{"id":7149,"date":"2016-05-09T09:26:24","date_gmt":"2016-05-09T13:26:24","guid":{"rendered":"https:\/\/kasperskydaily.com\/uk\/?p=7149"},"modified":"2019-11-22T10:10:31","modified_gmt":"2019-11-22T10:10:31","slug":"splinternet","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/splinternet\/7149\/","title":{"rendered":"Splinternet: the fracturing of the web"},"content":{"rendered":"<p>They say that Internet unites people, which is difficult to argue\u00a0against. \u00a0Users of the Internet\u00a0can call their relatives in Europe, find a groupmate from another state in Facebook or apply for an exotic job somewhere on Cayman Islands \u2013 all at any time of the day. It sometimes seems that borders between countries and regions are slowly\u00a0dissolving.<\/p>\n<p>The notion of online freedom and independence on the Internet started to show signs of stress and decay over a decade ago. It\u2019s also possible that the World Wide Web will <a href=\"https:\/\/en.wikipedia.org\/wiki\/Splinternet\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">come apart<\/a> and we all will have a \u2018Splinternet\u2019 instead of Internet. This unusual name is used to denominate a number of local area networks, divided by the geographical borders of different countries and regulated by local laws.<\/p>\n<p>Even now you can find enough examples of how the Splinternet may look. It\u2019s possible due to a number of reasons. \u00a0These reasons vary from political right through to geographical. \u00a0Below, we\u2019ll take a look at some of the main reasons behind the slow fracturing of the WWW.<\/p>\n<h3>The Great Wall of China 2.0<\/h3>\n<p>To see the Internet under strict governmental control you have to go to China. If you want to access Facebook, YouTube or Twitter, read blogs running on Blogspot and WordPress or watch a video on Vimeo, you\u2019ll have to bypass the great firewall of China. Chinese people do have partial access to Wikipedia however, the articles that they\u2019re not able to see\u00a0are politically sensitive in China.<\/p>\n<p>https:\/\/twitter.com\/Socialist_Times\/status\/728749776854986752<\/p>\n<p>There are local analogues for all these websites. Those few people who want to reach beyond the firewall and access original web portals have to use a <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/vpn-explained\/6698\/\" target=\"_blank\" rel=\"noopener\">VPN<\/a>. Usually the Chinese search for Facebook or YouTube only if they have used them before. And this primarily applies to the people who studied abroad, have foreign friends and relatives, those who need these sites for work as English tutors or software developers. Lots of Chinese people say that the nationwide firewall is quite useful and the majority of Chinese people are not ready to surf the Internet unprotected.<\/p>\n<p>https:\/\/www.instagram.com\/p\/_bOYwxOiWN\/<\/p>\n<p>However, one problem with using VPN\u2019s in China is speed. \u00a0Virtual Private Networks in China can be very slow. To a large extend this sloth-like pace can be explained by the fact that there are only three\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Gateway_(telecommunications)\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">gateways<\/a>, which can let users out to the global web. They are located northward, near Beijing, in the centre of the country in Shanghai and southward, in Guangzhou. As traffic passes through these gateways, <a href=\"http:\/\/www.theatlantic.com\/magazine\/archive\/2008\/03\/the-connection-has-been-reset\/306650\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">packets are \u201cmirrored\u201d and monitored by the government<\/a>, which also slows the process down. However slow this Internet is,\u00a0it pales in significance to the North Korean \u2018internet.\u2019<\/p>\n<h3>North Korea: just a humble LAN-party<\/h3>\n<p>A select few\u00a0North Korean citizens have special access to the North Korean internet, however using the term \u201cinternet\u201d is used loosely. They have a local network, which is proudly named Kwangmyong (it can be translated as \u201cbright\u201d) and it has no physical connection to the World Wide Web.<\/p>\n<p>The only way to access Kwangmyong is to use dial-up lines. It is <a href=\"http:\/\/www.makeuseof.com\/tag\/tech-north-korea-look-like\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">estimated<\/a> that there are no more than a few thousand sites on the intranet, and their content is created by the Korean Computer Centre, which translates selected scientific articles form the Internet adding some political propaganda. Kwangmyong is officially free to use, but very few people can access it due to governmental restrictions and simply because computers are too pricy for an average North Korean citizen that earns about <a href=\"http:\/\/www.socialisttimes.com\/great-firewall-china-gets-reinforced\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">$30 per month<\/a>. As for the World Wide Web, only embassies, chosen government officials and special services can access Internet.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Sony?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Sony<\/a> Pictures hack: the whole story <a href=\"http:\/\/t.co\/3Z995XfDNf\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/3Z995XfDNf<\/a> via <a href=\"https:\/\/twitter.com\/engadget?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@engadget<\/a> featuring Kaspersky's <a href=\"https:\/\/twitter.com\/k_sec?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@K_Sec<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/543209910612537345?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 12, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Nevertheless, you can\u2019t\u00a0say that North Korea completely avoids modern technologies. On the contrary, it seems that the government had brought up <a href=\"http:\/\/edition.cnn.com\/2015\/01\/06\/asia\/north-korea-hackers-shenyang\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">its own team of hackers<\/a> and uses them to flex their\u00a0cyber-muscles on the world stage from time to time. Not so long ago the country <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/is-north-korea-really-behind-sony-attack\/5246\/\" target=\"_blank\" rel=\"noopener\">made boast of their cyber-fighters<\/a> after they hacked Sony Pictures.\u00a0Additionally, the lack of any dedicated internet not only keeps their citizens in the dark, it also stops any potential retaliatory attacks from outside sources.<\/p>\n<h3>India: why so slow?<\/h3>\n<p>Internet access in India is rather slow basically because of the poor infrastructure. A curious fact: the thing that stops providers from switching to fibre optics and offering higher speeds is the lack of demand for the high speed internet. Why? Because many companies <a href=\"https:\/\/www.quora.com\/Why-is-the-internet-speed-slow-in-India\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">follow<\/a> the Fair Usage Policy, which slows your access speed down if you use more than agreed.<\/p>\n<p>As Indian citizens admit, their Internet providers would readily run a fibre optics cable to their house if there would be at least a dozen of people who wanted it. Having enough clients providers would be able to cut down prices. \u00a0The thing is that it\u2019s not easy to gather enough volunteers \u2014 nobody wants to be the first.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7152\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2016\/05\/05193834\/india-digital.jpg\" alt=\"india-digital\" width=\"638\" height=\"479\"><\/p>\n<h3>How to leave three countries disconnected with one shovel<\/h3>\n<p>One can say that you need a team of experienced hackers to deprive a whole country of Internet access. As It turns out, all you actually need is a 75 year old Georgian woman with a shovel and a penchant for copper.<\/p>\n<p>In March 2011 she was digging for copper not far from Tbilisi, the capital of Georgia. During the \u201cexploration works\u201d her spade damaged the fibre-optic cable which transferred 99% of Internet traffic to Armenia and some regions in Georgia and Azerbaijan. As the result in March 28 these regions were forced to stay offline for 12 hours.<\/p>\n<p>As it turned out, <a href=\"http:\/\/www.wsj.com\/articles\/SB10001424052748704630004576249013084603344\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">this cable had been damaged<\/a> several times before by copper and potato hunters. One year earlier there was a similar incident, fortunately with less striking consequences. This enviable consistency can be explained by the weather, which regularly opens access to the cable to different saboteurs.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Armenia?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Armenia<\/a> Boasts Region\u2019s Most Advanced Fiber <a href=\"https:\/\/twitter.com\/hashtag\/Internet?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Internet<\/a> Service <a href=\"http:\/\/t.co\/ypSetJN44K\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/ypSetJN44K<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/tech?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#tech<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/IT?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#IT<\/a> <a href=\"http:\/\/t.co\/sbELqm0L6h\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/sbELqm0L6h<\/a><\/p>\n<p>\u2014 Kate Nahapetian (@KN87) <a href=\"https:\/\/twitter.com\/KN87\/status\/565260303475425280?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 10, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The cable enters Georgia territory through the Black Sea, via\u00a0the Poti seaport. Then it branches, and heads on towards Armenia and Azerbaijan. To protect it from vandals the cable was laid in an underground tunnel dug parallel to the railway. But heavy rainfalls sometimes cause the pipe to become exposed. It looks like the aged Georgian woman and other diggers discovered\u00a0the cable during\u00a0periods of heavy rainfall.<\/p>\n<p>The <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_backbone\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Internet\u2019s backbone<\/a> survived a number of other noteworthy incidents. In 2013 in Egypt three copper hunters looked for the coloured metal and <a href=\"http:\/\/www.bbc.co.uk\/news\/world-middle-east-21963100\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">cut a piece<\/a> of underwater cables. As the result Internet speed in the country decreased by 60%. In 2008 Egypt, India, Pakistan and Kuwait suffered from a similar incident, which <a href=\"http:\/\/www.wired.com\/threatlevel\/2008\/01\/fiber-optic-cab\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">took place<\/a> near Alexandria coast.<\/p>\n<p>Vandals were not the only people to blame for Internet blackout in Egypt. In 2011 local authorities <a href=\"http:\/\/www.wired.com\/2011\/01\/egypt-isp-shutdown\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">successfully did the same<\/a> (and shut down cellular connection as well). Moreover, they did it with the help of just several phone calls to local providers.<\/p>\n<p>However Egypt is not alone in this matter. There are a lot of countries <a href=\"https:\/\/www.youtube.com\/watch?v=lZpL5q-zg8c\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">with limited Internet<\/a>. Last year the Freedom House organisation published a report, which named <a href=\"http:\/\/i100.independent.co.uk\/article\/these-are-the-countries-with-the-most-internet-freedom--WkRhQ5U__x\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">TOP 10 countries with the most censored Internet<\/a>.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/f0AttmpBP5s?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>As a final titbit, let\u2019s look at this world map designed by Renesys company. It shows which countries can be quickly disconnected from the internet. For example, Russia and the USA are connected with the whole world via dozens of cables, along with wireless connections and satellites \u2013 which are significantly\u00a0more difficult to disconnect. Countries with a less-developed infrastructure are more vulnerable. You can find Syria, Ethiopia, Uzbekistan, Turkmenistan, Myanmar and Yemen among them.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-7151\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2016\/05\/05193836\/world-2014.png\" alt=\"world-2014\" width=\"1024\" height=\"597\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How does internet connection look around the world? <\/p>\n","protected":false},"author":522,"featured_media":7150,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1035,553,1459],"class_list":{"0":"post-7149","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-internet","9":"tag-news-2","10":"tag-splinternet"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/splinternet\/7149\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/splinternet\/7118\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/splinternet\/7089\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/splinternet\/8287\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/splinternet\/8130\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/splinternet\/11746\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/splinternet\/12051\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/splinternet\/5615\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/splinternet\/6238\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/splinternet\/7621\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/splinternet\/11318\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/splinternet\/11746\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/splinternet\/12051\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/splinternet\/12051\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/internet\/","name":"Internet"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=7149"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7149\/revisions"}],"predecessor-version":[{"id":17731,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7149\/revisions\/17731"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/7150"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=7149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=7149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=7149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}