Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

Ethereum Traders Increase Leverage On-Chain As HFDX Liquidity Hits New Highs

2026-01-31

New To On-Chain Perps? HFDX Is Rapidly Emerging As The Beginner-Friendly Option

2026-01-31

Standard Chartered GBA Business Confidence Indices reveal steady business sentiment

2026-01-31
Facebook X (Twitter) Instagram
Trending
  • Ethereum Traders Increase Leverage On-Chain As HFDX Liquidity Hits New Highs
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»Connected Life»Internet Shutdowns: Here’s How Governments Do It
Connected Life

Internet Shutdowns: Here’s How Governments Do It

The ConversationBy The Conversation2023-08-09Updated:2023-08-11No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
internet shutdown
internet shutdown BigNazik/GettyImages
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

by Lisa Garbe, WZB Berlin Social Science Center.

Senegal’s government has shut down internet access in response to protests about the sentencing of opposition leader Ousmane Sonko. This is a tactic governments are increasingly used during times of political contention, such as elections or social upheaval. The shutdowns can be partial or total, temporary or prolonged. They may target specific platforms, regions, or an entire country.

I’m a researcher who investigates the causes and consequences of internet access disruptions and censorship in various African countries. This includes understanding how shutdowns work.

It’s important to understand the complex technicalities behind internet shutdowns, for at least two reasons.

First, understanding how an internet shutdown works shows whether or how it can be circumvented. This makes it possible to support affected communities.

Second, the way a shutdown works shows who is responsible for doing it. Then the responsible actors can be held to account, both legally and ethically.

Different forms of shutdowns require different levels of technical sophistication. More sophisticated forms are harder to detect and attribute.

There are two common strategies governments use to disrupt internet access: routing disruptions and packet filtering.

How to shut down the internet

Routing disruptions

Every device connected to the internet, whether it’s your computer, smartphone, or any other device, has an IP (internet protocol) address assigned to it. This allows it to send and receive data across the network.

An autonomous system is a collection of connected IP networks under the control of a single entity, for instance an internet service provider or big company.

These autonomous systems rely on protocols – called border gateway protocols – to coordinate routing between them. Each system uses the protocol to communicate with other systems and exchange information about which internet routes they can use to reach different destinations (websites, servers, services etc).

So, if an autonomous system, like an internet service provider, suddenly withdraws its border gateway protocol routes from the internet, the block of IP addresses they administer disappears from the routing tables. This means they can no longer be reached by other autonomous systems.

As a consequence, customers using IP addresses from that autonomous system can’t connect to the internet.

Essentially this tactic stops information from being transmitted. Information can’t find its destination, and people using the internet will not be able to connect.

The disruption of border gateway protocols can easily be detected from the outside due to changes in the global routing state. They can also be attributed to the internet service provider administering a certain autonomous system.

For instance, data suggests that the infamous internet shutdown in Egypt in 2011 – an unprecedented blackout of internet traffic in the entire country – was the result of tampering with border gateway protocols. It could be traced back to individual autonomous systems and hence internet service providers.

Border gateway protocol disruptions that entirely disconnect customers from the internet are rare. These disruptions can easily be detected by outside observers and traced back to individual organisations or service providers. In addition, shutting down entire networks is the most indiscriminate form of an internet shutdown and can cause significant collateral damage to a country’s economy.

Packet filtering

To target specific content, governments often use packet filtering – shutting down only parts of the internet.

Governments can use packet filtering techniques to block or disrupt specific content or services. For instance, internet service providers can block access to specific IP addresses associated with websites or services they wish to restrict, such as 15.197.206.217 associated with the social media platform WhatsApp.

Governments also increasingly use deep packet inspection technology as a tool to filter and block specific content. It’s commonly used for surveillance. Deep packet inspection infrastructure enables the inspection of data packets and hence the content of communication. It’s a more tailored approach to blocking content and makes circumvention more difficult.

In Senegal, internet service providers likely used deep packet inspection to block access to WhatsApp, Telegram, Facebook, Instagram, Twitter and YouTube.

When internet shutdowns are done through packet filtering, only individuals within the affected network are able to detect the shutdown. Therefore, active probing is required to detect the shutdown. This is a technique that’s used by cybersecurity researchers and civil society actors to study the extent and methods of internet censorship in different regions.

Violation of rights

Though the two most common strategies are routing disruptions and packet filtering, there are many other tools governments can use. For instance, domain name system manipulation, denial of service attacks, or the blunt sabotage of physical infrastructure. A detailed overview of techniques is provided by Access Now, an NGO defending digital civil rights of people around the world.

There is wide agreement that internet shutdowns are a violation of fundamental rights such as freedom of expression. However, governments are developing increasingly sophisticated means to block or restrict access to the internet. It’s therefore important to closely monitor the ways in which internet shutdowns are being implemented. This will help to provide circumvention strategies and hold the implementers to account.The Conversation

Lisa Garbe, Research Fellow, WZB Berlin Social Science Center.

This article is republished from The Conversation under a Creative Commons license. Read the original article.

censorship cybersecurity democracy Facebook governments human rights Internet Senegal Social media Twitter
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
The Conversation
  • Website

Related Posts

South Africa Could Unlock SME Growth By Exploiting AI’s Potential Through Corporate ESD Funds

2026-01-28

How Local Leaders Can Shift Their Trajectory In 2026

2026-01-23

Why Legal Businesses Must Lead Digital Transformation Rather Than Chase It

2026-01-23

Directing The Dual Workforce In The Age of AI Agents

2026-01-22

The Productivity Myth That’s Costing South Africa Talent

2026-01-21

The EX60: A Volvo That Talks Back

2026-01-20

The Boardroom Challenge: Governing AI, Data And Digital

2026-01-20

Ransomware: What It Is And Why It’s Your Problem

2026-01-19

AI Can Make The Dead Talk – Why This Doesn’t Comfort Us

2026-01-19
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

Meet The €2.95M Capricorn 01 Zagato Hypercar Rebel

capricorn GROUP (capricorn), the German-based industry leader in automotive and motorsport lightweight technology, presented two…

SARB Holds Repo Rate Steady in Cautious Monetary Policy Decision

2026-01-29

Huawei Says The Next Wave Of Infrastructure Investment Must Include People, Not Only Platforms

2026-01-21

South Africa: Best Starting Point In Years, With 3 Clear Priorities Ahead

2026-01-12
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

How a Major Hotel Group Is Electrifying South Africa’s Travel

2026-01-29

Volvo C70: 30 Years Of The Car That Changed The Way Volvo Looked

2026-01-29

The EX60 Cross Country: Built For The “Go Anywhere” Attitude

2026-01-23

Mettus Launches Splendi App To Help Young South Africans Manage Their Credit Health

2026-01-22

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

Ethereum Traders Increase Leverage On-Chain As HFDX Liquidity Hits New Highs

2026-01-31

New To On-Chain Perps? HFDX Is Rapidly Emerging As The Beginner-Friendly Option

2026-01-31

Standard Chartered GBA Business Confidence Indices reveal steady business sentiment

2026-01-31
Recent Posts
  • Ethereum Traders Increase Leverage On-Chain As HFDX Liquidity Hits New Highs
  • New To On-Chain Perps? HFDX Is Rapidly Emerging As The Beginner-Friendly Option
  • Standard Chartered GBA Business Confidence Indices reveal steady business sentiment
  • AFF draws 4,000+ global political and business leaders, inaugural Global Business Summit
  • NSFW AI Chat with Advanced Memory Systems for Contextual Interaction Launches on Dream Companion
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2026 TechFinancials. Designed by TFS Media. TechFinancials brings you trusted, around-the-clock news on African tech, crypto, and finance. Our goal is to keep you informed in this fast-moving digital world. Now, the serious part (please read this): Trading is Risky: Buying and selling things like cryptocurrencies and CFDs is very risky. Because of leverage, you can lose your money much faster than you might expect. We Are Not Advisors: We are a news website. We do not provide investment, legal, or financial advice. Our content is for information and education only. Do Your Own Research: Never rely on a single source. Always conduct your own research before making any financial decision. A link to another company is not our stamp of approval. You Are Responsible: Your investments are your own. You could lose some or all of your money. Past performance does not predict future results. In short: We report the news. You make the decisions, and you take the risks. Please be careful.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.