Belarus Government Shut Off The Internet During Elections

In the aftermath of a contested election Belarus apparently shut down most Internet access in the country and the long-time incumbent president Alexander Lukashenko has returned to office with apparently eighty percent of the vote. Belarusians experienced Internet blackouts and the major social networks, instant messengers, and search engines have been inaccessible, while the rest of the world has been unable to open websites hosted on Belarus’s national domain. 

Reports that Belarus might disable Internet access during the presidential race first started appearing several days before the presidential election concluded.  Major media outlets reported similar information, citing anonymous sources claiming that the blackouts would begin late on August 8, one day before the end of voting.

Outside Belarus, Internet users started having problems accessing websites hosted on the .by domain, which belongs to Belarus. Access to other online resources hosted on servers in Belarus also began to falter. In remarks to the press, Alexander Lukashenko directly blamed the country’s Internet blackouts on hostile foreign actors. “Our specialists are now determining where this shutdown is coming from. So if the Internet is working poorly, that’s not our doing but an initiative from abroad,” the president said. 

Officials at RIPE NCC (the Regional Internet Registry for Europe, the Middle East, and parts of Central Asia) have expressed doubts about Lukashenko’s version of events. Externally shutting down Internet access is extremely difficult in a technical sense and it’s virtually impossible to maintain for an extended period of time.

  • In May, the popular opposition blogger Syarhei Tsikhanouski who had declared his intention to run for president was arrested. 
  • A second contender for the presidency, Viktor Babarika, was arrested on charges of criminal conspiracy. A third, Valery Tsepkalo, fled the country fearing political persecution. 
  • In mid-July, Sviatlana Tsikhanouskaya, Tsikhanouski's wife, registered as a presidential candidate in his stead. If elected, she promised to rule for six months and hold free and fair elections; she drew crowds of thousands and inspired a nationwide protest movement.

When election day came on August 10 ther were numerous reports of ballot stuffing and falsification and  when the country's electoral commission reported that Lukashenka had won 80.3 percent of the vote and Tsikhanouskaya 9.9 percent, opposition supporters widely suspect electoral fraud.

Widespread protests followed the election, which saw authoritarian President Alexander Lukashenko win his sixth consecutive term.

As of the morning of August 10, Belarusian Internet users were still experiencing difficulties getting online. The country's three largest telecom providers (A1, Life, and MTS) all apologised for outages caused by “reasons outside our control,” reported the website Tut.By, a popular search engine and news aggregator.

This interruption did not come as a surprise. On July 19, mobile Internet in Minsk was blocked for a short period during a large rally at which Tsikhanouskaya was present.

Meduza:          Global Voices:       The Cyberwire:      Fox News

You Might Also Read:

Disconnected: Russia Tests Its Own Internet:

 

« Cybercrime In Britain Does Serious Harm
The Digital Revolution Is Evolving »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

Cybertrust Japan

Cybertrust Japan

Cybertrust Japan provides a comprehensive security certification and digital authentication service, enabling customers to build and manage highly secure IT infrastructures.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Compumatica

Compumatica

Compumatica is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email encryption.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

Deepnet Security

Deepnet Security

Deepnet Security is a leading vendor in Multi-Factor Authentication (MFA) and Identity & Access Management (IAM).

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

Crayon

Crayon

Crayon is a customer-centric innovation and IT services company. We provide guidance on the best solutions for our clients’ business needs and budget with software, cloud, AI and big data.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.