Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › Facts › How Can Governments Shut Down The Entire Internet?
    If_Your_Government_Shuts_Down_The_Internet_Shut_Down_Your_Government

    How Can Governments Shut Down The Entire Internet?

    By Vikram Singh RaoMarch 19, 2023

    Have you ever thought about the keys and switches that can be used to shut down the entire Internet? Keys and switches that can be controlled by a man or an organization? Yes, they exist. It seems impossible to shut down the entire Internet as it is a collection of many independent networks controlled and maintained by different people, businesses, and governments. But still, we don’t know about the secrets that can be used to shut down the entire Internet. In this article, I am going to talk about the Internet Master key and an Internet kill switch that can be used to shut down the entire internet.

    Contents

    • How to shut down the entire Internet?
      • The Internet Master Key
      • The Internet Kill Switch

    How to shut down the entire Internet?

    The Internet Master Key

    When you open Technotification’s home page, you type the domain name which is technotification.com. Every time you use a domain name, you use the Internet’s DNS servers to translate the human-readable domain name into the machine-readable IP address. The domain names are provided by ICANN (Internet Corporation for Assigned Names and Numbers). ICANN is responsible for assigning numerical Internet addresses to websites and computers and translating them into the normal web addresses that people type into their browsers.

    Now just think about it. If someone were to gain access control of ICANN’s database that person would control the Internet or delete every domain name. For instance, the person could send people to fake bank websites instead of real bank websites, or whatever they want to do, he can do.

    To avoid such a problem, ICANN came up with a way to do that without entrusting too much control to any one person. ICANN selected seven people to be key holders and gave each one an actual key to the Internet. It selected seven more people to be backup keyholders: so a total of 14 people. The physical keys unlock safety deposit boxes stashed around the world. Inside those boxes, there are smart key cards. If they all combine seven smart key cards together then they will have the “master key.” The master key may be a computer code or a password that can be used to access the ICANN database.

    The Internet Kill Switch

    An Internet kill switch is the cybercrime and countermeasures concept of activating a single-button mechanism to shut down all Internet traffic. The concept behind such a kill switch is to create a single point of control for a particular authority in order to ‘shut down the internet to protect it’ from unspecified assailants. However, this is not acceptable for anyone to have an Internet Kill Switch in the hand of the government. It is believed that there are many countries having an Internet kill switch that can shut down the entire internet in a country.

    We have seen such cases in countries like Pakistan, Iraq, North Korea, the Republic of Congo, China, Egypt, etc. Even the U.S. government tried to build its own Internet Kill Switch which many organization claims already exists. According to the Electronic Privacy Information Center (EPIC):

    On March 9, 2006, the National Communications System (‘NCS’) approved SOP 303, however it was never released to the public. This secret document codifies a ‘shutdown and restoration process for use by commercial and private wireless networks during national crisis.’”

    “In a 2006-2007 Report, the President’s National Security Telecommunications Advisory Committee (‘NSTAC’) indicated that SOP 303 would be implemented under the coordination of the National Coordinating Center (‘NCC’) of the NSTAC, while the decision to shut down service would be made by state Homeland Security Advisors or individuals at DHS. The report indicates that NCC will determine if a shut down is necessary based on a ‘series of questions.’”  (Source)

    EPIC has been fighting since 2011 to release the details of the program, which is known as Standard Operating Procedure 303.

    The good news is that there are a lot of ways for telecommunications companies to fight back against such propaganda.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Vikram Singh Rao
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    I am an entrepreneur at heart who has made his hobby turned a passion, his profession now.

    Related Posts

    The Elk Cloner: Origin of the First Computer Virus

    June 2, 2023

    How To Disappear from the Internet?

    April 25, 2023

    Journey of the Internet From ARPANET To WWW

    December 10, 2023

    Understanding the Risks of the Dark Web

    March 21, 2023

    Why You Need To Digitalize Your Docs for Your Business

    December 4, 2022

    Apple Earns More From Gaming Than Sony and Microsoft Together

    December 4, 2022
    Lists You May Like

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.