The State Versus the Internet

Email Print
FacebookTwitterShare

 

 
 

The power of
the state has always rested on two pillars: Force and legitimacy.
The Internet subverts them both. As for force, think about encrypted
commerce, as for legitimacy (the more important part), think about
the following:

  • It used
    to be that 98% of all news came out of two zip codes in Manhattan,
    produced by a more or less homogenous group of people. Now, it
    comes from everywhere. "Guys in pajamas" brought down
    the mighty Dan Rather.
  • When I began
    to wander among liberty people, not too many decades ago, the
    people who "got it" were mostly hyper-studious types
    in the largest American cities. Now they are found almost everywhere.
  • Events are
    recorded and can be verified across the globe in moments. The
    life-span of bad information is collapsing, and plenty of what
    used to be easy manipulation with it.
  • People are
    able to test their wild ideas in anonymous public conversations,
    shielded from shame. As a result, those ideas are improved, very
    many of which would never have been exposed without a protected
    place to speak from.
  • Collective
    identities and animosities ("those people are monsters; we
    must fight!") are collapsing as separated groups of people
    get to know each other via world-wide, nearly-free communication.

This is all
the result of the Internet, and all of it undermines the sanctity
and urgency of the state. And since the operators of states are
not stupid, they understand the threat and are moving aggressively
to conquer the Internet.

THE FIRST
STEPS

By now most
readers will be aware that governments world-wide are running mass
surveillance
operations. For example, it has been known for
years that the American NSA has been scarfing up all the Internet
and telephone traffic that AT&T could provide. Wired
magazine did a story on this back in 2006
, and many similar
stories have surfaced. Are we really to believe that Verizon, Google,
Yahoo, AOL and the rest have been heroically standing up to them
all the years since?

And, by the
way, just one of the NSA's new facilities (and the true number of
them is uncertain) is capable of storing ten years' worth of world
Internet traffic. It can also sort and search it.

Many readers
will also understand that even independent Internet Service Providers
have been brought into obedience by the various national law enforcement
departments. With rare
exceptions
, the enforcers get whatever records they want, when
they want them.

The important
point here is that these steps have already been taken: The battles
are over and the states have won. The ISPs are under control and
states are copying, saving and sorting a large portion of the world's
Internet traffic.

One other step
has been the conversion of Google from a clever new company to a
major cog in the state's apparatus. I won't spend a lot of time
on this, but you really should be aware of some recent quotes from
Google's boss, Eric Schmidt:

We can predict
where you are going to go Tuesday morning.

Show us 14
photos of yourself and we can identify who you are. You think
you don’t have 14 photos of yourself on the internet? You’ve got
Facebook photos!

The only
way to manage this is true transparency and no anonymity. In a
world of asynchronous threats, it is too dangerous for there not
to be some way to identify you. We need a name service for people.
Governments will demand it.

Yeah, it's
that bad. Google is aggressively positioning itself to end up owning
the Internet, or at least a major share of it. But, that is a long
story I will pass up for the moment.

WHAT'S HAPPENING
NOW

For most of
this article, I'll focus on what states are doing now. I'll pay
special attention to the US, ironically enough, because more information
surfaces there, and, of course, since they are at the head of the
field. But do not let yourself think that the US is special in this
regard — most of the others are doing the same things.

Also please
bear in mind that we will be discussing things that are planned,
but not yet finalized. Some of these plans may fail. But even if
they do, the record indicates that substantially all failures will
be followed with vigorous new attempts.

OBAMA'S
NEW PLAN

Just a few
weeks ago, the New York Times broke the news that the White
House, their "Internet Czar," the FBI and others had a
new plan to wiretap
the Internet
. It is expected to be in front of Congress next
year. This plan would force every product and service provider to
redesign their products to give governments a back-door, so they
can listen in whenever they want. That means that Blackberry, iPhone,
Facebook, Skype and everyone else has to redesign their products.
It also means that smaller operations will have to fold up: very
few of them can just dump their existing systems and crank out new
ones. Only the large will remain, and only if they bow to the state.

When discussing
the bill, various state officials reminded reporters that everything
would be "lawful." (Which ceased being a meaningful term
quite a while back, IMO.) They also claimed that providers could
still give their customers strong encryption. "They can promise
strong encryption," said the FBI's General Counsel, Caproni,
"They just need to figure out how they can provide us plain
text." So, the provider must decrypt for the FBI as well.

Once such a
law is in place, no service is even nominally safe, and a great
many are likely to simply close. But the big, politically-connected
companies will remain.

Bear in mind
that once the capability is in place for the US, everyone else will
jump aboard, since "the ability is already there." And,
it will also u2018be there' for lots of crooks, who always find ways
to get their hands on useful information… like back-doors into all
those Blackberries. Try to imagine what you could do with all that
information.

THE INTERNET
KILL SWITCH

This is a recent
development that will almost certainly become law. The Protecting
Cyberspace as a National Asset Act gives Obama, all who succeed
him, and before long almost every other ruler on the planet, an
Internet "kill switch." And, yes, this can be done.

The bill relies
for its "lawfulness" on a 76-year-old piece of legislation
called The Communications Act of 1934, which gives the president
power to cause "the closing of any facility or stations for
wire communication" in a time of war. Can you see why talk
of "cyber-war" came up at the same time as this bill?

Cyber-war —
to digress for a moment — is still more of a meme than a reality.
Stuxnet, for example, is spread primarily with USB sticks and attacks
only special devices called PLCs, which are more intelligent-motor-starter
than Internet terminal. That program had to have been built and
tested on other PLCs, which was a completely different operation
than writing an Internet Trojan. But, back to our new law…

This law would
establish a White House Office for Cyberspace Policy and a National
Center for Cybersecurity and Communications, which would work with
private US companies to "create cybersecurity requirements
for the electrical grid, telecommunications networks and other critical
infrastructure." Any operation of the Kill Switch would be
limited to 120 days, but could, of course, by extended by Congress.

Note two things
about this:

  1. The technical
    method of implementation is not in the bill, so it can be whatever
    "experts" decide.
  2. The requirements
    will be applied to "critical infrastructure."

We'll cover
the concept of "critical infrastructure" first and talk
about implementation below. In actual fact, the utilities that are
designated as critical use the primary backbones of the Internet
as the central portions of their "infrastructure." (Backbones
are the very largest Internet links.) To make things worse, a special
electronic technique called Multi-Protocol Label Switching (MPLS)
more or less pools many backbone fibers into one large virtual fiber.
So, the ability to shut something down will involve control of the
larger "virtual fiber," not just a single "bad fiber."
And, of course, the NSA will be seeing to all of this.

The bill was
unanimously approved in a Senate committee in June. The likely future
is for Congress to wait until something "cyber" goes wrong,
then to pass it while the fear and pressure are high.

In response,
civil libertarians are certain to write strong letters.

BORDER GATEWAY
PROTOCOLS

As mentioned
earlier, the precise methods of switching off parts of the Internet
are not specified in legislation, but will be decided by "experts."
The likely way for them to do this is with an updated version of
some primary Internet software called Border Gateway Protocol
(BGP).

We often say
that the Internet is decentralized, which is more or less true,
but it is not atomized. There are perhaps a few thousand
large units called Autonomous Systems (AS) that make-up the
Internet, and they relate to each other with Border Gateway Protocols.

BGP is, essentially,
a type of "handshake" protocol: I acknowledge you,
do you acknowledge me? Who is connected beyond you? The problem
with BGP is that it is not verifiable. This isn't a big problem
— as we know, the Internet works just fine nearly every day — but
on
rare occasion something does go wrong
. From a controller's standpoint,
however, BGP is a huge problem, because it cannot be grasped at
a single point.

Enter SecureBGP
(BGPSEC) Under this scheme, key exchanges between border gateway
routers are involved, to verify that the other router is who it
says it is. The problem here is that someone will want to be the
official key creator and holder… which means the state. And the
US government is working very hard to build this
. (They already
have a domain name version called DNSSec.)

If the key
certificate authority for BGPSEC is anything like SSL certificate
authorizers, then each layer of key provider will control the keys
below it. That means that specific servers or groups of servers
can be disconnected from the Internet within minutes. But even if
that type of hierarchy is not part of the code, it is close to certain
that AS groups will comply with orders, especially if disobedience
means they will be shut down entirely.

So, yes, the
Internet Kill Switch will work, sorry to say.

Not only are
states involved in this type of policing, but large contractors
are running mass surveillance operations to identify file-sharers
as well. One big reason for this, of course, is that media companies
are in trouble, and they are far too valuable to control-types to
lose. Media and advertisers are, in the final analysis, both the
creators and the insertion points for ideas and images into popular
discourse — thoughts that are merely adopted, rather than
vetted and considered. (Another longish discourse will be passed
over at this point.)

"Three
strikes" is the term used to described the disconnect process
usually applied to these plans. It is based on the American legal
concept of "three strikes and you're out." On the third
offense, you are disconnected for good.

THE COMPUTER
HEALTH CERTIFICATE

This is an
idea that pops-up from time to time, most
recently by Microsoft
. The concept is that some group is given
access to every private computer and can scan them all to assure
that they are "sanitary." If they are, they get access
to the Internet, if not, they are cut off. Spend a moment thinking
about the power that this would give the scanning authority.

Will this become
law? Probably not now, but when fear is stoked after something bad
happens? It could.

CLOUD COMPUTING

Cloud computing
offers some attractive features, but is also involves a serious
centralization of the Internet. Rather than having millions of intelligent
nodes, it brings thousands at a time into single data centers —
one large handle to grab, where there were formerly thousands of
small ones.

And again,
this gives power to the large and politically-connected and crushes
the small and independent.

Centralizing
the Internet would be a horrible thing in many ways, including for
Systems Administrators, 80% of whom would probably be unnecessary
in a strong cloud environment.

THE ANTI-CRYPTO
WAR RETURNS

In the past
few years, anti-crypto laws have returned (more in the UK and EU
than in the US). Several people are already in jail for not divulging
their crypto-keys. And, in what was primarily a publicity stunt,
the
NSA offered massive rewards to anyone who could break Skype.

(Skype was already compliant with law enforcement orders.)

This is moving
forward under the name of Source Telecom Surveillance. What will
become of it is unknowable at this time.

WHAT IT
ALL MEANS

Multiple avenues
of controlling every Internet user are being pursued, and many of
them are quite potent.

On another
side, the consumer Internet is slowly turning into a thousand new,
interactive TV channels. Most of the new applications are highly
insecure, which means they are either monitored already or easily
could be. In effect, people are plugging into the Matrix, one convenience
at a time. I know that sounds hyper-dramatic, but I know of no better
way to describe the situation.

At the end
of the line, we end up with a Welfare State being replaced by a
Security-Industrial Complex. It looks to feature some minimal layer
of welfare, lots of entertainment, and lots of fear and enforcers.
In other words, a lot like life in the late Roman Empire, but wired.

YOUR CALL

I leave all
of this for your consideration. I have no master plan to offer you.
But the enemies of the Internet are exercising both will and action.
What are we doing?

October
16, 2010

Paul
Rosenberg [send him
mail
] is the CEO of Cryptohippie
USA
, the leading provider of Internet anonymity.

Email Print
FacebookTwitterShare
  • LRC Blog

  • LRC Podcasts