Protesters march during a rally against government and President Lukashenko in Minsk, Belarus, 25 October 2020. According to reports, over 100,000 opposition activists took to the streets against Belarusian government and President Alexander Lukashenko calling him to step down and demanding new presidential elections. EFE/EPA/STR
In the presidential elections held in August in Belarus, Alexander Lukashenko was re-elected with 80% of the votes, yet only a few believed the official account. This disparity between reality and the state claims instigated record numbers of people to pour into streets and demand repeated elections. The regime answered with a brutal crackdown on protesters and internet shutdowns to limit accessing and sharing information. But Belarusians found a way to communicate through an encrypted messaging service called Telegram, which played a vital role in organizing protesters and disseminating information horizontally without any formalized leadership. Encryption remains a central tool for bypassing state surveillance, especially in countries with repressive governments, but it does not come without lingering safety and security concerns.
When Belarusians called for transparent elections, they were met with extreme police violence and detentions, photos of which filled the media and caused international outrage. A parallel battle was happening in the digital realm through the blocking of independent media and opposition websites and intermittent internet blackouts. These restrictions aimed to cause a chilling effect on popular mobilisation and prevent the publishing of information and evidence about police abuse. Lukashenko blamed foreign interference for the internet shutdowns but experts pointed to the government that controls the state-owned Internet provider Beltelecom. NetBlocks reported that internet access in Belarus has been disrupted for several days, creating an information vacuum preventing citizens from establishing contact with each other and with the outside world. On the night of the elections results, the government shut down social networks, blocked VPNs, while encrypted traffic was also blocked on certain websites and two election platforms so that people could not observe news about possible violations. Later that day, the whole mobile internet was shut down and most of the media outlets were unavailable. None of the usual messaging services worked without additional tools to bypass the censorship. Viber, WhatsApp, and Messenger were inaccessible.
Belarusian authorities used a DPI method for blocking internet access, but also monitored real-time communications, examined unencrypted content, and implemented targeted blockings and shutdowns, enabling both invasive privacy breaches and mass censorship. Similar technology has been documented in other countries, notably China and Russia, where it has been reviewed as a tool for implementing the Sovereign Internet Law. It seems like government manipulation of the internet will remain a constant feature in the future.
Multiple crackdowns have brought to the spotlight the rights to freedom of peaceful assembly and of association in the digital space. According to a UN special rapporteur threats to digital expression and internet freedom are more pronounced than ever [] and internet shutdowns have emerged as a popular means of information control. This issue has been lately growing in importance as the restrictions amid the COVID-19 pandemic have made the shutdowns of online civic space ever more consequential for exercising civil and political rights. The Belarusian case of coping with state interference through encrypted messaging service can be instrumental for understanding similar scenarios across the globe.
In the post-Soviet country with a booming IT sector adding 6.4% GDP, harnessing the potential of the tech platforms has been central to the oppositions success. YouTube popularized Siarhei Tsikhanouski and subsequently his wife, who ran as the lead candidate against Lukashenko. Again, when social media platforms became mostly unavailable, protesters turned to Telegram. The anti-censorship tools used by Telegram through robust encryption allowed Belarusian citizens to continue connecting via the app and access its channels to share messages, warn protesters of police movements, and guide demonstrators to certain neighborhoods.
The diffuse coordination made it more difficult for the security services to repress the protesters. As a journalist summed up: This is the Telegram revolution. Its not the opposition, not the political parties. Everything is made by bloggers, influencers, and these Telegram channels. Lukashenko himself acknowledged Telegrams importance when announcing that all the various Telegram channels that control crowds in Minsk will go away. The protests show how critical encryption is to protect citizens human rights and safety. It also offers a model to be copied by activists in many other countries looking to evade government control. Similar channels have been used by popular movements in Catalonia and Hong Kong, proving that even though the context might be different, similar tactics can still be adopted.
Evidently, there are two sides to the liberating power of encryption. A key argument is that as much as it can be a tool for greater democracy, it can also foster illegal activities. Thinking of the democratic cause only, where the biggest Telegram channels are followed by millions of users, questions arise around self-organization, misinformation risks, and security threats to users. In a climate where traditional media cannot be trusted and oppositional media has been disabled, the platforms take on an unprecedented power over information. The biggest channel fuelling Belarusian protests is Nexta, with more than 2 million subscribers in a country of about 9.4 million people. Operating fast and without an editorial team, they do not have the time and the capacity to fact-check information. Misinformation can lead to higher risk-taking, such as when protesters wrongly heard that security forces joined them and approached the police chanting five cities have laid down their shields. They were later dragged into police vans and may have been among the thousands of detained Belarusians who faced torture and beatings.
Roman Protasevich, the chief editor of Nexta, offered a rare glimpse into the channels operational mindset when interviewed by the BBC: Do I feel responsible for what we publish? Only in terms of whether it will bring people closer to victory and the end of the dictatorship. Undoubtedly, a small team of six that works out of a community centre in Warsaw is short of resources to cross-check each piece of information when there are hundreds of items on the Telegram channel. But these and similar channels remain oblivious to alerting their followers that the information they publish has not been verified.
As the governments become increasingly repressive and tech-savvy in suppressing dissent, the popularity of encrypted platforms for news gathering and dissemination is here to stay. Encrypted communications fall beyond the reach of regulation, making them a strong alternative source. They will remain a key enabler of civic rights in undemocratic societies where the media is tightly controlled by the authorities. But with information power concentrated into the hands of a few, an additional layer of scrutiny should be placed on how they operate and whether or not they act responsibly towards citizens.
Nexta founder Stsyapan Putsila downplays their role saying that they do not force anyone to protest: We tell people that they can go out, defend their rights. Belarusians come out on their own. But he also added that Now we not only inform, but to some extent also coordinate people. For Nexta, the trade-off is worth the end goal of achieving democracy, and many of their followers would agree. But in the country hungry for uncensored information, this reluctance to take on a greater responsibility despite growing stakes creates additional risks for the protesters.
Read more from the original source:
Did they crack the code? The importance of encryption for protest movements - OpenGlobalRights
- Ring adds end-to-end video encryption to its doorbells and security cameras at CES 2021 - CNET - January 14th, 2021
- Encrypted Phones iPhone and Android Encryption - Reader's Digest - January 14th, 2021
- Millions Flock to Telegram and Signal as Fears Grow Over Big Tech - The New York Times - January 14th, 2021
- Signal, the encrypted messaging app and WhatsApp alternative, explained - Vox.com - January 14th, 2021
- Heres why Telegram does not offer end-to-end encryption by default - The Indian Express - January 14th, 2021
- Mobile Encryption Market Structure, Industry Inspection, and Forecast 2025 - Business-newsupdate.com - January 14th, 2021
- Comprehensive Report on Email Encryption Market 2020 | Size, Growth, Demand, Opportunities & Forecast To 2030 - KSU | The Sentinel Newspaper - January 14th, 2021
- The World's Only Processor Family with Full Memory Encryption* - PCWorld - January 14th, 2021
- What is Signal? The basics of the most secure messaging app. - Mashable - January 14th, 2021
- WhatsApp chats are encrypted so how will Facebook use chat data for ads? This is how - India Today - January 14th, 2021
- Encryption Software Market Current and Future Industry Trends, 2020-2025 - AlgosOnline - January 14th, 2021
- What Is Signal, and Why Is Everyone Using It? - How-To Geek - January 14th, 2021
- Data Encryption Market Analysis and In-depth Research on Size, Trends, Emerging Growth Factors and Forecasts 2026 - Murphy's Hockey Law - January 14th, 2021
- Elon Musk says to use Signal instead of Facebook. What to know about the messaging app - CNET - January 10th, 2021
- Global Document Encryption Software Market 2020 Industry Analysis, Key Drivers, Business Strategy, Opportunities and Forecast to 2025 The Sentinel... - January 10th, 2021
- Encryption Software Market Segmentation and Analysis by Recent Trends, Development and Growth by Regions to 2026 - Farming Sector - January 10th, 2021
- Homomorphic Encryption Market 2020 | COVID-19 Impact With Top Key Players, Trends, Overview, Insights And Outlook 2027 : Cosmian, CryptoExperts,... - January 10th, 2021
- Global Email Encryption Market Expected to reach highest CAGR by 2025 : Hewlett-Packard, Symantec Corporation, Cisco Systems, Mcafee (Intel), Trend... - January 10th, 2021
- Homomorhpic Encryption Market Latest Innovations, Analysis, Business Opportunities, Overview, Component, Industry Revenue and Forecast - LionLowdown - January 10th, 2021
- Homomorphic Encryption Market Forecast 2021-2027, Latest Trends and Opportunities|Microsoft (US), IBM Corporation (US), Galois Inc (US) - Farming... - January 10th, 2021
- Are We Heading Towards EU Legislation Banning End-to-End Encryption? - Lexology - December 29th, 2020
- Encryption Software Market Trending Technologies, Industry Growth, Share, Opportunities, Developments And Forecast - LionLowdown - December 29th, 2020
- Signals famous encryption may have been cracked - TechRadar - December 29th, 2020
- AES Encryption Software Market 2021: Comprehensive Analysis and Growth Forecast - NeighborWebSJ - December 29th, 2020
- Encryption, zero trust and the quantum threat security predictions for 2021 - BetaNews - December 29th, 2020
- Encryption Software Market By Business Analysis, Industry Types, Demand, Capacity, Applications, Services, Innovations and Forecast 2025 - Farming... - December 29th, 2020
- Encryption Software Market Size 2020 by Top Key Players, Global Trend, Types, Applications, Regional Demand, Forecast to 2027 - LionLowdown - December 29th, 2020
- How to Securely Send Sensitive Information over the Internet - TechBullion - December 29th, 2020
- In 2020, Congress Threatened Our Speech and Security With the EARN IT Act - EFF - December 29th, 2020
- Encryption Key Management Market Key Trends and how do they Impact the Specific Regions - NeighborWebSJ - December 29th, 2020
- The ACLU Is Suing For Info On The FBI's Encryption Breaking Capabilities - Gizmodo - December 29th, 2020
- Encrypting data is the key to a peaceful New Year (Includes interview) - Digital Journal - December 29th, 2020
- Proton's Calendar Platform With End-to-End Encryption Now Available as an Android App - News18 - December 29th, 2020
- Encryption Software Market 2020: COVID19 Impact on Industry Growth, Trends, Top Manufacturer, Regional Analysis and Forecast to 2027 - The Monitor - December 29th, 2020
- The Same U.S. Government That Wants To Weaken Our Encryption Just Got Massively Hacked - Reason - December 15th, 2020
- How to Enable End-to-End Encryption in Google Messages - Lifehacker - December 15th, 2020
- Ransomware gangs are getting faster at encrypting networks. That will make them harder to stop - ZDNet - December 15th, 2020
- UK has not ordered 'backdoor access' to WhatsApp messages - but could issue injunction against Facebook's encryption plans - Sky News - December 15th, 2020
- From the bottom of the sea rose a piece of encrypted history. What were the Nazi Enigmas? - The Indian Express - December 15th, 2020
- Global Cloud Encryption Software Market To Witness Huge Gains Over 2020-2026 - The Courier - December 15th, 2020
- Google Messages End-to-End Encryption Guide: How It Works on Android - Tech Times - December 15th, 2020
- Facebooks encryption could prevent MI5 and police from stopping terror attacks and child abuse - Telegraph.co.uk - December 15th, 2020
- S'pore seizes $5.3m in illicit funds linked to Canadian network used by crime syndicates - The Straits Times - December 15th, 2020
- Encrypted messaging could increase child abuse cases, report warns - E&T Magazine - December 9th, 2020
- A Balanced DNS Information Protection Strategy: Minimize at Root, TLD; Encrypt When Needed Elsewhere - CircleID - December 9th, 2020
- Protecting consumer data is leading driver for encryption in Middle East: report - Gulf Business - December 9th, 2020
- Insights on the Cloud Encryption Software Market 2020-2024: COVID-19 Industry Analysis, Market Trends, Market Growth, Opportunities and Forecast 2024... - December 9th, 2020
- Commercial Encryption Software Market Trends, Growth, Analysis, Opportunities and Overview by 2026 - Murphy's Hockey Law - December 9th, 2020
- Does opening a 'back door' to encrypted communications create a whole new raft of problems? How can firms promise privacy if there is official access?... - December 9th, 2020
- Enigma encryption machine used by Nazis in World War II found on bottom of ocean - ABC News - December 9th, 2020
- Encryption Software Market 2020 | Latest Trend, Swot Analysis, Covid-19 Impact And Forecast - The Haitian-Caribbean News Network - December 9th, 2020
- Data Encryption Market Size with Business Opportunity, Challenges, Standardization, Competitive Intelligence and Regional Analysis - The... - December 9th, 2020
- COVID-19 Update: Global Encryption Software Market is Expected to Grow at a Healthy CAGR with Top players: Dell , Eset , Gemalto , IBM , Mcafee , etc.... - December 9th, 2020
- SSL-based threats remain prevalent and are becoming increasingly sophisticated. - The CyberWire - December 9th, 2020
- What Is the Signal Encryption Protocol? - WIRED - November 30th, 2020
- Data Protection | The Pros and Cons of End-to-End Encryption - DIGIT.FYI - November 30th, 2020
- Encryption Software Market Overview, Growth, Types, Applications, Dynamics, Companies, Regions, & Forecast to 2026 - The Haitian-Caribbean News... - November 30th, 2020
- Encryption Software Market to Witness Astonishing Growth by 2027 | Dell , Eset , Gemalto and more - Cheshire Media - November 30th, 2020
- EU targets end-to-end encryption tools after rise in terror attacks - DIGIT.FYI - November 30th, 2020
- European Legislators Move to Eliminate End-to-End Encryption in Messaging Services Following Terror Attacks - Digital Information World - November 30th, 2020
- Facebook urged to end encryption to help cops stop paedophiles using app - The Sun - November 30th, 2020
- Inside the French governments mission to develop an encrypted messaging platform - NS Tech - November 30th, 2020
- Hardware-based Full Disk Encryption Market Size, Key Manufacturers, Demand, Application And Opportunities By 2027 - The Haitian-Caribbean News Network - November 30th, 2020
- The tech and security backends that keep your data safe - Business MattersBusiness Matters - November 30th, 2020
- Encryption Software Market Expected to Boost the Global Industry Growth in the Near Future - Cheshire Media - November 30th, 2020
- Commercial Encryption Software Market Will Generate Record Revenue by 2025 - The Haitian-Caribbean News Network - November 30th, 2020
- Symmetric Encryption Algorithms: Live Long & Encrypt - Hashed Out by The SSL Store - Hashed Out by The SSL Store - November 24th, 2020
- Google plans to test end-to-end encryption in Android messages - TechCrunch - November 24th, 2020
- Google Messages Set to Roll Out End-to-End Encryption - Infosecurity Magazine - November 24th, 2020
- The EU's muddled approach to encryption - The Spectator US - November 24th, 2020
- AES Encryption Software Market 2020 Global Industry Size, Demand, Growth Analysis, Share, Revenue and Forecast 2022 - The Think Curiouser - November 24th, 2020
- How to recover data from a Mac with T2 or FileVault encryption and without a password - Macworld - November 24th, 2020
- Security flaws in smart doorbells may open the door to hackers - We Live Security - November 24th, 2020
- Document Encryption Software Market 2020 - Impact of COVID-19 Pandemic, Future Development, Top Manufacturers Analysis, Trends and Demand discussed in... - November 24th, 2020
- U.S. Hardware Encryption Market is expected to reach $259.12 billion by 2026 | CAGR 32.4% - WhaTech - November 24th, 2020
- Data Encryption Market: Global Industry Analysis, Size, Share, Trends, Growth and Forecast 2020 2026 - The Think Curiouser - November 24th, 2020
- Arrests and raids in Essex as police crackdown on encrypted criminal networks - Gazette - November 24th, 2020
- 2020 and Beyond: Homomorphic Encryption Market Trends and Outlook Study to 2027 - The Haitian-Caribbean News Network - November 24th, 2020
- US Department of Justice reignites the Battle to Break Encryption - Naked Security - October 17th, 2020
- Five Eyes Call for Tech World to Weaken Encryption - ClearanceJobs - ClearanceJobs - October 17th, 2020
Recent Comments