Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      ICT BEE fight deepens as MK, EFF target Malatsi - Colleen Makhubele

      ICT BEE fight deepens as MK, EFF target Malatsi

      15 December 2025
      ANC's attack on Solly Malatsi shows how BEE dogma trumps economic reality

      ANC’s attack on Solly Malatsi shows how BEE dogma trumps economic reality

      14 December 2025
      Political war erupts over BEE in the ICT sector - Solly Malatsi

      Political war erupts over BEE in the ICT sector

      13 December 2025
      Icasa told to align on BEE in move that will favour Starlink - Solly Malatsi

      Icasa told to align on BEE in move that will favour Starlink

      12 December 2025
      South African solar industry faces a reality check

      South African solar industry faces a reality check

      12 December 2025
    • World
      Oracle’s AI ambitions face scrutiny on earnings miss

      Oracle’s AI ambitions face scrutiny on earnings miss

      11 December 2025
      China will get Nvidia H200 chips - but not without paying Washington first

      China will get Nvidia H200 chips – but not without paying Washington first

      9 December 2025
      IBM reportedly close to $11-billion deal to buy Confluent - Arvind Krishna

      IBM reportedly close to $11-billion deal to buy Confluent

      8 December 2025
      Amazon and Google launch multi-cloud service for faster connectivity

      Amazon and Google launch multi-cloud service for faster connectivity

      1 December 2025
      Google makes final court plea to stop US breakup

      Google makes final court plea to stop US breakup

      21 November 2025
    • In-depth
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      Canal+ plays hardball - and DStv viewers feel the pain

      Canal+ plays hardball – and DStv viewers feel the pain

      3 December 2025
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
      Valve's Linux console takes aim at Microsoft's gaming empire

      Valve’s Linux console takes aim at Microsoft’s gaming empire

      13 November 2025
      iOCO's extraordinary comeback plan - Rhys Summerton

      iOCO’s extraordinary comeback plan

      28 October 2025
    • TCS
      TCS+ | Africa's digital transformation - unlocking AI through cloud and culture - Cliff de Wit Accelera Digital Group

      TCS+ | Cloud without culture won’t deliver AI: Accelera’s Cliff de Wit

      12 December 2025
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
    • Opinion
      Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

      Netflix, Warner Bros deal raises fresh headaches for MultiChoice

      5 December 2025
      BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

      BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

      3 December 2025
      Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
      It's time for a new approach to government IT spend in South Africa - Richard Firth

      It’s time for a new approach to government IT spend in South Africa

      19 November 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Internet and connectivity » Internet shutdowns, and how governments do it

    Internet shutdowns, and how governments do it

    Internet shutdowns are a tactic some governments use during times of political contention. How do they do it?
    By The Conversation11 August 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    internet shutdownsSenegal’s government has shut down internet access in response to protests about the sentencing of opposition leader Ousmane Sonko. This is a tactic governments are increasingly using during times of political contention, such as elections or social upheaval. The shutdowns can be partial or total, temporary or prolonged. They may target specific platforms or regions, or an entire country.

    I’m a researcher who investigates the causes and consequences of internet access disruptions and censorship in various African countries. This includes understanding how shutdowns work. It’s important to understand the complex technicalities behind internet shutdowns, for at least two reasons.

    Firstly, understanding how an internet shutdown works shows whether or how it can be circumvented. This makes it possible to support affected communities.

    Two common strategies used to disrupt internet access are routing disruptions and packet filtering

    Secondly, the way a shutdown works shows who is responsible for doing it. Then the responsible actors can be held to account, both legally and ethically.

    Different forms of shutdowns require different levels of technical sophistication. More sophisticated forms are harder to detect and attribute.

    There are two common strategies governments use to disrupt internet access: routing disruptions and packet filtering.

    Routing disruptions

    Every device connected to the internet, whether it’s your computer or smartphone, or any other device, has an IP (internet protocol) address assigned to it. This allows it to send and receive data across the network.

    An autonomous system is a collection of connected IP networks under the control of a single entity, for instance an internet service provider or big company.

    These autonomous systems rely on protocols – called border gateway protocols – to coordinate routing between them. Each system uses the protocol to communicate with other systems and exchange information about which internet routes they can use to reach different destinations (websites, servers, services, etc).

    So, if an autonomous system, like an ISP, suddenly withdraws its border gateway protocol routes from the internet, the block of IP addresses they administer disappears from the routing tables. This means they can no longer be reached by other autonomous systems. As a consequence, customers using IP addresses from that autonomous system can’t connect to the internet.

    Essentially this tactic stops information from being transmitted. Information can’t find its destination, and people using the internet will not be able to connect.

    The disruption of border gateway protocols can easily be detected from the outside due to changes in the global routing state. They can also be attributed to the ISP administering a certain autonomous system.

    For instance, data suggests that the infamous internet shutdown in Egypt in 2011 – an unprecedented blackout of internet traffic in the entire country – was the result of tampering with border gateway protocols. It could be traced back to individual autonomous systems and hence internet service providers.

    Border gateway protocol disruptions that entirely disconnect customers from the internet are rare. These disruptions can easily be detected by outside observers and traced back to individual organisations or service providers. In addition, shutting down entire networks is the most indiscriminate form of an internet shutdown and can cause significant collateral damage to a country’s economy.

    Packet filtering

    To target specific content, governments often use packet filtering – shutting down only parts of the internet.

    Governments can use packet filtering techniques to block or disrupt specific content or services. For instance, internet service providers can block access to specific IP addresses associated with websites or services they wish to restrict, such as 15.197.206.217 associated with the social media platform WhatsApp.

    Governments also increasingly use deep packet inspection technology as a tool to filter and block specific content. It’s commonly used for surveillance. Deep packet inspection infrastructure enables the inspection of data packets and hence the content of communication. It’s a more tailored approach to blocking content and makes circumvention more difficult.

    In Senegal, ISPs likely used deep packet inspection to block access to WhatsApp, Telegram, Facebook, Instagram, Twitter and YouTube.

    When internet shutdowns are done through packet filtering, only individuals within the affected network are able to detect the shutdown. Therefore, active probing is required to detect the shutdown. This is a technique that’s used by cybersecurity researchers and civil society actors to study the extent and methods of internet censorship in different regions.

    There is wide agreement that internet shutdowns are a violation of fundamental rights such as freedom of expression

    Though the two most common strategies are routing disruptions and packet filtering, there are many other tools governments can use. For instance, domain name system manipulation, denial of service attacks, or the blunt sabotage of physical infrastructure. A detailed overview of techniques is provided by Access Now, an NGO defending digital civil rights of people around the world.

    There is wide agreement that internet shutdowns are a violation of fundamental rights such as freedom of expression. However, governments are developing increasingly sophisticated means to block or restrict access to the internet. It’s therefore important to closely monitor the ways in which internet shutdowns are being implemented. This will help to provide circumvention strategies and hold the implementers to account.The Conversation

    • The author, Lisa Garbe, is research fellow, WZB Berlin Social Science Centre
    • This article is republished from The Conversation under a Creative Commons licence

    Get TechCentral’s daily newsletter



    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSanctions-hit Huawei is on the mend
    Next Article The US is wrong about China

    Related Posts

    AI, cloud and the great IT rationalisation - Craig Stephens SAS South Africa

    AI, cloud and the great IT rationalisation

    15 December 2025
    New Vox partner programme helps ISPs expand without the heavy lifting

    New Vox partner programme helps ISPs expand without the heavy lifting

    15 December 2025
    How alternative credit models can unlock South Africa's hidden economy - Cameron Kyle-Perumal M-KOPA South Africa

    How alternative credit models can unlock South Africa’s hidden economy

    15 December 2025
    Company News
    AI, cloud and the great IT rationalisation - Craig Stephens SAS South Africa

    AI, cloud and the great IT rationalisation

    15 December 2025
    New Vox partner programme helps ISPs expand without the heavy lifting

    New Vox partner programme helps ISPs expand without the heavy lifting

    15 December 2025
    How alternative credit models can unlock South Africa's hidden economy - Cameron Kyle-Perumal M-KOPA South Africa

    How alternative credit models can unlock South Africa’s hidden economy

    15 December 2025
    Opinion
    Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

    Netflix, Warner Bros deal raises fresh headaches for MultiChoice

    5 December 2025
    BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

    BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

    3 December 2025
    Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

    Your data, your hardware: the DIY AI revolution is coming

    20 November 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    AI, cloud and the great IT rationalisation - Craig Stephens SAS South Africa

    AI, cloud and the great IT rationalisation

    15 December 2025
    New Vox partner programme helps ISPs expand without the heavy lifting

    New Vox partner programme helps ISPs expand without the heavy lifting

    15 December 2025
    How alternative credit models can unlock South Africa's hidden economy - Cameron Kyle-Perumal M-KOPA South Africa

    How alternative credit models can unlock South Africa’s hidden economy

    15 December 2025
    ICT BEE fight deepens as MK, EFF target Malatsi - Colleen Makhubele

    ICT BEE fight deepens as MK, EFF target Malatsi

    15 December 2025
    © 2009 - 2025 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}