satellite communication, particularly LEO systems, is also gaining importance. China has been aggressively developing its LEO satellite constellations to ensure global connectivity and reduce reliance on foreign technology. Projects like the Hongyun and Xingyun constellations, developed by the China Aerospace Science and Industry. 

  2. Corporation (CASIC), aim to provide global internet coverage, similar to SpaceX’s Starlink. These LEO satellites are crucial for connecting remote areas and providing redundancy in case of cable failures.

  3. However, LEO systems present challenges, including lower bandwidth and higher latency compared to terrestrial and under sea networks. Despite these limitations, LEO satellites offer strategic advantages, particularly when physical infrastructure is compromised.

  4. In scenarios of conflict or natural disaster disrupting under sea cables or terrestrial networks, China’s LEO satellites could maintain domestic and global communication.


Implications

  

China's extensive presence in undersea cables, terrestrial networks, and the expanding capabilities of LEO satellites bring about both opportunities and risks:-

 

  1. By having significant control over global communication infrastructure, China can impact international data flows, potentially using this leverage in geopolitical negotiations or conflicts, especially with nations dependent on networks controlled by China.

  2. China's infrastructure is susceptible to disruptions. Undersea cables are at risk from natural disasters, sabotage, and cyberattacks. In such situations, LEO satellites could become crucial, although their limitations in data capacity and latency emphasize the necessity for diversified communication strategies.

  3. Besides natural hazards, undersea cables are vulnerable to sabotage and cyberattacks. Geopolitical tensions, like those in the South China Sea, heighten the likelihood of targeted assaults on undersea infrastructure. The 2020 allegations of Chinese espionage concerning its undersea networks underscore the vulnerabilities of this infrastructure. Cyberattacks can jeopardize data security and integrity, potentially leading to breaches and lasting harm to trust in China's digital domain.

  4. Global Reaction and Tensions - The expansion of Chinese-managed infrastructure raises apprehensions among Western nations and neighboring regions, prompting efforts to reduce reliance on Chinese networks by establishing alternative pathways or enhancing their satellite systems. This could result in a fragmented global communication network driven by geopolitical rivalries.


Prognosis

 

  1. China's ambitious endeavor to establish dominance in global communication networks—whether through undersea cables, terrestrial networks, or LEO satellite systems—signifies more than a mere pursuit of influence; it represents a delicate balance between opportunity and risk. While these investments enhance China's position on the global stage and ensure its citizens remain highly connected in an increasingly digital world, they also expose the country to significant risks, particularly in the event of technical failures or geopolitical tensions.

  2. As our world becomes more interconnected, the competition to secure and control these critical communication pathways intensifies. Adaptability of China's communication networks will be pivotal in shaping its future global influence.

  3. China will continue to expand its presence in global communication, leveraging both physical infrastructure and cutting-edge space technologies. The advancement of LEO satellites, for instance, offers potential safeguards against disruptions in conventional cable networks. Nevertheless, this pursuit of global connectivity is likely to escalate geopolitical tensions, rendering the digital landscape even more intricate and competitive in the years ahead.


 

 References

 

  1. https://www.chinatelecomglobal.com/

  2. https://www.ctamericas.com/news/china-telecom-connecting-countries-across-apg/

  3. https://www.cmi.chinamobile.com/en/

  4. https://www.hmntech.com/

  5. https://www.aaeone.com/aaeportal/

  6. https://seamewe5.com/

  7. https://www.airtel.in/press-release/02-2022/airtel-joins-sea-me-we-6-undersea-cable-consortium-to- scale-up-high-speed-network-for-indias-emerging-digital-economy

  8. https://www.under seanetworks.com/en/systems/asia-europe-africa/peace

  9. https://ptcl.com.pk/Home/PressReleaseDetail/?ItemId=394&linkId=130 (not available)

  10. https://asia.nikkei.com/Spotlight/Belt-and-Road/China-builds-Digital-Silk-Road-in-Pakistan-to-Africa- and-Europe

  11. https://www.offshore-energy.biz/bangladesh-to-invest-in-sea-me-we-5-under sea-cable-system/

  12. https://www.under seanetworks.com/en/systems/asia-europe-africa/smw6/bsccl-raises-investment- in-smw6

  13. https://www.scmp.com/tech/tech-trends/article/3139643/compete-elon-musks-starlink-chinas- private-space-ventures-must

  14. https://www.newspace.im/constellations/hongyun


You can log in to the blog page to offer your comments.


Do not miss to read our latest blog:



Products and Services


Most Sellable Risk Management Products

Corporate Security Risk Assessments-


Identification and Investigation Services-



Recruitment Services

AVAIL OUR RECRUITMENT SERVICES AT>>>>https://getjobsandskills.com/ 

(Job portal dedicated to meet the requirements of Risk Management & Security Professionals.)


We're thrilled to welcome Risk Management & Security Pros to our hub of possibilities. More registrations have been approved! You're now just a step away from connecting with top recruiters. But here's the catch: recruiters are having trouble finding your resume, your ticket to better opportunities. Don't let this moment slip away. Dive into your Getjobsandskills account now and give your resume the spotlight it deserves. Follow this quick checklist:


  • Register: Use your email and password. Wait for approval, which you will receive in your mail.

  • Log in: Log in with the approved mail account.

  • Profile: Click on your username.

  • Resume: Ensure it's irresistible.

  • Edit: Refine details for perfection.

  • Save: Apply and update changes.

  • Remember, a stellar profile sets you apart.


If you haven't joined us yet? Register and upload your resume today to captivate eager recruiters on https://getjobsandskills.com/


Internship


Most Sellable Learning Products

Are you a transitioning serviceman (ESM) looking to excel in the corporate security environment? Or perhaps a corporate security professional aiming to enhance your knowledge and skills to match the industry's best? Look no further! Introducing the Security Officer's Manual, a comprehensive guidebook designed specifically to equip servicemen transitioning into security portfolios and corporate security professionals with the necessary tools for success.


�� Transitioning from "Soldiering" to "Guarding-Prevent Losses" ��


This book serves as an essential resource to help ESM make a reorientation from military mindset of "soldiering" to the corporate world's imperative of "guarding and preventing losses." Discover effective strategies, techniques, and best practices to ensure security measures in corporate environment.


�� Enhance Your Knowledge and Stand Among the Best ��


For corporate security professionals, the Security Officer's Manual acts as a valuable reference to augment your expertise and bring you on par with the industry's finest. Dive deep into the latest trends, emerging technologies, risk management methodologies, and security protocols that are essential for maintaining a secure corporate ecosystem.


�� Presented in Simple Hindi for Easy Comprehension ��


We understand the importance of clear communication and comprehension. That's why the subject matter of this book is presented in simple Hindi, ensuring security professionals can easily understand and successfully evaluate their skills. Language should never be a barrier when it comes to advancing in your career.


�� Get Your Copy Now ��


🎉 Embark on a journey to elevate your security expertise FREE Ex-serviceman (ESM) digital copy in HINDI of DRASInt Security Officers Manual now!


🔗 Registration open for receiving your FREE copy-



Other than Ex-Serviceman

�� Concessional Rates ��


Equip yourself with the knowledge and expertise required to succeed in the corporate security sector. Seize this chance to enhance your professional development and ensure a more promising future. Complete digital DRASInt SECURITY OFFICER'S MANUAL from-


Testing

After completing a study period of 30-60 days, you can advance to the next stage by registering for Testing and Certification at an affordable cost to obtain the following certifications offered by DRASInt.


📞 Contact Us for free Consultation:


Mobile Number:+918290439442, Email-forensic@drasintrisk.com


🚀Innovate, Navigate, Thrive!


DRASInt Risk Alliance serves as your Consultative Investigative Unit (CIU) offering Field Investigation Services and Surveillance. Our expertise lies in conducting investigations concerning Arson, White Collar Crime, Financial Fraud, Malpractice, Corporate Fraud, and Forgery. Additionally, we specialize in Protective Intelligence, Industrial Surveys, Asset Verification, Accident Investigation Services, Fire Damage Investigation Services, Character Reports, Background Verification, Identity Verification Services, Pre-Employment Checks, Documentary Proofing, Bank Card Verification, Digital Forensics Services, Forensic Audit Services, Insurance Fraud Investigation, and Insurance Claim Verification. Our services extend to Anti-Counterfeit Investigations, Trade Mark Infringement, Trademark Verification, and Good Pilferage. As private investigators, we handle Property Dispute and Asset Verification Investigations, as well as inquiries related to Matrimonial Discord, Extra Marital Affairs, Spouse Fidelity, and Pre Matrimonial Verification. Moreover, we offer Security Manpower and Equipment sourcing, and conduct Security, Investigation, and Intelligence Awareness Training programs as part of our specialized services.


DRASINT RISK ALLIANCE is the sole owner of the published content


DRASInt RISK ALLIANCE is committed to protecting copyright and investigating literary theft claims. Third-party copyright violations will be addressed, and action may be taken. Databases and distributors can create copies for dissemination.

72 views0 comments

Recent Posts

See All

Comentários

Avaliado com 0 de 5 estrelas.
Ainda sem avaliações

Adicione uma avaliação
bottom of page