Internet kill switch
Encyclopedia
The Internet kill switch is a subset of the article kill switch
Kill switch
Kill switch, also called an e-stop, is a security measure used to shut off a device in an emergency situation in which it cannot be shut down in the usual manner...

 which deals with mechanical and electronic switching mechanisms
Electronic switch
In electronics, an electronic switch is an electronic component or device that can switch an electrical circuit, interrupting the current or diverting it from one conductor to another....

. This article is about Cybercrime and Countermeasures
Cybercrime and Countermeasures
Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet...

 and the concept of activating a single shut off mechanism for all Internet traffic. The theory behind a kill switch is creation of a single point of control for one authority or another to control in order to “shut down the internet to protect it” from unspecified assailants.

The prospect of Cyber Warfare over the 2000s has prompted the drafting of legislation by US officials, but worldwide the implications of actually of "killing" the Internet has prompted criticism of the idea in the United States. During the 2011 2010–2011 Middle East and North Africa protests
2010–2011 Middle East and North Africa protests
The Arab Spring , otherwise known as the Arab Awakening, is a revolutionary wave of demonstrations and protests occurring in the Arab world that began on Saturday, 18 December 2010...

 in Tunisia
Tunisia
Tunisia , officially the Tunisian RepublicThe long name of Tunisia in other languages used in the country is: , is the northernmost country in Africa. It is a Maghreb country and is bordered by Algeria to the west, Libya to the southeast, and the Mediterranean Sea to the north and east. Its area...

, Egypt
Egypt
Egypt , officially the Arab Republic of Egypt, Arabic: , is a country mainly in North Africa, with the Sinai Peninsula forming a land bridge in Southwest Asia. Egypt is thus a transcontinental country, and a major power in Africa, the Mediterranean Basin, the Middle East and the Muslim world...

, and Libya
Libya
Libya is an African country in the Maghreb region of North Africa bordered by the Mediterranean Sea to the north, Egypt to the east, Sudan to the southeast, Chad and Niger to the south, and Algeria and Tunisia to the west....

 access to the Internet was denied in an effort to limit peer network
Computer network
A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information....

ing to facilitate organization. While the effects of shutting off information access are controversial, the topic of a kill switch
Kill switch
Kill switch, also called an e-stop, is a security measure used to shut off a device in an emergency situation in which it cannot be shut down in the usual manner...

 does remain a topic that remains to be resolved. This article pertains to how a theoretical Internet kill switch may affect the U.S. Federal Communications Commission
Federal Communications Commission
The Federal Communications Commission is an independent agency of the United States government, created, Congressional statute , and with the majority of its commissioners appointed by the current President. The FCC works towards six goals in the areas of broadband, competition, the spectrum, the...

 (FCC) and [United States Telecommunication Policy, the laws as they are currently applied, and proposed legislation.

Communications Act of 1934

The Communications Act of 1934
Communications Act of 1934
The Communications Act of 1934 is a United States federal law, enacted as Public Law Number 416, Act of June 19, 1934, ch. 652, 48 Stat. 1064, by the 73rd Congress, signed by President Franklin D. Roosevelt, codified as Chapter 5 of Title 47 of the United States Code, et seq. The Act replaced the...

 established the United States' Federal regulation of electronic communications. In this act, created by the Franklin D. Roosevelt
Franklin D. Roosevelt
Franklin Delano Roosevelt , also known by his initials, FDR, was the 32nd President of the United States and a central figure in world events during the mid-20th century, leading the United States during a time of worldwide economic crisis and world war...

 Administration enabled the president powers of control over the media under certain circumstances that are outlined below. This act was the basis of regulatory power for the executive branch of the government to control electronic communications in the United States:

SEC. 606
  • a) During the continuance of a war in which the United States is engaged, the President is authorized, if he finds it necessary for the national defense and security, to direct that such communications as in his judgment may be essential to the national defense and security shall have preference or priority with any carrier subject to this Act. He may give these directions at and for such times as he may determine, and may modify, change, suspend, or annul them and for any such purpose he is hereby authorized to issue orders directly, or through such person or persons as he designates for the purpose, or through the Commission. Any carrier complying with any such order or direction for preference or priority herein authorized shall be exempt from any and all provisions in existing law imposing civil or criminal penalties, obligations, or liabilities upon carriers by reason of giving preference or priority in compliance with such order or direction.

  • (b) It shall be unlawful for any person during any war in which the United States is engaged to knowingly or willfully, by physical force or intimidation by threats of physical force, obstruct or retard or aid in obstructing or retarding interstate or foreign communication by radio or wire. The President is hereby authorized, whenever in his judgment the public interest requires, to employ the armed forces of the United States to prevent any such obstruction or retardation of communication: Provided, That nothing in this section shall be construed to repeal, modify, or affect either section 6 or section 20 of an Act entitled "An Act to supplement existing laws against unlawful restraints and monopolies, and for other purposes", approved October 15, 1914.

  • (c) Upon proclamation by the President that there exists war or a threat of war or a state of public peril or disaster or other national emergency, or in order to preserve the neutrality of the United States, the President may suspend or amend, for such time as he may see fit, the rules and regulations applicable to any or all stations within the jurisdiction of the United States as prescribed by the Commission, and may cause the closing of any station for radio communication and the removal therefrom of its apparatus and equipment, or he may authorize the use or control of any such station and/or its apparatus and equipment by any department of the Government under such regulations as he may prescribe, upon just compensation to the owners.

  • (d) The President shall ascertain the just compensation for such use or control and certify the amount ascertained to Congress for appropriation and payment to the person entitled thereto. If the amount so certified is unsatisfactory to the person entitled thereto, such person shall be paid only 75 per centum of the amount and shall be entitled to sue the United States to recover such further sum as added to such payment of 75 per centum will make such amount as will be just compensation for the use and control Such suit shall be brought in the manner provided by paragraph 20 of section 24, or by section 145, of the Judicial Code, as amended.

Telecommunications Act of 1996

Government regulatory control of information systems didn't start with the "Internet kill switch" discussions on Cyber Security, it didn't start with the 1996 Telecommunications Act. They had already been under way for some time. Thus, by 1998, as the scope of the risk associated with these dependences expanded to encompass not only converged government communications and information systems, but also the systems supporting national critical infrastructures, policy makers began to recognize the need for an integrated effort that coupled the capabilities of government and the private sector to mitigate these risks. As the Telecommunications Act of 1996 changed the regulatory environment, it hadn't fully addressed security. Thus, “Cybersecurity”emerged as a distinct policy area.

Presidential Decision Directive 63 (PDD-63), signed in May 1998, established a structure under White House leadership to coordinate the activities of designated lead departments and agencies, in partnership with their counterparts from the private sector, to “eliminate any significant vulnerability to both physical and cyber attacks on our critical infrastructures, including especially our cyber systems.”

Protecting Cyberspace as a National Asset Act of 2010

On June 19, 2010, Senator Joe Lieberman (I-CT) introduced a bill called "Protecting Cyberspace as a National Asset Act of 2010", which he co-wrote with Senator Susan Collins
Susan Collins
Susan Margaret Collins is the junior United States Senator from Maine and a member of the Republican Party. First elected to the Senate in 1996, she is the ranking member of the Senate Committee on Homeland Security and Governmental Affairs...

 (R-ME) and Senator Thomas Carper (D-DE). If signed into law, this controversial bill, which the American media dubbed the kill switch bill, would grant the President emergency powers over the Internet. Other parts of the bill focus on the establishment of an Office of Cyberspace Policy and on its missions, as well as on the coordination of cyberspace policy at the federal level.

If national security were to be severely threatened by a cyber attack, broadband providers, search engines, software firms and other major players in the Telecommunications/Computer/Internet industry could be required to immediately comply and implement any emergency measure taken; for most of the month of June, media coverage of the bill insisted on this so-called 'kill switch' provision, said to be included in the bill.

Section 249 of the bill states that "the President may issue a declaration of a national cyber emergency to covered critical infrastructure," in which case a response plan is implemented. This plan shall consist of "measures or actions necessary to preserve the reliable operation, and mitigate or remediate the consequences of the potential disruption, of covered critical infrastructure". Said measures should "represent the least disruptive means feasible to the operations of the covered critical infrastructure" and "shall cease to have effect not later than 30 days after the date on which the President issued the declaration of a national cyber emergency" unless the President seeks to extend them, with the approval of the Director of the Office of Cyberspace Policy established by the bill.

Media criticism

Interviewed by Candy Crowley on CNN's State of the Union, Lieberman claimed "it is a fact cyber war is going in some sense right now", "a cyber attack on America [could] do as much or more damage [...] by incapacitating our banks, our communications, our finance, our transportation, as a conventional war attack".

"Right now, China, the government, can disconnect parts of its Internet in a case of war. We need to have that here, too," Senator Joe Lieberman, sponsor of the bill, said on Candy Crowley's State of the Union on CNN.

This remark sparked another controversy, and led Comedy Central's Jon Stewart to make fun of Senator Lieberman for bringing up the example of China, which is notorious for its lack of regard for freedom of speech, on his satirical program The Daily Show with Jon Stewart.

ACLU

The Americans for Civil Liberties Union (ACLU) took issue with the scope of the legislation in a letter to Senator Lieberman signed by several other civil liberty groups. Particularly, they take issue how the authorities would classify what is Critical Communications Infrastructure (CCI) and what is not. They also took issue with Preserving Free Speech in Cybersecurity Emergencies.

At the heart of the issue is an auto-renew provision within the proposed legislation that would keep it going beyond thirty days. This group recommended that the legislation follows a strict First Amendment scrutiny test:
  • (i) the action must further a compelling governmental interest;
  • (ii) it must be narrowly tailored to advance that interest; and
  • (iii) it must be the least restrictive means of achieving that interest.

Reaction from Lieberman

After this proposal became controversial, in large part due to concerns that it granted too much power to the President and threatened freedom of speech, all three co-authors of the bill issued a statement claiming that instead, the bill "[narrowed] existing broad Presidential authority to take over telecommunications networks", and Senator Lieberman contended that the bill did not seek to make a 'kill switch' option available ("the President will never take over -- the government should never take over the Internet"), but instead insisted that serious steps had to be taken in order to counter a potential mass scale cyber attack.

Legal issues regarding an Internet kill switch

At issue is whether or not the President needs to have this power at all, since in the Communications Act of 1934 the President is allowed certain powers:
“Upon proclamation by the President that there exists war or a threat of war, or a state of public peril or disaster or other national emergency, or in order to preserve the neutrality of the United States, the President, if he deems it necessary in the interest of national security or defense, may suspend or amend, for such time as he may see fit, the rules and regulations applicable to any or all stations or devices capable of emitting electromagnetic radiations within the jurisdiction of the United States”


The Telecommunications Act of 1996
Telecommunications Act of 1996
The Telecommunications Act of 1996 was the first major overhaul of United States telecommunications law in nearly 62 years, amending the Communications Act of 1934. This Act, signed by President Bill Clinton, was a major stepping stone towards the future of telecommunications, since this was the...

 and subsequent amendments allowed for the vertical integration of telecommunications carriers into the data and information markets which were left unregulated in the legislation. Previously these carriers did not compete in the same regulatory space, but with the reclassification of data and information services the Act favored competition. This competition exploded once enacted, and was responsible for creating an estimated 7,800 plus ISPs.

Implementation issues

There are several issues that may prevent a system to be established in the United States. The Telecommunications Act of 1996
Telecommunications Act of 1996
The Telecommunications Act of 1996 was the first major overhaul of United States telecommunications law in nearly 62 years, amending the Communications Act of 1934. This Act, signed by President Bill Clinton, was a major stepping stone towards the future of telecommunications, since this was the...

 deregulated the telecommunications market and allowed for the growth of data carrier services. Since the Federal Communications Commission
Federal Communications Commission
The Federal Communications Commission is an independent agency of the United States government, created, Congressional statute , and with the majority of its commissioners appointed by the current President. The FCC works towards six goals in the areas of broadband, competition, the spectrum, the...

 (FCC) does not require registration of a company as an Internet Service Provider
Internet service provider
An Internet service provider is a company that provides access to the Internet. Access ISPs directly connect customers to the Internet using copper wires, wireless or fiber-optic connections. Hosting ISPs lease server space for smaller businesses and host other people servers...

 (ISP), there are only estimates available. As of April 2011, there are over 7,800 ISPs estimated to be operating in the United States. This makes implementation of a kill switch that much more difficult: Each company would have to voluntarily comply. There is no law that gives the United States authority over an ISP unless court ordered.

A court order is not necessarily the solution either. Even if an ISP is forced by court order, the attack may have already taken place and the prophylactic methods too late in implementing. There are over thousands of ISPs and since they don’t have to register, there is no known way of contacting them in time and forcing the ISP to comply.

The regulations that the United States uses to regulate the information and data industry may have inadvertently made a true “Internet kill switch” impossible. The deregulation allowed for a building of a patch-work system (ISPs, Internet Backbone
Internet backbone
The Internet backbone refers to the principal data routes between large, strategically interconnected networks and core routers in the Internet...

) that is extremely complex and not fully known.

In the United States
United States
The United States of America is a federal constitutional republic comprising fifty states and a federal district...

, there are strong citizen and business protection systems. There is redress of grievances allowed to the courts or administrative authority. There is also the need for a court order for the government to shut off services. In addition to these fairly large roadblocks, there are human rights groups such as the ACLU, Amnesty International
Amnesty International
Amnesty International is an international non-governmental organisation whose stated mission is "to conduct research and generate action to prevent and end grave abuses of human rights, and to demand justice for those whose rights have been violated."Following a publication of Peter Benenson's...

, and others. All of these reasons make implementing the Internet kill switch difficult.

Key policy issues

The key policy issue is whether or not the United States has the right constitutionally to restrict or cut off access to the Internet. The powers granted to the presidency starting with the Communications Act of 1934 seem to be adequate in dealing with this threat, and is one of the major criticisms of legislation determined to regulate this question. The next most important question is whether or not the United States even need this legislation or it would chip away at individual liberties. The trade offs are apparent-if the government can control information online then it can limit access to information online. One of the biggest problems with the theory is what to classify as Critical Communications Infrastructure and what to leave out.

Policy makers have to take into account the cost of shutting down the Internet, if it is even possible. The loss of the network for even a day could cost billions of dollars in lost revenue. The National Cybersecurity Center was set up to deal with these questions, to research threats and design and recommend prophylactic methods.

In many ways, the integration of networked Computer Mediated Communication
Computer-mediated communication
Computer-mediated communication is defined as any communicative transaction that occurs through the use of two or more networked computers...

systems into our business and personal lives means that the potential threat is increasing along with the potential problem of protecting a wide-class of products. Utility systems can be monitored and controlled remotely, whereas it used to be a physical person. So the issue of what an Internet kill switch could affect is growing exponentially.

In the 2009 White House Assessment, it stated that there needed to be more work done on this issue and the Cyber Security Center was created to handle security issues. It is not known at this point if the Center has a policy regarding asserting control of the national networks.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK