{"id":35703,"date":"2020-06-24T19:50:00","date_gmt":"2020-06-24T19:50:00","guid":{"rendered":"https:\/\/www.darkreading.com\/cloud\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/d\/d-id\/1338169"},"modified":"2020-06-24T19:50:00","modified_gmt":"2020-06-24T19:50:00","slug":"no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/","title":{"rendered":"No Internet Access? Amid Protests, Here&#8217;s How to Tell Whether the Government Is Behind it"},"content":{"rendered":"<header>\n<\/header>\n<p><span class=\"strong black\">Government-mandated Internet shutdowns occur far more regularly than you might expect.<\/span> <\/p>\n<p class>Since the&nbsp;death&nbsp;of George Floyd&nbsp;at the hands of Minneapolis law enforcement on May 25, millions of people worldwide&nbsp;have taken to the streets to protest police violence. But one oft-used government tactic&nbsp;in some countries&nbsp;to limit the ability of&nbsp;their&nbsp;citizens to communicate and organize has been absent so far: There have been virtually no reports of state-mandated Internet shutdowns in response to the protest.<\/p>\n<p>Part of the reason for that is it&#8217;s much harder to diagnose cellular connectivity problems when thousands of people flood into one neighborhood, all demanding to use mobile phone infrastructure that wasn&#8217;t designed to handle so many devices at once. While one of the few instances of a US government-mandated network shutdown came in 2011 \u2013 when police for the BART transit system in the San Francisco Bay Area&nbsp;<a href=\"https:\/\/arstechnica.com\/tech-policy\/2011\/12\/fcc-to-probe-san-francisco-subway-cell-phone-interruption-policy\/\" target=\"_blank\" rel=\"noopener noreferrer\">shut down cellular service for several hours during protests<\/a>&nbsp;that followed multiple police shootings of passengers \u2013 this time around Seth Schoen, senior staff technologies at the Electronic Frontier Foundation, said his colleagues haven&#8217;t been able to confirm the rumors they&#8217;ve heard about government interference of mobile networks.&nbsp;<\/p>\n<p>&#8220;I haven&#8217;t seen any hard evidence that couldn&#8217;t also be easily explained by networks being overloaded,&#8221; Schoen said in an email exchange. But in many cases, consumers can tell whether there has been government interference with Internet access because it will &#8220;affect people on different parts of the Internet in different ways,&#8221; he added.<\/p>\n<p>Government-mandated Internet shutdowns occur far more regularly than you might expect. The number of countries that shut down access for their residents jumped from 25 in 2018 to 33 in 2019, according to the annual&nbsp;<a href=\"https:\/\/www.accessnow.org\/cms\/assets\/uploads\/2020\/02\/KeepItOn-2019-report-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Keep It On report<\/a>&nbsp;published in February by nonprofit Internet advocacy group Access Now. China, Vietnam, Egypt, Iran, Syria, and Cuba are notorious in this regard and regularly cited as countries with the least Internet freedom, according to 2019&#8217;s&nbsp;<a href=\"https:\/\/freedomhouse.org\/report\/freedom-net\/2019\/crisis-social-media\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Freedom on the Net&#8221; report<\/a>, produced annually by the US-based democracy and human rights nonprofit Freedom House. But they&#8217;re not the only countries that use Internet shutdowns to control the flow of information and ideas.<\/p>\n<p>Among the worst offenders are India and Brazil. In the contested state of Kashmir, the Indian government blocked&nbsp;<a href=\"https:\/\/apnews.com\/d0f161a2ac0d4ac322bde6e5511ae608\" target=\"_blank\" rel=\"noopener noreferrer\">all Internet access<\/a>,&nbsp;landlines, and mobile service&nbsp;for between August 2019 and March 2020. Brazil regularly <a href=\"http:\/\/bloqueios.info\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">blocks access to the messaging service WhatsApp<\/a>, even as other Internet services in the country have continued unabated. Internet Research company Top10VPN estimated the cost of Internet shutdowns in 2019 to be<a href=\"https:\/\/www.top10vpn.com\/cost-of-internet-shutdowns\/\" target=\"_blank\" rel=\"noopener noreferrer\">&nbsp;more than $8 billion globally<\/a>.<\/p>\n<p><strong>How to Discern&nbsp;&nbsp;<br \/><\/strong>Despite politically driven interference, Internet monitoring organizations point to some telltale clues that can help people determine whether their sudden inability to use the Internet is a technical glitch, such as an underwater cable cut, a distributed denial-of-service (DDoS) attack, or a government-mandated order.&nbsp;&nbsp;<\/p>\n<p>Most of the government-mandated Internet shutdowns or blocks are based on interfering with the country&#8217;s Domain Name System (DNS), the protocol that maps websites to IP addresses, says Arturo Filast\u00f2, project lead at the&nbsp;Open Observatory of Network Interference, a nonprofit that monitors and documents Internet shutdowns. Since most of the world&#8217;s DNS queries are resolved in plain text, Internet service providers can be &#8220;convinced&#8221; by the governments they operate under to restrict access to certain sites&nbsp;\u2013 or even all of them, he says.<\/p>\n<p>&#8220;DNS hijacking is most common in the West. It&#8217;s the first level because it&#8217;s the easiest and cheapest,&#8221; Filast\u00f2 says. &#8220;Another technique under the DNS tampering umbrella is DNS spoofing, such as the Chinese Great Firewall, where they will spoof the response to a DNS query faster than the legitimate response.&#8221;<\/p>\n<p>Measuring Internet connectivity and shutdowns has grown more sophisticated over the years. The Center for Applied Internet Data Analysis at the University of California, San Diego, uses a combination of global Internet routing, active probing of IP addresses, and the background radiation from the Internet itself to evaluate the cause of a shutdown.&nbsp;<\/p>\n<p>&#8220;Some measurements will tell you that the physical [Internet] connectivity still exists during a shutdown. One of our three methods will still see the existence of connectivity,&#8221; says Alberto Dainotti, research scientist with the&nbsp;<a href=\"https:\/\/ioda.caida.org\/ioda\" target=\"_blank\" rel=\"noopener noreferrer\">Internet Outage Detection and Analysis group<\/a>&nbsp;at CAIDA.&nbsp;<\/p>\n<p>Determining whether a shutdown is caused by a technical snafu, a DDoS attack, or government interference can be tricky. If you can&#8217;t reach a website but others in your country can, it&#8217;s most likely a technical issue with your network. (T-Mobile users experienced this in North America&nbsp;<a href=\"https:\/\/www.theverge.com\/2020\/6\/17\/21293950\/t-mobile-outage-june-explainer\" target=\"_blank\" rel=\"noopener noreferrer\">last week<\/a>.) If all or most websites work for you but one specific one appears to be down, it could be a targeted attack (by malicious hackers or a government order) focused on that one site. Specific websites can be checked with the service&nbsp;<a href=\"https:\/\/downforeveryoneorjustme.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Down for Everyone or Just Me<\/a>.<\/p>\n<p>Of course, it can also be a government shutdown. Several services can help Internet users identify when their service is being disrupted by a DDoS attack or a government shutdown. In its&nbsp;<a href=\"https:\/\/ssd.eff.org\/en\/module\/understanding-and-circumventing-network-censorship\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;Surveillance Self-Defense&#8221; guide<\/a>, the EFF recommends using encrypted DNS, a virtual private network, or the Tor Browser to circumvent DNS-based network shutdowns. Filast\u00f2&#8217;s employer also offers its&nbsp;<a href=\"https:\/\/ooni.org\/install\/\" target=\"_blank\" rel=\"noopener noreferrer\">OONI Probe<\/a>&nbsp;to help users test network connectivity and identify likely reasons for the shutdown they&#8217;re experiencing.&nbsp;<\/p>\n<p>The EFF&#8217;s Schoen noted consumers should be more worried about technical problems on their devices or with their ISPs before presuming their government is blocking part or all of their Internet access \u2013 even though government-initiated Internet interference and shutdowns are on the rise.&nbsp;<\/p>\n<p>&#8220;Governments do actively tamper with people&#8217;s devices and network connections, but less frequently than random errors and outages that aren&#8217;t intentional on anyone&#8217;s part,&#8221; he said.<\/p>\n<p><strong>Related Content:<\/strong><\/p>\n<div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/VIRTUALSUMMIT_DR20_320x50.jpg\" alt width=\"450\" height=\"70\"><\/div>\n<div><em><strong><strong>Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that &#8220;really bad day&#8221; in cybersecurity. Click for<\/strong><strong>&nbsp;<a href=\"https:\/\/events.darkreading.com\/virtualsummit\/\" target=\"_blank\" rel=\"noopener noreferrer\">more information and to register<\/a>&nbsp;for this On-Demand event.&nbsp;<\/strong><\/strong><\/em><\/div>\n<p><span class=\"italic\">Seth is editor-in-chief and founder of The Parallax, an online cybersecurity and privacy news magazine. He has worked in online journalism since 1999, including eight years at CNET News, where he led coverage of security, privacy, and Google. Based in San Francisco, he also &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=5496\">View Full Bio<\/a><\/span> <\/p>\n<p><strong>Recommended Reading:<\/strong><\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/d\/d-id\/1338169?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Government-mandated Internet shutdowns occur far more regularly than you might expect. Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/d\/d-id\/1338169?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-35703","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>No Internet Access? Amid Protests, Here&#039;s How to Tell Whether the Government Is Behind it 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"No Internet Access? Amid Protests, Here&#039;s How to Tell Whether the Government Is Behind it 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-24T19:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/VIRTUALSUMMIT_DR20_320x50.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"No Internet Access? Amid Protests, Here&#8217;s How to Tell Whether the Government Is Behind it\",\"datePublished\":\"2020-06-24T19:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/\"},\"wordCount\":1102,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/VIRTUALSUMMIT_DR20_320x50.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/\",\"name\":\"No Internet Access? Amid Protests, Here's How to Tell Whether the Government Is Behind it 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/VIRTUALSUMMIT_DR20_320x50.jpg\",\"datePublished\":\"2020-06-24T19:50:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/VIRTUALSUMMIT_DR20_320x50.jpg\",\"contentUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/VIRTUALSUMMIT_DR20_320x50.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"No Internet Access? Amid Protests, Here&#8217;s How to Tell Whether the Government Is Behind it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"No Internet Access? Amid Protests, Here's How to Tell Whether the Government Is Behind it 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/","og_locale":"en_US","og_type":"article","og_title":"No Internet Access? Amid Protests, Here's How to Tell Whether the Government Is Behind it 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-24T19:50:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/VIRTUALSUMMIT_DR20_320x50.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"No Internet Access? Amid Protests, Here&#8217;s How to Tell Whether the Government Is Behind it","datePublished":"2020-06-24T19:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/"},"wordCount":1102,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/VIRTUALSUMMIT_DR20_320x50.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/","url":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/","name":"No Internet Access? Amid Protests, Here's How to Tell Whether the Government Is Behind it 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/VIRTUALSUMMIT_DR20_320x50.jpg","datePublished":"2020-06-24T19:50:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/#primaryimage","url":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/VIRTUALSUMMIT_DR20_320x50.jpg","contentUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/VIRTUALSUMMIT_DR20_320x50.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/no-internet-access-amid-protests-heres-how-to-tell-whether-the-government-is-behind-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"No Internet Access? Amid Protests, Here&#8217;s How to Tell Whether the Government Is Behind it"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35703"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35703\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}