Internet Shutdowns

Myanmar

2 February, 2021 00:00 (1377 days) - active

Local Impact

On 1st February 2021, the military in Myanmar carried out a coup d’etat, seizing power and detaining the country’s State Counsellor (equivalent to a prime minister) and other democratically elected leaders. There was an initial outage during the military takeover, followed by further mandated shutdowns and blockage. This blocking continues today.

Data and Analysis

Starting from 4th February 2021 (3 days after the coup), OONI data shows that ISPs in Myanmar started blocking access to a number of websites – including Wikipedia, social media (such as Facebook, Instagram, and Twitter), and circumvention tool websites

These blocks remain ongoing on some networks.

The following chart aggregates OONI measurement coverage from the testing of websites found blocked in Myanmar between February 2021 to April 2021 (excluding numerous other ongoing blocks which started before the coup).

Source: Blocking of websites in Myanmar from February 2021 to April 2021 based on OONI measurements.

Based on the analysis of OONI data collected from Myanmar, OONI found:

  • IP blocking became more prevalent after the coup. We primarily observed IP-based blocking of websites, as most OONI measurements (across ASes) show that TCP connections to the resolved IP addresses failed (when resolution succeeded in providing the right IP address for the website). This censorship technique is primarily seen in OONI data after the coup, as our analysis in Myanmar in 2020 showed that DNS based interference was previously more prevalent.
  • Collateral damage as a result of IP blocks. IP based blocking can potentially lead to collateral damage, affecting the accessibility of other domains hosted on a blocked IP address. We found 2 such cases:
    • Domains hosted on the IP 172.217.194.121. This IP address belongs to the Google hosting network and includes domains such as www.snapchat.com, www.getoutline.org, www.paganpride.org, and www.privaterra.org, all of which presented TCP/IP anomalies between 24th-27th February 2021 (as illustrated in the above chart). This suggests that some of these domains may have been blocked unintentionally as a result of collateral damage.
    • Domains hosted on the IP 151.101.1.195. This address belongs to the Fastly network and includes the domains coronavirus.app and getintra.org, both of which started to present TCP/IP anomalies on 2nd March 2021. Reverse IP lookups indicate that the blocking of this IP may lead to the blocking of more than 10,000 websites, showing the severity of collateral damage due to IP blocking.
  • Ongoing DNS based tampering. Even though ISPs in Myanmar primarily appear to implement IP-based blocks following the coup, we continue to observe cases of DNS based interference as well. Many ISPs in Myanmar showed evidence of confirmed DNS blocking (as illustrated in the previous chart), usually resolving to an IP address that hosted a blockpage. Some ISPs responded with NXDOMAIN responses for domains like www.facebook.com. DNS interference was not consistent inside an ISP; some DNS resolvers implemented DNS blocking while others in the same ISP did not.

Overall, OONI found:

  • Censorship variance across networks. We found different websites blocked on different networks, and different censorship methods used by different ISPs in Myanmar. This suggests that internet censorship in Myanmar is not centralized and that local ISPs may implement blocking at their own discretion.
  • Non-deterministic censorship. OONI measurements show that IP blocks are not implemented consistently, offering additional signs that ISPs operate independently and (sometimes) arbitrarily. Within the same AS, we do not observe IP blocking for all the addresses associated with a domain. One cause of this inconsistency could potentially be the result of ISPs using incomplete addresslists for blocking. For example, OONI measurements collected from the testing of facebook.com on Frontiir (AS58952) show the blocking of Facebook’s IP 157.240.15.35, but not of Facebook’s IP 31.13.64.35.

Over two years later the blocking of some sites continues, as shown in this chart from OONI:

May 2023 Update

Chart from OONI showing continued blocking of Twitter, Facebook, and Instagram in 2023.

October 2024 Update

As we are limiting our focus on service blocking, we are closing this incident page.

Conversations

 

https://www.telenor.com/directive-to-block-social-media-service/

Myanmar’s new military government orders to temporarily block internet access

https://twitter.com/moewendy/status/1357727688723603459?s=21

 

 

 

 

 

Economic Impact
USD $271,352,429
Shutdown Type
Service Blocking
Affected Services
Facebook, Twitter, Instagram