麻豆果冻传媒

In Short

Here Come the Internet Blackouts

Internet Blackouts
CLIPAREA Custom media / Shutterstock.com

On the first day of the new year, the Democratic Republic of Congo internet connections and SMS services nationwide鈥攆or the second day in a row. The reason? To avoid the 鈥渃haos鈥 that might result from its presidential election results. Not even a week later, on January 7, Gabon鈥檚 government after an attempted coup. And it鈥檚 unlikely that these will be the last 鈥渋nternet blackouts鈥 we hear about over the coming months. (Both incidents, ironically, took place after I outlined this piece.)

In fact, we鈥檒l likely see a rise in internet blackouts in 2019, for two reasons: countries deliberately 鈥渢urning off鈥 the internet within their borders, and hackers disrupting segments of the internet with distributed denial-of-service (DDoS) attacks. Above all, both will force policymakers everywhere to reckon with the fact that the internet itself is increasingly becoming centralized鈥攁nd therefore increasingly vulnerable to manipulation, making everyone less safe.

The first method鈥攕tates deliberately severing internet connections within their country鈥攈as an important history. In 2004, the Maldivian government when citizens protested the president; Nepal similarly shortly thereafter. In 2007, the Burmese government apparently in order to 鈥渟taunch the flow of pictures and messages from protesters reaching the outside world.鈥 In 2011, Egypt within its borders as the government against then-President Hosni Mubarak; Libya then after its own unrest. In 2014, Syria had a amid its civil war. In 2018, Mauritania was when undersea submarine internet cables were cut, around the same time as the Sierra Leone government an internet blackout in the same region.

When we think about terms like 鈥渃yberspace鈥 and 鈥渋nternet,鈥 it can be tempting to associate them with vague notions of a digital world we can鈥檛 touch. And while this is perhaps useful in some contexts, this line of thinking forgets the very real wires, servers, and other hardware that form the architecture of the internet. If these physical elements cease to function, from a cut wire to a storm-damaged server farm, the internet, too, is affected. More than that, if a single entity controls鈥攐r can at least access鈥攖hat hardware for a region or even an entire country, government-caused internet blackouts are a tempting method of censorship and social control.

Which is to say: As countries control of the internet within their borders, we can expect to see some governments with relatively centralized internets鈥攑articularly authoritarians or those with authoritarian leanings鈥攍iterally disconnect their domestic internet networks from the rest of the globe during domestic unrest or other incidents.

As for the second method, we can expect a rise in DDoS attacks against internet infrastructure as millions of wildly insecure Internet of Things (IoT) devices鈥攆rom smart thermostats to water-pressure sensors鈥攁re linked online. As , IoT devices typically have terrible security features, such as basic passwords and minimal encryption. Put another way, they鈥檙e not hard to hack. So, by compromising these devices en masse and turning them into a 鈥渂otnet鈥 army, hackers can completely overwhelm segments of the internet, channeling traffic to a single service until it鈥檚 overwhelmed and can no longer function.

If that sounds far-fetched, recall what happened in 2016, when the so-called botnet took over hundreds of thousands of IoT devices, spread across , and used them to flood traffic to the servers of the American internet company Dyn. At the time, it was the largest known DDoS attack on Earth; Twitter, Spotify, SoundCloud, Reddit, and a were temporarily unavailable as a result. In other words, Mirai effectively took down part of the American internet.

Democratic governments in the United States, Europe, and elsewhere typically don鈥檛 exert control over major internet gateways or internet servers; it鈥檇 therefore be quite unlikely for them to cause a partial internet blackout themselves. Add to this the fact that the internet in the United States isn鈥檛 as centralized as it is in other countries, and it becomes clear why it鈥檚 harder to control all its major gateways to the global network at once, like Egypt did in 2011.

But even if a government can鈥檛 easily disconnect its whole country from the worldwide internet, Mirai demonstrated just how effectively third-party malicious actors can take down segments of a country鈥檚 internet.

In principle, policymakers have long argued that neither of the aforementioned scenarios was possible due largely to the internet鈥檚 decentralization. More and more, though, the internet has become centralized in countries where the government has controlled the buildout of infrastructure and where there鈥檚 little market competition for internet services; and even in countries with better market competition for internet services, and with less government control of infrastructure, there are still pockets that remain centralized and vulnerable鈥攁s demonstrated by the Mirai botnet attack against American internet company Dyn.

All this matters for a few reasons. For one, democratic policymakers, in particular, will have to think more about cyber norms in the context of internet manipulation (i.e., disconnecting your country from the global network), (i.e., hacking into another nation鈥檚 computer systems). Several events in 2018 already made this fact clear, like when American internet traffic was once again and underscored the vulnerability of core internet functions to manipulation. A sovereign and controlled model of the internet is spreading, and democracies must effectively fight it through, among other things, norms on and around the internet.

Two, the rising threat of botnets will create more pressure within the United States to generate technical standards for IoT devices. Currently, there exist for 鈥渕inimum security鈥 on these devices, which means that many industry organizations and government agencies are that have terrible security; this not only poses vulnerability to and opens wearable-wearing government personnel to , but it also means that the IoT market is flooded with devices that can be easily hijacked in service of DDoS attacks. Building these standards will give companies and government agencies guidance in building and acquiring IoT devices, which in turn will bolster their security.

Finally, countries will have to take greater international action against botnets as a cybersecurity threat. As Jason Healey and Robert Knake wrote in a recent Council on Foreign Relations , DDoS attacks via scores of hijacked IoT devices can 鈥渃ause serious harm by allowing foreign governments to stifle free speech abroad and enabling them to shut down countries鈥 domestic networks or even the internet globally.鈥 Further, explains a from the Council to Secure the Digital Economy, these incidents undermine 鈥渇undamental confidence and trust in the digital economy鈥 that depends on reliable availability and performance of internet services.

So, whether national or regional, caused by governments or hackers, internet blackouts are likely going to increase in frequency over the coming months鈥攁nd their harms will take many forms. But recent IoT hacks, a history of internet disconnections around the world, and an even longer history of DDoS attacks, collectively, give us a sign of what鈥檚 to come. Policymakers would be wise to pay attention.

More 麻豆果冻传媒 the Authors

Justin Sherman
Justin Sherman

Programs/Projects/Initiatives

Topics

Here Come the Internet Blackouts