Introduction
Internet shutdowns are increasingly being used as a tool of repression, especially during political unrest, such as in Iran. These shutdowns, which range from partial restrictions like mobile data blocks to complete internet blackouts, pose significant challenges to various communities, including ethnic minorities, journalists, and religious groups. Each group faces distinct risks during shutdowns, from surveillance to limited access to secure communication tools.
This protocol addresses these challenges by providing tailored strategies to maintain secure communications before, during, and after shutdowns. It highlights the importance of secure communication tools, digital security training, and alternative networks like peer-to-peer (P2P) systems and satellite-based technologies. By adopting these strategies, vulnerable groups can mitigate the impacts of shutdowns and protect their communications from state surveillance.
Moving forward, the focus must be on enhancing digital security literacy, disseminating secure tools, and building resilient communication networks to ensure continued connectivity even in the most restrictive environments.
Within this document, readers will find practical steps and recommendations for secure communication during shutdowns, from setting up encryption tools like GPG to using mesh networks and satellite communication for internet access. It offers guidance on preemptive measures, such as backup plans, community training, pre-shutdown preparation, and post-shutdown recovery, empowering individuals and organizations to stay connected and resilient in the face of internet disruptions.
What Is An Internet Shutdown
An internet shutdown is an intentional disruption of internet or electronic communications by government or private actors to control the flow of information. Shutdowns are often used to limit freedom of expression, information, and assembly, particularly during political unrest, as seen in Iran.
Shutdowns can be total, cutting off all access, or partial, targeting specific networks or services like mobile data or social media. Tactics such as bandwidth throttling, where internet speeds are deliberately slowed, are also common. Shutdowns may target entire countries or specific regions, with varying durations from hours to months.
While difficult to overcome, there are strategies to assess risks and mitigate their impact. Access Now provides resources on these issues, available through their #KeepItOn campaign.
For those seeking resources on how to prepare for and deal with internet shutdowns, the website Iran After Dark serves as a valuable resource center. It provides education on various tools that can be useful during disruptions or shutdowns, along with training on how to prepare in advance. Information on this site is available in multiple languages, including Persian, Turkish, Arabic, and Balochi.
Overview
This analysis compares the challenges and needs of three key communities in Iran—ethnic minorities (Balochistan, Kurdish and Turkish provinces), investigative journalists, and religious minorities (the Baha’i community)—during internet shutdowns. Each group faces distinct challenges related to their access to secure communication tools, their level of training in digital security, and the specific risks they encounter. However, there are commonalities across these groups, as well as significant differences in the level of need and risk.
Comparison of Challenges
Ethnic Minorities: These communities face severe isolation during internet shutdowns, particularly the Baloch, who have less access to alternative communication methods compared to the Kurdish regions. Both groups rely heavily on VPNs and SIM card changes to bypass government censorship, but during complete shutdowns, their communication options are severely limited. The lack of familiarity with secure tools, or satellite systems (e.g., Toosheh or Starlink) and peer-to-peer networks further exacerbates their vulnerability.
Investigative Journalists: This group is highly vulnerable due to their reliance on insecure communication methods like Skype and international SIM cards, combined with a general disregard for digital security protocols. The risks are particularly high for journalists, as their work often puts them in direct conflict with state authorities, making them prime targets for surveillance, device confiscation, and arrest.
Religious Minorities: This community faces unique challenges as a religious minority that is often persecuted. While they have some awareness of Toosheh, their reliance on disposable phones and VPNs leaves them exposed during shutdowns. The community has some access to organized training, but it is inconsistent and lacks the depth needed to fully protect against digital threats.
Assessment of Needs and Risks
- Greatest Need: Investigative journalists are in the greatest need of enhanced digital security training and access to secure communication tools. Their work makes them highly visible and vulnerable to state repression, and their current practices do not provide sufficient protection against the risks they face. The development of tailored training programs and the introduction of more secure tools are critical for this group.
- Moderate Need: The ethnic minorities, particularly the Baloch, also face significant risks, especially during complete shutdowns. Their isolation and lack of access to alternative communication methods increase their vulnerability. While they are less directly targeted than journalists, their lack of familiarity with secure tools puts them at high risk during times of increased state surveillance.
Lower, But Still Significant Need: The Baha’i community, while facing lower immediate risks compared to the other two groups, still requires better and more consistent training in digital security. Their current practices leave them vulnerable, particularly during times of heightened persecution.
Shared Challenges
- Limited Familiarity with Secure Tools: Across all groups, there is a noticeable lack of familiarity with secure communication tools, such as satellite systems (e.g., Starlink) and peer-to-peer networks. This gap severely limits their ability to maintain communication during internet shutdowns.
- Inadequate Training: Most participants have not received adequate training in digital security. There is a strong demand for comprehensive, ongoing education, particularly regarding the use of secure tools and the mitigation of risks like phishing and device seizures.
- Security Risks: The use of insecure communication methods, such as unverified VPNs and popular messaging apps, poses significant risks. These include potential device confiscation and surveillance, leading to arrests and other legal repercussions.
Unique Needs
Ethnic Minorities: The Baloch and Kurdish communities often face similar challenges, such as dependency on VPNs and SIM card changes to bypass government censorship. However, the Kurds have slightly better access to alternative communication channels through Iraqi Kurdistan, whereas Balochistan faces more significant isolation during shutdowns.
- Investigative Journalists: This group relies on tools like Skype and international SIM cards, but there is a general disregard for digital security, making them particularly vulnerable. They need specialized training to improve their security practices and better access to more secure communication tools.
- Religious Minorities: The Baha’i community has some awareness of secure tools like Toosheh but lacks consistent access to comprehensive training. Their reliance on disposable phones and VPNs makes them particularly vulnerable during shutdowns.
Path Forward
To address these gaps, the development of Version 2 of the Shutdown Protocol should focus on:
- Comprehensive Training Programs: Implementing tailored training programs for each group to enhance their understanding and use of secure communication tools. These programs should include practical sessions on using satellite communication, peer-to-peer networks, and encrypted messaging platforms.
- Security Protocols: Establishing clear guidelines for securing communication before, during, and after shutdowns. This includes preparation steps such as familiarizing with alternative networks and setting up encrypted channels, as well as post-shutdown documentation and recovery strategies.
- Tool Dissemination and Support: Ensuring that each group has access to appropriate tools, such as Starlink and mesh networks, and providing ongoing support to help them effectively use these tools in their specific contexts.
- Building Trust and Adoption: Developing community-based initiatives to build trust in new tools and promote their adoption. This can be achieved through localized workshops, peer-led training, and the creation of support networks.
By addressing these issues, the updated protocol will better equip these groups to navigate the challenges posed by internet shutdowns, ensuring their communication remains secure and resilient.
Threat Modeling: Understanding Risks and Preparing for Them
In the context of internet shutdowns in Iran, various communities, including ethnic minorities, investigative journalists, and religious minorities, face significant challenges in maintaining secure communication.
Threat modeling involves identifying and understanding the risks specific to each of these groups and preparing strategies to mitigate these threats effectively.
Identifying Threats
The primary threats faced by these groups during internet shutdowns include:
- Surveillance: The Iranian government actively monitors communications, particularly during times of civil unrest or protests. This poses a significant risk for all three groups, but especially for investigative journalists and ethnic minorities, who are often involved in activities that draw government scrutiny.
- Device Seizure and Confiscation: The physical confiscation of devices by authorities is a common risk, particularly for journalists and activists within the Baloch and Kurdish communities. Confiscated devices can provide access to sensitive information, contacts, and communications, leading to arrests and further persecution.
- Insecure Communication Methods: The reliance on unverified VPNs, popular messaging apps like WhatsApp, and insecure international SIM cards exposes these groups to potential surveillance, interception of communications, and data breaches.
- Lack of Access to Secure Tools: Limited access to secure communication tools, such as satellite systems (e.g., Starlink) and peer-to-peer networks, increases the vulnerability of these communities. The Baha’i community, while facing slightly less direct targeting, still suffers from inadequate training and inconsistent access to secure communication methods.
Analyzing Vulnerabilities
Each group has specific vulnerabilities based on their access to resources, level of training, and the nature of the threats they face:
- Ethnic Minorities: These communities are highly vulnerable due to their isolation and lack of access to alternative communication methods during shutdowns. Their heavy reliance on VPNs and SIM card changes leaves them exposed to government surveillance, and their limited familiarity with secure tools exacerbates their risk.
- Investigative Journalists: Journalists are particularly vulnerable due to their high visibility and the sensitive nature of their work. The use of insecure communication methods combined with a general disregard for digital security practices makes them prime targets for government repression, surveillance, and device confiscation.
- Religious Minorities: The Baha’i community, while less immediately targeted, is still vulnerable due to inconsistent training and reliance on insecure communication tools. Their practices leave them exposed during times of heightened persecution, particularly during internet shutdowns when their communication methods become more limited and risky.
Preparing for Threats
To mitigate these threats, each group must take specific steps to enhance their security and resilience during internet shutdowns:
- Comprehensive Training: Implement tailored training programs focusing on digital security practices, secure communication methods, and threat awareness. For ethnic minorities, training should include the use of alternative communication tools, such as mesh networks and satellite systems. For journalists, the emphasis should be on secure messaging, encryption, and data protection. The Baha’i community would benefit from consistent, organized training on the safe use of communication tools and digital security practices.
- Access to Secure Tools: Ensure that all groups have access to secure communication tools like Starlink, encrypted messaging platforms, and peer-to-peer networks. Providing these tools, along with ongoing support to ensure proper usage, will help mitigate the risks posed by government surveillance and shutdowns.
- Building Trust and Adoption: Developing trust within these communities is essential for the adoption of new tools and security practices. This can be achieved through community-led initiatives, peer-led training, and the creation of support networks that provide continuous guidance and support.
- Establishing Security Protocols: Clear security protocols should be established for communication before, during, and after shutdowns. These protocols should include steps for securing devices, protecting data, and ensuring safe communication. Regular updates and reminders about these protocols can help reinforce their importance and effectiveness.
- Utilizing External Resources: Platforms like Iran After Dark offer valuable resources for preparing for and managing internet shutdowns. These resources, available in multiple languages, provide education on useful tools and strategies to mitigate the impact of shutdowns.
Continuous Monitoring and Adaptation
Threat modeling is an ongoing process that requires continuous monitoring of the threat landscape and adapting strategies as new risks emerge. Each community should regularly assess their vulnerabilities and the effectiveness of their mitigation strategies, making adjustments as necessary to stay ahead of potential threats.
By taking these steps, these vulnerable communities can better prepare for and navigate the challenges posed by internet shutdowns, ensuring that their communications remain as secure and resilient as possible.
Planning
Planning for Pre-Shutdown Preparation, During Shutdown, and Post-Shutdown Actions is crucial to ensure the resilience and continuity of operations during internet shutdowns.
- Pre-Shutdown Preparation involves setting up tools, secure communications, and data backup systems to mitigate the impact of a potential shutdown.
- During Shutdown focuses on maintaining access to critical information, documenting events, and finding alternative communication channels.
- Post-Shutdown Actions are essential for recovering data, analyzing the shutdown’s impact, and advocating for the restoration of services.
These steps help in safeguarding data, ensuring communication, and responding effectively to disruptions.
Pre-Shutdown Preparation
To effectively prepare for an internet shutdown, it is crucial to take proactive steps that enhance security, ensure continuity of communication, and mitigate the impact of disruptions. Here’s what needs to be done:
Comprehensive Training Programs
- Digital Security Training: Educate communities on basic and advanced digital security practices, including secure communication methods, encryption, and how to identify phishing attacks.
- Tool Familiarization: Provide hands-on training for using secure communication tools like satellite systems (e.g., Starlink), mesh networks, and encrypted messaging platforms. Ensure participants know how to set up and use these tools effectively before a shutdown occurs.
Access to and Distribution of Secure Tools
- Distribute Secure Tools: Ensure that individuals and organizations have access to necessary tools, such as Starlink devices, mesh network setups, and secure messaging apps. Distribute these tools widely within at-risk communities.
- Offline Resources: Provide access to resources that can be used offline, such as PDF guides on digital security, encrypted storage devices for sensitive information, and physical copies of important contacts and instructions.
Establishing Communication Protocols
- Pre-Shutdown Protocols: Develop and disseminate clear communication protocols that outline steps to take before, during, and after a shutdown. This should include alternative ways to communicate, such as using radio, SMS, or in-person networks.
- Backup Communication Plans: Establish backup communication methods that do not rely on the internet peer-to-peer messaging apps. Ensure these methods are tested and understood by all users.
Building Community Networks
- Community-Based Networks: Strengthen local community networks that can operate independently of the internet. Encourage the formation of local groups that can share information and resources during a shutdown.
- Trust Building: Foster trust within the community regarding the use of new tools and methods. Peer-led training sessions and localized workshops can help build confidence and ensure widespread adoption of secure practices.
Pre-Positioning Information
- Information Dissemination: Distribute critical information on what to do in the event of a shutdown before it occurs. This could include instructions on using offline tools, setting up alternative networks, and securing devices.
- Localized Content: Ensure that all materials are available in local languages and are culturally appropriate. Websites like Iran After Dark provide resources in Persian, Turkish, Arabic, and Balochi, which can be used to educate and prepare diverse communities.
Regular Drills and Simulations
- Simulate Shutdown Scenarios: Conduct regular drills to simulate an internet shutdown, allowing communities to practice using their secure communication methods and protocols in a controlled environment.
- Assess and Adapt: After each drill, assess the effectiveness of the tools and protocols, gather feedback, and make necessary adjustments to improve preparedness.
By implementing these pre-shutdown preparation steps, communities will be better equipped to maintain communication, protect their digital security, and continue their activities even in the face of an internet shutdown.
During Shutdown
When an internet shutdown occurs, it’s critical to implement strategies that ensure continued communication, maintain security, and minimize disruptions to vital activities. Here’s what needs to be done during an internet shutdown:
Activate Backup Communication Methods
- Use Alternative Networks: Shift to pre-established alternative communication methods, such as mesh networks, satellite phones, ham radios, or peer-to-peer messaging apps (e.g., Briar or Bridgefy). These tools can operate without relying on traditional internet infrastructure.
- SMS and Voice Communication: If mobile networks are still operational, utilize SMS and voice calls for essential communication. These can be more reliable than internet-based messaging services during partial shutdowns.
Maintain Security Protocols
- Encrypt Communications: Ensure that all communications, whether via alternative networks or SMS, are encrypted. Use apps and tools that support end-to-end encryption to protect sensitive information.
- Device Security: Continue to secure devices by disabling unnecessary services (e.g., GPS or Bluetooth if not needed), using strong passwords, and being cautious about physical security (e.g., keeping devices hidden or secure).
- Avoid Insecure Tools: Refrain from using compromised or insecure apps and services, as these can be monitored by authorities. Stick to the secure tools identified in pre-shutdown preparation.
Establish and Use Safe Gathering Points
- Physical Meeting Points: If communication tools are severely limited, establish pre-arranged physical gathering points where people can meet safely to exchange information and coordinate activities. Ensure these locations are discreet and safe from surveillance.
- Offline Information Sharing: Use physical methods for sharing critical information, such as printed materials, hand-delivered notes, or memory sticks. Ensure that this information is shared securely and discreetly.
Monitor the Situation and Adapt
- Real-Time Monitoring: Continuously monitor the status of the shutdown, including which networks or services are affected. This can be done through local reports, word of mouth, or using tools like Ceno or Lantern, which might still operate in limited capacity.
- Adapt Communication Methods: Be flexible and adapt your communication methods based on what is still operational. For example, if a particular alternative network becomes compromised or unreliable, switch to a different method.
Document and Report
- Collect Evidence: Safely document the impact of the shutdown, including disruptions to communication, violations of rights, and any incidents of repression or violence. Use secure methods to store and share this information.
- Report Issues: When possible, report shutdown impacts to organizations that monitor and advocate against shutdowns, such as Access Now. Use secure channels to send reports and updates to avoid detection.
Support Community Networks
- Strengthen Local Support: During the shutdown, rely on local community networks for support. Share resources, information, and assistance with those who might be more vulnerable or isolated.
- Coordinate Locally: Work with community leaders to coordinate responses and ensure that everyone has access to the necessary tools and information.
Stay Informed
- Use Trusted Sources: Rely on trusted sources of information, both locally and through any available international channels. Be cautious of disinformation or rumors that may spread during the shutdown.
- Update Regularly: When communication is restored, update your community and networks on the situation, including any changes in the shutdown or new developments.
By following these steps during an internet shutdown, communities can maintain a level of communication, protect their digital and physical security, and continue critical activities despite the disruption.
Post-Shutdown Actions
After an internet shutdown has ended, it’s essential to take steps to recover, assess the impact, and prepare for future disruptions. Here’s what needs to be done after a shutdown:
Document the Impact
- Collect and Preserve Evidence: Gather all documentation, including logs, screenshots, videos, and testimonials that were collected during the shutdown. Securely store this evidence to ensure it is protected and can be used for future advocacy or legal actions.
- Assess the Impact: Evaluate the effects of the shutdown on your community or organization. This includes assessing disruptions to communication, access to essential services, economic impacts, and any incidents of human rights violations.
Report and Share Information
- Submit Reports: Share detailed reports on the shutdown’s impact with local and international human rights organizations, such as Access Now, Amnesty International, or the United Nations. Use secure channels to submit these reports to protect the identity of those involved.
- Public Awareness: Raise awareness about the shutdown by sharing your findings with the broader public, both locally and internationally. This can help generate support and pressure against future shutdowns.
Review and Update Security Protocols
- Evaluate Protocol Effectiveness: Analyze how well your pre-shutdown and during-shutdown protocols worked. Identify any gaps or weaknesses in your response and make necessary adjustments to improve future preparedness.
- Update Tools and Practices: Based on your assessment, update your tools, practices, and protocols to address any identified vulnerabilities. This may involve adopting new technologies, refining communication methods, or providing additional training.
Provide Support and Debriefing
- Community Debriefing: Hold debriefing sessions with your community or team to discuss the experience of the shutdown. This can help individuals process the event, share their experiences, and contribute ideas for future improvements.
- Offer Psychological Support: Provide access to psychological support for those who may have been particularly affected by the shutdown, such as those who faced intimidation, arrests, or other forms of repression.
Strengthen Community Networks
- Reinforce Local Networks: Use the post-shutdown period to strengthen local support networks that were activated during the shutdown. Reinforce trust and collaboration within the community by addressing any issues that arose during the shutdown.
- Expand Outreach: Work to expand your network to include more individuals and organizations that may be affected by future shutdowns. Building a larger, more resilient network can improve preparedness and response capabilities.i
Advocate for Policy Changes
- Engage in Advocacy: Use the documentation and reports from the shutdown to advocate for policy changes at the national and international levels. Push for stronger protections against internet shutdowns and for the recognition of internet access as a fundamental human right.
- Collaborate with Allies: Partner with other organizations, both locally and globally, to amplify your advocacy efforts. Collective action can increase pressure on governments to refrain from future shutdowns and to respect digital rights.
Prepare for Future Shutdowns
- Review and Enhance Preparedness Plans: Based on the experiences from the recent shutdown, review and enhance your preparedness plans. Ensure that your community or organization is better equipped to handle future disruptions.
- Conduct Training and Drills: Provide additional training to ensure everyone is familiar with the updated protocols and tools. Conduct regular drills to simulate shutdown scenarios and practice responses.
By taking these post-shutdown actions, you can help your community or organization recover from the disruption, strengthen resilience, and be better prepared for any future internet shutdowns.
Prioritizing Training
Prioritizing training for preparing and responding to internet shutdowns involves focusing on the most critical skills and knowledge that will have the greatest impact on community resilience and security. Here’s a suggested approach for prioritizing training:
Identify Key Vulnerabilities
- Assess Current Knowledge: Begin by assessing the current level of digital security awareness and technical skills within the community or organization. Identify gaps in knowledge that are most likely to lead to vulnerabilities during a shutdown.
- Understand Specific Threats: Tailor training to address the specific threats each group faces, such as government surveillance, device confiscation, or the inability to communicate securely during a shutdown.
Focus on Essential Skills First
- Basic Digital Security: Prioritize training on basic digital security practices, such as setting strong passwords, using two-factor authentication, and recognizing phishing attacks. These foundational skills are essential for all users.
- Secure Communication Tools:* Provide immediate training on the use of secure communication tools that can function during shutdowns, such as encrypted messaging apps, mesh networks, and satellite communication systems.
Tailor Training to Specific Needs
- Ethnic Minorities: Focus on training that enhances their ability to communicate securely during complete or partial shutdowns. This includes using alternative communication methods like satellite phones or mesh networks and understanding how to avoid surveillance.
- Investigative Journalists: Prioritize advanced digital security training, such as encryption, secure data storage, and safe reporting practices. Journalists are often at the highest risk and require more sophisticated skills to protect their work and sources.
- Religious Minorities: Emphasize training on secure communication practices that can protect their community during periods of heightened persecution. Ensure they are familiar with tools that can maintain internal communication even when targeted.
Implement Practical Training Sessions
- Hands-On Workshops: Conduct practical, hands-on workshops where participants can practice using the tools and methods they’ve learned. This ensures they are not just theoretically prepared but also practically capable.
- Scenario-Based Drills: Run scenario-based drills that simulate an internet shutdown. This helps participants practice their response in real-time and highlights any areas where additional training may be needed.
Develop Continuous Learning Resources
- Access to Ongoing Support: Provide access to continuous learning resources, such as online tutorials, guides, and forums where individuals can ask questions and share experiences.
- Localized Training Materials: Ensure training materials are available in local languages and are accessible to all members of the community. Use resources like Iran After Dark to supplement training with region-specific information.
Evaluate and Adapt Training Programs
- Feedback Loops: Regularly gather feedback from participants to assess the effectiveness of the training. Use this feedback to make necessary adjustments to the content or delivery of future training sessions.
- Update Training Regularly: As new threats emerge or new tools become available, update the training programs to ensure they remain relevant and effective.
Build Trust and Engagement
- Community-Led Initiatives: Encourage peer-led training sessions and community-based learning. When training is delivered by trusted community members, it’s more likely to be accepted and adopted.
- Engagement Activities: Use community events, discussions, and workshops to keep the community engaged and invested in continuous learning and preparation.
By following these steps, you can ensure that training is prioritized effectively, focusing on the most critical needs first and building a strong foundation of knowledge and skills that will help the community or organization remain resilient during and after an internet shutdown.
Secure Communication And Peer-to-Peer Tools
When it comes to secure communication and peer-to-peer (P2P) tools, the key is to choose tools that are reliable, user-friendly, and secure against surveillance and interception. Here are some recommendations:
Secure Messaging Apps
These apps provide end-to-end encryption and are designed to protect communications even in high-risk environments:
- Signal: One of the most secure messaging apps available, Signal offers end-to-end encryption for text, voice, and video communications. It’s open-source, highly trusted in the security community, and easy to use.
- WhatsApp: While widely used and offering end-to-end encryption, WhatsApp is owned by Meta, which has raised privacy concerns. However, it remains a popular option in many regions and is generally secure for everyday communication.
- Telegram: Telegram offers encrypted communication, but only in its “Secret Chat” mode. It’s widely used in regions with internet censorship, although its encryption is less robust than Signal’s.
Peer-to-Peer (P2P) Communication Tools
P2P tools are crucial during internet shutdowns because they can function without relying on central servers, making them more resilient to government controls:
- Briar: Briar is a highly secure P2P messaging app that works over Bluetooth, Wi-Fi, or the internet. It’s designed for activists and journalists, and can continue functioning even when the internet is down by using local networks.
- Bridgefy: This app allows users to communicate via Bluetooth, creating a mesh network that can connect devices directly. It’s useful in situations where the internet is unavailable but there are many users in close proximity.
- Delta Chat: Delta Chat is an interesting and versatile secure communication tool that combines the functionality of traditional email with the convenience of instant messaging. Here’s how Delta Chat fits into the context of secure communication, especially during internet shutdowns.
Secure Email Services
For secure email communications, especially when sharing sensitive documents:
- ProtonMail: Based in Switzerland, ProtonMail offers end-to-end encryption and strong privacy protections. It’s a good option for sending sensitive information securely.
- Tutanota: Another secure email service that provides end-to-end encryption, Tutanota is user-friendly and offers additional features like encrypted calendars.
Mesh Networks
Mesh networks are decentralized networks that can keep communication going even during a shutdown:
- goTenna Mesh: goTenna Mesh devices create a private, off-grid communication network using long-range radio waves. They work well in areas without cellular coverage or during an internet shutdown.
- Serval Project: This project offers a mesh network solution that can turn Android devices into a part of a decentralized communication network, allowing calls, messaging, and file-sharing without relying on the internet.
Satellite Communication
For complete internet shutdowns or in areas with no connectivity at all:
- Starlink: Starlink, operated by SpaceX, provides satellite-based internet service. It’s currently one of the most advanced satellite internet services available and can be crucial in maintaining internet access in remote or disconnected regions.
- Inmarsat or Iridium: These are global satellite communication networks offering voice and data services. They are more expensive but reliable in areas where traditional communication methods are not available.
- Toosheh: Toosheh (meaning “knapsack” or “provision” in Persian) is an innovative technology that allows users to receive digital content via satellite, bypassing internet restrictions and censorship. Satellite-Based Content Delivery: Toosheh delivers content to users by leveraging satellite television signals. It allows users to download a variety of digital content, such as news, educational materials, and even software updates, without needing internet access.
VPNs and Anonymity Tools
While VPNs are not P2P, they are essential for bypassing censorship and securing online activity:
- BeePass: BeePass is a free, open-source, simple and secure VPN. Designed with your privacy in mind, BeePass VPN will help you bypass internet censorship and improve your privacy online.
- Tor Browser: Tor anonymizes internet traffic and helps protect against surveillance. It’s particularly useful in environments where browsing activity needs to be kept private.
- ProtonVPN: This is a highly secure VPN service that offers strong privacy protections and is integrated with ProtonMail. It’s a good option for maintaining secure and anonymous internet access.
- Psiphon: Psiphon is a circumvention tool that combines VPN, SSH, and HTTP Proxy technologies. It’s widely used in countries with heavy internet censorship.
- MahsaNet: MahsaNet VPN is dedicated to providing reliable VPN configurations through the Mahsa Server. Our goal is to ensure accessible and affordable internet access for all users.
- Oblivion VPN: Oblivion VPN is a bespoke VPN application designed to encrypt your connection using Wireguard technology, along with some useful tweaks to defeat internet censorship. Primarily built to connect to Warp and Psiphon endpoints in a totally encrypted manner to evade censorship and increase user privacy from ISPs that want to snoop on your data. Oblivion VPN leverages the best features of Wireguard and other technologies to provide a painless and secure connection to the open internet. Open source available here.
Offline Communication Tools
In situations where even P2P tools might be compromised or unavailable:
- USB Dead Drops: This is a method of sharing information by leaving USB drives in public places, where others can find and access the data. It’s low-tech but can be effective for distributing information during extreme shutdowns.
- Encrypted USB Drives: Use hardware-encrypted USB drives for securely storing and transferring sensitive information. These can be used to share important files in person without relying on digital networks.
- Ceno: Ceno (short for censorship.no!) is the world’s first mobile browser that side-steps current Internet censorship methods. Its peer-to-peer backbone allows people to access and share web information in and across regions where connectivity has been interrupted or compromised.
Encryption And Obfuscation
Encryption is the process of converting information or data into a code to prevent unauthorized access. It ensures that only authorized individuals with the correct decryption key can access and read the data. Encryption is commonly used to secure sensitive information, such as emails, files, financial transactions, and personal data, protecting it from being accessed or understood by malicious actors or anyone without permission.
Obfuscation, on the other hand, involves making information or data deliberately unclear or difficult to understand, even without converting it into a different format. Unlike encryption, obfuscation does not require a decryption key to access the information; it merely makes the data less readable or interpretable. The goal of obfuscation is to deter unauthorized access or understanding by adding layers of complexity or confusion.
Common Uses of Encryption:
- Securing emails to prevent unauthorized reading.
- Protecting files from unauthorized access.
- Safeguarding financial transactions from fraud or interception.
- Ensuring personal data privacy against theft or misuse.
Common Uses of Obfuscation:
- Hiding the logic of a text or code in software to protect intellectual property or privacy
- Making data less readable in transit to deter casual observation.
- Adding complexity to data formats to prevent easy analysis or extraction.
Common Uses of Encryption and Obfuscation:
- Email Encryption: Ensures that only the intended recipient can read the content of the email.
- File Encryption: Protects sensitive documents, ensuring that they can only be opened by someone with the correct decryption key.
- Secure Communication: End-to-end encrypted messaging apps like Signal and WhatsApp protect messages from being intercepted or read by third parties.
- Online Transactions: Encryption ensures that credit/debit card numbers and other sensitive information are securely transmitted during online payments.
Overall, encryption plays a critical role in cybersecurity by protecting data from unauthorized access or tampering, ensuring privacy, and maintaining data integrity. Here are some of the most commonly used tools:
- PGP (Pretty Good Privacy): The original software that GPG is based on, used for securing email communication and data encryption. While GPG is more widely used, PGP is still available for those who prefer it.
- VeraCrypt: A popular open-source disk encryption software that allows you to encrypt files, folders, or entire drives. It’s useful for securing sensitive data stored locally.
- Nahoft: is an obfuscating app made for Android and iOS mobile phones. With Nahoft you can easily obfuscate your private message into a string of Persian words or hide your obfuscated messages in a photo before sending it safely via any messaging app. Nahoft is not a messenger, but a tool for obfuscating messages.
- Fully offline
- Send obfuscated messages as text or image on Android
- Save or delete your incoming messages
- Save obfuscated messages into an image and save them on your device on Android.
Data Hiding
Data hiding, or steganography, is the practice of concealing data within other non-suspicious files to protect sensitive information. There are several tools available that are considered secure and effective for data hiding. Here are some of the most commonly used tools:
- Steghide: is a popular steganography tool that allows users to hide data within image or audio files. It supports a variety of formats, including BMP, JPEG, WAV, and AU. The hidden data is encrypted using a passphrase, adding an additional layer of security.
- Supports multiple file formats.
- Uses strong encryption (AES).
- Can embed and extract data from files easily.
- OpenPuff: is a steganography tool that allows users to hide data within images, audio files, and even videos. It supports a wide range of file types and offers multiple layers of security, including encryption, data obfuscation, and splitting data into multiple carrier files.
- Supports up to 256MB of hidden data.
- Uses multiple layers of encryption.
- Allows data to be split across multiple files for added security.
- SilentEye: is a steganography application that allows users to hide data within image and audio files. It has a simple graphical user interface (GUI), making it user-friendly. SilentEye also supports encryption to protect hidden data.
- User-friendly GUI.
- Supports image (BMP, JPG) and audio (WAV) files.
- Optional encryption of hidden data.
- Crypture: is a minimalistic steganography tool that hides data within BMP image files. It’s lightweight and simple, making it a good choice for those who need a straightforward tool without unnecessary complexity.
- Lightweight and simple to use.
- Encrypts hidden data.
- Focused on BMP image files.
- Stegano: is a Python-based steganography library that can be used to hide data in images. It is more suited for users who are comfortable with programming, as it requires some coding knowledge to use effectively.
- Python library for custom steganography implementations.
- Can be integrated into other applications.
- Supports hiding data in PNG files.
- Camouflage: is a steganography tool that hides files inside other files, such as documents or images. It also compresses and encrypts the hidden data, making it harder to detect.
- Hides files within other files like images and documents.
- Compresses and encrypts data.
- Simple interface for easy use.
- DeepSound: is a steganography tool designed for hiding data in audio files. It is capable of embedding secret files into audio tracks without significantly altering the audio quality, making it difficult to detect.
- Specializes in audio files.
- Supports formats like WAV, FLAC, and others.
- Includes AES encryption.
- Outguess: is an advanced steganography tool that focuses on images. It is designed to hide data without causing noticeable changes to the image, making it a good option for those needing high security and discretion.
- Focuses on hiding data in images.
- Minimal changes to the carrier image.
- Supports JPEG and PNM file formats.
- Tella: Tella is a secure mobile app designed for activists, journalists, and human rights defenders to document and protect sensitive information in challenging environments. It encrypts photos, videos, and audio recordings automatically, hides them from regular phone galleries, and allows users to set a PIN or password for additional protection. Tella also supports offline data collection and integrates with platforms like Uwazi and Kobotoolbox. It is free, multilingual, open-source, and designed to protect against physical and digital repression.
- – Protect yourself from physical and digital repression while collecting and storing sensitive information.
- – Protect the data you collect from censorship, tampering, interception, and destruction.
- – Easily produce high quality documentation that can be used for research, advocacy, or transitional justice.
- – Encrypt your files: Tella automatically encrypts your photos, videos, and audio recordings as soon as they are captured.
- – Hide your files in the device: your files are inaccessible from the phone’s regular gallery or file explorer. You can only access them in the app.
- – Lock your files: set a PIN or password to protect your files. Entering the correct lock is the only way to decrypt the files stored in Tella.
- – Mask the app: change the look of Tella to hide it from people searching your phone.
- – Camera and recorder inside Tella: take photos, record videos and audio directly in Tella so that your files are immediately encrypted and hidden in the app.
- – Tella integrates with Uwazi, Kobotoolbox and Tella Web. Pick the platform that best suits your needs and collect data directly in Tella.
- – Offline mode: in areas with limited or no internet connection, you can save your data and submit it when you reach a reliable internet connection.
Removing Metadata
During internet shutdowns, metadata plays a crucial role and is often just as important as the content of the communication itself. Metadata is the information about data, such as who is communicating, when, and how frequently, without revealing the actual content of the communication. Even if content is encrypted, metadata can still be tracked, revealing valuable information. Here’s why metadata is significant during internet shutdowns:
Tracking Communication Patterns
- Monitoring Social Networks: Even when content is hidden through encryption, metadata (like the sender, recipient, and time of communication) can reveal the connections between individuals. Authorities can use this to identify networks of activists, journalists, or opposition members, which can lead to targeted repression.
- Frequency and Timing of Communication: Metadata shows how often someone communicates, the time of day they are active, and with whom. During politically sensitive periods, spikes in communication among certain groups or individuals can be a red flag for authorities.
Location Tracking
- Geolocation Metadata: Many services, particularly mobile apps or web browsers, automatically collect location data as part of their metadata. Even when internet access is restricted, some services may still be able to track and report the physical location of users. This is especially dangerous in repressive regimes where authorities may be looking to suppress protests or gatherings.
- Proxy and VPN Identification: Even if users try to bypass shutdowns using VPNs or proxies, metadata can reveal that someone is using these tools, as well as the location of the VPN server or proxy being used. This can potentially expose people trying to circumvent the shutdown.
Surveillance Without Content Access
- Analyzing Relationships: During internet shutdowns, authorities may not need to see the actual content of a message to gather useful information. By examining metadata—who is communicating with whom—they can infer relationships, map out networks, and even predict future actions. This allows governments to identify key figures in resistance movements or activists, even if the communication content is encrypted.
- Building a Profile: Metadata collected over time can be used to build a comprehensive profile of a person’s behavior, affiliations, and routine. During shutdowns, this type of surveillance can be increased to monitor potential threats or dissent.
Bypassing Encryption
- Encrypted Content, Visible Metadata: While encryption hides the content of messages, it does not always hide metadata, such as who the sender and recipient are, the length of the message, or when and how often messages are sent. During shutdowns, authorities might allow only limited communication methods (such as email or SMS), where metadata remains visible even if the content is encrypted.
Legal and Social Risks
- Association Guilt: Metadata can also put people at risk through guilt by association. Even if a person isn’t actively involved in dissident activities, communicating with someone who is under scrutiny could expose them to danger. For example, if metadata reveals frequent communication with known activists, authorities may consider the person complicit in political or social movements.
- Surveillance Evasion Difficulties: During a shutdown, hiding metadata can be extremely difficult. Tools like VPNs or anonymizing networks like Tor help obscure metadata, but they may still leave traces or arouse suspicion in heavily monitored environments.
Blocking Access to External Resources
- Identifying and Blocking Traffic: Even if users try to bypass shutdowns through external communication tools (like VPNs, proxies, or encrypted messaging apps), metadata can reveal these attempts. Authorities can block these methods by analyzing patterns in metadata and identifying which tools are being used.
How to Protect Metadata During Internet Shutdowns:
While encrypting the content of messages is essential, there are ways to also protect metadata:
- Use of Tor or I2P Networks: These anonymization tools help obscure metadata by routing traffic through multiple nodes, making it difficult for authorities to trace the origin or destination of the communication.
- VPNs and Proxies: While not perfect, VPNs can help mask certain types of metadata, such as the user’s IP address, by routing traffic through external servers. However, metadata about VPN usage itself can still be tracked.
- Delay Tactics: Tools like “mix networks” add delays to communication in order to obfuscate timing metadata, making it harder to correlate messages between sender and receiver.
In the context of an internet shutdown, metadata can provide authorities with a detailed map of who is communicating, how often, and from where, even without access to the content of the messages. Therefore, protecting metadata is as critical as securing the content itself, especially for individuals engaged in sensitive activities like protests, journalism, or human rights advocacy.
Here are some easy-to-use tools:
- MAT2 (Metadata Anonymisation Toolkit)
- What it does: MAT2 is a free and simple tool that helps users remove metadata from documents, images, PDFs, and other file types. It supports a wide range of file formats and removes sensitive metadata such as author names, location data, and modification history.
- How to use: MAT2 has a graphical interface for easy drag-and-drop functionality, allowing non-technical users to clean their files before sharing them.
- Availability: Works on Linux, and can be used via the command line, but many Linux-based operating systems include easy-to-use versions.
- ExifTool (for images and videos)
- What it does: ExifTool is a powerful tool for removing metadata, especially from image and video files that may contain GPS data, camera information, or timestamps.
- How to use: ExifTool is more technical by default, but there are user-friendly front-ends available that simplify the process for non-tech-savvy users. For example, tools like “ExifCleaner” offer a drag-and-drop interface to remove metadata from media files.
- Availability: Available on Windows, macOS, and Linux.
- VLC Media Player (for video metadata)
- What it does: VLC, a widely used media player, has built-in tools to edit or remove metadata from video files. Users can simply open a video, edit its metadata, or remove it completely through VLC’s simple interface.
- How to use: Open the video, go to “Tools” > “Media Information,” and manually edit or clear metadata fields. For a non-technical user, this is a straightforward option for video metadata removal.
- Availability: Available on all major platforms, including Windows, macOS, and Linux.
- AnonAddy (for email metadata)
- What it does: AnonAddy is a simple email forwarding service that hides your real email address and strips metadata like IP addresses from your communications.
- How to use: Users can create anonymous aliases for their email addresses, which they can then use to send and receive emails without exposing personal information or metadata.
- Availability: Works with any email client, and you can access it via web browsers.
- OnionShare (anonymous file sharing)
- What it does: OnionShare allows users to share files securely and anonymously using the Tor network, which also hides metadata related to the sharing process.
- How to use: Non-tech-savvy users can install OnionShare, drag and drop the files they want to share, and get a secure link they can send to the recipient. The tool ensures that both the content and metadata remain private.
- Availability: Available for Windows, macOS, and Linux.
- Tor Browser (for browsing and communication)
- What it does: Tor Browser anonymizes a user’s internet traffic by routing it through multiple nodes, hiding metadata like IP addresses and browsing habits. It’s one of the easiest tools for non-technical users to protect their online activity.
- How to use: Download Tor Browser and use it like any regular web browser. It automatically anonymizes your traffic without additional setup.
- Availability: Available on Windows, macOS, Linux, and Android.
- Simple PDF Metadata Remover
- What it does: A tool specifically for PDFs, it removes metadata such as author name, document creation date, and modification history.
- How to use: Users can easily drag and drop their PDF into the tool, and it removes the metadata with one click.
- Availability: Available as a simple Windows program.
- BleachBit (for general file cleaning)
- What it does: BleachBit is a user-friendly tool that helps remove metadata from various types of files and cleans up unnecessary data from a computer to protect privacy.
- How to use: It offers a simple interface where users can select the types of files they want to clean (like browser history, metadata from files, and more) and perform the cleaning with one click.
- Availability: Available for Windows and Linux.
- Photo Metadata Remover Apps (for smartphones)
- What it does: These are simple apps designed to remove metadata from photos taken on smartphones, such as EXIF data containing location and camera information.
- How to use: Users just need to upload the photo, and the app will remove metadata automatically.
- Tails Operating System (for complete privacy)
- What it does: Tails is a privacy-focused operating system that runs from a USB stick and anonymizes everything you do. It comes preloaded with tools like Tor, encrypted communication, and metadata removal for files.
- How to use: While installing Tails may require minimal technical knowledge, once it’s running, everything is simplified and pre-configured for privacy. This makes it ideal for non-technical users who want comprehensive protection.
- Availability: Available for free, but you need a USB stick to install and run it.
For non-tech-savvy users, these tools provide simple and effective ways to remove or hide metadata. They focus on ease of use with drag-and-drop interfaces, one-click cleaning, and anonymity tools like Tor or Tails that automatically handle the complexity.
Practical Scenarios
Here, we will examine four real scenarios, and in these scenarios, we will not only analyze them and the methods used by users but also review the security risks and provide solutions to reduce those risks.
Scenario One: Full Shutdown and Using Local Communication Tools
During an internet shutdown, I was in Tehran while my spouse, a U.S. citizen, was in the U.S. For some days, I had no way to communicate with them until I realized I could send and receive emails using the national email services with an .ir domain to Gmail. After days of silence, we were finally able to speak, but out of fear that the .ir emails might be read, our communication was very formal. We tried to speak between the lines, worried that someone might be watching.
Solution: Even during a shutdown, certain national services may remain functional (such as the .ir domain emails). GPG encryption can be layered on top of these insecure platforms to ensure the contents are not easily readable by third parties. You can also encrypt a file or text message and send it through any other communication channel such as messaging apps or even text messages.
Preemptive Planning: Before a shutdown occurs, the person and their spouse could set up GPG encryption for their emails. GPG (GNU Privacy Guard) allows users to encrypt their messages, ensuring only the intended recipient can read them. The importance of key exchange before the shutdown to enable encrypted communication. In this scenario, the couple might have exchanged their GPG public keys in advance, allowing them to continue communicating securely even on monitored platforms.
Scenario Two: Mobile Data Shutdown
During an internet shutdown in a major city, such as Tehran, authorities targeted mobile network towers (BTS) to disrupt cellular internet (3G/4G) across large regions, particularly around areas like Laleh Park where protests were occurring. All mobile SIM cards lost connection, including LTE services from providers like Irancell. However, while mobile internet was cut off, my home’s fixed broadband connection (ADSL/TD-LTE) remained functional.
Recognizing this opportunity, I used a VPN to remotely connect to my home’s internet network from my phone. By creating a secure connection to my home Wi-Fi via VPN, I was able to bypass the mobile internet shutdown and regain full access to the internet. Once connected, I turned my phone into a mobile hotspot, allowing others around me to also connect to the internet through my secure home connection. While many others were disconnected, I maintained full online functionality and provided internet access to those nearby.
A general warning was circulating to avoid bringing mobile phones to protest sites due to potential tracking, but my solution allowed me to provide internet access in a safer way using my home’s secure network.
Solution: In this scenario, the solution relies on taking advantage of the fact that while mobile networks (BTS towers) are shut down, fixed broadband services like ADSL or TD-LTE may still be operational. By connecting to a fixed internet connection through a VPN from a mobile device, you can restore full access to the internet. This method also allows you to share that connection with others nearby by turning your phone into a mobile hotspot.
To implement this solution:
- Use a Fixed Broadband Connection: If your home’s fixed internet is still available, use it to maintain your connection to the global internet.
- Connect via VPN: Install and set up a VPN (Virtual Private Network) on your phone, allowing you to securely connect to your home network even when mobile internet is down.
- Create a Mobile Hotspot: Once connected via VPN, enable your phone’s mobile hotspot feature, sharing the internet connection with others nearby.
This solution ensures continued access to online platforms when mobile networks are disrupted, allowing you to stay connected and help others in real time.
Preemptive Planning: To be prepared for such a scenario, it’s crucial to take certain steps before an internet shutdown occurs. Here’s how to plan ahead:
- Acquire the Necessary Tools:
- VPN Service: Set up a VPN service that allows you to remotely connect to your home internet network. Ensure it is installed and configured on your phone and other devices.
- Fixed Broadband Connection: Ensure that you have a stable and reliable home internet connection (e.g., TD-LTE or ADSL) that could be used during mobile network outages.
- Mobile Hotspot Capability: Familiarize yourself with your phone’s mobile hotspot feature and ensure it is enabled and configured.
- Coordinate with Others:
- Inform friends and family about your setup so they can also plan to connect to your mobile hotspot during an outage.
- Encourage them to set up similar configurations for redundancy.
Potential Risks: Although this solution provides access to the internet during shutdowns, there are still some risks to consider:
- Surveillance: Even though you’re using a VPN to encrypt your connection, authorities could still monitor traffic patterns or metadata, especially if they control local ISPs. It’s essential to use encryption tools like VPNs or Tor to secure your data.
- Physical Security: Carrying a mobile hotspot might draw attention, especially if it’s obvious that you have internet access when others do not. Be cautious about where you use your connection, and avoid drawing attention in areas of heightened security or protest.
- Service Disruption: While fixed broadband services like TD-LTE or ADSL may continue to function, they could also be disrupted at any time. There is no guarantee that these connections will remain available during long-term shutdowns.
- Battery Drain: Using your phone as a hotspot can quickly drain its battery, especially during extended use. Make sure to have portable chargers or power sources available to maintain connectivity for as long as possible.
Scenario Three: Near Total Shutdown, Using Local Infrastructure and Roaming
In response to increasing internet shutdowns, our group, which we called “The Secret Army,” discovered a way to bypass the restrictions and maintain internet access. We learned that we could access the internet through foreign SIM cards from countries like Turkey and the UAE, as well as domestic data centers within Iran.
Our primary strategy was to connect users via VPN to foreign SIM cards that were using roaming services inside Iran. By doing this, we were able to reroute their traffic to international networks and maintain internet access even when local networks were cut off.
When roaming services were eventually blocked, we adapted by connecting users to domestic data centers. Through VPN connections, users were linked to these internal data centers, which were still connected to the global internet. This way, even during severe shutdowns, we could keep people online and maintain critical communication channels.
Solution: The solution in this scenario relied on two key strategies: leveraging foreign SIM cards with roaming services and domestic data centers. These methods allowed users to stay connected to the internet despite local network disruptions.
Here’s how it worked:
- Using Foreign SIM Cards for Roaming: We provided users with access to foreign SIM cards (Turkish, Emirati, etc.) that still had roaming services active within Iran. By connecting to these SIM cards via VPN, users could bypass Iranian internet restrictions and access international internet services.
- Connecting to Domestic Data Centers: When the authorities disabled roaming services, we shifted our strategy to domestic data centers. By routing VPN traffic through these data centers, which had connections to the global internet, users could continue accessing online services even during widespread shutdowns.
Both methods allowed us to provide users with a lifeline to the internet during critical moments, ensuring that communication, updates, and information sharing remained possible despite the government’s efforts to isolate the population.
Preemptive Planning: To ensure this method works effectively during future shutdowns, it’s essential to plan and prepare in advance. Here’s how to get ready:
- Obtain Foreign SIM Cards
- Ensure you or trusted contacts have access to foreign SIM cards from countries like Turkey or the UAE. Test these SIM cards in advance to confirm that they can connect via roaming in Iran.
- Have a backup plan for distributing these SIM cards to trusted users in case of widespread shutdowns.
- Set Up VPN Infrastructure
- Set up and configure VPN servers that can route traffic through foreign SIM cards or domestic data centers. Ensure the VPN is tested with these SIM cards and can establish secure connections.
- Have multiple VPN configurations ready in case one server or method is blocked.
- Establish Connections with Domestic Data Centers
- Identify and establish secure connections with domestic data centers that still have access to the global internet, even during partial shutdowns. Build relationships with trusted personnel within these data centers, if possible, to maintain connectivity.
- Ensure the VPN can seamlessly route traffic through these data centers if roaming services are cut off.
- Test Backup Systems Regularly
- Test the full setup regularly, from VPN connections to the functionality of foreign SIM cards and data centers. Ensure that users know how to connect to these systems when the need arises.
- Establish a secure and private communication channel to instruct users on how to connect to the VPN and maintain access during shutdowns.
Potential Risks: While this method can provide internet access during severe shutdowns, it comes with certain risks:
- Surveillance and Detection: Authorities may monitor foreign SIM cards or domestic data center traffic, especially if they suspect people are using these methods to bypass the shutdown. Using encryption (via VPNs, Tor, etc.) is crucial to minimize the risk of surveillance and detection.
- Physical Security: Possessing foreign SIM cards or accessing domestic data centers may raise suspicion in areas with heightened security or government oversight. Ensure that those involved are aware of the potential risks and know how to handle such situations.
- Cutoff of Data Centers: If the government identifies domestic data centers being used for bypassing restrictions, they may disable access to these centers as well. Having multiple VPN servers or fallback methods is essential to keep the connection secure.
- Overload on Foreign SIM Cards: If too many users connect to a small number of foreign SIM cards, the network could become overloaded, reducing performance or causing connection issues. Have multiple SIM cards and VPN servers available to distribute the load.
Scenario Four: Using Gaming and Business Platforms For Communication
After the Ukrainian plane incident and internet restrictions across the country, we reverted to old communication methods like fax and SMS to announce an upcoming exhibition, reminiscent of the early 2000s. The internet was never the same after that. We were forced to rely on outdated communication systems, such as delivering letters by motorcycle couriers.
In my personal life, the internet shutdown severed my communication with the outside world. It felt like being stranded on an island with no connection to the rest of the world and no way to escape. While this disconnection didn’t necessarily disrupt daily life, it was deeply unsettling. To access news, we were forced to visit Peyvandha, the Iranian government’s internet censorship page. With no access to TV or satellite, we struggled to piece together the truth from domestic news outlets. I didn’t trust domestic apps due to privacy concerns, and though there was talk of satellite internet, it was prohibitively expensive. As a result, many of us turned to VPNs to try and regain access to the global internet. Occasionally, newsrooms of media outlets would offer “bonuses” of very limited internet, primarily targeted at photographers, which felt highly controlled and engineered.
Following the protests sparked by Mahsa’s death, the internet was regionally shut down to disrupt communication and prevent organization. However, we found alternative ways to communicate by using gaming platforms and domestic apps like Divar, which were less likely to be monitored.
By September 2022, the situation had become more intense. It was already too late to prevent the spread of government surveillance, and the most important priority was to ensure that our activities didn’t endanger others. A neighborhood group had organized a protest in Ekbatan, but by the time we arrived, the area was full of Basijis (paramilitary forces).
We had created codes to communicate safely. In the beginning, we would remain silent, listening to familiarize ourselves with the situation. We also had backup communication channels, such as a specific Telegram group with overlapping members who shared our understanding of the language used in these networks. Many of these people were game designers who had created games specifically for organizing in a covert way—no one was actually playing the games, but the platforms served as a communication tool.
As a photographer, I was constantly concerned about how to protect myself and my work. I reverted to traditional methods to ensure safety. During the first two or three days of protests, many of my colleagues and I took our cameras into the streets to document the events. However, when arrests began and cameras were confiscated, I stopped carrying my phone. Instead, I started using an old 2010 Sony camera without a lens and a small SD card that wasn’t connected to the internet. When I eventually destroyed the SD card, no trace of my work remained. I always took care to frame my shots in ways that obscured the faces of the people I photographed to protect their identities.
Solution: To mitigate the effects of internet shutdowns, especially for those working in sensitive or creative fields, a layered solution is required:
- Alternative Communication Platforms: During protests, people can also use gaming platforms or domestic apps like Divar as covert communication channels. Since all of these communications are in plain text, those who use this method must high their IP addresses and encrypt all the communication.
- Encrypted Data Storage and Transmission: It’s crucial for individuals, especially journalists and artists, to use strong encryption tools like GPG to protect their communications and data. Additionally, they should regularly back up their work to secure, encrypted offline storage (e.g., USB drives or SSDs). These backups can be stored internationally through cloud services or decentralized storage solutions such as IPFS.
- Decentralized Platforms for Art and Content Sharing: Artists should explore blockchain-based platforms for showcasing their work. Decentralized technologies like NFTs could allow artists to continue sharing their work globally, even if centralized platforms like Instagram are blocked.
Preemptive Planning: To prepare for future internet shutdowns, individuals and organizations should plan ahead:
- Mesh Networks: Establish localized mesh networks that allow devices to connect directly without needing a broader internet connection. These networks can be crucial for maintaining communication during prolonged shutdowns, particularly in dense urban areas.
- Backups and Offline Data Management: Regularly backing up data to secure, offline locations ensures that work and communications remain accessible even during outages. Using services like IPFS for decentralized storage or secure international cloud storage can provide a safety net for critical data.
- Digital Literacy and Security Training: Training artists, activists, and other vulnerable groups on secure communication methods, including the use of VPNs, encryption tools, and offline backup systems, will ensure they are better equipped to navigate shutdowns.
By adopting these solutions and implementing preemptive measures, individuals, businesses, and artists can continue their work with greater security and confidence, even during an internet shutdown. This allows for the protection of critical communication, the continuity of creative work, and the preservation of the freedom to express and organize.
Internet Shutdown Game
The Shutdown Game has been meticulously designed to offer an engaging and educational experience centered around the issue of internet shutdowns. Its primary goal is to provide participants with a comprehensive understanding of the various techniques used to disrupt internet access and the strategies available to counteract these shutdowns. This game is crafted to highlight the pressing issue of internet censorship, exploring the motivations behind such disruptions and their impact on human rights. Through interactive gameplay, individuals and organizations can gain valuable insights into the methods employed by governments to block internet access and learn effective ways to safeguard digital freedom.
This game is adaptable to both in-person and online settings, making it a versatile tool for diverse audiences. It includes detailed instructions for facilitators, game dynamics, and resources such as maps and cards to enhance the experience. Over a 120-minute session, players will delve into the technical aspects of internet shutdowns, engage with real-world scenarios, and utilize “circumvention” cards to explore ways to bypass these restrictions. By leveraging the creative commons license, the game allows users to modify and tailor the content to suit their needs, fostering a deeper understanding of internet infrastructure and enhancing the ability to navigate and resist shutdowns.
What the game files contain:
- a game manual to help facilitators organize training sessions both online and in the physical world
- 13 blockage scenarios for you to chose the most relevant for your audience and objectives
- editable presentations and images for you to adapt the material to your audience Please note this game is not for playing on your own to learn about shutdowns.