One topic this newsletter has been obsessed with over the last four years is cloud data centers. Partially because of my previous industry experience, working deeply on cloud-based tech products, partially because these data centers are just fascinating and so crucial to the global digital economy yet so misunderstood, I have always felt the need to write every time something interesting about “the cloud” comes up.

This obsession took an interesting turn when, last week, the AP reported that the Houthis slashed four (not three, as the headline suggested) undersea data center cables buried in the depth of the Red Sea. If true, then the Houthis have just found “the cloud” and realized how much disruption damaging these cables can cause to the global economy, perhaps even more damaging than their attacks on all the ships. 

These four cables, together, carry roughly 25% of all the data traffic that goes through the Red Sea. All the cables under the Red Sea carry roughly 80% of the traffic that goes westward from Asia – which amounts to roughly 15% of all Asia traffic (the rest, presumably, goes eastward under the Pacific). So that is about 3% (0.15 * 0.8 * 0.25) of the entire traffic volume from Asia. This may look like a small number, but considering that the APAC region has 2.6 billion online users, one-third of humanity, this 3% corresponds to roughly 78 million people. Not a small number.

What’s more interesting is the geopolitical implications. Most of the cables that connect all the data centers, which make up “the cloud,” are owned and operated by a consortium of large telecom companies or large tech companies that want their own cloud computing infrastructures (e.g. Amazon, Meta, Microsoft, Google, Alibaba, Tencent, Huawei, etc.) More than 20 countries are, in one way or another, involved in the four damaged undersea cables – TGN-EA, AAE-1, EIG, SEACOM – either directly via state-owned telco’s or indirectly through private companies or investment vehicles within their jurisdiction. 

Let’s take a closer look at who these companies (and countries) are.

Who Owns What?

Below is a list of the consortia behind each of the four damaged cables, sourced from the wonderfully informative website, Submarine Cable Networks.

TGN-EA (Tata Global Network - Eurasia):

  • Tata Communications (India)
  • Bahrain Internet Exchange
  • Ooredoo (Qatar and Oman)
  • Mobily (Saudi Arabia)
  • Etisalat (United Arab Emirates)
  • Telecom Egypt

AAE-1 (Asia-Africa-Europe 1):

  • British Telecom
  • China Unicom
  • Chuan Wei (Cambodia)
  • Djibouti Telecom
  • Etisalat (United Arab Emirates)
  • HKT – PCCW Global (Hong Kong)
  • Mobily (Saudi Arabia)
  • Omantel (Oman)
  • Ooredoo (Qatar)
  • PTCL (Pakistan)
  • Telecom Egypt
  • Telecom Yemen
  • Vittel (France)
  • OTEG (Greece)
  • Reliance Jio (India)
  • Time.com (Malaysia)
  • TOT (Thailand)

EIG (Europe India Gateway):

  • AT&T (US)
  • Bharti Airtel (India)
  • BSNL (India)
  • BT (UK)
  • Djibouti Telecom
  • du (United Arab Emirates)
  • Gibtelecom (UK)
  • Libya International Telecommunications Company
  • MTN (South Africa)
  • Omantel (Oman)
  • Portugal Telecom
  • Saudi Telecom
  • Telecom Egypt
  • Telkom South Africa
  • Verizon (US)
  • Vodafone (UK)

SEACOM:

  • Industrial Promotion Services (Kenya)
  • Remgro (South Africa)
  • Sanlam (South Africa)
  • Convergence Partners (South Africa)
  • Brian Herlihy (CEO of Endeavor Energy)

More than 20 countries involved in four out of more than 15 such cables under the Red Sea – a narrow body of water that has become a single point of failure, not just for global shipping, but also for global data center connectivity.

Let that sink in… (Pun absolutely intended) 

Hong Kong at the Center

It’s not clear yet how these cables were cut. And, so far, the Houthis have not claimed responsibility (or credit) for these damages, though there were signs of their intentions (i.e. in the group’s Telegram chat room) leading up to the cable cutting on Leap Day (February 29).

Amidst all the attacks above and below water still happening in the Red Sea, the only source of reliable information on these data center cable damages comes from a Hong Kong company, HGC Global Communications, a digital infrastructure operator and broadband provider that happens to be at the center of it all.

Through two concise, matter-of-fact statements, HGC shared the extent and significance of the damage, as well as what it did to re-route traffic and keep services online for its customers. The re-routing is quite interesting. Some of the traffic was diverted to the other 11 undamaged cables still under the Red Sea. Some moved eastbound through the US and then to Europe – the long way. And some traffic actually went through Mainland China via land cables to make its way eventually to Europe.

If you are as sensitive as I am about these issues, a traffic diversion through Mainland China may set off some red flags, even though this is obviously a case of trying to fix an “exceptionally rare” emergency situation, not an intentional act of malfeasance. Perhaps aware of this dimension, HGC made a pointed effort in its statement to remind people that it is a company “dedicated to upholding Hong Kong's position as an international telecommunications hub.”

All this simply shows despite the omnipresent “cloud,” made only more powerful by all the AI-focused GPUs going into them, it is a fragile network connected by cables that are vulnerable to their physical surroundings. They can be damaged by natural disasters, like the Taiwan earthquakes in 2006. They can be cut by anchors of large ships, as was the case in 2023, when a Russian fiber optic cable was severed under the Baltic Sea when a Chinese container ship dragged its anchor along the seafloor. Or they can be slashed by a terrorist organization. The Red Sea, being relatively shallow and narrow compared to most other “sea’s”, is especially vulnerable to this “drag and cut” maneuver, whether accidentally or intentionally. 

I’m not predicting a proliferation of sabotage of undersea cloud data center cables – most bodies of water where these cables are installed are far too expansive for these attacks to make sense. But the next time Netflix is down, I would be wondering: are rats chewing off networking cables in Northern Virginia again or is this a terrorist attack?

当胡塞武装发现了“云计算”

《互联》写了四年了,其中一个我一直很专注的话题就是:云计算数据中心。部分原因是由于我之前的业界经验与基于云上的各种软件产品有关,另一部分是因为这些数据中心本身就非常值得研究,且对全球数字经济至关重要,但又被普遍误解。因此每当有关于“云计算”的有趣事件发生,我总会很有动力要写点什么。

这一动力上周又得到了意想不到的发挥。据美联社报道透露了,胡塞武装砍断了红海深处埋藏的四根(不是标题所暗示的三根)海底数据中心电缆。如果消息是真实的,那胡塞武装终于发现了“云计算”,并意识到破坏这些电缆对全球经济造成的扰乱可能比所有攻击的船只更严重。

这四条电缆合起来负载了通过红海的所有数据流量中的25%。红海下的所有电缆大约承载了来自亚洲往西流通的80%的流量 —— 大约占所有亚洲流量的15%(其余的应该是往东流通,经过太平洋)。所以影响到的流量大约是来自亚洲的整体流量的3%(0.15 * 0.8 * 0.25)。看起来是个小数字,但考虑到亚太地区有26亿互联网用户,占全世界总人口的三分之一,这3%相当于大约7800万人,可不是个小数字。

这一事件对地缘政治的含义和影响深远。连接所有数据中心的大多数电缆,构成所谓的“云计算”,都是由一组大型电信公司或需要有自己的云计算基础设施的科技大厂(例如亚马逊、Meta、微软、谷歌、阿里巴巴、腾讯、华为等)所拥有和运营的。在这四条受损的海底电缆中(TGN-EA、AAE-1、EIG、SEACOM),有超过20个国家以某种程度参与其中,不是通过国有电信公司就是通过境内的民营公司或投资基金间接参与。

让我们更仔细地看看这些公司(和国家)都是谁。

谁拥有什么?

以下是来自Submarine Cable Networks,一家云计算电缆信息为主的网站,关于这四条受损电缆背后的各大组织的信息。

TGN-EA(塔塔全球网络 - 欧亚):

  • 塔塔通讯(印度)
  • 巴林互联网交换
  • Ooredoo(卡塔尔和阿曼)
  • Mobily(沙特阿拉伯)
  • Etisalat(阿拉伯联合酋长国)
  • Telecom Egypt(埃及)

AAE-1(亚非欧1号):

  • 英国电信
  • 中国联通
  • Chuan Wei(柬埔寨)
  • 吉布提电信
  • Etisalat(阿拉伯联合酋长国)
  • HKT - PCCW Global(香港)
  • Mobily(沙特阿拉伯)
  • Omantel(阿曼)
  • Ooredoo(卡塔尔)
  • PTCL(巴基斯坦)
  • Telecom Egypt (埃及)
  • 也门电信
  • Vittel(法国)
  • OTEG(希腊)
  • Reliance Jio(印度)
  • Time.com(马来西亚)
  • TOT(泰国)

EIG(欧洲印度门户):

  • AT&T(美国)
  • Bharti Airtel(印度)
  • BSNL(印度)
  • BT(英国)
  • 吉布提电信
  • du(阿拉伯联合酋长国)
  • Gibtelecom(英国)
  • 利比亚国际电信公司
  • MTN(南非)
  • Omantel(阿曼)
  • 葡萄牙电信
  • 沙特电信
  • Telecom Egypt(埃及)
  • Telkom South Africa(南非)
  • Verizon(美国)
  • Vodafone(英国)

SEACOM:

20多个国家参与搭建和运营红海下超过15条此类电缆中的其中四条。这一个狭窄的水体,已不仅成为全球航运的枢纽,还是全球数据中心流通的一个单点要害。这值得我们好好思考它背后的意义。

中心在香港

目前尚不清楚这些电缆到底是怎么被切断的。胡塞武装也尚未宣称对这一损坏负责,尽管在闰日(2月29日)切断电缆前,该恐怖组织的Telegram聊天室中出现了红海海底电缆的地图。

红海上下的各种武力冲突仍在继续,关于这些数据中心电缆损坏的唯一可靠信息来源来自一家香港公司,HGC Global Communications。它是一家数字基础设施运营商和宽带提供商。

通过两份简洁官宣声明,HGC透露了损坏的程度和重要性,以及公司为了重新路由流量和为其客户保持线上服务不被干扰所做的工作。一部分流量被转移到红海下其他11条未受损的电缆。一些流量转向东通过美国,然后到达欧洲。还有一些流量则转向到陆缆通过中国大陆,最终到达欧洲。

如果你像我一样对这些问题比较敏感,把流量转移到中国大陆这一举动可能会敲响一个小警钟,尽管这显然是为了解决一个棘手又极其罕见的紧急情况,而不是故意的恶行。可能意识到这一举动的风险,HGC在其声明中特意提醒大家,它是一家“致力于维护香港作为国际电信枢纽的地位”的公司。

所有这一切只能说明,尽管“云计算”感觉上无处不在,并且因为所有专注于AI的GPU的庞大需求只会变得更加强大,它最终还是一个通过电缆连接的脆弱网络,这些电缆都受到周围环境的影响。它们可能会被自然灾害受损,如2006年台湾大地震。它们可能会被大型船只的锚切断,就像2023年在波罗海下,一条俄罗斯光纤电缆被一艘拖着锚在海底的中国集装箱船切断。或者它们可能会被恐怖组织袭击切断。红海因为与大多数其他海域相比相对浅和窄,所以埋在那里的电缆更容易被损坏,无论是意外还是故意。

我并不是要预测海底云数据中心电缆的破坏行为会开始泛滥,海底电缆的大多数位置面积广阔,想有意攻击切断它们并不容易。但下次Netflix不好用时,我会想:是弗吉尼亚北部的老鼠又在啃网络电缆了,还是这是一次恐怖袭击?