recommended reading

Turkey's Increasingly Troubling Efforts to Control the Internet

A poster of Turkish Prime Minister Recep Tayyip Erdogan is seen on an election billboard in Istanbul, Turkey.

A poster of Turkish Prime Minister Recep Tayyip Erdogan is seen on an election billboard in Istanbul, Turkey. // Emrah Gurel/AP

Over the weekend, Google reported that Turkey had intercepted traffic to its public domain name system (DNS) service—part of prime minister Recep Tayyip Erdogan’s increasingly draconian crackdown against the social media networks that are being used to distribute damaging information about him.

To understand why the DNS interception is so troubling, you have to understand how a DNS works: websites use a simple name, such as, for the convenience of users. But then domain name systems have to translate those names into their computer-readable numeric form, such as

When Turkey initially blocked Twitter and then YouTube last week, internet users fought back by using Google’s DNS—even spray-painting its numbers onto buildings and billboards in an attempt to spread the word. But now, to combat those guerilla tactics, Erdogan’s government and the country’s ISPs have taken a scary step that could affect all Turkish internet traffic—and even allow it to track down and punish users who try to evade the ban.

Renesys, which security experts consider a reliable source for information about the plumbing of the internet, says that other free DNS services have also been intercepted.

If blocking Twitter is like putting a single phone number out of service, intercepting the DNS is like giving users an entire, fraudulent new phone book—and it’s a troubling escalation against Turkish internet users. The ban began with Twitter, used largely for the discussion of news and politics, then expanded to YouTube, which is far more popular in Turkey because people use it for entertainment as well. A 2012 paper (pdf) estimates that a quarter of Turks over 18 had a YouTube account, compared to just a tenth for Twitter.

The government has also reportedly gone after users of Tor, a popular anonymity tool that saw its popularity in Turkey rocket since the first block 11 days ago. (It’s worth noting that the pre-crackdown baseline should be even lower, due to Tor receiving huge volumes of bot traffic last summer that never fully subsided.)


The truly scary thing about the DNS intercept is that it not only enables a more thorough online blockade, but it could actually be used to track down Turkish citizens who are trying to subvert it.

“Assuming Google’s report is correct, then I believe Turkey would in theory be able to identify the IP addresses attempting to use the DNS server, as long, of course, as these requests pass through the Turkish infrastructure,” says Dr Chris Mitchel, a professor of computer science in the information security group at London’s Royal Holloway University.

That means prime minister Erdogan, who has in the past shown no qualms about arresting journalists, could easily go after the troublemakers attempting to get around the Twitter block. After his party won a disputed local election this weekend, Erdogan vowed to “root out” his opponents, whom he compared to “medieval assassins.”

In the meanwhile, it is probably wise for Turkish internet users to switch away from well-known DNS providers. Robert Hansen of WhiteHat Security, an online security firm, says “diversifying DNS lookups is one way to make the Turkish government’s DNS blockade more difficult.”

Reprinted with permission from Quartz. The original story can be found here

Threatwatch Alert

Stolen credentials

Hackers Steal $31M from Russian Central Bank

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.