Tag Archive for T

Will Climate Change Sink the Web?

Despite claims to the contrary, climate change is real. Climate change will break critical parts of the Internet within 20 years. That is what a study by Paul Barford, a University of Wisconsin, Madison professor of computer science predicts.

Professor Barford presented his findings at IETF 102. IETF 102 was a meeting of the Internet Engineering Task Force Association for Computing Machinery, the Internet Society, and the Institute of Electrical and Electronics Engineers in Montreal. The study, “Lights Out: Climate Change Risk to Internet Infrastructure,” found that critical communications infrastructure could be submerged by rising seas in as soon as 15 years.

Conventional copper and fiber optic cables

Companies like Google, Microsoft, Facebook, and Cable and Wireless go through enormous costs and efforts to protect undersea cable spanning the continents but once that cable hits the shore it gets converted to conventional cables. The conventional copper and fiber optic cables buried decades ago, carry the signals from the landing points to the interior are not designed to withstand the inundation by saltwater caused by climate change.

Internet landing points that will be impacted by climate change

Popular Science reports that Professor Barford’s research found that climate change will impact more than 4,000 miles of buried fiber optic conduit. These conduits and internet cables will most likely be underwater and become inoperable due to exposure to damaging saltwater. Saltwater causes damage to the cables which reduces their ability to send signals. The cable landing stations where undersea cables connect the U.S. Internet to the rest of the world will also be vulnerable. The study also predicts that water will surround over 1,100 traffic hubs.

Unsersea fiber optic cable landing point susceptible to flooding

Major interruptions

Mr. Barford told Popular Science that this service interruption is likely to become a growing problem within the next 15 years. He warned that communications companies should begin implementing protective measures and solutions soon if they want to avoid major interruptions in the near future.

“Most of the damage that’s going to be done in the next 100 years will be done sooner than later,” says Dr. Barford, the keeper of the Internet Atlas, a comprehensive repository of the physical Internet — the buried fiber optic cables, data centers, traffic exchanges and termination points that are the nerve centers, arteries, and hubs of the vast global information network. “That surprised us. The expectation was that we’d have 50 years to plan for it. We don’t have 50 years.” He also notes “The landing points are all going to be underwater in a short period of time.”

The study is the first risk assessment of the impact of climate change on the U.S. infrastructure of the Internet. It reports that Miami, New York, and Seattle are among the areas where connectivity could be most affected. The Internet in these cities is at risk because cables carrying it tend to converge on a few fiber optic strands that lead to large population centers.

Fiber optic cable conduit susceptible to floodingBut the effects of climate changes would not be confined to those areas and would ripple across the Internet, potentially disrupting global communications. Many of the conduits at risk are already close to sea level and only a slight rise in ocean levels due to melting polar ice and thermal expansion will expose buried fiber optic cables to seawater.

No thought was given to climate change

Much of the infrastructure at risk is buried and follows long-established rights of way, typically paralleling highways and coastlines. The roots of the danger emerged inadvertently during the Internet’s rapid growth in the 1980s before there was widespread awareness of the Internet as a global grid or the massive threats of climate change. Professor Barford says, “When it was built 20-25 years ago, no thought was given to climate change.”

To reach this conclusion, the team combined data from the Internet Atlas and projections of sea level incursion from the National Oceanic and Atmospheric Administration (NOAA).

Fiber optic cableScience Daily says the findings of the study, serve notice to industry and government. “This is a wake-up call. We need to be thinking about how to address this issue.Mikhail Chester, the director of the Resilient Infrastructure Laboratory at the University of Arizona told National Geographic, This new study “reinforces this idea that we need to be really cognizant of all these systems because they’re going to take a long time to upgrade.

ISP responses to climate change

The impact of mitigation such as sea walls, according to the study, is difficult to predict. “The first instinct will be to harden the infrastructure,” Professor Barford says. “But keeping the sea at bay is hard. We can probably buy a little time, but in the long run, it’s just not going to be effective.”

US shore susceptible to flooding

The study called individual internet service providers. They found finding that AT&T (T), Verizon (VZ), and CenturyLink (CTL), at most risk. In response, AT&T spokesman Jeff Kobs told NPR,

AT&T uses fiber optic cable “designed for use in coastal areas as well as being submerged in either salt- or fresh-water conditions,… In certain locations where cabling will be submerged for long periods of time or consistently exposed, such as beaches or in subways, we use submarine underwater cabling.

Verizon spokeswoman Karen Schulz told NPR,

After Sandy, we started upgrading our network in earnest, and replacing our copper assets with fiber assets … Copper is impacted by water, whereas fiber is not. We’ve switched significant amounts of our network from copper to fiber in the Northeast.

She explained that Verizon’s focus on flood risk

really has less to do with sea-level change and more to do with general flooding concerns … For cable landing stations that are very close to the oceans and that have undersea cables, we specifically assess sea-level changes.

A representative of CenturyLink told Popular Mechanics they can handle the problem. The company’s PR rep said that CenturyLink networks are designed with redundancy and can divert traffic to alternate routes when infrastructure goes down.

rb-

Donald Trump Still Doesn’t Believe in Climate ChangeThe Verizon and CenturyLink responses seem to totally miss the point.

The impact of large-scale Internet failures goes beyond Facebook and iTunes. The failure of the Internet would disrupt many real people’s day-to-day services like online banking, traffic signals, and railroad routing; the sharing of medical records among doctors and hospitals, and the growing “internet of things” that includes household appliances to regional grids of electric power production and transmission.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Happy Birthday to IPv6

Happy Birthday to IPv6You are forgiven if you missed IPv6’s birthday (I did). The next-generation network addressing scheme turned 6 years old back in June. June 06, 2012, was World IPv6 Launch Day when everybody was supposed to permanently enable IPv6 on their networks. The results – not so good. There are global highlights but 3/4’s of internet users still regularly connect to the Intertubes over legacy IPv4.

The Internet Society rightly points out that enterprise operations tend to be the “elephant in the room” when it comes to IPv6 deployment. If only 26% of networks advertise IPv6 autonomous system prefixes, 74% do not. Most of the 3/4ths not using IPv6 are likely to be enterprise networks.

Enterprises have traditionally been reluctant to embrace IPv6 — there has been no real need to implement it, with many seeing it as an additional cost and risk with no direct use for their daily business.  Cost can include monetary assets, but also people and time

IPv6Migrating to IPv6 will be hard. The migration will involve all departments of the organization and every piece of equipment connected to the network. Then consider that the migration will be made over time and that everyone needs to be on the same page working together for the best outcome and smoothest transition.

Legacy systems can be defined basically as older systems. They likely are missing some common functionality from current technology, but still exist because they perform a key or important function for the organization just fine, thus there is no reason to replace it. However, this attitude is starting to change.

Microsoft logoLarger and more tech-savvy enterprises are forging innovative paths forward. CircleID points out Microsoft (MSFT), which made one of the first publicly announced purchases of IPv4 address space, reportedly purchasing 666,000 addresses at $11.25 per address in 2011. In a recent blog, Microsoft described the steps is taking to turn off IPv4 and become an IPv6-only company. Their description of their heavily translated IPv4 network includes phrases like “potentially fragile”, and “operationally challenging”, and about dual-stack operations, “complex”.

Outside of the enterprise space, there’s still the rest of the Internet that needs to make the migration. According to the stats in the article, the top carriers in the U.S. still carry less than half of the IPv6 traffic that the Indian ISP Reliance Jio carries. The Internet Society takes the happy view that the excuse that “no one is doing IPv6” is gone. For many people and networks, IPv6 is the new normal and is the future of Internet connectivity.

Some of the highlights for IPv6 are:

  • 237 million people in India connect over IPv6.
  • Mobile operators are adopting IPv6, some have over 80 or 90% of their devices connecting over IPv6.
  • 28% of the Alexa Top 1000 websites are IPv6-enabled.

ISOC - State of IPv6 Deployment 2018

 

National mobile networks are driving the global adoption of IPv6. Some mobile networks are taking the step to run IPv6-only to simplify network operations and cut costs. Japan and India are leaders in IPv6 adoption.

Reliance JIOThe Indian wireless carrier Reliance Jio has an 87% IPv6 rate.

In Japan, the top three wireless carriers are:

U.S. wireless carriers are deploying IPv6 also:

Many home and business users get Internet connectivity from broadband ISPs. Many broadband ISPs have deployed IPv6 on their networks. They send the majority of their traffic over IPv6 to major content providers. For example, Comcast (CMCSA), the largest broadband ISP in the U.S. is actively deploying IPv6. Per the World IPv6 Launch website, Comcast has an IPv6 deployment measurement of over 66%. Globally broadband ISPs are also deploying IPv6.

The following table from the Internet Society lists the top IPv6 carriers based on the number of users.

RankISPCountryIPv6 Users (estimated)
1Reliance JioIndia237,600,764
2ComcastUnited States36,114,435
3AT&TUnited States22,305,974
4Vodafone IndiaIndia18,368,165
5Verizon WirelessUnited States15,422,684
6Idea CellularIndia14,681,694
7Deutsche Telekom AGGermany14,261,836
8T-Mobile USAUnited States14,057,105
9KDDI CorporationJapan11.871,952
10Sky BroadbandGreat Britian11,829,610
11ClaroBrazil10,235,805
12SoftbankJapan8,613,145
13OrangeFrance7,924,119
14AT&T WirelessUnited States7,694,881
15Cox CommunicationsUnited States6,316,462
16Kabel DeutschlandGermany5,835,590
17SK TelecomKorea5,764,073
18NTT CommunicationsJapan5,596,206

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Scary SS7 Flaw Strikes Banks

Scary SS7 Flaw Strikes BanksLost in last month’s hubbub over WannaCry ransomware was the revelation that hackers had successfully exploited the SS7 “flaw” in January 2017. In May reports surfaced that hackers were able to remotely pilfer German bank accounts by taking advantage of vulnerabilities in Signaling System 7 (SS7). SS7 is a standard that defines how the public phone system talks to itself to complete a phone call.

Signaling System 7 is a standard that defines how the public phone system talks to itself to complete a phone call.The high-tech heist was initially reported by the German newspaper Süddeutsche Zeitung (auf Deutsch). The attack was a sophisticated operation that combined targeted phishing emails and SS7 exploits to bypass two-factor authentication (2FA) protection. This is the first publicly known exploit of SS7 to intercept two-factor authentication codes sent by a bank to confirm actions taken by online banking customers.

How hackers get in

According to ars Technica, the attack began with traditional bank-fraud trojans. These trojans infect account holders’ computers and steal the passwords used to log in to bank accounts. From there, attackers could view account balances, but were prevented from making transfers without the one-time password the bank sent as a text message. After stealing the necessary login details via phishing emails, the perpetrators leveraged the SS7 flaw to intercept the associated mTAN (mobile transaction authentication numbers) authentication codes sent to the victims — messages notifying them of account activity — to validate the transactions and remain hidden, investigators say.

Central office equipmentGerman Telecommunications giant O2-Telefonica confirmed details of the SS7-based cyberattacks to the newspaper. Ars says, in the past, attackers have obtained mTANs by obtaining a duplicate SIM card that allows them to take control of the bank customer’s phone number. SS7-facilitated compromises, by contrast, can be done remotely on a much larger quantity of phone numbers.

O2 Telefonica confirmed to Help Net Security that the attackers were able to gain access to the network of a foreign mobile network operator in January 2017. The attackers likely purchased access to the foreign telecommunications provider – this can apparently be done for less than 1,000 euros – and have set up a call and SMS forwarding.

Two-factor authentication

Ford Road CO in Dearborn Mi is the Oregon officeTwo-factor authentication (2FA) is a security process in which the user provides two authentication factors to verify they are who they say they are.  2FA provides an extra layer of security and makes it harder for attackers to gain access to a person’s devices and online accounts because knowing the victim’s password alone is not enough to pass the authentication check. Two-factor authentication has long been used to control access to sensitive systems and data, and online services are increasingly introducing 2FA to prevent their users’ data from being accessed by hackers who have stolen a password database or used phishing campaigns to get users’ passwords.

News of the incident prompted widespread concern online. Security advocates railed against the popular and continuous use of text messages to authenticate account information while growing evidence suggests that SS7 is an unsafe channel to deliver such data. Security experts told ars that the same SS7-centric hacking techniques used against German banks will become increasingly prevalent in the future, forcing organizations to reconsider how they authenticate user activity.

The end of 2FA?

Cris Thomas, a strategist at Tenable Network Security warns in the article:

While this is not the end of 2FA, it may be the end of 2FA over SS7, which comprises a majority of 2FA systems … Vulnerabilities in SS7 and other cellular protocols aren’t new. They have been presented at security conferences for years … there are other more secure protocols available now that systems can switch to…

Cybersecurity researchers began issuing warnings about this flaw in late 2014 about dangerous flaws in SS7. I wrote about the SS7 flaw in September of 2016  and in March 2107. Maybe this will be the wake-up call for the carriers. One industry insider quipped:

This latest attack serves as a warning to the mobile community about what is at stake if these loopholes aren’t closed … The industry at large needs to go beyond simple measures such as two-factor authentication, to protect mobile users and their data, and invest in more sophisticated mobile security.

SS7 allows voice networks to interoperate

a man-in-the-middle attack In 2014 security researchers first demonstrated that SS7 could be exploited to track and eavesdrop on cell phones. This new attack is essentially a man-in-the-middle attack on cell phone communications. It exploits the lack of authentication in the communication protocols that run on top of SS7.

Developed in 1975, today, over 800 telecommunications companies around the world, including AT&T (T) and Verizon (VZ), use  This technology has not kept up with modern times.  In May 2017, Wired published an article that explains some of the ways to secure SS7. Overcoming SS7 insecurity requires implementing a series of firewalls and filters that can stop the attacks. Researchers Wired spoke to suggest that adding encryption to SS7 would shield network traffic from prying eyes and bolster authentication. Both of these changes are unpopular with the carriers because they cost money and can impact the network core, so don’t expect any network changes to address the SS7 flaw anytime soon.

Carriers should use SS7 firewall to secure the SS7 networkThe Register reports that the FCC’s Communications Security, Reliability and Interoperability Council found that the proposed replacement for SS7 on 5G networks, dubbed the Diameter protocol has security holes too.

In March 2017, Oregon Sen. Ron Wyden and California Rep. Ted Lieu sent a letter to Homeland Security’s John Kelly requesting that DHS investigate and provide information about the impact of SS7 vulnerabilities to U.S. companies and governmental agencies. Kelly has not responded to the letter, according to the Wired article.

Of course, the TLA’s would never use this “flaw” in SS7 to spy on us.

What can you do?

The Guardian says that given that the SS7 vulnerabilities reside on systems outside of your control, there is very little you can do to protect yourself beyond not using the services.

PoliticanThey recommend for text messages, avoiding SMS instead of using encrypted messaging services such as Apple’s (AAPL) iMessage, Facebook‘s (FB) WhatsApp or the many others available will allow you to send and receive instant messages without having to go through the SMS network to protect your messages from surveillance.

For calls, the Guardian recommends using a service that carries voice over data and not through the voice network. This will help prevent your calls from being snooped on. Messaging services including WhatsApp permit calls. Silent Circle’s end-to-end encrypted Phone service or the open-source Signal app also allows secure voice communications.

Your location could be being tracked at any stage when you have your mobile phone on. The only way to avoid it is to turn off your phone or turn off its connection to the mobile phone network and rely on Wi-Fi instead.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

AT&T Tries Broadband over Powerline

AT&T Tries Broadband over PowerlineIt’s alive. It’s alive! BPL has risen from dead. Longtime readers of the Bach Seat, know the history of Broadband over Powerline. I covered it many years ago here, here, and here. Imagine my surprise when there were a number of articles popping up all over the interwebs touting mega-telecom AT&T’s (T) try at BPL 10 years after everybody else gave up on the technology.

Broadband over PowerlineComputerWorld described this latest incarnation of BPL from AT&T as a low-cost, high-speed wireless internet technology. This time Broadband over Powerline relies on plastic antennas positioned along medium-voltage power lines and not through the conductive materials inside the power lines. FierceTelecom says that AT&T will attach the plastic antennas to the power lines and serve as a mesh network to distribute signals to homes and businesses. The Project AirGig low-cost plastic antennas and devices will regenerate millimeter wave (mmWave) signals. Millimeter-wave technology relies on electromagnetic waves that are longer than x-rays but shorter than radio waves (they are found in the 10 mm to 1 mm range and are also known as extremely high-frequency waves according to New Atlas. The EHF waves can be used for 4G LTE and 5G multi-gigabit mobile and fixed deployments.

John Donovan, chief strategy officer and group president of AT&T technology and operations, told FierceTelecom that Project AirGig delivers last-mile access without any new FTTH technology and is flexible enough to be configured with small cells or distributed antenna systems.

Broadband over PowerlineTo test the technology, AT&T is looking for a place somewhere in the next year with a favorable regulatory environment, since the carrier would need to partner with an existing electric utility. John Donovan, chief strategy officer for AT&T said the trial could be in an area where existing broadband is expensive, even in the U.S.

The AirGig project relies on over 100 patents, according to an AT&T statement. There is no direct electrical connection to the power lines, although network components could receive their needed power through inductive wireless electricity from the near by power lines, AT&T Chief Technology Officer Andre Fuetsch explained to Computerworld.

ATT logoAT&T said the testing will decide what frequency AirGig will use for commercial deployment, which could occur sometime around 2020 after the carrier rolls out 5G wireless. The frequency AT&T uses will affect the range of the signal and the speed, as well as whether it is over a licensed or unlicensed band. This decision is important if AT&T plans to use BPL as another weapon in its fight with Google Fiber. Earlier versions of Broadband over Powerline were incapable of delivering the Google (GOOG) promised Gigabit of Internet access.

“It’s a transformative technology that delivers low-cost and multi-gigabit speeds using power lines,” AT&T’s Donovan said, “There’s no need for enhancements for new towers, and it’s over existing infrastructure.”

Google (GOOG) promised Gigabit of Internet accessAirGig has already been tested in outdoor locations on-campus settings. “We’ve had it up and running 4k video and cameras on campuses for quite some time,” Mr. Donovan said.

Besides using the AirGig technology as an alternative broadband service delivery option, for urban, rural, and under-served markets AT&T wants to convince the electrical utility industry to apply AirGig technology to their unique needs. ComputerWorld says utility companies would be able to use the technology to help spot problems on their power lines from something like a downed tree or cracks in the cable sheath.

rb-

New Atlas points out that earlier this year, a millimeter-wave technology system set a new world record for wireless data transmission by sending data at 6 Gbps. The technology is also showing up in other applications, including heart-rate monitors, car-safety systems, and luggage scanners.

AirGig could be profitable for AT&T. If they can make a deal with an electrical company, they can avoid expensive make ready. Which Google Fiber is struggling mightily with. By using power lines, AirGig avoids the cost of digging trenches to lay fiber optic cable.

Still, questions remain about how this version of Broadband over Powerline will do in the real world.

  • What impact will heavy rain, snow or ice have on the signal?
  • What if a tree branch falls on a power line or the lines are swinging in the wind?
  • Since mmWave transmissions need a direct line-of-sight between antennae, what happens when critters like birds or squirrels decide to perch on the antennae? Will that lead to an outage?

The ham radio lobby will likely be up in arms again when they find AT&T still likes the idea of BPL in the 30-300 GHz bands. The ARRL was a key player in killing BPL 1.0.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

T-Mobile Ordered to Turn Over Most Customer Info

T-MT-Mobile Ordered to Turn Over Most Customer Infoobile received the most government requests for subscriber data in 2014 according to a report from CNET. U.S. governments made nearly 351,940 requests for data from T-Mobile (TMUS) in 2014. The author, Roger Cheng states that the 351,940 government requests for data are the most out of any of the four national wireless carriers.

The number 4 U.S. carrier by subscriber base recently released its first transparency report. The article breaks down the government requests for T-Mobile information:

  • 177,549 criminal and civil subpoenas
  • 17,316 warrants
  • 3,000+ wiretap orders
  • Between 2,000 and 2,250 national security requests,
  • 8 requests from foreign governments.

These numbers represent an 11% increase in government demands for subscriber information over last 2013.

The article claims that Verizon and AT&T each have twice as many customers, but T-Mobile fielded more requests than its rivals.

  • Verizon (VZ) with 132 million subscribers in Q4 of 2014, saw 287,559 government requests.
  • AT&T (T), with nearly 121 million subscribers in Q4 of 2014, saw 263,755 government requests,
  • Sprint (S) with 55.5 million subscribers in Q4 of 2014, saw 308,937 government requests.
  • T-Mobile with just over 55 million subscribers in Q4 of 2014, saw 351,940 government requests.

Here is how the four wireless carriers’ government information requests compare.

CarrierSubscribersSupeanasWarrantsWireTap OrdersTotal Requests
Verizon132 million138,158`31,2141,433351,940
AT&T121 million201,75420,9852,420263,755
Sprint55.5 million308,93713,5403,772308,936
T-Mobile55 million177,43917,3163,087251,940
Totals358.5 million826,28883,05510,7121,176,571

surveillance programsTransparency reports have become increasingly popular over the past year as civil liberties groups, shareholder and consumer advocates have pressured companies to be more open about when they disclose customer information. The article claims T-Mobile was the last of the four national carriers to issue a transparency report, which comes amid continued scrutiny of surveillance programs run by U.S. three-letter agencies and friends— including the bulk collection of phone call data — that was revealed when former NSA contractor Edward Snowden leaked classified government documents.

The author notes that companies aren’t under a legal obligation to show the data in transparency reports, but have been willing to share with the hope that the reports will help repair their reputations, which have been damaged by the Snowden revelations of the past two years.

rb-

government demands for subscriber informationThis data only represents data requests where they bothered to follow U.S. laws to legally request data. How much more is there sitting in a data warehouse in the sky?  

Why is the T-Mobile number so high? Is it bad luck? Do they fight the requests the most? Are they playing ball with the TLA’s?  We may never know. VentureBeat speculates that the best way to measure how willing T-Mobile works with the government is by looking at the percentage of government requests to which T-Mobile delivered data. But T-Mobile refused to offer that information to VentureBeat.

“Regarding the additional question on breaking out the numbers further than what’s currently provided in the report, our systems were not designed to track the kind of detailed reporting that other companies engage in today,” a T-Mobile spokesperson wrote to VentureBeat.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.