Tag Archive for Internet

Net Neutrality – We Win

Let the lawsuits begin!

Net Neutrality - We Win

In addition to the lawyers, lining up to squash Net Neutrality, Michigan’s own Fred Upton—who holds personal investments in AT&T, Comcast, and Verizon—has introduced anti-Net Neutrality legislation that eliminates the FCC’s authority to regulate internet service providers and could crush the agency’s ruling and allow AT&T (T), Comcast (CMCSA) and Verizon (VZ) to rule the Internet at our cost to grow their profits.

rb-

I have already seen an ad on BrightHouse cable from Broadband For America, (whose membership page is empty) claiming that the FCC ruling will force them to raise taxes. Here come more imaginary “Regulatory re-captureprofits fees.

For right now, this is a rare win for the 99% in post 9-11 ‘murica. Just follow the money.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

What Holds the Internet Together

What Holds the Internet TogetherThose that have followed the Bach Seat for a while, know that I am fascinated by maps. A well-done map can say so much more than a written description. One of my favorite things to do at work is to work on maps; network maps, rack elevations, logical diagrams, they just make it so much easier to discuss how to get from A to B if you can see it.

TeleGeography logoThe BusinessInsider published some cool maps from telecom data company TeleGeography of the submarine cables that hold the Internet together around the world. The maps are interesting to me for a couple of reasons, first, is the engineering wonder of how all those cables get installed, and the mind-boggling amount of information they enable, and the small number of places where they all come out of the water. My first thought looking at some of these maps was I wonder what the no such agency is doing at those sites.

The main map charts out all the undersea fiber optic cables that send Internet communication from country to country. There are more fiber optic cables that are land-based, but they’re not charted here. Here is a map of the current undersea fiber connections on the US eastern seaboard.

Atlantic fiber optic cables

Paul Brodsky, an analyst at Telegeography explained to BI how data gets around the world.

The vast majority of Internet traffic travels on fiber optic cables … Many people think Internet connections go through satellites … but that’s not the case. They run through these undersea cables.

This map shows the undersea cables that link China, Japan, South Korea, and Russia to the Internet. It also shows that North Korea does have a dedicated direct connection to the rest of the world, the Hermit Kingdom, indeed. The picture is kind of awkward because China is in blue, which you would expect to be water.

Pacific fiber opric cables

TeleGeography’s Brodsky explained to BI how the cables get installed. The companies that lay these cables have giant spools of fiber optic cable on their ships. The ship goes from country A to country B and literally lays it on the bottom of the ocean. Close to the shore, they trench it out, but at a certain distance from the coast, it just lies on the bottom of the ocean.

Coiling trans-Atlantic cable in 1857The biggest risk to the cables are trawlers, and ships dragging anchors. Sometimes there are natural disasters like earthquakes. But if one cable breaks, Internet traffic can be redirected to another cable.

Mr. Brodsky says the companies that lay the cables can track problems. If they spot something, they can go out to the middle of the ocean, pull up the cable and cut out the damaged section, and splice in a new segment of cable.

In the future, expect more cables, Mr. Brodsky told BI. Now that the world is connected, the next step is to add more connections. Any country with just one cable will want two or three.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

2014’s Major Web Vulnerabilities

2014's Major Web Vulnerabilities2014 was the year of cyber-security mega-vulnerabilities. What makes mega vulnerabilities unique are they strike at the core of the Internet infrastructure and can impact nearly every connected device and every Internet user on the globe. 2014 saw the emergence of three mega-vulnerabilities Hearbleed, Shellshock, and POODLE.

Heartbleed, Shellshock, and POODLE were the top three major web vulnerabilities uncovered in 2014 according to Fred Donovan at FierceITSecurity. In case you have not heard of this trio of troublemakers, Web security firm Incapsula produced the following infographic.

The Incapsula infographic looks at each of these vulnerabilities and layout when they were discovered, what type of vulnerability they are, what systems and the number that are affected, the risks posed by the vulnerabilities, their severity, how easy they are to exploit, and the difficulty of fixing. Tim Matthews, vice president of marketing for Incapsula wrote in their blog:

What makes these mega vulnerabilities special is that unlike most vulnerabilities that are specific to a particular OS, browser or software application, these three relate to the core Internet infrastructure (e.g., SSL and Linux devices) and, in essence, affect just about every connected device owner and every Internet user on the globe.

Incapsula 2014 Mega Vulnetabilities

rb-

In their blog, Incapsula warns this is the tip of the iceberg of mega-vuln‘s that exploit other structural core functions of the Intertubes. Wired reports that after 8 months, 300,000 machines remain unpatched against Heartbleed.

  • Web Freedom Is Seen as a Growing Global Issue (cacm.acm.org)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

WWW is 25 Years Old

WWW is 25 Years OldThe world wide web (WWW) turned 25 this year.  The 1989 proposal from Sir Tim Berners-Lee for an “information management” system became the foundation for the World Wide Web. Professor Berners-Lee’s proposal has grown to a worldwide phenomenon  In honor of the milestone, Business Insider provided some insight into how the Internet has grown through the years. Statista made this chart for them using data from Pew. And here is the first U.S. website.

Rapid Rise of the Internet

 rb-

Despite republican political posturing and corporate greed, the Intertubes is 25 years old. It needs our help to keep the internet open for the next 25 years.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Who’s Hacking Who?

Update – The hacking map function seems to have been shut down – I got an error message “All access to this object has been disabled.

Who's Hacking Who?A new animated map of the Internet created by the U.S.-based computer security firm Norse helps cyber-defenders visualize where hackers are coming from and illustrate just how ubiquitous hacking is around the world according to a recent article by Maya Kosoff from BusinessInsider.

Norse logoSt. Louis-based Norse offers a product call IPViking which displays a map and lists of the countries doing the most hacking, the countries getting hacked the most, and the types of attacks happening. Quartz noted the animated map looks kind of like the vintage video game Missile Command.

Norse, founded by a former intelligence expert with the U.S.’s Department of Homeland Security explained to Smithsonian Magazine how the system works;

attacks shown are based on a small subset of live flows against the Norse honeypot infrastructure, representing actual worldwide cyber attacks by bad actors.

Who's Hacking Who?

BI continues that the map doesn’t show all the hacking going on in the world, it could be a representative snapshot of today’s hacking ecosystem. A snapshot of the stats shows some of the baseline back-and-forth hacking attempts. Today, over 5 hours,

The top attack types:

  1. SSH port 22 – 6,308 attacks
  2. SIP port 5060 – 2,380 attacks
  3. Microsoft-DS port 445 – 2,317 attacks
  4. MS-SQL-S port 1433 – 2,193 attacks
  5. DNS port 53 – 2,182 attacks
  6. HTTP-Alt port 8080 – 2,007 attacks
  7. SNMP port 161 – 1,367 attacks
  8. MS-term-services port 3389 – 1,327 attacks

Internet Attacks

Rank# of Attacks sentAttack OriginsRank# of Attacks receivedAttack Target
112,216China127,667United States
27,827United States
21,161Thailand
32,446Mil/Gov31,077Hong Kong
42,161Netherlands4682Canada
51,899France5655 Portugal
61,351Russia6650Australia
71,331Canada7600Singapore
8717Hong Kong8469Netherlands
9627Thailand9458France
10495Bulgaria10411Bulgaria
Internet Attacks as logged by Norse IPViking on 6-25-14 approx. 11:00 to 16:00

rb-

I have posted a couple of good maps on here before. This map relays a lot of good info while being mesmerizing also. The amount of malicious traffic flying at U.S. sites is staggering. The attacker’s emphasis is on basic network services, SSH, SIP, AD, SQL, DNS, HTTP, SNMP. Attacks on the basic services we rely on reinforce the urgency for U.S. network users to get their basics in order. The U.S. and China are locked in an escalating war about online spying that threatens to devastate business for companies in both countries.

Now for the really scary part. This IPViking map only reveals the tip of the hack-attack iceberg. It only shows penetration attempts against Norse’s network of “honeypot” traps. The real number of hack attempts lighting up interwebs at any given moment is far, far greater than this cool piece of big data mining can ever possibly show.

Related articles
  • A secure cloud can keep an enterprise safe from attack (cloudentr.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.