The article below is very good and something I never knew about.
It is chilling to know just how frail the Internet can be. All could netizens should be aware of the foundations and underpinning of the Internet.
Mar. 1, 2014, 1:15 PM
The internet is actually controlled by 14 people who hold 7 secret keys
The people conducting the ceremony are part of an organization called the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is responsible for assigning numerical internet addresses to websites and computers and translating them into the normal web addresses that people type into their browsers.
For instance, type 220.127.116.11 into your browser, and you'll be taken to Business Insider's web page. But www.businessinsider.com is easier for people to remember. ICANN maps the numbers (easier for computers to use) with words (easier for humans to use).
If someone were to gain control of ICANN's database, that person would control the internet. For instance, the person could send people to fake bank websites instead of real bank websites.
On the other hand, if a calamity happened, the ICANN database could need to be rebuilt. So ICANN came up with a way to do that without entrusting too much control to any one person. It selected seven people as key holders and gave each one an actual key to internet. It selected seven more people to be backup key holders: 14 people in all.
The physical keys unlock safe deposit boxes stashed around the world. Inside those boxes are smart key cards. Put the seven smartcards together and you have the "master key." The master key is really some computer code, a password of sorts that can access the ICANN database.
Four times a year since 2010 the seven key holders meet for the key ceremony where they generate a new master key, i.e. a new password.
The security to be admitted to the ceremony is intense, Ball reports, and involves passing through a series of locked doors using key codes and hand scanners, until entering a room so secure that no electronic communications can escape it.The group conducts the ritual, then each person files out of the room one by one, and then they all head to a restaurant and party.
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.