Somewhere beneath the surface of the western Pacific, China’s military has reportedly tested a device built to do one thing: cut the fiber-optic cables that carry nearly all of the world’s transoceanic internet traffic. The test, first described in reporting by The Telegraph in May 2025 and attributed to the People’s Liberation Army Navy, has drawn renewed scrutiny in early 2026 as Western governments reassess the vulnerability of undersea infrastructure. No official confirmation has come from Beijing, and key details about the device remain unverified. But the mere existence of a purpose-built military cable cutter forces a question that engineers and defense planners have long dreaded: how do you protect a network that sits unguarded on the ocean floor?
Why undersea cables matter this much
The global internet feels wireless, but it is not. Roughly 99% of intercontinental data traffic travels through a web of about 600 submarine cables, according to a Congressional Research Service report prepared for U.S. lawmakers. Every bank transfer between New York and London, every video call between Tokyo and Sydney, every classified military message crossing the Atlantic depends on glass fibers thinner than a garden hose, sheathed in steel and polyethylene and laid across thousands of miles of seabed.
These cables are remarkably efficient but physically exposed. TeleGeography, a telecom research firm whose data underpins most industry and government assessments, estimates that approximately 100 cable faults occur worldwide each year. The vast majority result from fishing trawlers dragging nets across cable routes or ships dropping anchor in the wrong place. Repairs require one of fewer than 60 specialized cable ships globally to sail to the break, grapple the damaged segment from the seafloor, and splice in new fiber. Depending on depth, weather, and ship availability, restoration can take anywhere from a few days to several weeks.
What accidental breaks already look like
In early 2024, multiple submarine cables running through the Red Sea were damaged, likely by a commercial vessel dragging its anchor after being struck during Houthi attacks on shipping. The disruptions forced internet traffic serving parts of East Africa, the Middle East, and South Asia onto longer alternative routes, causing slowdowns and partial outages that persisted for weeks. An operations manager for the International Cable Protection Committee confirmed to the Associated Press that dragged anchors remain one of the most common causes of cable faults.
The Red Sea episode was not unique. In late 2023 and 2024, cables and a gas pipeline in the Baltic Sea were severed in incidents that Finnish and Estonian authorities linked to ships suspected of deliberate anchor-dragging, with investigations pointing toward vessels connected to Russia and China. Those cases pushed NATO to launch a dedicated mission, Baltic Sentry, to patrol undersea infrastructure in the region. The pattern is clear: even without a specialized cutting tool, cables are already being damaged in ways that blur the line between accident and sabotage.
What the Chinese test adds
Against that backdrop, reports of a PLA device engineered specifically to sever deep-sea cables represent a qualitative shift. Accidental damage is random and usually affects one cable at a time. A military cutter, deployed deliberately, could target multiple lines at strategic chokepoints, locations where several cables run close together, such as the Luzon Strait between Taiwan and the Philippines, where more than a dozen major cables converge.
No primary documentation from the PLA or any U.S. intelligence assessment has been publicly released describing the cutter’s design, operational depth, or the conditions of its test. The Telegraph’s reporting, based on unnamed defense and intelligence sources, indicates the device was tested in deep water, but independent technical verification has not followed. That gap matters. The difference between “China tested a prototype” and “China can reliably sever hardened cables at depth on command” is enormous, and no open-source evidence currently bridges it.
The strategic logic, however, is not hard to map. In a conflict over Taiwan or in the South China Sea, cutting cables that connect U.S. allies and military installations across the Indo-Pacific could degrade command-and-control networks, disrupt intelligence sharing, and sow confusion among civilian populations simultaneously. Even a temporary communications blackout in the opening hours of a crisis could provide a decisive tactical advantage. Whether the PLA’s device is mature enough to deliver that capability remains an open question.
Gaps in the public record
Several important pieces of this story remain unresolved as of May 2026. No official U.S. government statement has directly addressed the reported Chinese test. The Pentagon and State Department have spoken broadly about undersea infrastructure threats, but neither has publicly confirmed the existence of the specific device described in press reports. Without on-the-record responses from Washington or Beijing, the diplomatic weight of the test is difficult to gauge.
Economic modeling is another blind spot. Industry data on the cost of accidental cable breaks exists, but no publicly available study has attempted to quantify the financial damage from a coordinated, state-sponsored attack on multiple cable routes simultaneously. Questions about how quickly financial markets would recover, how much traffic satellite constellations like Starlink could absorb as backup, and how insurers would price the risk of deliberate sabotage remain largely unanswered.
There is also the question of whether the Chinese device is truly novel. Multiple navies, including those of the United States and Russia, have long maintained deep-sea capabilities that could, in theory, be used to interfere with cables. The U.S. Navy’s submarine fleet and its deep-submergence vehicles have operated near cable infrastructure for decades, though Washington has never publicly acknowledged a cable-cutting capability. What may distinguish the reported Chinese test is not the concept but the apparent willingness to develop and demonstrate a tool purpose-built for the task.
What protection looks like now
Defending undersea cables is difficult by design. The lines span tens of thousands of miles, often lying in international waters where no single nation has jurisdiction. Physical patrols are impractical at scale. Instead, protection has historically relied on a combination of legal frameworks, such as the 1884 Convention for the Protection of Submarine Telegraph Cables, and industry practices like burying cables in shallow coastal waters where they are most vulnerable to anchors and trawls.
Since the Baltic Sea incidents, governments have begun taking more active steps. NATO’s Baltic Sentry mission uses ships, aircraft, and underwater drones to monitor cable routes. The European Union proposed new rules in early 2025 to improve cable route mapping and speed up repair permitting. In the United States, the CRS report flagged the need for greater investment in repair ship capacity and route diversification, but as of spring 2026, no major legislation specifically addressing undersea cable security has been enacted.
The private sector, meanwhile, is building redundancy. Tech giants like Google, Meta, and Microsoft have invested billions in new cable systems over the past five years, adding routes that reduce dependence on any single corridor. Satellite internet providers, led by SpaceX’s Starlink, offer a partial backstop for some traffic, though current satellite capacity is a fraction of what submarine cables carry and cannot substitute for them in high-bandwidth applications like financial trading or cloud computing.
Where the vulnerability persists
For all the new attention, the fundamental math has not changed. A small number of physical chokepoints, the Luzon Strait, the Strait of Malacca, the Red Sea, the English Channel, carry a disproportionate share of global traffic. The repair fleet remains small and unevenly distributed. And the legal tools available to deter or punish deliberate cable sabotage are weak: the 1884 convention predates the internet by more than a century, and enforcement mechanisms are essentially nonexistent.
The reported Chinese cable cutter does not, by itself, transform this picture. Cables were vulnerable before the test, and they will remain vulnerable regardless of whether the device works as described. What the test does is make the threat harder to ignore. For years, undersea cable security was treated as a niche concern, discussed at telecom conferences and in classified briefings but rarely on front pages. The combination of the Baltic Sea incidents, the Red Sea disruptions, and now a reported state-developed cutting tool has pushed the issue into mainstream policy debate.
Whether that debate produces meaningful action, more repair ships, better monitoring, stronger international agreements, tighter cable route planning, will determine how resilient the global internet actually is the next time a cable goes dark. The ocean floor does not care whether the break was caused by a fishing trawler or a military device. The damage is the same. The difference is intent, and intent is what makes the reported Chinese test worth watching closely in the months ahead.
More from Morning Overview
*This article was researched with the help of AI, with human editors creating the final content.