Protesters march during a rally against government and President Lukashenko in Minsk, Belarus, 25 October 2020. According to reports, over 100,000 opposition activists took to the streets against Belarusian government and President Alexander Lukashenko calling him to step down and demanding new presidential elections. EFE/EPA/STR
In the presidential elections held in August in Belarus, Alexander Lukashenko was re-elected with 80% of the votes, yet only a few believed the official account. This disparity between reality and the state claims instigated record numbers of people to pour into streets and demand repeated elections. The regime answered with a brutal crackdown on protesters and internet shutdowns to limit accessing and sharing information. But Belarusians found a way to communicate through an encrypted messaging service called Telegram, which played a vital role in organizing protesters and disseminating information horizontally without any formalized leadership. Encryption remains a central tool for bypassing state surveillance, especially in countries with repressive governments, but it does not come without lingering safety and security concerns.
When Belarusians called for transparent elections, they were met with extreme police violence and detentions, photos of which filled the media and caused international outrage. A parallel battle was happening in the digital realm through the blocking of independent media and opposition websites and intermittent internet blackouts. These restrictions aimed to cause a chilling effect on popular mobilisation and prevent the publishing of information and evidence about police abuse. Lukashenko blamed foreign interference for the internet shutdowns but experts pointed to the government that controls the state-owned Internet provider Beltelecom. NetBlocks reported that internet access in Belarus has been disrupted for several days, creating an information vacuum preventing citizens from establishing contact with each other and with the outside world. On the night of the elections results, the government shut down social networks, blocked VPNs, while encrypted traffic was also blocked on certain websites and two election platforms so that people could not observe news about possible violations. Later that day, the whole mobile internet was shut down and most of the media outlets were unavailable. None of the usual messaging services worked without additional tools to bypass the censorship. Viber, WhatsApp, and Messenger were inaccessible.
Belarusian authorities used a DPI method for blocking internet access, but also monitored real-time communications, examined unencrypted content, and implemented targeted blockings and shutdowns, enabling both invasive privacy breaches and mass censorship. Similar technology has been documented in other countries, notably China and Russia, where it has been reviewed as a tool for implementing the Sovereign Internet Law. It seems like government manipulation of the internet will remain a constant feature in the future.
Multiple crackdowns have brought to the spotlight the rights to freedom of peaceful assembly and of association in the digital space. According to a UN special rapporteur threats to digital expression and internet freedom are more pronounced than ever [] and internet shutdowns have emerged as a popular means of information control. This issue has been lately growing in importance as the restrictions amid the COVID-19 pandemic have made the shutdowns of online civic space ever more consequential for exercising civil and political rights. The Belarusian case of coping with state interference through encrypted messaging service can be instrumental for understanding similar scenarios across the globe.
In the post-Soviet country with a booming IT sector adding 6.4% GDP, harnessing the potential of the tech platforms has been central to the oppositions success. YouTube popularized Siarhei Tsikhanouski and subsequently his wife, who ran as the lead candidate against Lukashenko. Again, when social media platforms became mostly unavailable, protesters turned to Telegram. The anti-censorship tools used by Telegram through robust encryption allowed Belarusian citizens to continue connecting via the app and access its channels to share messages, warn protesters of police movements, and guide demonstrators to certain neighborhoods.
The diffuse coordination made it more difficult for the security services to repress the protesters. As a journalist summed up: This is the Telegram revolution. Its not the opposition, not the political parties. Everything is made by bloggers, influencers, and these Telegram channels. Lukashenko himself acknowledged Telegrams importance when announcing that all the various Telegram channels that control crowds in Minsk will go away. The protests show how critical encryption is to protect citizens human rights and safety. It also offers a model to be copied by activists in many other countries looking to evade government control. Similar channels have been used by popular movements in Catalonia and Hong Kong, proving that even though the context might be different, similar tactics can still be adopted.
Evidently, there are two sides to the liberating power of encryption. A key argument is that as much as it can be a tool for greater democracy, it can also foster illegal activities. Thinking of the democratic cause only, where the biggest Telegram channels are followed by millions of users, questions arise around self-organization, misinformation risks, and security threats to users. In a climate where traditional media cannot be trusted and oppositional media has been disabled, the platforms take on an unprecedented power over information. The biggest channel fuelling Belarusian protests is Nexta, with more than 2 million subscribers in a country of about 9.4 million people. Operating fast and without an editorial team, they do not have the time and the capacity to fact-check information. Misinformation can lead to higher risk-taking, such as when protesters wrongly heard that security forces joined them and approached the police chanting five cities have laid down their shields. They were later dragged into police vans and may have been among the thousands of detained Belarusians who faced torture and beatings.
Roman Protasevich, the chief editor of Nexta, offered a rare glimpse into the channels operational mindset when interviewed by the BBC: Do I feel responsible for what we publish? Only in terms of whether it will bring people closer to victory and the end of the dictatorship. Undoubtedly, a small team of six that works out of a community centre in Warsaw is short of resources to cross-check each piece of information when there are hundreds of items on the Telegram channel. But these and similar channels remain oblivious to alerting their followers that the information they publish has not been verified.
As the governments become increasingly repressive and tech-savvy in suppressing dissent, the popularity of encrypted platforms for news gathering and dissemination is here to stay. Encrypted communications fall beyond the reach of regulation, making them a strong alternative source. They will remain a key enabler of civic rights in undemocratic societies where the media is tightly controlled by the authorities. But with information power concentrated into the hands of a few, an additional layer of scrutiny should be placed on how they operate and whether or not they act responsibly towards citizens.
Nexta founder Stsyapan Putsila downplays their role saying that they do not force anyone to protest: We tell people that they can go out, defend their rights. Belarusians come out on their own. But he also added that Now we not only inform, but to some extent also coordinate people. For Nexta, the trade-off is worth the end goal of achieving democracy, and many of their followers would agree. But in the country hungry for uncensored information, this reluctance to take on a greater responsibility despite growing stakes creates additional risks for the protesters.
Excerpt from:
Did they crack the code? The importance of encryption for protest movements - OpenGlobalRights
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]