A multi-perspective view of Internet censorship in Myanmar
Maria Xynou
2021-11-11
In the wake of a military coup in February 2021,
Myanmar experienced unprecedented levels of internet censorship.
In response, we collaborated with CAIDA’s Internet Outage Detection and Analysis (IODA) team and
Myanmar ICT for Development Organization (MIDO) on publishing a research report
which documents a series of nightly internet outages
and the
blocking
of social media, Wikipedia, and circumvention tool sites in Myanmar
following the military coup.
In the months that followed, we continued to examine internet censorship
in Myanmar quite closely. We collaborated with
IODA, Kentik,
and other researchers from UC San Diego and the
University of Michigan to expand our analysis.
We used diverse datasets and measurement methods to offer a holistic
view into the censorship events in Myanmar that occurred since the coup
and show how internet censorship evolved between 1st February 2021
to 30th April 2021.
As an outcome, we produced a research paper (“A
multi-perspective view of Internet censorship in Myanmar”) which we
submitted to the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet (FOCI 2021).
Our paper was
published by FOCI
2021 and CAIDA’s Ramakrishna Padmanabhan
presented
our research findings at the workshop.
READ RESEARCH PAPER
Below we summarize the key findings of our paper.
Summary of findings
You can learn about the findings of our research paper by viewing
the following video produced by CAIDA’s
Ramakrishna Padmanabhan.
Internet outages
Following the military coup on 1st February 2021, Myanmar experienced a
series of internet outages
until 28th April 2021.
Source: Internet Outage Detection and Analysis (IODA), IODA Signals
for Myanmar, https://ioda.caida.org/ioda/dashboard#view=inspect&entity=country/MM&lastView=overview&from=1613125943&until=1615545143
In summary, these include:
Coup-day outage. On 1st February 2021, IODA data
shows
that Myanmar experienced a significant internet outage, starting
at 03:30 AM local time. Notably, there were several differences in
the extent to which ISPs were affected by the outage and in timing
patterns, suggesting the lack of an internet kill switch.
Weekend-after-coup outage. On 6th February 2021, IODA data
shows
that Myanmar experienced a 28-hour long internet outage that
affected most ISPs in Myanmar. The outage end-times were similar
across most ISPs, suggesting synchronization and improved
planning, coordination, and execution of the shutdown.
Nightly outages. Starting from the night of 14th February 2021,
Myanmar experienced nightly internet outages
(which affected most ISPs) for 72 nights, until 28th April 2021.
These outages began at the same time (01:00 local time) and lasted
8 hours for most nights. In contrast to the coup-day outage, the
nightly outages occurred in a highly synchronized manner, with
outages beginning and ending at identical times for most ISPs.
Cellular outages. As of 15th March 2021, Kentik traffic data
shows that cellular connectivity has been heavily restricted in
Myanmar. The cellular restrictions were ongoing, as of
mid-May 2021.
Starting from 4th February 2021 (3 days after the coup), ISPs in Myanmar
started blocking access to a number of websites
– including
Wikipedia,
social media (such as
facebook.com
and
twitter.com),
and circumvention tool websites. These blocks remain
ongoing.
We share these blocked websites through the following chart, which
summarizes OONI measurement findings
between February 2021 to April 2021.
Source: Blocking of websites in Myanmar from February 2021 to April
2021 based on OONI measurements.
In terms of censorship techniques, we found:
IP blocking became more prevalent after the coup. We primarily
observed IP-based blocking of websites, as most OONI measurements
(across ASes) show
that TCP connections to the resolved IP addresses failed (when
resolution succeeded in providing the right IP address for the
website). This censorship technique is primarily seen in OONI data
after the coup, as our analysis in Myanmar in 2020
showed that DNS based interference was previously more prevalent.
Collateral damage as a result of IP blocks. IP based blocking
can potentially lead to collateral damage, affecting the
accessibility of other domains hosted on a blocked IP address. We
found 2 such cases:
Domains hosted on the IP 172.217.194.121. This IP address
belongs to the Google hosting network and includes domains
such as www.snapchat.com
, www.getoutline.org
,
www.paganpride.org
, and www.privaterra.org
, all of
which presented TCP/IP anomalies between 24th-27th February
2021 (as illustrated in the above chart). This suggests that
some of these domains may have been blocked unintentionally
as a result of collateral damage.
Domains hosted on the IP 151.101.1.195. This address belongs
to the Fastly network and includes the domains
coronavirus.app
and getintra.org
, both of which
started to present TCP/IP anomalies on 2nd March 2021. Reverse
IP lookups indicate that the blocking of this IP may lead to
the blocking of more than 10,000 websites, showing the
severity of collateral damage due to IP blocking.
Ongoing DNS based tampering. Even though ISPs in Myanmar
primarily appear to implement IP-based blocks following the coup,
we continue to observe cases of DNS based interference as well.
Many ISPs in Myanmar showed evidence of confirmed DNS blocking
(as illustrated in the previous chart), usually resolving to an IP
address that hosted a blockpage. Some ISPs responded with
NXDOMAIN responses
for domains like www.facebook.com
. DNS interference was not
consistent inside an ISP; some DNS resolvers implemented DNS
blocking while others in the same ISP did not.
Overall, we found:
Censorship variance across networks. We found different websites blocked on different networks,
and different censorship methods used by different ISPs in
Myanmar. This suggests that internet censorship in Myanmar is
not centralized and that local ISPs may implement blocking at
their own discretion.
Non-deterministic censorship. OONI measurements show that IP
blocks are not implemented consistently, offering additional signs
that ISPs operate independently and (sometimes) arbitrarily.
Within the same AS, we do not observe IP blocking for all the
addresses associated with a domain. One cause of this
inconsistency could potentially be the result of ISPs using
incomplete addresslists for blocking. For example, OONI
measurements collected from the testing of facebook.com
on
Frontiir (AS58952) show the blocking of Facebook’s IP
157.240.15.35
, but not
of Facebook’s IP 31.13.64.35
.
Twitter hijack and collateral damage
On 5th February 2021 —the same day that Twitter was blocked in Myanmar—
Myanmar’s Campana Mythic (AS136168) announced the 104.244.42.0/24
prefix, belonging to Twitter. The proximity of this hijacking event in
time to the blocking of Twitter in other Myanmar ISPs suggests that the
original intent was to blackhole traffic to Twitter for users of this
Myanmar ISP. However, this route accidentally leaked to the global
internet, appearing as if AS136168 owned/hosted Twitter’s address space.
This accidental event offers additional evidence that providers used
various ways to perform IP-level blocking to censor domains.
Our analysis of BGP data collected by the Routeviews and RIPE RIS
projects shows the illegitimate route propagated (at least) to operators
in Singapore (AS4844, AS56300, AS24482, AS132132) and Vietnam (AS45903)
who received, accepted, and further propagated it. This resulted in
collateral damage for Twitter users outside Myanmar.
We quantify the extent of this collateral damage in the following graph,
which shows that a small volume of traffic from Kentik’s customers
outside Myanmar was directed towards the hijacker (AS136168) instead of
Twitter (AS13414).
Source: Collateral damage to Twitter users outside Myanmar as a
result of the BGP hijack event affecting Twitter’s address space. The
figure shows Twitter traffic observed by Kentik from different source
ASes (indicated by different colors) that was being routed towards
Campana Mythic (AS136168).
Conclusion
The following timeline summarizes the main internet censorship events
that we detected in Myanmar following the February 2021 military coup.
Image: Timeline of censorship events in Myanmar.
Collectively, these are among the most disruptive, long-lasting, and
widespread censorship events in recent times.
The censorship events in Myanmar reflect emerging patterns of politically inspired
censorship and offer insight into the ways in which authoritarian
regimes combine censorship approaches strategically to achieve their
immediate goals. The timing of censorship events in Myanmar coincided
with the military coup, which is
consistent with many other studies which have shown that internet
censorship is targeted during sensitive political time periods and
periods of potential power transitions, such as
elections
and large-scale protests.
The fact that the initial outages were implemented by the challenger
rather than the incumbent government suggests that internet censorship
during a coup attempt can increase the probability of a successful coup.
Conspirators in a coup may benefit from shutting communications quickly,
to prevent public or government coordination against their coup attempt.
Yet, the haphazard nature of the outages during the initial coup in
Myanmar may reflect the difficulty of the challenger in implementing
this censorship, and could be a reflection of their initial lack of
political control.
After consolidating power, the new junta in Myanmar began imposing
internet curfews, shutting down the internet during the night while
keeping it on in the day. Like physical curfews, regimes may implement
internet curfews to target organization of political dissent while
minimizing the impact on the economy, as many sectors require internet access
during the day.
While nightly outages in Myanmar have now ended, the ongoing blocking of social media and circumvention tool websites
(which has persisted since February 2021) may indicate a move
toward more selective methods of censorship. This shift is consistent
with a pattern in authoritarian regimes of engaging in targeted censorship to maximize political impact
while minimizing its cost.
We hope this
paper can
provide a template of combining internet measurements to provide a
broader understanding of digital strategy of autocrats, an effort that
could be scaled and replicated cross-nationally in future work.