Digital Threat Modeling Under Authoritarianism

Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling.

In security, threat modeling is the process of determining what security measures make sense in your particular situation. It’s a way to think about potential risks, possible defenses, and the costs of both. It’s how experts avoid being distracted by irrelevant risks or overburdened by undue costs.

We threat model all the time. We might decide to walk down one street instead of another, or use an internet VPN when browsing dubious sites. Perhaps we understand the risks in detail, but more likely we are relying on intuition or some trusted authority. But in the U.S. and elsewhere, the average person’s threat model is changing—specifically involving how we protect our personal information. Previously, most concern centered on corporate surveillance; companies like Google and Facebook engaging in digital surveillance to maximize their profit. Increasingly, however, many people are worried about government surveillance and how the government could weaponize personal data.

Since the beginning of this year, the Trump administration’s actions in this area have raised alarm bells: The Department of Government Efficiency (DOGE) took data from federal agencies, Palantir combined disparate streams of government data into a single system, and Immigration and Customs Enforcement (ICE) used social media posts as a reason to deny someone entry into the U.S.

These threats, and others posed by a techno-authoritarian regime, are vastly different from those presented by a corporate monopolistic regime—and different yet again in a society where both are working together. Contending with these new threats requires a different approach to personal digital devices, cloud services, social media, and data in general.

What Data Does the Government Already Have?

For years, most public attention has centered on the risks of tech companies gathering behavioral data. This is an enormous amount of data, generally used to predict and influence consumers’ future behavior—rather than as a means of uncovering our past. Although commercial data is highly intimate—such as knowledge of your precise location over the course of a year, or the contents of every Facebook post you have ever created—it’s not the same thing as tax returns, police records, unemployment insurance applications, or medical history.

The U.S. government holds extensive data about everyone living inside its borders, some of it very sensitive—and there’s not much that can be done about it. This information consists largely of facts that people are legally obligated to tell the government. The IRS has a lot of very sensitive data about personal finances. The Treasury Department has data about any money received from the government. The Office of Personnel Management has an enormous amount of detailed information about government employees—including the very personal form required to get a security clearance. The Census Bureau possesses vast data about everyone living in the U.S., including, for example, a database of real estate ownership in the country. The Department of Defense and the Bureau of Veterans Affairs have data about present and former members of the military, the Department of Homeland Security has travel information, and various agencies possess health records. And so on.

It is safe to assume that the government has—or will soon have—access to all of this government data. This sounds like a tautology, but in the past, the U.S. government largely followed the many laws limiting how those databases were used, especially regarding how they were shared, combined, and correlated. Under the second Trump administration, this no longer seems to be the case.

Augmenting Government Data with Corporate Data

The mechanisms of corporate surveillance haven’t gone away. Compute technology is constantly spying on its users—and that data is being used to influence us. Companies like Google and Meta are vast surveillance machines, and they use that data to fuel advertising. A smartphone is a portable surveillance device, constantly recording things like location and communication. Cars, and many other Internet of Things devices, do the same. Credit card companies, health insurers, internet retailers, and social media sites all have detailed data about you—and there is a vast industry that buys and sells this intimate data.

This isn’t news. What’s different in a techno-authoritarian regime is that this data is also shared with the government, either as a paid service or as demanded by local law. Amazon shares Ring doorbell data with the police. Flock, a company that collects license plate data from cars around the country, shares data with the police as well. And just as Chinese corporations share user data with the government and companies like Verizon shared calling records with the National Security Agency (NSA) after the Sept. 11 terrorist attacks, an authoritarian government will use this data as well.

Personal Targeting Using Data

The government has vast capabilities for targeted surveillance, both technically and legally. If a high-level figure is targeted by name, it is almost certain that the government can access their data. The government will use its investigatory powers to the fullest: It will go through government data, remotely hack phones and computers, spy on communications, and raid a home. It will compel third parties, like banks, cell providers, email providers, cloud storage services, and social media companies, to turn over data. To the extent those companies keep backups, the government will even be able to obtain deleted data.

This data can be used for prosecution—possibly selectively. This has been made evident in recent weeks, as the Trump administration personally targeted perceived enemies for “mortgage fraud.” This was a clear example of weaponization of data. Given all the data the government requires people to divulge, there will be something there to prosecute.

Although alarming, this sort of targeted attack doesn’t scale. As vast as the government’s information is and as powerful as its capabilities are, they are not infinite. They can be deployed against only a limited number of people. And most people will never be that high on the priorities list.

The Risks of Mass Surveillance

Mass surveillance is surveillance without specific targets. For most people, this is where the primary risks lie. Even if we’re not targeted by name, personal data could raise red flags, drawing unwanted scrutiny.

The risks here are twofold. First, mass surveillance could be used to single out people to harass or arrest: when they cross the border, show up at immigration hearings, attend a protest, are stopped by the police for speeding, or just as they’re living their normal lives. Second, mass surveillance could be used to threaten or blackmail. In the first case, the government is using that database to find a plausible excuse for its actions. In the second, it is looking for an actual infraction that it could selectively prosecute—or not.

Mitigating these risks is difficult, because it would require not interacting with either the government or corporations in everyday life—and living in the woods without any electronics isn’t realistic for most of us. Additionally, this strategy protects only future information; it does nothing to protect the information generated in the past. That said, going back and scrubbing social media accounts and cloud storage does have some value. Whether it’s right for you depends on your personal situation.

Opportunistic Use of Data

Beyond data given to third parties—either corporations or the government—there is also data users keep in their possession.This data may be stored on personal devices such as computers and phones or, more likely today, in some cloud service and accessible from those devices. Here, the risks are different: Some authority could confiscate your device and look through it.

This is not just speculative. There are many stories of ICE agents examining people’s phones and computers when they attempt to enter the U.S.: their emails, contact lists, documents, photos, browser history, and social media posts.

There are several different defenses you can deploy, presented from least to most extreme. First, you can scrub devices of potentially incriminating information, either as a matter of course or before entering a higher-risk situation. Second, you could consider deleting—even temporarily—social media and other apps so that someone with access to a device doesn’t get access to those accounts—this includes your contacts list. If a phone is swept up in a government raid, your contacts become their next targets.

Third, you could choose not to carry your device with you at all, opting instead for a burner phone without contacts, email access, and accounts, or go electronics-free entirely. This may sound extreme—and getting it right is hard—but I know many people today who have stripped-down computers and sanitized phones for international travel. At the same time, there are also stories of people being denied entry to the U.S. because they are carrying what is obviously a burner phone—or no phone at all.

Encryption Isn’t a Magic Bullet—But Use It Anyway

Encryption protects your data while it’s not being used, and your devices when they’re turned off. This doesn’t help if a border agent forces you to turn on your phone and computer. And it doesn’t protect metadata, which needs to be unencrypted for the system to function. This metadata can be extremely valuable. For example, Signal, WhatsApp, and iMessage all encrypt the contents of your text messages—the data—but information about who you are texting and when must remain unencrypted.

Also, if the NSA wants access to someone’s phone, it can get it. Encryption is no help against that sort of sophisticated targeted attack. But, again, most of us aren’t that important and even the NSA can target only so many people. What encryption safeguards against is mass surveillance.

I recommend Signal for text messages above all other apps. But if you are in a country where having Signal on a device is in itself incriminating, then use WhatsApp. Signal is better, but everyone has WhatsApp installed on their phones, so it doesn’t raise the same suspicion. Also, it’s a no-brainer to turn on your computer’s built-in encryption: BitLocker for Windows and FileVault for Macs.

On the subject of data and metadata, it’s worth noting that data poisoning doesn’t help nearly as much as you might think. That is, it doesn’t do much good to add hundreds of random strangers to an address book or bogus internet searches to a browser history to hide the real ones. Modern analysis tools can see through all of that.

Shifting Risks of Decentralization

This notion of individual targeting, and the inability of the government to do that at scale, starts to fail as the authoritarian system becomes more decentralized. After all, if repression comes from the top, it affects only senior government officials and people who people in power personally dislike. If it comes from the bottom, it affects everybody. But decentralization looks much like the events playing out with ICE harassing, detaining, and disappearing people—everyone has to fear it.

This can go much further. Imagine there is a government official assigned to your neighborhood, or your block, or your apartment building. It’s worth that person’s time to scrutinize everybody’s social media posts, email, and chat logs. For anyone in that situation, limiting what you do online is the only defense.

Being Innocent Won’t Protect You

This is vital to understand. Surveillance systems and sorting algorithms make mistakes. This is apparent in the fact that we are routinely served advertisements for products that don’t interest us at all. Those mistakes are relatively harmless—who cares about a poorly targeted ad?—but a similar mistake at an immigration hearing can get someone deported.

An authoritarian government doesn’t care. Mistakes are a feature and not a bug of authoritarian surveillance. If ICE targets only people it can go after legally, then everyone knows whether or not they need to fear ICE. If ICE occasionally makes mistakes by arresting Americans and deporting innocents, then everyone has to fear it. This is by design.

Effective Opposition Requires Being Online

For most people, phones are an essential part of daily life. If you leave yours at home when you attend a protest, you won’t be able to film police violence. Or coordinate with your friends and figure out where to meet. Or use a navigation app to get to the protest in the first place.

Threat modeling is all about trade-offs. Understanding yours depends not only on the technology and its capabilities but also on your personal goals. Are you trying to keep your head down and survive—or get out? Are you wanting to protest legally? Are you doing more, maybe throwing sand into the gears of an authoritarian government, or even engaging in active resistance? The more you are doing, the more technology you need—and the more technology will be used against you. There are no simple answers, only choices.

This essay was originally published in Lawfare.

Posted on September 26, 2025 at 7:04 AM27 Comments

Comments

Redacted September 26, 2025 9:30 AM

Excellent article. I would emphasis the need to prepare now for a more targeted surveillance future. As we know, the surveillance spyware industry is booming in the US. There will be more targeted surveillance as supply and demand dynamics bring down cost to target individuals.

KC September 26, 2025 9:34 AM

Wow. Let all that sink in.

Re: selective government prosecution, a targeted attack that doesn’t scale?

I am aware of a few people who actually seemed concerned about this.

A techno-authoritarian regime is a beast of a different color. Does anyone have a link to a repository of documented occurrences, to expand upon those covered here?

Wayne September 26, 2025 9:45 AM

There was an amusing quote in the Wired article from the CBP web page: “…It says that in the last year where data is available, “less than 0.01 percent” of international travelers had their devices searched.”

Considering the number of vacationers, conventioneers, etc. cancelling their plans to come to the USA, the number of Basic and Overall searches should be going down as it’s definite that the number of people coming in is certainly not going up!

Do you have another cite for the ‘people with obvious burner phones being denied entry’? I didn’t see that in the Wired article. We’re planning European travel next year, and as a U.S. citizen I’m not concerned about being barred from re-entry into the country, I’m trying to work out strategies to safeguard my iPhone information beyond signing out of email (not Apple) and my iCloud account. Not a FB or Twitter user, so no worries there fortunately.

Great piece, Bruce. Thank you!

Colin September 26, 2025 10:57 AM

Excellent article, as always.

Interesting that the government here in the UK has just announced a scheme of mandatory digital identities for all adult residents. I’m guessing for anyone with a digital driving licence or a passport it will make little difference to the data held, but it sounds like it will stop anyone making a personal decision to live “off grid”. I’d be interested in your thoughts on this, Bruce?

Perry Fellwock September 26, 2025 11:31 AM

Note the subtle assumption that there is no alternative to carry a smart phone: “If you leave yours at home when you attend a protest, you won’t be able to film police violence. Or coordinate with your friends and figure out where to meet. Or use a navigation app to get to the protest in the first place.”

You can buy a digital camera, you can use alternative means to communicate as armies have done for thousands of years, you can plan ahead, or buy a GPS device that receives only.

Someone is showing their colors.

lurker September 26, 2025 3:27 PM

“Everybody has Whatsapp on their phone.”

I don’t. I should be afraid.

And like @Wayne, I couldn’t find burner phones being refused entry to US in that Wired article.

Anonymous September 26, 2025 4:42 PM

At the same time, there are also stories of people being denied entry to the U.S. because they are carrying what is obviously a burner phone—or no phone at all.

Verificaiton failed; that Wired article mentions people being denied entry based on real contents on their phone, not on the basis that they have burner phones or a lack of a phone.

Being Innocent Won’t Protect You
algorithms make mistakes

An comparably important problem is bad laws, e.g.
– persecution of homeless people basically for being homeless;
– war on drugs (government shouldn’t tell anyone what they can/cannot put into their bodies);
– permanently registering an individual as a sex-offender for having a sane sexual relationship with an “underage” other, where the upper limit of “underage” nowadays is 16-18, and increases every now and then (18-20 within a decade).

And, of course, oppressive operation of the state outside of legal code, i.e. discrimination against those critical of the government.

sorting algorithms make mistakes.

No, they don’t, unless they’re mis-programmed. You probably meant to say “detection algorithms” or “classification algorithms”. Schneier, have you started using AI-generated slop to draft?

Anon September 26, 2025 5:11 PM

“Although alarming, this sort of targeted attack doesn’t scale. As vast as the government’s information is and as powerful as its capabilities are, they are not infinite. They can be deployed against only a limited number of people.”

At some point in the not too distant future, it will scale with the use of AI (both the surveillance and the law enforcement.)

Clive Robinson September 26, 2025 9:07 PM

@ Perry Fellwock,

With regards,

“Someone is showing their colors.”

About,

“Note the subtle assumption that there is no alternative to carry a smart phone”

It actually rather depends on the demographic.

Today I had reason to be pedestrian in a UK University town and major shopping center. The age range was mostly on the 20ish for individuals.

If I said that so many had their smart phone not just in their hand but actively being used so the were a “clear and present danger”. Not just to themselves but others myself included.

In about an hour I was walked into 5 times by such idiots… I walk with crutches and not particularly fast yet they just walked into me. Two when I had seen them coming and actually stopped. They just walked into me and I’m not exactly small and I towered over them… Their obvious “self entitled” view in all but one case was that even though I was stationary and by no means invisable it was my fault not theirs.

The exception was a Korean girl who might well have been a tourist from her accent who apologized.

As for the others and the near two dozen near misses, if these are “fine examples of English Youth” then we really are in trouble…

The point is though mobile phone use, appears to be not just ubiquitous but a real necessity these days with those under a third of their expected life time (currently 84 in the area).

As someone who is old enough that they helped develop the first UK mobile phones when they were very nearly half their current age… I find the change as some one who has been described as an “expert technologist” nearly unbelievable.

But not quite as unbelievable as this “Famous Cultural Landmark”,

https://secretldn.com/telephone-box-installation-kingston/

That daily has the ironic sight of tourists photographing it with their mobile phones. Some not even realising what they were originally for but just because it’s iconic enough as an image to be sold on postcards even in Edinburgh which is the capital of another country…

Winter September 27, 2025 4:54 AM

I think the central message of the OP is:

Effective Opposition Requires Being Online

It is indeed the aim of general surveillance (panopticon) to terrorize the population into obedience and prevent organized opposition.

ICE’s random injustice is intended. Every colored person in the US should live in fear so they withdraw from public life. Just as in the age of Jim Crow.

Whenever a protective measure drives you out of participating in the opposition, the objective of the dictatorship has been achieved.

Stefan Claas September 27, 2025 6:19 PM

With all due respect, Signal is ok for the usual blah blah with a smartphone, but can’t protect you against Pegasus or FinSpy etc.

Fore secure short communications, one better uses a modern offline
GPD MicroPC with Red Phone[1] installed and an old Nokia 3310 etc,

[1] https://tilde.club/~pollux/

Dancing On Thin Ice September 28, 2025 12:20 AM

Looking forward to more unrestricted articles like this about governent violations of security best practices while Bruce is teaching in Toronto.

Not Him Again September 28, 2025 12:30 AM

“Being Innocent Won’t Protect You” from an impersonation attack either. False entries placed into one or more private databases may propagate to national or international dossiers. Attackers may configure devices and open accounts that appear to belong to you. Authorities at all levels will believe anything in your dossier–manifestos, hate-speech purportedly extracted from encrypted apps, ghost gun parts orders, Google searches for drug recipies, AI-generated online grooming, call/texts/letters/packages that harass others–literally anything. This is especially dangerous if authorities are accessing your dossier illegally, since they will not want to expose their misuse by verifying it outside the system.

There’s no hiding. It is inconceivable that AI is not currently combing our dossiers for anomalies. Your unhackable phone puts a target on your back. I’d honestly be disappointed if the redphone wasn’t a 5-Eyes project like Crypto AG or ANOM. I assume that we have automated processes to continuously surveil, probe, pwn, and update threat assessments for everyone on a hinky list.

“Personal Targeting Using Data” scales because of data consolidation, reliance on private platforms for income and influence, and the chilling effect. Truckers’ bank accounts were frozen for protesting in Canada. https://www.cato.org/blog/emergencies-act-after-two-years. Similarly, NGOs and governments identified people that criticized COVID measures and got them deplatformed.

John September 28, 2025 4:13 AM

The description of an official assigned to each neighbourhood or each apartment block is very relevant. It is in existence already in China.

Of course “We’re different, we aren’t China”! But the article is about ways and means. The Chinese instance does show an example of decentralised authoritarian monitoring. It is real and it is therefore entirely possible.

Gert-Jan September 29, 2025 7:22 AM

this sort of targeted attack doesn’t scale

There may be limits, but soon this will scale enough. You only need to scale to a small percentage of the population to effectively control all.

The reason it will scale is AI and automation. Soon, an operator will simply start the AI platform and an army of bots will automatically put taps on a massive amount of “dangerous” individuals and later go through all their communications and publications. They may not (yet) be able to issue a warrant automatically, but politicians are stupid enough to allow that in the future as well.

Soon, you won’t be able to hide in a crowd. Of course you shouldn’t have to hide in a crowd, but this is the reason you shouldn’t simply dismiss the damage that can happen if you are individually targeted.

Jackson96 September 29, 2025 10:50 AM

Winter • September 27, 2025 4:54 AM

Just as in the age of Jim Crow.

So delighted to hear you call out a member of your party.

Rontea September 29, 2025 10:58 AM

Each step to mitigate surveillance risk—whether through encryption, minimizing data sharing, or avoiding certain platforms—comes with trade-offs that impact convenience, accessibility, and even security in other ways. Navigating this landscape requires careful consideration of which compromises we are willing to accept.

ResearcherZero September 30, 2025 1:20 AM

Security spending has grown by more than 12% globally and military spending hit a record $2.7 trillion in 2024. Governments have diverted funding from aid to arms, resulting in the collapse of arms control measures. Contracts for arms companies and the value of their stock has surged. The intensity of wars, tensions between rivals and global insecurity has only grown as result. But the profit margins are looking good which is great news for CEOs.

The amount spent on arms is around 13 times greater than what the OECD spends globally on humanitarian assistance, 750 times greater than entire United Nations annual operating costs and around 10 times more than what it what it would cost to mitigate the effects of homelessness, hunger, health, education, infrastructure and environmental degradation.

‘https://greekreporter.com/2025/09/11/military-spending-worldwide-trillion-biggest-spenders/

A 1,500% increase in threat assessments for the world’s largest private security provider!
https://www.forbes.com/sites/monicahunter-hart/2025/05/09/how-the-ultra-wealthy-are-protecting-themselves-against-arson-attacks-kidnapping-and-worse/

An inside look at ‘security theater’ and industry of selling fear…
https://www.townandcountrymag.com/society/money-and-power/a63664735/elite-private-security-executive-protection-explained/

ResearcherZero September 30, 2025 2:00 AM

@ALL

Surveillance is a long running practice by governments that has been operating for centuries. Today technology makes it far easier to automate, but it has always been there listening on the wire and the air waves. There are measures you can take to mitigate it.

Today there are ‘secure phones’ and alternative operating systems which allow you to turn of, disable or control all of the features of a modern smart phone. Such alternative mobile operating systems allow you to control all of the services and features, including the microphone, camera, location, networks, power cycle and also add extra control over the many security implementations in the various different areas of the operating system. Each of the phone’s features can be set to only enable following an authorization prompt which can be set to require a password, pin or biometric authorization. Apps can be hidden and require authorization to allow access to them, or any setting that can make system changes.

Alphanumeric passwords and having to enable features to use them provides better security.

Inconveniences and trade offs – often with very simple solutions if you take the time.

You can buy a burner after you cross over a border, then insert a burner sim. If smartphones are not to your taste, many cheap burners also have removable batteries.

You can also pop your smart/dumb phone in a Faraday bag which will block all of the radio emissions. Cheap and affordable. Radio silence – just as professionals have used for years.

Clive Robinson September 30, 2025 5:46 AM

@ ResearcherZero,

Re,

“Cheap and affordable. Radio silence – just as professionals have used for years.”

The problem is you will be forced to cary a smart phone…

Look into what the Swiss have just foolishly voted for.

It’s an everything on your phone solution for “convenience”…

Douglas Adams in one of his later hitchhiker’s books had a chapter on the stupidity of “everything on a device”. He had “Ford” steal on from an executive and thus impersonate the person amongst other things.

Douglas understood the implications of the seduction of a convenient device that everyone else sees as you, far better than the majority of Swiss Nationals. I’m sure he’s laughing like a barrel about it.

As it looks like I’m destined to live through similar stupidity due to the arch-evil that is Tony Blair and proto-criminal family, I’m not laughing at all.

Oh Tony has just pooped up wittering around Trump and Netanyahu,

https://www.independent.co.uk/news/world/middle-east/trump-gaza-peace-plan-blair-israel-netanyahu-live-updates-b2836350.html

It’s a form of madness I would have thought the world would realise can only end in disaster, bloodshed and tears down the future centuries.

Celos October 1, 2025 12:58 PM

I think this is about the right time to write that article. It is also time to get the history books and learn from them. Again. Only this time the oppressors have technology like never before.

ResearcherZero October 1, 2025 11:34 PM

@Celos

Pretty freaky technology too which has allowed the expansion of a profit driven authoritarian surveillance and censorship industry with enormous granular power.

Big Tech has profited by assisting this global expansion of censorship and surveillance.

China is gaining reach and influence as the United States retreats from global initatives.

‘https://www.nytimes.com/2025/09/19/world/asia/china-united-nations-trump.html

Beijing says that it will use the opportunity to reshape global norms in its interests.
https://ca.news.yahoo.com/un-speech-beijing-makes-clear-222203957.html

Cyber Narrator, TSG Galaxy and Tiangou Secure Gateway

Chinese solutions for digital authoritarianism are laying the foundation for a federated system of internet governance.
Identify devices, operating systems and software running on devices to monitor entire groups, social circles or individuals.
Tune to, or geofence individual users. Generate a social score which can be used to disconnect individual users from the internet.

  • “Cyber Narrator is a powerful tool capable of tracking network traffic at the individual customer level and can identify the geographic location of mobile subscribers in real time by linking their activity to specific cell identifiers (cell IDs). The system also allows the government client to see aggregated network traffic. Cyber Narrator can thus be used to monitor groups of internet users in specific geographical areas, such as during protests or large crowded events.”
  • “Websketch discovers connected devices, such as webcams, routers, and servers, by scanning the internet for their unique identifiers.”
  • “TSG Galaxy is Geedge Networks’ ETL (Extract, Transform, Load) data warehouse solution designed for internet-scale mass surveillance, collecting and aggregating a significant amount of data about all internet users and data sent over the internet in a client country.”
  • “TSG Galaxy is Geedge Networks’ ETL (Extract, Transform, Load) data warehouse solution designed for internet-scale mass surveillance, collecting and aggregating a significant amount of data about all internet users and data sent over the internet in a client country.”

https://interseclab.org/wp-content/uploads/2025/09/The-Internet-Coup_September2025.pdf

ResearcherZero October 1, 2025 11:44 PM

edit

  • *”Tiangou Secure Gateway (TSG) is the flagship product offered by Geedge Networks, functioning as a carrier-grade or national firewall and traffic management solution with comprehensive capabilities that are comparable to the Great Firewall of China (GFW).”

This product provides the full suite with circumvention blocking, malware implanting capability, DDoS, scoring, tracking …and more.

ResearcherZero October 2, 2025 12:22 AM

Unfortunately if your communications are cut you cannot contact emergency services or local businesses and other services that rely on communications and internet may cease operation.

The Taliban reportedly cut communications in Afghanistan, though the details of why remain unclear. The Taliban is yet to formally comment on why internet and communications appear to have been deliberately cut. They had made earlier threats to do it over claims of “vice and immorality”, but they now say that they do not know the cause of the incident.

In some locations this may lead to your death if you require urgent medical assistance. You also cannot access the Women’s Weekly recopies if you need to cook lamb for the Taliban.

‘https://www.sbs.com.au/news/article/afghanistan-internet-blackout-after-taliban-cuts-internet/1rtgkw8ml

The Taliban also claimed that it never happened and that they did not cut off the internet.
https://www.ndtv.com/world-news/taliban-government-in-afghanistan-rejects-reports-of-nationwide-internet-ban-9378259

Banks, airlines, mobile communications and other services stopped after access was cut.
https://www.cbsnews.com/news/afghanistan-internet-returns-taliban-2-day-web-blackout-telecom/

JTC October 16, 2025 2:08 PM

I believe this is one of your most important pieces, at least as long as I have been reading your emails/website. It is said to see a country once dedicated to liberty and whose only contact was with the Post Office become an authoritarian state, always sucking up every bit of data on everyone. This will not end well. Without a decent third-party, voting does nothing when both parties are together in this.

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.