The Internet Is Managed by Five Organizations (And You've Never Heard of Most of Them)
When you type a URL into your browser, you're trusting an invisible global system to route your request correctly. That system—the internet routing table—is managed by a handful of organizations: ICANN, IANA, the Regional Internet Registries (RIRs), and a patchwork of national network operators. They decide who gets which IP addresses, who can announce routes, and ultimately, who controls the digital highways of the world.
Most people assume the internet is inherently decentralized. It isn't. It's distributed, but the control points are surprisingly centralized—and increasingly geopolitical.
The BGP Routing Table: The Most Powerful Database You've Never Seen
Border Gateway Protocol (BGP) is the protocol that makes the internet work. It's how routers exchange information about which IP blocks belong to which networks, and how packets should be forwarded across the globe. If BGP says "this IP address belongs to this network," the rest of the internet believes it—no questions asked.
This trust model made sense in 1989 when the internet was a research network connecting universities. In 2026, when nation-states, criminal enterprises, and geopolitical rivals all have access to BGP, it's a catastrophic vulnerability.
Examples:
- 2008: Pakistan Telecom accidentally hijacked YouTube's IP space trying to enforce a domestic ban, taking the entire platform offline globally for hours.
- 2018: China Telecom misrouted traffic from major US and European networks through Chinese servers for months before anyone noticed.
- 2022: Russia-linked actors announced IP space belonging to Ukrainian government agencies, redirecting traffic to servers under their control.
These weren't bugs. They were features of a system designed for cooperation, not conflict.
Who Controls the Routing Table?
Technically, no one "owns" the BGP routing table. It's a consensus mechanism where every network operator announces their own routes, and peers trust those announcements. But in practice, control is concentrated:
- Tier 1 ISPs: A dozen massive networks (Level 3, Cogent, Telia, NTT, etc.) form the backbone of the internet. If they don't route your traffic, you're invisible.
- Regional Internet Registries (RIRs): ARIN (North America), RIPE (Europe/Middle East), APNIC (Asia-Pacific), LACNIC (Latin America), and AFRINIC (Africa) allocate IP addresses. They have veto power over who gets to join the internet.
- National Governments: Increasingly, governments are asserting control over routing within their borders—China's Great Firewall, Russia's Sovereign Internet Law, and the EU's push for "digital sovereignty."
The internet was built as a stateless, borderless network. But IP addresses are now treated as national resources, subject to export controls, sanctions, and seizure.
The Weaponization of IP Space
IP addresses used to be purely technical. Now they're strategic assets:
- Sanctions: OFAC (the US Treasury's Office of Foreign Assets Control) can blacklist entire IP blocks, cutting off access to international networks. Iranian and North Korean networks have been effectively isolated this way.
- Geofencing: Services like Netflix, AWS, and even GitHub use IP-based geolocation to enforce regional restrictions. But who decides what region an IP "belongs" to? Usually, a US-based database maintained by private companies.
- Route Hijacking as Warfare: In 2022, during the Ukraine invasion, Russian actors announced Ukrainian IP space from within Russia, effectively "capturing" digital infrastructure the same way they captured physical territory.
When your business model depends on an IP address that can be politically seized, redirected, or blacklisted, you don't have infrastructure—you have a geopolitical dependency.
The RPKI Solution (And Why It's Not Enough)
The industry's answer to BGP hijacking is Resource Public Key Infrastructure (RPKI)—a cryptographic system where IP holders digitally sign their route announcements, proving they control the addresses they're advertising.
It works. Sort of.
The problem? Adoption is voluntary, and only about 40% of the internet has deployed it. Worse, RPKI relies on the same centralized trust model: the RIRs issue the cryptographic keys. If you lose access to your RIR (say, due to sanctions or political pressure), you lose the ability to prove ownership of your own IP addresses.
RPKI is like putting a lock on your front door—but the government holds the only key.
The Splinternet: National Routing Tables
China already operates a "split-horizon" routing table, where domestic routes are different from international ones. Russia is experimenting with the same. The EU is considering a "sovereign routing" framework to protect critical infrastructure from external manipulation.
What does this mean in practice? The global internet is fragmenting into regional internets, each with its own trust model, its own gateways, and its own rules about what traffic is allowed.
For companies like Link11, which operate internationally, this is a nightmare. We have to navigate multiple regulatory regimes, multiple routing policies, and multiple points of potential failure—all while maintaining the illusion of a seamless, global network.
What This Means for You
If you're building anything on the internet, you need to understand that IP addresses are no longer just technical identifiers—they're geopolitical tokens. Here's what that means:
- Diversify your IP space: Don't rely on a single RIR or a single country for your address allocations. Geographic redundancy isn't just about latency anymore—it's about sovereignty.
- Monitor your routes: Tools like BGPmon and RIPE RIS can alert you if someone announces your IP space without permission. This should be part of your security monitoring, not an afterthought.
- Deploy RPKI: Even if it's not perfect, it's better than nothing. And as adoption grows, the networks that don't use it will become increasingly isolated.
- Plan for fragmentation: If your business depends on cross-border connectivity, you need contingency plans for when those borders close. What happens if China blocks your CDN? If Russia seizes your DNS? If the EU requires local data residency for your routing tables?
The Future: A Balkanized Internet or a New Protocol?
We're at a crossroads. One path leads to a fully fragmented internet, where every nation-state controls its own routing table, and cross-border traffic is subject to inspection, filtering, and veto. The other path leads to a reformed internet with stronger cryptographic guarantees, decentralized trust models, and protection from state-level interference.
I'm not optimistic about the second path. The incentives are all wrong. Nation-states want control, and the existing power structures (Tier 1 ISPs, RIRs, ICANN) benefit from the status quo.
But there's a third option: overlay networks. Technologies like Tor, I2P, and increasingly, zero-trust mesh networks built on WireGuard and similar protocols, let you route traffic independently of the traditional internet. These networks aren't a replacement for BGP—but they're a hedge against its politicization.
At Link11, we're exploring how to build resilience into our DDoS defense infrastructure by treating the public internet as one option among many, not the only option. If the BGP routing table becomes unreliable (whether due to attacks, politics, or incompetence), we need alternative paths.
Conclusion: The Internet Was Never Neutral
The internet is often described as a neutral, open platform—a digital commons that transcends borders. That was always a myth, but it's becoming an obvious one. The routing table is controlled by a small number of organizations, influenced by national governments, and increasingly used as a tool of geopolitical leverage.
If you care about resilience, you can't ignore this. The IP address is no longer just a number—it's a political statement. And the routing table is no longer just a technical database—it's a weapon.
Plan accordingly.
Follow the journey
Subscribe to Lynk for daily insights on AI strategy, cybersecurity, and building in the age of AI.
Subscribe →