Internet kill switch
   HOME

TheInfoList



OR:

An Internet kill switch is a
countermeasure A countermeasure is a measure or action taken to counter or offset another one. As a general concept, it implies precision and is any technological or tactical solution or system designed to prevent an undesirable outcome in the process. The fi ...
concept of activating a single shut off mechanism for all
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
traffic. The concept behind having a kill switch is based on creating a single point of control (i.e. a switch) for a single authority to control or shut down the Internet in order to protect it or its users. In the United States, groups such as the
American Civil Liberties Union The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". T ...
have criticized proposals for implementing the idea so far.


China

China has completely shut down Internet service in the autonomous region of
Xinjiang Xinjiang, SASM/GNC: ''Xinjang''; zh, c=, p=Xīnjiāng; formerly romanized as Sinkiang (, ), officially the Xinjiang Uygur Autonomous Region (XUAR), is an autonomous region of the People's Republic of China (PRC), located in the northwest ...
for almost a year after the July 2009 Ürümqi riots.


Egypt

On January 27, 2011, during the Egyptian Revolution of 2011, the government of President Hosni Mubarak cut off access to the Internet by all four national ISPs, and all mobile phone networks. This version of a kill switch was effected by a government-ordered shutdown of the Egyptian-run portion of the
Domain Name System The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned t ...
, and
Border Gateway Protocol Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet. BGP is classified as a path-vector routing protocol, and it make ...
(BGP), making transmission of Internet traffic impossible for Egyptian ISPs. All network traffic ceased within two hours, according to
Arbor Networks Arbor Networks is a software company founded in 2000"Arbor Netwo ...
.


India

India sometimes terminates Internet connections in
Kashmir and north eastern states.


Iran

The Iranian Government activated the internet kill switch during the 2019-2020 Iranian Protests to prevent the organization of new protests and riots.


Turkey

In June 2016, Turkey introduced an Internet kill switch law permitting authorities to "partially or entirely" suspend Internet access due to wartime measures, national security or public order. The mechanism came to attention when Internet monitoring group Turkey Blocks detected a nationwide slowdown affecting several social network services on the eve of a major offensive during the 2016 Turkish military intervention in Syria. Similar Internet restrictions had previously been implemented during national emergencies to control the flow of information in the aftermath of terrorist attacks, originally without any clear legal grounding.


United Kingdom

In the United Kingdom, the
Communications Act 2003 The Communications Act 2003 is an Act of the Parliament of the United Kingdom. The act, which came into force on 25 July 2003, superseded the Telecommunications Act 1984. The new act was the responsibility of Culture Secretary Tessa Jowell. It ...
and the
Civil Contingencies Act 2004 The Civil Contingencies Act 2004 (c. 36) is an Act of the Parliament of the United Kingdom that makes provision about civil contingencies. It also replaces former Civil Defence and Emergency Powers legislation of the 20th century. Background to ...
allow the
Secretary of State for Culture, Media and Sport The secretary of state for digital, culture, media and sport, also referred to as the culture secretary, is a Secretary of State (United Kingdom), secretary of state in the Government of the United Kingdom, with overall responsibility for strateg ...
to suspend Internet services, either by ordering Internet service providers to shut down operations or by closing
Internet exchange point Internet exchange points (IXes or IXPs) are common grounds of IP networking, allowing participant Internet service providers (ISPs) to exchange data destined for their respective networks. IXPs are generally located at places with preexisting ...
s. A representative of the
Department for Culture, Media and Sport , type = Department , logo = Department for Digital, Culture, Media and Sport logo.svg , logo_width = , logo_caption = , seal = , seal_width = , seal_caption = , picture = Gove ...
said in 2011 that: Dr. Peter Gradwell, a trustee of the
Nominet Trust Nominet UK is currently delegated by IANA to be the manager of the .uk domain name. Nominet directly manages registrations directly under .uk, and some of the second level domains .co.uk, .org.uk, .sch.uk, .me.uk, .net.uk, .ltd.uk and .plc.uk. ...
, criticized the provisions in the Communications Act:


United States


History

The prospect of cyberwarfare during the 2000s has prompted the drafting of legislation by US officials, but worldwide the implications of actually "killing" the Internet has prompted criticism of the idea in the United States. During the Arab Spring in
Tunisia ) , image_map = Tunisia location (orthographic projection).svg , map_caption = Location of Tunisia in northern Africa , image_map2 = , capital = Tunis , largest_city = capital , ...
,
Egypt Egypt ( ar, مصر , ), officially the Arab Republic of Egypt, is a transcontinental country spanning the northeast corner of Africa and southwest corner of Asia via a land bridge formed by the Sinai Peninsula. It is bordered by the Medit ...
, and
Libya Libya (; ar, ليبيا, Lībiyā), officially the State of Libya ( ar, دولة ليبيا, Dawlat Lībiyā), is a country in the Maghreb region in North Africa. It is bordered by the Mediterranean Sea to the north, Egypt to the east, Suda ...
access to the Internet was deniedDainotti et al.
''Analysis of Country-wide Internet Outages Caused by Censorship''
ACM, 2011
in an effort to limit peer networking to facilitate organization. While the effects of shutting off information access are controversial, the topic of a kill switch does remain to be resolved.


Communications Act of 1934

The Communications Act of 1934 established the US federal government’s regulation of electronic communications by the
Federal Communications Commission The Federal Communications Commission (FCC) is an independent agency of the United States federal government that regulates communications by radio, television, wire, satellite, and cable across the United States. The FCC maintains jurisdicti ...
(FCC). This act, created by the
Franklin D. Roosevelt Franklin Delano Roosevelt (; ; January 30, 1882April 12, 1945), often referred to by his initials FDR, was an American politician and attorney who served as the 32nd president of the United States from 1933 until his death in 1945. As the ...
administration, gave the president powers of control over the media under certain circumstances. This act was the basis of regulatory power for the executive branch of the government to control electronic communications in the United States.


Telecommunications Act of 1996

Presidential Decision Directive 63 (PDD-63), signed in May 1998, established a structure under White House leadership to coordinate the activities of designated lead departments and agencies, in partnership with their counterparts from the private sector, to "eliminate any significant vulnerability to both physical and cyber attacks on our critical infrastructures, including especially our cyber systems".


Proposed Protecting Cyberspace as a National Asset Act of 2010

On June 19, 2010, Senator
Joe Lieberman Joseph Isadore Lieberman (; born February 24, 1942) is an American politician, lobbyist, and attorney who served as a United States senator from Connecticut from 1989 to 2013. A former member of the Democratic Party, he was its nominee for ...
(I-CT) introduced the Protecting Cyberspace as a National Asset Act, which he co-wrote with Senator
Susan Collins Susan Margaret Collins (born December 7, 1952) is an American politician serving as the senior United States senator from Maine. A member of the Republican Party, she has held her seat since 1997 and is Maine's longest-serving member of Con ...
(R-ME) and Senator Thomas Carper (D-DE). If signed into law, this controversial bill, which the American media dubbed the kill switch bill, would have granted the President emergency powers over the Internet. Other parts of the bill focused on the establishment of an Office of Cyberspace Policy and on its missions, as well as on the coordination of cyberspace policy at the federal level. The
American Civil Liberties Union The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". T ...
(ACLU) criticized the scope of the legislation in a letter to Senator Lieberman signed by several other civil liberty groups. Particularly, they asked how the authorities would classify what is critical communications infrastructure (CCI) and what is not, and how the government would preserve the right of free speech in cybersecurity emergencies. An automatic renewal provision within the proposed legislation would keep it going beyond thirty days. The group recommended that the legislation follows a strict First Amendment scrutiny test. All three co-authors of the bill subsequently issued a statement claiming that the bill "
arrowed ''Homestar Runner'' is an American Flash animated comedy web series and website created by Mike and Matt Chapman, known collectively as The Brothers Chaps. The series centers on the adventures of a large and diverse cast of characters, headed by ...
existing broad Presidential authority to take over telecommunications networks", and Senator Lieberman contended that the bill did not seek to make a 'kill switch' option available ("the President will never take over – the government should never take over the Internet"), but instead insisted that serious steps had to be taken in order to counter a potential mass scale cyber attack. The Protecting Cyberspace as a National Asset Act of 2010 expired at the end of the 2009–2010 Congress without receiving a vote from either chamber.


Implementation issues

There are several issues that may prevent a system to be established in the United States. The
Telecommunications Act of 1996 The Telecommunications Act of 1996 is a United States federal law enacted by the 104th United States Congress on January 3, 1996, and signed into law on February 8, 1996, by President Bill Clinton. It primarily amended Chapter 5 of Title 47 of ...
deregulated the telecommunications market and allowed for the growth of data carrier services. Since the
Federal Communications Commission The Federal Communications Commission (FCC) is an independent agency of the United States federal government that regulates communications by radio, television, wire, satellite, and cable across the United States. The FCC maintains jurisdicti ...
(FCC) does not require registration of a company as an
Internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privat ...
(ISP), there are only estimates available based on publicly available data. The FCC estimated in April 2011 that there were over 7,800 ISPs operating in the United States. This makes implementation of a kill switch that much more difficult: each company would have to voluntarily comply. There is no law that gives the United States authority over an ISP without a court order. A court order is not necessarily the solution either. Even if an ISP is forced by court order, the attack may have already taken place and the prophylactic methods too late in implementing. There are thousands of ISPs and since they do not have to register, there is no known way of contacting them in time and forcing the ISP to comply. The regulations that the United States uses to regulate the information and data industry may have inadvertently made a true "Internet kill switch" impossible. The lack of regulation allowed for building of a patch-work system (ISPs, Internet backbone) that is extremely complex and not fully known. In the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territori ...
, there are strong citizen and business protection systems. There is redress of grievances allowed to the courts or administrative authority. There is also the need for a court order for the government to shut off services. In addition to these fairly large roadblocks, there are human rights groups such as the ACLU, Amnesty International, and others. All of these reasons make implementing the Internet kill switch difficult.


Policy issues

Two key policy issues are whether or not the United States has the right constitutionally to restrict or cut off access to the Internet, and whether this might open end users to hackery. The powers granted to the presidency starting with the Communications Act of 1934 seem to be adequate in dealing with this threat, and is one of the major criticisms of legislation determined to regulate this question. The next most important question is whether or not the United States even need this legislation or it would chip away at individual liberties. The trade offs are apparent – if the government can control information online then it can limit access to information online. One of the biggest problems with the theory is what to classify as critical communications infrastructure and what to leave out. Legislators have to take into account the cost of shutting down the Internet, if it is even possible. The loss of the network for even a day could cost billions of dollars in lost revenue. The National Cybersecurity Center was set up to deal with these questions, to research threats and design and recommend prophylactic methods. In many ways, the integration of networked
computer-mediated communication Computer-mediated communication (CMC) is defined as any human communication that occurs through the use of two or more electronic devices. While the term has traditionally referred to those communications that occur via computer-mediated format ...
systems into users' business and personal lives means that potential cybersecurity threats are increasing along with the potential problem of protecting a wide class of products, such as the Internet of things. Utility systems can be monitored and controlled remotely and no longer require the physical presence of a maintainer. So the issue of what an Internet kill switch could affect is growing steadily. The 2009 White House Assessment stated that there needed to be more work done on this issue and the National Cybersecurity Center was created to handle security issues. It is not publicly known at this point if the Center has a policy regarding asserting control of the national networks.


Zimbabwe

On January 15, 2019, internet monitoring group NetBlocks reported the blocking of over a dozen social media platforms in
Zimbabwe Zimbabwe (), officially the Republic of Zimbabwe, is a landlocked country located in Southeast Africa, between the Zambezi and Limpopo Rivers, bordered by South Africa to the south, Botswana to the south-west, Zambia to the north, and ...
followed by a wider internet blackout amid protests over the price of fuel. The first three days of the disruption cost the Zimbabwe's economy an estimated $17 million as the government extended its disruption to a full shutdown to prevent the use of
VPN A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
circumvention tools by demonstrators.


See also

* * *


References

{{DEFAULTSORT:Internet Kill Switch Safety switches Internet censorship Internet outages