TechCentralTechCentral
    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Dimension Data to be renamed NTT Data

      27 October 2023

      DStv makes RWC final stream available for R19.95

      27 October 2023

      Karpowership gets green light for Richards Bay plant

      27 October 2023

      Why people wave on Zoom

      27 October 2023

      Microsoft gaining ground in cloud race with AWS, Google

      27 October 2023
    • World

      Intel beats expectations; manufacturing momentum builds

      27 October 2023

      Google CEO to testify on Monday in antitrust trial

      27 October 2023

      Huawei sees growth in cloud, digital power segments

      27 October 2023

      China rushes to swap Western tech for domestic options

      26 October 2023

      Alphabet, Meta deliver solid financial performances

      26 October 2023
    • In-depth

      Quantum computers in 2023: what they do and where they’re heading

      22 October 2023

      How did Stephen van Coller really do as EOH CEO?

      19 October 2023

      Risc-V emerges as new front in US-China tech war

      6 October 2023

      Get ready for a tidal wave of software M&A

      26 September 2023

      Watch | A tour of Vumatel’s Alexandra fibre roll-out

      19 September 2023
    • TCS

      TCS | Mesh.trade’s Connie Bloem on the future of finance

      26 October 2023

      TCS | Rahul Jain on Peach Payments’ big funding round

      23 October 2023

      TCS+ | How MiWay uses conversation analytics

      16 October 2023

      TCS+ | The story behind MTN SuperFlex

      13 October 2023

      TCS | The Information Regulator bares its teeth – an interview with Pansy Tlakula

      6 October 2023
    • Opinion

      Big banks, take note: PayShap should be free

      20 October 2023

      Eskom rolling out virtual wheeling – here’s how it works

      4 October 2023

      How blockchain can help defeat the scourge of counterfeit goods

      29 September 2023

      There’s more to the skills crisis than emigration

      29 September 2023

      The role of banks in Africa’s digital future

      22 August 2023
    • Company Hubs
      • 4IRI
      • Africa Data Centres
      • Altron Document Solutions
      • Altron Systems Integration
      • Arctic Wolf
      • AvertITD
      • CoCre8
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • E4
      • Entelect
      • ESET
      • Euphoria Telecom
      • iKhokha
      • Incredible Business
      • iONLINE
      • LSD Open
      • Maxtec
      • MiRO
      • NEC XON
      • Next DLP
      • Ricoh
      • Skybox Security
      • SkyWire
      • Velocity Group
      • Videri Digital
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • E-commerce
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Metaverse and gaming
      • Motoring and transport
      • Open-source software
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Internet and connectivity » Internet shutdowns, and how governments do it

    Internet shutdowns, and how governments do it

    Internet shutdowns are a tactic some governments use during times of political contention. How do they do it?
    By The Conversation11 August 2023
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    internet shutdownsSenegal’s government has shut down internet access in response to protests about the sentencing of opposition leader Ousmane Sonko. This is a tactic governments are increasingly using during times of political contention, such as elections or social upheaval. The shutdowns can be partial or total, temporary or prolonged. They may target specific platforms or regions, or an entire country.

    I’m a researcher who investigates the causes and consequences of internet access disruptions and censorship in various African countries. This includes understanding how shutdowns work. It’s important to understand the complex technicalities behind internet shutdowns, for at least two reasons.

    Firstly, understanding how an internet shutdown works shows whether or how it can be circumvented. This makes it possible to support affected communities.

    Two common strategies used to disrupt internet access are routing disruptions and packet filtering

    Secondly, the way a shutdown works shows who is responsible for doing it. Then the responsible actors can be held to account, both legally and ethically.

    Different forms of shutdowns require different levels of technical sophistication. More sophisticated forms are harder to detect and attribute.

    There are two common strategies governments use to disrupt internet access: routing disruptions and packet filtering.

    Routing disruptions

    Every device connected to the internet, whether it’s your computer or smartphone, or any other device, has an IP (internet protocol) address assigned to it. This allows it to send and receive data across the network.

    An autonomous system is a collection of connected IP networks under the control of a single entity, for instance an internet service provider or big company.

    These autonomous systems rely on protocols – called border gateway protocols – to coordinate routing between them. Each system uses the protocol to communicate with other systems and exchange information about which internet routes they can use to reach different destinations (websites, servers, services, etc).

    So, if an autonomous system, like an ISP, suddenly withdraws its border gateway protocol routes from the internet, the block of IP addresses they administer disappears from the routing tables. This means they can no longer be reached by other autonomous systems. As a consequence, customers using IP addresses from that autonomous system can’t connect to the internet.

    Essentially this tactic stops information from being transmitted. Information can’t find its destination, and people using the internet will not be able to connect.

    The disruption of border gateway protocols can easily be detected from the outside due to changes in the global routing state. They can also be attributed to the ISP administering a certain autonomous system.

    For instance, data suggests that the infamous internet shutdown in Egypt in 2011 – an unprecedented blackout of internet traffic in the entire country – was the result of tampering with border gateway protocols. It could be traced back to individual autonomous systems and hence internet service providers.

    Border gateway protocol disruptions that entirely disconnect customers from the internet are rare. These disruptions can easily be detected by outside observers and traced back to individual organisations or service providers. In addition, shutting down entire networks is the most indiscriminate form of an internet shutdown and can cause significant collateral damage to a country’s economy.

    Packet filtering

    To target specific content, governments often use packet filtering – shutting down only parts of the internet.

    Governments can use packet filtering techniques to block or disrupt specific content or services. For instance, internet service providers can block access to specific IP addresses associated with websites or services they wish to restrict, such as 15.197.206.217 associated with the social media platform WhatsApp.

    Governments also increasingly use deep packet inspection technology as a tool to filter and block specific content. It’s commonly used for surveillance. Deep packet inspection infrastructure enables the inspection of data packets and hence the content of communication. It’s a more tailored approach to blocking content and makes circumvention more difficult.

    In Senegal, ISPs likely used deep packet inspection to block access to WhatsApp, Telegram, Facebook, Instagram, Twitter and YouTube.

    When internet shutdowns are done through packet filtering, only individuals within the affected network are able to detect the shutdown. Therefore, active probing is required to detect the shutdown. This is a technique that’s used by cybersecurity researchers and civil society actors to study the extent and methods of internet censorship in different regions.

    There is wide agreement that internet shutdowns are a violation of fundamental rights such as freedom of expression

    Though the two most common strategies are routing disruptions and packet filtering, there are many other tools governments can use. For instance, domain name system manipulation, denial of service attacks, or the blunt sabotage of physical infrastructure. A detailed overview of techniques is provided by Access Now, an NGO defending digital civil rights of people around the world.

    There is wide agreement that internet shutdowns are a violation of fundamental rights such as freedom of expression. However, governments are developing increasingly sophisticated means to block or restrict access to the internet. It’s therefore important to closely monitor the ways in which internet shutdowns are being implemented. This will help to provide circumvention strategies and hold the implementers to account.The Conversation

    • The author, Lisa Garbe, is research fellow, WZB Berlin Social Science Centre
    • This article is republished from The Conversation under a Creative Commons licence

    Get TechCentral’s daily newsletter

    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleSanctions-hit Huawei is on the mend
    Next Article The US is wrong about China

    Related Posts

    Dimension Data to be renamed NTT Data

    27 October 2023

    DStv makes RWC final stream available for R19.95

    27 October 2023

    Karpowership gets green light for Richards Bay plant

    27 October 2023
    Promoted

    Acsa aims for carbon neutrality by 2050

    27 October 2023

    iKhokha, Shopstar pave the way for simpler e-commerce

    27 October 2023

    Flutter vs React Native: a comprehensive comparison

    27 October 2023
    Opinion

    Big banks, take note: PayShap should be free

    20 October 2023

    Eskom rolling out virtual wheeling – here’s how it works

    4 October 2023

    How blockchain can help defeat the scourge of counterfeit goods

    29 September 2023

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2023 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.