Out of Sight, Not out of Mind - a User-View on the Criticality of the Submarine Cable Network Shucheng Liu Zachary S

Total Page:16

File Type:pdf, Size:1020Kb

Out of Sight, Not out of Mind - a User-View on the Criticality of the Submarine Cable Network Shucheng Liu Zachary S Out of Sight, Not Out of Mind - A User-View on the Criticality of the Submarine Cable Network Shucheng Liu Zachary S. Bischof Ishaan Madan Northwestern University IIJ Research Lab Northwestern University Peter K. Chan Fabián E. Bustamante Northwestern University Northwestern University ABSTRACT deployments of the submarine network date back to the mid- Nearly all international data is carried by a mesh of subma- 19th century [22], the recent explosion of Internet traffic rine cables connecting virtually every region in the world. has driven an exponential proliferation on the total capacity It is generally assumed that Internet services rely on this required of this infrastructure [30]. submarine cable network (SCN) for backend traffic, but that Today, the submarine cable network (SCN) is recognized most users do not directly depend on it, as popular resources as vitally important to the global economy and as an enabler are either local or cached nearby. In this paper, we study the of sustainable growth in developing regions [7, 21]. For in- criticality of the SCN from the perspective of end users. We stance, it is estimated that if the ≈40 cables connecting the present a general methodology for analyzing the reliance US to the rest of the world were cut, only 7% of the total US on the SCN for a given region, and apply it to the most pop- traffic volume could be carried by satellite [28]. At the same ular web resources accessed by users in 63 countries from time, new cable deployments increase international capacity every inhabited continent, collectively capturing ≈80% of the and add competition at the backhaul level, triggering drops global Internet population. We find that as many as 64.33% on wholesale and connectivity prices, thus helping expand of all web resources accessed from a specific country rely on Internet access previously limited by cost [18]. the SCN. Despite the explosive growth of data center and Despite its obvious importance, we lack a clear under- CDN infrastructure around the world, at least 28.22% of the standing of the criticality of the SCN in the global Internet. CDN-hosted resources traverse a submarine cable. While it is generally understood that Internet services rely on the SCN for backend traffic, the common assumption ACM Reference Format: is that most Internet users do not directly depend on it, as Shucheng Liu, Zachary S. Bischof, Ishaan Madan, Peter K. Chan, popular resources are either local or cached by nearby CDN and Fabián E. Bustamante. 2020. Out of Sight, Not Out of Mind - A User-View on the Criticality of the Submarine Cable Network. servers [19]. The reoccurrence of country-wide disconnec- In ACM Internet Measurement Conference (IMC ’20), October 27– tions or performance issues as a result of submarine cable 29, 2020, Virtual Event, USA. ACM, New York, NY, USA, 7 pages. cuts casts doubt on this assumption [26]. https://doi.org/10.1145/3419394.3423633 In this work, we study the criticality of the SCN from the perspective of Internet end users. We present a general 1 INTRODUCTION methodology for analyzing the reliance on the SCN of a given region (§3). We apply this methodology to the most Ninety-nine percent of all international data is carried by a popular web resources accessed by users in over 60 coun- mesh of submarine cables at the bottom of the ocean [34], tries, covering every inhabited continent in the world and connecting nearly every region in the world. While initial collectively capturing ≈80% of the global Internet population Permission to make digital or hard copies of all or part of this work for (§4). We show (§5) that as many as 64.33% of all resources personal or classroom use is granted without fee provided that copies accessed from an island country and 43.18% accessed from a are not made or distributed for profit or commercial advantage and that non-island country rely on the SCN. Even from landlocked copies bear this notice and the full citation on the first page. Copyrights countries – those without direct access to an ocean – 16.25% for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or of all web requests, on average, depend on the SCN. Despite republish, to post on servers or to redistribute to lists, requires prior specific the explosive growth of datacenter and CDN infrastructure permission and/or a fee. Request permissions from [email protected]. around the world, we find that on average, at least 28.22% of IMC ’20, October 27–29, 2020, Virtual Event, USA the CDN-hosted resources hit a submarine cable, with that © 2020 Copyright held by the owner/author(s). Publication rights licensed figure as high as 65.1% for some countries. to ACM. To encourage further research on the criticality of the SCN, ACM ISBN 978-1-4503-8138-3/20/10...$15.00 https://doi.org/10.1145/3419394.3423633 we make our measurement framework, dataset, and analysis 194 IMC ’20, October 27–29, 2020, Virtual Event, USA S. Liu et al. code publicly available at https://github.com/NU-AquaLab/ For our analysis, we use the top Alexa sites for each coun- Criticality-SCN. try as a proxy for identifying Internet resources that are important to users in that region. We thus define the criti- 2 MOTIVATION cality of the SCN as the percentage of resources for these top sites retrieved via SCN infrastructure, as revealed by our Today’s SCN includes over 400 cables across more than 1 mil- analysis. We use this to calculate a SCN hit rate of a region. lion kilometers, and transfers over 1 Pbps of traffic [20]. The In considering criticality, we focus on the impact of SCN majority of these cables have been constructed and managed failures on reachability, and leave the potential impact on per- by consortia, and are shared by multiple network operators. formance – as networks route around failures via potentially TAT-8, for instance, had 35 participants, including most ma- less optimal paths [5, 6] – for future work. jor international carriers at the time (including AT&T, British In addition to web browsing, other categories of network Telecom and France Telecom) [35]. However, the latest con- applications such as personalized live streaming, video con- struction boom has been largely driven by content providers ferencing and IP telephony could serve as viable proxies for such as Google, Facebook, Microsoft, and Amazon [29]. Ac- evaluating the criticality of the SCN, potentially requiring a cording to TeleGeography, the amount of capacity deployed different methodology and yielding different results. Thisis by content providers has risen tenfold between 2013 and another promising direction for future research. 2017, outpacing all other customers of international band- width [29]. Damage to submarine cables can cause wide-spread net- 3 METHODOLOGY work issues impacting Internet services and end users, es- In this section, we describe the methodology developed for pecially when multiple such events occur in a short time this work. At a high level, for a given country, we look to period [26]. One particularly severe example was the 2008 determine the degree of criticality of the SCN from the per- submarine cable disruption [36], wherein a series of cable spective of Internet users in that country by: ¹1º identifying a cuts within a two week period resulted in 14 countries having set of popular Internet resources (e.g., resources used by top x connectivity issues that ranged from complete disconnec- Alexa sites for the country, popular video hosting/streaming tions to severely limited bandwidth. In early 2013, divers off services, etc.), ¹2º geographically locating the servers hosting the coast of Egypt attempting to cut the cable SEA-WE-ME-4 those resources and a sufficient fraction of the routers along caused a 60% drop in Internet speed, which took about 20 the path, and ¹3º identifying the use of SCN links on the path hours to recover from [17]. As recently as January 2020, cable to the aforementioned servers. The following paragraphs cuts to FALCON, SAT3/WASC and WACS resulted in major expand on this. outages and degraded Internet performance in parts of the Middle East and throughout much of Africa [16, 32]. 3.1 Popular Internet Resources Despite the continued investments in the SCN over the last As a first step in our methodology, we identify a set of popu- three decades, increased caching infrastructure (e.g., CDNs) lar Internet resources for a given country. For this, we con- around the globe, and data centers moving closer to the sider the Alexa country/region rankings to identify those network edge, major events such as these seem to occur resources relied on by the most popular sites for a given with some regularity, directly impacting not only backend country. While other definitions of popularity are plausible, traffic, but resource retrieval for end users aswell. we argue that resources from top Alexa sites are a good proxy, Previous works have demonstrated how changes in SCN considering that web browsing is one of the most common infrastructure can affect network traffic at a general level Internet activities. (e.g., performance and reachability) [21, 25]. Our goal is to understand, empirically, the degree to which the SCN is 3.2 Resource Paths Geolocation critical for end users. To this end, we need to start with a After identifying the set of popular Internet resources, we clear, quantifiable definition of criticality. geolocate both the servers hosting them and a large sub- set of the routers in the path. To this end, we first launch 2.1 Defining Criticality traceroute measurements from RIPE Atlas nodes [31] in each Critical infrastructure generally refers to an asset that is es- country/region towards the identified hosting servers.
Recommended publications
  • North Korean Cyber Capabilities: in Brief
    North Korean Cyber Capabilities: In Brief Emma Chanlett-Avery Specialist in Asian Affairs Liana W. Rosen Specialist in International Crime and Narcotics John W. Rollins Specialist in Terrorism and National Security Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations August 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44912 North Korean Cyber Capabilities: In Brief Overview As North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea’s WMD and ballistic missile programs and human rights abuses. According to some experts, another threat is emerging from North Korea: an ambitious and well-resourced cyber program. North Korea’s cyberattacks have the potential not only to disrupt international commerce, but to direct resources to its clandestine weapons and delivery system programs, potentially enhancing its ability to evade international sanctions. As Congress addresses the multitude of threats emanating from North Korea, it may need to consider responses to the cyber aspect of North Korea’s repertoire. This would likely involve multiple committees, some of which operate in a classified setting. This report will provide a brief summary of what unclassified open-source reporting has revealed about the secretive program, introduce four case studies in which North Korean operators are suspected of having perpetrated malicious operations, and provide an overview of the international finance messaging service that these hackers may be exploiting.
    [Show full text]
  • Never Agains IV February 2010
    the Availability Digest www.availabilitydigest.com More Never Agains IV February 2010 It is once again time to reflect on the damage that IT systems can inflict on us mere humans. We have come a long way in ensuring the high availability of our data-processing systems. But as the following stories show, we still have a ways to go. During the last six months, hardware/software and network faults shared responsibility, each causing about one-third of the outages. The rest of the outages were caused by a variety of problems such as power failures, construction mishaps, and hacking. Rackspace Hit with Another Outage Techcrunch, June 20, 2009 – On June 20, Rackspace suffered yet another outage1 due to a power failure. The breaker on the primary utility feed powering one of its nine data centers tripped, causing data center’s generators to start up. However, a field excitation failure escalated to the point that the generators became overloaded. An attempt by Rackspace to fail over to its secondary utility feed failed because the transfer switch malfunctioned. When the data center’s batteries ran out, the data center went down. Failovers do fail. Have a contingency plan no matter the extent of your redundancy. NYSE Suffers Several Outages in Less Than a Month Reuters, July 2, 2009 – On Thursday morning, July 2, brokers on the floor of the New York Stock Exchange found that they could not route orders, causing the NYSE to halt trading in some stocks and to extend the trading day. During the previous month, a software glitch halted trading; and an order-matching problem affected timely order reconciliation.
    [Show full text]
  • Availability Digest
    the Availability Digest www.availabilitydigest.com Help! My Data Center is Down! Part 3: Internet Outages December 2011 Long gone are the days of the isolated data center. Back then, batch jobs were submitted to update databases and to generate reports. Back then, turn-around times were measured in hours or even days. In today’s competitive environment, IT services are online; and instant response times are expected. What good is a data center if no one can talk to it? Orders can’t be placed or tracked. Medical records can’t be accessed. Online banking comes to a halt. Today’s data centers must be connected. They depend upon the networks that allow users to access them online reliably and with fast response times. In the old days, a company had control over its communication network. It leased lines that it used exclusively for its purposes. If it lost communications, it had direct access to its communication carrier for rapid repair. For critical applications, companies installed redundant communication facilities so that they could continue in operation even in the presence of a communications failure on one of their lines. Not so true today. More and more, companies are relying on the public Internet to connect their users with company data centers. But how reliable is the Internet? In our previous articles in this series, we related horror stories of unimaginable power failures and storage failures that took down the best-designed data centers. In this article, we explore some notable Internet failures that rendered data centers useless even though they were otherwise fully operational.
    [Show full text]
  • Potential Human Cost of Cyber Operations
    ICRC EXPERT MEETING 14–16 NOVEMBER 2018 – GENEVA THE POTENTIAL HUMAN COST OF CYBER OPERATIONS REPORT ICRC EXPERT MEETING 14–16 NOVEMBER 2018 – GENEVA THE POTENTIAL HUMAN COST OF CYBER OPERATIONS Report prepared and edited by Laurent Gisel, senior legal adviser, and Lukasz Olejnik, scientific adviser on cyber, ICRC THE POTENTIAL HUMAN COST OF CYBER OPERATIONS Table of Contents Foreword............................................................................................................................................. 3 Acknowledgements ............................................................................................................................. 4 Executive summary ............................................................................................................................. 5 Introduction....................................................................................................................................... 10 Session 1: Cyber operations in practice .………………………………………………………………………….….11 A. Understanding cyber operations with the cyber kill chain model ...................................................... 11 B. Operational purpose ................................................................................................................. 11 C. Trusted systems and software supply chain attacks ...................................................................... 13 D. Cyber capabilities and exploits ..................................................................................................
    [Show full text]
  • No Internet? February 2008
    the Availability Digest What? No Internet? February 2008 On Wednesday, January 30, 2008, North Africa, the Middle East, and India experienced a massive Internet outage that was destined to last for several days or even weeks.1 How did this happen? How did companies cope? Could it happen in other areas such as Europe or the United States? The Failure The bulk of data traffic from North Africa, from the Middle Eastern countries, and from India and Pakistan is routed through North Africa. There, it is carried by a set of three submarine cables that lie under the Mediterranean Sea. The cables link Alexandria, Egypt, with Palermo, Italy, where the traffic then moves on to Europe, the UK, and the Eastern United States. On January 30, 2008, two of these three cables were severed. It is not yet known why, but the predominant theory is that the cables were severed by the anchor of a huge freighter. Heavy storms had hit the area the previous day and forced Egyptian authorities to close the northern entrance to the Suez Canal at Alexandria. As a result, ships had to anchor offshore in the Mediterranean Sea, dropping their anchors to ride out the storm. It is suspected that one of the freighters dropped its anchor on top of the cables. Reportedly, the two severed cables were a kilometer apart. The storm may have dragged the freighter’s anchor across the sea bed, thus taking out both cables. The result of this catastrophe was that 75% of channel capacity was lost from the Mideast to Europe and beyond.
    [Show full text]
  • Demography, Urbanization and Development
    WPS7333 Policy Research Working Paper 7333 Public Disclosure Authorized Demography, Urbanization and Development Rural Push, Urban Pull and … Urban Push? Public Disclosure Authorized Remi Jedwab Luc Christiaensen Marina Gindelsky Public Disclosure Authorized Public Disclosure Authorized Africa Region Office of the Chief Economist June 2015 Policy Research Working Paper 7333 Abstract Developing countries have urbanized rapidly since 1950. rapid urban growth and urbanization may also be linked To explain urbanization, standard models emphasize rural- to demographic factors, such as rapid internal urban urban migration, focusing on rural push factors (agricultural population growth, or an urban push. High urban natu- modernization and rural poverty) and urban pull factors ral increase in today’s developing countries follows from (industrialization and urban-biased policies). Using new lower urban mortality, relative to Industrial Europe, where historical data on urban birth and death rates for seven higher urban deaths offset urban births. This compounds countries from Industrial Europe (1800–1910) and the effects of migration and displays strong associations thirty-five developing countries (1960–2010), this paper with urban congestion, providing additional insight argues that a non-negligible part of developing countries’ into the phenomenon of urbanization without growth. This paper is a product of the Office of the Chief Economist, Africa Region of the World Bank, in collaboration with George Washington University. It is part of a larger effort by the World Bank to provide open access to its research and make a contribution to development policy discussions around the world. Policy Research Working Papers are also posted on the Web at http://econ.worldbank.org.
    [Show full text]
  • Cyber Benefits and Risks: Quantitatively Understanding and Forecasting the Balance
    Cyber Benefits and Risks: Quantitatively Understanding and Forecasting the Balance Extended Project Report from the Frederick S. Pardee Center for International Futures Josef Korbel School of International Studies University of Denver www.pardee.du.edu September 2015 Barry B. Hughes, David Bohl, Mohammod Irfan, Eli Margolese-Malin, and José Solórzano In project collaboration with and the Table of Contents Executive Summary 4 Conceptualizing Benefits and Costs 4 Using the IFs System for Analysis 4 Background Research Foundations 5 Forecasts and Findings 9 Conclusion 11 A Final Note on Study Contributions 12 1. Introduction: Understanding and Anticipating Change in the Benefits and Costs of Cyber Technology 13 2. ICT and Cyber Development Indices 18 Indices Replicated in the IFs Forecasting System 18 ICT Development Index 18 Global Cybersecurity Index 19 Additional Indices of Importance in Cyber Security Analyses 21 Digitization Index 21 Digital Economy Ranking Index 21 Networked Readiness Index 22 3. Benefits 23 Competing Schools of Thought on Economic Benefits 23 Pessimism Versus optimism concerning ICT’s economic production impacts 23 ICT as a general-purpose technology 25 ICT’s Economic Impact: The Production Side 26 ICT as a growth sector in the economy 26 ICT investment and capital services 29 ICT and multifactor productivity 32 Comparing the Productivity Impacts of GPTs: Steam, Electricity, ICT 33 Variation in ICT Impact across Time/Pervasiveness and Countries 36 Drivers of variation in ICT impact: ICT (especially broadband) pervasiveness 36 Drivers of variable ICT impact: Beyond PCs and broadband 39 Drivers of variable ICT impact: Country development level 41 Consumer Surplus 42 Consumer surplus forecasts 46 Summary of Knowledge Concerning Cyber Risk Benefits: Modeling Implications 47 4.
    [Show full text]
  • Urbanization with and Without Industrialization∗
    Urbanization with and without Industrialization∗ a Douglas GOLLIN Rémi JEDWABb Dietrich VOLLRATHc a Department of International Development, University of Oxford b Department of Economics, George Washington University c Department of Economics, University of Houston This Version: October 1st, 2013 Abstract: Many theories link urbanization with industrialization; in partic- ular, with the production of tradable (and typically manufactured) goods. We document that the expected relationship between urbanization and the level of industrialization is not present in a sample of developing economies. The breakdown occurs due to a large sub-sample of resource exporters that have urbanized without increasing output in either manufacturing or in- dustrial services such as finance. To account for these stylized facts, we construct a model of structural change that accommodates two different paths to high urbanization rates. The first involves the typical movement of labor from agriculture into industry, as in many models of structural change; this stylized pattern leads to what we term “production cities” that produce tradable goods. The second path is driven by the income effect of natural resource endowments: resource rents are spent on urban goods and services, which gives rise to “consumption cities” that are made up pri- marily of workers in non-tradable services. We document empirically that there is such a distinction in the employment composition of cities between developing countries that rely on natural resource exports and those that do not. Our model and the supporting data suggest that urbanization is not a homogenous event, and this has possible implications for long-run growth. Keywords: Structural Change; Urbanization; Industrialization JEL classification: L16; N10; N90; O18; O41; R10 ∗Douglas Gollin, University of Oxford (e-mail: [email protected]).
    [Show full text]
  • DPCC Country Codes V1.2 (PDF)
    DPCC Country Codes List v1.2 DPCC Country Codes List v1.2 - ISO 3166 Standard DPCC State Province Codes List v1.2 - ISO 3166-2 Standard ISO Country Name ISO Country Code NCBI Country Name ISO Country Name ISO Country Code ISO State Province Code ISO State Province Name Afghanistan AFG Afghanistan United States of America USA US-AL Alabama Aland Islands ALA United States of America USA US-AK Alaska Albania ALB Albania United States of America USA US-AZ Arizona Algeria DZA Algeria United States of America USA US-AR Arkansas American Samoa ASM American Samoa United States of America USA US-CA California Andorra AND Andorra United States of America USA US-CO Colorado Angola AGO Angola United States of America USA US-CT Connecticut Anguilla AIA Anguilla United States of America USA US-DE Delaware Antarctica ATA Antarctica United States of America USA US-DC District of Columbia Antigua and Barbuda ATG Antigua and Barbuda United States of America USA US-FL Florida Argentina ARG Argentina United States of America USA US-GA Georgia Armenia ARM Armenia United States of America USA US-HI Hawaii Aruba ABW Aruba United States of America USA US-ID Idaho Australia AUS Australia United States of America USA US-IL Illinois Austria AUT Austria United States of America USA US-IN Indiana Azerbaijan AZE Azerbaijan United States of America USA US-IA Iowa Bahamas BHS Bahamas United States of America USA US-KS Kansas Bahrain BHR Bahrain United States of America USA US-KY Kentucky Bangladesh BGD Bangladesh United States of America USA US-LA Louisiana Barbados
    [Show full text]
  • SDN-Based Intrusion Detection System for Early Detection and Mitigation of Ddos Attacks
    Article SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks Pedro Manso 1, José Moura 2,* and Carlos Serrão 3 1 Department of Information Science and Technology, School of Technology and Architecture, ISCTE- Instituto Universitário de Lisboa, 1649-026 Lisbon Portugal; [email protected] 2 Department of Information Science and Technology, School of Technology and Architecture, ISCTE- Instituto Universitário de Lisboa, Instituto de Telecomunicações (IT), 1649-026 Lisbon, Portugal 3 Department of Information Science and Technology, School of Technology and Architecture, ISCTE- Instituto Universitário de Lisboa, Information Sciences, Technologies and Architecture Research Center (ISTAR-IUL), 1649-026 Lisbon, Portugal; [email protected] * Correspondence: [email protected] Received: 18 January 2019; Accepted: 4 March 2019; Published: date Abstract: The current paper addresses relevant network security vulnerabilities introduced by network devices within the emerging paradigm of Internet of Things (IoT) as well as the urgent need to mitigate the negative effects of some types of Distributed Denial of Service (DDoS) attacks that try to explore those security weaknesses. We design and implement a Software-Defined Intrusion Detection System (IDS) that reactively impairs the attacks at its origin, ensuring the “normal operation” of the network infrastructure. Our proposal includes an IDS that automatically detects several DDoS attacks, and then as an attack is detected, it notifies a Software Defined Networking (SDN) controller. The current proposal also downloads some convenient traffic forwarding decisions from the SDN controller to network devices. The evaluation results suggest that our proposal timely detects several types of cyber-attacks based on DDoS, mitigates their negative impacts on the network performance, and ensures the correct data delivery of normal traffic.
    [Show full text]
  • Study on Cloud Computing in Arab States: Legal and Legislative
    International Telecommunication Union Cloud Computing in Arab States: Legal and Legislative Aspects, Facts and Horizons International Telecommunication Union Report By: Dr. Janane EL-KHOURY Beirut, December 30, 2015 PLAN Executive Summary ……………………………………………………………………………….. 3 Introduction …………………………………………………………………………………………… 4 Part I: Cloud Computing …………………………………………………………………………. 6 Clause I: Practical Challenges and Legal Issues Raised in Arab States 7 Clause II: Legislative and Regulatory Situation Exclusively in Arab States 9 1. Jordan ……………………………………………………………………………………………………….. 12 2. United Arab Emirates (UAE) ………………………………………………………………………. 13 3. Bahrain ……………………………………………………………………………………………………… 16 4. Algeria ………………………………………………………………………………………………………. 17 5. Kingdom Saudi Arabia (KSA) ………………………………………………………………………. 17 6. Sudan ……………………………………………………………………………………………………….. 18 7. Somalia …………………………………………………………………………………………………….. 18 8. Iraq …………………………………………………………………………………………………………… 19 9. Kuwait ……………………………………………………………………………………………………… 19 10. Morocco …………………………………………………………………………………………………… 20 11. Yemen ………………………………………………………………………………………………………. 22 12. Tunisia ……………………………………………………………………………………………………… 22 13. Comoros …………………………………………………………………………………………………… 24 14. Djibouti …………………………………………………………………………………………………….. 24 15. Sultanate of Oman ……………………………………………………………………………………. 24 16. Syria ………………………………………………………………………………………………………….. 25 17. Palestine …………………………………………………………………………………………………… 26 18. Qatar ………………………………………………………………………………………………………… 27 19. Lebanon …………………………………………………………………………………………………….
    [Show full text]
  • A Human Rights-Based Approach to Network Disruptions CONTENTS
    JAN RYDZAK FOR THE GLOBAL NETWORK INITIATIVE A Human Rights-Based Approach to Network Disruptions CONTENTS ABOUT THE AUTHOR . 3 ACKNOWLEDGMENTS ATTRIBUTION EXECUTIVE SUMMARY . 4 INTRODUCTION .................................................................. 5 THE DYNAMICS OF NETWORK DISRUPTIONS. 6 What is a network disruption? ...............................................6 When do network disruptions occur? .........................................8 How do network disruptions occur? .........................................10 The challenges of resisting shutdown orders . 10 THE IMPACTS OF NETWORK DISRUPTIONS .........................................11 Civil and Political Rights. 11 — Freedom of expression, association, and assembly .......................11 —Right to equality and digital discrimination .............................12 —Freedom of religious belief .............................................13 —Right to life, bodily integrity, and security of persons .....................13 Economic, Social, and Cultural Rights . 15 2 — Economic rights ......................................................15 — Right to mental and physical health . 16 — Right to education ....................................................17 — Right to take part in cultural life and benefit from scientific progress ......17 Humanitarian Impacts .....................................................18 RECOMMENDATIONS: AN INTEGRATED APPROACH ................................. 19 Broaden the scope of human rights impact assessments . 19 Improve and expand
    [Show full text]