{"id":22951,"date":"2013-11-14T07:45:27","date_gmt":"2013-11-14T12:45:27","guid":{"rendered":"http:\/\/quotulatiousness.ca\/blog\/?p=22951"},"modified":"2013-11-14T07:45:27","modified_gmt":"2013-11-14T12:45:27","slug":"how-the-internet-was-weaponized","status":"publish","type":"post","link":"https:\/\/quotulatiousness.ca\/blog\/2013\/11\/14\/how-the-internet-was-weaponized\/","title":{"rendered":"How the internet was &#8220;weaponized&#8221;"},"content":{"rendered":"<p>In <em>Wired<\/em>, <a href=\"http:\/\/www.wired.com\/opinion\/2013\/11\/this-is-how-the-internet-backbone-has-been-turned-into-a-weapon\" target=\"_blank\">Nicholas Weaver<\/a> looks back on the way the internet was converted from a passive network infrastructure to a spy agency wonderland:<\/p>\n<blockquote><p>According to revelations about the QUANTUM program, the NSA can \u201cshoot\u201d (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon; absent Snowdens of their own, other countries may do the same and then say, \u201cIt wasn\u2019t us. And even if it was, you started it.\u201d<\/p>\n<p>If the NSA can hack Petrobras, the Russians can justify attacking Exxon\/Mobil. If GCHQ can hack Belgicom to enable covert wiretaps, France can do the same to AT&#038;T. If the Canadians target the Brazilian Ministry of Mines and Energy, the Chinese can target the U.S. Department of the Interior. We now live in a world where, if we are lucky, our attackers may be every country our traffic passes through except our own.<\/p>\n<p>Which means the rest of us \u2014 and especially any company or individual whose operations are economically or politically significant \u2014 are now targets. All cleartext traffic is not just information being sent from sender to receiver, but is a possible attack vector.<\/p>\n<p>[&#8230;]<\/p>\n<p>The only self defense from all of the above is universal encryption. Universal encryption is difficult and expensive, but unfortunately necessary.<\/p>\n<p>Encryption doesn\u2019t just keep our traffic safe from eavesdroppers, it protects us from attack. DNSSEC validation protects DNS from tampering, while SSL armors both email and web traffic.<\/p>\n<p>There are many engineering and logistic difficulties involved in encrypting all traffic on the internet, but its one we must overcome if we are to defend ourselves from the entities that have weaponized the backbone.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>In Wired, Nicholas Weaver looks back on the way the internet was converted from a passive network infrastructure to a spy agency wonderland: According to revelations about the QUANTUM program, the NSA can \u201cshoot\u201d (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[84,15,13],"tags":[157,476,895,58,913,911],"class_list":["post-22951","post","type-post","status-publish","format-standard","hentry","category-government","category-technology","category-usa","tag-encryption","tag-espionage","tag-gchq","tag-internet","tag-nsa","tag-surveillance"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2hpV6-5Yb","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/22951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/comments?post=22951"}],"version-history":[{"count":2,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/22951\/revisions"}],"predecessor-version":[{"id":22953,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/22951\/revisions\/22953"}],"wp:attachment":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/media?parent=22951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/categories?post=22951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/tags?post=22951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}