"It doesn't matter how beautiful your idea is, it doesn't matter how smart or important you are. If the idea doesn't agree with reality, it's wrong", Richard Feynman (paraphrased)
Is LEO satellite broadband a cost-effective and capable option for rural areas of Europe? Given that most seem to agree that LEO satellites will not replace mobile broadband networks, it seems only natural to ask whether LEO satellites might help the EU Commission’s Digital Decade Policy Programme (DDPP) 2030 goal of having all EU households (HH) covered by gigabit connections delivered by so-called very high-capacity networks, including gigabit capable fiber-optic and 5G networks, by 2030 (i.e., only focusing on the digital infrastructure pillar of the DDPP).
As of 2023, more than €80 billion had been allocated in national broadband strategies and through EU funding instruments, including the Connecting Europe Facility and the Recovery and Resilience Facility. However, based on current deployment trajectories and cost structures, an additional €120 billion or more is expected to close the remaining connectivity gap from the approximately 15.5 million rural homes without a gigabit option in 2023. This brings the total investment requirement to over €200 billion. The shortfall is most acute in rural and hard-to-reach regions where network deployment is significantly more expensive. In these areas, connecting a single household with high-speed broadband infrastructure, especially via FTTP, can easily exceed €10,000 in public subsidy, given the long distances and low density of premises. It would be a very “cheap” alternative for Europe if a non-EU-based (i.e., USA) satellite constellation could close the gigabit coverage gap even by a small margin. However, given some of the current geopolitical factors, 200 billion euros could enable Europe to establish its own large LEO satellite constellation if it can match (or outperform) the unitary economics of SpaceX, rather than its IRIS² satellite program.
In this article, my analysis focuses on direct-to-dish low Earth orbit (LEO) satellites with expected capabilities comparable to, or exceeding, those projected for SpaceX’s Starlink V3, which is anticipated to deliver up to 1 Terabit per second of total downlink capacity. For such satellites to represent a credible alternative to terrestrial gigabit connectivity, several thousand would need to be in operation. This would allow overlapping coverage areas, increasing effective throughput to household outdoor dishes across sparsely populated regions. Reaching such a scale may take years, even under optimistic deployment scenarios, highlighting the importance of aligning policy timelines with technological maturity.
GIGABITS IN THE EU – WHERE ARE WE, AND WHERE DO WE THINK WE WILL GO?
In 2023, Fibre-to-the-Premises (FTTP) rural HH coverage was ca. 52%. For the EU28, this means that approximately 16 million rural homes lack fiber coverage.
By 2030, projected FTTP deployment in the EU28 will result in household coverage reaching almost 85% of all rural homes (under so-called BaU conditions), leaving approximately 5.5 million households without it.
Due to inferior economics, it is estimated that approximately 10% to 15% of European households are “unconnectable” by FTTP (although not necessarily by FWA or broadband mobile in general).
EC estimated (in 2023) that over 80 billion euros in subsidies have been allocated in national budgets, with an additional 120 billion euros required to close the gigabit ambition gap by 2030 (e.g., over 10,000 euros per remaining rural household in 2023).
So, there is a considerable number of so-called “unconnectable” households within the European Union (i.e., EU28). These are, for example, isolated dwellings away from inhabited areas (e.g., settlements, villages, towns, and cities). They often lack the most basic fixed communications infrastructure, although some may have old copper lines or only relatively poor mobile coverage.
The figure below illustrates the actual state of FTTP deployment in rural households in 2023 (orange bars) as well as a Rural deployment scenario that extends FTTP deployment to 2030, using the maximum of the previous year’s deployment level and the average of the last three years’ deployment levels. Any level above 80% grows by 1% pa (arbitrarily chosen). The data source for the above is “Digital Decade 2024: Broadband Coverage in Europe 2023” by the European Commission. The FTTP pace has been chosen individually for suburban and rural areas to match the expectations expressed in the reports for 2030.
ARE LEO DIRECT-TO-DISH (D2D) SATELLITES A CREDIBLE ALTERNATIVE FOR THE “UNCONNECTABLES”?
For Europe, a non-EU-based (i.e., US-based) satellite constellation could be a very cost-effective alternative to closing the gigabit coverage gap.
Megabit connectivity (e.g., up to 100+ Mbps) is already available today with SpaceX Starlink LEO satellites in rural areas with poor broadband alternatives.
The SpaceX Starlink V2 satellite can provide approximately 100 Gbps (V1.5 ~ 20+ Gbps), and its V3 is expected to deliver 1,000 Gbps within the satellite’s coverage area, with a maximum coverage radius of over 500 km.
The V3 may have 320 beams (or more), each providing approximately ~3 Gbps (i.e., 320 x 3 Gbps is ca. 1 Tbps). With a frequency re-use factor of 40, 25 Gbps can be supplied within a unique coverage area. With “adjacent” satellites (off-nadir), the capacity within a unique coverage area can be enhanced by additional beams that overlap the primary satellite (nadir).
With an estimated EU28 “unconnectable” household density of approximately 1.5 per square kilometer, the LEO satellite constellation would cover more than 20,000 households, each with a capacity of 20 Gbps over an area of 15,000 square kilometers.
At a peak-hour user concurrency of 15% and a per-user demand of 1 Gbps, the backhaul demand would reach 3 terabits per second (Tbps). This means we have an oversubscription ratio of approximately 3:1, which must be met by a single 1 Tbps satellite, or could be served by three overlapping satellites.
This assumes a 100% take-up rate of the unconnectable HHs and that each would select a 1 Gbps service (assuming such would be available). In rural areas, the take-up rate may not be significantly higher than 60%, and not all households will require a 1 Gbps service.
This also assumes that there are no alternatives to LEO satellite direct-to-dish service, which seems unlikely for at least some of the 20,000 “unconnectable” households. Given the typical 5G coverage conditions associated with the frequency spectrum license conditions, one might hope for some decent 5G coverage; alas, it is unlikely to be gigabit in deep rural and isolated areas.
For example, consider the Starlink LEO satellite V1.5, which has a total capacity of approximately 25 Gbps, comprising 32 beams that deliver 800 Mbps per beam, including dual polarization, to a ground-based user dish. It can provide a maximum of 6.4 Gbps over a minimum area of ca. 6,000 km² at nadir with an Earth-based dish directly beneath the satellite. If the coverage area is situated in a UK-based rural area, for example, we would expect to find, on average, 150,000 rural households using an average of 25 rural homes per km². If a household demands 100 Mbps at peak, only 60 households can be online at full load concurrently per area. With 10% concurrency, this implies that we can have a total of 600 households per area out of 150,000 homes. Thus, 1 in 250 households could be allowed to subscribe to a Starlink V1.5 if the target is 100 Mbps per home and a concurrency factor of 10% within the coverage area. This is equivalent to stating that the oversubscription ratio is 250:1, and reflects the tension between available satellite capacity and theoretical rural demand density. In rural UK areas, the beam density is too high relative to capacity to allow universal subscription at 100 Mbps unless more satellites provide overlapping service. For a V1.5 satellite, we can support four regions (i.e., frequency reuse groups), each with a maximum throughput of 6.4 Gbps. Thus, the satellite can support a total of 2,400 households (i.e., 4 x 600) with a peak demand of 100 Mbps and a concurrency rate of 10%. As other satellites (off-nadir) can support the primary satellite, it means that some areas’ demand may be supported by two to three different satellites, providing a multiplier effect that can increase the capacity offered. The Starlink V2 satellite is reportedly capable of supporting up to a total of 100 Gbps (approximately four times that of V1.5), while the V3 will support up to 1 Tbps, which is 40 times that of V1.5. The number of beams and, consequently, the number of independent frequency groups, as well as spectral efficiency, are expected to be improved over V1.5, which are factors that will enhance the overall total capacity of the newer Starlink satellite generations.
By 2030, the EU28 rural areas are expected to achieve nearly 85% FTTP coverage under business-as-usual deployment scenarios. This would leave approximately 5.5 million households, referred to as “unconnectables,” without direct access to high-speed fiber. These households are typically isolated, located in sparsely populated or geographically challenging regions, where the economics of fiber deployment become prohibitively uneconomical. Although there may be alternative broadband options, such as FWA, 5G mobile coverage, or copper, it is unlikely that such “unconnectable” homes would sustainably have a gigabit connection.
This may be where LEO satellite constellations enter the picture as a possible alternative to deploying fiber optic cables in uneconomical areas, such as those that are unconnectable. The anticipated capabilities of Starlink’s third-generation (V3) satellites, offering approximately 1 Tbps of total downlink capacity with advanced beamforming and frequency reuse, already make them a viable candidate for servicing low-density rural areas, assuming reasonable traffic models similar to those of an Internet Service Provider (ISP). With modest overlapping coverage from two or three such satellites, these systems could deliver gigabit-class service to tens of thousands of dispersed households without (much) oversubscription, even assuming relatively high concurrency and usage.
Considering this, there seems little doubt that an LEO constellation, just slightly more capable than SpaceX’s Starlink V3 satellite, appears to be able to fully support the broadband needs of the remaining unconnected European households expected by 2030. This also aligns well with the technical and economic strengths of LEO satellites: they are ideally suited for delivering high-capacity service to regions where population density is too low to justify terrestrial infrastructure, yet digital inclusion remains equally essential.
LOW-EARTH ORBIT SATELLITES DIRECT-TO-DISRUPTION.
I have in my blog “Will LEO Satellite Direct-to-Cell Networks make Terrestrial Networks Obsolete?” I provided some straightforward reasons why the LEO satellite with direct to an unmodified smartphone capabilities (e.g., Lynk Global, AST Spacemobile) would not make existing cellular network obsolete and would be of most value in remote or very rural areas where no cellular coverage would be present (as explained very nicely by Lynk Global) offering a connection alternative to satellite phones such as Iridium, and thus being complementary existing terrestrial cellular networks. Thus, despite the hype, we should not expect a direct disruption to regular terrestrial cellular networks from LEO satellite D2C providers.
Of course, the question could also be asked whether LEO satellites directed to an outdoor (terrestrial) dish could threaten existing fiber optic networks, the business case, and the value proposition. After all, the SpaceX Starlink V3 satellite, not yet operational, is expected to support 1 Terabit per second (Tbps) over a coverage area of several thousand kilometers in diameter. It is no doubt an amazing technological achievement for SpaceX to have achieved a 10x leap in throughput from its present generation V2 (~100 Gbps).
However, while a V3-like satellite may offer an (impressive) total capacity of 1 Tbps, this capacity is not uniformly available across its entire footprint. It is distributed across multiple beams, potentially 256 or more, each with a bandwidth of approximately 4 Gbps (i.e., 1 Tbps / 256 beams). With a frequency reuse factor of, for example, 5, the effective usable capacity per unique coverage area becomes a fraction of the satellite’s total throughput. This means that within any given beam footprint, the satellite can only support a limited number of concurrent users at high bandwidth levels.
As a result, such a satellite cannot support more than roughly a thousand households with concurrent 1 Gbps demand in any single area (or, alternatively, about 10,000 households with 100 Mbps concurrent demand). This level of support would be equivalent to a small FTTP (sub)network serving no more than 20,000 households at a 50% uptake rate (i.e., 10,000 connected homes) and assuming a concurrency of 10%. A deployment of this scale would typically be confined to a localized, dense urban or peri-urban area, rather than the vast rural regions that LEO systems are expected to serve.
In contrast, a single Starlink V3-like satellite would cover a vast region, capable of supporting similar or greater numbers of users, including those in remote, low-density areas that FTTP cannot economically reach. The satellite solution described here is thus not designed to densify urban broadband, but rather to reach rural, remote, and low-density areas where laying fiber is logistically or economically impractical. Therefore, such satellites and conventional large-scale fiber networks are not in direct competition, as they cannot match their density, scale, or cost-efficiency in high-demand areas. Instead, it complements fiber infrastructure by providing connectivity and reinforces the case for hybrid infrastructure strategies, in which fiber serves the dense core, and LEO satellites extend the digital frontier.
However, terrestrial providers must closely monitor their FTTP deployment economics and refrain from extending too far into deep rural areas beyond a certain household density, which is likely to increase over time as satellite capabilities improve. The premise of this blog is that capable LEO satellites by 2030 could serve unconnected households that are unlikely to have any commercial viability for terrestrial fiber and have no other gigabit coverage option. Within the EU28, this represents approximately 5.5 million remote households. A Starlink V3-like 1 Tbps satellite could provide a gigabit service (occasionally) to those households and certainly hundreds of megabits per second per isolated household. Moreover, it is likely that over time, more capable satellites will be launched, with SpaceX being the most likely candidate for such an endeavor if it maintains its current pace of innovation. Such satellites will likely become increasingly interesting for household densities above 2 households per square kilometer. However, suppose an FTTP network has already been deployed. In that case, it seems unlikely that the satellite broadband service would render the terrestrial infrastructure obsolete, as long as it is priced competitively in comparison to the satellite broadband network.
LEO satellite direct-to-dish (D2D) based broadband networks may be a credible and economical alternative to deploying fiber in low-density rural households. The density boundary of viable substitution for a fiber connection with a gigabit satellite D2D connection may shift inward (from deep rural, low-density household areas). This reinforces the case for hybrid infrastructure strategies, in which fiber serves the denser regions and LEO satellites extend the digital frontier to remote and rural areas.
THE USUAL SUSPECT – THE PUN INTENDED.
By 2030,SpaceX’s Starlink will operate one of the world’s most extensive low Earth orbit (LEO) satellite constellations. As of early 2025, the company has launched more than 6,000 satellites into orbit; however, most of these, including V1, V1.5, and V2, are expected to cease operation by 2030. Industry estimates suggest that Starlink could have between 15,000 and 20,000 operational satellites by the end of the decade, which I anticipate to be mainly V3 and possibly a share of V4. This projection depends largely on successfully scaling SpaceX’s Starship launch vehicle, which is designed to deploy up to 60 or more next-generation V3 satellites per mission with the current cadence. However, it is essential to note that while SpaceX has filed applications with the International Telecommunication Union (ITU) and obtained FCC authorization for up to 12,000 satellites, the frequently cited figure of 42,000 satellites includes additional satellites that are currently proposed but not yet fully authorized.
The figure above, based on an idea of John Strand of Strand Consult, provides an illustrative comparison of the rapid innovation and manufacturing cycles of SpaceX LEO satellites versus the slower progression of traditional satellite development and spectrum policy processes, highlighting the growing gap between technological advancement and regulatory adaptation. This is one of the biggest challenges that regulatory institutions and policy regimes face today.
Amazon’s Project Kuiper has a much smaller planned constellation. The Federal Communications Commission (FCC) has authorized Amazon to deploy 3,236 satellites under its initial phase, with a deadline requiring that at least 1,600 be launched and operational by July 2026. Amazon began launching test satellites in 2024 and aims to roll out its service in late 2025 or early 2026. On April 28, 2025, Amazon launched its first 27 operational satellites for Project Kuiper aboard a United Launch Alliance Atlas (ULA) V rocket from Cape Canaveral, Florida. This marks the beginning of Amazon’s deployment of its planned 3,236-satellite constellation aimed at providing global broadband internet coverage. Though Amazon has hinted at potential expansion beyond its authorized count, any Phase 2 remains speculative and unapproved. If such an expansion were pursued and granted, the constellation could eventually grow to 6,000 satellites, although no formal filings have yet been made to support the higher amount.
China is rapidly advancing its low Earth orbit (LEO) satellite capabilities, positioning itself as a formidable competitor to SpaceX’s Starlink by 2030. Two major Chinese LEO satellite programs are at the forefront of this effort: the Guowang (13,000) and Qianfan (15,000) constellations. So, by 2030, it is reasonable to expect that China will field a national LEO satellite broadband system with thousands of operational satellites, focused not just on domestic coverage but also on extending strategic connectivity to Belt and Road Initiative (BRI) countries, as well as regions in Africa, Asia, and South America. Unlike SpaceX’s commercially driven approach, China’s system is likely to be closely integrated with state objectives, combining broadband access with surveillance, positioning, and secure communication functionality. While it remains unclear whether China will match SpaceX’s pace of deployment or technological performance by 2030, its LEO ambitions are unequivocally driven by geopolitical considerations. They will likely shape European spectrum policy and infrastructure resilience planning in the years ahead. Guowang and Qianfan are emblematic of China’s dual-use strategy, which involves developing technologies for both civilian and military applications. This approach is part of China’s broader Military-Civil Fusion policy, which seeks to integrate civilian technological advancements into military capabilities. The dual-use nature of these satellite constellations raises concerns about their potential military applications, including surveillance and communication support for the People’s Liberation Army.
AN ILLUSTRATION OF COVERAGE – UNITED KINGDOM.
It takes approximately 172 Starlink beams to cover the United Kingdom, with 8 to 10 satellites overhead simultaneously. To have a persistent UK coverage in the order of 150 satellite constellations across appropriate orbits. Starlink’s 53° inclination orbital shell is optimized for mid-latitude regions, providing frequent satellite passes and dense, overlapping beam coverage over areas like southern England and central Europe. This results in higher throughput and more consistent connectivity with fewer satellites. In contrast, regions north of 53°N, such as northern England and Scotland, lie outside this optimal zone and depend on higher-inclination shells (70° and 97.6°), which have fewer satellites and wider, less efficient beams. As a result, coverage in these Northern areas is less dense, with lower signal quality and increased latency.
For this blog, I developed a Python script, with fewer than 600 lines of code (It’s a physicist’s code, so unlikely to be super efficient), to simulate and analyze Starlink’s satellite coverage and throughput over the United Kingdom using real orbital data. By integrating satellite propagation, beam modeling, and geographic visualization, it enables a detailed assessment of regional performance from current Starlink deployments across multiple orbital shells. Its primary purpose is to assess how the currently deployed Starlink constellation performs over UK territory by modeling where satellites pass, how their beams are steered, and how often any given area receives coverage. The simulation draws live TLE (Two-Line Element) data from Celestrak, a well-established source for satellite orbital elements. Using the Skyfield library, the code propagates the positions of active Starlink satellites over a 72-hour period, sampling every 5 minutes to track their subpoints across the United Kingdom. There is no limitation on the duration or sampling time. Choosing a more extended simulation period, such as 72 hours, provides a more statistically robust and temporally representative view of satellite coverage by averaging out orbital phasing artifacts and short-term gaps. It ensures that all satellites complete multiple orbits, allowing for more uniform sampling of ground tracks and beam coverage, especially from shells with lower satellite densities, such as the 70° and 97.6° inclinations. This results in smoother, more realistic estimates of average signal density and throughput across the entire region.
Each satellite is classified into one of three orbital shells based on inclination angle: 53°, 70°, and 97.6°. These shells are simulated separately and collectively to understand their individual and combined contributions to UK coverage. The 53° shell dominates service in the southern part of the UK, characterized by its tight orbital band and high satellite density (see the Table below). The 70° shell supplements coverage in northern regions, while the 97.6° polar shell offers sparse but critical high-latitude support, particularly in Scotland and surrounding waters. The simulation assumes several (critical) parameters for each satellite type, including the number of beams per satellite, the average beam radius, and the estimated throughput per beam. These assumptions reflect engineering estimates and publicly available Starlink performance information, but are deliberately simplified to produce regional-level coverage and throughput estimates, rather than user-specific predictions. The simulation does not account for actual user terminal distribution, congestion, or inter-satellite link (ISL) performance, focusing instead on geographic signal and capacity potential.
These parameters were used to infer beam footprints and assign realistic signal density and throughput values across the UK landmass. The satellite type was inferred from its shell (e.g., most 53° shell satellites are currently V1.5), and beam properties were adjusted accordingly.
The table above presents the core beam modeling parameters and satellite-specific assumptions used in the Starlink simulation over the United Kingdom. It includes general values for beam steering behavior, such as Gaussian spread, steering limits, city-targeting probabilities, and beam spacing constraints, as well as performance characteristics tied to specific satellite generations to the extent it is known (e.g., Starlink V1.5, V2 Mini, and V2 Full). These assumptions govern the placement of beams on the Earth’s surface and the capacity each beam can deliver. For instance, the City Exclusion Radius of 0.25 degrees corresponds to a ~25 km buffer around urban centers, where beam placement is probabilistically discouraged. Similarly, the beam radius and throughput per beam values align with known design specifications submitted by SpaceX to the U.S. Federal Communications Commission (FCC), particularly for Starlink’s V1.5 and V2 satellites. The table above also defines overlap rules, specifying the maximum number of beams that can overlap in a region and the maximum number of satellites that can contribute beams to a given point. This helps ensure that simulations reflect realistic network constraints rather than theoretical maxima.
Overall, the developed code offers a geographically and physically grounded simulation of how the existing Starlink network performs over the UK. It helps explain observed disparities in coverage and throughput by visualizing the contribution of each shell and satellite generation. This modeling approach enables planners and researchers to quantify satellite coverage performance at national and regional scales, providing insight into both current service levels and facilitating future constellation evolution, which is not discussed here.
The figure illustrates a 72-hour time-averaged Starlink coverage density over the UK. The asymmetric signal strength pattern reflects the orbital geometry of Starlink’s 53° inclination shell, which concentrates satellite coverage over southern and central England. Northern areas receive less frequent coverage due to fewer satellite passes and reduced beam density at higher latitudes.
This image above presents the Starlink Average Coverage Density over the United Kingdom, a result from a 72-hour simulation using real satellite orbital data from Celestrak. It illustrates the mean signal exposure across the UK, where color intensity reflects the frequency and density of satellite beam illumination at each location.
At the center of the image, a bright yellow core indicating the highest signal strength is clearly visible over the English Midlands, covering cities such as Birmingham, Leicester, and Bristol. The signal strength gradually declines outward in a concentric pattern—from orange to purple—as one moves northward into Scotland, west toward Northern Ireland, or eastward along the English coast. While southern cities, such as London, Southampton, and Plymouth, fall within high-coverage zones, northern cities, including Glasgow and Edinburgh, lie in significantly weaker regions. The decline in signal intensity is especially apparent beyond the 56°N latitude. This pattern is entirely consistent with what we know about the structure of the Starlink satellite constellation. The dominant contributor to coverage in this region is the 53° inclination shell, which contains 3,848 satellites spread across 36 orbital planes. This shell is designed to provide dense, continuous coverage to heavily populated mid-latitude regions, such as the southern United Kingdom, continental Europe, and the continental United States. However, its orbital geometry restricts it to a latitudinal range that ends near 53 to 54°N. As a result, southern and central England benefit from frequent satellite passes and tightly packed overlapping beams, while the northern parts of the UK do not. Particularly, Scotland lies at or beyond the shell’s effective coverage boundary.
The simulation may indicate how Starlink’s design prioritizes population density and market reach. Northern England receives only partial benefit, while Scotland and Northern Ireland fall almost entirely outside the core coverage of the 53° shell. Although some coverage in these areas is provided by higher inclination shells (specifically, the 70° shell with 420 satellites and the 97.6° polar shell with 227 satellites), these are sparser in both the number of satellites and the orbital planes. Their beams may also be broader and less (thus) less focused, resulting in lower average signal strength in high-latitude regions.
So, why is the coverage not textbook nice hexagon cells with uniform coverage across the UK? The simple answer is that real-world satellite constellations don’t behave like the static, idealized diagrams of hexagonal beam tiling often used in textbooks or promotional materials. What you’re seeing in the image is a time-averaged simulation of Starlink’s actual coverage over the UK, reflecting the dynamic and complex nature of low Earth orbit (LEO) systems like Starlink’s. Unlike geostationary satellites, LEO satellites orbit the Earth roughly every 90 minutes and move rapidly across the sky. Each satellite only covers a specific area for a short period before passing out of view over the horizon. This movement causes beam coverage to constantly shift, meaning that any given spot on the ground is covered by different satellites at different times. While individual satellites may emit beams arranged in a roughly hexagonal pattern, these patterns move, rotate, and deform continuously as the satellite passes overhead. The beams also vary in shape and strength depending on their angle relative to the Earth’s surface, becoming elongated and weaker when projected off-nadir, i.e., when the satellite is not directly overhead. Another key reason lies in the structure of Starlink’s orbital configuration. Most of the UK’s coverage comes from satellites in the 53° inclination shell, which is optimized for mid-latitude regions. As a result, southern England receives significantly denser and more frequent coverage than Scotland or Northern Ireland, which are closer to or beyond the edge of this shell’s optimal zone. Satellites serving higher latitudes originate from less densely populated orbital shells at 70° and 97.6°, which result in fewer passes and wider, less efficient beams.
The above heatmap does not illustrate a snapshot of beam locations at a specific time, but rather an averaged representation of how often each part of the UK was covered over a simulation period. This type of averaging smooths out the moment-to-moment beam structure, revealing broader patterns of coverage density instead. That’s why we see a soft gradient from intense yellow in the Midlands, where overlapping beams pass more frequently, to deep purple in northern regions, where passes are less common and less centered.
Illustrates an idealized hexagonal beam coverage footprint over the UK. For visual clarity, only a subset of hexagons is shown filled with signal intensity (yellow core to purple edge), to illustrate a textbook-like uniform tiling. In reality, satellite beams from LEO constellations, such as Starlink, are dynamic, moving, and often non-uniform due to orbital motion, beam steering, and geographic coverage constraints.
The two charts below provide a visual confirmation of the spatial coverage dynamics behind the Starlink signal strength distribution over the United Kingdom. Both are based on a 72-hour simulation using real Starlink satellite data obtained from Celestrak, and they accurately reflect the operational beam footprints and orbital tracks of currently active satellites over the United Kingdom.
This figure illustrates time-averaged Starlink coverage density over the UK with beam footprints (left) and satellite ground tracks (right) by orbital shell. The high density of beams and tracks from the 53° shell over southern UK leads to stronger and more consistent coverage. At the same time, northern regions receive fewer, more widely spaced passes from higher-inclination shells (70° and 97.6°), resulting in lower aggregate signal strength.
The first chart displays the beam footprints (i.e., the left side chart above) of Starlink satellites across the UK, color-coded by orbital shell: cyan for the 53° shell, green for the 70° shell, and magenta for the 97° polar shell. The concentration of cyan beam circles in southern and central England vividly demonstrates the dominance of the 53° shell in this region. These beams are tightly packed and frequent, explaining the high signal coverage in the earlier signal strength heatmap. In contrast, northern England and Scotland are primarily served by green and magenta beams, which are more sparse and cover larger areas — a clear indication of the lower beam density from the higher-inclination shells.
The second chart illustrates the satellite ground tracks (i.e., the right side chart above) over the same period and geographic area. Again, the saturation of cyan lines in the southern UK underscores the intensive pass frequency of satellites in the 53° inclined shell. As one moves north of approximately 53°N, these tracks vanish almost entirely, and only the green (70° shell) and magenta (97° shell) paths remain. These higher inclination tracks cross through Scotland and Northern Ireland, but with less spatial and temporal density, which supports the observed decline in average signal strength in those areas.
Together, these two charts provide spatial and orbital validation of the signal strength results. They confirm that the stronger signal levels seen in southern England stem directly from the concentrated beam targeting and denser satellite presence of the 53° shell. Meanwhile, the higher-latitude regions rely on less saturated shells, resulting in lower signal availability and throughput. This outcome is not theoretical — it reflects the live state of the Starlink constellation today.
The figure illustrates the estimated average Starlink throughput across the United Kingdom over a 72-hour window. Throughput is highest over southern and central England due to dense satellite traffic from the 53° orbital shell, which provides overlapping beam coverage and short revisit times. Northern regions experience reduced throughput from sparser satellite passes and less concentrated beam coverage.
The above chart shows the estimated average throughput of Starlink Direct-2-Dish across the United Kingdom, simulated over 72 hours using real orbital data from Celestrak. The values are expressed in Megabits per second (Mbps) and are presented as a heatmap, where higher throughput regions are shown in yellow and green, and lower values fade into blue and purple. The simulation incorporates actual satellite positions and coverage behavior from the three operational inclination shells currently providing Starlink service to the UK. Consistent with the signal strength, beam footprint density, and orbital track density, the best quality and most supplied capacity are available south of the 53°N inclination.
The strongest throughput is concentrated in a horizontal band stretching from Birmingham through London to the southeast, as well as westward into Bristol and south Wales. In this region, the estimated average throughput peaks at over 3,000 Mbps, which can support more than 30 concurrent customers each demanding 100 Mbps within the coverage area or up to 600 households with an oversubscription rate of 1 to 20. This aligns closely with the signal strength and beam density maps also generated in this simulation and is driven by the dense satellite traffic of the 53° inclination shell. These satellites pass frequently over southern and central England, where their beams overlap tightly and revisit times are short. The availability of multiple beams from different satellites at nearly all times drives up the aggregate throughput experienced at ground level. Throughput falls off sharply beyond approximately 54°N. In Scotland and Northern Ireland, values typically stay well below 1,000 Mbps. This reduction directly reflects the sparser presence of higher-latitude satellites from the 70° and 97.6° shells, which are fewer in number and more widely spaced, resulting in lower revisit frequencies and broader, less concentrated beams. The throughput map thus offers a performance-level confirmation of the underlying orbital dynamics and coverage limitations seen in the satellite and beam footprint charts.
While the above map estimates throughput in realistic terms, it is essential to understand why it does not reflect the theoretical maximum performance implied by Starlink’s physical layer capabilities. For example, a Starlink V1.5 satellite supports eight user downlink channels, each with 250 MHz of bandwidth, which in theory amounts to a total of 2 GHz of spectrum. Similarly, if one assumes 24 beams, each capable of delivering 800 Mbps, that would suggest a satellite capacity in the range of approximately 19–20 Gbps. However, these peak figures assume an ideal case with full spectrum reuse and optimized traffic shaping. In practice, the estimated average throughput shown here is the result of modeling real beam overlap and steering constraints, satellite pass timing, ground coverage limits, and the fact that not all beams are always active or directed toward the same location. Moreover, local beam capacity is shared among users and dynamically managed by the constellation. Therefore, the chart reflects a realistic, time-weighted throughput for a given geographic location, not a per-satellite or per-user maximum. It captures the outcome of many beams intermittently contributing to service across 72 hours, modulated by orbital density and beam placement strategy, rather than theoretical peak link rates.
A valuable next step in advancing the simulation model would be the integration of empirical user experience data across the UK footprint. If datasets such as comprehensive Ookla performance measurements (e.g., Starlink-specific download and upload speeds, latency, and jitter) were available with sufficient geographic granularity, the current Python model could be calibrated and validated against real-world conditions. Such data would enable the adjustment of beam throughput assumptions, satellite visibility estimates, and regional weighting factors to better reflect the actual service quality experienced by users. This would enhance the model’s predictive power, not only in representing average signal and throughput coverage, but also in identifying potential bottlenecks, underserved areas, or mismatches between orbital density and demand.
It is also important to note that this work relies on a set of simplified heuristics for beam steering, which are designed to make the simulation both tractable and transparent. In this model, beams are steered within a fixed angular distance from each satellite’s subpoint, with probabilistic biases against cities and simple exclusion zones (i.e., I operate with an exclusion radius of approximately 25 km or more). However, in reality, Starlink’s beam steering logic is expected to be substantially more advanced, employing dynamic optimization algorithms that account for real-time demand, user terminal locations, traffic load balancing, and satellite-satellite coordination via laser interlinks. Starlink has the crucial (and obvious) operational advantage of knowing exactly where its customers are, allowing it to direct capacity where it is needed most, avoid congestion (to an extent), and dynamically adapt coverage strategies. This level of real-time awareness and adaptive control is not replicated in this analysis, which assumes no knowledge of actual user distribution and treats all geographic areas equally.
As such, the current Python code provides a first-order geographic approximation of Starlink coverage and capacity potential, not a reflection of the full complexity and intelligence of SpaceX’s actual network management. Nonetheless, it offers a valuable structural framework that, if calibrated with empirical data, could evolve into a much more powerful tool for performance prediction and service planning.
Median Starlink download speeds in the United Kingdom, as reported by Ookla, from Q4 2022 to Q4 2024, indicate a general decline through 2023 and early 2024, followed by a slight recovery in late 2024. Source: Ookla.com.
The decline in real-world median user speeds, observed in the chart above, particularly from Q4 2023 to Q3 2024, may reflect increasing congestion and uneven coverage relative to demand, especially in areas outside the dense beam zones of the 53° inclination shell. This trend supports the simulation’s findings: while orbital geometry enables strong average coverage in the southern UK, northern regions rely on less frequent satellite passes from higher-inclination shells, which limits performance. The recovery of the median speed in Q4 2024 could be indicative of new satellite deployments (e.g., more V2 Minis or V2 Fulls) beginning to ease capacity constraints, something future simulation extensions could model by incorporating launch timelines and constellation updates.
Illustrates a European-based dual-use Low Earth Orbit (LEO) satellite constellation providing broadband connectivity to Europe’s millions of unconnectables by 2030 on a secure and strategic infrastructure platform covering Europe, North Africa, and the Middle East.
THE 200 BILLION EUROS QUESTION – IS THERE A PATH TO A EUROPEAN SPACE INDEPENDENCE?
Let’s start with the answer! Yes!
Is €200 billion, the estimated amount required to close the EU28 gigabit gap between 2023 and 2030, likely to enable Europe to build its own LEO satellite constellation and potentially develop one that is more secure, inclusive, and strategically aligned with its values and geopolitical objectives? In comparison, the European Union’s IRIS² (Infrastructure for Resilience, Interconnectivity and Security by Satellite) program has been allocated a total budget of 10+ billion euros aiming at building 264 LEO satellites (1,200 km) and 18 MEO satellites (8,000 km) mainly by the European “Primes” (i.e., the usual “suspects” of legacy defense contractors) by 2030. For that amount, we should even be able to afford our dedicated European stratospheric drone program for real-world use cases, as opposed to, for example, Airbus’s (AALTO) Zephyr fragile platform, which, imo, is more an impressive showcase of an innovative, sustainable (solar-driven) aerial platform than a practical, robust, high-performance communications platform.
A significant portion of this budget should be dedicated to designing, manufacturing, and launching a European-based satellite constellation. If Europe could match the satellite cost price of SpaceX, and not that of IRIS² (which appears to be large based on legacy satellite platform thinking or at least the unit price tag is), it could launch a very substantial number of EU-based LEO satellites within 200 billion euros (also for a lot less obviously). It easily matches the number of SpaceX’s long-term plans and would vastly surpass the satellites authorized under Kuiper’s first phase. To support such a constellation, Europe must invest heavily in launch infrastructure. While Ariane 6 remains in development, it could be leveraged to scale up the Ariane program or develop a reusable European launch system, mirroring and improving upon the capabilities of SpaceX’s Starship. This would reduce long-term launch costs, boost autonomy, and ensure deployment scalability over the decade. Equally essential would be establishing a robust ground segment covering the deployment of a European-wide ground station network, edge nodes, optical interconnects, and satellite laser communication capabilities.
Unlike Starlink, which benefits from SpaceX’s vertical integration, and Kuiper, which is backed by Amazon’s capital and logistics empire, a European initiative would rely heavily on strong multinational coordination. With 200 billion euros, possibly less if the usual suspects (i.e., ” Primes”) are managed accordingly, Europe could close the technology gap rapidly, secure digital sovereignty, and ensure that it is not dependent on foreign providers for critical broadband infrastructure, particularly for rural areas, government services, and defense.
Could this be done by 2030? Doubtful, unless Europe can match SpaceX’s impressive pace of innovation. That is at least to match the 3 years (2015–2018) it took SpaceX to achieve a fully reusable Falcon 9 system and the 4 years (2015–2019) it took to go from concept to the first operational V1 satellite launch. Elon has shown it is possible.
KEY TAKEAWAYS.
LEO satellite direct-to-dish broadband, when strategically deployed in underserved and hard-to-reach areas, should be seen not as a competitor to terrestrial networks but as a strategic complement. It provides a practical, scalable, and cost-effective means to close the final connectivity gap, one that terrestrial networks alone are unlikely to bridge economically. In sparsely populated rural zones, where fiber deployment becomes prohibitively expensive, LEO satellites may render new rollouts obsolete. In these cases, satellite broadband is not just an alternative. It may be essential. Moreover, it can also serve as a resilient backup in areas where rural fiber is already deployed, especially in regions lacking physical network redundancy. Rather than undermining terrestrial infrastructure, LEO extends its reach, reinforcing the case for hybrid connectivity models central to achieving EU-wide digital reach by 2030.
Instead of continuing to subsidize costly last-mile fiber in uneconomical areas, European policy should reallocate a portion of this funding toward the development of a sovereign European Low-Earth Orbit (LEO) satellite constellation. A mere 200 billion euros, or even less, would go a very long way in securing such a program. Such an investment would not only connect the remaining “unconnectables” more efficiently but also strengthen Europe’s digital sovereignty, infrastructure resilience, and strategic autonomy. A European LEO system should support dual-use applications, serving both civilian broadband access and the European defense architecture, thereby enhancing secure communications, redundancy, and situational awareness in remote regions. In a hybrid connectivity model, satellite broadband plays a dual role: as a primary solution in hard-to-reach zones and as a high-availability backup where terrestrial access exists, reinforcing a layered, future-proof infrastructure aligned with the EU’s 2030 Digital Decade objectives and evolving security imperatives.
Non-European dependence poses strategic trade-offs: The rise of LEO broadband providers, SpaceX, and China’s state-aligned Guowang and Qianfan, underscores Europe’s limited indigenous capacity in the Low Earth Orbit (LEO) space. While non-EU options may offer faster and cheaper rural connectivity, reliance on foreign infrastructure raises concerns about sovereignty, data governance, and security, especially amid growing geopolitical tensions.
LEO satellites, especially those similar or more capable than Starlink V3, can technically support the connectivity needs of Europe’s 2030s “unconnectable” (rural) households. Due to geography or economic constraints, these homes are unlikely to be reached by FTTP even under the most ambitious business-as-usual scenarios. A constellation of high-capacity satellites could serve these households with gigabit-class connections, especially when factoring in user concurrency and reasonable uptake rates.
The economics of FTTP deployment sharply deteriorate in very low-density rural regions, reinforcing the need for alternative technologies. By 2030, up to 5.5 million EU28 households are projected to remain beyond the economic viability of FTTP, down from 15.5 million rural homes in 2023. The European Commission has estimated that closing the gigabit gap from 2023 to 2030 requires around €200 billion. LEO satellite broadband may be a more cost-effective alternative, particularly with direct-to-dish architecture, at least for the share of unconnectable homes.
While LEO satellite networks offer transformative potential for deep rural coverage, they do not pose a threat to existing FTTP deployments. A Starlink V3 satellite, despite its 1 Tbps capacity, can serve the equivalent of a small fiber network, about 1,000 homes at 1 Gbps under full concurrency, or roughly 20,000 homes with 50% uptake and 10% busy-hour concurrency. FTTP remains significantly more efficient and scalable in denser areas. Satellites are not designed to compete with fiber in urban or suburban regions, but rather to complement it in places where fiber is uneconomical or otherwise unviable.
The technical attributes of LEO satellites make them ideally suited for sparse, low-density environments. Their broad coverage area and increasingly sophisticated beamforming and frequency reuse capabilities allow them to efficiently serve isolated dwellings, often spread across tens of thousands of square kilometers, where trenching fiber would be infeasible. These technologies extend the digital frontier rather than replace terrestrial infrastructure. Even with SpaceX’s innovative pace, it seems unlikely that this conclusion will change substantially within the next five years, at the very least.
A European LEO constellation could be feasible within a € 200 billion budget: The €200 billion gap identified for full gigabit coverage could, in theory, fund a sovereign European LEO system capable of servicing the “unconnectables.” If Europe adopts leaner, vertically integrated innovation models like SpaceX (and avoids legacy procurement inefficiencies), such a constellation could deliver comparable technical performance while bolstering strategic autonomy.
The future of broadband infrastructure in Europe lies in a hybrid strategy. Fiber and mobile networks should continue to serve densely populated areas, while LEO satellites, potentially supplemented by fixed wireless and 5G, offer a viable path to universal coverage. By 2030, a satellite constellation only slightly more capable than Starlink V3 could deliver broadband to virtually all of Europe’s remaining unconnected homes, without undermining the business case for large-scale FTTP networks already in place.
CAUTIONARY NOTE.
While current assessments suggest that a LEO satellite constellation with capabilities on par with or slightly exceeding those anticipated for Starlink V3 could viably serve Europe’s remaining unconnected households by 2030, it is important to acknowledge the speculative nature of these projections. The assumptions are based on publicly available data and technical disclosures. Still, it is challenging to have complete visibility into the precise specifications, performance benchmarks, or deployment strategies of SpaceX’s Starlink satellites, particularly the V3 generation, or, for that matter, Amazon’s Project Kuiper constellation. Much of what is known comes from regulatory filings (e.g., FCC), industry reports and blogs, Reddit, and similar platforms, as well as inferred capabilities. Therefore, while the conclusions drawn here are grounded in credible estimates and modeling, they should be viewed with caution until more comprehensive and independently validated performance data become available.
THE SATELLITE’S SPECS – MOST IS KEPT A “SECRET”, BUT THERE IS SOME LIGHT.
Satellite capacity is not determined by a single metric, but instead emerges from a tightly coupled set of design parameters. Variables such as spectral efficiency, channel bandwidth, polarization, beam count, and reuse factor are interdependent. Knowing a few of them allows us to estimate, bound, or verify others. This is especially valuable when analyzing or validating constellation design, performance targets, or regulatory filings.
For example, consider a satellite that uses 250 MHz channels with 2 polarizations and a spectral efficiency of 5.0 bps/Hz. These inputs directly imply a channel capacity of 1.25 Gbps and a beam capacity of 2.5 Gbps. If the satellite is intended to deliver 100 Gbps of total throughput, as disclosed in related FCC filings, one can immediately deduce that 40 beams are required. If, instead, the satellite’s reuse architecture defines 8 x 250 MHz channels per reuse group with a reuse factor of 5, and each reuse group spans a fixed coverage area. Both the theoretical and practical throughput within that area can be computed, further enabling the estimation of the total number of beams, the required spectrum, and the likely user experience. These dependencies mean that if the number of user channels, full bandwidth, channel bandwidth, number of beams, or frequency reuse factor is known, it becomes possible to estimate or cross-validate the others. This helps identify design consistency or highlight unrealistic assumptions.
In satellite systems like Starlink, the total available spectrum is limited. This is typically divided into discrete channels, for example, eight 250 MHz channels (as is the case for Starlink’s Ku-band downlink to the user’s terrestrial dish). A key architectural advantage of spot-beam satellites (e.g., with spots that are at least 50 to 80 km wide) is that frequency channels can be reused in multiple spatially separated beams, as long as the beams do not interfere with one another. This is not based on a fixed reuse factor, as seen in terrestrial cellular systems, but on beam isolation, achieved through careful beam shaping, angular separation, and sidelobe control (as also implemented in the above Python code for UK Starlink satellite coverage, albeit in much simpler ways). For instance, one beam covering southern England can use the same frequency channels as another beam covering northern Scotland, because their energy patterns do not overlap significantly at ground level. In a constellation like Starlink’s, where hundreds or even thousands of beams are formed across a satellite footprint, frequency reuse is achieved through simultaneous but non-overlapping spatial beam coverage. The reuse logic is handled dynamically on board or through ground-based scheduling, based on real-time traffic load and beam geometry.
This means that for a given satellite, the total instantaneous throughput is not only a function of spectral efficiency and bandwidth per beam, but also of the number of beams that can simultaneously operate on overlapping frequencies without causing harmful interference. If a satellite has access to 2 GHz of bandwidth and 250 MHz channels, then up to 8 distinct channels can be formed. These channels can be replicated across different beams, allowing many more than 8 beams to be active concurrently, each using one of those 8 channels, as long as they are separated enough in space. This approach allows operators to scale capacity dramatically through dense spatial reuse, rather than relying solely on expanding spectrum allocations. The ability to reuse channels across beams depends on antenna performance, beamwidth, power control, and orbital geometry, rather than a fixed reuse pattern. The same set of channels is reused across non-interfering coverage zones enabled by directional spot beams. Satellite beams can be “stacked on top of each other” up to the number of available channels, or they can be allocated optimally across a coverage area determined by user demand.
Although detailed specifications of commercial satellites, whether in operation or in the planning phase, are usually not publicly disclosed. However, companies are required to submit technical filings to the U.S. Federal Communications Commission (FCC). These filings include orbital parameters, frequency bands in use, EIRP, and antenna gain contours, as well as estimated capabilities of the satellite and user terminals. The FCC’s approval of SpaceX’s Gen2 constellation, for instance, outlines many of these values and provides a foundation upon which informed estimates of system behavior and performance can be made. The filings are not exhaustive and may omit sensitive performance data, but they serve as authoritative references for bounding what is technically feasible or likely in deployment.
ACKNOWLEDGEMENT.
I would like to acknowledge my wife, Eva Varadi, for her unwavering support, patience, and understanding throughout the creative process of writing this article.
NOTE: My “Satellite Coverage Concept Model,” which I have applied to Starlink Direct-2-Dish coverage and Services in the United Kingdom, is not limited to the UK alone but can be straightforwardly generalized to other countries and areas.
The securitization of the Arctic involves key players such as Greenland (The Polar Bear), Denmark, the USA (The Eagle), Russia (The Brown Bear), and China (The Red Dragon), each with strategic interests in the region. Greenland’s location and resources make it central to geopolitical competition, with Denmark ensuring its sovereignty and security. Greenland’s primary allies are Denmark, the USA, and NATO member countries, which support its security and sovereignty. Unfriendly actors assessed to be potential threats include Russia, due to its military expansion in the Arctic, and China, due to its strategic economic ambitions and influence in the region. The primary threats to Greenland include military tensions, sovereignty challenges, environmental risks, resource exploitation, and economic dependence. Addressing these threats requires a balanced, cooperative approach to ensure regional stability and sustainability.
Cold winds cut like knives, Mountains rise in solitude, Life persists in ice. (Aqqaluk Lynge, “Harsh Embrace” ).
I have been designing, planning, building, and operating telecommunications networks across diverse environmental conditions, ranging from varied geographies to extreme climates. I sort of told myself that I most likely had seen it all. However (and luckily), the more I consider the complexities involved in establishing robust and highly reliable communication networks in Greenland, the more I realize the uniqueness and often extreme challenges involved with building & maintaining communications infrastructures there. The Greenlandic telecommunications incumbent Tusass has successfully built a resilient and dependable transport network that connects nearly every settlement in Greenland, no matter how small. They manage and maintain this network amidst some of the most severe environmental conditions on the planet. The staff of Tusass is fully committed to ensuring connectivity for these remote communities, recognizing that any service disruption can have severe repercussions for those living there.
As an independent board member of Tusass Greenland since 2022, I have witnessed Tusass’s dedication, passion, and understanding of the importance of improving and maintaining their network and connections for the well-being of all Greenlandic communities. To be clear, the opinions I express in this post are solely my own and do not necessarily reflect the views or opinions of Tusass. I believe that my opinions have been shaped by my Tusass and Greenlandic experience, by working closely with Tusass as an independent board member, and by a deep respect for Tusass and its employees. All information that I am using in this post is publicly available through annual reports (of Tusass) or, in general, publicly available on the internet.
Figure 1 Illustrating a coastal telecommunications site supporting the microwave long-haul transport network of Tusass up along the Greenlandic west coast. Courtesy: Tusass A/S (Greenland).
Greenland’s strategic location, its natural resources, environmental significance, and broader geopolitical context make it geopolitically a critical country. Thus, protecting and investing in Greenland’s critical infrastructure is obviously important. Not only from a national and geopolitical security perspective but also with respect to the economic development and stability of Greenland and the Arctic region. If a butterfly’s movements can cause a hurricane, imagine what an angry “polar bear” will do to the global weather and climate. The melting ice caps are enabling new shipping routes and making natural resources much more accessible, and they may also raise the stakes for regional security. For example, with China’s Polar Silk Road initiative where, China seeks to establish (or at least claim) a foothold in the Arctic in order to increase its trade routes and access to resources. This is also reflected in their 2018 declaration stating that China sees itself as a “Near-Arctic State” and concludes that China is one of the continental states that are closest to the Arctic Circle. Russia, which is a real neighboring country to the Arctic region and Circle, has also increased its military presence and economic activities in the Arctic. Recently, Russia has made claims in the Arctic to areas that overlap with what Denmark and Canada see as their natural territories, aiming to secure its northern borders and exploit the region’s resources. Russia has also added new military bases and has conducted large-scale maneuvers along its own Arctic coastline. The potential threats from increased Russian and Chinese Arctic activities pose significant security concerns. Identifying and articulating possible threat scenarios to the Arctic region involving potential hostile actors may indeed justify extraordinary measures and also highlight the need for urgent and substantial investments in and attention to Greenland’s critical infrastructure.
In this article, I focus very much on what key technologies should be considered, why specific technologies should be considered, and how those technologies could be implemented in a larger overarching security and defense architecture driving towards enhancing the safety and security of Greenland:
Leapfrog Quality of Critical Infrastructure: Strengthening the existing critical communications infrastructure should be a priority. With Tusass, this is the case in terms of increasing the existing transport network’s reliability and availability by adding new submarine cables and satellite backbone services and the associated satellite infrastructure. However, the backbone of the Tusass economy is a population of 57 thousand. The investments required to quantum leap the robustness of the existing critical infrastructure, as well as deploying many of the technologies discussed in this post, will not have a positive business case or a reasonable return on investment within a short period (e.g., a couple of years) if approached in the way that is the standard practice for most private corporations around the worlds. External subsidies will be required. The benefit evaluation would need to be considered over the long term, more in line with big public infrastructure projects. Most of these critical infrastructure and technology investments discussed are based on particular geopolitical assumptions and serve as risk-mitigating measures with substantial civil upside if we maintain a dual-use philosophy as a boundary condition for those investments. Overall I believe that a positive case might be made from the perspective of the possible loss of not making them rather than a typical gain or growth case expected if an investment is made.
Smart Infrastructure Development: Focus on building smart infrastructure, integrating sensor networks (e.g., DAS on submarine cables), and AI-driven automation for critical systems like communication networks, transportation, and energy management to improve resilience and operational efficiency. As discussed in this post, Tusass already has a strong communications network that should underpin any work on enhancing the Greenlandic defense architecture. Moreover, Tusass are experts in building and operating critical communications infrastructures in the Arctic. This is critical know-how that should be heavily relied upon in what has to come.
Automated Surveillance and Monitoring Systems: Invest in advanced automated surveillance technologies, such as aquatic and aerial drones, satellite-based monitoring (SIGINT and IMINT), and IoT sensors, to enhance real-time monitoring and protection of Greenland.
Autonomous Defense Systems: Deploy autonomous systems, including unmanned aerial vehicles (UAVs) and unmanned underwater vehicles (UUVs), to strengthen defense capabilities and ensure rapid response to potential threats in the Arctic region. These systems should be the backbone of ad-hoc private network deployments serving both defense and civilian use cases.
Cybersecurity and AI Integration: Implement robust cybersecurity measures and integrate artificial intelligence to protect critical infrastructure and ensure secure, reliable communication networks supporting both military and civilian applications in Greenland.
Dual-Use Infrastructure: Prioritize investments in infrastructure solutions that can serve both military and civilian purposes, such as communication networks and transportation facilities, to maximize benefits and resilience.
Local Economic and Social Benefits: Ensure that defense investments support local economic development by creating new job opportunities and improving essential services in Greenland.
I believe that Greenland needs to build a solid Greenlandic-centered know-how on a foundational level around autonomous and automated systems. In order to get there Greenland will need close and strong alliances that is aligned with the aim of achieving a greater degree of independence through clever use of the latest technologies available. Such local expertise will be essential in order to reduce the dependency on external support (e.g., from Denmark and Allies) and ensure that they can maintain operational capabilities independently, particularly during a security crisis. Automation, enabled by digitization and AI-enabled system architectures, would be key to managing and monitoring Greenland’s remote and inaccessible geography and resources efficiently and securely, minimizing the need for extensive human intervention. Leveraging autonomous defense and surveillance technologies and stepping up in digital maturity is an important path to compensating for Greenland’s small population. Additionally, implementing robust, with respect to hardware AND software, automated systems will allow Greenland to protect and maintain its critical infrastructure and services, mitigating the risks associated with (too much) reliance on Denmark or allies during a time of crisis where such resources may be scarce or impractical to timely move to Greenland.
Figure 2 A view from Tusass HQ over Nuuk, Greenland. Courtesy: Tusass A/S (Greenland).
GREENLAND – A CONCISE INTRODUCTION.
Greenland, or Kalaallit Nunaat as it is called in Greenlandic, has a surface area of about 2.2 million square kilometers with ca. 80% covered by ice and is the world’s largest island. It is an autonomous territory of Denmark with a population of approximately 57 thousand. Its surface area is comparable to that of Alaska (1.7 million km2) or Saudi Arabia (2.2 million km2). It is predominantly covered by ice, with a population scattered in smaller settlements along the western coastlines where the climate is milder and more hospitable. Greenland’s extensive coastline measures ca. 44 thousand kilometers and is one of the most remote and sparsely populated coastlines in the world. This remoteness contrasts with more densely populated and developed coastlines like the United States. The remoteness of Greenland’s coastline is further emphasized by a lack of civil infrastructure. There are no connecting roads between settlements, and most (if not all) travel between communities relies on maritime or air transport.
Greenland’s coastline presents several unique security challenges due to its particularities, such as its vast length, rugged terrain, harsh climate, and limited population. These factors make Greenland challenging to monitor and protect effectively, which is critical for several reasons:
The vast and inaccessible terrain.
Harsh climate and weather conditions.
Sparse population and limited infrastructure.
Maritime and resource security challenges.
Communications technology challenges.
Geopolitical significance.
The capital and largest city is Nuuk, located on the southwestern coast. With a population of approximately 18+ thousand or 30+% of the total, Nuuk is Greenland’s administrative and economic center, offering modern amenities and serving as the hub for the island’s limited transportation network. Sisimiut, north of Nuuk on the western coast. It is the second-largest town in Greenland, with a population of around 5,500+. Sisimiut is known for its fishing industry and serves as a base for much of the Greenlandic tourism and outdoor activities.
On the remote and inhospitable eastern coast, Tasiilaq is the largest town in the Ammassalik area, with a population of little less than 2,000. It is relatively isolated compared to the western settlements and is known for its breathtaking natural scenery and opportunities for adventure tourism (check out https://visitgreenland.com/ for much more information). In the far north, on the west coast, we have Qaanaaq (also known as Thule), which is one of the world’s most northern towns, with a population of ca. 600. Located near Qaanaaq, is the so-called Pituffik Space Base which is the United States’ northernmost military base, established in 1951, and a key component of NATO’s early warning and missile defense systems. The USA have had a military presence in Greenland since the early days of the World War II and strengthened during the Cold War. It also plays an important role in monitoring Arctic airspace and supporting the region’s avionics operations.
As of 2023, Greenland has approximately 56 inhabited settlements. I am using the word “settlement” as an all-inclusive covering communities with a population of 10s of thousands (Nuuk) down to 100s or lower. With few exceptions, there are no settlements with connecting roads or any other overland transportation connections with other settlements. All person- and goods transportation between the different settlements is taken by plane or helicopter (provided by Air Greenland) or seaborne transportation (e.g., Royal Artic Line, RAL).
Greenland is rich in natural resources. Apart from water (for hydropower), this includes significant mining, oil, and gas reserves. These natural resources are largely untapped and present substantial opportunities for economic development (and temptation for friendly as well as unfriendly actors). Greenland is believed to have one of the world’s largest deposits of rare earth elements (although by far not comparable to China), extremely valuable as an alternative to the reliance of China and critical for various high-tech applications, including electronics (e.g., your smartphone), renewable energy technologies (e.g., wind turbines and EVs), and defense systems. Graphite and platinum are also present in Greenland and are important in many industrial processes. Some estimates indicate that northeast Greenland’s waters could hold large reserves of (yet) undiscovered oil and gas reserves. Other areas are likewise believed to contain substantial hydrocarbon reserves. However, Greenland’s arctic environment presents severe exploration and extraction challenges, such as extreme cold, ice cover, and remoteness, that so far has made it also very costly and complicated to extraxt its natural resources. With the global warming the economical and practical barrier for exploitation is contineously reducing.
FROM STRATEGIC OUTPOST TO ARCTIC STRONGHOLD: THE EVOLVING SECURITY SIGNIFICANCE OF GREENLAND.
Figure 3 illustrates Greenland’s reliance on and the importance of critical communications infrastructure connecting local communities as well as bridging the rest of the world and the internet. Courtesy: DALL-E.
From a security perspective Greenland has evolved significantly since the Second World War. During World War II, its importance was primarily based on its location as a midway point between North America and Europe serving as a refueling and weather station for allied aircrafts crossing the Atlantic to and from Europe. Additionally, its remote geographical location combined with its harsh climate provided a “safe haven” for monitoring and early warning installations.
During the Cold War era, Greenland’s importance grew (again) due to its proximity to the Soviet Union (and Russia today). Greenland became a key site for early warning radar systems and an integral part of the North American Aerospace Defense Command (NORAD) network designed to detect Soviet bombers and missiles heading toward North America. In 1951, the USA-controlled Thule Air Base, today it is called Pituffik Space Base, located in northwest Greenland, was constructed with the purpose of hosting long-range bombers and providing an advanced point (from a USA perspective) for early warning and missile defense systems.
As global tensions eased in the post-Cold War period, Greenland’s strategic status diminished somewhat. However, its status is now changing again due to Russia’s increased aggression in Europe (and geopolitically) and a more assertive China with expressed interest in the Arctic. The arctic ice is melting due to climate change and has resulted in new maritime routes being possible, such as the Northern Sea Route. Also, making Arctic resources more accessible. Thus, we now observe an increased interest from global powers in the Arctic region. And as was the case during the cold-War period (maybe with much higher stakes), Greenland has become strategically critical for monitoring and controlling these emerging routes, and the Arctic in general. Particularly with the observed increased activity and interest from Russia and China.
Greenland’s position in the North Atlantic, bridging the gap between North America and Europe, has become a crucial spot for monitoring and controlling the transatlantic routes. Greenland is part of the so-called Greenland-Iceland-UK (GIUK) Gap. This gap is a critical “chokepoint” for controlling naval and submarine operations, as was evident during the Second World War (e.g., read up on the Battle of the Atlantic). Controlling the Gap increases the security of maritime and air traffic between the continents. Thus, Greenland has again become a key component in defense strategies and threat scenarios envisioned and studied by NATO (and the USA).
GREENLANDS GEOPOLITICAL ROLE.
Greenland’s recent significance in the Arctic should not be underestimated. It arises, in particular, from climate change and, as a result, melting ice caps that have and will enable new shipping routes and potential (easier) access to Greenland’s untapped natural resources.
Greenland hosts critical military and surveillance assets, including early warning radar installations as well as air & naval bases. These defense assets actively contributes to global security and is integral to NATO’s missile defense and early warning systems. They provide data for monitoring potential missile threats and other aerial activities in the North Atlantic and Arctic regions. Greenland’s air and naval bases also support specialized military operations, providing logistical hubs for allied forces operating in the Arctic and North Atlantic.
From a security perspective, Greenland’s control is not only about monitoring and defense. It is also about deterring potential threats from potential hostile actors. It allows for effective monitoring and defense of the Arctic and North Atlantic regions. Enabling the detection and tracking of submarines, ships, and aircraft. Such capabilities enhance situational awareness and operational readiness, but more importantly, it sends a message to potential adversaries (e.g., maybe unaware, as unlikely as it may be, about the deficiencies of Danish Arctic patrol ships). The ability to project power and maintain a military presence in this area is necessary for deterring potential adversaries and protecting he critical communications infrastructure (e.g., submarine cables), maritime routes, and airspace.
The strategic location of Greenland is key to contribute to the global security dynamics. Ensuring Greenland’s security and stability is essential for also maintaining control over critical transatlantic routes, monitoring Arctic activities, and protecting against potential threats from hostile actors. Making Greenland a cornerstone of the defense infrastructure and an essential area for geopolitical strategy in the North Atlantic and Arctic regions.
INFRASTRUCTURE RECOMMENDATIONS.
Recent research has focused on Greenland in the context of Arctic security (see “Greenland in Arctic Security: (De)securitization Dynamics under Climatic Thaw and Geopolitical Freeze” by M. Jacobsen et al.). The work emphasizes the importance of maintaining and enhancing surveillance and early warning systems. Greenland is advised to invest in advanced radar systems and satellite monitoring capabilities. These systems are relevant for detecting potential threats and providing timely information, ensuring national and regional security. I should point to the following traditional academic use of the word “securitization,” particularly from the Copenhagen School, which refers to framing an issue as an existential threat requiring extraordinary measures. Thus, securitization is the process by which topics are framed as matters of security that should be addressed with urgency and exeptional measures.
The research work furthermore underscores the Greenlandic need for additional strategic infrastructure development, such as enhancing or building new airport facilities and the associated infrastructure. This would for example include expanding and upgrading existing airports to improve connectivity within Greenland and with external partners (e.g., as is happening with the new airport in Nuuk). Such developments would also support economic activities, emergency response, and defense operations. Thus, it combines civic and military applications in what could be defined as dual-purpose infrastructure programs.
The above-mentioned research argues for the need to develop advanced communication systems, Signals Intelligence (SIGINT), and Image Intelligence (IMINT) gathering technologies based on satellite- and aerial-based platforms. These wide-area coverage platforms are critical to Greenland due to its vast and remote areas, where traditional communication networks may be insufficient or impractical. Satellite communication systems such as GEO, MEO, and LEO (and combinations thereof), and stratospheric high-altitude platform systems (HAPS) are relevant for maintaining robust surveillance, facilitating rapid emergency response, and ensuring effective coordination of security as well as search & rescue operations.
Expanding broadband internet access across Greenland is also a key recommendation (that is already in progress today). This involves improving the availability and reliability of communications-related connectivity by additional submarine cables and by new satellite internet services, ensuring that even the most remote communities have reliable broadband internet connectivity. All communities need to have access to broadband internet, be connected, enable economic development, improve quality of life in general, and integrate remote areas into the national and global networks. These communication infrastructure improvements are important for civilian and military purposes, ensuring that Greenland can effectively manage its security challenges and leverage new economic opportunities for its communities. It is my personal opinion that most communities or settlements are connected to the wider internet, and the priority should be to improve the redundancy, availability, and reliability of the existing critical communications infrastructure. With that also comes more quality in the form of higher internet speeds.
The applicability of at least some of the specific securitization recommendations for Greenland, as outlined in Marc Jacobsen’s “Greenland in Arctic Security: (De)securitization Dynamics Under Climatic Thaw and Geopolitical Freeze,” may be somewhat impractical given the unique characteristics of Greenland with its vast area and very small population. Quite a few recommendations (in my opinion), even if in place “today or tomorrow,” would require a critical scale of expertise, human, and industrial capital that Greenland does not have available on its own (and also is unlikely to have in the future). Thus, some of the recommendations depend on such resources to be delivered from outside Greenland, posing inherent availability risks to provide in a crisis (assuming that such capacity would even be available under normal circumstances). This dependency on external actors, particularly Danish and International investors, complicates Greenland’s ability to independently implement policies recommended by the securitization framework. It could lead to conflicts between local priorities and the interests of external stakeholders, particularly in a time of a clear and present security crisis (e.g., Russia attempting to expand west above and beyond Ukraine).
Also, as a result of Greenland’s small population there will be a limited pool of available local personnel with the needed skills to draw upon for implementing and maintaining many of the recommendations in “Greenland in Arctic Security: (De)securitization Dynamics under Climatic Thaw and Geopolitical Freeze”. Training and deploying enough high-tech skilled individuals to cover Greenland’s vast territory and technology needs is a very complex challenge given the limited human resources and challenges in getting external high-tech resouces to Greenland.
I believe Greenland should focus on establishing a comprehensive security strategy that minimizes its dependency on its natural allies and external actors in general. The dual-use approach should be integral to such a security strategy, where technology investments serve civil and defense purposes whenever possible. This approach ensures that Greenlandic society benefits directly from investments in building a robust security framework. I will come back to the various technologies that may be relevant in achieving more independence and less reliance on the external actors that are so prevalent in Greenland today.
HOW CRITICAL IS CRITICAL INFRASTRUCTURE TO GREENLAND
Communications infrastructure is seen as critical in Greenland. It has to provide a reliable and good quality service despite Greenland having some of the most unfavorable environmental conditions in which to build and operate communications networks. Greenland is characterized by vast distances between relatively small, isolated communities. Thus, this makes effective communication essential for bridging those gaps, allowing people to stay connected with each other and as well as the outside world irrespective of weather or geography. The lack of a comprehensive road network and reliance on sea and air travel further emphasize the importance of reliable and available telecommunications services, ensuring timely communication and coordination across the country.
Telecommunications infrastructure is a cornerstone of economic development in Greenland (as it has been elsewhere). It is about efficient internet and telephony services and its role in business operations, e-commerce activities, and international market connections. These aspects are important for the economic growth, education, and diversification of the many Greenlandic communities. The burgeoning tourism industry will also depend on (maybe even demand) robust communication networks to serve those tourists, ensure their safety in remote areas, and promote tourism activities in general. This illustrates very firmly that the communications infrastructure is critical (should there be any doubts).
Telecommunications infrastructure also enables distance learning in education and health services, providing people in remote areas with access to high-quality education that otherwise would not be possible (e.g., Coursera, Udemy Academy, …). Telemedicine has obvious benefits for healthcare services that are often limited in remote regions. It allows residents to receive remote medical consultations and services (e.g., by video conferencing) without the need for long-distance and time-consuming travels that often may aggravate a patient’s condition. Emergency response and public safety are other critical areas in which our communications infrastructure plays a crucial role. Greenland’s harsh and unpredictable weather can lead to severe storms, avalanches, and ice-related incidents. It is therefore important to have a reliable communication network that allows for timely warnings, supporting rescue operations & coordination, and public safety. Moreover, maritime safety also depends on a robust communication infrastructure, enabling reliable communication between ships and coastal stations.
A strong communication network can significantly enhance social connectivity, and help maintaining social ties, such as among families and communities across Greenland. Thus reduce the feeling of isolation. Supporting social cohesion in communities as well as between settlements. Telecommunications can also facilitate sharing and preserving the Greenlandic culture and language through digital media (e.g., Tusass Music), online platforms, and social networks (e.g., Facebook used by ca. 85% of the eligible population, that number is ca. 67% in Denmark).
For a government and its administration, maintaining effective and reliable communication is essential for well-functioning public services and its administration. It should facilitate coordination between different levels of government and remote administration. Additionally, environmental monitoring and research benefit greatly from a reliable and available communication infrastructure. Greenland’s unique environment attracts scientific research, and robust communication networks are essential for supporting data transmission (in general), coordination of research activities, and environmental monitoring. Greenland’s role in global climate change studies should also be supported by communication networks that provide the means of sharing essential climate data collected from remote research stations.
Last but not least. A well-protected (i.e., redundant) and highly available communications infrastructure is a cornerstone of any national defense or emergency situation. If it is well functioning, the critical communications infrastructure will support the seamless operation of military and civilian coordination, protect against cyber threats, and ensure public confidence during a crisis situation (natural or man-made). The importance of investing in and maintaining such a critical infrastructure cannot be underestimated. It plays a critical role in a nation’s overall security and resilience.
TUSASS: THE BACKBONE OF GREENLANDS CRITICAL COMMUNICATIONS INFRASTRUCTURE.
Tusass is the primary telecommunications provider in Greenland. It operates a comprehensive telecom network that includes submarine cables with 5 landing stations in Greenland, very long microwave (MW) radio chains (i.e., long-haul backbone transmission links) with MW backhaul branches to settlements along its way, and broadband satellite connections to deliver telephony, internet, and other communication services across the country. The company is wholly owned by the Government of Greenland (Naalakkersuisut). Positioning Tusass as a critical company responsible for the nation’s communications infrastructure. Tusass faces unique challenges due to the vast, remote, and rugged terrain. Extreme weather conditions make it difficult, often impossible, to work outside for at least 3 – 4 months a year. This complicates the deployment and maintenance of any infrastructure in general and a communications network in particular. The regulatory framework mandates that Tusass fulfills a so-called Public Service Obligation, or PSO. This requires Tusass to provide essential telecommunications services to all of Greenland, even the most isolated communities. This requires Tusass to continue to invest heavily in expanding and enhancing its critical infrastructure, providing reliable and high-quality services to all residents throughout Greenland.
Tusass is the main and, in most areas, the only telecommunications provider in Greenland. The company holds a dominant market position where it provides essential services such as fixed-line telephony, mobile networks, and internet services. The Greenlandic market for internet and data connections was liberalized in 2015. The liberalization allowed private Internet Service Providers (ISPs) to purchase wholesale connections from Tusass and resell them. Despite liberalization, Tusass remains the dominant force in Greenland’s telecommunications sector. Tusass’s market position can be attributed to its extensive communications infrastructure and its government ownership. With a population of 57 thousand and its vast geographical size, it would be highly uneconomical and human-resource wise very chalenging to have duplicate competing physical communications infrastructures and support organizations in Greenland. Not to mention that it would take many years before an alternative telco infrastructure could be up an running matching what is already in place. Thus, while there are smaller niche service providers, Tusass effectively operates as Greenland’s sole telecom provider.
Figure 4 Illustrates one of many of Tusass’s long-haul microwave site along Greenland’s west coast. Accessible only by helicopter. Courtesy: Tusass A/S (Greenland).
CURRENT STATE OF CRITICAL COMMUNICATIONS INFRASTRUCTURE.
The illustration below provides an overview of some of the major and critical infrastructures available in Greenland, with a focus on the communications infrastructure provided by Tusass, such as submarine cables, microwave (MW) radios radio chains, and satellite ground stations, which all connect Greenland and give access to the Internet for all of Greenland.
Figure 5 illustrates the Greenlandic telecommunications provider Tusass infrastructure. Note that Tusass is the incumbent and only telecom provider in Greenland. Currently, five hydropower plants (shown above, location only indicative) provide more than 80% of Greenland’s electricity demand. A new international airport is expected to be operational in Nuuk from November 2024. Source: from Tusass Annual Report 2023 with some additions and minor edits.
From the south of Nanortalik up to above Upernavik on the west coast, Tusass has a 1,700+ km long microwave radio chain connecting all settlements along Greenland’s west coast from the south to the north distributed, supported by 67 microwave (MW) radio sites. Thus, have a microwave radio equipment located for every ca. 25 km ensuring very high performance and availability of connectivity to the many settlements along the West Coast. This setup is called a long-haul microwave chain that uses a series of MW radio relay stations to transmit data over long distances (e.g., up to thousands of kilometers). The harsh climate with heavy rain, snow, and icing makes it very challenging to operate high-frequency, high-bandwidth microwaves (i.e., the short distances between the radio chain sites). The MW radio sites are mainly located on remote peaks in the harsh and unforgiving coastal landscape (ensuring line-of-site), making helicopters the only means of accessing these locations for maintenance and fueling. The field engineers here are pretty much superheroes maintaining the critical communications infrastructure of Greenland and understanding its life-and-death implications for all the remote communities if it breaks down (with the additional danger of meeting a very hungry polar bear and being stuck for several days on a location due to poor weather preventing the helicopter from picking the engineers up again).
Figure 6 illustrates a typical housing for field service staff when on site visits. As the weather can change very rapidly in Greenland it is not uncommon that field service staff have to wait for many days before they can be picked up again by the helicopter. Courtesy: Tusass A/S (Greenland).
Greenland relies on the “Greenland Connect” submarine cable to connect to the rest of the world and the wider internet with a modern-day throughput. The submarine cable connecting Greenland to Canada and Iceland runs from Newfoundland and Labrador in Canada to Nuuk and continues from Qaqortoq in Greenland to land in Iceland (that connects further to Copenhagen and the wider internet). Tusass, furthermore, has deployed submarine cables between 5 of the major Greenlandic settlements, including Nuuk, up the west coast and down to the south (i.e., Qaqortoq). The submarine cables provide some level of redundancies, increased availability, and substantial capacity & quality augmentation to the long-haul MW chain that carries the traffic from surrounding settlements. The submarine cables are critical and essential for the modernization and digitalization of Greenland. However, there are only two main submarine broadband cable connection points, the Canada – Nuuk and Qaqortoq – Iceland submarine connections, to and from Greenland. From a security perspective, this poses substantial and unique risks to Greenland, and its role and impact need to be considered in any work on critical infrastructure strategy. If both international submarine cables were compromised, intentionally or otherwise, it would become challenging, if possible, to sustain today’s communications demand. Most traffic would have to be supported by existing satellite capacity, which is substantially lower than the existing submarine cables can support, leaving the capacity mainly for mission-critical communications. Allowing little spare capacity for consumer and non-critical business communication needs. This said, as long as Greenlandic submarine cables, terrestrial transport, and switching infrastructure are functional, it would be possible to internally to Greenland maintain a resemblance of internet services and communication means between connected settlements using modern day network design thinking.
Moreover, while the submarine cables along the west coast offer redundancy to the land-based long-haul transport solution, there are substantial risks to settlements and their populations where the long-haul MW solution is the only means of supporting remote Greenlandic communities. Given Greenland’s unique geographic and climate challenges it is not only very costly but also time-consuming to reduce the risk of disruption to the existing lesser redundant critical infrastructure already in place (e.g., above Aasiaat north of the Arctic Circle).
Using satellites is an additional dimension, and part of the connectivity toolkit, that can be used to improve the redundancy and availability of the land- and water-based critical communications infrastructures. However, the drawback of satellite systems is that they generally are bandwidth/throughput limited and have longer signal delays (latency and round-trip time) than terrestrial-based communications systems. These issues could pose some limitations on how well some services can be supported or will function and would require a versatile traffic management & prioritization system in case the satellite solution would be the only means of connecting a relatively high-traffic area (e.g., Tasiilaq) used to ground-based support of broadband transport means with substantial more available bandwidth than accessible to the satellite solution. Particular for GEO stationary satellite services, with the satellite located at 36 thousand kilometer altitude, the data traffic flow needs to be carefully optimized in order to function well irrespective of the substantial latency experienced on such connections that at the very best can be 239 milliseconds and in practice might be closer to twice that or more. This poses significant challenges to particular TCP/IP data flows on such response-time-challenged connections and applications sensitivity short round trip times.
Optimizing and stabilizing TCP/IP data flows over GEO satellite connections requires a multi-faceted approach involving enhancements to the TCP protocol (e.g., window scaling, SACK, TCP Hypla, …), the use of hybrid and proxy solutions, application-layer adjustments, error correction mechanisms, Quality of Service (QoS) and traffic shaping, DNS optimizations, and continuous network monitoring. Combining these strategies makes it possible to mitigate some of the inherent challenges of high-latency satellite links and ensure more effective and efficient IP flows and better utilization of the available satellite link bandwidth. Optimizing control signals and latency-sensitive data flows over GEO and LEO satellite connections may also substantially reduce the sensitivity to the prohibitive long delays experienced on GEO connections, using the lower latency LEO connection (RTT < ~ 50 ms @ 500 km altitude), or, if available as a better alternative a long-haul microwave link or submarine connection.
Tusass, in collaboration with the Spanish satellite company Hispasat, make use of the Greenland geostationary satellite, Greensat. Tusass signed an agreement with Hispasat to lease space capacity (800 MHz @ Ku-band) on the Amazonas Nexus satellite until the end of its lifetime (i.e., 2038+/-). Greensat was taken into operation in the last quarter of 2023 (note: it was launched in February 2023), providing services to the satellite-only settlement areas around Qaanaaq, the northernmost settlement on the west coast of Greenland, and Tasiilaq and Ittoqortormiut (north of Tasiilaq), on the remote east coast. All mobile and fixed traffic from a satellite-only area is routed to a satellite ground station that is connected to the geostationary satellite (see the illustration below). The satellite’s primary mission is to provide broadband services to areas that, due to geography & climate and cost, are impractical to connect by submarine cable or long-haul microwave links. The Greensat satellite closes the connection to the rest of the world and the internet via a ground station on Gran Canaria. It also connects to Greenland via submarine cables in Nuuk (via Canada and Qaqortoq).
Figure 7 The image shows a large geostationary satellite ground-station antenna located in Greenland’s cold and remote area. The antenna’s primary purpose is to facilitate communication with geostationary satellites 36 thousand kilometers away, transmitting and receiving data. It may support various services such as Internet, television broadcasting, weather monitoring, and emergency communications. The components are (1) a parabolic reflector (dish), (2) a feed horn and receiver, (3) a mount and support structure, (4) control and monitoring systems, and (5) a radome (not shown on the picture) which is a structural, weatherproof enclosure that protects the antenna from environmental elements without interfering with the electromagnetic signals it transmits and receives. The LEO satellite ground stations are much smaller as the distance between the ground and the low-earth satellite is much smaller, i.e., ca. 350 – 650 km, resulting in less challenging receive and transmit conditions (compared to the connection to a geostationary satellite).
In addition, Tusass also makes use of UK-based OneWeb (Eutelsat) LEO satellite backhaul services at several locations where an area fixed and mobile traffic is routed to a point-of-presence connected to a satellite ground station that connects to a OneWeb satellite that connects to the central switching center in Nuuk (connected to another ground station).
CRITICAL PROPERTIES FOR RELIABLE AND SECURE TRANSPORT NETWORKS.
A physical transport network comprises many tangible components, such as cables, routers, and switches, which form an interconnected system capable of transmitting data. The network is designed and planned according to a given expected coverage, use and level of targeted quality (e.g., speed, latency, priority and security). Moreover, we are also concerned about such a networks availability as well as reliability. We design the physical and logical (i.e., related to higher levels of the OSI stack than the physical) network according to a given target availability, that is how many hours in a year should the network minimum be operational and available to our customers. You will see availability given in percentage of the total hours in a year (e.g., 8,760 hours in a normal year and 8,784 hours in a leap year). So an availability of 99.9% means that we target a minimum operational time of our network of 8,751 hours, or, alternatively, accept a maximum of 9 hours of downtime. The reliability of a network refers to the probability hat the network will continue to function without failure for a given period. For example, say you have a mean time between failures (MTBF) of 8750 hours and you want to figure out what the likelihood is of operating without failure for 4,380 hours (half a year), you find that there is a ca. 60% chance of operating without a failure (or 40% that a failure may occur within the next 6 months). For a critical infrastructure the availability and reliability metrics are very important to consider in any design and planning process.
In contrast to the physical network depiction, a network graph representation abstracts the physical transport network into a mathematical model where graph nodes (or vertexes) represent the network’s many components and edges (or links) represent the physical and logical connections between these network’s many components. Modellizing the physical (and logical) network allows designers and planners to study in detail a networks robustness against many types of disruptions as well as its general functioning and performance.
Suppose we are using a graph approach in our design of a critical communications network. We then need to carefully consider various graph properties critical for the network’s robustness, security, reliability, and efficiency. To achieve this, one must strive for resilience and fault tolerance by designing for increased redundancy and availability involving multiple paths, edges, or connections between nodes, preventing single points of failure (SPoF). This involves creating a network where the number of independent paths between any two nodes is maximized (often subject to economics and feasibility boundary conditions). An optimal average degree of nodes should also be a design criterion. A higher degree of nodes enhances the graph’s, and thus the underlying network’s, resilience, thus avoiding increased vulnerability.
Scalability is a crucial network property. This is best achieved through a hierarchical structure (or topology) that allows for efficient network management as the network expands. The Modularity, which is another graph KPI, ensures that the network can integrate new nodes and edges without major reconfigurations, supporting civilian expansion and military operations or dual-purpose operations. To meet low-latency and high-throughput requirements, the shortest-path routing algorithms should be applied to allow us to minimize the latency or round-trip time (and thus increase throughput). Moreover, bandwidth management should be implemented, allowing the network to handle large data volumes in a prioritized manner (if required). This also ensures that the network can accommodate peak loads and prioritize critical communication when it is compromised.
Security is a paramount property of any communications network. In today’s environment with many real and dangerous cyber threats, it may be one of the most important topics to consider. Each node and link (or edge) in a network requires robust defenses against cyber threats. In our design, we need to think about encryption, authentication, intrusion, and anomaly detection systems. Network segmentation will help isolate critical defense communications from civilian traffic, preventing breaches from compromising the entire network. Survivability is enhanced by minimizing the Network Diameter, a graph property. A low (or lower) network diameter ensures that a network can quickly reroute traffic in case of failures and is an important design element for robustness against targeted attacks and random failures.
Likewise, interoperability is essential for seamless integration between civilian and military communication systems. Flexible protocols and specifications (e.g., Open API) enable different types of traffic and varying security requirements. These frameworks provide the structure, tools, and best practices needed to build and maintain secure communication systems. Thereby protecting against the various cyber threats we have today and expect in the future. Efficiency is achieved through effective load balancing (e.g., on a logical as well as physical level) to distribute traffic evenly across the network, prevent bottlenecks, optimize performance, and design for energy-efficient operations, particularly in remote or harsh environments or in case a part of the network has been compromised.
In order to support both civilian services and defense operations, accessibility and high availability are very important design requirements to consider when having a network with extensive large-scale coverage, including in very remote areas. Incorporating redundant communication links, such as satellite, fiber optic, and wireless, are design choices that allow for high availability even under adverse and disruptive conditions. It makes good sense in an environment such as Greenland to ensure that long-haul microwave links have a given level of redundancy either by satellite backhaul, submarine cable, or additional MW redundancy. While we always strive for our designs to be cost-effective, it may be a challenge if the circumstances dictate that the best redundancy (availability) solution is solved by non-terrestrial means (e.g., by satellite or submarine means). However, efficiency should be addressed by optimizing resource allocation to balance cost with performance, ensuring civil and defense needs are met without excessive expenditure, and sharing infrastructure where feasible to reduce costs while maintaining security through logical separation.
Ultra-secure transport networks are designed to meet stringent reliability, resilience, and security requirements. These type of networks are critical for civil and defense applications, ensuring continuous operation and protection against various threats. The important graph properties that such networks should exhibit include high connectivity, redundancy, low diameter, high node degree, network segmentation, robustness to attacks, scalability, efficient load balancing, geographical diversity, and adaptive routing.
High connectivity ensures multiple independent paths between any pair of nodes in the network, which is crucial for a communication network’s resilience and fault tolerance. This allows the network to maintain functionality even if several nodes or links fail, making it capable of withstanding targeted attacks or random failures without significant performance degradation. Redundancy, which involves having multiple backup paths and nodes, enhances fault tolerance and high availability by providing alternative routes for data transmission if primary paths fail. Redundancy also applies to critical network components such as switches, routers, and communication links, ensuring no or uncritical single point of failure.
A low diameter, the longest-shortest path between any two nodes, ensures data can travel quickly across the network, minimizing latency. This is especially important in time-sensitive applications. High node degree, meaning nodes are connected to many other nodes, increases the network’s robustness and allows for multiple paths for data to traverse, contributing to security and availability. However, it is essential to manage the trade-off between having a high node degree and the complexity of the network.
Network segmentation and compartmentalization will enhance security by limiting the impact of breaches or failures on a small part of the network. This is of particular importance when having a dual-use network design. Network segmentation divides the network into multiple smaller subnetworks. Each segment may have its own security and access control policies. Network compartmentalization involves designing isolated environments where, for example, data and functionalities are separated based on their criticality and sensitivity (this is, in general, a logical separation). Both strategies help contain cyber threats as well as prevent them from spreading across an entire network. Moreover, it also allows for a more granular control over network traffic and access. With this consideration, we should have a network that is robust against various types of attacks, including both physical and cyber attacks, by using secure protocols, encryption, authentication mechanisms, and intrusion detection systems. The aim of the network topology should be to minimize the impact of potential attacks on critical network nodes and links.
In a country such as Greenland, with settlements spread out over a very long distance and supported by very long and exposed transmission links (e.g., long-haul microwave links), geographical diversity is an essential design consideration that allows us to protect the functioning of services against localized disasters or failures. Typically, this involves distributing switching and management nodes, including data centers, across different geographic locations, ensuring that a failure in one area or with a main transport link does not disrupt the major parts of a network. This is particularly important for disaster recovery and business continuity. Finally, the network should support adaptive and dynamic routing protocols that can quickly respond to changes in the network topology, such as node failures or changes in traffic patterns. Such protocols will enhance the network’s resilience by automatically finding the best real-time data transmission paths.
TUSASS NETWORK AS A GRAPH.
Real maps, such as the Greenland map shown below at the left side of Figure 8, provide valuable geographical context and are essential for understanding the physical layout and extent of, for example, a transport network. A graph representation, as shown on the right side of Figure 8, on the other hand, offers a powerful and complementary perspective of the real-world network topology. It can emphasize the structural properties (and qualities) without those disappearing in geographical details that often are not relevant to the network functioning (if designed appropriately). A graph can contain many layers of network information that pretty much describe the network stack if required (e.g., from physical transport up through IP, TCP/IP, and to the application layers). It also supports many types of advanced analysis, design scenarios, and different types of simulations. A graph representation of a communications network is an invaluable tool for network design, planning, troubleshooting, analysis, and management.
Thus, the network graph approach offers several benefits for planning and operations. Firstly, the approach can often visualize the network’s topology better than a geographical map. It facilitates the understanding of various network (and graph) relationships and interconnections between the various network components. Secondly, the graph algorithms can be applied to the network graph and support the analysis of its characteristics, such as availability and redundancy scores, connectivity in general, the shortest paths, and so forth. This kind of analysis helps us identify critical nodes or links that may be sensitive to network and service disruption. It can also help significantly in maintaining and optimizing a network’s operation.
So, analyzing the our communication network’s graph representation makes it possible to identify potential weaknesses in the physical transport network, such as single points of failure (SPoF), bottlenecks, or areas with limited or weak redundancy. These identified weaknesses can then be addressed to enhance the network’s resilience, e.g., improving our network’s redundancy, availability and thus its overall reliability.
Figure 8 The chart above shows on the left side the topology of the (real) transport network of Tusass with the reference point in the Greenlandic settlements it connects. It should be noted that the actual transport network is slightly different as there are more hops between settlements than is shown here. On the right side is a graph representation of the Tusass transport network, shown on the left. The network graph represents the transport network on the west coast north and southbound. There are three main connection categories: (Black dashed line) Microwave (MW), (Orange dashed line) Submarine Cable, and (Blue solid line) Satellite, of which there are a GEO and a LEO arrangement. The size of the node, or settlements, represents the size of the population, which is also why Nuuk has the largest circle. The graph has been drawn consistent with the Kamada-Kawai layout, which is particularly useful for small to medium graphs, providing a reasonable, intuitive visualization of the structural relationship between nodes.
In the following, it is important to understand that due to Greenland’s specific conditions, such as weather and geography, building a robust transport network regarding reliability and redundancy will always be challenging, particularly when relying on the standard toolbox for designing, planning, and creating such networks. With geographical challenges should for example be understood the resulting lack of civil infrastructure connecting settlements … such as the lack of a road network.
The Table below provides key performance indicators (KPIs) for the Greenlandic (Tusass) transport network graph, as illustrated in Figure 8 above. It represents various aspects of the transport network’s structure and connectivity. This graph consists of 93 vertices (e.g., settlements and other connection points, such as long-haul MW radio sites) and 101 edges (transport connections), and it is fully connected, meaning all nodes are reachable within the network. There is only one subgraph, indicating no isolated segments as expected.
The Average Path Length suggests that it takes on average 39 steps to travel between any two nodes. This is a relatively high number, which may indicate a less efficient network. The Diameter of a network is defined as the longest shortest path between any two nodes. It can be shown that the value of the diameter lies between the value of the radius and twice that value (and not higher;-). The diameter is found to be 32, indicating a quite high maximum distance between the most distant nodes. This suggests that the network has a quite extensive reach, as is also obvious from the various illustrations of the transport network above (Figure 8) and below (Figure 11 & 12). Apart from the fact that such a high diameter may indicate potential inefficiencies, a large diameter can also mean that, in the worst-case scenarios, such as a compromised link or connectivity issues in general, communication between some nodes involves many steps (or hops), potentially leading to higher latency and slower data transmission. Related to the Diameter, the network Radius is the minimum eccentricity of any node, which is the shortest path from the most central node to the farthest node. Here, we find the radius to be 16, which means that even the most centrally located node is relatively far from some other nodes in the network. Something that is also very obvious from the various illustrations of the transport network. This emphasizes that the network has nodes that are significantly far apart. Without sufficient redundancy in place, such a transport network may be more sensitive to disruption of the connectivity.
From the perspective of redundancy, a large diameter and radius may imply that the network has fewer alternative paths between distant nodes (i.e., a lower redundancy score). This is, for example, the case between the northern point of Kullorsuaq and Aasiaat. Aasiaat is the first settlement (from the North) to be connected both by microwave and submarine cable and thus has an alternative connectivity solution to the long-haul microwave chain. If a critical node or link fails, the alternative path latency might be considerably longer than the compromised connectivity, such as would be the case with the alternative connectivity being satellite-based, leading to inefficiencies and possible reduced performance. This can also suggest potential capacity bottlenecks where specific paths are heavily relied upon without having enough capacity to act as the sole connectivity for a given transmission path. Thus, the vulnerability of the network to failures increases, resulting in reduced performance for customers in the affected area.
We find a Graph Density, at 0.024. This value indicates a sparse network with relatively few connections compared to the number of possible connections. The Clustering Coefficient is 0.014 and indicates that there are very few tightly-knit groups of nodes (again easily confirmed by visual inspection of the graph itself, see the various figures). The value of the Average Betweenness (ca. 423) measures how often nodes act as bridges along the shortest path between other nodes, indicating a significant central node (i.e., Nuuk).
The Average Closeness of 0.0003 and the Average Eigenvector Centrality of 0.105 provide insights into settlements’ influence and accessibility within the transport network. The Average Closeness measures of how close, on average, nodes are to each other. A high value indicates that nodes (or settlements) are close to each other meaning that the information (e.g., user data, signaling) being transported over the network spreads quickly and efficiently. And not surprisingly the opposite would be the case for a low average value. For our Tusass network the average closeness is very low and suggests that the network may face challenges in accessibility and efficiency, with nodes (settlements) being relatively far from one another. This typically will have an impact on the speed and effectiveness of communication across the network. The Average Eigenvector Centrality measures the overall importance (or influence) of nodes within a network. The term Eigenvectoris a mathematical concept from linear algebra that represents the stable state of the network and provides insights into the structure of the graph and thus the network. For our Tusass network the average eigenvector value is (very) low and indicates a distribution of influence across several nodes that may actually prevent reliance on a single point of failure and, in general, such structures are thought to enhance a network’s resilience and redundancy. An Average Degree of ca. 2 means that each node has about 2 connections on average, indicating a hierarchical network structure with fewer direct connections and with a somewhat low level of redundancy, consistent with what can be observed from the various illustrations shown in this post. This do indicate that our network may be more vulnerable to disruption and failures and have a relative high latency (thus, a high round trip time).
Say that for some reason, the connection to Ilulissat, a settlement north of Aasiaat on the west coast with a little under 5 thousand people, is disrupted due to a connectivity issue between Ilulissat and Qasigiannguit, a neighboring settlement to Ilulissat with ca. a thousand people. This would today disconnect ca. 11 thousand people from receiving communications services or ca. 20% of Tusass’s customer base as all settlements north of Ilulissat would likewise be disconnected because of the reliance on the broken connection to also transport their data towards Nuuk and the internet using the submarine cables out of Greenland. In the terminology of the network graph, a broken connection (or edge as it is called in graph theory) that breaks up the network into two (or more) disconnected parts is called a Bridge. Thus, the connection between Ilulissat and Qasigiannguit is a bridge, as if it is broken, disconnecting the northern part of the long-haul microwave network above Ilulissat. Similarly, if Ilulissat were a central switching hub disrupted, it would disconnect the upper northern network from the network south of Ilulissat, and we would call Ilulissat an Articulation Point.For example, a submarine cable between Aasiaat and Ilulissat would provide redundancy for this particular event, mitigating a disruption of the microwave long-haul network between Ilulissat and Aasiaat that would disconnect at least 20% of the population from communications services.
The transport network has 44 Articulation Points and 57 Bridges, highlighting vulnerabilities where node or link failures could significantly disrupt the connectivity between parts of the network, disconnecting major parts of the network and thus disrupting services. A Modularity of 0.65 suggests a moderately high presence of distinct communities, with the network divided into 8 such communities (see Figure below).
Figure 9 In network analysis, a “natural” community (or cluster) is a group of nodes that are more densely connected to each other than to nodes outside the group. Natural communities are denser subgraphs within a larger network. Identifying such communities helps in understanding the structure and function of the network. In the above analysis of how Tusass’s transport network connects to the various settlements illustrates quiet well the various categories of connectivity (e.g., long-haul microwaves only, submarine cable redundancy, satellite redundancy, etc..) in the communications network of Tusass,
A Throughput (or Degree) of 202 indicates a network with an overall capacity for data transmission. The Degree is the average number of connections per node for a network graph. In a transport network, the degree indicates how many direct connections it has to other settlements. A higher degree implies better connectivity and potentially a higher resilience and redundancy. In a fully connected network with 93 nodes, the total degree would be 93 multiplied by 92, which equals 8,556. Therefore, a value of 202 is quite low in comparison, indicating that the network is far from fully connected, which anyway would be unusual for a transport network on this side. Our transport network is relatively sparse and, thus, resulting in a lower total degree, suggesting that fewer direct paths exist between nodes. This may potentially also mean less overall network redundancy. In the case of a node or link failure, there might be fewer alternative routes, which, as a consequence, can impact network reliability and resilience. Lower degree values can also indicate limited capacity for data transmission between nodes, potentially leading to congestion or bottlenecks if certain paths become over-utilized. This can, of course, then affect the efficiency and speed of data transfer within the network as traffic congestion levels increase.
The KPIs, shown in Table 1 below, collectively indicate that our Greenlandic transport network has several critical points and connections that could affect redundancy and availability. Particularly if they become compromised or experience outages. The high number of articulation points and bridges indicates possible design weaknesses, with the low density and average degree suggesting a limited level of redundancy. In fact, Tusass has, over several years, improved its transport network resilience, focusing on increasing the level of redundancy and reducing critical single points of failure. However, the changes and additions are costly and, due to the environmental conditions of Greenland, are also time-consuming, having fewer working days available for outdoor civil work projects.
Table 1 illustrates the most important graph KPIs, also described in the text above and below, that are associated with the graph representation of the Tusass transport network represented by the settlement connectivity (approximating but not one-to-one with the actual transport network).
In graph theory, an articulation point(see Figure 10 below) is a node that, if it is removed from the network, would split the network into disconnected parts. In our story, an articulation point would be one of our Greenlandic settlements. These types of points are thus important in maintaining network connectivity and serve as points in the network where alternative redundancy schemes might serve well. Therefore, creating additional redundancy in the network’s routing paths and implementing alternative connections will mitigate the impact of a failure of an articulation point, ensuring continued operations in case of a disruption. Basically, the more redundancy that a network has, the fewer articulation points the network will have; see also the illustration below.
Figure 10 The figure above illustrates the redundancy and availability of 3 simple undirected graphs with 4 nodes. The first graph is fully connected, with no articulation points or bridges, resulting in a redundancy and availability score of 100%. Thus I can remove a Node or a Connection from the graph and the remainder will remain full connected. The second graph, which is partly connected, has one articulation point and one bridge, leading to a redundancy and availability score of 75%. If I remove the third Node or the connection between Node 3 and Node 4, I would end with a disconnected Node 4 and a graph that has been broken up in 2 (e.g., if Node 3 is removed we have 2 sub-graphs {1,2} and {4}), The third graph, also partly connected, contains two articulation points and three bridges, resulting in a redundancy score of 0% and an availability score of 50%. Articulation points and bridges are highlighted in red to emphasize their critical roles in graph connectivity. Note: An articulation point is a node whose removal disconnects the graph and a bridge is an edge whose removal disconnects the graph.
Careful consideration of articulation points is crucial in preventing network partitioning, where removing a single node can disconnect the overall network into multiple sub-segments of the network. The connectivity between different segments is obviously critical for continuous data flow and service availability. Often, design and planning requirements dictate that if a network is broken into parts due to various disruption scenarios, these parts will remain functional and continue to provide a service that is possible with reduced performance. Network designers would make use of different strategies, such as increasing the physical redundancy of the transmission network as well as making use of routing algorithms on a higher level, such as multipath routing and diverse routing paths. Moreover, optimizing the placement of articulation points and routing paths (i.e., how traffic flows through the communications network) also maximizes resource utilization and may ensure optimal network performance and service availability for an operator’s customers.
Figure 11 illustrates the many articulation points of our Greenlandic settlements, represented as red stars in the graph of the Greenlandic transport network. Removing an articulation point (a critical node) would partition the graph into multiple disconnected components and may lead to severe service interruption.
In graph theory, a bridge is a network connection (or edge) whose removal would split the graph into multiple disconnected components. This type of connection is obviously critical for maintaining connectivity and facilitating communication between different network parts. In real life with real networks, the network designers would, in general, spend considerable time to ensure that such critical connections (i.e., so-called bridges) do not have an over-proportional impact on their network availability by, for example, building alternative connections (i.e., redundant connections) or ensuring that the impact of a compromised bridge would have a minimum impact in terms of the number of customers.
For our transport network in Greenland, the long-haul microwave transport network is overall less sensitive to disruption on a settlement level, as the underlying topology is like a long spine at high capacity and reasonable redundancy built-in with branches of MW radios that connect from the spine to a particular settlement. Thus, in most cases in this analysis, the long-haul MW radio site, in proximity to a given settlement, is the actual articulation point (not the settlement itself). The Nuuk data center, a central switching hub, is, by definition, an articulation point of very high criticality.
As discussed above and shown below (Figure 12), in the context of our transport network, bridges may play a crucial role in network resilience and fault tolerance. In our story, bridges represent the transport connections connecting Greenlandic settlements and the core network back in Nuuk (i.e., the master network node). In our representations, a bridge can, for example, be (1) a Microwave connection, (2) A submarine cable connection, and (3) a satellite connection provided by Tusass’s geo stationary satellite (e.g., Greensat) or by the low-earth orbiting OneWeb satellite. By identifying and managing bridges, network designers can mitigate the impact of link failures and disruptions, ensuring continuous operation and availability of services. Moreover, keeping network bridges in mind and minimizing them when planning a transport network will significantly reduce the risk of customer-affecting outages and keep the impact of transport disruption and the subsequent network partitioning to a minimum.
Figure 12 illustrates the many (edge) bridges and transport connections present in the graph of the Greenlandic transport network. Removing a bridge would split the network (graph) into multiple disconnected components, leading to network fragmentation and parts that may no longer sustain services. The above picture is common for long microwave chains with many hops (the connections themselves). The remedy is to make shorter hops, as Tusass is doing, and ensure that the connection itself is redundant equipment-wise (e.g., if one radio fails, there is another to take over). However, such a network would remain sensitive to any disruption of the MW site location and the large MW dish antenna.
Network designers should deploy redundancy mechanisms that would minimize the risk of the disruptive impact of compromised articulation points and bridges. They have several choices to choose from, such as multipath routing (e.g., ring topologies), link aggregation, and diverse routing paths to enhance redundancy and availability. These mechanisms will help minimize the impact of bridge failures and improve the overall network availability by increasing the level of network redundancy on a physical and logical level. Moreover, optimizing the placement of bridges and routing paths in a transport network will maximize resource utilization and ensure optimal network performance and service availability.
Knowing a given networks Articulation Points and Bridges will allow us to define an Availability and a Redundancy Score that we can use to evaluate and optimize a network’s robustness and reliability. Some examples of these concepts for simpler graphs (i.e., 4 nodes) are also shown in Figure 10 above. In the context of the Greenland transport network used here, these metrics can help us understand how resilient the network is to failures.
The Availability Score measures the proportion of nodes that are not articulation points, which might compromise our network’s overall availability if compromised. This score measures the risk of exposure to service disruption in case of a disconnection. As a reminder, the articulation point, or cut-vertex, is a node that, when removed, increases the number of components of the network and, thus, potentially the amount of disconnecting parts. The formula that is used to calculate the availability score is given by the total number of settlements (e.g., 93) minus the number of articulation points (e.g., 44) divided by the total number of settlements (e.g., 93). In this context, a higher availability score indicates a more robust network where fewer nodes are critical points of failure. Suppose we get a score that is close to one. In that case, this indicates that most nodes are not articulation points, suggesting that the network can sustain multiple node failures without significant loss of connectivity (see Figure 10 for a relatively simple illustration of this).
The Redundancy Score measures the proportion of connections that are not bridges, which could result in severe service disruptions to our customers if compromised. When a bridge is compromised or removed, it increases the number of network parts. The formula for the redundancy score is the total number of transport connections (edges, e.g., 101) minus the number of bridges (e.g., 57) divided by the total number of transport connections (edges, e.g., 101). Thus, in this context of redundancy, a higher redundancy score indicates a more resilient network where fewer edges are critical points of failure. If we get a redundancy score that is close to 100%, it would indicate that most of our (transport) connections cannot be categorized as bridges. This also suggests that our network can sustain multiple connectivity failures without it, resulting in a significant loss of overall connectivity and a severe service interruption.
Having more switching centers, or central hubs, can significantly enhance a communications network’s resilience, availability, and redundancy. It also reduces the consequences and impact of disruption to critical bridges in the network. Moreover, by distributing traffic, isolating failures, and providing multiple paths for data transmission, these central hubs may ensure continuous service to our customers and improve the overall network performance. In my opinion, implementing strategies to support multiple switching centers is essential for maintaining a robust and reliable communications infrastructure capable of withstanding various disruptions and enabling scaling to meet any future demands.
For our Greenlandic transport network shown above, we find an Availability Score of 53% and a Redundancy Score of 44%. While the scores may appear on the low side, we need to keep in mind that we are in Greenland with a population of 57 thousand mainly distributed along the west coast (from south to the north) in about 50+ settlements with 30%+ living in Nuuk. Tusass communications network connects to pretty much all settlements in Greenland, covering approximately 3,500+ km on the west coast (e.g., comparable to the distance from the top of Norway all the way down to the most southern point of Sicily), and irrespective of the number of people living in them. This is also a very clear desire, expectation, and direction that has been given by the Greenlandic administration (i.e., via the universal service obligation imposed on Tusass). The Tusass transport network is not designed with strict financial KPIs in mind and with the financial requirement that a given connection to a settlement would need to have a positive return on investment within a few years (as is the prevalent norm in our Industry). The transport network of Tusass has been designed to connect all communities of Greenland to an adequate level of quality and availability, prioritizing the coverage of the Greenlandic population (and the settlements they live in) rather than whether or not it makes hard financial sense. Tusass’s network is continuously upgraded and expanded as the demand for more advanced broadband services increases (as it does anywhere else in the world).
CRITICAL TECHNOLOGIES RELEVANT TO GREENLAND AND THE WIDER ARCTIC.
Greenland’s strategic location in the Arctic and its untapped natural resources, such as rare earth elements, oil, and gas, has increasingly drawn the attention of major global powers like the United States, Russia, and China. The melting Arctic ice due to climate change is opening new shipping routes and making these resources more accessible, escalating the geopolitical competition in the region.
Greenland must establish a defense and security strategy that minimizes its dependency on its natural allies and external actors to mitigate a situation where such may not be available or have the resources to commit to Greenland. An integral part of such a security strategy should be a dual-use, civil, and defense requirement whenever possible. Ensuring that Greenlandic society gets an immediate and sustainable return on investments in establishing a solid security framework.
5G technology offers significant advancements over previous generations of wireless networks, particularly in terms of private networking, speed, reliability, and latency across a variety of coverage platforms, e.g., (normal fixed) terrestrial antennas, vehicle-based (i.e., Cell on Wheels), balloon-based, drone-based, LEO-satellite based. This makes 5G ideal for setting up ad-hoc mobile coverage areas for military and critical civil applications. One of the key capabilities of 5G that supports these use cases is network slicing, which allows for the creation of dedicated virtual networks optimized for specific requirements.
Telia Norway has conducted trials together with the Norwegian Armed Forces in Norway to demonstrate the use of 5G for military applications (note: I think this is one of the best examples of an operator-defense collaboration on deployment innovation and directly applies to Arctic conditions). These trials included setting up ad-hoc 5G networks to support various military scenarios (including in an Arctic-like climate). The key findings demonstrated the ability to provide high-speed, low-latency communications in challenging environments, supporting real-time situational awareness and secure communications for military personnel. Ericsson has also partnered with the UK Ministry of Defense to trial 5G applications for military use. These trials focused on using 5G to support secure communications, enhance situational awareness, and enable the use of autonomous systems in military operations. NATO has conducted exercises incorporating 5G technology to evaluate its potential for improving command and control, situational awareness, and logistics in multi-national military operations. These exercises have shown the potential of 5G to enhance interoperability and coordination among allied forces. It is a very meaningful dual-use technology.
5G private networks offer a dedicated and secure network environment for specific organizations or use cases, which can be particularly beneficial in the Arctic and Greenland. These private networks can provide reliable communication and data transfer in remote and harsh environments, supporting military and civil applications. For instance, in Greenland, 5G private networks can enhance communication for scientific research stations, ensuring that data from environmental monitoring and climate research is transmitted securely and efficiently. They can also support critical infrastructure, such as power grids and transportation networks, by providing a reliable communication backbone. Moreover, in Greenland, the existing public telecommunications network may be designed in such a way that it essentially could operate as a “private” network in case transmission lines connecting settlements would be compromised (e.g., due to natural or unnatural causes), possibly a “thin” LEO satellite connection out of the settlement.
5G provides ultra-fast data speeds and low latency, enabling (near) real-time communication and data processing. This is crucial for military operations and emergency response scenarios where timely information is vital. Network slicing allows a single physical 5G network to be divided into multiple virtual networks, each tailored to specific applications or user groups. This ensures that critical communications are prioritized and reliable even during network congestion. It should be considered that for Greenland, the transport network (e.g., long-haul microwave network, routing choices, and satellite connections) might be limiting how fast the ultra-fast data speeds can become and may, at least along some transport routes, limit the round trip time performance (e.g., GEO satellite connections).
5G Enhanced Mobile Broadband (eMBB) provides high-speed internet access to support applications such as video streaming, augmented reality (AR), and virtual reality (VR) for situational awareness and training. Massive Machine-Type Communications (mMTC) supports a large number of IoT devices for monitoring and controlling equipment, sensors, and vehicles in both military and civil scenarios. Ultra-Reliable (Low-Latency) Communications (URLLC) ensures dependable and timely communication for critical applications such as command and control systems as well as unmanned and autonomous communication platforms (e.g., terrestrial, aerial, and underwater drones). I should note that designing defense and secure systems for ultra-low latency (< 10 ms) requirements would be a mistake as such cannot be guaranteed under all scenarios. The ultra-reliability (and availability) of transport connectivity is a critical challenge as it ensures that a given system has sufficient autonomy. Ultra-low latency of a given connectivity is much less critical.
For military (defense) applications, 5G can be rapidly deployed in the field using portable base stations to create a mobile (private) network. This is particularly useful in remote or hostile environments where traditional infrastructure is unavailable or has been compromised. Network slicing can create a secure, dedicated network for military operations. This ensures that sensitive data and communications are protected from interception and jamming. The low latency of 5G supports (near) real-time video feeds from drones, body cameras, and other surveillance equipment, enhancing situational awareness and decision-making in combat or reconnaissance missions.
Figure 13 The hierarchical coverage architecture shown above is relevant for military or, for example, search and rescue operations in remote areas like Greenland (or the Arctic in general), integrating multiple technological layers to ensure robust communication and surveillance. LEO satellites provide extensive broadband and SIGINT & IMINT coverage, supported by GEO satellites for stable links and data processing through ground stations. High Altitude Platforms (HAPs) offer 5G, IMINT, and SIGINT coverage at mid-altitudes, enhancing communication reach and resolution. The HAP system offers an extremely mobile and versatile platform for civil and defense scenarios. An ad-hoc private 5G network on the ground ensures secure, real-time communication for tactical operations. This multi-layered architecture is crucial for maintaining connectivity and operational efficiency in Greenland’s harsh and remote environments. The multi-layered communications network integrates IOT networks that may have been deployed in the past or in a specific mission context.
In critical civil applications, 5G can provide reliable communication networks for first responders during natural disasters or large-scale emergencies. Network slicing ensures that emergency services have priority access to the network, enabling efficient coordination and response. 5G can support the rapid deployment of communication networks in disaster-stricken areas, ensuring that affected populations can access critical services and information. Network slicing can allocate dedicated resources for smart city applications, such as traffic management, public safety, and environmental monitoring, ensuring that these services remain operational even during peak usage times. Thus, for Greenland, ensuring 5G availability would be through coastal settlements and possibly coastal coverage (outside settlements) of 5G at a lower frequency range (e.g., 600 – 900 MHz), prioritizing 5G coverage rather than 5G enhanced mobile broadband (i.e., any coverage at a high coverage probability is better than no coverage at certainty).
Besides 5G, what other technologies would otherwise be of importance in a Greenland Technology Strategy as it relates to its security and ensuring its investments and efforts also return beneficially to its society (e.g., a dual-use priority):
It would be advisable to increase the number of community networks within the overall network that can continue functioning if cut off from the main communications network. Thus, communications services in smaller and remote settlements depend less on a main or very few central communications control and management hubs. This requires on a local settlement level, or grouping of settlements, self-healing, remote (as opposed to a central hub) management, distributed databases, regional data center (typically a few racks), edge computing, local DNS, CDNs and content hosting, satellite connection, … Most telecom infrastructure manufacturing companies have today network in a box solutions that allow for such designs. Such solutions enable private 5G networks to function isolated from a public PLMN and fixed transport network.
It is essential to develop a (very) highly available and redundant digital transport infrastructure leveraging the existing topology strengthened by additional submarine cables (less critical than some of the other means of connectivity), increased transport ring- & higher-redundancy topologies, multi-level satellite connections (GEO, MEO & LEO, supplier redundancy) with more satellite ground gateways on Greenland (e.g., avoiding “off-Greenland” traffic routing). In addition, a remotely controlled stratospheric drone platform could provide additional connectivity redundancy at very high broadband speeds and low latencies.
Satellite backhaul solutions, operating, for example, from a Low Earth Orbit (LEO), such as shown in Figure below, are extending internet services to the farthest reaches of the globe. These satellites offer many benefits, as already discussed above, in connecting remote, rural, and previously un- and under-served areas with reliable internet services. Many remote regions lack foundational telecom infrastructure, particularly long-haul transport networks for carrying traffic away from remote populated areas. Satellite backhauls do not only offer a substantially better financial solution for enhancing internet connectivity to remote areas but are often the only viable solution for connectivity. The satellite backhaul solution is an important part of the toolkit to improve on redundancy and availability of particular very long and extensive long-haul microwave transport networks through remote areas (e.g., Greenland’s rugged and frequently hostile harsh coastal areas) where increasing the level of availability and redundancy with terrestrial means may be impractical (due to environmental factors) or incredibly costly. – LEO satellites provide several security advantages over GEO satellites when considering resistance to hostile actions to disrupt satellite communications. One significant factor is the altitude at which LEO satellites operate, which is between 500 and 2,000 kilometers, compared to GEO satellites, which are positioned approximately 36,000 kilometers above the equator. The lower altitude makes LEO satellites less vulnerable to long-range anti-satellite (ASAT) missiles. – LEO satellite networks are usually composed of large constellations with many satellites, often numbering in the dozens to hundreds. This extensive LEO network constellation provides some redundancy, meaning the network can still function effectively if some satellites are “taken out.” In contrast, GEO satellites are typically much fewer in number, and each satellite covers a much larger area, so losing even one GEO satellite will have a significant impact. – Another advantage of LEO satellites is their rapid movement across the sky relative to the Earth’s surface, completing an orbit in about 90 to 120 minutes. This constant movement makes it more challenging for hostile actors to track and target individual satellites for extended periods. In comparison, GEO satellites remain stationary relative to a fixed point on Earth, making them easier to locate and target. LEO satellites’ lower altitude also results in lower latency than GEO satellites. This can benefit secure, time-sensitive communications and is less susceptible to interception and jamming due to the reduced time delay. However, any security architecture of the critical transport infrastructure should not only rely on one type of satellite configuration. – Both GEO and LEO satellites have their purpose and benefits. Moreover, a hierarchical multi-dimensional topology, including stratospheric drones and even autonomous underwater vehicles, is worth considering when designing critical communications architecture. It is also worth remembering that public satellite networks may offer a much higher degree of communications redundancy and availability than defense-specific constellations. However, for SIGINT & IMINT collection, the defense-specific satellite constellations are likely much more advanced (unfortunately, they are also not as numerous as their civilian “cousins”). This said, a stratospheric aerial platform (e.g., HAP) would be substantially more powerful in IMINT and possibly also for some SIGINT tasks (or/and less costly & versatile) than a defense-specific satellite solution.
Figure 14 illustrates the architecture of a Low Earth Orbit (LEO) satellite backhaul system used by providers like OneWeb as well as StarLink with their so-called “Community Gateway” (i.e., using their Ka-band). It showcases the connectivity between terrestrial internet infrastructure (i.e., Satellite Gateways) and satellites in orbit, enabling high-speed data transmission. The network consists of LEO satellites that communicate with each other (inter-satellite Comms) using the Ku and Ka frequency bands. These satellites connect to ground-based satellite gateways (GW), which interface with Points of Presence (PoP) and Internet Exchange Points (IXP), integrating the space-based network with the terrestrial internet (WWW). Note: The indicated speeds and frequency bands (e.g., Ku: 12–18 GHz, Ka: 28–40 GHz) and data speeds illustrate the network’s capabilities.
Establish collaboration and agreements with LEO direct to cellular device satellite providers (i.e., there are many more than StarLink (US) around, e.g., AST Spacemobile (US), Lynk Mobile (US), Sateliot (Spain),…) that would offer cellular services across Greenland. A possible concern is to what degree such systems can be relied upon in a crisis, as these are controlled by external commercial companies operating satellites outside the control and influence of Greenlandic interests. For more details about LEO satellites, see my recent article “The Next Frontier: LEO Satellites for Internet Services.”.
Figure 15 illustrates an LEO satellite direct-to-device communication in remote areas without terrestrially-based communications infrastructure. Satellites are the only means of communication by a normal mobile device or classical satellite phone. Courtesy: DALL-E.
Establish an unmanned (remotely operated) stratospheric High Altitude Platform System (HAPS) (i.e., an advanced drone-based platform) or Unmanned Aerial Vehicles (UAV) over Greenland (or The Arctic region) with payload agnostic capabilities. This could easily be run out of existing Greenlandic ground-based aviation infrastructure (e.g., Kangerlussuaq, Nuuk, or many other community airports across Greenland). This platform could eventually become autonomous or require little human intervention. The high-altitude platform could support mission-critical ad-hoc networking for civil and defense applications (over Greenland). Such a multi-purpose platform can be used for IMINT and SIGINT (i.e., for both civil & defense) and civil communication means, including establishing connectivity to the ground-based transport network in case of disruptions. Lastly, a HAPS may also permanently offer high-quality and capacity 5G mobile services or act as a private ultra-secure 5G network in an ad-hoc mission-specific scenario. For a detailed account of stratospheric drones and how these compared with low-earth satellites, see my recent article “Stratospheric Drones & Low Earth Satellites: Revolutionizing Terrestrial Rural Broadband from the Skies?”. – Stratospheric drones, which operate in the stratosphere at altitudes around 20 to 50 kilometers, offer several security advantages over traditional satellite communications and submarine communication cables, especially from a Greenlandic perspective. These drones are less accessible and harder to target due to their altitude, which places them out of reach for most ground-based anti-aircraft systems and well above the range of most manned aircraft. This makes them less vulnerable to hostile actions compared to satellites, which can be targeted by anti-satellite (ASAT) missiles, or submarine cables, which can be physically cut or damaged by underwater operations. The drones would stay over Greenlandic, or NATO, territory while by nature, design, and purpose, submarine communications cables and satellites, in general, are extending far beyond the territory of Greenland. – The mobility and flexibility of stratospheric drones allow them to be quickly repositioned as needed, making it difficult for adversaries to consistently target them. Unlike satellites that follow predictable orbits or submarine cables with fixed routes, these drones can change their location dynamically to respond to threats or optimize their coverage. This is particularly advantageous for Greenland, whose vast and harsh environment makes maintaining and protecting fixed communication infrastructure challenging. – Deploying a fleet of stratospheric drones provides redundancy and scalability. If one drone is compromised or taken out of service, others can fill the gap, ensuring continuous communication coverage. This distributed approach reduces the risk of a single point of failure, which is more pronounced with individual satellites or single submarine cables. For Greenland, this means a more reliable and resilient communication network that can adapt to disruptions. – Stratospheric drones can be rapidly deployed and recovered, making it an easier platform to maintain and upgrade them as needed compared to for example satellite based platforms and even terrestrial deployed networks. This quick deployment capability is crucial for Greenland, where harsh weather conditions can complicate the maintenance and repair of fixed infrastructure. Unlike satellites that require expensive and complex launches or submarine cables that involve extensive underwater laying and maintenance efforts, drones offer a more flexible and manageable solution. – Drones can also establish secure, line-of-sight communication links that are less susceptible to interception and jamming. Operating closer to the ground compared to satellites allows the use of higher frequencies narrower beams that are more difficult to jam. Additionally, drones can employ advanced encryption and frequency-hopping techniques to further secure their communications, ensuring that sensitive data remains protected. Stratospheric drones can also be equipped with advanced surveillance and countermeasure technologies to detect and respond to threats. For instance, they can carry sensors to monitor the electromagnetic spectrum for jamming attempts and deploy countermeasures to mitigate these threats. This proactive defense capability enhances their security profile compared to passive communication infrastructure like satellites or cables. – From a Greenlandic perspective, stratospheric drones offer significant advantages. They can be deployed over specific areas of interest, providing targeted communication coverage for remote or strategically important regions. This is particularly useful for covering Greenland’s vast and sparsely populated areas. Modern stratospheric drones are designed to support multi-dimensional payloads, or as it might also be called, payload agnostic (e.g., SIGINT & IMINT equipment, 5G base station and advanced antenna, laser communication systems, …) and stay operational for extended periods, ranging from weeks to months, ensuring sustained communication coverage without the need for frequent replacements or maintenance. – Last but not least, Greenland may be an ideal safe testing ground due to its vast, remote and thinly populated regions.
Figure 16 illustrates a Non-Terrestrial Network consisting of a stratospheric High Altitude Platform (HAP) drone-based constellation providing terrestrial Cellular broadband services to terrestrial mobile users delivered to their normal 5G terminal equipment that may range from smartphone and tablets to civil and military IOT networks and devices. Each hexagon represents a beam inside the larger coverage area of the stratospheric drone. One could assign three HAPs to cover a given area to deliver very high-availability services to a rural area. The operating altitude of a HAP constellation is between 10 and 50 km, with an optimum of around 20 km. It is assumed that there is inter-HAP connectivity, e.g., via laser links. Of course, it is also possible to contemplate having the gNB (full 5G radio node) in the stratospheric drone entirely, allowing easier integration with LEO satellite backhauls, for example. There might even be applications (e.g., defense, natural & unnatural disaster situations, …) where a standalone 5G SA core is integrated.
Unmanned Underwater Vehicles (UUV), also known as Autonomous Underwater Vehicles (AUV), are obvious systems to deploy for underwater surveillance & monitoring that may also have obvious dual-use purposes (e.g., fisheries & resource management, iceberg tracking and navigation, coastal defense and infrastructure protection such as for submarine cables). Depending on the mission parameters and type of AUV, the range is between up to 100 kilometers (e.g., REMUS100) to thousands of kilometers (e.g., SeaBed2030) and an operational time (endurance) from max. 24 hours (e.g., REMUS100, Bluefin-21), to multiple days (e.g., Boing Echo Voyager), to several months (SeaBed2030). A subset of this kind of underwater solution would be swarm-like AUV constellations. See Figure 17 below for an illustration.
Increase RD&T (Research, Development & Trials) on Arctic Internet of Things (A-IOT) (note: require some level of coverage, minimum satellite) for civil, defense/military (e.g., Military IOTnor M-IOT) and dual-use applications, such as surveillance & reconnaissance, environmental monitoring, infrastructure security, etc… (note: IOTs are not only for terrestrial use cases but also highly interesting for aquatic applications in combination with AUV/UUVs). Military IoT refers to integrating IoT technologies tailored explicitly for military applications. These devices enhance operational efficiency, improve situational awareness, and support decision-making processes in various military contexts. Military IoT encompasses various connected devices, sensors, and systems that collect, transmit, and analyze data to support defense and security operations. In the vast and remote regions of Greenland and the Arctic, military IoT devices can be deployed for continuous surveillance and reconnaissance. This includes using drones, such as advanced HAPS, equipped with cameras and sensors to monitor borders, track the movements of ships and aircraft, and detect any unauthorized activities. Military IoT sensors can also monitor Arctic environmental conditions, tracking ice thickness changes, weather patterns, and sea levels. Such data is crucial for planning and executing military operations in the challenging Arctic environment but is also of tremendous value for the Greenlandic society. The importance of dual-use cases, civil and defense, cannot be understated; here are some examples: – Infrastructure Monitoring and Maintenance: (Military Use Case) IoT sensors can be deployed to monitor the structural integrity of military installations, such as bases and airstrips, ensuring they remain operational and safe for use. These sensors can detect stress, wear, and potential damage due to extreme weather conditions. These IoT devices and networks can also be deployed for perimeter defense and monitoring. (Civil Use Case) The same technology can be applied to civilian infrastructure, including roads, bridges, and public buildings. Continuous monitoring can help maintain these civil infrastructures by providing early warnings about potential failures, thus preventing accidents and ensuring public safety. – Secure Communication Networks – Military Use Case: Military IoT devices can establish secure communication networks in remote areas, ensuring that military units can maintain reliable and secure communications even in the Arctic’s harsh conditions. This is critical for coordinating operations and responding to threats. Civil Use Case: In civilian contexts, these communication networks can enhance connectivity in remote Greenlandic communities, providing essential services such as emergency communications, internet access, and telemedicine. This helps bridge the digital divide and improve residents’ quality of life. – Environmental Monitoring and Maritime Safety – Military Use Case: Military IoT devices, such as underwater sensor networks and buoys, can be deployed to monitor sea conditions, ice movements, and potential maritime threats. These devices can provide real-time data critical for naval operations, ensuring safe navigation and strategic planning. Civil Use Case: The same sensors and buoys can be used for civilian purposes, such as ensuring the safety of commercial shipping lanes, fishing operations, and maritime travel. Real-time monitoring of sea conditions and icebergs can prevent maritime accidents and enhance the safety of maritime activities. – Fisheries Management and Surveillance – Military Use Case: IoT devices can monitor and patrol Greenlandic waters for illegal fishing activities and unauthorized maritime incursions. Drones and underwater sensors can track vessel movements, ensuring that military forces can respond to potential security threats. Civil Use Case: These monitoring systems can support fisheries management by tracking fish populations and movements, helping to enforce sustainable fishing practices and prevent overfishing. This data is important for the local economy, which heavily relies on fishing.
Implement Distributed Acoustic Sensing (DAS) on submarine cables. DAS utilizes existing fiber-optic cables, such as those used for telecommunications, to detect and monitor acoustic signals in the underwater environment. This innovative technology leverages the sensitivity of fiber-optic cables to vibrations and sound waves, allowing for the detection of various underwater activities. This could also be integrated with the AUV and A-IOTs-based sensor systems. It should be noted that jamming a DAS system is considerably more complex than jamming traditional radio-frequency (RF) or wireless communication systems. DAS’s significant security and defense advantages might justify deploying more submarine cables around Greenland. This investment is compelling because of enhanced surveillance and security, improved connectivity, and strategic and economic benefits. By leveraging DAS technology, Greenland could strengthen its national security, support economic development, and maintain its strategic importance in the Arctic region.
Greenland should widely embrace autonomous systems deployment and technologies based on artificial intelligence (AI). AI is a technology that could compensate for the challenges of having a vast geography, a hostile climate, and a small population. This may, by far, be one of the most critical components of a practical security strategy for Greenland. Getting experience with autonomous systems in a Greenlandic and Arctic setting should be prioritized. Collaboration & knowledge exchange with Canadian and American universities should be structurally explored, as well as other larger (friendly) countries with Arctic interests (e.g., Norway, Iceland, …).
Last but not least, cybersecurity is an essential, even foundational, component of the securitization of Greenland and the wider Arctic, addressing the protection of critical infrastructure, the integrity of surveillance and monitoring systems, and the defense against geopolitical cyber threats. The present state and level of maturity of cybersecurity and defense (against cyber threats) related to Greenland’s critical infrastructure has to improve substantially. Prioritizing cybersecurity may have to be at the expense of other critical activities due to limited resources with relevant expertise available to businesses in Greenland). Today, international collaboration is essential for Greenland to develop strong cyber defense capabilities, ensure secure communication networks, and implement effective incident response plans. However, it is essential for Greenland’s security that a cybersecurity architecture is tailor-made to the particularities of Greenland and allows Greenland to operate independently should friendly actors and allies not be in a position to provide assistance.
Figure 17 Above illustrates an Unmanned Underwater Vehicle (UUV) near the coast of Greenland inspecting a submarine cable. The UUV is a robotic device that operates underwater without a human onboard, controlled either autonomously or remotely. In and around Greenland’s coastline, UUVs may serve both defense and civilian purposes. For defense, they can patrol for submarines, monitor underwater traffic, and detect potential threats, enhancing maritime security. Civilian applications include search & rescue missions, scientific research, where UUVs map the seabed, study marine life, and monitor environmental changes, crucial for understanding climate change impacts. Additionally, they inspect underwater infrastructure like submarine cables, ensuring their integrity and functionality. UUVs’ versatility makes them invaluable for comprehensive underwater exploration and security along Greenland’s long coast line. Integrated defense architectures may combine the UUV, Distributed Acoustic Sensor (DAS) networks deployed at submarine cables, and cognitive AI-based closed-loop security solutions (e.g., autonomous operation). Courtesy: DALL-E.
How do we frame some of the above recommendations into a context of securitization in the academic sense of the word aligned with the Copenhagen School (as I understand it)? I will structure this as the “Securitizing Actor(s),” “Extraordinary Measures Required,” and the “Geopolitical Implications”:
Example 1:Improving Communications networks as a security priority.
Securitizing Actor(s): Greenland’s government, possibly supported by Denmark and international allies (e.g., The USA’s Pituffik Space Base on Greenland), frames the lack of higher availability and reliable communication networks as an existential threat to national security, economic development, and stability, including the ability to defend Greenland effectively during a global threat or crisis.
Extraordinary Measures Required: Greenland can invest in advanced digital communication technologies to address the threat. This includes upgrading infrastructure such as fiber-optic cables, satellite communication systems, stratospheric high-altitude platform (HAP) with IMINT, SIGINT, and broadband communications payload, and 5G wireless networks to ensure they are reliable and can handle increased data traffic. Implementing advanced cybersecurity measures to protect these networks from cyber threats is also crucial. Additionally, investments in broadband expansion to remote areas ensure comprehensive coverage and connectivity.
Geopolitical Implications: By framing the reliability and availability of digital communications networks as a national security issue, Greenland ensures that significant resources are allocated to upgrade and maintain these critical infrastructures. Greenland may also attract European Union investments to leapfrogging the critical communications infrastructure. This improves Greenland’s day-to-day communication and economic activities and enhances its strategic importance by ensuring secure and efficient information flow. Reliable digital networks are essential for attracting international investments, supporting digital economies, and maintaining social cohesion.
Example 2: Geopolitical Competition in the Arctic
Securitizing Actor(s): The Greenland government, aligned with Danish and international allies’ interests, views the increasing presence of Russian and Chinese activities in the Arctic as a direct threat to Greenland’s sovereignty and security.
Extraordinary Measures Required: In response, Greenland can adopt advanced surveillance and defense technologies, such as Distributed Acoustic Sensing (DAS) systems to monitor underwater activities and Unmanned Aerial & Underwater Vehicles (UAVs & UUVs) for continuous aerial surveillance. Additionally, deploying advanced communication networks, including satellite-based systems, ensures secure and reliable information flow.
Geopolitical Implications: By framing foreign powers’ increased activities as a security threat (e.g., Russia and China), Greenland can attract NATO and European Union investments and support for deploying cutting-edge surveillance and defense technologies. This enhances Greenland’s security infrastructure, deters potential adversaries, and solidifies its strategic importance within the alliance.
Example 3: Cybersecurity as a National Security Priority.
Securitizing Actor(s): Greenland, aligned with its allies, frames the potential for cyber-attacks on critical infrastructure (such as power grids, communication networks, and military installations) as an existential threat to national security.
Extraordinary Measures Required: To address this threat, Greenland can invest in state-of-the-art cybersecurity technologies, including artificial intelligence-driven threat detection systems, encrypted communication channels, and comprehensive incident response frameworks. Establishing partnerships with global cybersecurity firms and participating in international cybersecurity exercises can also be part of the strategy.
Geopolitical Implications: By securitizing cybersecurity, Greenland ensures that significant resources are allocated to protect its digital infrastructure. This safeguards its critical systems and enhances its attractiveness as a secure location for international investments, reinforcing its geopolitical stability and economic growth.
Example 4: Arctic IoT and Dual-Use Military IoT Networks as a Security Priority.
Securitizing Actor(s): Greenland’s government, supported by Denmark and international allies, frames the lack of Arctic IoT and dual-use military IoT networks as an existential threat to national security, economic development, and environmental monitoring.
Extraordinary Measures Required: Greenland can invest in deploying Arctic IoT and dual-use military IoT networks to address the threat. These networks involve a comprehensive system of interconnected sensors, devices, and communication technologies designed to operate in the harsh Arctic environment. This includes deploying sensors for environmental monitoring, enhancing surveillance capabilities, and improving communication and data-sharing across military and civilian applications.
Geopolitical Implications: By framing the lack of Arctic IoT and dual-use military IoT networks as a national security issue, Greenland ensures that significant resources are allocated to develop and maintain these advanced technological infrastructures. This improves situational awareness and operational efficiency and enhances Greenland’s strategic importance by providing real-time data and robust monitoring capabilities. Reliable IoT networks are essential for protecting critical infrastructure, supporting economic activities, and maintaining environmental and national security.
THE DANISH DEFENSE & SECURITY AGREEMENT COVERING THE PERIOD 2024 TO 2033.
Recently, Denmark approved its new defense and security agreement for the period 2024-2033. This strongly emphasizes Denmark’s strategic reorientation in response to the new geopolitical realities. A key element in the Danish commitment to NATO’s goals includes a spending level approaching and possibly superseding the 2% of GDP on defense by 2030. It is not 2% for the sake of 2%. There really is a lot to be done, and as soon as possible. The agreement entails significant financial investments totaling approximately 190 billion DKK (or ca. 25+ billion euros) over the next ten years to quantum leap defense capabilities and critical infrastructure.
The defense agreement emphasizes the importance of enhancing security in the Arctic region, including, of course, Greenland. Thus, Greenland’s strategic significance in the current geopolitical landscape is recognized, particularly in light of Russian activities and Chinese expressed intentions (e.g., re: the “Polar Silk Road”). The agreement aims to strengthen surveillance, sovereignty enforcement, and collaboration with NATO in the Arctic. As such, we should expect investments to improve surveillance capabilities that would strengthen the enforcement of Greenland’s sovereignty. Ensuring that Greenland and Denmark can effectively monitor and protect its Arctic territories (together with its allies). The defense agreement stresses the importance of supporting NATO’s mission in the Arctic region, contributing to collective defense and deterrence efforts.
What I very much like in the new defense agreement is the expressed focus on dual-use infrastructure investments that benefit Greenland’s defense (& military) and civilian sectors. This includes upgrading existing facilities and enhancing operational capabilities in the Arctic that allow a rapid response to security threats. The agreement ensures that defense investments also bring economic and social benefits to Greenlandic society, consistent with a dual-use philosophy. In order for this to become a reality, it will involve a close collaboration with local authorities, businesses, and research institutions to support the local economy and create new job opportunities (as well as ensure that there is a local emphasis on relevant education to ensure that such investments are locally sustainable and not relying on an “army” of Danes and others of non-Greenlandic origin).
The defense agreement unsurprisingly expresses a strong commitment to enhancing cybersecurity measures as well as addressing hybrid threats in Greenland. This reflects the broader security challenges of the new technology introduction required, the present cyber-maturity level, and, of course, the current (and future expected) geopolitical tensions. The architects behind the agreement have also realized that there is a big need to improve recruitment, retention, and appropriate training within the defense forces, ensuring that personnel are well-prepared to operate in the Arctic environment in general and in Greenland in particular.
It is great to see that the Danish “Defense and Security Agreement” for 2024-2033 reflects the principles of securitization by framing Greenland’s security as an existential threat and justifying substantial investments and strategic initiatives in response. The focus of the agreement is on enhancing critical infrastructure, surveillance platforms, and international cooperation while ensuring that the benefits of the local economy align with the concept of securitization. That is to ensure that Greenland is well-prepared to address current and future security challenges and anticipated threats in the Arctic region.
The agreement underscores the importance of advanced surveillance systems, such as, for example, satellite-based monitoring and sophisticated radar systems as mentioned in the agreement. These technologies are deemed important for maintaining situational awareness and ensuring the security of Denmark’s territories, including Greenland and the Arctic region in general. In order to improve response times as well as effectiveness, enhanced surveillance capabilities are essential for detecting and tracking potential threats. Moreover, such capabilities are also important for search and rescue, and many other civilian use cases are consistent with the intention to ensure that applied technologies for defense purposes have dual-use capabilities and can also be used for civilian purposes.
There are more cyber threats than ever before. These threats are getting increasingly sophisticated with the advance of AI and digitization in general. So, it is not surprising that cybersecurity technologies are also an important topic in the agreement. The increasing threat of cyber attacks, particularly against critical infrastructure and often initiated by hostile state actors, necessitates a robust cybersecurity defense in order to protect our critical infrastructure and the sensitive information it typically contains. This includes implementing advanced encryption, intrusion detection systems, and secure communication networks to safeguard against cyber threats.
The defense agreement also highlights the importance of having access to unmanned systems or drones. There are quite a few examples of such systems as discussed in some detail above, and can be found in my more extensive article “Stratospheric Drones & Low Earth Satellites: Revolutionizing Terrestrial Rural Broadband from the Skies?“. There are two categories of drones that may be interesting. One is the unmanned version that typically is remotely controlled in an operations center at a distance from the actual unmanned platform. The other is the autonomous (or semi-autonomous) drone version that is enabled by AI and many integrated sensors to operate independently of direct human control or at least largely without real-time human intervention. Examples such as Unmanned Vehicles (UVs) and Autonomous Vehicles (AVs) are typically associated with underwater (UUV/UAV) or aerial (UAV/AAV) platforms. This kind of technology provides versatile, very flexible surveillance & reconnaissance, and defense platforms that are not reliant on a large staff of experts to operate. They are particularly valuable in the Arctic region, where harsh environmental conditions can limit the effectiveness of manned missions.
The development and deployment of dual-use technologies are also emphasized in the agreement. These technologies, which have both civilian and military applications, are necessary for maximizing the return on investment in defense infrastructure. It may also, at the moment, be easier to find funding if it is defense-related. Technology examples include advancements in satellite communications and broadband networks, enhancing military capabilities, and civilian connectivity, particularly how those various communications technologies can seamlessly integrate with one another is very important.
Furthermore, artificial intelligence (AI) has been identified as a transformative technology for defense and security. While AI is often referred to as a singular technology. However, it is actually an umbrella term that encompasses a broad spectrum of frameworks, tools, and techniques that have a common basis in models that are being trained on large (or very large) sets of data in order to offer various predictive capabilities of increasing sophistication. This leads to the expectation that, for example, AI-driven analytics and decision-making applications will enhance the operational efficiency and, not unimportantly, the quality of real-time decision-making in the field (which may or may not be correct and for sure may be somewhat optimistic expectations at least at a basic level). AI-enabled defense platforms or applications are likely to result in improved threat detection as well as being able to support strategic planning. As long as the risk of false outcomes is acceptable, such a system will enrich the defense systems and provide significant advantages in managing complex and highly dynamic security environments and time-critical threat scenarios.
Lastly, the agreement stresses the need for advanced logistics and supply chain technologies. Efficient logistics are critical for sustaining military operations and ensuring the timely delivery of equipment and supplies. Automation, real-time tracking, and predictive analytics in logistics management can significantly improve the resilience and responsiveness of defense operations.
AT THIS POINT IN MY GREENLANDIC JOURNEY.
In my career, I have designed, planned, built, and operated telecommunications networks in many places under vastly different environmental conditions (e.g., geography and climate). The more I think about building robust and highly reliable communication networks in Greenland, including all the IT & compute enablers required, the more I appreciate how challenging and different it is to do so in Greenland. Tusass has built a robust and reliable transport network connecting nearly all settlements in Greenland down to the smallest size. Tusass operates and maintains this network under some of the harshest environmental conditions in the world, with an incredible dedication to all those settlements that depend on being connected to the outside world and where a compromised connection may have dire consequences for the unconnected community.
Figure 18 Shows a coastal radio site in Greenland. It illustrates one of the frequent issues of the critical infrastructure being covered by ice as well as snow. Courtesy: Tusass A/S (Greenland),
Comparing the capital spending level of Tusass in Greenland with the averages of other Western European countries, we find that Tusass does not invest significantly more of its revenue than the telco industry’s country averages of many other Western European countries. In fact, its 5-year average Capex to Revenue ratio is close to the Western European country average (19% over the period 2019 to 2023). In terms of capital investments compared to the revenue generating units (RGUs), Tusass does have the highest level of 18.7 euros per RGU per month, based on a 5-year average over the period 2019 to 2023, in comparison with the average of several Western European markets, coming out at 6.6 euros per RGU per month, as shown in the chart below. This difference is not surprising when considering the available population in Greenland compared to the populations in the countries considered in the comparison. The variation of capital investments for Tusass also shows a much larger variation than other countries due to substantially less population to bear the burden of financing big capital-intensive projects, such as the deployment of new submarine cables (e.g., typically coming out at 30 to 50 thousand euros per km), new satellite connections (normally 10+ million euros depending on the asset arrangement), RAN modernization (e.g., 5G), and so forth … For example, the average absolute capital spend was 14.0±1.5 million euros between 2019 and 2022, while 2023 was almost 40 million euros (a little less than 4% of the annual defense and security budget of Denmark) due to, according with Tusass annual report, RAN modernization (e.g., 5G), satellite (e.g., Greensat) and submarine cable investments (initial seabed investigation). All these investments bring better quality through higher reliability, integrity, and availability of Greenland’s critical communications infrastructure although there are not a large population (e.g., millions) to spread such these substantial investments over.
Figure 19 In a Western European context, Greenland does not, on average, invest substantially more in telecom infrastructure relative to its revenues and revenue-generating units (i.e., its customer service subscriptions) despite having a very low population of about 57 thousand and an area of 2.2 million square kilometers, the size of Alaska and only 33% smaller than India. The chart shows the country’s average Capex to Revenue ratio and the Capex in euros per RGU per month over the last 5 years (2019 to 2023) for Greenland (e.g., Tusass annual reports) and Western Europe (using data from New Street Research).
The capital investments required to leapfrog Greenland’s communications network availability and redundancy scores beyond 70% (versus 53% and 44%, respectively, in 2023) would be very substantial, requiring both additional microwave connections (including redesigns), submarine cables, and new satellite arrangements, and new ground stations (e.g., to or in settlements with more than a population of 1,000 inhabitants).
Those investments would serve the interests of the Greenlandic society and that of Denmark and NATO in terms of boosting the defense and security of Greenland, which is also consistent with all the relevant parties’ expressed intent of securitization of Greenland. The required capital investments related to further leapfrogging the safety, availability, and reliability, above and beyond the current plans, of the critical communications infrastructure would be far higher than previously capital spend levels by Tusass (and Greenland) and unlikely to be economically viable using conventional business financial metrics (e.g., net present value NPV > 0 and internal rate of return IRR > a given hurdle rate). The investment needs to be seen as geopolitical relevant for the security & safety of Greenland, and with a strong focus on dual-use technologies, also as beneficial to the Greenlandic society.
Even with unlimited funding and financing to enhance Greenland’s safety and security, the challenging weather conditions and limited availability of skilled resources mean that it will take considerable time to successfully complete such an extensive program. Designing, planning and building a solid defense and security architecture meaningful to Greenlandic conditions will take time. Though, I am also convinced that there are already pieces of the puzzle operational today that is important any future work.
Figure 18 An aerial view of one of Tusass’s west coast sites supporting coastal radio as well as hosting one of the many long-haul microwave sites along the west coast of Greenland. Courtesy: Tusass A/S (Greenland).
RECOMMENDATIONS.
A multifaceted approach is essential to ensure that Greenland’s strategic and infrastructure development aligns with its unique geographical and geopolitical context.
Firstly, Greenland should prioritize the development of dual-use critical infrastructure and the supporting architectures that can serve both civilian and defense (& military) purposes. For example expanding and upgrading airport facilities (e.g., as is happening with the new airport in Nuuk), enhancing broadband internet access (e.g., as Tusass is very much focusing on adding more submarine cables and satellite coverage), and developing advanced integrated communication platforms like satellite-based and unmanned aerial systems (UAS), such as payload agnostic stratospheric high altitude platforms (HAPs). Such dual-use infrastructure platforms could bolster the national security. Moreover it could support economic activities that would improve community connectivity, and enhance the quality of life for Greenland’s residents irrespective of where they live in Greenland. There is little doubt that securing funding from international allies (e.g., European Union, NATO, …) and public-private partnerships will be crucial in supporting the financing of these projects. Also ensuring that civil and defense needs are met efficiently and with the right balance.
Additionally, it is important to invest in critical enablers like advanced monitoring and surveillance technologies for the security & safety. Greenland should in particular focus on satellite monitoring, Distributed Acoustic Sensing (DAS) on its submarine cables, and Unmanned Vehicles for Underwater and Aerial applications (e.g., UUVs & UAVs). Such systems will enable a more comprehensive monitoring of activities around and over Greenland. This would allow Greenland to secure its maritime routes, and protecting Greenland’s natural resources (among other things). Enhanced surveillance capabilities will also provide multi-dimensional real-time data for national security, environmental monitoring, and disaster response scenarios. Collaborating with NATO and other international partners should focus on sharing technology know-how, expertise in general, and intelligence that will ensure that Greenland’s surveillance capabilities are on par with global standards.
Tusass’s transport network connecting (almost) all of Greenland’s settlements is an essential and critical asset for Greenland. It should be the backbone for any dual-use enhancement serving civil as well as defense scenarios. Adding additional submarine cables and more satellite connections are important (on-going) parts of those enhancements and will substantially increase both the network availability, resilience and hardening to disruptions natural as well as man-made kinds. However, increasing the communications networks ability to fully, or even partly, function in case of network parts being cut off from a few main switching centers may be something that could be considered. With todays technologies might also be affordable to do and fit well with Tusass’s multi-dimensional connectivity strategy using terrestrial means (e.g., microwave connections), sub-marine cables and satellites.
Last but not least, considering Greenland’s limited human resources, the technologies and advanced platforms implemented must have a large degree of autonomy and self-reliance. This will likely only be achieved with solid partnerships and strong alliances with Denmark and other natural allies, including the Nordic countries in and near the Arctic Circle (e.g., Island, Faroe Island, Norway, Sweden, Finland, The USA, and Canada). In particular, Norway has had recent experience with the dual use of ad-hoc and private 5G networking for defense applications. Joint operation of UUV and UAVs integrated with DAS and satellite constellation could be operated within the Arctic Circle. Developing and implementing advanced AI-based technologies should be a priority. Such collaborations could also make these advanced technologies much more affordable than if only serving one country. These technologies can compensate for the sparse population and vast geographical challenges that Greenland and the larger Arctic Circle pose, providing efficient and effective infrastructure management, surveillance, and economic development solutions. Achieving a very high degree of autonomous operation of the multi-dimensional technology landscape required for leapfrogging the security of Greenland, the Greenlandic Society, and its critical infrastructure would be essential for Greenland to be self-reliant and less dependent on substantial external resources that may be problematic to guaranty in times of crisis.
By focusing on these recommendations, Greenland can enhance its strategic importance, improve its critical infrastructure resilience, and ensure sustainable economic growth while maintaining its unique environmental heritage.
Being a field technician in Greenland poses some occupational hazards that is unknown in most other places. Apart from the harsh weather, remoteness of many of the infrastructure locations, on many occasions field engineers have encountered hungry polar bears in the field. The polar bear is a very dangerous predator that is always on the look out for its next protein-rich meal.
Trym Eiterjord, “What the 14th Five-Year Plan says about China’s Arctic Interests”, The Arctic Institute, (November 2023). The link also includes references to several other articles related to the China-Arctic relationship from the Arctic Institute China Series 2023.
Deo, Narsingh. “Graph Theory with Applications to Engineering and Computer Science,” Dover Publications. This book is a reasonably accessible starting point for learning more about graphs. If this is new to you, I recommend going for the following Geeks for Geeks ” Introduction to Graph Data Structure” (April 2024), which provides a quick intro to the world of graphs.
The State Council Information Office of the People’s Republic of China, “China’s Arctic Policy”, (January 2018).
ACKNOWLEDGEMENT.
I greatly acknowledge my wife, Eva Varadi, for her support, patience, and understanding during the creative process of writing this article. I am incredible thankful to Tusass for providing many great pictures used in the post that illustrates the (good weather!) conditions that Tusass field technicians are faced with in the field working tirelessly on the critical communications infrastructure throughout Greenland. While the pictures shown in this post are really beautiful and breathtaking, the weather is unforgiven frequently stranding field workers for days at some of those remote site locations. Add to this picture the additional dangers of a hungry polar bear that will go to great length getting its weekly protein intake.