
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 08 Apr 2026 14:54:04 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Cable cuts, storms, and DNS: a look at Internet disruptions in Q4 2025]]></title>
            <link>https://blog.cloudflare.com/q4-2025-internet-disruption-summary/</link>
            <pubDate>Mon, 26 Jan 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[ The last quarter of 2025 brought several notable disruptions to Internet connectivity. Cloudflare Radar data reveals the impact of cable cuts, power outages, extreme weather, technical problems, and more. ]]></description>
            <content:encoded><![CDATA[ <p>In 2025, we <a href="https://radar.cloudflare.com/outage-center?dateStart=2025-01-01&amp;dateEnd=2025-12-31"><u>observed over 180 Internet disruptions</u></a> spurred by a variety of causes – some were brief and partial, while others were complete outages lasting for days. In the fourth quarter, we tracked only a single <a href="#government-directed"><u>government-directed</u></a> Internet shutdown, but multiple <a href="#cable-cuts"><u>cable cuts</u></a> wreaked havoc on connectivity in several countries. <a href="#power-outages"><u>Power outages</u></a> and <a href="#weather"><u>extreme weather</u></a> disrupted Internet services in multiple places, and the ongoing <a href="#military-action"><u>conflict</u></a> in Ukraine impacted connectivity there as well. As always, a number of the disruptions we observed were due to <a href="#known-or-unspecified-technical-problems"><u>technical problems</u></a> – with some acknowledged by the relevant providers, while others had unknown causes. In addition, incidents at several hyperscaler <a href="#cloud-platforms"><u>cloud platforms</u></a> and <a href="#cloudflare"><u>Cloudflare</u></a> impacted the availability of websites and applications.  </p><p>This post is intended as a summary overview of observed and confirmed disruptions and is not an exhaustive or complete list of issues that have occurred during the quarter. These anomalies are detected through significant deviations from expected traffic patterns observed across our network. Check out the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a> for a full list of verified anomalies and confirmed outages. </p>
    <div>
      <h2>Government-directed</h2>
      <a href="#government-directed">
        
      </a>
    </div>
    
    <div>
      <h3>Tanzania</h3>
      <a href="#tanzania">
        
      </a>
    </div>
    <p><a href="https://bsky.app/profile/radar.cloudflare.com/post/3m4df6i7hjk25"><u>The Internet was shut down in Tanzania</u></a> on October 29 as <a href="https://www.theguardian.com/world/2025/oct/29/tanzania-election-president-samia-suluhu-hassan-poised-to-retain-power"><u>violent protests</u></a> took place during the country’s presidential election. Traffic initially fell around 12:30 local time (09:30 UTC), dropping more than 90% lower than the previous week. The disruption lasted approximately 26 hours, with <a href="https://bsky.app/profile/radar.cloudflare.com/post/3m4qec7zdnt2u"><u>traffic beginning to return</u></a> around 14:30 local time (11:30 UTC) on October 30. However, that restoration <a href="https://bsky.app/profile/radar.cloudflare.com/post/3m4gjngzck72u"><u>proved to be quite brief</u></a>, with a significant decrease in traffic occurring around 16:15 local time (13:15 UTC), approximately two hours after it returned. This second near-complete outage lasted until November 3, <a href="https://bsky.app/profile/radar.cloudflare.com/post/3m4g47vasfm2u"><u>when traffic aggressively returned</u></a> after 17:00 local time (14:00 UTC). Nominal drops in <a href="https://radar.cloudflare.com/routing/tz?dateStart=2025-10-29&amp;dateEnd=2025-11-04#announced-ip-address-space"><u>announced IPv4 and IPv6 address space</u></a> were also observed during the shutdown, but there was never a complete loss of announcements, which would have signified a total disconnection of the country from the Internet. (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>Autonomous systems</u></a> announce IP address space to other Internet providers, letting them know what blocks of IP addresses they are responsible for.)</p><p>Tanzania’s president later <a href="https://apnews.com/article/tanzania-samia-suluhu-hassan-internet-shutdown-october-election-1ec66b897e7809865d8971699a7284e0"><u>expressed sympathy</u></a> for the members of the diplomatic community and foreigners residing in the country regarding the impact of the Internet shutdown. Internet and social media services were also <a href="https://www.dw.com/en/tanzania-internet-slowdown-comes-at-a-high-cost/a-55512732"><u>restricted in 2020</u></a> ahead of the country’s general elections.</p>
    <div>
      <h2>Cable cuts</h2>
      <a href="#cable-cuts">
        
      </a>
    </div>
    
    <div>
      <h3>Digicel Haiti</h3>
      <a href="#digicel-haiti">
        
      </a>
    </div>
    <p>Digicel Haiti is unfortunately no stranger to Internet disruptions caused by cable cuts, and the network experienced two more such incidents during the fourth quarter. On October 16, traffic from <a href="https://radar.cloudflare.com/as27653"><u>Digicel Haiti (AS27653)</u></a> began to fall at 14:30 local time (18:30 UTC), reaching near zero at 16:00 local time (20:00 UTC). A translated <a href="https://x.com/jpbrun30/status/1978920959089230003"><u>X post from the company’s Director General</u></a> noted: “<i>We advise our clientele that @DigicelHT is experiencing 2 cuts on its international fiber optic infrastructure.</i>” Traffic began to recover after 17:00 local time (21:00 UTC), and reached expected levels within the following hour. At 17:33 local time (21:34 UTC), the Director General <a href="https://x.com/jpbrun30/status/1978937426841063504"><u>posted</u></a> that “<i>the first fiber on the international infrastructure has been repaired” </i>and service had been restored. </p><p>On November 25, another translated <a href="https://x.com/jpbrun30/status/1993283730467963345"><u>X post from the provider’s Director General</u></a> stated that its “<i>international optical fiber infrastructure on National Road 1</i>” had been cut. We observed traffic dropping on Digicel’s network approximately an hour earlier, with a complete outage observed between 02:00 - 08:00 local time (07:00 - 13:00 UTC). A <a href="https://x.com/jpbrun30/status/1993309357438910484"><u>follow-on X post</u></a> at 08:22 local time (13:22 UTC) stated that all services had been restored.</p>
    <div>
      <h3>Cybernet/StormFiber (Pakistan)</h3>
      <a href="#cybernet-stormfiber-pakistan">
        
      </a>
    </div>
    <p>At 17:30 local time (12:30 UTC) on October 20, Internet traffic for <a href="https://radar.cloudflare.com/as9541"><u>Cybernet/StormFiber (AS9541)</u></a> dropped sharply, falling to a level approximately 50% the same time a week prior. At the same time, the network’s announced IPv4 address space dropped by over a third. The cause of these shifts was damage to the <a href="https://www.submarinecablemap.com/submarine-cable/peace-cable"><u>PEACE</u></a> submarine cable, which suffered a cut in the Red Sea near Sudan. </p><p>PEACE is one of several submarine cable systems (including <a href="https://www.submarinecablemap.com/submarine-cable/imewe"><u>IMEWE</u></a> and <a href="https://www.submarinecablemap.com/submarine-cable/seamewe-4"><u>SEA-ME-WE-4</u></a>) that carry international Internet traffic for Pakistani providers. The provider <a href="https://profit.pakistantoday.com.pk/2025/10/24/stormfiber-pledges-full-restoration-by-monday-after-weeklong-internet-disruptions/"><u>pledged to fully restore service</u></a> by October 27, but traffic and announced IPv4 address space had recovered to near expected levels by around 02:00 local time on October 21 (21:00 UTC on October 20).</p>
<p>


    </p><div>
      <h3>Camtel, MTN Cameroon, Orange Cameroun</h3>
      <a href="#camtel-mtn-cameroon-orange-cameroun">
        
      </a>
    </div>
    <p>Unusual traffic patterns observed across multiple Internet providers in Cameroon on October 23 were reportedly caused by problems on the <a href="https://www.submarinecablemap.com/submarine-cable/west-africa-cable-system-wacs"><u>WACS (West Africa Cable System)</u></a> submarine cable, which connects countries along the west coast of Africa to Portugal. </p><p>A (translated) <a href="https://teleasu.tv/internet-graves-perturbations-observees-ce-jeudi-23-octobre-2025/"><u>published report</u></a> stated that MTN informed subscribers that “<i>following an incident on the WACS fiber optic cable, Internet service is temporarily disrupted</i>” and Orange Cameroun informed subscribers that “<i>due to an incident on the international access fiber, Internet service is disrupted.</i>” An <a href="https://x.com/Camtelonline/status/1981424170316464390"><u>X post from Camtel</u></a> stated “<i>Cameroon Telecommunications (CAMTEL) wishes to inform the public that a technical incident involving WACS cable equipment in Batoke (LIMBE) occurred in the early hours of 23 October 2025, causing Internet connectivity disruptions throughout the country.</i>” </p><p>Traffic across the impacted providers originally fell just at around  05:00 local time (04:00 UTC) before recovering to expected levels around 22:00 local time (21:00 UTC). Traffic across these networks was quite volatile during the day, dropping 90-99% at times. It isn’t clear what caused the visible spikiness in the traffic pattern—possibly attempts to shift Internet traffic to <a href="https://www.submarinecablemap.com/country/cameroon"><u>other submarine cable systems that connect to Cameroon</u></a>. Announced IP address space from <a href="https://radar.cloudflare.com/routing/as30992?dateStart=2025-10-23&amp;dateEnd=2025-10-23#announced-ip-address-space"><u>MTN Cameroon</u></a> and <a href="https://radar.cloudflare.com/routing/as36912?dateStart=2025-10-23&amp;dateEnd=2025-10-23#announced-ip-address-space"><u>Orange Cameroon</u></a> dropped during this period as well, although <a href="https://radar.cloudflare.com/routing/as15964?dateStart=2025-10-23&amp;dateEnd=2025-10-23#announced-ip-address-space"><u>Camtel’s</u></a> announced IP address space did not change.</p><p>Connectivity in the <a href="https://radar.cloudflare.com/cf"><u>Central African Republic</u></a> and <a href="https://radar.cloudflare.com/cg"><u>Republic of Congo</u></a> was also reportedly impacted by the WACS issues.</p>



    <div>
      <h3>Claro Dominicana</h3>
      <a href="#claro-dominicana">
        
      </a>
    </div>
    <p>On December 9, we saw traffic from <a href="https://radar.cloudflare.com/as6400"><u>Claro Dominicana (AS6400)</u></a>, an Internet provider in the Dominican Republic, drop sharply around 12:15 local time (16:15 UTC). Traffic levels fell again around 14:15 local time (18:15 UTC), bottoming out 77% lower than the previous week before quickly returning to expected levels. The connectivity disruption was likely caused by two fiber optic outages, as an <a href="https://x.com/ClaroRD/status/1998468046311002183"><u>X post from the provider</u></a> during the outage noted that they were “causing intermittency and slowness in some services.” A <a href="https://x.com/ClaroRD/status/1998496113838764343"><u>subsequent post on X</u></a> from Claro stated that technicians had restored Internet services nationwide by repairing the severed fiber optic cables.</p>
    <div>
      <h2>Power outages</h2>
      <a href="#power-outages">
        
      </a>
    </div>
    
    <div>
      <h3>Dominican Republic</h3>
      <a href="#dominican-republic">
        
      </a>
    </div>
    <p>According to a (translated) <a href="https://x.com/ETED_RD/status/1988326178219061450"><u>X post from the Empresa de Transmisión Eléctrica Dominicana</u></a> (ETED), a transmission line outage caused an interruption in electrical service in the <a href="https://radar.cloudflare.com/do"><u>Dominican Republic</u></a> on November 11. This power outage impacted Internet traffic from the country, resulting in a <a href="https://noc.social/@cloudflareradar/115533081511310085"><u>nearly 50% drop in traffic</u></a> compared to the prior week, starting at 13:15 local time (17:15 UTC). Traffic levels remained lower until approximately 02:00 local time (06:00 UTC) on December 12, with a later <a href="https://x.com/ETED_RD/status/1988575130990330153"><u>(translated) X post from ETED</u></a> noting “<i>At 2:20 a.m. we have completed the recovery of the national electrical system, supplying 96% of the demand…</i>”</p><p>A subsequent <a href="https://dominicantoday.com/dr/local/2025/11/27/manual-line-disconnection-triggered-nationwide-blackout-report-says/"><u>technical report found</u></a> that “<i>the blackout began at the 138 kV San Pedro de Macorís I substation, where a live line was manually disconnected, triggering a high-intensity short circuit. Protection systems responded immediately, but the fault caused several nearby lines to disconnect, separating 575 MW of generation in the eastern region from the rest of the grid. The imbalance caused major power plants to trip automatically as part of their built-in safety mechanisms.</i>”</p>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>On December 9, a <a href="https://www.tuko.co.ke/kenya/612181-kenya-power-reveals-7-pm-nationwide-blackout-multiple-regions/"><u>major power outage</u></a> impacted multiple regions across <a href="https://radar.cloudflare.com/ke"><u>Kenya</u></a>. Kenya Power explained that the outage “<i>was triggered by an incident on the regional Kenya-Uganda interconnected power network, which caused a disturbance on the Kenyan side of the system</i>” and claimed that “<i>[p]ower was restored to most of the affected areas within approximately 30 minutes.</i>” However, impacts to Internet connectivity lasted for nearly four hours, between 19:15 - 23:00 local time (16:15 - 20:00 UTC). The power outage caused traffic to drop as much as 18% at a national level, with the traffic shifts most visible in <a href="https://radar.cloudflare.com/traffic/7668902"><u>Nakuru County</u></a> and <a href="https://radar.cloudflare.com/traffic/192709"><u>Kaimbu County</u></a>.</p>


    <div>
      <h2>Military action</h2>
      <a href="#military-action">
        
      </a>
    </div>
    
    <div>
      <h3>Odesa, Ukraine</h3>
      <a href="#odesa-ukraine">
        
      </a>
    </div>
    <p><a href="https://odessa-journal.com/russia-carried-out-a-massive-drone-attack-on-the-odessa-region"><u>Russian drone strikes</u></a> on the <a href="https://radar.cloudflare.com/traffic/698738"><u>Odesa region</u></a> in <a href="https://radar.cloudflare.com/ua"><u>Ukraine</u></a> on December 12 damaged warehouses and energy infrastructure, with the latter causing power outages in parts of the region. Those outages disrupted Internet connectivity, resulting in <a href="https://x.com/CloudflareRadar/status/2000993223406211327?s=20"><u>traffic dropping by as much as 57%</u></a> as compared to the prior week. After the initial drop at midnight on December 13 (22:00 UTC on December 12), traffic gradually recovered over the following several days, returning to expected levels around 14:30 local time (12:30 UTC) on December 16.</p>
    <div>
      <h2>Weather</h2>
      <a href="#weather">
        
      </a>
    </div>
    
    <div>
      <h3>Jamaica</h3>
      <a href="#jamaica">
        
      </a>
    </div>
    <p><a href="https://www.nytimes.com/live/2025/10/28/weather/hurricane-melissa-jamaica-landfall?smid=url-share#df989e67-a90e-50fb-92d0-8d5d52f76e84"><u>Hurricane Melissa</u></a> made landfall on <a href="https://radar.cloudflare.com/jm"><u>Jamaica</u></a> on October 28 and left a trail of damage and destruction in its path. Associated <a href="https://www.jamaicaobserver.com/2025/10/28/eyeonmelissa-35-jps-customers-without-power/"><u>power outages</u></a> and infrastructure damage impacted Internet connectivity, causing traffic to initially <a href="https://x.com/CloudflareRadar/status/1983266694715084866"><u>drop by approximately half</u></a>, <a href="https://x.com/CloudflareRadar/status/1983217966347866383"><u>starting</u></a> around 06:15 local time (11:15 UTC), ultimately reaching as much as <a href="https://x.com/CloudflareRadar/status/1983357587707048103"><u>70% lower</u></a> than the previous week. Internet traffic from Jamaica remained well below pre-hurricane levels for several days, and ultimately started to make greater progress towards expected levels <a href="https://x.com/CloudflareRadar/status/1985708253872107713?s=20"><u>during the morning of November 4</u></a>. It can often take weeks or months for Internet traffic from a country to return to “normal” levels following storms that cause massive and widespread damage – while power may be largely restored within several days, damage to physical infrastructure takes significantly longer to address.</p>
    <div>
      <h3>Sri Lanka &amp; Indonesia</h3>
      <a href="#sri-lanka-indonesia">
        
      </a>
    </div>
    <p>On November 26, <a href="https://apnews.com/article/indonesia-sri-lanka-thailand-malaysia-floods-landsides-aa9947df1f6192a3c6c72ef58659d4d2"><u>Cyclone Senyar</u></a> caused catastrophic floods and landslides in <a href="https://radar.cloudflare.com/lk"><u>Sri Lanka</u></a> and <a href="https://radar.cloudflare.com/id"><u>Indonesia</u></a>, killing over 1,000 people and damaging telecommunications and power infrastructure across these countries. The infrastructure damage resulted in <a href="https://x.com/CloudflareRadar/status/1996233525989720083"><u>disruptions to Internet connectivity</u></a>, and resultant lower traffic levels, across multiple regions.</p><p>In Sri Lanka, regions outside the main Western Province were the most affected, and several provinces saw traffic drop <a href="https://x.com/CloudflareRadar/status/1996233528032301513"><u>between 80% and 95%</u></a> as compared to the prior week, including <a href="https://radar.cloudflare.com/traffic/1232860?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>North Western</u></a>, <a href="https://radar.cloudflare.com/traffic/1227618?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Southern</u></a>, <a href="https://radar.cloudflare.com/traffic/1225265?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Uva</u></a>, <a href="https://radar.cloudflare.com/traffic/8133521?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Eastern</u></a>, <a href="https://radar.cloudflare.com/traffic/7671049?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Northern</u></a>, <a href="https://radar.cloudflare.com/traffic/1232870?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>North Central</u></a>, and <a href="https://radar.cloudflare.com/traffic/1228435?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Sabaragamuwa</u></a>.</p>

<p>In <a href="https://x.com/CloudflareRadar/status/1996233530267885938"><u>Indonesia</u></a>, <a href="https://radar.cloudflare.com/traffic/1215638?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Aceh</u></a> and the Sumatra regions saw the biggest Internet disruptions. In Aceh, traffic initially dropped over 75% as compared to the previous week. In Sumatra, <a href="https://radar.cloudflare.com/traffic/1213642?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>North Sumatra</u></a> was the most affected, with an early 30% drop as compared to the previous week, before starting to recover more actively the following week.</p>


    <div>
      <h2>Known or unspecified technical problems</h2>
      <a href="#known-or-unspecified-technical-problems">
        
      </a>
    </div>
    
    <div>
      <h3>Smartfren (Indonesia)</h3>
      <a href="#smartfren-indonesia">
        
      </a>
    </div>
    <p>On October 3, subscribers to Indonesian Internet provider <a href="https://radar.cloudflare.com/as18004"><u>Smartfren (AS18004</u></a>) experienced a service disruption. The issues were <a href="https://x.com/smartfrenworld/status/1973957300466643203"><u>acknowledged by the provider in an X post</u></a>, which stated (in translation), “<i>Currently, telephone, SMS and data services are experiencing problems in several areas.</i>” Traffic from the provider fell as much as 84%, starting around 09:00 local time (02:00 UTC). The disruption lasted for approximately eight hours, as traffic returned to expected levels around 17:00 local time (10:00 UTC). Smartfren did not provide any additional information on what caused the service problems.</p>
    <div>
      <h3>Vodafone UK</h3>
      <a href="#vodafone-uk">
        
      </a>
    </div>
    <p>Major British Internet provider Vodafone UK (<a href="https://radar.cloudflare.com/as5378"><u>AS5378</u></a> &amp; <a href="https://radar.cloudflare.com/as25135"><u>AS25135</u></a>) experienced a brief service outage on October 23. At 15:00 local time (14:00 UTC), traffic on both Vodafone <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASNs</u></a> dropped to zero. Announced IPv4 address space from <a href="https://radar.cloudflare.com/routing/as5378?dateStart=2025-10-13&amp;dateEnd=2025-10-13#announced-ip-address-space"><u>AS5378</u></a> fell by 75%, while announced IPv4 address space from <a href="https://radar.cloudflare.com/routing/as25135?dateStart=2025-10-13&amp;dateEnd=2025-10-13#announced-ip-address-space"><u>AS25135</u></a> disappeared entirely. Both Internet traffic and address space recovered two hours later, returning to expected levels around 17:00 local time (16:00 UTC). Vodafone did not provide any information on their social media channels about the cause of the outage, and their <a href="https://www.vodafone.co.uk/network/status-checker"><u>network status checker page</u></a> was also unavailable during the outage.</p>






    <div>
      <h3>Fastweb (Italy)</h3>
      <a href="#fastweb-italy">
        
      </a>
    </div>
    <p>According to a <a href="https://tg24.sky.it/tecnologia/2025/10/22/fastweb-down-problemi-internet-oggi"><u>published report</u></a>, a DNS resolution issue disrupted Internet services for customers of Italian provider <a href="https://radar.cloudflare.com/as12874"><u>Fastweb (AS12874)</u></a> on October 22, causing observed traffic volumes to drop by over 75%. Fastweb <a href="https://www.firstonline.info/en/fastweb-down-oggi-internet-bloccato-in-tutta-italia-migliaia-di-segnalazioni/"><u>acknowledged the issue</u></a>, which impacted wired Internet customers between 09:30 - 13:00 local time (08:30 - 12:00 UTC).</p><p>Although not an Internet outage caused by connectivity failure, the impact of DNS resolution issues on Internet traffic is very similar. When a provider’s <a href="https://www.cloudflare.com/learning/dns/dns-server-types/"><u>DNS resolver</u></a> is experiencing problems, switching to a service like Cloudflare’s <a href="https://1.1.1.1/dns"><u>1.1.1.1 public DNS resolver</u></a> will often restore connectivity.</p>
    <div>
      <h3>SBIN, MTN Benin, Etisalat Benin</h3>
      <a href="#sbin-mtn-benin-etisalat-benin">
        
      </a>
    </div>
    <p>On December 7, a concurrent drop in traffic was observed across <a href="https://radar.cloudflare.com/as28683"><u>SBIN (AS28683)</u></a>, <a href="https://radar.cloudflare.com/as37424"><u>MTN Benin (AS37424)</u></a>, and <a href="https://radar.cloudflare.com/as37136"><u>Etisalat Benin (AS37136)</u></a>. Between 18:30 - 19:30 local time (17:30 - 18:30 UTC), traffic dropped as much as 80% as compared to the prior week at a country level, nearly 100% at Etisalat and MTN, and over 80% at SBIN.</p><p>While an <a href="https://www.reuters.com/world/africa/soldiers-benins-national-television-claim-have-seized-power-2025-12-07/"><u>attempted coup</u></a> had taken place earlier in the day, it is unclear whether the observed Internet disruption was related in any way. From a routing perspective, all three impacted networks share <a href="https://radar.cloudflare.com/as174"><u>Cogent (AS174)</u></a> as an upstream provider, so a localized issue at Cogent may have contributed to the brief outage.  </p>



    <div>
      <h3>Cellcom Israel</h3>
      <a href="#cellcom-israel">
        
      </a>
    </div>
    <p>According to a <a href="https://www.ynetnews.com/article/2gpt1kt35"><u>reported announcement</u></a> from Israeli provider <a href="https://radar.cloudflare.com/as1680"><u>Cellcom (AS1680)</u></a>, on December 18, there was “<i>a malfunction affecting Internet connectivity that is impacting some of our customers.</i>” This malfunction dropped traffic nearly 70% as compared to the prior week, and occurred between 09:30 - 11:00 local time (07:30 - 09:00 UTC). The “malfunction” may have been a DNS failure, according to a <a href="https://www.israelnationalnews.com/news/419552"><u>published report</u></a>.</p>
    <div>
      <h3>Partner Communications (Israel)</h3>
      <a href="#partner-communications-israel">
        
      </a>
    </div>
    <p>Closing out 2025, on December 30, a major technical failure at Israeli provider <a href="https://radar.cloudflare.com/as12400"><u>Partner Communications (AS12400)</u></a> <a href="https://www.ynetnews.com/tech-and-digital/article/hjewkibnwe"><u>disrupted</u></a> mobile, TV, and Internet services across the country. Internet traffic from Partner fell by two-thirds as compared to the previous week between 14:00 - 15:00 local time (12:00 - 13:00 UTC). During the outage, queries to Cloudflare’s 1.1.1.1 public DNS resolver spiked, suggesting that the problem may have been related to Partner’s DNS infrastructure. However, the provider did not publicly confirm what caused the outage.</p>




    <div>
      <h2>Cloud Platforms</h2>
      <a href="#cloud-platforms">
        
      </a>
    </div>
    <p>During the fourth quarter, we launched a new <a href="https://radar.cloudflare.com/cloud-observatory"><u>Cloud Observatory</u></a> page on Radar that tracks availability and performance issues at a region level across hyperscaler cloud platforms, including <a href="https://radar.cloudflare.com/cloud-observatory/amazon"><u>Amazon Web Services</u></a>, <a href="https://radar.cloudflare.com/cloud-observatory/microsoft"><u>Microsoft Azure</u></a>, <a href="https://radar.cloudflare.com/cloud-observatory/google"><u>Google Cloud Platform</u></a>, and <a href="https://radar.cloudflare.com/cloud-observatory/oracle"><u>Oracle Cloud Infrastructure</u></a>.</p>
    <div>
      <h3>Amazon Web Services</h3>
      <a href="#amazon-web-services">
        
      </a>
    </div>
    <p>On October 20, the Amazon Web Services us-east-1 region in Northern Virginia experienced “<a href="https://health.aws.amazon.com/health/status?eventID=arn:aws:health:us-east-1::event/MULTIPLE_SERVICES/AWS_MULTIPLE_SERVICES_OPERATIONAL_ISSUE/AWS_MULTIPLE_SERVICES_OPERATIONAL_ISSUE_BA540_514A652BE1A"><u>increased error rates and latencies</u></a>” that affected multiple services within the region. The issues impacted not only customers with public-facing Web sites and applications that rely on infrastructure within the region, but also Cloudflare customers that have origin resources hosted in us-east-1.</p><p>We began to see the impact of the problems around 06:30 UTC, as the share of <a href="https://radar.cloudflare.com/cloud-observatory/amazon/us-east-1?dateStart=2025-10-20&amp;dateEnd=2025-10-21#success-rate"><u>error</u></a> (<a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Status#server_error_responses"><u>5xx-class</u></a>) responses began to climb, reaching as high as 17% around 08:00 UTC. The number of <a href="https://radar.cloudflare.com/cloud-observatory/amazon/us-east-1?dateStart=2025-10-20&amp;dateEnd=2025-10-21#connection-failures"><u>failures encountered when attempting to connect to origins</u></a> in us-east-1 climbed as well, peaking around 12:00 UTC.</p>

<p>The impact could also be clearly seen in key network performance metrics, which remained elevated throughout the incident, returning to normal levels just before the end of the incident, around 23:00 UTC. Both <a href="https://radar.cloudflare.com/cloud-observatory/amazon/us-east-1?dateStart=2025-10-20&amp;dateEnd=2025-10-21#tcp-handshake-duration"><u>TCP</u></a> and <a href="https://radar.cloudflare.com/cloud-observatory/amazon/us-east-1?dateStart=2025-10-20&amp;dateEnd=2025-10-21#tls-handshake-duration"><u>TLS</u></a> handshake durations got progressively worse throughout the incident—these metrics measure the amount of time needed for Cloudflare to establish TCP and TLS connections respectively with customer origin servers in us-east-1. In addition, the amount of time elapsed before Cloudflare <a href="https://radar.cloudflare.com/cloud-observatory/amazon/us-east-1/#response-header-receive-duration"><u>received response headers</u></a> from the origin increased significantly during the first several hours of the incident, before gradually returning to expected levels.  </p>





    <div>
      <h3>Microsoft Azure</h3>
      <a href="#microsoft-azure">
        
      </a>
    </div>
    <p>On October 29, Microsoft Azure experienced an <a href="https://azure.status.microsoft/en-us/status/history/?trackingId=YKYN-BWZ"><u>incident</u></a> impacting <a href="https://azure.microsoft.com/en-us/products/frontdoor"><u>Azure Front Door</u></a>, its content delivery network service. According to <a href="https://azure.status.microsoft/en-us/status/history/?trackingId=YKYN-BWZ"><u>Azure's report on the incident</u></a>, “<i>A specific sequence of customer configuration changes, performed across two different control plane build versions, resulted in incompatible customer configuration metadata being generated. These customer configuration changes themselves were valid and non-malicious – however they produced metadata that, when deployed to edge site servers, exposed a latent bug in the data plane. This incompatibility triggered a crash during asynchronous processing within the data plane service.</i>”</p><p>The incident report marked the start time at 15:41 UTC, although we observed the volume of <a href="https://radar.cloudflare.com/cloud-observatory/microsoft/global?dateStart=2025-10-29&amp;dateEnd=2025-10-30#connection-failures"><u>failed connection attempts</u></a> to Azure-hosted origins begin to climb about 45 minutes prior. The TCP and TLS handshake metrics also became more volatile during the incident period, with <a href="https://radar.cloudflare.com/cloud-observatory/microsoft/global?dateStart=2025-10-29&amp;dateEnd=2025-10-30#tcp-handshake-duration"><u>TCP handshakes</u></a> taking over 50% longer at times, and <a href="https://radar.cloudflare.com/cloud-observatory/microsoft/global?dateStart=2025-10-29&amp;dateEnd=2025-10-30#tls-handshake-duration"><u>TLS handshakes</u></a> taking nearly 200% longer at peak. The impacted metrics began to improve after 20:00 UTC, and according to Microsoft, the incident ended at 00:05 UTC on October 30.</p>



    <div>
      <h2>Cloudflare</h2>
      <a href="#cloudflare">
        
      </a>
    </div>
    <p>In addition to the outages discussed above, Cloudflare also experienced two disruptions during the fourth quarter. While these were not Internet outages in the classic sense, they did prevent users from accessing Web sites and applications delivered and protected by Cloudflare when they occurred.</p><p>The first incident took place on November 18, and was caused by a software failure triggered by a change to one of our database systems' permissions, which caused the database to output multiple entries into a “feature file” used by our Bot Management system. Additional details, including a root cause analysis and timeline, can be found in the associated <a href="https://blog.cloudflare.com/18-november-2025-outage/"><u>blog post</u></a>.</p><p>The second incident occurred on December 5, and impacted a subset of customers, accounting for approximately 28% of all HTTP traffic served by Cloudflare. It was triggered by changes being made to our request body parsing logic while attempting to detect and mitigate a newly disclosed industry-wide React Server Components vulnerability. A post-mortem <a href="https://blog.cloudflare.com/5-december-2025-outage/"><u>blog post</u></a> contains additional details, including a root cause analysis and timeline.</p><p>For more information about the work underway at Cloudflare to prevent outages like these from happening again, check out our <a href="https://blog.cloudflare.com/fail-small-resilience-plan/"><u>blog post</u></a> detailing “Code Orange: Fail Small.”</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>The disruptions observed in the fourth quarter underscore the importance of real-time data in maintaining global connectivity. Whether it’s a government-ordered shutdown or a minor technical issue, transparency allows the technical community to respond faster and more effectively. We will continue to track these shifts on Cloudflare Radar, providing the insights needed to navigate the complexities of modern networking. We share our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a><u>email</u></a>.</p><p>As a reminder, while these blog posts feature graphs from <a href="https://radar.cloudflare.com/"><u>Radar</u></a> and the <a href="https://radar.cloudflare.com/explorer"><u>Radar Data Explorer</u></a>, the underlying data is available from our <a href="https://developers.cloudflare.com/api/resources/radar/"><u>API</u></a>. You can use the API to retrieve data to do your own local monitoring or analysis, or you can use the <a href="https://github.com/cloudflare/mcp-server-cloudflare/tree/main/apps/radar#cloudflare-radar-mcp-server-"><u>Radar MCP server</u></a> to incorporate Radar data into your AI tools.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Trends]]></category>
            <category><![CDATA[AWS]]></category>
            <category><![CDATA[Microsoft Azure]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">6dRT0oOSVcyQzjnZCkzH7S</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[What we know about Iran’s Internet shutdown]]></title>
            <link>https://blog.cloudflare.com/iran-protests-internet-shutdown/</link>
            <pubDate>Tue, 13 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Radar data shows Internet traffic from Iran has effectively dropped to zero since January 8, signaling a complete shutdown in the country and disconnection from the global Internet.  
 ]]></description>
            <content:encoded><![CDATA[ <p>In late December 2025, <a href="https://apnews.com/article/iran-protests-us-israel-war-economy-d5da3b5f56449dd3871c9438c07f069f"><u>wide-scale protests erupted across multiple cities in Iran</u></a>. While these protests were initially fueled by frustration over inflation, food prices, and currency depreciation, they have grown into demonstrations <a href="https://www.theguardian.com/world/2025/dec/31/we-want-the-mullahs-gone-economic-crisis-sparks-biggest-protests-in-iran-since-2022"><u>demanding a change</u></a> in the country’s leadership regime. </p><p>In the last few days, Internet traffic from Iran has effectively dropped to zero. This is evident in the data available in Cloudflare Radar, as we’ll describe in this post.  </p>
    <div>
      <h2>Background</h2>
      <a href="#background">
        
      </a>
    </div>
    <p>The Iranian government has a history of cutting off Internet connectivity when such protests take place. In November 2019, protests erupted following the announcement of a significant increase in fuel prices. In response, the Iranian government implemented an <a href="https://iran-shutdown.amnesty.org/"><u>Internet shutdown</u></a> for more than five days. In September 2022, <a href="https://www.cnn.com/2022/09/21/middleeast/iran-mahsa-amini-death-widespread-protests-intl-hnk/index.html"><u>protests and demonstrations erupted across Iran</u></a> in response to the death <a href="https://www.aljazeera.com/news/2022/9/16/iranian-woman-dies-after-moral-polices-detention-reports"><u>in police custody</u></a> of Mahsa/Zhina Amini, a 22-year-old woman from the Kurdistan Province of Iran. Internet services were <a href="https://blog.cloudflare.com/protests-internet-disruption-ir/"><u>disrupted across multiple network providers</u></a> in the following days.</p><p>Amid the current protests, lower traffic volumes were already <a href="https://x.com/nima/status/2007830078093250904"><u>observed</u></a> at the start of the year, indicating potential connectivity issues leading into the more dramatic shutdown that has followed. </p>
    <div>
      <h2>Internet connectivity in Iran plummeted on January 8</h2>
      <a href="#internet-connectivity-in-iran-plummeted-on-january-8">
        
      </a>
    </div>
    <p>Some traffic anomalies were seen in the first few days of 2026 (described in further detail below), though peak traffic levels recovered by January 5, and exceeded expected levels during the following days.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2cBTGRkiBSJTfJd1QMuXYV/195ffd12571ef25f35c753d8f2594d38/unnamed.png" />
          </figure><p>However, this strong recovery proved to be short-lived. IPv6-related shifts observed on January 8 provided the first indication of the changes to come. At 11:50 UTC (15:20 local time), <a href="https://x.com/CloudflareRadar/status/2009266152355041543"><u>the amount of IPv6 address space announced by Iranian networks dropped by 98.5%</u></a>, falling from over 48 million /48s (blocks of 2^80 IPv6 addresses) to just over 737,000 /48s. A drop in announced IP address space (whether IPv6 or IPv4) means that the announcing networks are no longer telling the world how to reach those addresses. A major drop like this one can signal an intentional disruption to Internet connectivity, as there is no longer a path to the clients or servers using those IP addresses.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2lQVvoLc77jO11pGGPRG5N/44eabb313e139af6f93ee976c6cd70e7/BLOG-3110_2.png" />
          </figure><p>This drop in announced IPv6 address space served to reduce IPv6’s share of human-generated traffic from around 12% to around 2%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GOdWNEvSKh4HapwJEYsOW/878b4cdfcacf00a416629b7aae464f20/BLOG-3110_3.png" />
          </figure><p>As seen in the graph below, this drop in IPv6 traffic stayed at a relatively consistent level for approximately 100 minutes, before falling further just before 13:30 UTC (17:00 local time). This second drop resulted in IPv6 traffic from Iran all but disappearing.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oYBhaT8U8NKRMYTMfSWY2/21a3aee3066274b11c7b4c059a789bbc/BLOG-3110_4.jpg" />
          </figure><p>Several hours later, we observed <a href="https://x.com/CloudflareRadar/status/2009312093749801350?s=20"><u>overall traffic levels from the country begin to decline rapidly</u></a>. Between 16:30 - 17:00 UTC (20:00 - 20:30 local time), traffic volumes fell nearly 90%, fueled by a loss of traffic from the major Iranian network providers, including <a href="https://radar.cloudflare.com/as197207"><u>MCCI (AS197207)</u></a>, <a href="https://radar.cloudflare.com/as44244"><u>IranCell (AS44244)</u></a>, and <a href="https://radar.cloudflare.com/as58224"><u>TCI (AS58224)</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17V0uq3ZHwSClk1NbMsfXj/6d02a99d67224ebe72d03c2f9aa537c8/BLOG-3110_5.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FZOw6Vf0zyZcFReGTDgbJ/9fbd98a696d895b10ce76e3831a258ff/BLOG-3110_6.png" />
          </figure><p>Around 18:45 UTC, Internet traffic from Iran <a href="https://x.com/CloudflareRadar/status/2009354299302908143"><u>dropped to effectively zero</u></a>, signaling a complete shutdown in the country and disconnection from the global Internet.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4h1G0brqaDqQP4LroOpmu8/6a74b8803bbd251375a6d65732f1be56/BLOG-3110_7.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5RY1SofUechQRgKU81yEt9/6ce900d5165a848701306cc34c964817/BLOG-3110_8.png" />
          </figure>
    <div>
      <h2>Brief windows of connectivity on January 9 — but they don’t last</h2>
      <a href="#brief-windows-of-connectivity-on-january-9-but-they-dont-last">
        
      </a>
    </div>
    <p>After the shutdown took hold the previous day, internal traffic data showed an <a href="https://x.com/CloudflareRadar/status/2009758510909665404"><u>extremely low volume of traffic from Iran</u></a>, amounting to less than 0.01% of pre-shutdown peaks, starting around 10:00 UTC (13:30 local time) on January 9. It appears that access to Cloudflare’s public DNS resolver, <a href="https://1.1.1.1/dns"><u>1.1.1.1</u></a>, also became available again around 10:00 UTC (13:30 local time), leading request traffic to briefly spike well above the expected range. However, after spiking, only a small amount of request traffic to 1.1.1.1 remained visible.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1q43txqeO1Y5jfDtaHHvIN/0108bd24f598bbf8b89b4485d9ec58b6/BLOG-3110_9.png" />
          </figure><p>Several Iranian universities also saw <a href="https://x.com/CloudflareRadar/status/2009630454383870417?s=20"><u>connectivity briefly restored</u></a>, starting around 11:30 UTC (15:00 local time). These included <a href="https://radar.cloudflare.com/as29068"><u>University of Tehran Informatics Center (AS29068)</u></a>, <a href="https://radar.cloudflare.com/as12660"><u>Sharif University of Technology (AS12660)</u></a>, <a href="https://radar.cloudflare.com/as43965"><u>Tehran University of Medical Science (AS43965)</u></a>, and <a href="https://radar.cloudflare.com/as57745"><u>Tarbita Modares University (AS57745)</u></a>. It is unclear whether this restoration was intentional, but traffic from these networks was once again non-existent after 15:00 UTC (18:30 local time).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/pcP3V6y2nhRnH7swgSnZb/bd1e5601cb208046324607f792c51d2a/BLOG-3110_10.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6XEwTXqeAu6O1StFLmeGLe/20ccec04c3441eb10117535c92424c30/BLOG-3110_11.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ACIe46mGSsNGrcKDRxfQr/8deb5247b24fa9a5b12891dcacae7e27/BLOG-3110_12.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3vZpp0VGcx4He4oNyCLOSK/423f26e3fcdd309dae8a02acad990406/BLOG-3110_13.png" />
          </figure>
    <div>
      <h2>Changes in HTTP traffic preceded the Internet shutdown</h2>
      <a href="#changes-in-http-traffic-preceded-the-internet-shutdown">
        
      </a>
    </div>
    <p>Alongside the lower traffic levels observed at the start of the year, as discussed above, a clear shift in HTTP version usage from human-generated traffic was also observed across leading network providers, as seen in the graphs below. Prior to that point, as much as 40% of HTTP requests on <a href="https://radar.cloudflare.com/as44244"><u>IranCell (AS44244)</u></a> used HTTP/3, but that figure fell to just 5% at 20:00 UTC (23:30 local time) on December 31, and continued to decline over the following days. Usage of QUIC from the network followed a similar pattern, as it relies on HTTP/3. </p><p>On <a href="https://radar.cloudflare.com/as58224"><u>TCI (AS58224)</u></a>, HTTP/3 also accounted for as much as 40% of requests at peak, but gradually declined starting on January 1 before falling below 5% starting around 07:00 UTC (10:30 local time) on January 3. QUIC usage on this network followed a similar pattern as well. MahsaNet, an organization that fights against Internet censorship in Iran, <a href="https://x.com/mahsanet/status/2007491214405140716?s=20"><u>suggested</u></a> that these shifts could indicate that “Severe filtering and layered, upgraded whitelisting are clearly evident and being implemented” (translation via X). </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2aF6ntL7YtxVJDEibF0tPh/184f99765daf533480f1b9791774a59f/BLOG-3110_15.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5LsVTrJf0kJfhUR0kgu114/9d71caca08bf4aa39979e4388760d158/BLOG-3110_16.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4XyJjijsAwE8M7c9xwqI0Y/88b30b6d306e03d168710b21f90076c6/BLOG-3110_17.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Wq1neIAWfcz5P7GP6u5VF/ceeb800a75a1419f2c6de2aa3d9ae1ce/BLOG-3110_18.png" />
          </figure>
    <div>
      <h2>The shutdown continues</h2>
      <a href="#the-shutdown-continues">
        
      </a>
    </div>
    <p>As we noted in social media posts (<a href="https://x.com/cloudflareradar"><u>X</u></a>, <a href="https://noc.social/@cloudflareradar"><u>Mastodon</u></a>, <a href="https://bsky.app/profile/radar.cloudflare.com"><u>Bluesky</u></a>), no significant changes have been observed in Iran’s Internet traffic since January 10. <b>The country remains almost entirely cut off from the global Internet, with internal data showing traffic volumes remaining at a fraction of a percent of previous levels.</b></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EY7TALUsSytiMgsei2y2h/0aaf1473dfc1a0be908beee6f0b14e72/BLOG-3110_19.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JXW8ND7fQCbbPj5vexBJH/f194dfd409c343691915dc214917d402/BLOG-3110_20.png" />
          </figure><p>We will continue to monitor the state of Internet connectivity in Iran, and will continue to post updates on our social media accounts. Use Cloudflare Radar’s <a href="https://radar.cloudflare.com/traffic/ir"><u>Traffic</u></a> and <a href="https://radar.cloudflare.com/routing/ir"><u>Routing</u></a> pages for Iran and the <a href="https://radar.cloudflare.com/traffic/ir#autonomous-systems"><u>top networks</u></a> within the country for near-real time insights into these metrics.</p> ]]></content:encoded>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[1.1.1.1]]></category>
            <guid isPermaLink="false">5VetKk31z2RaNY9CI4lsye</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Fresh insights from old data: corroborating reports of Turkmenistan IP unblocking and firewall testing]]></title>
            <link>https://blog.cloudflare.com/fresh-insights-from-old-data-corroborating-reports-of-turkmenistan-ip/</link>
            <pubDate>Mon, 03 Nov 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare used historical data to investigate reports of potential new firewall tests in Turkmenistan. Shifts in TCP resets/timeouts across ASNs corroborate large-scale network control system changes.
 ]]></description>
            <content:encoded><![CDATA[ <p>Here at Cloudflare, we frequently use and write about data in the present. But sometimes understanding the present begins with digging into the past.  </p><p>We recently learned of a 2024 <a href="https://turkmen.news/internet-amnistiya-v-turkmenistane-razblokirovany-3-milliarda-ip-adresov-hostingi-i-cdn/"><u>turkmen.news article</u></a> (available in Russian) that reports <a href="https://radar.cloudflare.com/tm"><u>Turkmenistan</u></a> experienced “an unprecedented easing in blocking,” causing over 3 billion previously-blocked IP addresses to become reachable. The same article reports that one of the reasons for unblocking IP addresses was that Turkmenistan may have been testing a new firewall. (The Turkmen government’s tight control over the country’s Internet access <a href="https://www.bbc.com/news/world-asia-16095369"><u>is well-documented</u></a>.) </p><p>Indeed, <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> shows a surge of requests coming from Turkmenistan around the same time, as we’ll show below. But we had an additional question: Does the firewall activity show up on Radar, as well? Two years ago, we launched the <a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>dashboard on Radar</u></a> to give a window into the TCP connections to Cloudflare that close due to resets and timeouts. These stand out because they are considered ungraceful mechanisms to close TCP connections, according to the TCP specification. </p><p>In this blog post, we go back in time to share what Cloudflare saw in connection resets and timeouts. We must remind our readers that, as passive observers, there are <a href="https://blog.cloudflare.com/connection-tampering/#limitations-of-our-data"><u>limitations on what we can glean from the data</u></a>. For example, our data can’t reveal attribution. Even so, the ability to observe our environment <a href="https://blog.cloudflare.com/tricky-internet-measurement/"><u>can be insightful</u></a>. In a recent example, our visibility into resets and timeouts helped corroborate reports of large-scale <a href="https://blog.cloudflare.com/russian-internet-users-are-unable-to-access-the-open-internet/"><u>blocking and traffic tampering by Russia</u></a>.</p>
    <div>
      <h3>Turkmenistan requests where there were none before</h3>
      <a href="#turkmenistan-requests-where-there-were-none-before">
        
      </a>
    </div>
    <p>Let’s look first at the number of requests, since those should increase if IP addresses are unblocked. In mid-June 2024 Cloudflare started receiving a noticeable increase in HTTP requests, consistent with <a href="https://turkmen.news/internet-amnistiya-v-turkmenistane-razblokirovany-3-milliarda-ip-adresov-hostingi-i-cdn/"><u>reports</u></a> of Turkmenistan unblocking IPs.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Kqaxxjv9g52RVMWg92AYu/e57468cf523702cadd634c34775be033/BLOG_3069_2.png" />
          </figure><p><sup>Source: </sup><a href="https://radar.cloudflare.com/traffic/tm?dateStart=2024-06-01&amp;dateEnd=2024-06-30"><sup>Cloudflare Radar</sup></a></p>
    <div>
      <h3>Overall TCP resets and timeouts</h3>
      <a href="#overall-tcp-resets-and-timeouts">
        
      </a>
    </div>
    <p>The Transmission Control Protocol (TCP) is a lower-layer mechanism used to create a connection between clients and servers, and also carries <a href="https://radar.cloudflare.com/adoption-and-usage#http1x-vs-http2-vs-http3"><u>70% of HTTP traffic</u></a> to Cloudflare. A TCP connection works <a href="https://blog.cloudflare.com/connection-tampering/#explaining-tampering-with-telephone-calls"><u>much like a telephone call</u></a> between humans, who follow graceful conventions to end a call—and who are acutely aware when conventions are broken if a call ends abruptly.  </p><p>TCP also defines conventions to end the connection gracefully, and we developed <a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>mechanisms to detect</u></a> when they don’t. An ungraceful end is triggered by a reset instruction or a timeout. Some are due to benign artifacts of software design or human user behaviours. However, sometimes they are exploited by <a href="https://blog.cloudflare.com/connection-tampering"><u>third parties to close connections</u></a> in everything from school and enterprise firewalls or software, to zero-rating on mobile plans, to nation-state filtering.</p><p>When we look at connections from Turkmenistan, we see that on June 13, 2024, the combined proportion of the four coloured regions increases; each coloured region represents ungraceful ends at a distinct stage of the connection lifetime. In addition to the combined increase, the relative proportions between stages (or colours) changes as well.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hNDpdNS9lDPKg3jFHigiL/ff3de33af7974c5d32ba421cbbc3c42e/BLOG_3069_3.png" />
          </figure><p><sup>Source: </sup><a href="https://radar.cloudflare.com/security/network-layer/tm?dateStart=2023-10-01&amp;dateEnd=2023-11-30#tcp-resets-and-timeouts"><sup>Cloudflare Radar</sup></a></p><p>Further changes appeared in the weeks that followed. Among them are an increase in Post-PSH (orange) anomalies starting around July 4; a reduction in Post-ACK (light blue) anomalies around July 13; and an increase in anomalies later in connections (green) starting July 22.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6IavKOkF7tB02MtNqJPqqD/f08c78f65894e751b7c9fce9820dee85/BLOG_3069_4.png" />
          </figure><p><sup>Source: </sup><a href="https://radar.cloudflare.com/security/network-layer/tm?dateStart=2024-07-01&amp;dateEnd=2024-07-30#tcp-resets-and-timeouts"><sup>Cloudflare Radar</sup></a></p><p>The shifts above <i>could</i> be explained by a large firewall system. It’s important to keep in mind that data in each of the connection stages (captured by the four coloured regions in the graphs) can be explained by browser implementations or user actions. However, the scale of the data would need a great number of browsers or users doing the same thing to show up. Similarly, individual changes in behaviour would be lost unless they occur in large numbers at the same time.</p>
    <div>
      <h3>Digging down to individual networks</h3>
      <a href="#digging-down-to-individual-networks">
        
      </a>
    </div>
    <p>We’ve learned that it can be helpful to look at the data for individual networks to reveal common patterns between different networks in different regions <a href="https://blog.cloudflare.com/tcp-resets-timeouts/#zero-rating-in-mobile-networks"><u>operated by single entities</u></a>. </p><p>Looking at individual networks within Turkmenistan, trends and timelines appear more pronounced. July 22 in particular sees greater proportions of anomalies associated with the <a href="https://www.cloudflare.com/learning/ssl/what-is-sni/"><u>Server Name Indication</u></a>, or domain name, rather than the IP address (dark blue), although the connection stage where the anomalies appear varies by individual network.</p><p>The general Turkmenistan trends are largely mirrored in connections from <a href="https://radar.cloudflare.com/as20661"><u>AS20661 (TurkmenTelecom)</u></a>, indicating that this <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a> (AS) accounts for <a href="https://radar.cloudflare.com/tm#autonomous-systems"><u>a large proportion of Turkmenistan’s traffic</u></a> to Cloudflare’s network. There is a notable reduction in Post-ACK (light blue) anomalies starting around July 26.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ukNOB1CYUAPW2s7ofdqMK/7d1dca367374db90627413e2c40a6ee3/BLOG_3069_5.png" />
          </figure><p><sup>Source: </sup><a href="https://radar.cloudflare.com/security/network-layer/tm?dateStart=2023-10-01&amp;dateEnd=2023-11-30#tcp-resets-and-timeouts"><sup>Cloudflare Radar</sup></a></p><p>A different picture emerges from <a href="https://radar.cloudflare.com/as51495"><u>AS51495 (Ashgabat City Telephone Network)</u></a>. Post-ACK anomalies almost completely disappear on July 12, corresponding with an increase in anomalies during the Post-PSH stage. An increase of anomalies in the Later (green) connection stage on July 22 is apparent for this AS as well.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7btBYWx2VVVg0MH10yY9ot/17e87bf94f97b1cd43139e432f189770/BLOG_3069_6.png" />
          </figure><p><sup>Source: </sup><a href="https://radar.cloudflare.com/security/network-layer/tm?dateStart=2023-10-01&amp;dateEnd=2023-11-30#tcp-resets-and-timeouts"><sup>Cloudflare Radar</sup></a></p><p>Finally, for <a href="https://radar.cloudflare.com/as59974"><u>AS59974 (Altyn Asyr)</u></a>, you can see below that there is a clear spike in Post-ACK anomalies starting July 22. This is the stage of the connection where a firewall could have seen the SNI, and chooses to drop the packets immediately, so they never reach Cloudflare’s servers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pxUHjzkRwnbmaSsgkhiKd/b56fbc84e2fdcd8b889b6e8b3a68dc40/BLOG_3069_7.png" />
          </figure><p><sup>Source: </sup><a href="https://radar.cloudflare.com/security/network-layer/tm?dateStart=2023-10-01&amp;dateEnd=2023-11-30#tcp-resets-and-timeouts"><sup>Cloudflare Radar</sup></a></p>
    <div>
      <h3>Timeouts and resets in context, never isolation</h3>
      <a href="#timeouts-and-resets-in-context-never-isolation">
        
      </a>
    </div>
    <p>We’ve previously discussed <a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>how to use the resets and timeouts</u></a> data because, while useful, it can also be misinterpreted. Radar’s data on resets and timeouts is unique among operators, but in isolation it’s incomplete and subject to human bias. </p><p>Take the figure above for AS59974 where Post-ACK (light blue) anomalies markedly increased on July 22. The Radar view is proportional, meaning that the increase in proportion could be explained by greater numbers of anomalies – but could also be explained, for example, by a smaller number of valid requests. Indeed, looking at the HTTP request levels for the same AS, there was a similarly pronounced drop starting on the same day, as shown below. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2PAYPpcFeInis6zo4lWrSx/f28a1f84fbe5b1c21659911b11331c30/BLOG_3069_8.png" />
          </figure><p><sup>Source: </sup><a href="https://radar.cloudflare.com/security/network-layer/tm?dateStart=2023-10-01&amp;dateEnd=2023-11-30#tcp-resets-and-timeouts"><sup>Cloudflare Radar</sup></a></p><p>If we look at the same two graphs before July 22, however, rates of reset and timeout anomalies do not appear to mirror the very large shifts up and down in HTTP requests.</p>
    <div>
      <h3>Looking ahead can also mean looking behind</h3>
      <a href="#looking-ahead-can-also-mean-looking-behind">
        
      </a>
    </div>
    <p>These charts from Radar above offer a way to analyze news events from a different angle, by looking at requests and TCP connection resets and timeouts. Does this data tell us definitively that new firewalls were being tested in Turkmenistan? No. But the trends in the data are consistent with what we could expect to see if that were the case.</p><p>If thinking about ways to use the resets and timeouts data going forward, we’d encourage also looking at the data in retrospect—or even further past to improve context.</p><p>A natural question might be, for example, “If Turkmenistan stopped blocking IPs in mid-2024, what did the data say beforehand?” The figure below captures October and November 2023. (The red-shaded region contains missing data due to the <a href="https://blog.cloudflare.com/post-mortem-on-cloudflare-control-plane-and-analytics-outage"><u>Nov. 2 Cloudflare control plane and metrics outage</u></a>.) Signals about the Internet in Turkmenistan were evolving well before the <a href="https://turkmen.news/internet-amnistiya-v-turkmenistane-razblokirovany-3-milliarda-ip-adresov-hostingi-i-cdn/"><u>news article</u></a> that prompted us to look.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2W4MfieKNV24PmvynAAIfO/af42a2328059eb15fba0619372973887/BLOG_3069_9.png" />
          </figure><p><sup>Source: </sup><a href="https://radar.cloudflare.com/security/network-layer/tm?dateStart=2023-10-01&amp;dateEnd=2023-11-30#tcp-resets-and-timeouts"><sup>Cloudflare Radar</sup></a></p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>To learn more, see our guide about <a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>how to use the resets and timeouts data available on Radar</u></a>, as well as the technical details about our <a href="https://blog.cloudflare.com/connection-tampering/"><u>third-party tampering measurement </u></a>and some perspectives by a former <a href="https://blog.cloudflare.com/experience-of-data-at-scale/"><u>intern who helped drive</u></a> the study. </p><p>We’re proud to offer a unique view of TCP connection anomalies on Radar. It’s a testament to the long-lived benefits that emerge when approaching <a href="https://blog.cloudflare.com/tricky-internet-measurement/"><u>Internet measurement as a science</u></a>. In keeping with the open spirit of science, we’ve also shared how we<a href="https://blog.cloudflare.com/tricky-internet-measurement/"><u> detect and log resets and timeouts</u></a> so that others can reproduce the observability on their servers, whether by hobbyists or other large operators.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Research]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Trends]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">404c64k0KinGRYZkfe0xum</guid>
            <dc:creator>Luke Valenta</dc:creator>
            <dc:creator>Marwan Fayed</dc:creator>
        </item>
        <item>
            <title><![CDATA[Online outages: Q3 2025 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q3-2025-internet-disruption-summary/</link>
            <pubDate>Tue, 28 Oct 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[ In Q3 2025, we observed Internet disruptions around the world resulting from government directed shutdowns, power outages, cable cuts, a cyberattack, an earthquake, a fire, and technical problems, as well as several with unexplained causes. ]]></description>
            <content:encoded><![CDATA[ <p>In the third quarter, we observed Internet disruptions with a wide variety of known causes, as well as several with <a href="#no-definitive-cause"><u>no definitive or published cause</u></a>. Once again, we unfortunately saw a number of <a href="#government-directed-shutdowns"><u>government-directed shutdowns</u></a>, including exam-related shutdowns in <a href="#sudan"><u>Sudan</u></a>, <a href="#syria"><u>Syria</u></a>, and <a href="#iraq"><u>Iraq</u></a>. <a href="#fiber-optic-cable-damage"><u>Cable cuts</u></a>, both submarine and terrestrial, caused Internet outages, including one caused by a <a href="#texas-united-states"><u>stray bullet</u></a>. <a href="#gibraltar"><u>A rogue contractor</u></a>, among other events, caused power outages that impacted Internet connectivity. Damage from an <a href="#earthquake"><u>earthquake</u></a> and a <a href="#fire-causes-infrastructure-damage"><u>fire</u></a> caused service disruptions, as did a targeted <a href="#targeted-cyberattack"><u>cyberattack</u></a>. And a myriad of <a href="#technical-problems"><u>technical issues</u></a>, including issues with <a href="#china"><u>China’s Great Firewall</u></a>, resulted in traffic losses across multiple countries.</p><p>As we have noted in the past, this post is intended as a summary overview of observed and confirmed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter. A larger list of detected traffic anomalies is available in the <a href="https://radar.cloudflare.com/outage-center#traffic-anomalies"><u>Cloudflare Radar Outage Center</u></a>. These anomalies are detected through significant deviations from expected traffic patterns observed across our network. Note that both bytes-based and request-based traffic graphs are used within the post to illustrate the impact of the observed disruptions — the choice of metric to include was generally made based on which better illustrated the impact of the disruption.</p>
    <div>
      <h2>Government-directed shutdowns</h2>
      <a href="#government-directed-shutdowns">
        
      </a>
    </div>
    
    <div>
      <h3>Sudan</h3>
      <a href="#sudan">
        
      </a>
    </div>
    <p>Regular drops in traffic from <a href="https://radar.cloudflare.com/sd"><u>Sudan</u></a> were observed between 12:00-15:00 UTC (14:00-17:00 local time) each day from July 7-10. Partial outages were observed at <a href="https://radar.cloudflare.com/traffic/as15706?dateStart=2025-07-06&amp;dateEnd=2025-07-12#http-traffic"><u>Sudatel (AS15706)</u></a>, and near-complete outages at <a href="https://radar.cloudflare.com/traffic/as36998?dateStart=2025-07-06&amp;dateEnd=2025-07-12#http-traffic"><u>SDN Mobitel (AS36998)</u></a> and <a href="https://radar.cloudflare.com/traffic/as36972?dateStart=2025-07-06&amp;dateEnd=2025-07-12#http-traffic"><u>MTN Sudan (AS36972)</u></a>. Similar drops were also seen in traffic to our <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> from these impacted <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASNs</u></a>.</p><p>We have observed Sudan implementing government-directed Internet shutdowns in the past (<a href="https://blog.cloudflare.com/sudans-exam-related-internet-shutdowns/"><u>2021</u></a>, <a href="https://blog.cloudflare.com/syria-sudan-algeria-exam-internet-shutdown/#sudan"><u>2022</u></a>), and given that the timing aligns with the last four days of <a href="https://www.suna-sd.net/posts/ministry-of-education-publishes-schedule-for-postponed-2024-secondary-school-certificate-examinations"><u>postponed 2024 secondary school certificate examinations</u></a>, in addition to fitting the pattern of short-duration disruptions repeating across multiple days, we believe that these drops in traffic were exam-related shutdowns as well. </p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>In our <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/#syria"><u>second quarter post</u></a>, we covered the cellular connectivity-focused exam-related Internet shutdowns that <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> chose to implement this year in an effort to limit their impact. During the second quarter, the shutdowns associated with the “Basic Education Certificate” took place on June 21, 24, and 29 between 05:15 - 06:00 UTC (08:15 - 09:00 local time). Exams and associated shutdowns for the “Secondary Education Certificate” were scheduled to take place between July 12 and August 3, and during that period, we observed six additional Internet disruptions in Syria on July 12, 17, 21, 28, 31, and August 3, as shown in the graph below.</p><p>At the end of the exam period, the <a href="https://t.me/TrbyaGov/2352"><u>Syrian Ministry of Education posted a Telegram message</u></a> that was presumably intended to justify the shutdowns, and the focus on cellular connectivity. Translated, it said in part:</p><p>“<i>As part of its efforts to ensure the integrity of the examination process, and in coordination with relevant authorities, the Ministry of Education was able to uncover organized exam cheating networks in three examination centers in Lattakia Governorate. These networks used advanced electronic technologies and devices in their attempt to manipulate the exam process.</i></p><p><i>The network was seized in cooperation with the Lattakia Education Directorate, following close monitoring and detection of suspicious attempts. It was found that members of the network used small earphones, wireless communication devices, and mobile phones equipped with advanced transmission and reception technologies, which contradict educational values and violate the integrity of the examination process and the principle of justice.</i>”</p>
    <div>
      <h3>Venezuela </h3>
      <a href="#venezuela">
        
      </a>
    </div>
    <p>A slightly more unusual government directed shutdown took place in <a href="https://radar.cloudflare.com/ve"><u>Venezuela</u></a> on August 18 when Venezuelan provider <a href="https://radar.cloudflare.com/as22313"><u>SuperCable (AS22313)</u></a> ceased service. An <a href="https://x.com/vesinfiltro/status/1957601745321783746"><u>X post</u></a> from Venezuelan industry watcher <a href="https://vesinfiltro.org/"><u>VE sin Filtro</u></a> published a notification from <a href="https://conatel.gob.ve/"><u>CONATEL, the National Commission of Telecommunications in Venezuela</u></a>, that notified SuperCable that as of March 14, 2025, its authority to operate in the country had been revoked, and established a 60 day transition period so that users could find another provider. Another <a href="https://x.com/vesinfiltro/status/1957595268221632929"><u>X post from VE sin Filtro</u></a> shared an email that SuperCable subscribers received from the company announcing the end of the service and, and noted that half an hour after the email was sent, subscribers were left without Internet connectivity. Traffic began to fall at 15:00 UTC (11:00 local time), and was gone after 15:30 UTC (11:30 local time). Connectivity remained shut down through the end of the quarter.</p><p>Interestingly, we did not see a corresponding full loss of announced IP address space when traffic disappeared. However, such full losses did occur between <a href="https://radar.cloudflare.com/routing/as22313?dateStart=2025-08-17&amp;dateEnd=2025-08-23"><u>August 19-21</u></a>, and again briefly on <a href="https://radar.cloudflare.com/routing/as22313?dateStart=2025-09-14&amp;dateEnd=2025-09-20"><u>September 16</u></a>. The number of announced /24s (blocks of 256 IPv4 addresses) fell from 95 to 63 on <a href="https://radar.cloudflare.com/routing/as22313?dateStart=2025-09-24&amp;dateEnd=2025-09-30"><u>September 25</u></a>, and remained at that level through the end of the quarter.</p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>Similar to Syria, we covered the latest rounds of exam-related Internet shutdowns in <a href="https://radar.cloudflare.com/iq"><u>Iraq</u></a> in our <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/#iraq"><u>second quarter blog post</u></a>. In that post, we noted that the shutdowns in the main part of the country ran until July 3 for <a href="https://www.facebook.com/Iraq.Ministry.of.Education/posts/pfbid0a7VuMttRxdoGWwuaymy38LcZw9jscz3Dfxup4aUue2LeRBPuU2c7vnDsZKbgCkE2l"><u>preparatory school exams</u></a>, and through July 6 in the Kurdistan region. These can be seen in the graph below.</p><p>The <a href="https://pulse.internetsociety.org/en/shutdowns/exams-shutdown-kurdistan-iraq-25-august-2025/"><u>Kurdistan Regional Government in Iraq ordered Internet services to be suspended</u></a> on August 23 between 03:30 and 04:45 UTC (6:30-7:45 local time), and again every Saturday, Monday, and Wednesday until September 8 to prevent cheating on the <a href="https://www.kurdistan24.net/ckb/story/859388/%D9%88%DB%95%D8%B2%D8%A7%D8%B1%DB%95%D8%AA%DB%8C-%DA%AF%D9%88%D8%A7%D8%B3%D8%AA%D9%86%DB%95%D9%88%DB%95-%D9%84%DB%95-%DA%95%DB%86%DA%98%D8%A7%D9%86%DB%8C-%D8%AA%D8%A7%D9%82%DB%8C%DA%A9%D8%B1%D8%AF%D9%86%DB%95%D9%88%DB%95%DA%A9%D8%A7%D9%86%DB%8C-%D9%BE%DB%86%D9%84%DB%8C-12-%D9%87%DB%8E%DA%B5%DB%95%DA%A9%D8%A7%D9%86%DB%8C-%D8%A6%DB%8C%D9%86%D8%AA%DB%95%D8%B1%D9%86%DB%8E%D8%AA-%DA%95%D8%A7%D8%AF%DB%95%DA%AF%DB%8C%D8%B1%DB%8E%D9%86"><u>second round of grade 12 exams</u></a>. Similar to last quarter, <a href="https://radar.cloudflare.com/as206206"><u>KNET (AS206206)</u></a>, <a href="https://radar.cloudflare.com/as21277"><u>Newroz Telecom (AS21277)</u></a>, <a href="https://radar.cloudflare.com/as48492"><u>IQ Online (AS48492)</u></a>, and <a href="https://radar.cloudflare.com/as59625"><u>KorekTel (AS59625)</u></a> were impacted by the ordered shutdowns.</p><p>In the main part of the country, starting on August 26, the latest round of <a href="https://pulse.internetsociety.org/en/shutdowns/internet-shutdown-for-iraq-exam-26-august-2025/"><u>Internet shutdowns for high school exams</u></a> began, scheduled through September 13, taking place between 03:00-05:00 UTC (06:00-08:00 local time). Networks impacted by these shutdowns included <a href="https://radar.cloudflare.com/traffic/as199739"><u>Earthlink (AS199739)</u></a>, <a href="https://radar.cloudflare.com/traffic/as51684"><u>Asiacell (AS51684)</u></a>, <a href="https://radar.cloudflare.com/traffic/as59588"><u>Zainas (AS59588)</u></a>, <a href="https://radar.cloudflare.com/traffic/as58322"><u>Halasat (AS58322)</u></a>, and <a href="https://radar.cloudflare.com/traffic/as203214"><u>HulumTele (AS203214)</u></a>.</p>
    <div>
      <h3>Afghanistan</h3>
      <a href="#afghanistan">
        
      </a>
    </div>
    <p>In mid-September, the Taliban <a href="https://amu.tv/200798/"><u>ordered the shutdown of fiber optic Internet connectivity</u></a> in multiple provinces across <a href="https://radar.cloudflare.com/af"><u>Afghanistan</u></a>, as part of a drive to “prevent immorality”. It was the first such ban issued since the Taliban took full control of the country in August 2021. As many as <a href="https://amu.tv/200798/"><u>15 provinces</u></a> experienced shutdowns, and these regional shutdowns <a href="https://www.afghanstudiescenter.org/taliban-internet-shutdown-blocks-thousands-of-afghan-students-from-online-classes/"><u>blocked</u></a> Afghani students from attending online classes, <a href="https://theweek.com/world-news/afghanistan-taliban-high-speed-internet-women-education"><u>impacted</u></a> commerce and banking, and <a href="https://www.dw.com/en/afghanistan-whats-at-stake-as-taliban-cut-internet/a-74043564"><u>limited access</u></a> to government agencies and institutions such as passport and registration offices, customs offices.</p><p>Less than two weeks later, just after 11:30 UTC (16:00 local time) on Monday, September 29, 2025, subscribers of wired Internet providers in <a href="https://radar.cloudflare.com/traffic/af"><u>Afghanistan</u></a> experienced a <a href="https://x.com/CloudflareRadar/status/1972649804821057727"><u>brief service interruption</u></a>, lasting until just before 12:00 UTC (16:30 local time). Mobile providers <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=&amp;dt=1d&amp;asn=as131284&amp;compAsn=as38742&amp;timeCompare=2025-09-21"><u>Afghan Wireless (AS38472) and Etisalat (AS131284)</u></a> remained available during that period. However, just after 12:30 UTC (17:00 local time), the Internet was <a href="https://x.com/CloudflareRadar/status/1972682041759076637"><u>completely shut down</u></a>, taking the country completely offline.</p><p>These shutdowns are reviewed in more detail in our September 30 blog post, <a href="https://blog.cloudflare.com/nationwide-internet-shutdown-in-afghanistan/"><i><u>Nationwide Internet shutdown in Afghanistan extends localized disruptions</u></i></a>. Connectivity was restored around 11:45 UTC (16:15 local time) on October 1.</p>
    <div>
      <h2>Fiber optic cable damage</h2>
      <a href="#fiber-optic-cable-damage">
        
      </a>
    </div>
    
    <div>
      <h3>Dominican Republic</h3>
      <a href="#dominican-republic">
        
      </a>
    </div>
    <p>On July 7, a <a href="https://x.com/ClaroRD/status/1942286349006168091"><u>post on X from Claro</u></a> alerted subscribers to a service disruption caused by damage to two fiber optic cables. According to a <a href="https://x.com/ClaroRD/status/1942368212160516305"><u>subsequent post</u></a>, one was damaged by work being done by <a href="http://coraavega.gob.do"><u>CORAAVEGA</u></a> (La Vega Water And Sewerage Corporation) and the other by work being done by the Dominican Electric Transmission Company. As a result of the damage, traffic from <a href="https://radar.cloudflare.com/as6400"><u>Claro (AS6400)</u></a> began to drop just before 16:00 UTC (12:00 local time), falling just over two-thirds compared to the prior week. Claro’s technicians were able to quickly locate the faults and repair them, with traffic recovering around 18:00 UTC (14:00 local time).</p>
    <div>
      <h3>Angola</h3>
      <a href="#angola">
        
      </a>
    </div>
    <p>Between 12:45-15:45 UTC (13:45-16:45 local time) on July 19, users in <a href="https://radar.cloudflare.com/ao"><u>Angola</u></a> experienced an Internet disruption, with <a href="https://radar.cloudflare.com/as37119"><u>Unitel Angola (AS37119)</u></a> experiencing <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=as37119&amp;dt=2025-07-19_2025-07-19&amp;timeCompare=2025-07-12#query"><u>as much as a 95% drop in traffic</u></a> as compared to the previous week, and <a href="https://radar.cloudflare.com/traffic/as327932?dateStart=2025-07-19&amp;dateEnd=2025-07-19"><u>Connectis (AS327932)</u></a> suffering a complete outage. According to an <a href="https://x.com/unitelao/status/1946644209370358120"><u>X post from Unitel Angola</u></a>, it “<i>was caused by a disruption at our partner Angola Cables, resulting from public road works that affected the national fiber optic interconnections.</i>”</p><p>However, the timing of the disruption coincided with protests over the rise in diesel fuel prices, and local non-governmental organizations <a href="https://www.verangola.net/va/en/072025/Society/45242/Angolan-NGOs-consider-internet-shutdown-during-Saturday%27s-protests-a-dictatorial-measure.htm"><u>disputed</u></a> Unitel Angola’s explanation, <a href="https://myemail.constantcontact.com/STATEMENT-OF-REPUDIATION--ON-THE-INTERNET-SHUTDOWN-DURING-THE-DEMONSTRATIONS-OF-JULY-19-.html"><u>claiming</u></a> that it was actually due to a government-directed Internet shutdown. Multiple Angolan network providers experienced a drop in announced IP address space during the period the Internet disruption occurred, and analysis of routing information for these networks finds that they share <a href="https://radar.cloudflare.com/as37468"><u>Angola Cables (AS37468)</u></a> as an upstream provider, lending some credence to the explanation from Unitel Angola.</p>
    <div>
      <h3>Haiti</h3>
      <a href="#haiti">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/as27653"><u>Digicel Haiti (AS27653)</u></a> is no stranger to Internet disruptions caused by damage to both terrestrial and submarine cables, experiencing such problems during the <a href="https://blog.cloudflare.com/q1-2025-internet-disruption-summary/#haiti"><u>first</u></a> and <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/#digicel-haiti"><u>second</u></a> quarters of 2025, as well as <a href="https://blog.cloudflare.com/q1-2024-internet-disruption-summary/#digicel-haiti"><u>first</u></a>, <a href="https://blog.cloudflare.com/q2-2024-internet-disruption-summary/#haiti"><u>second</u></a>, and <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#haiti"><u>third</u></a> quarters of 2024. The most recent such disruption occurred on August 26, when they experienced two different cuts on their fiber optic infrastructure, <a href="https://x.com/jpbrun30/status/1960437559558869220"><u>according to an X post</u></a> from the company’s Director General. Traffic <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=as27653&amp;dt=2025-08-26_2025-08-26&amp;timeCompare=2025-08-19#result"><u>dropped by approximately 80%</u></a> during the disruption, which lasted from 19:30-23:00 UTC (15:30-19:00 UTC).</p>
    <div>
      <h3>Pakistan &amp; United Arab Emirates</h3>
      <a href="#pakistan-united-arab-emirates">
        
      </a>
    </div>
    <p>Telegeography’s <a href="https://www.submarinecablemap.com/"><u>Submarine Cable Map</u></a> shows that the Red Sea has a high density of submarine cables that carry data between Europe, Africa, and Asia. Cuts to these cables <a href="https://www.wired.com/story/houthi-internet-cables-ship-anchor-path/"><u>can significantly impact connectivity</u></a>, ranging from increased latency on international connections to complete outages. The impacts may only affect a single country, or they may disrupt multiple countries connected to a damaged cable. On September 6, <a href="https://radar.cloudflare.com/as17557"><u>Pakistan Telecom (AS17557)</u></a> <a href="https://x.com/PTCLOfficial/status/1964203180876521559"><u>posted a message on X</u></a> that stated “<i>We would like to inform that submarine cable cuts have occurred in Saudi waters near Jeddah, impacting partial bandwidth capacity on </i><a href="https://www.submarinecablemap.com/submarine-cable/seamewe-4"><i><u>SMW4</u></i></a><i> and </i><a href="https://www.submarinecablemap.com/submarine-cable/imewe"><i><u>IMEWE</u></i></a><i> systems. As a result, internet users in Pakistan may experience some service degradation during peak hours.</i>” (Initial reporting that the cable cuts occurred near Jeddah were apparently incorrect, as the <a href="https://www.linkedin.com/feed/update/urn:li:activity:7379509758598406144?commentUrn=urn%3Ali%3Acomment%3A%28activity%3A7379509758598406144%2C7379684775701245952%29&amp;dashCommentUrn=urn%3Ali%3Afsd_comment%3A%287379684775701245952%2Curn%3Ali%3Aactivity%3A7379509758598406144%29"><u>damage occurred in Yemeni waters</u></a>.)</p><p>Looking at the impact in Pakistan, we observed traffic drop by 25-30% in Sindh and Punjab between 12:00-20:00 UTC (17:00 - 01:00 local time).</p><p>In the <a href="https://radar.cloudflare.com/ae"><u>United Arab Emirates</u></a>, Etisalat alerted customers via <a href="https://x.com/eAndUAE/status/1964655864117346578"><u>a post on X</u></a> that they “<i>may experience slowness in data services due to an interruption in the international submarine cables.</i>” Between 11:00-22:00 UTC (15:00-02:00 local time) on September 6, traffic from <a href="https://radar.cloudflare.com/as8966"><u>AS8966 (Etisalat)</u></a> <a href="https://x.com/CloudflareRadar/status/1964727360764469339"><u>dropped as much as 28%</u></a>.</p><p>Also in the UAE, service provider <a href="https://radar.cloudflare.com/as15802"><u>du (AS15802)</u></a> told their customers via a post on X that “<i>You may experience some slowness in our data services due to an International submarine cable cut.</i>” This slowness is visible in Radar’s Internet quality metrics for the network between 11:00-22:00 UTC (15:00-02:00 local time) on September 6, with <a href="https://radar.cloudflare.com/quality/as15802?dateStart=2025-09-06&amp;dateEnd=2025-09-06#bandwidth"><u>median bandwidth</u></a> dropping by more than half, from 25 Mbps to as low as 9.8 Mbps, and <a href="https://radar.cloudflare.com/quality/as15802?dateStart=2025-09-06&amp;dateEnd=2025-09-06#latency"><u>median latency</u></a> doubling from 30 ms to over 60 ms.</p><p>The graphs below provide <a href="https://x.com/CloudflareRadar/status/1964817678541205758"><u>another view of the impact</u></a> of the cable cuts, based on Cloudflare network probes between New Delhi (del-c) to London (lhr-a) and Bombay (bom-c) to Frankfurt (fra-a). For the former pair of data centers, mean latency grew by approximately 20%, and for the latter pair, by approximately 30%, starting around 23:00 UTC on September 5. (The stable latency line at the bottom of both graphs represents probes going over the Cloudflare backbone, which was not impacted by the cable cuts.)</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/MqZmljASqeJlMQO4UFUDw/eb067e32492eecb151eb3d8f4db89bf4/image24.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5C9XAWuaBwASAibBbN5HV4/778c2ad24adaea37f3e0e04c59250fc3/image32.png" />
          </figure>
    <div>
      <h3>Texas, United States</h3>
      <a href="#texas-united-states">
        
      </a>
    </div>
    <p>Fiber optic cables are frequently damaged by errant ship anchors (submarine) or construction equipment (terrestrial), but on September 26, <a href="https://www.wfaa.com/article/tech/stray-bullet-caused-major-spectrum-outages-north-texas/287-e72cdefc-6a0a-4a1e-b181-6d02bc60b732"><u>a stray bullet damaged a cable</u></a> in the Dallas, Texas area, disrupting Internet connectivity for <a href="https://radar.cloudflare.com/as11427"><u>Spectrum (AS11427)</u></a> customers. Spectrum <a href="https://x.com/Ask_Spectrum/status/1971651914283851975"><u>acknowledged the service interruption</u></a> in a post on X, followed by <a href="https://x.com/Ask_Spectrum/status/1971722840279077229"><u>another post</u></a> four and a half hours later stating that the issue had been resolved. Although neither post cited the bullet as the cause of the disruption, <a href="https://www.wfaa.com/article/tech/stray-bullet-caused-major-spectrum-outages-north-texas/287-e72cdefc-6a0a-4a1e-b181-6d02bc60b732"><u>news reports</u></a> attributed the claim to a Spectrum spokesperson. Overall, the disruption was fairly nominal, lasting for just two hours between 18:00-20:00 UTC (13:00-15:00 local time), with traffic dropping less than 25% as compared to the prior week.</p>
    <div>
      <h3>South Africa</h3>
      <a href="#south-africa">
        
      </a>
    </div>
    <p>“Major cable breaks” disrupted Internet connectivity for customers of <a href="https://radar.cloudflare.com/as37457"><u>Telkom (AS37457)</u></a> in <a href="https://radar.cloudflare.com/za"><u>South Africa</u></a> on September 27. Although Telkom acknowledged the <a href="https://x.com/TelkomZA/status/1971901592413913294"><u>initial service disruption</u></a> and its <a href="https://x.com/TelkomZA/status/1971921589316080109"><u>subsequent resolution</u></a> in posts on X, it didn’t provide any information about the cause in these posts. However, it apparently later <a href="https://mybroadband.co.za/news/cellular/612245-telkom-network-suffers-national-outage.html"><u>issued a statement</u></a>, stating “<i>Telkom confirms that mobile voice and data services, which were disrupted earlier on Saturday due to major cable breaks, have now been fully restored nationwide.</i>” The disruption lasted six hours, from 08:00-14:00 UTC (10:00-16:00 local time), with traffic dropping as much as 50% as compared to the previous week.</p>
    <div>
      <h2>Power outages cause Internet disruptions</h2>
      <a href="#power-outages-cause-internet-disruptions">
        
      </a>
    </div>
    
    <div>
      <h3>Tanzania</h3>
      <a href="#tanzania">
        
      </a>
    </div>
    <p>A reported <a href="https://x.com/airtel_tanzania/status/1940072844446359845"><u>power outage at one of Airtel Tanzania's data centers</u></a> on July 1 resulted in a multi-hour disruption in connectivity for its mobile customers. The service interruption occurred between 11:30-18:00 UTC (14:30-21:00 local time), with traffic dropping on <a href="https://radar.cloudflare.com/as37133"><u>Airtel Tanzania (AS37133)</u></a> by as much as 40% as compared to the previous week.</p>
    <div>
      <h3>Czech Republic</h3>
      <a href="#czech-republic">
        
      </a>
    </div>
    <p>According to the Industry and Trade Ministry in the <a href="https://radar.cloudflare.com/cz"><u>Czech Republic</u></a>, <a href="https://www.reuters.com/world/europe/czech-republic-hit-by-major-power-outage-2025-07-04/"><u>a fallen power cable caused a widespread power outage</u></a> on July 4. This power outage impacted Internet connectivity within the country, with <a href="https://x.com/CloudflareRadar/status/1941237676730089797"><u>traffic dropping</u></a> by as much as 32%. Traffic fell just after the power outage began at 10:00 UTC (12:00 local time), and although it was <a href="https://www.reuters.com/world/europe/czech-republic-hit-by-major-power-outage-2025-07-04/"><u>“nearly fully resolved”</u></a> by 16:00 UTC (18:00 local time), traffic did not return to expected levels until closer to 20:00 UTC (22:00 local time). This trailing traffic recovery aligns with a <a href="https://www.expats.cz/czech-news/article/czechia-picks-up-the-pieces-after-power-outage-why-it-happened-and-what-the-future-holds"><u>published report</u></a> that noted “<i>While ČEPS, the national transmission system operator, restored full grid functionality by mid-afternoon, tens of thousands remained without electricity into the evening.</i>”</p>
    <div>
      <h3>St. Vincent and the Grenadines</h3>
      <a href="#st-vincent-and-the-grenadines">
        
      </a>
    </div>
    <p>On <a href="https://radar.cloudflare.com/vc"><u>St. Vincent and the Grenadines</u></a>, the St Vincent Electricity Services Limited (VINLEC) <a href="https://www.facebook.com/VINLECSVG/posts/st-vincent-electricity-services-limited-vinlec-experienced-a-system-failure-at-a/1308214567765820/"><u>stated in a Facebook post</u></a> that a “system failure” caused a power outage that affected customers on mainland St. Vincent. According to <a href="https://www.vinlec.com/"><u>VINLEC</u></a>, the system failed at approximately 11:30 local time on August 16 (03:30 UTC on August 17), and power was restored to all customers just after 04:00 local time on August 17 (08:00 UTC). During the four-hour power outage, which also disrupted Internet connectivity, traffic dropped by as much as 80% below expected levels.</p>
    <div>
      <h3>Curaçao</h3>
      <a href="#curacao">
        
      </a>
    </div>
    <p>In <a href="https://radar.cloudflare.com/cw"><u>Curaçao</u></a>, a series of Facebook posts from <a href="https://www.aqualectra.com/"><u>Aqualectra</u></a>, the island’s water and power company, <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02wBV7CqovjuSTX52NCpYVqKAjzGkgoAurCUVnrVDCqKEA8hNpyRoh96SaGTUQ7C8Ll"><u>confirmed</u></a> that there was a power outage, and provided updates on the <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid017xNQW9sbLnmXEHo3y8mU22cbKtdzYXoKfVL7fFJ1pomMTHitty5wg5ZjN1YnMDgl"><u>progress</u></a> towards <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid021MAkFoaSVZiN8inieUxryV3ACVhZy1bjkSmp5MgG5PgceSWZ1X6i6SJAD7z1gM32l"><u>restoration</u></a>. The impact of the power outage to Internet connectivity was visible in traffic disruptions across several Internet service providers, including <a href="https://radar.cloudflare.com/as52233"><u>Flow (AS52233)</u></a> and <a href="https://radar.cloudflare.com/as11081"><u>UTS (AS11081)</u></a>. The observed disruptions lasted for most of the day, with traffic dropping around 06:45 UTC (02:45 local time) and recovering to expected levels around 23:45 UTC (19:45 local time). During the disruption, <a href="https://bsky.app/profile/radar.cloudflare.com/post/3lxf4cn53cv2p"><u>the country's traffic dropped by over 80%</u></a> as compared to the previous week, with Flow experiencing a near complete outage.</p>
    <div>
      <h3>Cuba</h3>
      <a href="#cuba">
        
      </a>
    </div>
    <p>Wide-scale power outages occur all too frequently in <a href="https://radar.cloudflare.com/cu"><u>Cuba</u></a>, and when power is lost, Internet connectivity follows. We have <a href="https://www.google.com/search?q=cuba+power+outage+site%3Ablog.cloudflare.com"><u>covered many such events in this series of blog posts</u></a> over the last several years, and the latest occurred on September 10. That morning, <a href="https://x.com/OSDE_UNE/status/1965770929675608214"><u>an X post</u></a> from the <a href="https://www.unionelectrica.cu/"><u>Unión Eléctrica de Cuba</u></a> reported the collapse of the national electric power system at 09:14 local time (13:14 UTC) following the unexpected shutdown of the <a href="https://www.gem.wiki/Antonio_Guiteras_Thermoelectric_Power_Plant_(CTE)"><u>Antonio Guiteras Thermoelectric Power Plant (CTE)</u></a>. The island’s Internet traffic dropped by nearly 60% (as compared to expected levels) almost immediately, and remained lower than normal for over a day, returning to expected levels around 17:15 UTC on September 11 (13:15 local time) when the Ministerio de Energía y Minas de Cuba <a href="https://x.com/EnergiaMinasCub/status/1966191043952410754"><u>posted on X</u></a> that the national electric system had been restored.</p>
    <div>
      <h3>Gibraltar</h3>
      <a href="#gibraltar">
        
      </a>
    </div>
    <p>A contractor cutting through three high voltage cables caused a nationwide power outage in <a href="https://radar.cloudflare.com/gi"><u>Gibraltar</u></a> on September 16, according to a <a href="https://www.facebook.com/gibraltargovernment/posts/pfbid0ZDLtEtVEYwSgKGn6J3eWgvneMo1mhB6cTrhHpTgLKhguL9ZqB5qfT4ijrUDsqFhrl"><u>Facebook post from the Gibraltar government</u></a>. This power outage resulted in a disruption to Internet traffic between 11:15-18:30 UTC (13:15-20:30 local time), <a href="https://bsky.app/profile/radar.cloudflare.com/post/3lyykvuty7c2s"><u>falling as low as 80%</u></a> below the previous week.</p>
    <div>
      <h2>Earthquake</h2>
      <a href="#earthquake">
        
      </a>
    </div>
    
    <div>
      <h3>Kamchatka Peninsula, Russia</h3>
      <a href="#kamchatka-peninsula-russia">
        
      </a>
    </div>
    <p>A <a href="https://earthquake.usgs.gov/earthquakes/eventpage/us6000qw60/executive"><u>magnitude 8.8 earthquake</u></a> struck the <a href="https://radar.cloudflare.com/traffic/2125072"><u>Kamchatka Peninsula</u></a> in <a href="https://radar.cloudflare.com/ru"><u>Russia</u></a> at 23:24 UTC on July 29 (11:24 local time on July 30), and was powerful enough to trigger <a href="https://www.reuters.com/business/environment/huge-quake-russia-triggers-tsunami-warnings-around-pacific-2025-07-30/"><u>tsunami warnings</u></a> for <a href="https://radar.cloudflare.com/jp"><u>Japan</u></a>, <a href="https://radar.cloudflare.com/traffic/5879092"><u>Alaska</u></a>, <a href="https://radar.cloudflare.com/traffic/5855797"><u>Hawaii</u></a>, <a href="https://radar.cloudflare.com/gu"><u>Guam</u></a>, and other Russian regions. The graphs below show that there was an immediate impact to Internet traffic across several networks in the region, including <a href="https://radar.cloudflare.com/as12389"><u>Rostelecom (AS12389)</u></a> and <a href="https://radar.cloudflare.com/as42742"><u>InterkamService (AS42742)</u></a>, where traffic dropped by 75% or more. While traffic started to recover almost immediately across both providers, traffic on Rostelecom approached expected levels much more quickly than on InterkamService.</p>
    <div>
      <h2>Targeted cyberattack</h2>
      <a href="#targeted-cyberattack">
        
      </a>
    </div>
    
    <div>
      <h3>Yemen</h3>
      <a href="#yemen">
        
      </a>
    </div>
    <p>A <a href="https://www.yemenmonitor.com/en/Details/ArtMID/908/ArticleID/147420"><u>cyberattack targeting Houthi-controlled YemenNet</u></a> <a href="https://radar.cloudflare.com/as30873"><u>(AS30873)</u></a> on August 11 briefly disrupted connectivity across the network in <a href="https://radar.cloudflare.com/ye"><u>Yemen</u></a>. A significant drop in traffic occurred at around 14:15 UTC (17:15 local time), recovering by 15:00 UTC (18:00 local time). This observed drop in traffic aligns with the reported timing and duration of the attack, which was focused on YemenNet’s ADSL infrastructure.</p><p>The attack also apparently impacted YemenNet’s routing, as announced IPv4 address space began to decline as the attack commenced. Although the attack ended within an hour after it started, announced address space remained depressed for approximately an additional hour, reaching as low as 510 /24s (blocks of 256 IPv4 addresses) being announced, down from a “steady state” of 870 /24s.</p>
    <div>
      <h2>Fire causes infrastructure damage</h2>
      <a href="#fire-causes-infrastructure-damage">
        
      </a>
    </div>
    
    <div>
      <h3>Egypt</h3>
      <a href="#egypt">
        
      </a>
    </div>
    <p>A <a href="https://english.alarabiya.net/News/north-africa/2025/07/07/a-fire-at-a-telecom-company-in-cairo-injures-14-and-temporarily-disrupts-service"><u>fire at the Ramses Central Exchange in Cairo, Egypt</u></a> on July 7 disrupted telecommunications services for a number of providers with infrastructure in the facility. The fire broke out in a Telecom Egypt equipment room, and impacted connectivity across multiple providers, including <a href="https://radar.cloudflare.com/as36992"><u>Etisalat (AS36992)</u></a>, <a href="https://radar.cloudflare.com/as37069"><u>Mobinil (AS37069)</u></a>, <a href="https://radar.cloudflare.com/as24863"><u>Orange Egypt (AS24863)</u></a>, and <a href="https://radar.cloudflare.com/as24835"><u>Vodafone Egypt (AS24835)</u></a>. Internet traffic across these providers initially dropped at 14:30 UTC (17:30 local time). Recovery to expected levels varied across the providers, with Etisalat recovering by July 9, Vodafone and Mobinil by July 10, and Orange Egypt on July 11.</p><p>On July 10, Telecom Egypt <a href="https://www.zawya.com/en/economy/north-africa/telecom-egypt-restores-services-after-ramses-central-fire-s2msr114"><u>announced</u></a> that services affected by the fire had been restored, after operations were transferred to alternative exchanges.</p>
    <div>
      <h2>Technical problems</h2>
      <a href="#technical-problems">
        
      </a>
    </div>
    
    <div>
      <h3>Starlink</h3>
      <a href="#starlink">
        
      </a>
    </div>
    <p>Global satellite Internet service provider <a href="https://radar.cloudflare.com/as14593"><u>Starlink (AS14593)</u></a> acknowledged a July 24 network outage through a <a href="https://x.com/Starlink/status/1948474586699571518"><u>post on X</u></a>. The Vice President of Network Engineering at SpaceX explained, in a <a href="https://x.com/michaelnicollsx/status/1948509258024452488"><u>subsequent X post</u></a>, that “<i>The outage was due to failure of key internal software services that operate the core network.</i>”</p><p>Traffic initially dropped around 19:15 UTC, and the disruption lasted approximately 2.5 hours. The impact of the Starlink outage was particularly noticeable in countries including <a href="https://x.com/CloudflareRadar/status/1948491791574986771"><u>Yemen and Sudan</u></a>, where traffic dropped by approximately 50%, as well as in <a href="https://x.com/CloudflareRadar/status/1948497510235820236"><u>Zimbabwe, South Sudan, and Chad</u></a>.</p>
    <div>
      <h3>China</h3>
      <a href="#china">
        
      </a>
    </div>
    <p>At around 16:30 UTC on August 19 (00:30 local time on August 20), we observed an anomalous 25% drop in <a href="https://radar.cloudflare.com/cn"><u>China’s</u></a> Internet traffic. Our analysis of related metrics found that this disruption caused a drop in the share of IPv4 traffic, as well as a spike in the share of HTTP traffic (meaning that HTTPS traffic share had fallen), as shown in the graphs below.</p><p>Further analysis also found the share of <a href="https://blog.cloudflare.com/tcp-resets-timeouts/#sources-of-anomalous-connections"><u>TCP connections terminated in the Post SYN stage</u></a> doubled during the observed outage, from 39% to 78%, as shown below. The cause of these unusual observations was ultimately uncovered by a <a href="https://gfw.report/blog/gfw_unconditional_rst_20250820/en/"><u>Great Firewall Report blog post</u></a>, which stated, in part: “<i>Between approximately 00:34 and 01:48 (Beijing Time, UTC+8) on August 20, 2025, the Great Firewall of China (GFW) exhibited anomalous behavior by unconditionally injecting forged TCP RST+ACK packets to disrupt all connections on TCP port 443. This incident caused massive disruption of the Internet connections between China and the rest of the world. … The responsible device does not match the fingerprints of any known GFW devices, suggesting that </i><b><i>the incident was caused by either a new GFW device or a known device operating in a novel or misconfigured state</i></b><i>.</i>” This explanation is consistent with the anomalies visible in the Radar graphs.</p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>Subscribers of <a href="https://radar.cloudflare.com/as23674"><u>Nayatel (AS23674)</u></a> experienced an approximately 90 minute disruption to Internet connectivity on September 24, due to a <a href="https://x.com/nayatelpk/status/1970791157404954809"><u>reported outage at an upstream provider</u></a>. Traffic dropped as much as 57% between around 09:15-10:45 UTC (14:15-15:45 local). <a href="https://radar.cloudflare.com/as38193"><u>Transworld (AS38193)</u></a> is one of several <a href="https://radar.cloudflare.com/routing/as23674?dateStart=2025-09-24&amp;dateEnd=2025-09-24#connectivity"><u>upstream providers</u></a> to Nayatel, and a more significant drop in traffic is visible for that network, lasting from around 09:15-12:15 UTC (14:15-17:15 local time). The Nayatel disruption was likely less significant than the one seen at Transworld because Transworld is upstream of only a portion of the prefixes originated by Nayatel — traffic from other Nayatel prefixes was carried by other providers that remained available.</p>
    <div>
      <h2>No definitive cause</h2>
      <a href="#no-definitive-cause">
        
      </a>
    </div>
    
    <div>
      <h3>Iran</h3>
      <a href="#iran">
        
      </a>
    </div>
    <p>Several weeks after experiencing a <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/#iran"><u>full Internet shutdown</u></a>, <a href="https://radar.cloudflare.com/ir"><u>Iran</u></a> again experienced a sudden drop in Internet traffic around 21:00 UTC on July 5 (00:30 local time on July 6), with <a href="https://x.com/CloudflareRadar/status/1941640046005617038"><u>traffic falling 80%</u></a> as compared to the prior week. While most of the “unknown” disruptions covered in this series of posts are observed but have no associated acknowledgement or explanation, this disruption had multiple competing explanations.</p><p>A <a href="https://www.iranintl.com/en/202507067645"><u>published report</u></a> noted “<i>IRNA, Iran’s official news agency, cited the state-run Telecommunications Infrastructure Company, reporting a national-level disruption in international connectivity that affected most internet service providers Saturday night. Yet government officials have not publicly addressed the cause.</i>” However, posts from civil society groups that follow Internet connectivity in Iran (<a href="https://github.com/net4people/bbs/issues/497"><u>net4people</u></a>, <a href="https://x.com/filterbaan/status/1941628644125724793"><u>FilterWatch</u></a>) suggested that the disruption was again due to an intentional shutdown. And a <a href="https://x.com/filterbaan/status/1941628644125724793"><u>post thread on X</u></a> referenced, and disputed, a claim that the disruption was due to a DDoS attack. Unfortunately, no definitive root cause for this disruption could be found.</p>
    <div>
      <h3>Colombia</h3>
      <a href="#colombia">
        
      </a>
    </div>
    <p>Customers of Claro Colombia experienced an Internet disruption that lasted just over 30 minutes on August 6, with <a href="https://x.com/CloudflareRadar/status/1953168943423864954"><u>traffic falling two-thirds or more</u></a> as compared to the prior week between 16:45 - 17:20 UTC. The disruption affected multiple ASNs owned by Claro, including <a href="https://radar.cloudflare.com/as10620"><u>AS10620</u></a>, <a href="https://radar.cloudflare.com/as14080"><u>AS14080</u></a>, and <a href="https://radar.cloudflare.com/as26611"><u>AS26611</u></a>. (The Telmex Colombia and Comcel names shown in the graphs below are historical – Telmex and Comcel <a href="https://es.wikipedia.org/wiki/Claro_(Colombia)"><u>merged in 2012</u></a> and have operated under the Claro brand since then.) Claro did not acknowledge the disruption on social media, nor did it provide any explanation for it.</p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>A near-complete outage at <a href="https://radar.cloudflare.com/pk"><u>Pakistani</u></a> backbone provider <a href="https://radar.cloudflare.com/as17557"><u>PTCL (AS17557)</u></a> caused traffic from the network provider to drop 90% at 16:10 UTC (21:10 local time) on August 19. PTCL acknowledged the issue in a <a href="https://x.com/PTCLOfficial/status/1957873019084255347"><u>post on X</u></a>, noting “<i>We are currently facing data connectivity challenges on our PTCL and Ufone services.</i>” Although they <a href="https://x.com/PTCLOfficial/status/1957977425377391076"><u>published a subsequent post</u></a> several hours later after service was restored, they did not provide any additional information about the cause of the outage. However, <a href="https://bloompakistan.com/nationwide-internet-disruption-hits-pakistan-ptcl-ufone-nayatel-services-severely-affected/"><u>one published report</u></a> claimed “<i>The disruption was primarily caused by a technical fault in PTCL’s fiber optic infrastructure.</i>” while <a href="https://bloompakistan.com/nationwide-internet-disruption-hits-pakistan-ptcl-ufone-nayatel-services-severely-affected/"><u>another report</u></a> claimed “<i>According to industry sources, the internet disruption in Pakistan may be connected to a technical fault in the fiber optic backbone or issues with main internet providers responsible for international online traffic.</i></p><p>Interestingly, <a href="https://radar.cloudflare.com/dns/as17557?dateStart=2025-08-19&amp;dateEnd=2025-08-19#dns-query-volume"><u>traffic from PTCL to Cloudflare’s 1.1.1.1 DNS resolver</u></a> spiked as the outage began, and the <a href="https://radar.cloudflare.com/dns/as17557?dateStart=2025-08-19&amp;dateEnd=2025-08-19#dns-transport-protocol"><u>share of requests made over UDP</u></a> grew from 94% to 99%. In addition, <a href="https://radar.cloudflare.com/routing/as17557?dateStart=2025-08-19&amp;dateEnd=2025-08-19"><u>routing data</u></a> shows that there was also a small drop in announced IPv4 address space coincident with the outage. However, these additional observations do not necessarily confirm a “technical fault in PTCL’s fiber optic infrastructure” as the ultimate cause of the disruption.</p>
    <div>
      <h3>South Africa</h3>
      <a href="#south-africa">
        
      </a>
    </div>
    <p>To their credit, <a href="https://radar.cloudflare.com/za"><u>South African</u></a> provider <a href="https://radar.cloudflare.com/as37053"><u>RSAWEB (AS37053)</u></a> <a href="https://netnotice.rsaweb.co.za/cmfe4mzqc0001ngqrbyfq0waj"><u>quickly acknowledged an issue</u></a> with their FTTx and Enterprise connectivity on September 10, but neither their initial post nor subsequent updates provided any information on the cause of the problem. Whatever the cause, it resulted in a near-complete loss of Internet traffic from RSAWEB between 15:00 and 16:30 UTC (17:00 - 18:30 local time).</p>Routing data also shows a loss of just two announced /24 address blocks concurrent with the outage, dropping from 470 to 468. Unless all of RSAWEB’s outbound traffic was flowing through this limited amount of IP address space, it seems unusual that the withdrawal of just 512 IPv4 addresses from the=e routing table would have such a significant impact on the network’s traffic.<p></p>
    <div>
      <h3>SpaceX Starlink</h3>
      <a href="#spacex-starlink">
        
      </a>
    </div>
    <p>After experiencing a <a href="#starlink"><u>brief disruption in July</u></a> due to a software failure, <a href="https://radar.cloudflare.com/as14593"><u>Starlink (AS14593)</u></a> suffered another short disruption between 04:00-05:00 UTC on September 15. Although Starlink generally acknowledges disruptions to their global network on <a href="https://x.com/Starlink"><u>their X account</u></a>, and often providing a root cause, in this case they <a href="https://www.datacenterdynamics.com/en/news/starlink-suffers-brief-monday-outage-globally/"><u>apparently published an acknowledgement</u></a> on X, but deleted it after the issue was resolved. In addition to the drop in traffic, we observed a concurrent drop in announced IPv4 address space and spike in BGP announcements (likely withdrawals), suggesting that the disruption may have been caused by a network-related issue.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>The recent <a href="https://blog.cloudflare.com/new-regional-internet-traffic-and-certificate-transparency-insights-on-radar/"><u>launch of regional traffic insights</u></a> on Radar brings yet another perspective to our ability to investigate observed Internet traffic anomalies. We can now drill down at regional and network levels, as well as exploring the impact across DNS traffic, connection bandwidth and latency, TCP connection tampering, and announced IP address space, helping us understand the impact of such events. And while these blog posts feature graphs from <a href="https://radar.cloudflare.com/"><u>Radar</u></a> and the <a href="https://radar.cloudflare.com/explorer"><u>Radar Data Explorer</u></a>, the underlying data is available from our <a href="https://developers.cloudflare.com/api/resources/radar/"><u>rich API</u></a>. You can use the API to retrieve data to do your own local monitoring or analysis, or the <a href="https://github.com/cloudflare/mcp-server-cloudflare/tree/main/apps/radar#cloudflare-radar-mcp-server-"><u>Radar MCP server</u></a> to incorporate Radar data into your AI tools.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a><u>email</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <category><![CDATA[Internet Trends]]></category>
            <guid isPermaLink="false">6d4g6SeHoMoMsnUve0rdrq</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Nationwide Internet shutdown in Afghanistan extends localized disruptions]]></title>
            <link>https://blog.cloudflare.com/nationwide-internet-shutdown-in-afghanistan/</link>
            <pubDate>Tue, 30 Sep 2025 10:05:00 GMT</pubDate>
            <description><![CDATA[ On September 29, 2025, Internet connectivity was completely shut down across Afghanistan, impacting business, education, finance, and government services. ]]></description>
            <content:encoded><![CDATA[ <p>Just after 11:30 UTC (16:00 local time) on Monday, September 29, 2025, subscribers of wired Internet providers in <a href="https://radar.cloudflare.com/traffic/af"><u>Afghanistan</u></a> experienced a <a href="https://x.com/CloudflareRadar/status/1972649804821057727"><u>brief service interruption</u></a>, lasting until just before 12:00 UTC (16:30 local time). Cloudflare <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=&amp;dt=1d&amp;asn=as131284&amp;compAsn=as38742&amp;timeCompare=2025-09-21"><u>traffic data for AS38472 (Afghan Wireless) and AS131284 (Etisalat)</u></a> shows that traffic from these mobile providers remained available during that period.</p><p>However, just after 12:30 UTC (17:00 local time), the Internet was <a href="https://x.com/CloudflareRadar/status/1972682041759076637"><u>completely shut down</u></a>, with Afghani news outlet TOLOnews initially <a href="https://x.com/TOLONewsEnglish/status/1972641017745588605"><u>reporting in a post on X</u></a> that “<i>Sources have confirmed to TOLOnews that today (Monday), afternoon, fiber-optic Internet will be shut down across the country.</i>” This shutdown is likely an extension of the regional shutdowns of fiber optic connections that took place earlier in September, and it will <a href="https://www.dw.com/en/afghanistan-taliban-shuts-down-internet-indefinitely/a-74181089"><u>reportedly</u></a> remain in force “until further notice”. (The earlier regional shutdowns are discussed in more detail below.)</p><p>While Monday’s first shutdown was only partial, with mobile connectivity apparently remaining available, the graphs below show that the second event took the country completely offline, with <a href="https://radar.cloudflare.com/traffic/af?dateStart=2025-09-29&amp;dateEnd=2025-09-29#traffic-trends"><u>web</u></a> and <a href="https://radar.cloudflare.com/dns/af?dateStart=2025-09-29&amp;dateEnd=2025-09-29#dns-query-volume"><u>DNS</u></a> traffic dropping to zero at a national level, as seen in the graphs below.</p><p>While the shutdown will impact subscribers to fixed and mobile Internet services, it also “<a href="https://www.turkiyetoday.com/world/afghanistan-descends-into-total-communications-blackout-under-taliban-order-3207737"><u>threatens to paralyze critical services including banking, customs operations and emergency communications</u></a>” across the country. The <a href="https://x.com/TOLONewsEnglish/status/1972641017745588605"><u>X post from TOLOnews</u></a> also noted that television and radio networks would face disruptions.</p><p>HTTP request traffic is traffic coming from web browsers, applications, and automated tools, and is a clear signal of the availability of Internet connectivity. The graph below shows this request volume dropping sharply as the shutdown was implemented.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6x0Wdv7U6SzS7jXrfQuETT/135e0e512741c79e969e4e34800f02d7/image9.png" />
          </figure><p><sup><i>HTTP request traffic from Afghanistan, September 29, 2025</i></sup></p><p>Cloudflare sends bytes back in response to those HTTP requests (“HTTP bytes”), as well as sending bytes back in response to traffic associated with other services, such as our <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a>, <a href="https://www.cloudflare.com/application-services/products/dns/"><u>authoritative DNS</u></a>, <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/"><u>WARP</u></a>, etc. (“total bytes”). Cloudflare stopped receiving client traffic from the services when the shutdown began, causing the bytes transferred in response to drop to zero.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3qDezs9ngevvCWvDiCAG2C/1c21c568ca730fa0f5fc15964c619c2b/image6.png" />
          </figure><p><sup><i>Internet traffic from Afghanistan, September 29, 2025</i></sup></p><p><a href="https://1.1.1.1/dns"><u>1.1.1.1</u></a> is Cloudflare’s privacy-focused DNS resolver, and processes DNS lookup requests from clients. As connectivity was cut, traffic to the service disappeared.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pSshBSiJVVwJs8Ro8DAv0/eb77f8e08299c58155ffb4dccad8ac01/image10.png" />
          </figure><p><sup><i>DNS query traffic to Cloudflare’s 1.1.1.1 resolver from Afghanistan, September 29, 2025</i></sup></p><p>At a <a href="https://radar.cloudflare.com/traffic/af?dateStart=2025-09-29&amp;dateEnd=2025-09-29#traffic-volume-by-region"><u>regional</u></a> level, it appears that traffic from Kabul fell slightly later than traffic from the other regions, trailing them by approximately a half hour.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5l9bImRqxgDdWGOHXCKgYC/b4c6e0eae1b314ce750c4aa6581c3321/image12.png" />
          </figure><p><sup><i>HTTP request traffic from the top five provinces in Afghanistan, September 29, 2025</i></sup></p><p>The delay in traffic loss seen in Kabul may be associated with a more gradual loss of traffic seen at <a href="https://radar.cloudflare.com/AS38742"><u>AS38742 (Afghan Wireless)</u></a>, which saw traffic approach zero just after 13:00 UTC (17:30 local time). This conjecture is supported by a <a href="https://kabulnow.com/2025/09/taliban-order-nationwide-shutdown-of-internet-and-mobile-services-in-afghanistan/"><u>published report</u></a> that noted “Residents across Kabul and several provincial cities reported on Monday that fiber-optic services were no longer available, with only limited mobile data functioning briefly before signal towers stopped working altogether.”</p><p>Interestingly, it appears that as of 00:00 UTC (04:30 local time) on September 30, we continue to see a very small amount of traffic from this network. (This is in contrast to other networks, whose lines disappeared from the graph around 12:30 UTC (17:00 local time)).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MMrOcXD5yg4GSDT9Y1p08/31de2f6c92043241db214e982a89556c/image7.png" />
          </figure><p><sup><i>HTTP request traffic from the top 10 ASNs in Afghanistan, September 29, 2025</i></sup></p><p>Network providers announce IP address space that they are responsible for to other networks, enabling the routing of traffic to and from those IP addresses. When these announcements are withdrawn, the resources in that address space, whether clients or servers, can no longer reach, or are no longer reachable from, the rest of the Internet.</p><p>In Afghanistan, announced IPv4 address space dropped rapidly as the shutdown was implemented, falling by two-thirds from 604 to 197 announced /24s (blocks of 256 IPv4 addresses) in the first 20 minutes, and then dropping further over the next 90 minutes. Through the end of the day, several networks continued to announce a small amount of IPv4 address space: four /24s from <a href="https://radar.cloudflare.com/AS38742"><u>AS38742 (Afghan Wireless)</u></a>, two from <a href="https://radar.cloudflare.com/AS149024"><u>AS149024 (Afghan Bawar ICT Services)</u></a>, and one each from <a href="https://radar.cloudflare.com/AS138322"><u>AS138322 (Afghan Wireless)</u></a> and <a href="https://radar.cloudflare.com/AS136479"><u>AS136479 (Cyber Telecom)</u></a>.</p><p>Afghan Wireless is a mobile connectivity provider, and <a href="http://afghanbawar.com/"><u>Afghan Bawar</u></a> and <a href="https://cts.af/about-us/"><u>Cyber Telecom</u></a> appear to offer wireless/mobile services as well. The <a href="https://radar.cloudflare.com/routing/prefix/152.36.203.0/24"><u>prefixes</u></a> still visible from Afghan Wireless appear to be routed through <a href="https://radar.cloudflare.com/as17557"><u>AS17557 (Pakistan Telecom)</u></a>, while the prefixes from the other two providers (<a href="https://radar.cloudflare.com/routing/prefix/163.223.180.0/23"><u>Afghan Bawar</u></a>, <a href="https://radar.cloudflare.com/routing/prefix/103.126.5.0/24"><u>Cyber Telecom</u></a>) appear to be routed through <a href="https://radar.cloudflare.com/as40676"><u>AS40676 (Psychz Networks)</u></a>, a US-based solutions provider.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/11yzruult8bJD7p15lEwiG/e19f71e771f8c1162717b75675ecf94e/image5.png" />
          </figure><p><sup><i>Announced IPv4 address space from Afghanistan, September 29, 2025</i></sup></p><p>Announced IPv6 address space fell as well, though not quite as catastrophically, dropping by three-fourths almost immediately, from 262,407 /48s (blocks of over 1.2 septillion IPv6 addresses) to 65,542.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1s5p2v84LAyw1igdAKuaNT/4c597dca9a55c4f4a8a9c69c60e8a022/image1.png" />
          </figure><p><sup><i>Announced IPv6 address space from Afghanistan, September 29, 2025</i></sup></p>
    <div>
      <h3>Regional shutdowns by the Taliban to prevent “immoral activities”</h3>
      <a href="#regional-shutdowns-by-the-taliban-to-prevent-immoral-activities">
        
      </a>
    </div>
    <p>In mid-September, the Taliban <a href="https://amu.tv/200798/"><u>ordered the shutdown of fiber optic Internet connectivity</u></a> in multiple provinces across Afghanistan, as part of a drive to “prevent immorality”. It was the first such ban issued since the Taliban took full control of the country in August 2021.</p><p>These regional shutdowns <a href="https://www.afghanstudiescenter.org/taliban-internet-shutdown-blocks-thousands-of-afghan-students-from-online-classes/"><u>blocked</u></a> Afghani students from attending online classes, <a href="https://theweek.com/world-news/afghanistan-taliban-high-speed-internet-women-education"><u>impacted</u></a> commerce and banking, and <a href="https://www.dw.com/en/afghanistan-whats-at-stake-as-taliban-cut-internet/a-74043564"><u>limited access</u></a> to government agencies and institutions such as passport and registration offices, customs offices. As many as <a href="https://amu.tv/200798/"><u>15 provinces</u></a> experienced shutdowns, and we review the observed impacts across several of them below, using the regional traffic data <a href="https://blog.cloudflare.com/new-regional-internet-traffic-and-certificate-transparency-insights-on-radar/"><u>recently made available</u></a> on Cloudflare Radar.</p><p><a href="https://radar.cloudflare.com/traffic/1147288?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Balkh</u></a> appeared to be one of the earliest targeted provinces, with traffic dropping midday (UTC) on September 15. While some nominal recovery occurred on September 23, traffic remained well below pre-shutdown levels.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1t0mFLkPjixHM9m7NWnMha/d855d9dc8301dae33e3ec7abb4f9232c/image2.png" />
          </figure><p><sup><i>Internet traffic from Balkh, Afghanistan, September 1-28, 2025</i></sup></p><p>After several days of peak traffic levels double those seen in previous weeks, traffic in <a href="https://radar.cloudflare.com/traffic/1123230?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Takhar</u></a> fell on September 16, remaining near zero until September 21, when a small amount of connectivity was apparently restored.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3l7wfMGBMt8pOVxFb3NvvX/b99ad045b8a2eb0a55f25d3f448fe29e/image8.png" />
          </figure><p><sup><i>Internet traffic from Takhar, Afghanistan, September 1-28, 2025</i></sup></p><p>In <a href="https://radar.cloudflare.com/traffic/1138335?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Kandahar</u></a>, lower peak traffic volumes are visible between September 17 and September 21. The partial restoration of traffic is coincident with the restoration of Internet services highlighted in a <a href="https://menafn.com/1110093436/Internet-Services-Restored-in-Some-Areas-of-Afghanistans-Kandahar"><u>published report</u></a>, though it notes that “The restoration of services is limited to point-to-point connections for key government offices, including banks, customs offices, and the Directorate for National ID Cards.”</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6lzuyfuIoH76wzw8wpNR7n/e3d2baf026e9ab9d3fa0ecd7926fc127/image11.png" />
          </figure><p><sup><i>Internet traffic from Kandahar, Afghanistan, September 1-28, 2025</i></sup></p><p><a href="https://radar.cloudflare.com/traffic/1147537?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Baghlan</u></a> experienced an anomalous spike in traffic on September 16, with total traffic spiking 3x higher than peaks seen during the previous weeks. However, on September 17, traffic dropped to a fraction of pre-shutdown levels. Except for a return to near-normal levels on September 21 &amp; 22, the disruption remained in place through the end of the month.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5OuHHfoiGIbcUP7qWhM6Mb/cc3da98c3127c7d27a416d02adc716fd/image14.png" />
          </figure><p><sup><i>Internet traffic from Baghlan, Afghanistan, September 1-28, 2025</i></sup></p><p>Traffic in <a href="https://radar.cloudflare.com/traffic/1132366?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Nangarhar</u></a> was disrupted between September 19-22, but quickly recovered to pre-shutdown levels once restored.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FYwcwHLwlj5VC9HIyB5tX/a6c047b3fe0f1a909b8e38452405a7eb/image13.png" />
          </figure><p><sup><i>Internet traffic from Nangarhar, Afghanistan, September 1-28, 2025</i></sup></p><p>After experiencing an apparent issue at the start of the month, Internet traffic in <a href="https://radar.cloudflare.com/traffic/1131461?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Oruzgan</u></a>, again fell on September 19. After an apparent complete shutdown, on September 23, a small amount of traffic was again visible.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QoIbIy0hbaKhWq7Mb8WAD/44cb159f930ed2328ceff1e4197d4d12/image4.png" />
          </figure><p><sup><i>Internet traffic from Oruzgan, Afghanistan, September 1-28, 2025</i></sup></p><p>Internet connectivity was also disrupted in the province of <a href="https://radar.cloudflare.com/traffic/1140025?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Herat</u></a>, although differently. From September 22-25, partial Internet outages were implemented between 16:30-03:30 UTC (21:00-08:00 local time), with traffic volumes dropping to approximately half of those seen at the same time the prior weeks. The intent of these “Internet curfew” shutdowns is unclear, but Herat residents <a href="https://tolonews.com/afghanistan-195915"><u>noted</u></a> that they “severely disrupted their business and educational activities”.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1C94mQTOp9CxMJAH0qxp8T/fb2a9456f09d67125e505963254a1080/image3.png" />
          </figure><p><sup><i>Internet traffic from Herat, Afghanistan, September 16-29, 2025</i></sup></p><p>While <a href="https://blog.cloudflare.com/tag/internet-shutdown/"><u>Internet shutdowns</u></a> remain all too common around the world, most (though not all) are comparatively short-lived, and are generally in response to a local event, such as exams, unrest/riots, elections, etc. Given the broad impact of this shutdown across all facets of daily personal, social, and professional life in Afghanistan, <a href="https://amu.tv/201377/"><u>analysts state</u></a> that it "could deepen Afghanistan’s digital isolation, further damage its struggling economy and drive more Afghans out of work at a time when humanitarian needs are already severe."</p>
    <div>
      <h3>Where can I learn more?</h3>
      <a href="#where-can-i-learn-more">
        
      </a>
    </div>
    <p>You can follow the latest state of <a href="https://radar.cloudflare.com/traffic/af"><u>Internet connectivity in Afghanistan</u></a> on Cloudflare Radar. The Cloudflare Radar team will continue to monitor traffic from Afghanistan as well, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via email.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <guid isPermaLink="false">7MCAuGOYyNejN3pChXzmW7</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Shutdown season: the Q2 2025 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q2-2025-internet-disruption-summary/</link>
            <pubDate>Tue, 22 Jul 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ In Q2 2025, we observed Internet disruptions around the world resulting from government-directed shutdowns, power outages, cable damage, a cyberattack, and technical problems. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s <a href="https://www.cloudflare.com/network/"><u>network</u></a> currently spans more than 330 cities in over 125 countries, and we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions at both a local and national level, as well as at a network level.</p><p>As we have noted in the past, this post is intended as a summary overview of observed and confirmed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter. A larger list of detected traffic anomalies is available in the <a href="https://radar.cloudflare.com/outage-center#traffic-anomalies"><u>Cloudflare Radar Outage Center</u></a>. Note that both bytes-based and request-based traffic graphs are used within the post to illustrate the impact of the observed disruptions — the choice of metric was generally made based on which better illustrated the impact of the disruption.</p><p>In our <a href="https://blog.cloudflare.com/q1-2025-internet-disruption-summary/"><u>Q1 2025 summary post</u></a>, we noted that we had not observed any government-directed Internet shutdowns during the quarter. Unfortunately, that forward progress was short-lived — in the second quarter of 2025, we observed <a href="#government-directed-shutdowns"><u>shutdowns</u></a> in Libya, Iran, Iraq, Syria, and Panama. The Internet’s reliance on a stable electric grid was made abundantly clear during the quarter, with a massive <a href="#power-outages-lead-to-internet-outages"><u>power outage</u></a> impacting Spain and Portugal disrupting connectivity within those countries. Fiber optic <a href="#fiber-optic-cable-damage"><u>cable cuts</u></a> impacted providers in Haiti and Malawi, major North American providers saw <a href="#technical-problems"><u>technical problems</u></a> disrupt Internet traffic, and a Russian provider was once again targeted by a significant <a href="#cyberattack-impact"><u>cyberattack</u></a>, knocking the network offline. Unfortunately, official attribution of an Internet outage’s root cause isn’t always available — and we observed several significant, yet <a href="#unexplained-disruptions"><u>unexplained</u></a>, Internet outages during the quarter.</p>
    <div>
      <h2>Government-directed shutdowns</h2>
      <a href="#government-directed-shutdowns">
        
      </a>
    </div>
    
    <div>
      <h3>Libya</h3>
      <a href="#libya">
        
      </a>
    </div>
    <p>On May 16, Internet disruptions were observed across multiple <a href="https://radar.cloudflare.com/traffic/ly"><u>Libyan</u></a> network providers, with connectivity reportedly shut down in response to <a href="https://libyareview.com/55698/protestors-face-internet-shutdown-in-libyan-capital/"><u>public protests</u></a> against the Government of National Unity. Starting at 13:30 UTC (15:30 local time), traffic dropped by more than 50% as compared to the prior week at <a href="https://radar.cloudflare.com/traffic/as329129?dateStart=2025-05-16&amp;dateEnd=2025-05-17#traffic-trends"><u>Libyan International Company for Technology (AS329129)</u></a>, <a href="https://radar.cloudflare.com/traffic/as328539?dateStart=2025-05-16&amp;dateEnd=2025-05-17#traffic-trends"><u>Giga Communication (AS328539)</u></a>, <a href="https://radar.cloudflare.com/traffic/as37284?dateStart=2025-05-16&amp;dateEnd=2025-05-17#traffic-trends"><u>Aljeel Aljadeed for Technology (AS37284)</u></a>, and <a href="https://radar.cloudflare.com/traffic/as328733?dateStart=2025-05-16&amp;dateEnd=2025-05-17#traffic-trends"><u>Awal Telecom (AS328733)</u></a>, with the latter experiencing a complete outage. Lower traffic volumes were observed until around 00:00 UTC (02:00 local time), with traffic restoration occurring within an hour or so on either side. Giga Communication (AS328539) experienced a second disruption on May 17 between 02:00 - 11:30 UTC (04:00 - 13:30 local time).</p>
    <div>
      <h3>Iran</h3>
      <a href="#iran">
        
      </a>
    </div>
    <p>Multiple Internet shutdowns occurred in <a href="https://radar.cloudflare.com/traffic/ir"><u>Iran</u></a> in June following Israel’s initial <a href="https://apnews.com/article/iran-explosions-israel-tehran-00234a06e5128a8aceb406b140297299"><u>attacks on the country’s nuclear sites</u></a>. The first, on June 13, occurred between 07:15 - 09:45 UTC (10:45 - 13:15 local time). Iran’s Ministry of Communications <a href="https://x.com/itiransite/status/1933475023244648514"><u>issued a statement</u></a> that announced the shutdown: “<i>In light of the country's special circumstances and based on the measures taken by the competent authorities, temporary restrictions have been imposed on the country's Internet. It is obvious that these restrictions will be lifted once normal conditions are restored.</i>” This shutdown order impacted network providers including <a href="https://radar.cloudflare.com/traffic/as24631?dateStart=2025-06-13&amp;dateEnd=2025-06-13#http-traffic"><u>FanapTelecom (AS24631)</u></a>, Rasana (<a href="https://radar.cloudflare.com/traffic/as205647?dateStart=2025-06-13&amp;dateEnd=2025-06-13#http-traffic"><u>AS205647</u></a> and <a href="https://radar.cloudflare.com/traffic/as31549?dateStart=2025-06-13&amp;dateEnd=2025-06-13#http-traffic"><u>AS31549</u></a>), <a href="https://radar.cloudflare.com/traffic/as197207?dateStart=2025-06-13&amp;dateEnd=2025-06-13#http-traffic"><u>MCCI (AS197207)</u></a>, and <a href="https://radar.cloudflare.com/traffic/as58224?dateStart=2025-06-13&amp;dateEnd=2025-06-13#http-traffic"><u>TCI (AS58224)</u></a>, as well as others.</p><p>On June 17, Internet connectivity was again restricted, this time <a href="https://x.com/Digiato/status/1934561401185432046"><u>reportedly in an effort to “ward off cyber attacks”</u></a>, according to a government spokesperson. This second round of shutdowns began at 17:30 local time (14:00 UTC), impacting multiple networks. Traffic recovered at 15:30 UTC (19:00 local time) on <a href="https://radar.cloudflare.com/traffic/as24631?dateStart=2025-06-17&amp;dateEnd=2025-06-17#http-traffic"><u>FanapTelecom (AS24631)</u></a> and <a href="https://radar.cloudflare.com/traffic/as16322?dateStart=2025-06-17&amp;dateEnd=2025-06-17#http-traffic"><u>Pars Online (AS16322)</u></a>, at 20:00 UTC (23:30 local time) on <a href="https://radar.cloudflare.com/traffic/as197207?dateStart=2025-06-17&amp;dateEnd=2025-06-17#http-traffic"><u>MCCI (AS197207)</u></a> and <a href="https://radar.cloudflare.com/traffic/as44244?dateStart=2025-06-17&amp;dateEnd=2025-06-17#http-traffic"><u>IranCell (AS44244)</u></a>, at 22:00 UTC on June 17 (01:30 on June 18 local time) on <a href="https://radar.cloudflare.com/traffic/as57218?dateStart=2025-06-17&amp;dateEnd=2025-06-17#http-traffic"><u>RighTel (AS57218)</u></a>, and at 06:00 UTC on June 18 (09:30 local time) on Rasana (<a href="https://radar.cloudflare.com/traffic/as31549?dateStart=2025-06-17&amp;dateEnd=2025-06-18#http-traffic"><u>AS31549</u></a> and <a href="https://radar.cloudflare.com/traffic/as205647?dateStart=2025-06-17&amp;dateEnd=2025-06-18#http-traffic"><u>AS205647</u></a>).</p><p>During these initial Internet shutdowns, incoming Internet traffic was <a href="https://filter.watch/english/2025/06/19/network-monitoring-june-iran-internet-status-week-1-of-israel-iran-war/"><u>reportedly</u></a> also blocked, and user access was limited to Iran’s domestic <a href="https://en.wikipedia.org/wiki/National_Information_Network"><u>“National Information Network” (NIN)</u></a>.</p><p>Just a day later, on June 18, an extended third shutdown was put into place, this one lasting from 12:50 UTC (16:20 local time) through 05:00 UTC (08:30 local time) on June 25. Once again, the shutdown was <a href="https://techcrunch.com/2025/06/20/irans-government-says-it-shut-down-internet-to-protect-against-cyberattacks/"><u>reportedly implemented as a means of protecting against cyberattacks</u></a>, with a government spokesperson commenting “<i>We have previously stated that if necessary, we will certainly switch to a national internet and restrict global internet access. Security is our main concern, and we are witnessing cyberattacks on the country’s critical infrastructure and disruptions in the functioning of banks. Many of the enemy’s drones are managed and controlled via the internet, and a large amount of information is exchanged this way. A cryptocurrency exchange was also hacked, and considering all these issues, we have decided to impose Internet restrictions.</i>” This shutdown resulted in a near-complete loss of traffic through 02:00 UTC (05:30 local time) on June 21, when some traffic recovery was observed, though at levels remaining well-below pre-shutdown volumes. Traffic from this partial recovery settled into a consistent cycle for several days, until returning to expected levels on June 25. The same network providers impacted by the previous shutdowns were affected by this one as well.</p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>Consistent with measures taken over the past several years (<a href="https://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown/"><u>2024</u></a>, <a href="https://blog.cloudflare.com/exam-internet-shutdowns-iraq-algeria/"><u>2023</u></a>, <a href="https://blog.cloudflare.com/q2-2022-internet-disruption-summary/#schools-in-internets-out"><u>2022</u></a>), governments in <a href="https://radar.cloudflare.com/traffic/iq"><u>Iraq</u></a> again implemented regular Internet shutdowns in an effort to prevent cheating on national exams. (We say “governments” here because the shutdowns took place both in the main part of the country and in the Iraqi Kurdistan region in the northern part of the country.)</p><p>Occurring between 03:00 - 05:00 UTC (<a href="https://www.moc.gov.iq/?article=1015"><u>06:00 - 08:00 local time</u></a>) at the request of the Ministry of Education, the shutdowns in the main part of the country started on May 20 and ran through June 4 for middle school exams, and from June 14 until July 3 for <a href="https://www.facebook.com/Iraq.Ministry.of.Education/posts/pfbid0a7VuMttRxdoGWwuaymy38LcZw9jscz3Dfxup4aUue2LeRBPuU2c7vnDsZKbgCkE2l"><u>preparatory school exams</u></a>. Network providers that implemented the shutdowns included <a href="https://radar.cloudflare.com/traffic/as199739"><u>Earthlink (AS199739)</u></a>, <a href="https://radar.cloudflare.com/traffic/as51684"><u>Asiacell (AS51684)</u></a>, <a href="https://radar.cloudflare.com/traffic/as59588"><u>Zainas (AS59588)</u></a>, <a href="https://radar.cloudflare.com/traffic/as58322"><u>Halasat (AS58322)</u></a>, and <a href="https://radar.cloudflare.com/traffic/as203214"><u>HulumTele (AS203214)</u></a>.</p><p>In the Kurdistan region, the shutdowns began June 1, and ran through July 6, <a href="https://x.com/TwanaOth/status/1930380416374002119"><u>taking place between 03:30 - 04:30 UTC (06:30 - 07:30 local time)</u></a> on Wednesdays and Sundays. Network providers that implemented the shutdowns included <a href="https://radar.cloudflare.com/traffic/as48492"><u>IQ Online (AS48492)</u></a>, <a href="https://radar.cloudflare.com/traffic/as59625"><u>KorekTel (AS59625)</u></a>, <a href="https://radar.cloudflare.com/traffic/as21277"><u>Newroz Telecom (AS21277)</u></a>, and <a href="https://radar.cloudflare.com/traffic/as206206"><u>KNET (AS206206)</u></a>.</p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>As Iraq does, <a href="https://radar.cloudflare.com/traffic/sy"><u>Syria</u></a> also implements nationwide Internet shutdowns to prevent cheating on exams, and has been doing so for several years (<a href="https://blog.cloudflare.com/syria-exam-related-internet-shutdowns/"><u>2021</u></a>, <a href="https://blog.cloudflare.com/syria-sudan-algeria-exam-internet-shutdown/"><u>2022</u></a>, <a href="https://blog.cloudflare.com/q2-2023-internet-disruption-summary/#syria"><u>2023</u></a>, <a href="https://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown/"><u>2024</u></a>). However, in contrast to previous years, in 2025, the government only ordered the cutoff of cellular connectivity, with a <a href="https://t.me/TrbyaGov/1869"><u>published statement</u></a> noting (translated) “<i>As part of our commitment to ensuring the integrity of public examinations and safeguarding the future of our dear students, and based on our national responsibility to secure a fair and transparent examination environment, </i><b><i>a temporary cellular communications blackout will be implemented in areas near examination centers across the Syrian Arab Republic</i></b><i>. … The cellular communications blackout will be implemented exclusively within the narrowest possible geographical and timeframe, during the time students are in exam halls.</i>”</p><p>During the second quarter, the shutdowns associated with the “Basic Education Certificate” took place on June 21, 24, and 29 between 05:15 - 06:00 UTC (08:15 - 09:00 local time). Exams and associated shutdowns for the “Secondary Education Certificate” are scheduled to take place between July 12 and August 3.</p><p>Because these shutdowns only impacted mobile connectivity, they only resulted in a partial drop in announced IP address space, as opposed to a more complete loss <a href="https://radar.cloudflare.com/routing/sy?dateStart=2024-05-19&amp;dateEnd=2024-06-15#announced-ip-address-space"><u>as seen in previous years</u></a>.</p>
    <div>
      <h3>Panama</h3>
      <a href="#panama">
        
      </a>
    </div>
    <p>On June 21, an <a href="https://x.com/AsepPanama/status/1936462415278854469"><u>X post</u></a> from <a href="https://asep.gob.pa/"><u>ASEP Panamá</u></a> (the telecommunications regulating agency) announced that (translated) “<i>...in compliance with Cabinet Decree No. 27 of June 20, 2025, and by formal instruction from the Ministry of Government, the temporary suspension of mobile telephony and residential internet services in the province of Bocas del Toro has been coordinated.</i>” The suspension, according to the post, was supposed to be in place until June 25, however a <a href="https://x.com/AsepPanama/status/1937982698624057637"><u>subsequent X post</u></a> noted that it would be extended until Sunday, June 29, 2025.</p><p>The suspension of Internet connectivity was <a href="https://www.ipandetec.org/panama/panama-debe-restablecer-internet-bocas/"><u>implemented in response to</u></a> protests and demonstrations against reforms to the Social Security Fund, retirement, and pensions, specifically in the province of Bocas del Toro.</p><p>The graph below shows an effective loss of traffic from <a href="https://radar.cloudflare.com/traffic/as18809"><u>Cable Onda (AS18809)</u></a> in Bocas Del Toro, <a href="https://radar.cloudflare.com/traffic/pa"><u>Panama</u></a> around 03:30 UTC on June 21 (22:30 local time on June 20), recovering around 06:00 UTC (01:00 local time) on June 30. The recovery is in line with the <a href="https://x.com/AsepPanama/status/1939682983440421070"><u>final related X post</u></a> from ASEP, which noted (translated) “<i>... Internet and cellular telephone services in the province of Bocas del Toro have been restored as of 12:01 a.m. on Monday, June 30…</i>”.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hqsqe4t1DRZHzqWXiMzZr/a1186cdc13145745fafb4e9869b4481e/Jun_30_-_Panama_-_Bocas_del_Toro_-_AS18809-_1200px.png" />
            
            </figure>
    <div>
      <h2>Power outages lead to Internet outages</h2>
      <a href="#power-outages-lead-to-internet-outages">
        
      </a>
    </div>
    
    <div>
      <h3>Portugal &amp; Spain</h3>
      <a href="#portugal-spain">
        
      </a>
    </div>
    <p>The big power outage story during the second quarter was the massive outage across much of <a href="https://radar.cloudflare.com/traffic/pt"><u>Portugal</u></a> and <a href="https://radar.cloudflare.com/traffic/es"><u>Spain</u></a> on April 28. The impact of the event was covered in detail in the <a href="https://blog.cloudflare.com/how-power-outage-in-portugal-spain-impacted-internet/"><i><u>How the April 28, 2025, power outage in Portugal and Spain impacted Internet traffic and connectivity</u></i><u> blog post</u></a>, which explored shifts in traffic at a country/network/regional level, as well as how the power outage impacted network quality and announced IP address space.</p><p>In Portugal, Internet traffic dropped as the power grid failed — when compared with the previous week, traffic fell ~50 % immediately and within five hours it was ~90% below the week before.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67Ep5vwyVnCunhfFHqlIGI/ec1d3eacdddc905bfa3a0aedf714c82f/BLOG-2817_2.png" />
          </figure><p>In Spain, Internet traffic dropped as the power grid failed, with traffic immediately dropping by around 60% as compared to the previous week, falling to approximately 80% below the previous week within the next five hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5mo4BDO1G0U42ibybDKwVY/857b84436db9db2aa5a7f46f17293923/Screenshot_2025-07-18_at_10.45.07%C3%A2__AM.png" />
          </figure><p>In both countries, traffic returned to expected levels around 01:00 local time (midnight UTC) on April 29. More details about the outage can be found in the blog post linked above.</p>
    <div>
      <h3>Morocco</h3>
      <a href="#morocco">
        
      </a>
    </div>
    <p>It appears that <a href="https://radar.cloudflare.com/traffic/ma"><u>Morocco</u></a> may have also been impacted in some fashion by the Portugal/Spain power outage, or at least Orange Maroc was. In a <a href="https://x.com/OrangeMaroc/status/1916866583047147690"><u>post on X</u></a>, the provider stated (translated) “<i>Internet traffic has been disrupted following a massive power outage in Spain and Portugal, which is affecting international connections.</i>” <a href="https://radar.cloudflare.com/traffic/as36925?dateStart=2025-04-28&amp;dateEnd=2025-04-29"><u>Traffic from the network (AS36925)</u></a> fell sharply around 12:00 UTC (13:00 local time), 90 minutes after the power outage began, with a full outage beginning around 15:00 UTC (16:00 local time). Traffic returned to expected levels around 23:30 UTC on April 28 (00:30 local time on April 29).</p>
    <div>
      <h3>Puerto Rico</h3>
      <a href="#puerto-rico">
        
      </a>
    </div>
    <p><a href="https://genera-pr.com/sobre-nosotros"><u>Genera PR</u></a>, a power company in <a href="https://radar.cloudflare.com/traffic/pr"><u>Puerto Rico</u></a>, <a href="https://x.com/Genera_PR/status/1912562399741100112"><u>posted on X</u></a> on April 16 that they had (translated) <i>“...experienced a massive power outage across the island due to the unexpected shutdown of all generating plants, including those of Genera PR and other private generators. This situation has caused a significant disruption to electrical service…</i>” <a href="https://lumapr.com/"><u>Luma Energy</u></a>, the private power company that is responsible for power distribution and power transmission in Puerto Rico, <a href="https://x.com/lumaenergypr/status/1912554580400812243"><u>published their own X post</u></a> that stated (translated) “<i>Approximately at 12:40pm, an event was recorded that affects the service island-wide.</i>”</p><p>Although the reported power outage was “massive” and “island-wide”, it did not have an outsized impact on <a href="https://radar.cloudflare.com/traffic/pr?dateStart=2025-04-13&amp;dateEnd=2025-04-19#traffic-trends">Puerto Rico’s Internet traffic</a>, which <a href="https://bsky.app/profile/radar.cloudflare.com/post/3lmxq2gfxtg2c"><u>initially dropped by about 40%</u></a>. Over the next several days, both companies published multiple updates to their X accounts detailing the progress being made in restoring service. By 15:00 UTC (11:00 local time) on April 18, traffic had returned to expected levels, in line with a post from Luma Energy that noted (translated) “<i>As of 10:00 a.m. on April 18, and thanks to LUMA’s extraordinary response and the tireless efforts of the island’s workforce—in coordination with the Puerto Rico government and generating companies—LUMA has restored electric service to 1,450,367 customers, representing 98.8% of total customers, in less than 38 hours since the island-wide outage began.</i>”</p><p>As seen in the graphs below, the power outage not only impacted end-user connectivity, driving the observed drop in traffic, but also had some impact on local Internet infrastructure, with some disturbance visible to <a href="https://radar.cloudflare.com/routing/pr?dateStart=2025-04-13&amp;dateEnd=2025-04-19#announced-ip-address-space">announced IP address space</a>.</p>
    <div>
      <h3>Saint Kitts and Nevis</h3>
      <a href="#saint-kitts-and-nevis">
        
      </a>
    </div>
    <p>A <a href="https://www.facebook.com/skelecltd/posts/pfbid09PDXSuw7U9X3V83rvUSz7kLGnL77bqwstYgKXbkRZQQPeGDCw2pffiP1nRkRsEAxl"><u>Facebook post</u></a> from <a href="https://www.skelec.kn/"><u>SKELEC (The St. Kitts Electricity Company)</u></a> on May 9 alerted customers on <a href="https://radar.cloudflare.com/traffic/kn?dateStart=2025-05-09&amp;dateEnd=2025-05-09#traffic-trends"><u>St. Kitts and Nevis</u></a> that “<i>...a fault developed at our Needsmust Power Plant resulting in an island wide outage. Restoration has begun, and complete restoration will be in two hours.</i>” The post was published at 17:31 UTC (13:31 local time), approximately 30 minutes after the island’s Internet traffic initially dropped. Traffic recovery initially began around 17:45 UTC (13:45 local time), well within the two-hour estimate for complete power restoration. However, Internet traffic did not fully return to expected levels until 20:15 UTC (16:15 local time).</p>
    <div>
      <h3>North Macedonia</h3>
      <a href="#north-macedonia">
        
      </a>
    </div>
    <p>On May 18, it was <a href="https://seenews.com/news/voltage-spike-causes-power-outage-in-north-macedonia-1275427"><u>reported</u></a> that “<i>High voltages in the regional 400 kV network amid low consumption caused a short-term outage in </i><a href="https://radar.cloudflare.com/traffic/mk?dateStart=2025-05-18&amp;dateEnd=2025-05-18#traffic-trends"><i><u>North Macedonia</u></i></a><i>'s 110 kV transmission network…</i>”, according to state-owned power company <a href="https://en.wikipedia.org/wiki/MEPSO"><u>MEPSO</u></a>. While the outage reportedly impacted most of the country, MEPSO also noted that the country’s power supply was normalized within an hour after the outage began. Although brief, the power outage caused the country’s Internet traffic to drop by nearly 60% as compared to the previous week during the disruption, which occurred between 03:00 - 04:45 UTC (05:00 - 06:45 local time).</p>
    <div>
      <h3>Maldives</h3>
      <a href="#maldives">
        
      </a>
    </div>
    <p>On June 1, Internet traffic in the <a href="https://radar.cloudflare.com/traffic/mv?dateStart=2025-06-01&amp;dateEnd=2025-06-01#traffic-trends"><u>Maldives</u></a> dropped by nearly half as compared to the previous week when a <a href="https://mvrepublic.com/news/widespread-power-outage-causes-disruptions-across-greater-male/"><u>widespread power outage</u></a> affected the Greater Malé region. Local Internet service providers including <a href="https://x.com/OoredooMaldives/status/1929108987187970176"><u>Ooredoo</u></a> and <a href="https://x.com/Dhiraagu/status/1929095794659103186"><u>Dhiraagu</u></a> took to social media to warn subscribers of potential interruptions to both fixed and mobile broadband connections. At a country level, Internet traffic was disrupted between 07:30 - 13:00 UTC (12:30 - 18:00 local time).</p><p>The power outage also had a nominal impact on Internet infrastructure, as <a href="https://radar.cloudflare.com/routing/mv?dateStart=2025-06-01&amp;dateEnd=2025-06-01#announced-ip-address-space">announced IPv4 address space</a> saw a nominal drop (from 355 to 350 /24s) that began shortly after the initial drop in traffic was observed, but returned to normal as the disruption ended.</p>
    <div>
      <h3>Curaçao</h3>
      <a href="#curacao">
        
      </a>
    </div>
    <p>A near-complete Internet outage at provider <a href="https://radar.cloudflare.com/traffic/as52233?dateStart=2025-06-14&amp;dateEnd=2025-06-15"><u>Flow Curaçao (AS52233)</u></a> on June 14-15 <a href="https://www.curacaochronicle.com/post/opinion/flows-internet-outage-sparks-outrage-and-urgent-call-for-infrastructure-reform/"><u>sparked outrage</u></a> and <a href="https://www.curacaochronicle.com/post/local/curacaos-telecom-regulator-demands-answers-from-flow-after-major-internet-outage/"><u>demands for answers</u></a> by the country’s telecommunications regulator. Flow’s Internet traffic dropped significantly at 18:00 UTC (14:00 local time) on June 14, falling further in the following hours. Signs of recovery became visible around 11:00 UTC (07:00 local time) on June 15, with more complete recovery occurring at 14:00 UTC (10:00 local time). A <a href="https://www.facebook.com/FlowBarbados/posts/pfbid02iGV1LYdNajMprF8Anvgh3KzMZbc2k9BVbVdN4C8mrVZDdcoUEhiib23TQYgisrAxl"><u>Facebook post from Flow Barbados</u></a>, posted on June 18, referenced a local disruption that began on June 14, but pointed at a commercial power outage at one of their key regional network facilities in Curaçao, which was likely the driver of this Internet outage.</p>
    <div>
      <h2>Fiber optic cable damage</h2>
      <a href="#fiber-optic-cable-damage">
        
      </a>
    </div>
    
    <div>
      <h3>Digicel Haiti</h3>
      <a href="#digicel-haiti">
        
      </a>
    </div>
    <p>Two instances of damage to its fiber optic infrastructure caused a complete Internet outage at <a href="https://radar.cloudflare.com/traffic/as27653?dateStart=2025-05-28&amp;dateEnd=2025-05-29#http-traffic"><u>Digicel Haiti (AS27653)</u></a> as of 21:00 UTC (17:00 local time) on May 28, according to a (translated) <a href="https://x.com/jpbrun30/status/1927845676408258762"><u>X post</u></a> from the company’s Director General. The cable damage took the network completely off the Internet, as <a href="https://radar.cloudflare.com/routing/as27653?dateStart=2025-05-28&amp;dateEnd=2025-05-29#announced-ip-address-space">announced IPv4 and IPv6 address space</a> also dropped to zero. Digicel Haiti remained offline until 00:45 on May 29 (20:45 local time on May 28), when both traffic and announced IP address space returned to expected levels.</p>
    <div>
      <h3>Airtel Malawi</h3>
      <a href="#airtel-malawi">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/traffic/as37440?dateStart=2025-06-24&amp;dateEnd=2025-06-24#traffic-trends"><u>Airtel Malawi (AS37440)</u></a> experienced a 90-minute Internet outage on June 24, <a href="https://x.com/AirtelMalawiPlc/status/1937591557684916436"><u>caused by ongoing vandalism on their fiber network</u></a>. Although traffic effectively disappeared between 12:30 - 14:00 UTC (14:30 - 16:00 local time), the network remained at least partially online as at least some of the network’s <a href="https://radar.cloudflare.com/routing/as37440?dateStart=2025-06-24&amp;dateEnd=2025-06-24#announced-ip-address-space">IPv4 address space</a> continued to be announced to the Internet.  Announced IPv6 address space, however, fell to zero during the duration of the outage.</p>
    <div>
      <h2>Technical problems</h2>
      <a href="#technical-problems">
        
      </a>
    </div>
    
    <div>
      <h3>Bell Canada</h3>
      <a href="#bell-canada">
        
      </a>
    </div>
    <p>A <a href="https://x.com/Bell_Support/status/1925225503507591222"><u>router update</u></a> gone awry disrupted Internet service for <a href="https://radar.cloudflare.com/traffic/as577?dateStart=2025-05-21&amp;dateEnd=2025-05-21#http-traffic"><u>Bell Canada (AS577)</u></a> customers in Ontario and Quebec on May 21. An <a href="https://x.com/Bell_Support/status/1925187984543883486"><u>initial X post from the provider</u></a>, posted at 13:52 UTC (09:52 local time), alerted customers to the service interruption. The post trailed the start of the disruption by approximately a half hour, as traffic dropped around 13:15 UTC (09:15 local time), falling by as much as 70% as compared to the same time a week prior. Request traffic to Cloudflare’s <a href="https://radar.cloudflare.com/dns/as577?dateStart=2025-05-21&amp;dateEnd=2025-05-21#dns-query-volume"><u>1.1.1.1 DNS Resolver</u></a> also saw a significant drop. A negligible decline in <a href="https://radar.cloudflare.com/routing/as577?dateStart=2025-05-21&amp;dateEnd=2025-05-21#announced-ip-address-space"><u>announced IPv4 address space</u></a> was also observed.</p><p>The disruption was fairly short-lived, with traffic returning to expected levels just an hour later. A subsequent <a href="https://x.com/Bell_Support/status/1925225503507591222"><u>X post</u></a> confirmed that services had been fully restored by 15:00 UTC (11:00 local time), with <a href="https://x.com/Bell_Support/status/1925225526198776050"><u>another post</u></a> noting that the initial update had been rolled back quickly to restore service. </p>
    <div>
      <h3>Lumen/CenturyLink </h3>
      <a href="#lumen-centurylink">
        
      </a>
    </div>
    <p>Across parts of the <a href="https://radar.cloudflare.com/traffic/us"><u>United States</u></a>, <a href="https://radar.cloudflare.com/traffic/as209?dateStart=2025-06-19&amp;dateEnd=2025-06-20#traffic-trends"><u>Lumen/CenturyLink (AS209)</u></a> customers experienced a widespread Internet service disruption on June 19. Traffic volumes dropped by over 50% as compared to the prior week starting around 21:45 UTC. The disruption only lasted a couple of hours, with traffic returning to normal by 00:00 UTC on June 20.</p><p>Social media posts from affected subscribers suggested that the problem might have been DNS related, as those that switched their DNS resolver to Cloudflare’s <a href="https://1.1.1.1/dns"><u>1.1.1.1</u></a> were once again able to access the Internet. The graph below shows that <a href="https://radar.cloudflare.com/explorer?dataSet=dns&amp;loc=as209&amp;dt=2025-06-19_2025-06-20&amp;timeCompare=2025-06-12#result">traffic to 1.1.1.1 from Lumen/CenturyLink</a> exceeded levels seen the previous week as the disruption began, and remained elevated through June 20. Problems with an Internet service provider’s DNS resolver can appear to subscribers like an Internet outage, as they become unable to access anything requiring a DNS lookup (effectively, all Internet resources), ultimately resulting in a drop in traffic to those resources (from the affected user base), as seen in the graph above.</p>
    <div>
      <h2>Cyberattack impact</h2>
      <a href="#cyberattack-impact">
        
      </a>
    </div>
    
    <div>
      <h3>ASVT (Russia)</h3>
      <a href="#asvt-russia">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/traffic/ru"><u>Russian</u></a> Internet provider <a href="https://radar.cloudflare.com/traffic/as8752?dateStart=2025-05-28&amp;dateEnd=2025-06-05#traffic-trends"><u>ASVT (AS8752)</u></a> was <a href="https://therecord.media/moscow-internet-provider-asvt-ddos-attack"><u>reportedly</u></a> targeted by a major DDoS attack that resulted in a multi-day complete Internet outage. This attack followed one <a href="https://blog.cloudflare.com/q1-2025-internet-disruption-summary/#russia"><u>targeting Russian provider Nodex</u></a> (<a href="https://radar.cloudflare.com/traffic/AS29329"><u>AS29329</u></a>) in March, which also caused a complete service outage. <a href="https://tadviser.com/index.php/Company:ASVT"><u>Reaching</u></a> 70.07 Gbps/6.92 million packets/second, the attack caused traffic to drop to near zero around 05:00 UTC on May 28 (08:00 Moscow time), with the effective outage lasting for approximately 10 hours. Although traffic began to return around 15:00 UTC (18:00 Moscow time), it remained below expected levels throughout the following week.</p><p>Interestingly, <a href="https://radar.cloudflare.com/dns/as8752?dateStart=2025-05-28&amp;dateEnd=2025-06-05#dns-query-volume">query volume to Cloudflare’s 1.1.1.1 DNS Resolver from ASVT</a> saw a rapid increase as traffic began to return after the initial outage, and remained elevated throughout the duration of the disruption. It isn’t clear whether the increase could be related to problems with ASVT’s native DNS resolver during the attack, forcing users to seek alternative resolvers, or if it could be related to ASVT subscribers seeking ways around damage from the attack.</p>
    <div>
      <h2>Unexplained disruptions</h2>
      <a href="#unexplained-disruptions">
        
      </a>
    </div>
    
    <div>
      <h3>Telia Finland (April 1)</h3>
      <a href="#telia-finland-april-1">
        
      </a>
    </div>
    <p>According to a (now unavailable) <a href="https://www.telia.fi/asiakastuki/hairiotiedote?id=sabre_858055150&amp;lang=fi"><u>“Disturbance bulletin”</u></a> and an <a href="https://x.com/teliafinland/status/1906966248790868230"><u>associated X post</u></a> from <a href="https://radar.cloudflare.com/traffic/as1759?dateStart=2025-04-01&amp;dateEnd=2025-04-01#traffic-trends"><u>Telia Finland (AS1759)</u></a>, the company acknowledged that “<i>A widespread disruption has been detected in the operation of mobile network data connections and fixed broadband.</i>” The widespread disruption resulted in a brief near-complete outage for subscribers between 06:30 - 07:15 UTC (09:30 - 10:15 local time).</p><p>Telia Finland did not disclose the cause of the disruption, but it is clear that it impacted IPv4 connectivity, as seen in the graph below showing <a href="https://radar.cloudflare.com/routing/as1759?dateStart=2025-04-01&amp;dateEnd=2025-04-01#announced-ip-address-space">announced IPv4 address space</a>. (<a href="https://radar.cloudflare.com/routing/as1759?dateStart=2025-04-01&amp;dateEnd=2025-04-01#announced-ip-address-space"><u>Announced IPv6 address space</u></a> did not see any change.) This loss of IPv4 connectivity resulted in a concurrent spike in the share of traffic from Telia Finland over IPv6 — normally below 5%, it spiked above 30% during the disruption. Request traffic <a href="https://radar.cloudflare.com/dns/as1759?dateStart=2025-04-01&amp;dateEnd=2025-04-01#dns-query-volume"><u>to Cloudflare’s 1.1.1.1 resolver from Telia Finland</u></a> also spiked at that time.</p>
    <div>
      <h3>SkyCable</h3>
      <a href="#skycable">
        
      </a>
    </div>
    <p>Around 19:15 UTC on May 7 (03:15 local time on May 8), subscribers of <a href="https://radar.cloudflare.com/traffic/as23944?dateStart=2025-05-07&amp;dateEnd=2025-05-08#traffic-trends"><u>SkyCable (AS23944)</u></a> in the <a href="https://radar.cloudflare.com/traffic/ph"><u>Philippines</u></a> experienced a complete Internet outage. Internet traffic from the network dropped to zero, as did <a href="https://radar.cloudflare.com/routing/as23944?dateStart=2025-05-07&amp;dateEnd=2025-05-08#announced-ip-address-space">announced IPv4 address space</a>. The disruption lasted until 03:00 UTC on May 8 (11:00 local time), and SkyCable did not publish any information regarding the cause of the eight-hour service outage.</p>
    <div>
      <h3>TrueMove H</h3>
      <a href="#truemove-h">
        
      </a>
    </div>
    <p>On May 22, <a href="https://radar.cloudflare.com/traffic/th"><u>Thai</u></a> mobile provider <a href="https://radar.cloudflare.com/traffic/as132061?dateStart=2025-05-22&amp;dateEnd=2025-05-22#http-traffic"><u>TrueMove H (AS132061)</u></a> <a href="https://www.kaohooninternational.com/markets/558192"><u>suffered a nationwide outage</u></a>, impacting connectivity for subscribers. The provider <a href="https://www.nationthailand.com/news/general/40050305"><u>acknowledged and apologized</u></a> for the disruption, but did not provide an official reason for the outage. (An <a href="https://www.nationthailand.com/news/general/40050309"><u>article</u></a> in the local press reported “<i>that the outage was caused by technical errors on True’s computer servers</i>” and also stated that others suggested that “<i>the problem might have been caused by an error on True’s DNS servers</i>”.)</p><p>At 03:00 UTC (10:00 local time), traffic initially dropped by over 80% as compared to the prior week. Almost immediately, traffic began to slowly recover, and returned to expected levels around 08:00 UTC (15:00 local time). A brief <a href="https://radar.cloudflare.com/routing/as132061?dateStart=2025-05-22&amp;dateEnd=2025-05-22#announced-ip-address-space"><u>partial drop in announced IPv4 address space was also observed</u></a> during the first hour of the disruption.</p>
    <div>
      <h3>Digicel Haiti</h3>
      <a href="#digicel-haiti">
        
      </a>
    </div>
    <p>Two days after experiencing <a href="#fiber-optic-cable-damage"><u>an outage due to cable damage</u></a>, <a href="https://radar.cloudflare.com/traffic/as27653?dateStart=2025-05-30&amp;dateEnd=2025-05-30#traffic-trends"><u>Digicel Haiti (AS27653)</u></a> experienced another complete outage on May 30. In contrast to the previous outage, no additional information about this one was published on social media by <a href="https://x.com/DigicelHT"><u>Digicel Haiti</u></a> or its <a href="https://x.com/jpbrun30"><u>Director General</u></a>. The network effectively disappeared from the Internet at 14:15 UTC (10:15 local time), with both traffic and <a href="https://radar.cloudflare.com/routing/as27653?dateStart=2025-05-30&amp;dateEnd=2025-05-30#announced-ip-address-space">announced IP address space</a> (IPv4 &amp; IPv6) dropping to zero. The outage lasted nearly three hours, with traffic and announced IP space all returning around 17:00 UTC (13:00 local time).</p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>On June 10, an Internet outage in <a href="https://radar.cloudflare.com/traffic/sy?dateStart=2025-06-10&amp;dateEnd=2025-06-10#traffic-trends"><u>Syria</u></a> <a href="https://www.profilenews.com/en/breaking-internet-outage-in-syria/"><u>reportedly</u></a> affected the ADSL landline network across multiple provinces. Traffic dropped by as much as two-thirds below the same time the previous week at 08:15 UTC (11:15 local time), with the disruption lasting two hours. <a href="https://radar.cloudflare.com/routing/sy?dateStart=2025-06-10&amp;dateEnd=2025-06-10#announced-ip-address-space">Announced IPv4 address space</a> also fell during the course of the outage, indicating a potential infrastructure issue. However, as seen below, <a href="https://radar.cloudflare.com/dns/sy?dateStart=2025-06-10&amp;dateEnd=2025-06-10#dns-query-volume">request volume from Syria to Cloudflare’s 1.1.1.1 DNS resolver</a> was also elevated during the outage. This behavior has been observed in the past during government-directed shutdowns of Internet connectivity in Syria, when traffic can leave the country, but not return. There was no other indication that this outage was due to an intentional shutdown, but no official explanation for the disruption was available.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Government-directed Internet shutdowns returned with a vengeance in the second quarter, and that trend continues into the third quarter, though the latest ones have been exam-related, and not driven by protests. And while power-outage related Internet disruptions have frequently been observed in the past, often in smaller countries with less stable infrastructure, the massive outage in Spain and Portugal on April 28 reminds us that much like the Internet, electrical infrastructure is often interconnected across countries, meaning that problems in one can potentially cause significant problems in others.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via email.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">37sa5eHdRj16s4vvvhEDGY</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Russian Internet users are unable to access the open Internet]]></title>
            <link>https://blog.cloudflare.com/russian-internet-users-are-unable-to-access-the-open-internet/</link>
            <pubDate>Thu, 26 Jun 2025 22:33:30 GMT</pubDate>
            <description><![CDATA[ Since June 9, 2025, Internet users located in Russia and connecting to the open Internet have been throttled by Russian Internet Service Providers (ISPs). ]]></description>
            <content:encoded><![CDATA[ <p>Since June 9, 2025, Internet users located in Russia and connecting to web services protected by Cloudflare have been throttled by Russian Internet Service Providers (ISPs).</p><p>As the throttling is being applied by local ISPs, the action is outside of Cloudflare’s control and we are unable, at this time, to restore reliable, high performance access to Cloudflare products and protected websites for Russian users in a lawful manner. </p><p>Internal data analysis suggests that the throttling allows Internet users to load only the first 16 KB of any web asset, rendering most web navigation impossible.</p><p>Cloudflare has not received any formal outreach or communication from Russian government entities about the motivation for such an action. Unfortunately, the actions are consistent with <a href="https://blog.cloudflare.com/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/"><u>longstanding</u></a> Russian efforts to isolate the Internet within its borders and reduce reliance on Western technology by replacing it with domestic alternatives. Indeed, Russian President Vladimir Putin recently publicly <a href="https://www.barrons.com/news/putin-threatens-to-throttle-western-firms-remaining-in-russia-8bb06070"><u>threatened</u></a> to throttle US tech companies operating inside Russia. </p><p><a href="https://en.zona.media/article/2025/06/19/cloudflare"><u>External reports</u></a> corroborate our analysis, and further suggest that a number of other service providers are also affected by throttling or other disruptive actions in Russia, including at least Hetzner, DigitalOcean, and OVH.</p>
    <div>
      <h2>The impact</h2>
      <a href="#the-impact">
        
      </a>
    </div>
    <p>Cloudflare is seeing disruptions across connections initiated from inside Russia, even when the connection reaches our servers outside of Russia. Consistent with <a href="https://dl.acm.org/doi/10.1145/3517745.3561461"><u>public reporting</u></a> on Russia's practices, this suggests that the disruption is happening inside Russian ISPs, close to users.</p><p>Russian Internet Services Providers (ISPs) confirmed to be implementing these disruptive actions include, but are not limited to, Rostelecom, Megafon, Vimpelcom, MTS, and MGTS.</p><p>Based on our observations, Russian ISPs are using several throttling and blocking mechanisms affecting sites protected by Cloudflare, including injected packets to halt the connection and blocking packets so the connection times out. A new tactic that began on June 9 limits the amount of content served to 16 KB, which renders many websites barely usable.</p><p>The throttling affects all connection methods and protocols, including HTTP/1.1 and HTTP/2 on TCP and TLS, as well as HTTP/3 on QUIC.</p>
    <div>
      <h2>The view from Cloudflare data</h2>
      <a href="#the-view-from-cloudflare-data">
        
      </a>
    </div>
    
    <div>
      <h3>Traffic trends</h3>
      <a href="#traffic-trends">
        
      </a>
    </div>
    <p>Cloudflare Radar exists to share insights and bring transparency to Internet trends. The high rate of connectivity errors to all our data centers has resulted in an overall decrease in traffic served to Russian users. The reduction in traffic can be observed on <a href="https://radar.cloudflare.com/ru?dateStart=2025-06-01&amp;dateEnd=2025-06-26"><u>Cloudflare Radar</u></a>:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/64iapMiGlMvgHJXPyPH9Xo/bec47ff9147019ffa01e365f9bc11309/BLOG-2859_2.png" />
          </figure>
    <div>
      <h3>Client-side reports via Network Error Logging</h3>
      <a href="#client-side-reports-via-network-error-logging">
        
      </a>
    </div>
    <p>Some customers elect to enable <a href="https://www.w3.org/TR/network-error-logging/"><u>W3C</u></a>-defined <a href="https://developers.cloudflare.com/network-error-logging/"><u>Network Error Logging</u></a> (NEL), a feature that embeds error-reporting instructions inside the headers of web content that users request. The instructions tell web browsers what errors to report, and how to do so. Below is a view of NEL reports that show an increase of TCP connections being ‘reset’ prematurely (as explained in our <a href="https://blog.cloudflare.com/connection-tampering/"><u>tampering</u></a> and Radar <a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>resets</u></a> blogs). Separately, the large growth in h3.protocol.error shows that QUIC connections have been greatly affected:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7hduiNgSSfVk6FaJ4JLyGN/9f4f014796d000e919b5794c37eda18c/BLOG-2859_3.png" />
          </figure>
    <div>
      <h3>Corroboration of throttling using internal data</h3>
      <a href="#corroboration-of-throttling-using-internal-data">
        
      </a>
    </div>
    <p>The effects of the throttling can also be observed in our internal tooling. The chart below shows packet loss to our Russian data centers, each data center represented by a different line. The Y-axis is the proportion of packet loss:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7DIMgYxjPniMlPS2q2PIbP/c9762738b31278bfd9809457546303c6/BLOG-2859_4.png" />
          </figure><p>High packet loss is a strong signal but does not on its own indicate throttling, since there might be other explanations. For example, an explanation may be our servers trying to resend packets multiple times in during some other mass failure that hinders, but does not completely halt, communication.</p><p>However, we have two additional pieces of information to work with. The first consists of public reports that “throttling” in this case means blocking all connections after <a href="https://en.zona.media/article/2025/06/19/cloudflare"><u>16 KB of data</u></a> has been transmitted, which takes 10 to 14 packets (depending on the underlying technology). Second, we have our recently deployed “<a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>Resets and Timeouts</u></a>” data that captures anomalous behaviour in TCP when it occurs within the first 10 packets. Since 10 packets can contain 16 KB of data, some connections that are blocked around 16 KB will be visible at the “Post PSH” stage in the Radar data. In TCP, the ‘PSH’ message means Cloudflare got the initial request and data transfer has begun. If the connection is blocked at this stage, then many of the sent packets will be lost. </p><p>The graph below uses Radar’s <a href="https://radar.cloudflare.com/embed/DataExplorerVisualizer?path=tcp_resets_timeouts%2Ftimeseries_groups&amp;dateRange=28d&amp;mainLocation=ru&amp;locale=en-US&amp;widgetState=%7B%22showAnnotations%22%3Atrue%2C%22xy.hiddenSeries%22%3A%5B%22Post+SYN%22%2C%22Later%22%2C%22Post+ACK%22%2C%22No+match%22%5D%2C%22xy.highlightedSeries%22%3Anull%2C%22xy.hoveredSeries%22%3Anull%2C%22xy.previousVisible%22%3Atrue%7D&amp;ref=%2Fexplorer%3FdataSet%3Dtcp_resets_timeouts%26loc%3Dru%26dt%3D28d"><u>Data Explorer</u></a> to focus on just the Post-PSH stage, where there is a dip followed by an immediate and proportionally large increase before June 11. This pattern corresponds closely with the loss data seen above:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RNvY4vrO6LQZ8qFeW5ENK/1f0f79701a46e2c2d43eb1b5aa812351/BLOG-2859_5.png" />
          </figure>
    <div>
      <h2>If you run Internet sites for Russian users</h2>
      <a href="#if-you-run-internet-sites-for-russian-users">
        
      </a>
    </div>
    <p>If you are using Cloudflare to protect your sites, unfortunately, at this time, Cloudflare does not have the ability to restore Internet connectivity for Russia-based users. We advise you to reach out and solicit Russian entities to lift the throttling measures that have been put in place.</p><p>If you are a Cloudflare enterprise customer, please reach out to your account team for further assistance.</p><p>Access to a free and open Internet is critical for individual rights and economic development. We condemn any attempt to prevent Russian citizens from accessing it.</p> ]]></content:encoded>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">vyxFL3zp5DqpF5RpHznRv</guid>
            <dc:creator>Michael Tremante</dc:creator>
            <dc:creator>Alissa Starzak</dc:creator>
        </item>
        <item>
            <title><![CDATA[New year, no shutdowns: the Q1 2025 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q1-2025-internet-disruption-summary/</link>
            <pubDate>Tue, 22 Apr 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ In Q1 2025, we observed Internet disruptions around the world caused by cable damage, power outages, natural disasters, fire, a cyberattack, and technical problems. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s <a href="https://www.cloudflare.com/network/"><u>network</u></a> spans more than 330 cities in over 125 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions at both a local and national level, as well as at a network level.</p><p>As we have noted in the past, this post is intended as a summary overview of observed and confirmed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter. A larger list of detected traffic anomalies is available in the <a href="https://radar.cloudflare.com/outage-center#traffic-anomalies"><u>Cloudflare Radar Outage Center</u></a>. Note that both bytes-based and request-based traffic graphs are used within the post to illustrate the impact of the observed disruptions — the choice of metric was generally made based on which better illustrated the impact of the disruption.</p><p>In the first quarter of 2025, we observed a significant number of Internet disruptions due to <a href="#submarine-and-terrestrial-cable-damage"><u>cable damage</u></a> and <a href="#widespread-power-outages"><u>power outages</u></a>. <a href="#severe-weather"><u>Severe storms</u></a> caused outages in Ireland and Réunion, and an <a href="#earthquake"><u>earthquake</u></a> caused ongoing connectivity issues in Myanmar. Russian networks were taken offline by a reported <a href="#cyberattack"><u>cyberattack</u></a> and purported <a href="#technical-problems"><u>technical problems</u></a>, while a <a href="#fire-damage"><u>fire</u></a> took a telecom provider in Haiti offline briefly. In Q4 2024, we observed only a <a href="https://blog.cloudflare.com/q4-2024-internet-disruption-summary/#government-directed"><u>single government-directed Internet shutdown</u></a>, and this quarter, <b>no such shutdowns were observed</b>. Unfortunately, this is an unusual occurrence, and in the three-year history of this blog post series, has only occurred previously in <a href="https://blog.cloudflare.com/q4-2023-internet-disruption-summary/#governmentdirected"><u>Q4 2023</u></a> and <a href="https://blog.cloudflare.com/q1-2022-internet-disruption-summary/"><u>Q1 2022</u></a>. </p>
    <div>
      <h2>Submarine and terrestrial cable damage</h2>
      <a href="#submarine-and-terrestrial-cable-damage">
        
      </a>
    </div>
    
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>Just after the new year, Internet connectivity in <a href="https://radar.cloudflare.com/pk"><u>Pakistan</u></a> was disrupted by a fault in the <a href="https://www.submarinecablemap.com/submarine-cable/asia-africa-europe-1-aae-1"><u>AAE-1 submarine cable</u></a>. According to a January 2 <a href="https://www.facebook.com/PTAOfficialPK/posts/pfbid02M2zM4MyFVAKWcHeg7WDKKTdwxF7PahWsYRW2W7WPLywp4dpLgS8m8ACUp5wtJJp6l"><u>alert</u></a> published on social media by the Pakistan Telecommunications Authority, the cable fault occurred near <a href="https://radar.cloudflare.com/qa"><u>Qatar</u></a>, and would likely impact user experience across the country. Because there are seven submarine cables carrying international Internet traffic to/from Pakistan, the loss of AAE-1 did not cause an observable outage. However, the impact of the disruption was visible in the <a href="https://radar.cloudflare.com/quality/pk?dateStart=2025-01-02&amp;dateEnd=2025-01-04#bandwidth"><u>bandwidth</u></a> and <a href="https://radar.cloudflare.com/quality/pk?dateStart=2025-01-02&amp;dateEnd=2025-01-04#latency"><u>latency</u></a> graphs for Pakistan. On January 2 and 3, median latency peaked at around 125 ms, up from a pre-disruption median of approximately 80 ms. Concurrent drops in bandwidth were observed, with media download speeds dropping to around 6 Mbps from a pre-disruption media of around 9 Mbps. In an <a href="https://www.instagram.com/p/DEVff2gTxw9/"><u>“Important Update”</u></a> posted to their Instagram account, <a href="https://radar.cloudflare.com/AS17557"><u>Pakistan Telecom (PTCL, AS17557)</u></a> also highlighted the potential for “slow browsing” — the <a href="https://radar.cloudflare.com/quality/as17557?dateStart=2025-01-02&amp;dateEnd=2025-01-04"><u>Internet Quality graphs for that network</u></a> show similarly-timed shifts in median bandwidth and latency.</p><p><a href="https://www.submarinecablemap.com/country/pakistan"><u>Pakistan</u></a> is currently connected to seven submarine cables, with two additional connections on the way in 2026. This connection diversity means that damage to or an issue with one cable will likely have minimal impact on Internet availability within the country, as traffic can be re-routed across other paths.</p>

<p></p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>According to an <a href="https://www.moct.gov.sy/news-0251"><u>announcement</u></a> from the Syrian Ministry of Communications, a widespread Internet outage spanning January 23-24 was caused by sabotage that damaged two fiber optic cables that run along the highway between Damascus and Homs. The graphs below show that both <a href="https://radar.cloudflare.com/traffic/sy?dateStart=2025-01-23&amp;dateEnd=2025-01-24#http-traffic"><u>HTTP</u></a> and <a href="https://radar.cloudflare.com/dns/sy?dateStart=2025-01-23&amp;dateEnd=2025-01-24#dns-query-volume"><u>DNS</u></a> request traffic from <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> dropped to near zero between 00:30 and 03:30 local time on January 24 (21:30 on January 23 - 00:30 on January 24 UTC). Traffic began recovering shortly thereafter, and returned to expected levels by 09:00 local time (06:00 UTC). <a href="https://radar.cloudflare.com/routing/sy?dateStart=2025-01-23&amp;dateEnd=2025-01-24"><u>Announced IPv4 address space for the country</u></a>, almost exclusively from <a href="https://radar.cloudflare.com/routing/as29256?dateStart=2025-01-23&amp;dateEnd=2025-01-24"><u>Syria Telecom (AS29256)</u></a>, also saw an approximately 90% drop during this period, which suggests that these fiber cuts caused a significant amount of Syria Telecom’s network to become unreachable during the incident.</p><p>Echoing the disruption above, <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> experienced another Internet outage on March 25, again caused by sabotage that damaged fiber optic cables. According to an <a href="https://moct.gov.sy/news-0279"><u>announcement</u></a> from the Syrian Ministry of Communications, the damage occurred in the Maaloula and Hasiya regions, resulting in a near complete outage between 03:00 - 13:15 local time (00:00 - 10:15 UTC). Similar to the January outage, the graphs below show a near complete loss of <a href="https://radar.cloudflare.com/traffic/sy?dateStart=2025-03-24&amp;dateEnd=2025-03-25#http-traffic"><u>HTTP</u></a> request traffic and a significant loss of <a href="https://radar.cloudflare.com/routing/sy?dateStart=2025-03-24&amp;dateEnd=2025-03-25#announced-ip-address-space"><u>announced IPv4 address space</u></a>.</p><p>Somewhat paradoxically, <a href="https://radar.cloudflare.com/dns/sy?dateStart=2025-03-24&amp;dateEnd=2025-03-25#dns-query-volume"><u>DNS request volume from Syria</u></a> was elevated during this outage, in contrast to the behavior observed during the January event. It isn’t clear what drove the additional traffic to Cloudflare’s <a href="https://one.one.one.one/dns/"><u>1.1.1.1 DNS resolver</u></a> in this case.</p>
    <div>
      <h3>Nepal</h3>
      <a href="#nepal">
        
      </a>
    </div>
    <p>In early February, several Internet providers in <a href="https://radar.cloudflare.com/np"><u>Nepal</u></a> saw services disrupted when Indian provider <a href="https://radar.cloudflare.com/as9498"><u>Bharti Airtel (AS9498)</u></a> went offline. <a href="https://radar.cloudflare.com/as23752"><u>AS23752 (Nepal Telecom)</u></a>, <a href="https://radar.cloudflare.com/as17501"><u>AS17501 (Worldlink Communications)</u></a>, <a href="https://radar.cloudflare.com/as139922"><u>AS139922 (Dishhome Fibernet)</u></a>, <a href="https://radar.cloudflare.com/as45650"><u>AS45650 (Vianet Communications)</u></a>, and <a href="https://radar.cloudflare.com/as38565"><u>AS38565 (Ncell)</u></a>, who all have Airtel as an upstream provider or peer, saw traffic disrupted between 21:00 - 22:30 local time (15:15 - 16:45 UTC) on February 2.</p><p>Published reports disagree on the underlying cause of the Airtel issue, with one source claiming that it was related to an <a href="https://english.onlinekhabar.com/nationwide-internet-outage-in-nepal-after-payment-dispute-with-indian-bandwidth-provider.html"><u>ongoing payment dispute</u></a>, while another claims that it was due to reported <a href="https://kathmandupost.com/money/2025/02/04/nationwide-internet-outage-raises-concerns-over-outstanding-dues"><u>fiber cuts</u></a> in Airtel’s network.</p>
Show less
    <div>
      <h2>Widespread power outages</h2>
      <a href="#widespread-power-outages">
        
      </a>
    </div>
    
    <div>
      <h3>Angola</h3>
      <a href="#angola">
        
      </a>
    </div>
    <p><a href="https://angop.ao/en/noticias/economia/restabelecida-energia-electrica-nas-11-provincias-afectadas-pelo-apagao/"><u>Eleven provinces</u></a> in <a href="https://radar.cloudflare.com/ao"><u>Angola</u></a> lost electrical power on January 6 <a href="https://x.com/portalangop/status/1876328913070432710"><u>due to</u></a> an interruption in the North and Center Interconnected System, according to the <a href="http://www.rnt.co.ao/"><u>National Electricity Transmission Network (RNT)</u></a>. The widespread power outage disrupted Internet connectivity across the country, leading to a drop in traffic between 14:45 - 22:00 local time (13:45 - 21:00 UTC). <a href="https://angop.ao/en/noticias/economia/restabelecida-energia-electrica-nas-11-provincias-afectadas-pelo-apagao/"><u>Published reports</u></a> said that RNT was investigating the cause of the power outage, but no subsequent information was available confirming a specific cause.</p>
    <div>
      <h3>Sri Lanka</h3>
      <a href="#sri-lanka">
        
      </a>
    </div>
    <p>Monkey business at the Pandura electrical substation caused an island-wide power outage in <a href="https://radar.cloudflare.com/lk"><u>Sri Lanka</u></a> on February 9. More seriously, <a href="https://www.barrons.com/news/sri-lankan-monkey-causes-nationwide-blackout-2c3cc8ac"><u>a monkey coming into contact with a grid transformer</u></a> caused the power outage, which resulted in a multi-hour disruption to Internet traffic from the country. Traffic initially dropped around 11:30 local time (06:00 UTC), and recovered by around 21:00 local time (15:30 UTC). The graph below for <a href="https://radar.cloudflare.com/as18001"><u>AS18001 (Dialog)</u></a>, a major Sri Lankan network services provider, illustrates the impact on traffic.</p>
    <div>
      <h3>Chile</h3>
      <a href="#chile">
        
      </a>
    </div>
    <p>On February 25, a <a href="https://www.clarin.com/mundo/masivo-corte-luz-chile-afecta-80-ciento-pais_0_JxZR7Py3kb.html"><u>massive power outage</u></a> in <a href="https://radar.cloudflare.com/cl"><u>Chile</u></a> <a href="https://www.cnnchile.com/pais/chile-a-oscuras-mas-de-19-millones-de-clientes-sin-electricidad-equivalente-al-985-del-pais_20250225/"><u>reportedly impacted</u></a> 98.5% of the country. A <a href="https://www.cnnchile.com/pais/autoridades-informan-corte-luz-nacional-debe-desconexion-sistema-transmision-norte-chico_20250225/"><u>published report</u></a> noted that there was an interruption in the power supply from Arica to the Los Lagos region, caused by a disconnection of the 500 kV transmission system in the Norte Chico. The power outage resulted in an immediate and significant drop in Internet traffic, as seen at a country level, as well at a network level, as shown in the graphs below. Traffic initially fell at around 14:15 local time (18:15 UTC) and recovered to expected levels approximately 12 hours later, around 02:00 local time (06:00 UTC). It was <a href="https://www.cnnchile.com/pais/gobierno-informa-mas-94-clientes-pais-ya-tienen-suministro-electrico_20250226/"><u>reported</u></a> that as of an hour after traffic had recovered, approximately 94% of customers had power restored.</p>
    <div>
      <h3>Honduras</h3>
      <a href="#honduras">
        
      </a>
    </div>
    <p>A ground fault at the 15 de Septiembre electrical substation in <a href="https://radar.cloudflare.com/sv"><u>El Salvador</u></a> was <a href="https://www.elheraldo.hn/honduras/descartan-honduras-origen-apagon-afecto-region-erick-tejada-KD24633485"><u>reportedly</u></a> the cause of a power outage that resulted in a multi-hour Internet disruption in <a href="https://radar.cloudflare.com/hn"><u>Honduras</u></a> on March 1. The Regional Operator Entity (OER) <a href="https://www.instagram.com/protocinetico/p/DGrLkEqzWEP/"><u>stated</u></a> that the failure occurred at 09:22 local time (15:22 UTC), which resulted in traffic from the country dropping by about half. The disruption to Internet connectivity was relatively short-lived, as traffic returned to expected levels approximately two hours later.</p>
    <div>
      <h3>Cuba</h3>
      <a href="#cuba">
        
      </a>
    </div>
    <p>According to an <a href="https://x.com/EnergiaMinasCub/status/1900714003623506167"><u>X post from @EnergiasMinasCub</u></a> (the Cuban state agency responsible for promoting the sustainable development of the country's energy, geological, and mining sectors), at around 20:15 local time on March 14 (00:15 UTC on March 15) “<i>a failure at the Diezmero substation caused a significant loss of generation in the west of #Cuba and with it the failure of the National Electric System, SEN</i>”. This widespread power outage resulted in an immediate drop in request traffic from <a href="https://radar.cloudflare.com/cu"><u>Cuba</u></a>. Over the following two days, X posts from @EnergiasMinasCub, <a href="https://x.com/OSDE_UNE"><u>@OSDE_UNE</u></a> (the Cuban Electric Union), and <a href="https://x.com/ETECSA_Cuba"><u>@ETECSA_Cuba</u></a> (the Cuban Telecommunications Company) kept impacted subscribers apprised of the status of ongoing repairs. Traffic levels returned to expected levels around 20:00 local time on March 16 (00:00 on March 17 UTC), two full days after the incident began.</p>
    <div>
      <h3>Panama</h3>
      <a href="#panama">
        
      </a>
    </div>
    <p>An explosion and fire at the La Chorrera Thermoelectric Power Plant in <a href="https://radar.cloudflare.com/pa"><u>Panama</u></a> caused a <a href="https://www.msn.com/en-in/news/world/blackout-in-panama-after-massive-fire-at-power-plant-water-supply-hit-too/ar-AA1B0vOv"><u>massive power outage</u></a> across the country, starting at 23:40 local time on March 15 (04:40 on March 16 UTC). As expected, traffic dropped immediately, as seen in the HTTP and DNS request graphs below. However, recovery was fairly swift, as the <a href="https://x.com/PanamaAmerica/status/1901288375778246675"><u>electric system saw 75% recovery</u></a> by 03:00 local time (08:00 UTC), with full restoration <a href="https://x.com/Etesatransmite/status/1901234515999174723"><u>completed</u></a> at 06:08 local time (11:08 UTC). Traffic volumes began to increase after power was restored.</p>
    <div>
      <h2>Severe weather</h2>
      <a href="#severe-weather">
        
      </a>
    </div>
    
    <div>
      <h3>Ireland</h3>
      <a href="#ireland">
        
      </a>
    </div>
    <p><a href="https://en.wikipedia.org/wiki/Storm_%C3%89owyn"><u>Storm Éowyn</u></a> <a href="https://www.theguardian.com/uk-news/live/2025/jan/24/storm-eowyn-uk-weather-scotland-ireland-warning-winds-live-updates"><u>wreaked havoc</u></a> on <a href="https://radar.cloudflare.com/ie"><u>Ireland</u></a> in late January, knocking out <a href="https://transformers-magazine.com/tm-news/180000-without-power-in-ireland/"><u>power and water</u></a>, causing property damage, and limiting air and train travel. The storm’s impacts also disrupted Internet connectivity, as <a href="https://x.com/CloudflareRadar/status/1882851611749626219"><u>we observed</u></a> traffic from Connacht and Ulster fall by 75% as compared to the previous week at 06:30 local time (06:30 UTC) on January 24. As recovery from the storm progressed over the next several days, Internet traffic gradually recovered as well, with traffic in the two provinces reaching levels near those seen the prior week by mid-day on January 28.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/sXx1CEVuZIP0pDyKXH0xY/2f5d256f5967eca3debcfbe59dc8b42f/GiY1qXQXcAADgKl.jpeg" />
          </figure>
    <div>
      <h3>Réunion</h3>
      <a href="#reunion">
        
      </a>
    </div>
    <p><a href="https://en.wikipedia.org/wiki/Cyclone_Garance"><u>Cyclone Garance</u></a> made landfall over the French territory of <a href="https://radar.cloudflare.com/re"><u>Réunion</u></a> at ~10:00 local time (06:00 UTC) on February 28. Damage from the storm's 100+ miles/hour (160+ km/hour) winds caused power outages and infrastructure damage, resulting in disruptions to Internet connectivity. The most significant impacts to traffic were observed in the hours after the storm made landfall, but it took <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=re&amp;dt=2025-02-27_2025-03-05&amp;timeCompare=1"><u>several days before traffic returned to expected levels</u></a>, reaching that point around 08:00 local time (04:00 UTC) on March 4.</p>
    <div>
      <h2>Earthquake</h2>
      <a href="#earthquake">
        
      </a>
    </div>
    
    <div>
      <h3>Myanmar</h3>
      <a href="#myanmar">
        
      </a>
    </div>
    <p>On March 28 at 12:50 local time (06:20 UTC), a <a href="https://earthquake.usgs.gov/earthquakes/eventpage/us7000pn9s/executive"><u>magnitude 7.7 earthquake</u></a> shook <a href="https://radar.cloudflare.com/mm"><u>Myanmar</u></a>, resulting in <a href="https://reccessary.com/en/news/asean-environment/massive-earthquake-in-myanmar-triggers-power-outages-fuel-shortages"><u>power outages and fuel shortages</u></a>. Almost immediately, <a href="https://x.com/CloudflareRadar/status/1905566630760902897"><u>traffic dropped by around 40%</u></a> at a country level. <a href="https://x.com/CloudflareRadar/status/1905603328144261396"><u>Regionally</u></a>, traffic from Nay Pyi Taw dropped 97% as compared to the previous week, Mandalay fell 90%, Ayeyarwady lost 88%, Bago 50%, and Shan State was down 38%.</p><p>While recovery efforts stretch into April, regular traffic patterns and volumes bounced back within days, as seen in the HTTP and DNS request graphs below.</p><p>However, at a network level, recovery has been mixed. Both <a href="https://radar.cloudflare.com/as134840"><u>AS134840 (MCCL)</u></a> and <a href="https://radar.cloudflare.com/as136442"><u>AS136442 (Oceanwave)</u></a> saw significant drops in traffic after the earthquake occurred, and traffic remained disrupted on both networks through the end of the first quarter. Peak traffic on MCCL has increased slightly, but nearly two weeks on, remains significantly lower than pre-earthquake levels. Traffic on Oceanwave saw steady growth after the initial disruption, and as of this writing is approaching pre-earthquake peaks. (It is unclear what caused the significant spike in request traffic seen from Oceanwave on April 3-4.) In contrast to these two providers, traffic from <a href="https://radar.cloudflare.com/as163255"><u>AS163255 (Mytel)</u></a> saw a significantly smaller disruption, and a <a href="https://developingtelecoms.com/telecom-business/humanitarian-communications/18289-mytel-says-connectivity-mostly-restored-after-myanmar-quake-amid-shutdown-fears.html"><u>significantly faster recovery</u></a>, as did traffic from <a href="https://radar.cloudflare.com/as135300?dateStart=2025-03-27&amp;dateEnd=2025-04-09#traffic-trends"><u>AS135300 (Myanmar Broadband Telecom)</u></a>.</p>
    <div>
      <h2>Cyberattack</h2>
      <a href="#cyberattack">
        
      </a>
    </div>
    
    <div>
      <h3>Russia</h3>
      <a href="#russia">
        
      </a>
    </div>
    <p>On January 7, <a href="https://radar.cloudflare.com/ru"><u>Russian</u></a> Internet provider <a href="https://radar.cloudflare.com/as29329"><u>Nodex (AS29329)</u></a> said in <a href="https://vk.com/wall-7622_825"><u>a post on Russian social media platform VKontakte</u></a> (translated) “<i>Dear Subscribers, our technical staff is still working on restoring the network. The process is painstaking and long. We express our deep gratitude to those who support us in this difficult moment! This is really important for us. Let me remind you that our network was attacked by Ukrainian hackers, which resulted in its complete failure. At the moment, its functioning is being restored. There will be communication. When, is still unknown.</i>” The <a href="https://en.wikipedia.org/wiki/Ukrainian_Cyber_Alliance"><u>Ukrainian Cyber Alliance</u></a>, a community of pro-Ukraine cyber activists formed in 2016, <a href="https://t.me/UCAgroup/38"><u>claimed responsibility for the attack</u></a> in a Telegram post.</p><p>The “complete failure” of the Nodex network is visible in the traffic graph below, where Internet traffic from the network began to drop after 03:00 local time (00:00 UTC) on January 7, reaching zero around 05:30 local time (02:30 UTC). Traffic from the network remained essentially non-existent until around 14:00 local time (11:00 UTC) the next day, recovering fairly quickly after that. Announced IPv4 address space fell by two-thirds at the same time that traffic volume dropped to zero, but recovered at 21:20 local time (18:20 UTC).</p>
    <div>
      <h2>Fire damage</h2>
      <a href="#fire-damage">
        
      </a>
    </div>
    
    <div>
      <h3>Los Angeles, California</h3>
      <a href="#los-angeles-california">
        
      </a>
    </div>
    <p>Between January 7-9, during the early days of the<a href="https://en.wikipedia.org/wiki/January_2025_Southern_California_wildfires"><u> 2025 Southern California wildfires</u></a> — which affected the <a href="https://www.fire.ca.gov/incidents/2025/1/7/palisades-fire"><u>Palisades</u></a> and <a href="https://www.fire.ca.gov/incidents/2025/1/7/eaton-fire"><u>Eaton</u></a> areas in Los Angeles — there were clear Internet disruptions in at least 13 Los Angeles neighborhoods. According to Cloudflare’s data, traffic drops of over 50% compared to the previous week were especially noticeable in cities like Pacific Palisades, Altadena, Malibu, Temple City, and Monrovia, among others. In the weeks that followed, traffic remained significantly lower than before the fires, particularly in Pacific Palisades and Altadena, reflecting the devastation in those areas. However, traffic recovery occurred significantly sooner in Malibu, Temple City, and Monrovia, although peak traffic levels remain somewhat below pre-fire levels. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/36NDkw4HzvLjEb1B2kMtLs/1792de620a5c2fbc5f83947f34b14f2f/BLOG-2800_LA1.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5xXx4H91hZ4sqwfuBpWde7/0cb0b4d03e6a5f2313dc0d6b7f0412e8/BLOG-2800_LA2.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6RHkUjU4OreZ6pQ8zBy3rQ/13c5a0f94466e4faa6c9673872111621/BLOG-2800_LA3.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/L9WOAV7BMywf9Q1jquEmh/46d5c2df525cf44384bc9f0ddd93a1c3/BLOG-2800_LA4.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7pOWHX6sf42uUFxUaWTFUD/b569959b669329aa528d6603f9db7827/BLOG-2800_LA5.png" />
          </figure>
    <div>
      <h3>Haiti</h3>
      <a href="#haiti">
        
      </a>
    </div>
    <p>On January 15, an <a href="https://x.com/jpbrun30/status/1879554628469362857"><u>X post</u></a> from the Director General of <a href="https://radar.cloudflare.com/as27653"><u>Digicel Haiti (AS27653)</u></a> stated (translated) “<i>Dear customers, last night at 8:30 pm we suffered damage to 2 of our international fiber optic cables caused by a fire in the metropolitan area. At 10:30 am a 3rd outage affected all international services, Internet and Moncash. Our teams are mobilized to resolve the problem as quickly as possible.</i>” These fires ultimately caused two complete Internet outages for Digicel Haiti’s customers, as seen in the graphs below.</p><p>Both traffic and announced IP address space (IPv4 &amp; IPv6) dropped to zero between 20:30 - 21:45 local time on January 14 (01:30 - 02:45 on January 15 UTC) and again between 10:15 - 11:00 local time on January 15 (15:15 - 16:00 UTC).</p>
    <div>
      <h2>Technical problems</h2>
      <a href="#technical-problems">
        
      </a>
    </div>
    
    <div>
      <h3>Russia</h3>
      <a href="#russia">
        
      </a>
    </div>
    <p>On January 14, multiple <a href="https://radar.cloudflare.com/ru"><u>Russian</u></a> networks, including <a href="https://radar.cloudflare.com/as8359"><u>AS8359 (MTS)</u></a>, <a href="https://radar.cloudflare.com/as12389"><u>AS12389 (Rostelecom)</u></a>, <a href="https://radar.cloudflare.com/as16345"><u>AS16345 (Beeline)</u></a>, <a href="https://radar.cloudflare.com/as31133"><u>AS31133 (MegaFon)</u></a>, and <a href="https://radar.cloudflare.com/as203451"><u>AS203451 (K-telecom)</u></a> all experienced a brief disruption in connectivity. As the traffic graphs below show, Internet traffic from these networks <a href="https://x.com/CloudflareRadar/status/1879196319874740312"><u>dropped by around 80%</u></a> between 14:00 - 14:30 UTC. According to a <a href="https://meduza.io/en/news/2025/01/14/internet-users-in-russia-report-widespread-service-outages"><u>statement</u></a> from <a href="https://en.wikipedia.org/wiki/Roskomnadzor"><u>Roskomnadzor</u></a>,  “<i>A brief connectivity issue was identified. Network operations were promptly restored.</i>” However, <a href="https://x.com/Liveuamap/status/1879195091874746543"><u>industry observers suggested</u></a> that the cause may have been due to an update to the so-called “Russian firewall” that failed and was quickly rolled back.</p>

    <div>
      <h3>Georgia</h3>
      <a href="#georgia">
        
      </a>
    </div>
    <p>Subscribers to <a href="https://radar.cloudflare.com/as16010"><u>Magticom (AS16010)</u></a>, one of the largest Internet providers in <a href="https://radar.cloudflare.com/ge"><u>Georgia</u></a>, experienced a complete outage on January 27. Request traffic and announced IP address space disappeared at 21:25 local time (17:25 UTC), recovering at 01:55 local time on January 28 (21:55 UTC). A (translated) <a href="https://www.facebook.com/permalink.php?story_fbid=pfbid03i7LBfz1Rn3YUJAUgzgv8oKK2xTPoozMAzeJnEWxbqPvYkMSUukwYnCGSqJDRcpgl&amp;id=100064447729415"><u>Facebook post from Magticom</u></a> explained that the company’s Internet connectivity comes through “<i>channels from Europe</i>” and that “<i>damage was reported in Turkey, where heavy snowfall and avalanche risks have prevented the partner company’s technical teams from reaching the affected area</i>”. Further, it noted that on the backup channel, “<i>suspicious damage was reported at three points on the Georgian side, in the territory of Adjara…</i>” Magticom’s published start and end times for the outage align with the loss and recovery of traffic and announced IP address space observed in Cloudflare data. </p>

    <div>
      <h3>France</h3>
      <a href="#france">
        
      </a>
    </div>
    <p>Subscribers of <a href="https://radar.cloudflare.com/as5410"><u>Bouygues Telecom (AS5410)</u></a> in <a href="https://radar.cloudflare.com/fr"><u>France</u></a> experienced a brief disruption to their Internet connectivity on March 11. According to a (translated) <a href="https://x.com/bouyguestelecom/status/1899352941942681834"><u>X post from the provider</u></a>, “<i>Following a technical incident between 5 a.m. and 7 a.m. you may have encountered difficulties using your services.</i>” As seen in the request traffic graphs below, a drop in traffic is visible between 05:00 - 06:45 local time (04:00 - 05:45 UTC), aligning with the provider’s stated timeframe. Bouyges Telecom did not provide any subsequent details around the cause of the “technical incident”.</p>
    <div>
      <h2>Unknown cause</h2>
      <a href="#unknown-cause">
        
      </a>
    </div>
    
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>Major Internet outages and disruptions in <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> are generally well documented, such as the cable cuts discussed above. However, on February 3, a multi-hour disruption was observed in the country, but no underlying cause was ever publicly disclosed. Starting approximately 14:00 local time (11:00 UTC), traffic from the country dropped by approximately 80%, along with a ~60% drop in announced IPv4 address space. Both traffic and announced IP address space returned to expected levels around 23:00 local time (20:00 UTC). The outage was confirmed in an <a href="https://x.com/syr_television/status/1886403431583092826"><u>X post from Syrian Television</u></a>.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>While the single government-directed shutdown last quarter, and the lack of such shutdowns this quarter, is an encouraging trend, we expect that it will be short-lived if countries like Iraq and Syria once again take such measures to prevent cheating on nationwide exams. As always, we encourage governments to recognize the collateral damage of such actions, and suggest that they explore alternative solutions to this problem.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a><u>email</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">4BkxBjZIqq5UIU9wkfkJwr</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[A diversity of downtime: the Q4 2024 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q4-2024-internet-disruption-summary/</link>
            <pubDate>Tue, 28 Jan 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ After a rather busy third quarter, the fourth quarter of 2024 saw significantly fewer Internet disruptions. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s <a href="https://www.cloudflare.com/network/">network</a> spans more than 330 cities in over 120 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions at both a local and national level, as well as at a network level.</p><p>As we have noted in the past, this post is intended as a summary overview of observed and confirmed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter. A larger list of detected traffic anomalies is available in the <a href="https://radar.cloudflare.com/outage-center#traffic-anomalies"><u>Cloudflare Radar Outage Center</u></a>.</p><p>In the third quarter we covered quite a few <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#government-directed"><u>government-directed Internet shutdowns</u></a>, including many intended to prevent cheating on exams. In the fourth quarter, however, we only observed a single <a href="#government-directed"><u>government-directed shutdown</u></a>, this one related to protests. Terrestrial <a href="#cable-cuts"><u>cable cuts</u></a> impacted connectivity in two African countries. As we have seen multiple times before, both unexpected <a href="#power-outages"><u>power outages</u></a> and rolling power outages following <a href="#military-action"><u>military action</u></a> resulted in Internet disruptions. <a href="#natural-disasters"><u>Violent storms and an earthquake</u></a> predictably caused Internet outages in the affected countries. And unexpected issues with <a href="#maintenance"><u>maintenance</u></a> efforts caused outages at two European providers, while Verizon customers in several US states experienced a brief but <a href="#unknown"><u>unexplained</u></a> outage.</p>
    <div>
      <h2>Cable cuts</h2>
      <a href="#cable-cuts">
        
      </a>
    </div>
    
    <div>
      <h3>Rwanda</h3>
      <a href="#rwanda">
        
      </a>
    </div>
    <p>On October 1, local mobile provider <a href="https://radar.cloudflare.com/as36890"><u>MTN Rwanda (AS36890)</u></a> <a href="https://x.com/MTNRwanda/status/1841092339625865329"><u>published a post on X</u></a> alerting subscribers of a double fiber cut in <a href="https://radar.cloudflare.com/tz"><u>Tanzania</u></a> and <a href="https://radar.cloudflare.com/ug"><u>Uganda</u></a> that may impact connection quality. As a result of these fiber cuts, Internet traffic began to drop sharply after 12:45 local time (10:45 UTC), with a full outage visible between 13:15 - 13:30 local time (11:15 - 11:30 UTC). Traffic then began to rapidly recover, recovering to expected levels around 19:00 local time (17:00 UTC). Several hours later, MTN Rwanda <a href="https://x.com/MTNRwanda/status/1841201775493464174"><u>published a followup post</u></a> confirming that all services had been restored.</p><p>The <a href="https://afterfibre.nsrc.org/"><u>African Undersea and Terrestrial Fibre Optic Cables (AfTerFibre) map</u></a> shows that in addition to connecting with networks to the north and south in Tanzania and Uganda, it appears that connections are also available through networks to the west in the <a href="https://radar.cloudflare.com/cd"><u>Democratic Republic of the Congo (DRC)</u></a>. However, <a href="https://radar.cloudflare.com/routing/as36890#connectivity"><u>MTN Rwanda’s upstream providers and/or peers</u></a> may not be routing traffic through DRC-based networks, meaning that they couldn’t be used as a backup path when the apparently simultaneous fiber cuts occurred.</p>
    <div>
      <h3>Niger</h3>
      <a href="#niger">
        
      </a>
    </div>
    <p>On November 30, local mobile provider <a href="https://radar.cloudflare.com/as37531"><u>Airtel Niger (AS37531)</u></a> <a href="https://x.com/airtelniger/status/1862936319824888015"><u>posted a thread of messages</u></a> on X apologizing for Internet service disruptions, explaining that (translated) “<i>Indeed, due to a simultaneous interruption on the national optical fiber on the Niamey-Dosso, Niamey-Balleyara exits, our internet services are completely interrupted throughout the territory, beyond our control.</i>” These simultaneous fiber cuts resulted in a near complete outage between 17:30 local time (16:30 UTC) on November 29 until 19:45 local time (18:45 UTC) on November 30.</p><p>It seems unusual that the message thread was not posted until after the outage was resolved. It is possible that Airtel Niger themselves had no backup connectivity, and could not post an update until connectivity was restored. Alternately, given that the first post of the thread starts with “<i>[COMMUNIQUÉ IMPORTANT📢]</i>” (“<i>[IMPORTANT PRESS RELEASE 📢 ]</i>”), it is possible that the alert and apology was communicated through more official channels, such as Airtel’s website, in a timely manner, with the thread on X simply a follow-up once Internet services were again available.</p>
    <div>
      <h2>Power outages</h2>
      <a href="#power-outages">
        
      </a>
    </div>
    
    <div>
      <h3>Cuba </h3>
      <a href="#cuba">
        
      </a>
    </div>
    <p>Instability in a country’s electrical infrastructure often causes widespread power outages, which, in turn, disrupt Internet connectivity. This happened on October 18 in <a href="https://radar.cloudflare.com/cu"><u>Cuba</u></a>, where a <a href="https://x.com/EnergiaMinasCub/status/1847315612738978114"><u>post on X from the Ministry of Energy and Mines of Cuba</u></a> noted (translated) “<i>Following the unexpected disconnection of the Antonio Guiteras CTE, the National Electricity System was completely disconnected at 11 a.m. today. The Unión Eléctrica is working on its restoration.</i>” The power outage caused Internet traffic within the country to drop by more than half within minutes (15:15 UTC). Connectivity was disrupted for approximately three-and-a-half days, as it returned to expected levels around 23:00 local time on October 21 (03:00 UTC on October 22).</p><p>The Ministry posted several status updates on October 19 and 20, covering the work being done to restore power across the country. A <a href="https://x.com/OSDE_UNE/status/1848812241979916598"><u>final X post on October 22</u></a> signaled the end of the power outage, proclaiming (translated) “<i>At 02:44 pm the National Electric System was synchronized.</i>”</p><p>Several weeks later, power issues again impacted Internet connectivity in Cuba. On November 6, <a href="https://x.com/OSDE_UNE/status/1854252013212844461"><u>the Electrical Union of Cuba (Uníon Eléctrica) posted on X</u></a> that (translated) “<i>14:48 hours. Strong winds caused by the intense Hurricane Rafael, cause the disconnection of the National Electric System. Contingency protocols are applied.</i>” The timing of this post aligns with a sharp decline in traffic observed from Cuba, which fell sharply around 14:30 local time (19:30 UTC). Over the following days, after Hurricane Rafael passed the island, the Uníon Eléctrica posted numerous updates on the restoration of electrical service. Internet traffic appeared to return to expected levels around 13:00 local time (18:00 UTC) on November 9, although full restoration of electrical services took several days longer.</p><p>On December 4, Cuba suffered its third nationwide power outage in as many months. Early that morning, the <a href="https://x.com/EnergiaMinasCub/status/1864220455139168538"><u>Ministry of Energy and Mines posted on X</u></a> that (translated) “<i>At 2:08 this morning, the Electrical System, SEN, was disconnected when the Antonio Guiteras thermoelectric plant went out due to the automatic tripping.</i>” The loss of this electrical power due to the failure of this generation plant caused a significant drop in Internet traffic from Cuba, falling approximately 60% as compared to the previous week at just before 02:15 local time (07:15 UTC). Traffic recovered to expected levels almost a day later at around 00:30 local time (05:30 UTC). This timing aligns with a <a href="https://x.com/EnergiaMinasCub/status/1864542875255541780"><u>follow-on X post from the Ministry</u></a> that announced that all units had been synchronized, signaling a restoration of electrical service.</p>
    <div>
      <h3>Guadeloupe</h3>
      <a href="#guadeloupe">
        
      </a>
    </div>
    <p>An article <a href="https://www.theguardian.com/world/2024/oct/25/guadeloupe-power-outage-strike"><u>published in The Guardian</u></a> on October 25 noted that “<i>The French Caribbean island of </i><a href="https://radar.cloudflare.com/gp"><i><u>Guadeloupe</u></i></a><i> has been left entirely without power after striking workers seized control of the territory’s power station.</i>” Workers entered the power station’s command room “<i>and caused an emergency shutdown of all the engines</i>”, according to the article. The power outage caused by this “emergency shutdown” resulted in traffic dropping nearly 70% as compared to the previous week at 08:30 local time (12:30 UTC). Although “<a href="https://www.lemonde.fr/en/international/article/2024/10/25/guadeloupe-suffers-power-outage-blamed-on-striking-staff_6730504_4.html"><u>restored electricity supply for the 230,000 affected households was expected at 3 pm local time (19:00 UTC) at best</u></a>”, it appears that recovery took significantly longer than expected, as Internet traffic did not return to expected levels until around 22:00 local time on October 26 (02:00 UTC on October 27) . A <a href="https://www.guadeloupe.gouv.fr/Actualites/Communiques-et-dossiers-de-presse/Conflit-EDF-PEI-Point-de-situation-a-11h"><u>press release from the government</u></a> at 11:00 local time (15:00 UTC) on October 26 gave an update on the recovery efforts, noting (translated) “<i>160,000 users have had their electricity restored. The restoration of service for the 70,000 customers still cut off is continuing, with a return to normal expected over the weekend.</i>” It also noted that “<i>76% of Orange subscribers have been able to regain their network connection. 1,800 homes are still without internet.</i>”</p>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>Power outages in <a href="https://radar.cloudflare.com/ke"><u>Kenya</u></a> resulted in multiple Internet disruptions during both the <a href="https://blog.cloudflare.com/q2-2024-internet-disruption-summary/#kenya"><u>second</u></a> and <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#kenya"><u>third</u></a> quarters of 2024. A similar event occurred during the fourth quarter as well. An <a href="https://x.com/KenyaPower_Care/status/1869153351436468632"><u>X post from Kenya Power</u></a> contained a “Customer Alert” issued at 01:28 local time on December 18 (22:28 UTC on December 17) that informed customers that “<i>We are experiencing a widespread power outage affecting most of the country, except parts of Western and North Rift regions.</i>” This outage caused Internet traffic from the country to drop by over 70% starting just after midnight local time on December 18 (21:00 UTC on December 17). On December 18 at 07:35 local time (04:35 UTC), an <a href="https://x.com/KenyaPower_Care/status/1869243286667628702"><u>update from Kenya Power posted to X</u></a> reported that power had been restored to all affected areas. Internet traffic from the country had recovered to near expected levels by that time as well.</p>
    <div>
      <h2>Natural disasters</h2>
      <a href="#natural-disasters">
        
      </a>
    </div>
    
    <div>
      <h3>United States, Florida</h3>
      <a href="#united-states-florida">
        
      </a>
    </div>
    <p>At 20:30 local time on October 9 (00:30 UTC on October 10), <a href="https://www.weather.gov/mlb/HurricaneMilton_Impacts"><u>Hurricane Milton made landfall in Florida</u></a> as a Category 3 storm. Damage from Milton was extensive, including flooding, downed trees and power lines, and damage to homes and businesses. The power outages and other infrastructure damage caused by the storm, coupled with evacuation from impacted areas, resulted in a notable Internet disruption at a state level. As seen in the graph below, peak traffic levels on October 10, after Milton’s arrival, were approximately 40% lower than the preceding days. As recovery and restoration efforts began over the following days, and as evacuees returned to home, school, and work, the state’s Internet traffic began to gradually increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KVUA87OvUlomBVrbylU8w/793b65193655ffef980c9341c1476668/Oct_9_-_United_States_-_Florida.png" />
          </figure><p>This gradual recovery is also visible in the series of maps below, which illustrate cities where <a href="https://x.com/CloudflareRadar/status/1845903842355101827"><u>Internet traffic was over 50% lower</u></a> than the same time the prior week, with snapshots taken at 09:00 local time (13:00 UTC) on October 10, 11, and 14. On October 10, <a href="https://x.com/CloudflareRadar/status/1844444286911381980"><u>over 70 cities</u></a> had significantly lower traffic, while on October 14, it was just over 10 cities.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rqveKTtJ60LW8rLBizxeD/ea62aec5653bc46622fbabb922e61c88/Florida_-_three_maps.jpeg" />
          </figure>
    <div>
      <h3>Mayotte</h3>
      <a href="#mayotte">
        
      </a>
    </div>
    <p>On December 14, Cyclone Chido caused significant destruction on the French territory of <a href="https://radar.cloudflare.com/yt"><u>Mayotte</u></a> in the Indian Ocean. Power, water, and communications infrastructure <a href="https://reliefweb.int/report/mozambique/cyclone-chido-has-devastated-mayotte-and-mozambique"><u>were all damaged</u></a>, as well as homes and public facilities. Over three dozen people <a href="https://www.reuters.com/business/environment/french-officials-raise-mayotte-death-toll-39-after-storm-chido-2024-12-24/"><u>were killed</u></a>, with thousands more injured. With such widespread devastation, Internet traffic from the country was also impacted, as would be expected. Chido <a href="https://reliefweb.int/attachments/f852498a-d8a7-42c2-a447-ceff1d24ddeb/20241219_ACAPS_Briefing_note_Mayotte_Impact_of_Tropical_Cyclone_Chido.pdf"><u>made landfall</u></a> in Mayotte early in the morning on December 14, and traffic dropped sharply around 09:00 local time (06:00 UTC), causing a near-complete Internet outage. After extremely slow growth over the following week, a diurnal pattern is once again visible, with peak traffic levels continuing to gradually increase through the end of the month. As of the third week of January 2025, Mayotte’s Internet traffic continues to slowly increase, but remains well below pre-Chido levels.</p>
    <div>
      <h3>Vanuatu</h3>
      <a href="#vanuatu">
        
      </a>
    </div>
    <p>A <a href="https://earthquake.usgs.gov/earthquakes/eventpage/us7000nzf3/executive"><u>magnitude 7.3 earthquake</u></a> struck 24 km WNW of Port-Vila, <a href="https://radar.cloudflare.com/vu"><u>Vanuatu</u></a> at 17:46 local time (01:47 UTC) on December 17. Internet traffic from the country dropped sharply almost immediately, falling nearly 90% compared to the previous week. A significant drop in announced IPv4 address space was also observed, suggesting that damage from the earthquake took core network provider infrastructure offline as well. Recovery was slow, with Internet traffic not returning to expected levels until around 23:00 local time (12:00 UTC) on December 26.</p><p>An <a href="https://maritime-executive.com/editorials/vanuatu-illustrates-risks-of-thin-subsea-cable-infrastructure"><u>editorial published on The Maritime Executive</u></a> website highlights that Vanuatu is currently reliant on the <a href="https://www.submarinecablemap.com/submarine-cable/interchange-cable-network-1-icn1"><u>Interchange Cable Network 1 (ICN1) submarine cable</u></a> connection to <a href="https://radar.cloudflare.com/fj"><u>Fiji</u></a> for international Internet connectivity. The editorial states that “<i>A fire at the cable landing station temporarily interrupted the power supply, disabling internet traffic. The connection was restored 10 days later…</i>” The resolution of the power outage at the cable landing station roughly aligns with traffic returning to expected levels, suggesting that this was a significant driver of the drop in traffic seen from Vanuatu after the earthquake. Starlink’s satellite Internet service provides some nominal redundancy, as <a href="https://x.com/Starlink/status/1843395755547209765"><u>the company announced service availability</u></a> on October 7. The <a href="https://www.submarinecablemap.com/submarine-cable/tamtam"><u>TAMTAM submarine cable</u></a>, connecting Vanuatu to <a href="https://radar.cloudflare.com/nc"><u>New Caledonia</u></a>, is expected to be ready for service in 2026 — once available, it will provide additional redundancy for Internet connectivity. </p>
    <div>
      <h2>Government directed</h2>
      <a href="#government-directed">
        
      </a>
    </div>
    
    <div>
      <h3>Mozambique</h3>
      <a href="#mozambique">
        
      </a>
    </div>
    <p>On October 25 in <a href="https://radar.cloudflare.com/mz"><u>Mozambique</u></a>, <a href="https://www.enca.com/news-top-stories/internet-blackout-hits-mozambique-capital-after-election-protests"><u>mobile Internet connectivity across multiple providers was shut down</u></a> after protests against the re-election of the ruling Frelimo party became violent. Starting around 13:00 local time (11:00 UTC), significant drops in traffic were observed across <a href="https://radar.cloudflare.com/as30619"><u>AS30619 (</u></a><a href="https://radar.cloudflare.com/as30619">Telecomunicações de Moçambique</a><a href="https://radar.cloudflare.com/as30619"><u>)</u></a>, <a href="https://radar.cloudflare.com/as37342"><u>AS37342 (Movitel)</u></a>, and <a href="https://radar.cloudflare.com/as37223"><u>AS37223 (Vodacom)</u></a>. Both Vodacom and Movitel experienced near complete outages almost immediately, while some traffic remained on Telecomunicações de Moçambique until just before 02:00 local time (00:00 UTC) on October 26. Connectivity was restored the morning of October 26, as traffic returned around 08:00 local time (06:00 UTC). However, after connectivity returned, some social media platforms and messaging applications <a href="https://www.hrw.org/news/2024/11/06/mozambique-post-election-internet-restrictions-hinder-rights"><u>remained unavailable</u></a>.</p><p>Just over a week later, on November 3, subscribers on these mobile networks experienced another Internet shutdown. At around 20:30 local time (18:30 UTC) traffic dropped significantly on each of these networks, with connectivity disrupted for nearly 12 hours before recovering around 08:00 (06:00 UTC) the morning of November 4. Similar shutdowns (“Internet curfews”) were observed November 4-5 and November 6-7 on all three networks, and November 7-8 on Movitel and Vodacom. According to a <a href="https://aimnews.org/2024/11/11/internet-shutdown-to-prevent-destruction-of-country/"><u>published report</u></a>, the country’s Minister of Transport and Communications “admitted that Internet access was restricted in order ‘to avoid the destruction of the country’”, but shifted blame to the impacted services providers, claiming that when they note misuse of their services, they can take the initiative of interrupting the services, as part of their “civil responsibility” to safeguard “the stability and welfare of the population”.</p>
    <div>
      <h2>Military action</h2>
      <a href="#military-action">
        
      </a>
    </div>
    
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>An Internet disruption observed in <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> on November 9 may have been caused by damage from an <a href="https://www.reuters.com/world/middle-east/israeli-aggression-injures-syrian-soldiers-near-aleppo-state-media-says-2024-11-08/"><u>Israeli airstrike near Aleppo and Idlib</u></a> reported to have taken place earlier that morning. Internet traffic from the country dropped by about 80% at around 04:00 local time (01:00 UTC), with announced IP address space from the country falling significantly at that time as well. The disruption lasted approximately four hours, with traffic and announced IP address space returning to expected levels around 08:00 local time (05:00 UTC). </p><p>Internal analysis of city-level Internet traffic shows a similar disruption in Aleppo, suggesting that it may have been caused by the airstrike.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4mINSvpkYHgWfw2fmmUQ73/655b6509cff44bcdb627fc319b301198/Nov_9_-_Syria_-_Aleppo.png" />
          </figure>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>Russian missile strikes on November 17 <a href="https://www.reuters.com/world/europe/ukraine-brings-back-long-rolling-power-cuts-after-major-russian-strike-2024-11-18/"><u>targeting electrical power infrastructure</u></a> in <a href="https://radar.cloudflare.com/ua"><u>Ukraine</u></a> resulted in rolling power outages in multiple regions across the country. As we have seen multiple times throughout the nearly three-year-old conflict, these power outages result in disruptions to Internet traffic, impacting both service provider infrastructure and subscriber connectivity.</p><p>During the period between 07:30 local time (05:30 UTC) on November 17 and 02:00 local time (00:00 UTC) on November 23, <a href="https://x.com/CloudflareRadar/status/1858512061816275381"><u>we observed lower Internet traffic as compared to the previous week</u></a> in Odessa, Zaporizhzhia, Mykolaiv, and Sumy. Traffic in Odessa initially dropped on November 17 by around 50% as compared to the prior week, while on November 18, traffic dropped by over 20% in the other regions. Traffic largely recovered in Odessa by November 21, while <a href="https://x.com/CloudflareRadar/status/1859693864539558225"><u>the other regions took several additional days</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4df2zIvFEYuEzlxCOsheVq/929deb1bb59fa7424499489910df1660/Nov_17_-_Ukraine_-_Odessa_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ifIBz0P1A5CJJE5jzXCEb/9bed04debd6d2b2bb477a09bf33be572/Nov_17_-_Ukraine_-_Mykolaiv_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OP5J1JrocK1gEM8RV8Ejk/55cbe2ef4d5f58665e5a3e8a45930d28/Nov_17_-_Ukraine_-_Sumy_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Ul0rncfaLHonLFaO1PAza/171a02e635370bf4ef83d83272309351/Nov_17_-_Ukraine_-_Zaporizhzhia_-_compare.png" />
          </figure><p>Similar attacks took place just a few days later, with <a href="https://www.politico.eu/article/ukraine-power-shutdowns-russia-massive-attack-energy-grid-volodymyr-zelenskyy-vladimir-putin-border-eu/"><u>additional Russian airstrikes again targeting electrical infrastructure in Ukraine</u></a>. Once again, Ukrainian officials implemented emergency power outages, which impacted Internet traffic in multiple areas across the country. Starting around 07:00 local time (05:00 UTC) on November 28, <a href="https://x.com/CloudflareRadar/status/1862210312625152034"><u>we observed traffic drop by as much as 65%</u></a> as compared to the previous week in Kherson Oblast, Mykolaiv, Ternopil Oblast, Rivna, and Lviv. Traffic remained lower over the next several days, but appears to have generally recovered by December 1.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4MdWZ5jx2HNvMb98N1OSUv/b2241380e2c8f41bad84c1bfc9d97e26/Nov_28_-_Ukraine_-_Kherson_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BT5MUbigIKPn23Qrro81i/aaaaca0a3ec7281efb726b3fd2ee47b6/Nov_28_-_Ukraine_-_Mykolaiv_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3SFzcNP5FgPxQ20T5HH1UD/9bc3da6e9be2465e9df62bb47dc8e1be/Nov_28_-_Ukraine_-_Ternopil_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6i7si8ch823gPYhcvrANJe/08cf403779b09f7d451da06c61d137d3/Nov_28_-_Ukraine_-_Rivne_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3jcZqZeL0hDEgb7jTVNaMW/5de359cf61ba96763b6416b835790722/Nov_28_-_Ukraine_-_LVIV_-_compare.png" />
          </figure>
    <div>
      <h2>Maintenance</h2>
      <a href="#maintenance">
        
      </a>
    </div>
    
    <div>
      <h3>Switzerland, Salt Mobile</h3>
      <a href="#switzerland-salt-mobile">
        
      </a>
    </div>
    <p>According to the image below, which replaced the homepage of Swiss provider <a href="https://radar.cloudflare.com/as15796"><u>Salt Mobile (AS15796)</u></a>, reported maintenance took the network completely offline early in the morning of December 3.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3UcFvHDUtaPnmtKKVi0SaM/f02396634bef3dee5579428956189ebc/Dec_2_-_Switzerland_-_Salt_Mobile_-splash_-_border.jpg" />
          </figure><p>The outage lasted nearly three hours, with observed traffic at or near zero, between 01:25 and 04:20 local time (00:25 - 03:20 UTC). </p>
    <div>
      <h3>Greenland, Tusass A/S</h3>
      <a href="#greenland-tusass-a-s">
        
      </a>
    </div>
    <p>A December 10 <a href="https://www.tusass.gl/en/press/article/?id=139"><u>update from Tusass A/S</u></a> <a href="https://radar.cloudflare.com/as8818"><u>(AS8818, formerly TeleGreenland)</u></a> explained why the provider experienced a complete Internet outage between 02:30 and 05:15 local time (04:30 - 07:15 UTC) that morning. The post noted “<i>This happened because preventive maintenance was to be done on the connections in Canada between 02:00 and 06:00 last night, but with a combined fault on our connection to Denmark we lost nationwide connectivity. Fortunately, the fault on the connection to Denmark occurred on land, and therefore easy to repair.</i>” The graphs below show that for the duration of the outage, traffic from the network dropped to zero, no IPv6 address space was announced, and the volume of announced IPv4 address space fell by 94%.</p><p>According to <a href="https://www.submarinecablemap.com/"><u>TeleGeography’s Submarine Cable Map</u></a>, the <a href="https://www.submarinecablemap.com/submarine-cable/greenland-connect"><u>Greenland Connect</u></a> cable system connects <a href="https://radar.cloudflare.com/gl"><u>Greenland</u></a> to Newfoundland, <a href="https://radar.cloudflare.com/ca"><u>Canada</u></a>. It is possible that the fault on the connection to <a href="https://radar.cloudflare.com/dk"><u>Denmark</u></a> may have occurred on the Greenland-to-<a href="https://radar.cloudflare.com/is"><u>Iceland</u></a> segment of the Greenland Connect cable system; the Iceland-to-Denmark connection is made over the <a href="https://www.submarinecablemap.com/submarine-cable/danice"><u>DANICE</u></a> submarine cable.</p>
    <div>
      <h2>Unknown</h2>
      <a href="#unknown">
        
      </a>
    </div>
    
    <div>
      <h3>United States, Verizon</h3>
      <a href="#united-states-verizon">
        
      </a>
    </div>
    <p>Very early in the morning of November 12, some subscribers of Verizon’s Fios Internet service experienced a disruption to their Internet connectivity. A <a href="https://puck.nether.net/pipermail/outages/2024-November/015342.html"><u>post to the Outages mailing list</u></a> noted that a major multi-state Verizon Fios outage began at 12:28am EST, impacting Virginia, Washington DC, Maryland, and New Jersey, as well as parts of eastern Pennsylvania. Traffic from <a href="https://radar.cloudflare.com/as701"><u>AS701</u></a>, the autonomous system used by Verizon for their Fios service, dropped by approximately 30% around 00:30 Eastern time (05:30 UTC). At a state level, traffic from AS701 dropped between 50-70% in Pennsylvania, Delaware, Maryland, and Washington DC.</p><p>A subsequent post on the Outages mailing list stated that the outage was resolved everywhere at 3:23am EST (08:23 UTC). Nearly six hours after the outage ended, <a href="https://x.com/VerizonSupport/status/1856334754888438158"><u>Verizon Support published a post on X</u></a> acknowledging the issue, stating “<i>A network issue early this morning disrupted service for some Verizon Fios customers in the Northeast for a short period of time. As soon as the issue was identified, our engineering teams quickly restored the service.</i>” However, they did not provide any information on what ultimately caused the service disruption.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>In addition to the outages and disruptions covered above, <a href="https://blog.cloudflare.com/resilient-internet-connectivity-baltic-cable-cuts/"><u>resilient Internet connectivity</u></a> meant that two Baltic Sea cable cuts that occurred on November 17 and 18 had minimal impact. Whether <a href="https://www.datacenterdynamics.com/en/news/baltic-subsea-cable-damage-was-accidental-not-sabotage-us-and-european-officials/"><u>accidental or sabotage</u></a>, the security and resiliency of submarine cable infrastructure continues to be <a href="https://www.datacenterdynamics.com/en/news/nato-launches-baltic-sentry-for-subsea-cable-security/"><u>an important topic</u></a>. The security and resilience of terrestrial cable infrastructure, as well as other critical Internet infrastructure, must also remain top of mind to help speed recovery from storms, earthquakes, military action, and power outages.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a><u>email</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">1dimpxaWgcG7zwbJJYhdfX</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Forced offline: the Q3 2024 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q3-2024-internet-disruption-summary/</link>
            <pubDate>Tue, 29 Oct 2024 13:05:00 GMT</pubDate>
            <description><![CDATA[ The third quarter of 2024 was particularly active, with quite a few significant Internet disruptions.  ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s network spans more than 330 cities in over 120 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions. Thanks to <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> functionality released earlier this year, we can explore the impact from a <a href="https://developers.cloudflare.com/radar/glossary/#bgp-announcements"><u>routing</u></a> perspective, as well as a traffic perspective, at both a <a href="https://x.com/CloudflareRadar/status/1768654743742579059"><u>network</u></a> and <a href="https://x.com/CloudflareRadar/status/1773704264650543416"><u>location</u></a> level.</p><p>As we have noted in the past, this post is intended as a summary overview of observed and confirmed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter. </p><p>A larger list of detected traffic anomalies is available in the <a href="https://radar.cloudflare.com/outage-center#traffic-anomalies"><u>Cloudflare Radar Outage Center</u></a>.</p><p>Having said that, the third quarter of 2024 was particularly active, with quite a few significant Internet disruptions. Unfortunately, <a href="#government-directed"><u>governments continued to impose nationwide Internet shutdowns</u></a> intended to prevent cheating on exams. <a href="#cable-cuts"><u>Damage to both terrestrial and submarine cables</u></a> impacted Internet connectivity across Africa and in other parts of the world. <a href="#severe-weather"><u>Damage caused by an active hurricane season</u></a> caused Internet outages across the Caribbean and in multiple parts of the United States. Because Internet connectivity is dependent on reliable electrical power, both <a href="#power-outages"><u>planned and unplanned power outages</u></a> in South America and Africa resulted in multi-hour Internet disruptions. <a href="#military-action"><u>Military action</u></a> continued to cause Internet outages in affected countries, as did <a href="#maintenance"><u>infrastructure maintenance</u></a>, <a href="#fire"><u>fire</u></a>, and a purported <a href="#cyberattack"><u>cyberattack</u></a>. The quarter also saw several noteworthy Internet disruptions that <a href="#unknown"><u>did not have verified causes</u></a>.</p>
    <div>
      <h2>Government Directed</h2>
      <a href="#government-directed">
        
      </a>
    </div>
    <p>Over the past several years, we have seen multiple governments around the world implement Internet shutdowns in response to protests within their countries. Some shutdowns are more targeted, affecting only (a subset of) mobile Internet providers, while others are more aggressive, effectively cutting off Internet connectivity at a national level. In addition, we all too frequently see governments implement nationwide multi-hour Internet shutdowns in an effort to prevent students from cheating on national exams. Unfortunately, governments were active in both respects during the third quarter, as we observed multiple government directed Internet shutdowns. Several were covered in our August 1 blog post, <a href="https://blog.cloudflare.com/a-recent-spate-of-internet-disruptions-july-2024/"><i><u>A recent spate of Internet disruptions</u></i></a><i>.</i></p>
    <div>
      <h3>Bangladesh</h3>
      <a href="#bangladesh">
        
      </a>
    </div>
    <p><a href="https://timesofindia.indiatimes.com/world/south-asia/internet-shut-nationwide-bandh-announced-why-is-bangladesh-experiencing-deadly-protests/articleshow/111829956.cms"><u>Violent student protests</u></a> in <a href="https://radar.cloudflare.com/bd"><u>Bangladesh</u></a> against quotas in government jobs and rising unemployment rates led the government to order the nationwide shutdown of mobile Internet connectivity on July 18, <a href="https://therecord.media/bangladesh-mobile-internet-social-media-outages-student-protests"><u>reportedly</u></a> to “<i>ensure the security of citizens.</i>” This government-directed shutdown ultimately became a near-complete Internet outage for the country, as broadband networks were taken offline as well. At a country level, <a href="https://radar.cloudflare.com/traffic/bd?dateStart=2024-07-14&amp;dateEnd=2024-07-28"><u>Internet traffic in Bangladesh dropped to near zero</u></a> just before 21:00 local time (15:00 UTC). <a href="https://radar.cloudflare.com/routing/bd?dateStart=2024-07-14&amp;dateEnd=2024-07-28"><u>Announced IP address space from the country dropped to near zero</u></a> at that time as well, meaning that nearly every network in the country was disconnected from the Internet.</p><p>Traffic and announced IP address space at a national level began to recover around 18:00 local time (12:00 UTC) on July 23, and continued over the next several days, as <a href="https://developingtelecoms.com/telecom-business/telecom-regulation/17059-mobile-internet-in-bangladesh-to-stay-dark-until-at-least-sunday.html"><u>fixed broadband connectivity was restored</u></a>, with <a href="https://developingtelecoms.com/telecom-business/telecom-regulation/17067-mobile-internet-returns-to-bangladesh-but-not-social-media-apps.html"><u>mobile connectivity returning on July 28</u></a>. The initial restoration was characterized as a “trial run”, prioritizing banking, commercial sectors, technology firms, exporters, outsourcing providers and media outlets, <a href="https://www.dhakatribune.com/bangladesh/352554/broadband-internet-restored-in-limited-areas-after"><u>according to</u></a> the state minister for post, telecommunication and information technology.</p><p>Ahead of this nationwide shutdown, we observed outages across several Bangladeshi network providers, perhaps foreshadowing what was to come. At <a href="https://radar.cloudflare.com/as24389"><u>AS24389 (Grameenphone)</u></a>, a complete Internet outage started at 01:30 local time on July 18 (19:30 UTC on July 17), with a total loss of both <a href="https://radar.cloudflare.com/traffic/as24389?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>Internet traffic</u></a> and <a href="https://radar.cloudflare.com/routing/as24389?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>announced IP address space</u></a>.</p><p>The outage at <a href="https://radar.cloudflare.com/as45245"><u>AS25245 (Banglalink)</u></a> started at 02:15 local time on July 18 (20:15 UTC on July 17) as both <a href="https://radar.cloudflare.com/traffic/as45245?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>Internet traffic</u></a> and <a href="https://radar.cloudflare.com/routing/as45245?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>announced IP address space</u></a> dropped to zero.</p><p>At <a href="https://radar.cloudflare.com/as24432"><u>AS24432 (Robi Axiata)</u></a>, an Internet outage was observed starting around 06:30 local time on July 18 (00:30 UTC), with both <a href="https://radar.cloudflare.com/traffic/as24432?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>Internet traffic</u></a> and <a href="https://radar.cloudflare.com/routing/as24432?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>announced IP address space</u></a> disappearing at that time.</p><p><a href="https://radar.cloudflare.com/traffic/as58715?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>Internet traffic</u></a> at <a href="https://radar.cloudflare.com/as58715"><u>AS58715 (Earth Telecommunication)</u></a> began to fall at 18:00 local time on July 18 (12:00 UTC), reaching zero four hours later. <a href="https://radar.cloudflare.com/routing/as58715?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>Announced IP address space</u></a> began to fall at 21:00 local time (15:00 UTC), and was completely gone by 21:25 local time (15:25 UTC).</p><p><a href="https://radar.cloudflare.com/as63526"><u>AS63526 (Carnival Internet)</u></a> was one of the last to fall before the complete shutdown, <a href="https://radar.cloudflare.com/traffic/as63526?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>losing traffic</u></a> at 20:45 local time (14:45 UTC), and seeing all of its <a href="https://radar.cloudflare.com/routing/as63526?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>announced IP address space</u></a> withdrawn over the following hour.</p><p>These mobile connectivity outages lasted from July 18 through July 28. Just a few days after connectivity was restored, <a href="https://www.business-standard.com/world-news/bangladesh-protests-internet-shutdown-curfew-imposed-97-dead-in-clashes-124080500205_1.html"><u>additional clashes between police and protestors</u></a> drove the government to <a href="https://developingtelecoms.com/telecom-business/telecom-regulation/17105-bangladesh-switches-off-mobile-internet-again-as-protests-escalate-2.html"><u>order mobile Internet connectivity to be shut down</u></a> again. As shown in the graphs below, traffic on these mobile network providers dropped between 13:30 and 14:15 local time (07:30 to 08:15 UTC) on Sunday, August 4.</p><p>These protests ultimately led the government to order a full Internet shutdown in the country, with both traffic and announced IP address space dropping precipitously around 10:30 local time (04:30 UTC) on Monday, August 5. However, the shutdown appeared to be short-lived, as <a href="https://en.prothomalo.com/bangladesh/gm0o97gu3x"><u>broadband connectivity</u></a> began to recover around 13:20 local time (07:20 UTC), with <a href="https://en.prothomalo.com/bangladesh/aoczyp8xg8"><u>mobile connectivity</u></a> being restored around 14:00 local time (08:00 UTC).</p>
    <div>
      <h3>Iraqi Kurdistan</h3>
      <a href="#iraqi-kurdistan">
        
      </a>
    </div>
    <p>Both <a href="https://radar.cloudflare.com/iq"><u>Iraq</u></a> and Iraqi Kurdistan (the autonomous Kurdistan region in the northern part of the country) regularly implement government directed Internet shutdowns to prevent cheating on secondary and baccalaureate exams. Within Iraqi Kurdistan, we observed two sets of exam-related Internet shutdowns during the third quarter. The impacts of the shutdowns are visible on traffic from networks that operate within the region, as well as on the country-level graphs for Iraq.</p><p>The first round of shutdowns occurred in July, impacting <a href="https://radar.cloudflare.com/as59625"><u>AS59625 (KorekTel)</u></a>, <a href="https://radar.cloudflare.com/as21277"><u>AS21277 (Newroz Telecom)</u></a>, <a href="https://radar.cloudflare.com/as48492"><u>AS48492 (IQ Online)</u></a>, and <a href="https://radar.cloudflare.com/as206206"><u>AS206206 (KNET)</u></a> between 06:00 - 08:00 local time (03:00 - 05:00 UTC) on July 3, 7, 10, and 14. This is consistent with shutdowns observed in the <a href="https://blog.cloudflare.com/q2-2024-internet-disruption-summary/"><u>second quarter</u></a>, as well as in <a href="https://blog.cloudflare.com/exam-internet-shutdowns-iraq-algeria/"><u>June 2023</u></a>. None of the impacted networks experienced a drop in announced IP address space during these shutdowns.</p><p>The second set of shutdowns in Iraqi Kurdistan took place across multiple days during the back half of August. On August 17, 19, 21, 24, 26, 28, and 31, all four network providers were again impacted, as seen in the graphs below, with traffic dropping between 06:00 - 08:00 local time (03:00 - 05:00 UTC).</p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>In <a href="https://radar.cloudflare.com/iq"><u>Iraq</u></a>, a second round of exams for 12th graders resulted in over two weeks of regular Internet shutdowns across the country occurring between 06:00 - 08:00 local time (03:00 - 05:00 UTC) on multiple days between August 29 and September 16, intended to prevent cheating on <a href="https://www.facebook.com/Iraq.Ministry.of.Education/posts/pfbid08kbeG2VEaFPweRiH1ofDdRazpVFKnHA2tRXM6pjQgCsQUXmuCar3oDSVsaCnwUZil"><u>second ministerial exams for secondary education</u></a>. Both HTTP traffic and announced IP address space from Iraq dropped during these shutdowns, as seen in the graphs below.</p><p>(Note that the red annotation bar visible on September 11 &amp; 12 on both the country and network-level graphs below highlights an internal data pipeline issue, and is not associated with an Internet shutdown in Iraq.)</p><p>This round of government-directed shutdowns impacted multiple local network providers, including <a href="https://radar.cloudflare.com/as58322"><u>AS58322 (Halasat)</u></a>, <a href="https://radar.cloudflare.com/as51684"><u>AS51684 (AsiaCell)</u></a>, <a href="https://radar.cloudflare.com/as203214"><u>AS203214 (HulumTele)</u></a>, <a href="https://radar.cloudflare.com/as199739"><u>AS199739 (Earthlink)</u></a>, and <a href="https://radar.cloudflare.com/as59588"><u>AS59588 (ZAINAS)</u></a>. In reviewing the distribution of mobile device and desktop traffic at a network level, gaps were observed during the shutdowns on <a href="https://radar.cloudflare.com/traffic/as58322?dateStart=2024-08-28&amp;dateEnd=2024-09-17#mobile-vs-desktop"><u>AS58322</u></a> and <a href="https://radar.cloudflare.com/traffic/as199739?dateStart=2024-08-28&amp;dateEnd=2024-09-17#mobile-vs-desktop"><u>AS199739</u></a>, and to a lesser extent, <a href="https://radar.cloudflare.com/traffic/as203214?dateStart=2024-08-28&amp;dateEnd=2024-09-17#mobile-vs-desktop"><u>AS203214</u></a>, suggesting that these networks were completely offline, while AS56184 and AS59588 remained at least partially online. (This is also corroborated by complete or partial loss of announced IP address space across these networks during the shutdowns.)</p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>A first round of exam-related Internet shutdowns took place in <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> earlier this year, between May 26 and June 13, and were discussed in our <a href="https://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown"><u>Exam-ining recent Internet shutdowns in Syria, Iraq, and Algeria</u></a> blog post. A second set of exams, and the associated Internet shutdowns requested by the Ministry of Education, began on July 25 and ran through August 8, as specified in the schedule <a href="https://www.facebook.com/photo/?fbid=862569062570288&amp;set=a.449047400589125"><u>published by Syrian Telecom on its Facebook page</u></a>.</p><p>The length of the shutdowns varied by day — they all began at 07:00 local time (04:00 UTC), but the end times ranged between 09:45 -10:30 local time (06:45 - 07:30 UTC). The graphs below show the impact at a country level, as well as to <a href="https://radar.cloudflare.com/as29256"><u>AS29256 (Syrian Telecom)</u></a>, the <a href="https://radar.cloudflare.com/routing/sy"><u>primary telecommunications provider within the country</u></a>.</p><p>These shutdowns were also covered in our August 1 blog post, <a href="https://blog.cloudflare.com/a-recent-spate-of-internet-disruptions-july-2024/"><i><u>A recent spate of Internet disruptions</u></i></a><i>.</i></p>
    <div>
      <h3>Mauritania</h3>
      <a href="#mauritania">
        
      </a>
    </div>
    <p>On August 12, a round of <a href="https://ami.mr/fr/archives/251895"><u>baccalaureate exams began</u></a> in <a href="https://radar.cloudflare.com/mr"><u>Mauritania</u></a>, and in an effort to <a href="https://akhbarwatan.net/%D9%85%D9%88%D8%B1%D9%8A%D8%AA%D8%A7%D9%86%D9%8A%D8%A7-%D9%82%D8%B7%D8%B9-%D8%A7%D9%84%D8%A5%D9%86%D8%AA%D8%B1%D9%86%D8%AA-%D8%A8%D8%B3%D8%A8%D8%A8-%D8%A7%D9%84%D9%85%D8%B3%D8%A7%D8%A8%D9%82%D8%A7/"><u>prevent student cheating on the exams</u></a>, the government instituted multiple Internet shutdowns that impacted several major mobile providers. Two shutdowns were observed on August 12, between 08:00 - 12:00 local time (08:00 - 12:00 UTC) and between 15:00 - 19:00 local time (15:00 - 19:00 UTC), and an additional one was observed on August 13, between 08:00 - 12:30 local time (08:00 - 12:30 UTC). Impacted network providers included <a href="https://radar.cloudflare.com/as37508"><u>AS37508 (Mattel)</u></a>, <a href="https://radar.cloudflare.com/as37541"><u>AS37541 (Chinguitel)</u></a>, and <a href="https://radar.cloudflare.com/as29544"><u>AS29544 (Mauritel)</u></a>. Announced IP address space for these networks remained unchanged during the shutdown periods, suggesting that that mobile subscriber connectivity was disabled, as opposed to the networks effectively being disconnected from the Internet, as we have seen in other countries.</p><p>Exam-related Internet shutdowns are, unfortunately, not new to Mauritania, as authorities in the country also implemented them <a href="https://smex.org/mauritania-the-drawbacks-of-disrupting-mobile-internet-after-prisoners-escape/"><u>between 2017 and 2020</u></a>.</p>
    <div>
      <h2>Cable cuts</h2>
      <a href="#cable-cuts">
        
      </a>
    </div>
    
    <div>
      <h3>Eswatini (Swaziland)</h3>
      <a href="#eswatini-swaziland">
        
      </a>
    </div>
    <p>On July 14, MTN Eswatini (AS327765) informed customers via <a href="https://x.com/MTNEswatini/status/1812558000009163027"><u>a post on X</u></a> that “<i>connection to the internet and data services is currently intermittent, because of fiber cable breaks resulting from wildfires.</i>” This apparent connection disruption was visible in Cloudflare Radar between 19:30 and 20:15 local time (17:30 and 18:15 UTC).</p>
    <div>
      <h3>Cameroon</h3>
      <a href="#cameroon">
        
      </a>
    </div>
    <p>In <a href="https://radar.cloudflare.com/cm"><u>Cameroon</u></a>, a fiber cut that occurred on August 4 during sanitation work disrupted mobile connectivity for Cameroon Telecommunications (<a href="https://radar.cloudflare.com/as15964"><u>AS15964 (Camtel)</u></a>) customers for over half a day. According to a (translated) <a href="https://x.com/Camtelonline/status/1820133286058062079"><u>post on X from Camtel</u></a>, “<i>We inform you that due to the sanitation work carried out in the city of Yaoundé, at the place called Cradat, our Voice and Data services have been temporarily interrupted on the entire mobile network.</i>” The observed disruption occurred between 03:00 - 16:30 local time (02:00 - 15:30 UTC). Although it initially started during a time when traffic was lower overnight anyway, both <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=as15964&amp;dt=2024-08-04_2024-08-04&amp;timeCompare=2024-07-28"><u>request</u></a> and <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=as15964&amp;dt=2024-08-04_2024-08-04&amp;timeCompare=2024-07-28"><u>bytes</u></a> traffic remained lower than the same time a week prior during the duration of the disruption.</p>
    <div>
      <h3>Liberia</h3>
      <a href="#liberia">
        
      </a>
    </div>
    <p>The <a href="https://radar.cloudflare.com/lr"><u>Liberia</u></a> Telecommunications Authority <a href="https://www.facebook.com/TelecommunicationsAuthorityLIBERA/posts/pfbid0Ryktd7oPg1c8UYc1kAiDWo8aQPK3uUADDkuUYgSdeZtC2tYn4JiCYr66oZQoRBc2l"><u>posted an announcement to their Facebook page</u></a> on August 21 noting that “<i>We have been informed by the CCL that the ACE Cable is experiencing interruptions.</i>” (The <a href="https://ace-submarinecable.com/en/submarine-cable/"><u>Africa Coast to Europe (ACE) submarine cable</u></a> connects multiple countries along the West Coast of Africa to Portugal and Europe.) The announcement further noted that the first signs of interruption occurred at 01:00 local time (and UTC), and that <a href="https://radar.cloudflare.com/as37410"><u>Lonestar Cell MTN (AS37410)</u></a> was among the providers that had been “gravely affected” by the cut.</p><p>We observed traffic on Lonestar Cell MTN dropping just after 01:00, in line with the announcement. The network experienced a complete outage lasting over a day and a half, before traffic started to recover at 14:00 local time (and UTC) on August 22. In a <a href="https://www.facebook.com/LonestarCellMTN/posts/pfbid02xE2qxVEt1XnCHgqftjkj34KQssez13PoGTjSGoBAH688g6m4G7XCLHM58SLBCW8Ll"><u>Facebook post</u></a> on August 22, Lonestar Cell MTN confirmed that Internet service had been restored, and that customer accounts would be credited with 500 MB of data for free.</p>
    <div>
      <h3>Niger</h3>
      <a href="#niger">
        
      </a>
    </div>
    <p>A September 7 <a href="https://x.com/airtelniger/status/1832430266222096571"><u>post on X from Airtel Niger</u></a> alerted customers to Internet service disruptions caused by cuts on international fiber optic cables. As a land-locked country, <a href="https://radar.cloudflare.com/ne"><u>Niger</u></a> is dependent on terrestrial connections to networks in neighboring countries, but it isn’t clear which connection or country Airtel Niger’s post was referencing.</p><p>Two significant Internet disruptions were observed around the time of Airtel Niger’s post that we believe are related to the referenced fiber cuts. The first occurred between 18:00 - 21:00 local time (17:00 - 20:00 UTC) on September 6, visible at a country level and at a network level as well on <a href="https://radar.cloudflare.com/as37531"><u>AS37531 (Airtel Niger)</u></a> and <a href="https://radar.cloudflare.com/as37233"><u>AS37233 (Orange Niger / Zamani Telecom)</u></a>. The second disruption occurred between 10:45 - 12:00 local time (09:45 - 11:00 UTC) on September 7, visible at a country level as well as on those two networks. </p>
    <div>
      <h3>Haiti</h3>
      <a href="#haiti">
        
      </a>
    </div>
    <p>Internet disruptions related to submarine cable failures often take a significant amount of time to resolve because of the challenges repair crews face in getting to, and accessing, the damaged portion of the cable, as it is frequently located deep underwater in the middle of an ocean. A September 14 submarine cable failure that impacted <a href="https://radar.cloudflare.com/as27653"><u>Digicel Haiti (AS27653)</u></a> lasted for over a week for a similar, but slightly different, reason.</p><p>A significant loss of traffic on Digicel Haiti was first observed at 08:00 local time (12:00 UTC) on September 14. On September 16, Digicel Haiti <a href="https://x.com/DigicelHT/status/1835774732743876713/photo/1"><u>posted a press release</u></a> confirming that since September 14, a failure had been detected on an international submarine cable belonging to Cable and Wireless, and that the cable damage occurred at Kaliko Beach Club (the property is <a href="https://www.haitilibre.com/en/news-43221-haiti-digicel-failure-detected-on-an-international-submarine-cable-against-a-backdrop-of-litigation.html"><u>reportedly</u></a> used as a cable entry point). Digicel noted that their technicians went to the scene of the damage immediately, but were denied access, apparently because of a business dispute dating back to 2021. The release also explained that technical teams had taken temporary steps to ensure the continuity of essential services, which prevented the incident from resulting in a complete loss of connectivity. On September 22, a subsequent <a href="https://x.com/DigicelHT/status/1837875515148898513/photo/1"><u>press release</u></a> posted by Digicel Haiti announced the restoration of Internet services as of 02:00 local time (06:00 UTC), and referenced vandalism as the cause of the cable damage.</p>
    <div>
      <h3>Kyrgyzstan</h3>
      <a href="#kyrgyzstan">
        
      </a>
    </div>
    <p>Reported damage to the “<a href="https://akipress.com/news:797695:Internet_disruptions_in_Kyrgyzstan_caused_by_damage_of_main_communication_channel/"><u>backbone wire</u></a>” or “<a href="https://economist-kg.translate.goog/novosti/2024/09/25/akniet-obiasnil-prichinu-probliem-s-dostupom-k-intiernietu-v-bishkiekie-i-chuiskoi-oblasti/?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp"><u>main cable</u></a>” of an <a href="https://kaktus-media.translate.goog/doc/510016_propal_internet_y_nekotoryh_sotovyh_operatorov_i_provayderov._pochemy.html?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp"><u>upstream provider</u></a> resulted in a brief Internet outage for <a href="https://radar.cloudflare.com/kg"><u>Kyrgyzstan</u></a> Internet provider <a href="https://radar.cloudflare.com/as50223"><u>Megacom (AS50223)</u></a> of September 25. <a href="https://radar.cloudflare.com/as12389"><u>AS12389 (Rostelecom)</u></a> is <a href="https://radar.cloudflare.com/routing/as50223"><u>listed</u></a> as Megacom’s only upstream provider.</p><p>The outage lasted for only an hour, between 15:45 and 16:45 local time (09:45 - 10:45 UTC), dropping both traffic and announced IP address space to zero. At a country level, traffic dropped as much as 72% as compared to the previous week. Given the complete loss of both traffic and IP address space, the damage likely occurred on the connection between Megacom and Rostelecom.</p>
    <div>
      <h2>Severe weather</h2>
      <a href="#severe-weather">
        
      </a>
    </div>
    <p>An active hurricane season during July, August, and September resulted in infrastructure damage caused by multiple hurricanes disrupting Internet connectivity in multiple places across the Caribbean and Southeastern United States.</p>
    <div>
      <h3>Grenada &amp; Saint Vincent and the Grenadines</h3>
      <a href="#grenada-saint-vincent-and-the-grenadines">
        
      </a>
    </div>
    <p>At the start of the third quarter, <a href="https://radar.cloudflare.com/gd"><u>Grenada</u></a> and <a href="https://radar.cloudflare.com/vc"><u>Saint Vincent and the Grenadines</u></a> both suffered significant damage from Hurricane Beryl, <a href="https://www.usatoday.com/story/news/nation/2024/07/03/hurricane-beryl-destruction-islands/74296817007/"><u>reportedly</u></a> causing destruction of infrastructure, buildings, agriculture, and the natural environment.</p><p>On July 1, traffic from Grenada dropped significantly at 10:00 local time (14:00 UTC), just ahead of <a href="https://www.cnn.com/2024/07/01/weather/hurricane-beryl-caribbean-landfall-monday/index.html"><u>landfall</u></a> on Grenada’s Carriacou Island. The most significant impacts to traffic were seen for approximately the first 24 hours, though traffic did not return to expected pre-storm levels until around 10:00 local time (14:00 UTC) on July 5.</p><p>Internet traffic in Saint Vincent and the Grenadines was also disrupted by Hurricane Beryl, also falling at 10:00 local time (14:00 UTC). Similar to Grenada, the most significant impact was seen in the first 24 hours, with consistent gradual recovery seen after that time. However, traffic did not return to expected pre-storm levels until July 11.</p>
    <div>
      <h3>Jamaica</h3>
      <a href="#jamaica">
        
      </a>
    </div>
    <p>As Hurricane Beryl continued across the Caribbean, it <a href="https://x.com/weatherchannel/status/1808576720234008765"><u>passed Jamaica on July 3</u></a>. The associated damage that it caused impacted Internet connectivity on the island, with traffic dropping significantly around 14:00 local time (19:00 UTC). As the graph below shows, the disruption was preceded by higher than normal traffic volumes, presumably due to residents looking for information about Beryl. The disruption lasted nearly a week, with traffic returning to expected levels on July 10.</p>
    <div>
      <h3>U.S. Virgin Islands</h3>
      <a href="#u-s-virgin-islands">
        
      </a>
    </div>
    <p>The following month, damage from Tropical Storm Ernesto caused <a href="https://x.com/VIWAPA/status/1824110275710091527"><u>power outages across the U.S. Virgin Islands</u></a>, resulting in disruptions to Internet connectivity. Traffic from the islands dropped precipitously at 22:00 local time on August 13 (02:00 UTC on August 14) and remained lower for over two days, before returning to expected pre-storm levels around 11:00 local time (15:00 UTC) on August 16.</p>
    <div>
      <h3>Bermuda</h3>
      <a href="#bermuda">
        
      </a>
    </div>
    <p>Over the course of the following few days, Ernesto strengthened from a tropical storm into a hurricane, but had weakened by the time it hit <a href="https://radar.cloudflare.com/bm"><u>Bermuda</u></a> on August 16/17. In this case, damage was <a href="https://www.reuters.com/business/environment/hurricane-ernesto-weakens-still-dangerous-it-closes-bermuda-2024-08-17/"><u>reportedly</u></a> limited to power outages, downed trees, and flooding, but even this limited damage disrupted Internet connectivity on the island. As the storm made landfall on the island, traffic levels dropped over 80% at 22:00 local time on August 16 (01:00 UTC on August 17). Traffic levels remained depressed for about two and a half days, recovering to expected levels around 09:00 local time (12:00 UTC) on August 19.</p>
    <div>
      <h3>Nepal</h3>
      <a href="#nepal">
        
      </a>
    </div>
    <p><a href="https://www.dw.com/en/nepal-floods-landslides-leave-at-least-151-dead/a-70354640"><u>Heavy rains in Nepal</u></a> at the end of September resulted in flooding and landslides across much of the country, which in turn resulted in power outages and Internet disruptions. One such disruption believed to be associated with the impacts of the storm was observed on September 28, when <a href="https://radar.cloudflare.com/as23752"><u>AS23752 (Nepal Telecom)</u></a>, <a href="https://radar.cloudflare.com/as45650"><u>AS45650 (Vianet)</u></a>, <a href="https://radar.cloudflare.com/as139922"><u>AS139922 (Dishhome)</u></a>, and <a href="https://radar.cloudflare.com/as17501"><u>AS17501 (Worldlink)</u></a> all saw traffic drop 50 - 70% between 14:15 - 16:00 local time (08:30 - 10:15 UTC).</p>
    <div>
      <h3>United States</h3>
      <a href="#united-states">
        
      </a>
    </div>
    <p>A disruption to traffic from <a href="https://radar.cloudflare.com/as11427"><u>AS11427 (Charter Communications/Spectrum)</u></a> in Texas that occurred between 12:30 and 19:30 local time on July 9 (17:30 - 00:30 UTC) was caused by “<i>a third-party infrastructure issue caused by the impact of Hurricane Beryl</i>”, according to a July 9 <a href="https://x.com/Ask_Spectrum/status/1810804196112806016"><u>post on X</u></a> from the provider. Spectrum <a href="https://x.com/Ask_Spectrum/status/1810735748410396680"><u>acknowledged the issue</u></a> shortly after it began, and <a href="https://x.com/Ask_Spectrum/status/1810851153053118568"><u>followed up again</u></a> after service had been restored.</p><p>Hurricane Helene <a href="https://www.wistv.com/2024/10/03/reviewing-hurricane-helenes-destructive-path-through-southeast/"><u>made landfall in northern Florida</u></a> as a Category 4 storm late in the evening (local time) on September 26, and over the following hours and days, <a href="https://www.usatoday.com/story/graphics/2024/09/29/hurricane-helene-damage-maps/75440587007/"><u>continued north</u></a> through Georgia, South Carolina, and North Carolina, and into Tennessee. Even as it weakened, it caused historic flooding and damage to roads, homes, power lines, and telecommunications infrastructure. Below, we review the traffic impacts observed at a state level in three of the most impacted states, as well as exploring the impact at a network level for selected providers. (<a href="https://www.kentik.com/blog/author/doug-madory/">Doug Madory at Kentik</a> published an excellent <a href="https://www.kentik.com/blog/hurricane-helene-devastates-network-connectivity-in-parts-of-the-south/"><u>blog post exploring the impact of Helene</u></a> from the perspective of their data, and the networks referenced below were informed by that post.)</p>
    <div>
      <h4>Georgia</h4>
      <a href="#georgia">
        
      </a>
    </div>
    <p>Helene entered Georgia early morning on Friday, September 27, and by midday (local time), peak traffic was approximately 20% lower than peak levels seen in the days ahead of the storm. (The lower peaks on September 28 &amp; 29 are likely due to it being a weekend.) At a state level, peak traffic remained lower over the following week, with more recovery seen heading into the week of October 6.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3aYsyZNt5qCWqJhgK8yt1g/0f8be9f2ed8c2ab5121caef9b8e079ff/SEVERE_WEATHER_-_UNITED_STATES_-_Helene_-_Georgia.png" />
          </figure><p>One of the most significantly impacted network providers in Georgia was <a href="https://radar.cloudflare.com/as11240?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS11240 (ATC Broadband)</u></a>, which saw traffic start to drop around 22:00 local time on September 26 (02:00 UTC on September 27). Subscribers and customers experienced a near complete outage until around 08:00 local time on September 30 (12:00 UTC), when traffic volumes slowly started to recover. The normal diurnal traffic pattern became more clear in the following days, with peak traffic levels continuing to increase over the next week as well.</p><p>Other network providers in Georgia that experienced significant impacts include <a href="https://radar.cloudflare.com/as400511?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS400511 (Clearwave Fiber)</u></a>, <a href="https://radar.cloudflare.com/as394473?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS394473 (Brantley Telephone Company)</u></a>, <a href="https://radar.cloudflare.com/as40285?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS40285 (Northland Cable Television)</u></a>, <a href="https://radar.cloudflare.com/as15313?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS15313 (Pembroke Telephone Company)</u></a>, and <a href="https://radar.cloudflare.com/as397118?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS397118 (Glenwood Telephone Company)</u></a>.</p>
    <div>
      <h4>South Carolina</h4>
      <a href="#south-carolina">
        
      </a>
    </div>
    <p>The midday traffic peak on September 27 in South Carolina was just 65% of the preceding days, with the peaks remaining lower over the following two weekend days. Traffic remained somewhat lower during the week following Helene, with peak increases becoming more evident the week of October 6.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/40euoNqEw8bwaAqVgmsmaQ/ccf5c7114e26a85f6445ce9eaf21b00c/SEVERE_WEATHER_-_UNITED_STATES_-_Helene_-_South_Carolina.png" />
          </figure><p>At <a href="https://radar.cloudflare.com/as19212?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS19212 (Piedmont Rural Telephone)</u></a> in South Carolina, traffic began to fall rapidly around midnight local time on September 27 (04:00 UTC), reaching a state of near complete outage over the next eight hours. A gradual recovery is visible over the following several days, with a more regular pattern becoming evident on October 1, with rapid growth over the following week, accelerating towards the end of the week.</p><p>Other network providers in South Carolina, including <a href="https://radar.cloudflare.com/as397068?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS397068 (Carolina Connect)</u></a>, <a href="https://radar.cloudflare.com/as10279?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS10279 (West Carolina Communications)</u></a>, <a href="https://radar.cloudflare.com/as20222?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS20222</u></a> &amp; <a href="https://radar.cloudflare.com/as21898?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS21898 (TruVista)</u></a>, and <a href="https://radar.cloudflare.com/as14615?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS14615 (Rock Hill Telephone)</u></a>, also experienced significant disruptions to connectivity in the wake of Helene.</p>
    <div>
      <h4>North Carolina</h4>
      <a href="#north-carolina">
        
      </a>
    </div>
    <p>Although a drop in traffic is visible in the graph for North Carolina on September 27, it occurs after a midday peak in line with previous days, and the magnitude is not as significant as that seen in South Carolina and Georgia. Traffic peaks over the following week are in line with the week preceding Helene’s arrival, with higher peaks seen the week of October 6.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ggc01nO3m5J85jNwm5rSF/13af760fe7a839472ae5c14116042f9c/SEVERE_WEATHER_-_UNITED_STATES_-_Helene_-_North_Carolina.png" />
          </figure><p>North Carolina providers <a href="https://radar.cloudflare.com/as53488?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS53488 (Morris Broadband)</u></a> and <a href="https://radar.cloudflare.com/as53274?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS53274 (Skyrunner)</u></a> both experienced multi-day disruptions, likely related to damage from Helene. However, these disruptions took Morris Broadband completely offline several times over the course of a week — the announced IP address space graph below shows three distinct drops to zero, aligning with outages visible in the traffic graph, when the network was effectively disconnected from the Internet. A similar but less severe pattern was seen at Skyrunner, which lost 75-80% of announced IP address space for a two-day period covering September 27-29, aligning with an outage visible in the associated traffic graph.</p><p>Other impacted network providers in North Carolina included <a href="https://radar.cloudflare.com/as22191?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS22191 (Wilkes Communications)</u></a> and <a href="https://radar.cloudflare.com/as23118?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS23118 (Skyline Telephone)</u></a>.</p>
    <div>
      <h2>Power outages</h2>
      <a href="#power-outages">
        
      </a>
    </div>
    
    <div>
      <h3>Venezuela</h3>
      <a href="#venezuela">
        
      </a>
    </div>
    <p>A nationwide power outage in <a href="https://radar.cloudflare.com/ve"><u>Venezuela</u></a> on August 30 was, <a href="https://www.reuters.com/business/energy/venezuelas-capital-caracas-other-regions-face-power-outage-2024-08-30/"><u>according to President Nicolás Maduro</u></a>, the result of an attack on the Guri Reservoir, Venezuela's largest hydroelectric project. A <a href="https://www.reuters.com/business/energy/venezuelas-capital-caracas-other-regions-face-power-outage-2024-08-30/"><u>published report</u></a> indicated that all 24 of the country's states reported a total or partial loss of electricity supply. The loss of power unsurprisingly caused an Internet disruption, with country-level traffic dropping 82%, starting around 04:45 local time (08:45 UTC). Traffic began to increase as electricity returned to various parts of the country throughout the day, and returned to expected levels just after midnight local time on August 31 (04:00 UTC). </p>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>On August 30, Kenya Power Care <a href="https://www.facebook.com/KenyaPowerLtd/posts/pfbid0krBvZqWT7AfF8HjTPdm9Y84QmmkgfUzPjhtgxZjzEpyVqRLFS6VBt5vR43s5dxiHl"><u>posted a Customer Alert on its Facebook page</u></a>, issued at 21:57 local time (18:57 UTC), stating that “<i>We have lost power supply to various parts of the country except North Rift region and sections of Western region.</i>” Approximately a half hour before that alert, Kenya’s Internet traffic began to drop, falling as much as 61%. Just two hours later, Kenya Power Care <a href="https://www.facebook.com/KenyaPowerLtd/posts/pfbid0m4kP2NwdiDPnH4UpWH39QkpLANTWc6SR3bpiHxnwCUdBvwwou7p1skfaWbghRFWml"><u>posted a follow up</u></a>, stating “<i>Following the partial outage affecting several parts of the country this evening, we are pleased to report that power supply has now been restored to the entire Western region, as well as parts of Central Rift, South Nyanza, and Nairobi regions.</i>” However, traffic did not return to expected levels for several more hours, taking until 06:00 local time (03:00 UTC).</p><p>A week later, on September 6, Kenya Power Care <a href="https://www.facebook.com/KenyaPowerLtd/posts/pfbid02BcJVt9uu1N3mmGzf9mivyXev4FSJVpPZ5ni1VkZC9WSdYyYyk7MCMtignBPzcVnyl"><u>posted another similar Customer Alert</u></a>, noting that “<i>We are experiencing a power outage affecting several parts of the country, except sections of North Rift and Western regions.</i>” This alert was issued at 09:20 local time (06:20 UTC), and follows a drop in Internet traffic that started around 09:00 local time (06:00 UTC). Traffic dropped approximately 45% during this power outage, and returned to expected levels around 16:00 local time (13:00 UTC). Traffic recovery aligns with a <a href="https://www.facebook.com/KenyaPowerLtd/posts/pfbid02VzrAMQeuTrmfyywXeB7qXFyAmeM1eEQCBX6dvY3DHbyfUoTjgTJATcg9cToBk7zal"><u>subsequent Customer Alert posted on Facebook</u></a>, where Kenya Power Care stated “<i>We are glad to report that normal electricity supply was restored across the country as at 3:49pm”.</i></p><p>A statement from Energy and Petroleum Cabinet Secretary Opiyo Wandayi, <a href="https://www.facebook.com/KenyaPowerLtd/posts/pfbid02Nck9kx6NFmvFRdLEpzPxk1UPW3HtNw41PHNhHd3PMR2Y73BpkMALZmNU3mkar8DPl"><u>shared on Facebook by Kenya Power Care</u></a>, explained the cause of the power outage: “<i>Today, Friday 6th September 2024 at 8.56 am, the 220kV High Voltage Loiyangalani transmission line tripped at Suswa substation while evacuating 288MW from Lake Turkana Wind Power (LTWP) plant. This was followed by a trip on the Ethiopia – Kenya 500kV DC interconnector that was then carrying 200MW, resulting to a total loss of 488MW…</i>” </p>
    <div>
      <h3>Ecuador</h3>
      <a href="#ecuador">
        
      </a>
    </div>
    <p>According to a (translated) September 7 <a href="https://x.com/OperadorCenace/status/1832431918563872871"><u>post on X from CENACE</u></a>, the national electricity operator in <a href="https://radar.cloudflare.com/ec"><u>Ecuador</u></a>, “<i>We inform the public that due to a fault in the Molino substation bar, which is connected to the Paute generation, there has been a power outage in some provinces of the country. Cenace's technical team, in coordination with the distribution companies, is working to gradually restore electrical service. It is estimated that it will take 3 to 4 hours maximum for the supply to return to normal.</i>” The post was published at 09:53 local time (14:53 UTC), approximately an hour after Internet traffic from the country began to drop. Traffic returned to expected levels just under four hours later, at around 12:30 local time (17:30 UTC), in line with CENACE’s predicted time for power to be fully restored.</p><p>On September 18/19, the first of several planned nightly power outages to enable needed grid maintenance in Ecuador disrupted Internet connectivity. Traffic dropped by over 60% as compared to the same time the prior week starting around 21:30 local (02:30 UTC), with the power outages <a href="https://www.americaeconomia.com/en/node/288653"><u>reportedly</u></a> scheduled for 22:00 - 06:00 local time. Internet traffic recovered to expected levels around 06:00 local time (11:00 UTC) as power was restored. Similar power cuts were <a href="https://ec.usembassy.gov/alert-series-of-nationwide-overnight-power-outages-and-curfews/"><u>reportedly planned from September 23 to September 27</u></a>, but these power outages did not appear to impact <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=ec&amp;dt=2024-09-22_2024-09-28&amp;timeCompare=1"><u>traffic levels in Ecuador as compared to the previous week</u></a>. </p>
    <div>
      <h3>Senegal</h3>
      <a href="#senegal">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/sn"><u>Senegal’s</u></a> power company, Senelec, <a href="https://x.com/Senelecofficiel/status/1834245424787394629"><u>posted a communiqué on X</u></a> on September 12 that stated (translated) “<i>Senelec informs its valued customers that an incident that occurred this morning at the Hann substation resulted in the loss of the OMVS interconnected network and disruptions to electricity distribution.</i>” This disruption to electricity distribution also resulted in a disruption to Internet traffic, which dropped sharply at 13:00 local time (13:00 UTC), falling as much as 80%. Traffic recovered to expected levels by 20:00 local time (20:00 UTC) around the same time that Senelec <a href="https://x.com/Senelecofficiel/status/1834320225954922533"><u>posted a followup about the incident</u></a> that stated (translated) “<i>Effective restoration of electricity supply in all localities.</i>”</p>
    <div>
      <h2>Maintenance</h2>
      <a href="#maintenance">
        
      </a>
    </div>
    
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>As we discussed above, Internet users in <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> were impacted by an exam-related Internet shutdown from 07:00 - 10:15 local time (04:00 - 07:15 UTC) on July 30. However, just an hour after connectivity was restored, another disruption occurred, as seen in both the traffic and announced IP address space graphs below. According to a (translated) <a href="https://www.facebook.com/photo?fbid=868145108679350&amp;set=a.449047403922458"><u>Facebook post from Syrian Telecom</u></a>, “...<i>during the periodic maintenance of one of the air conditioners in one of the technical halls, an explosion occurred, which caused the internet circuits to be temporarily out of service.</i>” Traffic remained depressed for approximately eight hours, recovering to expected levels around 19:00 local time (16:00 UTC).</p>
    <div>
      <h2>Cyberattack</h2>
      <a href="#cyberattack">
        
      </a>
    </div>
    
    <div>
      <h3>Russia</h3>
      <a href="#russia">
        
      </a>
    </div>
    <p>Roskomnadzor, Russia’s Internet regulate, <a href="https://t.me/roskomnadzorro/1897"><u>blamed</u></a> a brief disruption in traffic observed in <a href="https://radar.cloudflare.com/ru"><u>Russia</u></a> and on <a href="https://radar.cloudflare.com/as12389"><u>AS12389 (Rostelecom)</u></a> on August 21 on a distributed denial-of-service (DDoS) attack that targeted Russian telecommunications operators. The disruption was brief, lasting from around 13:45 until 14:30 Moscow time (10:45 - 11:30 UTC). Roskomnadzor <a href="https://www.uawire.org/massive-internet-outage-in-russia-kremlin-s-attempt-to-block-messaging-apps-causes-nationwide-disruption"><u>subsequently stated</u></a> "<i>As of 3 PM Moscow time, the attack has been repelled, and services are operating normally.</i>" The disruption <a href="https://www.barrons.com/news/large-scale-outages-hit-telegram-whatsapp-in-russia-3a08695c"><u>reportedly</u></a> impacted messaging services Telegram and WhatsApp, <a href="https://www.uawire.org/massive-internet-outage-in-russia-kremlin-s-attempt-to-block-messaging-apps-causes-nationwide-disruption"><u>as well as</u></a> Wikipedia, Yandex, VKontakte, telecom support services, and mobile banking apps. Some experts <a href="https://www.uawire.org/massive-internet-outage-in-russia-kremlin-s-attempt-to-block-messaging-apps-causes-nationwide-disruption"><u>questioned the official explanation</u></a>, suggesting instead that the disruption was due to <a href="https://therecord.media/russia-blames-websites-apps-outages-on-ddos"><u>centralized interference from Roskomnadzor</u></a>.</p>
    <div>
      <h2>Military action</h2>
      <a href="#military-action">
        
      </a>
    </div>
    
    <div>
      <h3>Palestine</h3>
      <a href="#palestine">
        
      </a>
    </div>
    <p>We have covered Internet disruptions related to the ongoing conflict in Gaza multiple times since October 2023, both on <a href="https://x.com/search?q=gaza%20internet%20(from%3Acloudflareradar)&amp;src=typed_query&amp;f=live"><u>Cloudflare Radar’s presence on X</u></a>, and on the Cloudflare blog (<a href="https://blog.cloudflare.com/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks/"><u>1</u></a>, <a href="https://blog.cloudflare.com/q4-2023-internet-disruption-summary/"><u>2</u></a>, <a href="https://blog.cloudflare.com/q1-2024-internet-disruption-summary/"><u>3</u></a>). In many of these cases, Paltel (AS12975) has posted notices on social media regarding service disruptions and outages. On September 8, <a href="https://www.facebook.com/paltel.970/posts/pfbid036YptxzF77Rk5U7tVGT5Xh4Yx4897BVoeb4qsZNhGkLh1XxLCTLMzDjp1RLAkBfJHl"><u>Paltel posted a message on its Facebook page</u></a>, stating (translated) “<i>We regret to announce the suspension of home internet services in the central and southern areas of the Gaza Strip, due to the ongoing aggression.</i>”</p><p>Within the Gaza, Rafah, Deir al-Balah Governorates, we observed a sharp drop in traffic at 18:00 local time (16:00 UTC). The impact appeared to be most significant in Rafah and Deir al-Balah. Traffic returned to expected levels around 23:00 local time (21:00 UTC), and Paltel <a href="https://www.facebook.com/paltel.970/posts/pfbid0hJxQReZimYRnNxbMNeyscVCtwhS2wnA4Us6fucJ4WntFuQeS3BAKqhMWxJJqFzaVl"><u>confirmed the service restoration in a subsequent Facebook post</u></a>, stating (translated) “<i>We would like to announce the return of home Internet services in central and southern Gaza Strip to the way it was before it was interrupted hours ago.</i>”	</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QELKmNYaZC5NmvkTDreST/f913dde97df36d81772756d528745980/MILITARY_ACTION_-_PALESTINE_-_Gaza_-_Gaza_Governorate.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3zALCKZTWs6E62cptuxPjq/cd71ff38103f4574b7d2f6e3c3b66ab6/MILITARY_ACTION_-_PALESTINE_-_Gaza_-_Rafah_Governorate.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7yvARj41pkM60UhcfNtEEC/4963c76fe2ef45802211ae2b6ebbe5ff/MILITARY_ACTION_-_PALESTINE_-_Gaza_-_Deir_al-Balah_Governorate.png" />
          </figure>
    <div>
      <h3>Lebanon</h3>
      <a href="#lebanon">
        
      </a>
    </div>
    <p><a href="https://www.cnn.com/world/live-news/israel-lebanon-war-hezbollah-09-27-24#cm1lbrhcd001k3b6mxt9ij3lb"><u>Israeli airstrikes targeting the Lebanese capital of Beirut</u></a> on September 28 likely knocked local network provider <a href="https://radar.cloudflare.com/as42852"><u>Solidere (AS42852)</u></a> offline for several hours. The graph below shows a loss of traffic starting around 12:15 local time (10:15 UTC), at the same time a complete loss of announced IP address space occurred. Most of Solidere’s IP address space started to get announced again at 14:45 local time (12:45 UTC), and a slight increase in traffic was seen at that time as well. Traffic levels fully recovered just after 18:00 local time (16:00 UTC), and announced IP address space had stabilized by that time as well. </p>
    <div>
      <h2>Fire</h2>
      <a href="#fire">
        
      </a>
    </div>
    
    <div>
      <h3>Algeria</h3>
      <a href="#algeria">
        
      </a>
    </div>
    <p>A fire near a data center in Blida Province, <a href="https://radar.cloudflare.com/dz"><u>Algeria</u></a> disrupted connectivity on AS327931 (Djezzy) at 13:00 and local time (12:00 UTC) on July 24. According to a (translated) <a href="https://x.com/djezzy/status/1816272546284855678"><u>X post from Djezzy</u></a>, “<i>Djezzy announced fluctuations in its services in some areas of the country, as it was a victim of a fire that broke out on Wednesday, July 24, 2024, in a warehouse of one of the companies located near its technical center in the state of Blida.</i>” The post from Djezzy predicted that “<i>97% of the sites will be restored by around 3 am [July 25]</i>”, but traffic did not return to expected levels until the end of the day on July 25.</p>
    <div>
      <h2>Unknown</h2>
      <a href="#unknown">
        
      </a>
    </div>
    
    <div>
      <h3>United States</h3>
      <a href="#united-states">
        
      </a>
    </div>
    <p>On Monday, September 30, customers on Verizon’s mobile network in multiple cities across the United States <a href="https://apnews.com/article/verizon-outage-sos-mode-phone-service-b03c9b8615e0650669339daa2eaa1713"><u>reported</u></a> experiencing a loss of connectivity. Impacted phones showed “SOS” instead of the usual bar-based signal strength indicator, and customers complained of an inability to make or receive calls on their mobile devices. Although initial reports of connectivity problems started around 09:00 ET (13:00 UTC), we didn’t see a noticeable change in request volume at an ASN level until about two hours later. <a href="https://radar.cloudflare.com/as6167"><u>AS6167 (CELLCO)</u></a> is the <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a> used by Verizon for its mobile network.</p><p>Just before 12:00 ET (16:00 UTC), Verizon <a href="https://x.com/VerizonNews/status/1840780785084985777"><u>published a social media post acknowledging the problem</u></a>, stating “We are aware of an issue impacting service for some customers. Our engineers are engaged, and we are working quickly to identify and solve the issue.” As the <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=as6167&amp;dt=2024-09-30_2024-09-30&amp;timeCompare=2024-09-23"><u>graph</u></a> below shows, a slight decline (-5%) in HTTP traffic as compared to traffic at the same time a week prior is first visible around 11:00 ET (15:00 UTC), and request volume fell as much as 9% below expected levels at 13:45 ET (17:45 UTC).</p><p>Media reports listed cities including Chicago, Indianapolis, New York City, Atlanta, Cincinnati, Omaha, Phoenix, Denver, Minneapolis, Seattle, Los Angeles, and Las Vegas as being most impacted. Traffic graphs illustrating the impacts seen in these cities can be found in our <a href="https://blog.cloudflare.com/impact-of-verizons-september-30-outage-on-internet-traffic/"><i><u>Impact of Verizon’s September 30 outage on Internet traffic</u></i></a> blog post.</p><p>Traffic appeared to return to expected levels around 17:15 ET (21:15 UTC). At 19:18 ET (23:18 UTC), a <a href="https://x.com/VerizonNews/status/1840893978411221191"><u>social media post</u></a> from Verizon noted “<i>Verizon engineers have fully restored today's network disruption that impacted some customers. Service has returned to normal levels.</i>”</p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>On July 31, <a href="https://radar.cloudflare.com/pk"><u>Pakistan</u></a> experienced a wide-scale Internet disruption that lasted approximately two hours, between 13:30 - 15:30 local time (08:30 - 10:30 UTC). Traffic only dropped ~45% at a country level, but <a href="https://radar.cloudflare.com/as17557"><u>AS17557 (PTCL)</u></a> experienced a near complete loss of traffic, while traffic at <a href="https://radar.cloudflare.com/as24499"><u>AS24499 (Telenor Pakistan)</u></a> dropped nearly 90%. Together, the two network providers serve an estimated nine million users, and are among the top five Internet service providers in the country.</p><p>The actual cause of the disruption is disputed. It was <a href="https://www.globalvillagespace.com/internet-outage-in-pakistan/"><u>reported</u></a> that the Pakistan Telecommunication Authority (PTA) attributed the disruptions to a technical glitch in the international submarine cable affecting the Pakistan Telecommunication Company Limited (PTCL) network. However, another <a href="https://incpak.com/national/internet-services-outtage-across-pakistan/"><u>published report</u></a> noted “According to our sources, the government’s latest firewall edition to block the content was misconfigured, resulting in Internet connectivity disruption.” Additional details can be found in our August 1 blog post, <a href="https://blog.cloudflare.com/a-recent-spate-of-internet-disruptions-july-2024/"><i><u>A recent spate of Internet disruptions</u></i></a><i>.</i></p>
    <div>
      <h3>United Kingdom</h3>
      <a href="#united-kingdom">
        
      </a>
    </div>
    <p>On August 14, subscribers of <a href="https://radar.cloudflare.com/gb"><u>UK</u></a> service provider <a href="https://radar.cloudflare.com/as25135"><u>Vodafone (AS25135)</u></a> <a href="https://www.dailymail.co.uk/sciencetech/article-13742755/Vodafone-network-crashes-internet.html"><u>reported problems</u></a> accessing both mobile and landline Internet connections. Starting around 11:00 local time (10:00 UTC), we observed traffic starting to drop, ultimately falling 43% below the same time the prior week. The disruption was fairly short-lived, as traffic returned to expected levels by 13:30 local time (12:30 UTC). Vodafone did not acknowledge the issue on social media, nor did it provide a public explanation for what caused the disruption.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Although Internet disruptions observed during the third quarter had a variety of underlying causes, those caused by power outages due to aging or insufficiently maintained electrical infrastructure are worth highlighting. Of course, widespread power outages always create a massive inconvenience for impacted populations, but over the last several years, as communication, entertainment, commerce, and more have become increasingly reliant on the Internet, the impact of these outages has become even more significant, because losing electrical power largely means losing Internet connectivity. Although mobile connectivity may still be available in some cases, it is decidedly not a complete replacement, not to mention that mobile devices will eventually need to be recharged. While addressing the underlying infrastructure issues require non-trivial amounts of time, resources, and money, governments appear to be taking steps towards doing so.</p><p>Visit <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> for additional insights around Internet disruptions, routing issues, Internet traffic trends, security and attacks, and Internet quality. Follow us on social media at <a href="https://x.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via e-mail.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">3xoUhxvPcDFTiYCT9CjHhs</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[A recent spate of Internet disruptions]]></title>
            <link>https://blog.cloudflare.com/a-recent-spate-of-internet-disruptions-july-2024/</link>
            <pubDate>Thu, 01 Aug 2024 15:21:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Radar is constantly monitoring the Internet for widespread disruptions. Here we examine several recent noteworthy disruptions detected in the first month of Q3, including traffic anomalies observed in Bangladesh, Syria, Pakistan, and Venezuela. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare Radar is constantly monitoring the Internet for widespread disruptions. In mid-July, we published our <a href="http://blog.cloudflare.com/q2-2024-internet-disruption-summary"><i>Q2 2024 Internet Disruption Summary</i></a>, and here we examine several recent noteworthy disruptions detected in the first month of Q3, including traffic anomalies observed in Bangladesh, Syria, Pakistan, and Venezuela.</p>
    <div>
      <h3>Bangladesh</h3>
      <a href="#bangladesh">
        
      </a>
    </div>
    <p><a href="https://timesofindia.indiatimes.com/world/south-asia/internet-shut-nationwide-bandh-announced-why-is-bangladesh-experiencing-deadly-protests/articleshow/111829956.cms">Violent student protests</a> in Bangladesh against quotas in government jobs and rising unemployment rates led the government to order the nationwide shutdown of mobile Internet connectivity on July 18, <a href="https://therecord.media/bangladesh-mobile-internet-social-media-outages-student-protests">reportedly</a> to “ensure the security of citizens.” This government-directed shutdown ultimately became a near-complete Internet outage for the country, as broadband networks were taken offline as well. At a country level, <a href="https://radar.cloudflare.com/traffic/bd?dateStart=2024-07-14&amp;dateEnd=2024-07-20">Internet traffic in Bangladesh dropped to near zero</a> just before 21:00 local time (15:00 UTC). <a href="https://radar.cloudflare.com/routing/bd?dateStart=2024-07-14&amp;dateEnd=2024-07-20">Announced IP address space from the country dropped to near zero</a> at that time as well, meaning that nearly every network in the country was disconnected from the Internet.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HVxLTcXlB5mWm28ZSthZX/4aabc2b169c5f6e93343d6e311e6c675/1.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3XhqV4R4Is7w92GscnzqmT/d42e806f8061026808ea8c27de013bef/2.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6OPTe1uK4Ff6tI5IpD0KZE/b85178c819255e016a6881538f927f01/3.png" />
          </figure><p>However, ahead of this nationwide shutdown, we observed outages across several Bangladeshi network providers, perhaps foreshadowing what was to come. At <a href="https://radar.cloudflare.com/as24389">AS24389 (Grameenphone)</a>, a complete Internet outage started at 01:30 local time on July 18 (19:30 UTC on July 17), with a total loss of both <a href="https://radar.cloudflare.com/traffic/as24389?dateStart=2024-07-14&amp;dateEnd=2024-07-20">Internet traffic</a> and <a href="https://radar.cloudflare.com/routing/as24389?dateStart=2024-07-14&amp;dateEnd=2024-07-20">announced IP address space</a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5A3tYcwgeLS4JLqEmWc6XS/9473a77048fe1165cc544bb10935671f/4.png" />
          </figure><p>The outage at <a href="https://radar.cloudflare.com/as45245">AS25245 (Banglalink)</a> started at 02:15 local time on July 18 (20:15 UTC on July 17) as both <a href="https://radar.cloudflare.com/traffic/as45245?dateStart=2024-07-14&amp;dateEnd=2024-07-20">Internet traffic</a> and <a href="https://radar.cloudflare.com/routing/as45245?dateStart=2024-07-14&amp;dateEnd=2024-07-20">announced IP address space</a> dropped to zero.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/37sQXgIRxUxpMTdVPRWjsS/538b061418f4e0dbe374de64ccd3ef0f/5.png" />
          </figure><p>At <a href="https://radar.cloudflare.com/as24432">AS24432 (Robi Axiata)</a>, an Internet outage was observed starting around 06:30 local time on July 18 (00:30 UTC), with both <a href="https://radar.cloudflare.com/traffic/as24432?dateStart=2024-07-14&amp;dateEnd=2024-07-20">Internet traffic</a> and <a href="https://radar.cloudflare.com/routing/as24432?dateStart=2024-07-14&amp;dateEnd=2024-07-20">announced IP address space</a> disappearing at that time.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/75GBLfiuf6AmfHrE2UrrGA/ede0627e64a99227855f67a22e8c66d9/6.png" />
          </figure><p><a href="https://radar.cloudflare.com/traffic/as58715?dateStart=2024-07-14&amp;dateEnd=2024-07-20">Internet traffic</a> at <a href="https://radar.cloudflare.com/as58715">AS58715 (Earth Telecommunication)</a> began to fall at 18:00 local time on July 18 (12:00 UTC), reaching zero four hours later. <a href="https://radar.cloudflare.com/routing/as58715?dateStart=2024-07-14&amp;dateEnd=2024-07-20">Announced IP address space</a> began to fall at 21:00 local time (15:00 UTC), and was completely gone by 21:25 local time (15:25 UTC).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Hi0Hw3G0xi8LVNRvmVWqc/b40b38b2fa193187c8d42d9cf1060fc5/7.png" />
          </figure><p><a href="https://radar.cloudflare.com/as63526">AS63526 (Carnival Internet)</a> was one of the last to fall before the complete shutdown, <a href="https://radar.cloudflare.com/traffic/as63526?dateStart=2024-07-14&amp;dateEnd=2024-07-20">losing traffic</a> at 20:45 local time (14:45 UTC), and seeing all of its <a href="https://radar.cloudflare.com/routing/as63526?dateStart=2024-07-14&amp;dateEnd=2024-07-20">announced IP address space</a> withdrawn over the following hour.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/zhVSvxVogVry8xownHJmY/b33cfc2b1000cf1edaa5560a5abb15b6/8.png" />
          </figure><p>In the days before the shutdown, both median bandwidth and latency at a country level for Bangladesh were fairly stable. However, Cloudflare Radar’s <a href="https://radar.cloudflare.com/quality/bd?dateStart=2024-07-14&amp;dateEnd=2024-07-20">Internet Quality measurements</a> at a country level show a clear increase in median bandwidth and a concurrent drop in median latency, both likely due to the loss of measurements from mobile network providers as they disconnected from the Internet.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5VY2SSPy6xbB9kRB2dp8Yc/dd50cfed43d3e96edfce5f48dc4a4f93/9.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ztJow8PNDMXP8gj7I76r0/c6d01ade8d42c7613a03fc2ca679bdb5/10.png" />
          </figure><p>Five days after the full Internet shutdown started, broadband Internet services providers in Bangladesh began to restore connectivity on July 23. The initial restoration was characterized as a “trial run”, prioritizing banking, commercial sectors, technology firms, exporters, outsourcing providers and media outlets, <a href="https://www.dhakatribune.com/bangladesh/352554/broadband-internet-restored-in-limited-areas-after">according to</a> the state minister for post, telecommunication and information technology. <a href="https://radar.cloudflare.com/routing/bd?dateStart=2024-07-23&amp;dateEnd=2024-07-23">Announced IP address space</a> began to increase around 19:00 local time (13:00 UTC), with traffic volumes beginning to trend upwards at that same time, as selected networks reconnected to the Internet.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2PLUoGGpk9Qq94fLUqB1TD/f14357d946020f3d474e438333ed88f3/11.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3yvJpELkazG8Fhlv6joEV5/dbc29fbe61f75316ff7567e35810643a/12.png" />
          </figure><p></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6MUTWbGAsgSEIVUZWjfeSJ/1bfe68e439c32f7c91b37fb1044ae11e/13.png" />
          </figure><p>Looking at the network providers discussed above, traffic on <a href="https://radar.cloudflare.com/traffic/as63526?dateStart=2024-07-26&amp;dateEnd=2024-07-27">AS63526 (Carnival Internet)</a> and <a href="https://radar.cloudflare.com/traffic/as58715?dateStart=2024-07-26&amp;dateEnd=2024-07-27">AS58715 (Earth Telecommunication)</a> began to increase around 06:00 local time (00:00 UTC) on July 27, with these providers apparently included in a later phase of broadband restoration. However, traffic on mobile providers did not begin to recover until <a href="https://www.tbsnews.net/bangladesh/mobile-data-be-restored-3pm-today-palak-904901">around 15:00 local time</a> (09:00 UTC) on July 28, with <a href="https://radar.cloudflare.com/traffic/as24389?dateStart=2024-07-26&amp;dateEnd=2024-07-28">AS24389 (Grameenphone)</a>, <a href="https://radar.cloudflare.com/traffic/as45245?dateStart=2024-07-26&amp;dateEnd=2024-07-28">AS45245 (Banglalink)</a>, and <a href="https://radar.cloudflare.com/traffic/as24432?dateStart=2024-07-26&amp;dateEnd=2024-07-28">AS24432 (Robi Axiata)</a>, all seeing traffic starting to grow significantly at or slightly after that time.</p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>Unfortunately, Syria is no stranger to Internet shutdowns, as they occur yearly during nationwide exams, implemented with the intent of preventing cheating on those exams. Our recent blog post titled <a href="http://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown"><i>Exam-ining recent Internet shutdowns in Syria, Iraq, and Algeria</i></a> examined the first round of 2024 exams, which took place between May 26 and June 13. A second round of exams, and with them, multi-hour Internet shutdowns, began on July 25, and seen in the schedules below, <a href="https://www.facebook.com/photo/?fbid=862569062570288&amp;set=a.449047400589125">published by Syrian Telecom on its Facebook page</a> (English translation via Google Lens). </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5RQy6gdlWDOWyylCczdt3v/9748be3bd7e7d8281f960f5fa27b78fb/14.png" />
          </figure><p>The Internet shutdowns implemented for the first four days of tests are clearly visible in the graph below, occurring on July 25, 28, 29, and 30. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/30SW8L7XEco9ql905icJrJ/6046e1aa4d2bbdd183d2058a699827c9/15.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/12xtbn8XSMOC5KQKan7TDd/0ff3024b0a9dab8b91b4f0c170d0d3e2/16.png" />
          </figure><p>However, you will also note another disruption is visible in both Syria’s Internet traffic and announced IP address space shortly after the planned shutdown on July 30. According to a (translated) <a href="https://www.facebook.com/photo?fbid=868145108679350&amp;set=a.449047403922458">Facebook post from Syrian Telecom</a>, “<i>while performing regular maintenance on one of the air conditioners located in one of the technical halls [data centers], an explosion occurred, causing the Internet circuits to temporarily go out of service.</i>” This issue resulted in a disruption lasting approximately eight hours, between 11:00 - 19:00 local time (08:00 - 16:00 UTC) seen in both <a href="https://radar.cloudflare.com/traffic/as29256?dateStart=2024-07-30&amp;dateEnd=2024-07-30">traffic</a> and <a href="https://radar.cloudflare.com/routing/as29256?dateStart=2024-07-30&amp;dateEnd=2024-07-30">announced IP address space</a> graphs for AS29256 (Syrian Telecom).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vuBJeQridjrHlxZ83RNQf/f7b4b3fe98309bb1fabf6383163a8245/17.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2j5b6kzwlPDAMs54GEQkqa/6dc42fa8eba4749912039d50894eb64e/18.png" />
          </figure>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>Closing out the month, on July 31, Pakistan experienced a wide-scale Internet disruption that lasted approximately two hours, between 13:30 - 15:30 local time (08:30 - 10:30 UTC). Traffic only dropped ~45% at a country level, but <a href="https://radar.cloudflare.com/as17557">AS17557 (PTCL)</a> experienced a near complete loss of traffic, while traffic at <a href="https://radar.cloudflare.com/as24499">AS24499 (Telenor Pakistan)</a> dropped nearly 90%. Together, the two network providers serve an estimated nine million users, and are among the top five Internet service providers in the country.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6BndoxddFfzJYBXPn0VigV/81b24ada71457970c7a3870e4411592d/19.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4F1LGoTsDivOYRlqCaDZ0y/e6cda3a549c42e5003c8b6b4f7307bcf/20.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ZMgn7gN9IypTZgvQF2EoN/2c6cacdcfc23d724d9e83a44a5a446f0/21.png" />
          </figure><p>It was <a href="https://www.globalvillagespace.com/internet-outage-in-pakistan/">reported</a> that the Pakistan Telecommunication Authority (PTA) attributed the disruptions to a technical glitch in the international submarine cable affecting the Pakistan Telecommunication Company Limited (PTCL) network. However, another <a href="https://incpak.com/national/internet-services-outtage-across-pakistan/">published report</a> noted “<i>According to our sources, the government’s latest firewall edition to block the content was misconfigured, resulting in Internet connectivity disruption.</i>” (Some additional information about the firewall can be found in <a href="https://www.dawn.com/news/1847040">this article</a>.) The graphs below are from forthcoming TCP reset/timeout data on Cloudflare Radar, and show increased numbers of connections terminating immediately after the initial synchronization (SYN) packet used to establish new TCP connections (“<a href="https://developers.cloudflare.com/radar/glossary/#tcp-resets-and-timeouts">Post SYN</a>”) between 13:30 - 15:30 local time (08:30 - 10:30 UTC) on PTCL and Telenor Pakistan, coincident with the observed disruption. In other words, the rate of SYN packets arriving at Cloudflare was mostly consistent during the disruption, but there was a drop in other TCP packets, suggesting that the firewall explanation may be plausible. A <a href="https://www.facebook.com/PTAOfficialPK/posts/pfbid0VR44dAeAbo4ciChBVWzxUSkkxR3XGPmjppwJbV7UxsNStqiPMAtRpf7QtdcWq5tAl">Facebook post</a> from the Pakistan Telecommunication Authority (PTA) simply highlighted that the issue had been resolved, and that “<i>The exact issue is being investigated by PTA to avoid such instances in future.</i>”</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/58LZktG6qGk0TjMbezTqnb/c3e8181067abfcfe1da4c153976ba51d/22.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1byG7WW6C8hihGsVI4A99X/c8a9e3d3fd634b2e9574d08a6924d721/23.png" />
          </figure><p>Regardless of the actual cause, the disruption had a clear impact on the country’s financial markets, with a <a href="https://www.thenews.com.pk/print/1215321-kse-100-loses-740-points-amid-nationwide-internet-outage">published report</a> stating “<i>The KSE-100 index suffered a sharp decline on Wednesday, plummeting over 740 points in the final hour of trading amid a nationwide internet outage. Analysts attributed the sudden drop to panic selling as investors struggled with limited market data."</i></p>
    <div>
      <h3>Venezuela</h3>
      <a href="#venezuela">
        
      </a>
    </div>
    <p>In the past, some countries have implemented government-directed Internet shutdowns as a means of limiting communication about or organizing of protests and demonstrations associated with contested elections. Although such protests and demonstrations sprang up in the wake of a <a href="https://apnews.com/article/venezuela-presidential-election-maduro-machado-edmundo-results-acee6c8cd3a8fc88086c2dd71963b759">contested presidential election in Venezuela</a> that took place on July 28, Internet shutdowns did not follow. However, in monitoring Internet traffic in Venezuela during the days around the election, the Cloudflare Radar team did observe several notable drops in traffic, as compared to the same times the week prior. After <a href="https://x.com/CloudflareRadar/status/1817968310191038670">surging 35%</a> at 05:00 local time (09:00 UTC) on Sunday, July 28 (election day), traffic dropped after the polls opened, down by as much as 23% at 09:00 local time (13:00 UTC). <a href="https://x.com/CloudflareRadar/status/1818218146903236799">On July 29</a>, the day following the election, traffic was as much as 28% lower than the same time the previous week at 06:15 local time (10:15 UTC) and 18:45 local time (22:45 UTC).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/OiQJTVdPCUpORBVXlj2AW/3a8a7da8ab550fa71675fb0fe1b1b3a7/24.png" />
          </figure><p>And while the observed drops in traffic appeared to be organic, and not caused by an Internet shutdown, it is worth noting that multiple websites are being blocked in Venezuela. An <a href="https://pulse.internetsociety.org/blog/internet-censorship-verging-on-service-blocking-ahead-of-venezuela-elections">Internet Society Pulse blog post</a>, published two days ahead of the election, reports that “<i>Around 60 websites are currently blocked in Venezuela, including eight media sites and three that fact-check news and misinformation.</i>”, citing data from the <a href="https://explorer.ooni.org/chart/mat?test_name=web_connectivity&amp;axis_x=measurement_start_day&amp;since=2024-07-01&amp;until=2024-07-26&amp;time_grain=day&amp;probe_cc=VE&amp;axis_y=domain">Open Observatory of Network Interference (OONI)</a>.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Visit <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for additional insights around Internet disruptions, routing issues, Internet traffic trends, security and attacks, and Internet quality. Follow us on social media at <a href="https://x.com/CloudflareRadar">@CloudflareRadar</a> (X), <a href="https://noc.social/@cloudflareradar">noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or contact us <a>via email</a>.</p> ]]></content:encoded>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <guid isPermaLink="false">6y7qBZ7MBe4IwACXynz3bJ</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Q2 2024 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q2-2024-internet-disruption-summary/</link>
            <pubDate>Tue, 16 Jul 2024 13:00:01 GMT</pubDate>
            <description><![CDATA[ Government directed shutdowns and cable cuts were both significant sources of Internet outages in Q2 2024. This post explores these disruptions, as well as others caused by power outages, maintenance, ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudflare’s network spans more than 320 cities in over 120 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions. Thanks to <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> functionality released earlier this year, we can explore the impact from a <a href="https://developers.cloudflare.com/radar/glossary/#bgp-announcements">routing</a> perspective, as well as a traffic perspective, at both a <a href="https://twitter.com/CloudflareRadar/status/1768654743742579059">network</a> and <a href="https://twitter.com/CloudflareRadar/status/1773704264650543416">location</a> level.</p><p>As we have seen in previous years, nationwide exams take place across several MENA countries in the second quarter, and with them come <a href="#governmentdirected">government directed Internet shutdowns</a>. <a href="#cablecuts">Cable cuts</a>, both terrestrial and submarine, caused Internet outages across a number of countries, with the ACE submarine cable being a particular source of problems. <a href="#maintenance">Maintenance</a>, <a href="#poweroutages">power outages</a>, and <a href="#technicalproblems">technical problems</a> also disrupted Internet connectivity, as did <a href="#unknown">unknown</a> issues. And as we have frequently seen in the two-plus years since the conflict began, Internet connectivity in Ukraine suffers as a result of Russian <a href="#attacks">attacks</a>.</p><p>As we have noted in the past, this post is intended as a summary overview of observed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter.</p><h2>Government directed</h2>
    <div>
      <h3>Syria, Algeria, Iraq</h3>
      <a href="#syria-algeria-iraq">
        
      </a>
    </div>
    <p>Each spring, governments in several countries in the Middle East and North Africa (MENA) region order local telecommunications providers to shut down or disrupt Internet connectivity across the country in an effort to prevent students from cheating on national secondary and high school exams. These shutdowns/disruptions generally occur for several hours per day over a multi-week period. We covered such events in <a href="/exam-internet-shutdowns-iraq-algeria">2023</a>, <a href="/syria-sudan-algeria-exam-internet-shutdown">2022</a>, and <a href="/syria-exam-related-internet-shutdowns/">2021</a>, as they occurred in locations including Syria, Sudan, Algeria, and Iraq.</p><p>In June, we published <a href="/syria-iraq-algeria-exam-internet-shutdown"><i>Exam-ining recent Internet shutdowns in Syria, Iraq, and Algeria</i></a>, which examined the daily Internet shutdowns that took place in Iraq and Syria, as well as the two multi-hour daily disruptions in Algeria, which appeared to be pursuing a content blocking strategy, rather than a full nationwide shutdown. The post examined the impact that these shutdowns have on Internet traffic, and also analyzed routing information and traffic from other Cloudflare services in an effort to better understand how these shutdowns are being implemented.</p><p>In addition to the shutdowns covered in the previously referenced blog post, Iraq implemented a second round of shutdowns that started on June 23, and ran through at least July 14. Some of these shutdowns impacted the same set of networks seen in the first round, and some impacted networks in the autonomous Kurdistan region in the north.</p><p>Among the latter set, <a href="https://radar.cloudflare.com/as206206">AS206206 (Kurdistan Net)</a>, <a href="https://radar.cloudflare.com/as59625">AS59625 (Korek Telecom)</a>, <a href="https://radar.cloudflare.com/as48492">AS48492 (IQ-Online)</a>, and <a href="https://radar.cloudflare.com/as21277">AS21277 (Newroz Telecom)</a> all implemented shutdowns on June 23, June 26, June 30, July 3, July 7, and July 10, between 06:00 - 08:00 local time (03:00 - 05:00 UTC).</p>






<p>Outside the autonomous Kurdistan region, networks including <a href="https://radar.cloudflare.com/as59588">AS59588 (Zainas)</a>, <a href="https://radar.cloudflare.com/as199739">AS199739 (Earthlink)</a>, <a href="https://radar.cloudflare.com/as203214">AS203214 (HulumTele)</a>, <a href="https://radar.cloudflare.com/as51684">AS51684 (Asiacell)</a>, and <a href="https://radar.cloudflare.com/as58322">AS58322 (Halasat)</a> implemented Internet shutdowns between 06:00 - 08:00 local time (03:00 - 05:00 UTC) on June 23, June 24, June 26, June 27, June 29, June 30, July 1, and July 2.</p>







<p>Both sets of shutdowns reviewed above appeared to have followed the same approach as the first round covered in the earlier blog post.</p>
    <div>
      <h3>Kenya, Burundi, Uganda, Rwanda, Tanzania</h3>
      <a href="#kenya-burundi-uganda-rwanda-tanzania">
        
      </a>
    </div>
    <p>Concerns over a potential Internet shutdown during planned protests against tax increases proposed in “<a href="https://en.wikipedia.org/wiki/Kenya_Finance_Bill_2024">Finance Bill 2024</a>” by the Kenyan government led to the publication of a joint statement signed by multiple organizations. The statement strongly urged the Kenyan government to refrain from enforcing any</p><p>Internet shutdowns or information controls, and highlighted the “disastrous economic effects” such a move could have. In response, the Communications Authority of Kenya <a href="https://x.com/CA_Kenya/status/1805311316719993274">issued a press release</a> stating that “<i>For the avoidance of doubt, the Authority has no intention whatsoever to shut down Internet traffic or interfere with the quality of connectivity. Such actions would be a betrayal of the Constitution as a whole, the freedom of expression in particular and our own ethos.</i>”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/18VUH92c3DCiuL6Tlb9Ex1/d19d8a28302c53690fdd7ee8904d85d1/10.png" />
            
            </figure><p>As <a href="https://en.wikipedia.org/wiki/Kenya_Finance_Bill_protests">protests escalated</a> on June 25, Internet traffic in <a href="https://radar.cloudflare.com/ke">Kenya</a> dropped at 16:30 local time (13:30 UTC). Initially, this outage was thought to be due to issues with <a href="https://www.submarinecablemap.com/country/kenya">one or more undersea cables</a> that provide international connectivity to the country, with the potential cause supported by social media posts from <a href="https://x.com/SafaricomPLC/status/1805615681951375595">Safaricom</a> and <a href="https://x.com/AIRTEL_KE/status/1805635373680193836">Airtel</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4nseWjxCypENox62FqSzFt/ca5f0eb0e634fca9597c1482b0834459/Screenshot-2024-07-14-at-10.56.25-PM.png" />
            
            </figure><p>Similar concurrent drops in Internet traffic were observed in <a href="https://radar.cloudflare.com/bi">Burundi</a>, <a href="https://radar.cloudflare.com/ug">Uganda</a>, <a href="https://radar.cloudflare.com/rw">Rwanda</a>, and <a href="https://radar.cloudflare.com/tz">Tanzania</a>, as shown below. Issues with submarine cables connected to one country can impact Internet connectivity in other countries if there is a dependency on that country/cable for upstream Internet connectivity. As such, the observed disruptions in those four countries were not that unusual. To that end, a (subsequently deleted) <a href="https://twitter.com/mtnug/status/1805707549385044057">post on X from MTN Uganda</a> noted: "<i>Our esteemed customers, We are experiencing a degraded service on all our internet services due to an outage caused by our connectivity supply through Kenya. Our technical teams and partners are working jointly to resolve the issue in the shortest time possible. In the interim, we kindly advise our customers to use *165# to access Mobile Money and other app based services. Thank you.</i>"</p>






<p>However, other participants in the Internet infrastructure community in Africa called the undersea cable outage explanation into question. Kyle Spencer, Executive Director of the <a href="https://www.uixp.co.ug/">Uganda Internet eXchange Point</a>, <a href="https://x.com/kyleville/status/1805614461190906295">posted on X</a> that “<i>I am told the Kenyan government ordered sea cable landing stations to disconnect circuits.</i>” Ben Roberts, Group CTIO at <a href="https://liquid.tech/">Liquid Intelligent Technologies</a> (a pan-African network infrastructure provider), <a href="https://x.com/benliquidkenya/status/1805851264082751756">posted</a> “<i>No cables are damaged this week.</i>” In addition, outages on undersea cables are rarely, if ever, resolved in a matter of hours, as this disruption was – they frequently last for days or weeks.</p><p>On June 26, Safaricom’s CEO <a href="https://www.standardmedia.co.ke/sports/business/article/2001497896/why-there-was-network-outage-during-protests-safaricom-ceo-explains">claimed</a> “This outage was occasioned by reduced bandwidth on some cables that carry Internet traffic”, contradicting the company’s original claim. No additional information was forthcoming from Airtel or the Communications Authority of Kenya, but as noted above, some within the industry believe that the disruption that impacted connectivity in Kenya, Burundi, Uganda, Rwanda, and Tanzania was directed by the government of Kenya, and was not caused by submarine cable outages.</p><h2>Cable cuts</h2>
    <div>
      <h3>Haiti</h3>
      <a href="#haiti">
        
      </a>
    </div>
    <p>At 17:36 local time (21:36 UTC) on April 28, <a href="https://x.com/DigicelHT/status/1784698298290376936">Digicel Haiti posted an “important note” on X</a> that stated in part (translated) “<i>On April 27, 2024, the company suffered several attacks on its international optical infrastructure in the Drouya area on National Road #1. The optical fiber was damaged by the impact of cartridges after the armed clashes in the area for a few days. It affected several services such as internet (data), SMS, MonCash and international calling. For now, we are happy to inform the population that all services are restored to 100%.</i>” The graph below shows the impact of the fiber damage, <a href="https://radar.cloudflare.com/as27653">with AS27653 (Digicel Haiti)</a> suffering an Internet outage lasting nearly 24 hours, from around 17:30 local time (21:30 UTC) on April 27 through approximately 16:00 local time (20:00 UTC) on April 28, after which traffic quickly recovered.</p><p>Then on May 3, The Director General of Digicel Haiti <a href="https://x.com/jpbrun30/status/1786368179440079102">posted on X</a> that (translated) “<i>Digicel is informing the general public that it suffered two more damages to its international fiber infrastructure at 2am this morning. We have restored Moncash services, SMS, and Fiber Optic connections. Our crews are already on their way to address the apparent landslide in the Canaan area.</i>” The disruption caused by this fiber damage lasted for approximately eight hours, between 02:15 - 10:30 local time (06:15 - 14:30 UTC), and as seen in the graph below, appeared to have a nominal impact on traffic.</p>
    <div>
      <h3>Kenya, Madagascar, Malawi, Mozambique, Rwanda, Tanzania, Uganda</h3>
      <a href="#kenya-madagascar-malawi-mozambique-rwanda-tanzania-uganda">
        
      </a>
    </div>
    <p>On Sunday, May 12, issues with the <a href="https://www.submarinecablemap.com/submarine-cable/eastern-africa-submarine-system-eassy">EASSy</a> and <a href="https://www.submarinecablemap.com/submarine-cable/seacomtata-tgn-eurasia">Seacom</a> submarine cables again disrupted connectivity to East Africa, impacting a number of countries previously affected by a set of cable cuts that occurred nearly three months earlier. Insight into these earlier cable cuts and the initial impact of May’s cable damage was covered in our <a href="/east-african-internet-connectivity-again-impacted-by-submarine-cable-cuts"><i>East African Internet connectivity again impacted by submarine cable cuts</i></a> blog post.</p><p>Traffic levels across a number of the impacted countries dropped just before 11:00 local time (08:00 UTC).  The magnitude of the initial impact varied by country, with traffic initially dropping by 10-25% in <a href="https://radar.cloudflare.com/traffic/ke?dateStart=2024-05-12">Kenya</a>, <a href="https://radar.cloudflare.com/traffic/ug?dateStart=2024-05-12">Uganda</a>, <a href="https://radar.cloudflare.com/traffic/mg?dateStart=2024-05-12">Madagascar</a>, and <a href="https://radar.cloudflare.com/traffic/mz?dateStart=2024-05-12">Mozambique</a>, while traffic in <a href="https://radar.cloudflare.com/traffic/rw?dateStart=2024-05-12">Rwanda</a>, <a href="https://radar.cloudflare.com/traffic/mw?dateStart=2024-05-12">Malawi</a>, and <a href="https://radar.cloudflare.com/traffic/tz?dateStart=2024-05-12">Tanzania</a> dropped by one-third or more than compared to the previous week. The overall impact was most significant in Tanzania, Madagascar, and Rwanda, as seen in the graphs below. Traffic returned to expected levels at various times over the following week, ranging from a day and a half later (May 13) in Kenya to a week later (May 19) in Rwanda.</p><p>Repairs to the EASSy and Seacom cables <a href="https://www.linkedin.com/posts/philippe-devaux-218423199_31may24-east-africa-eassy-seacom-subsea-activity-7202342753345650688-ll0q?utm_source=share&amp;utm_medium=member_desktop">were completed on May 31</a>. Repairs to the cables damaged in February were <a href="https://www.linkedin.com/posts/philippe-devaux-218423199_09jul24-red-sea-subsea-cables-tentative-activity-7216513121945841664-towG?utm_source=share&amp;utm_medium=member_desktop">ongoing as of July 9</a>, as their location in a war zone complicates repair efforts.</p>
    <div>
      <h3>Chad</h3>
      <a href="#chad">
        
      </a>
    </div>
    <p>A <a href="https://x.com/LeNdjam_Post/status/1794475979567505735">reported</a> fiber optic cable cut in Cameroon disrupted Internet connectivity for customers of <a href="https://radar.cloudflare.com/as327802">Moov Africa TChad</a> on May 25. The outage lasted three hours, between 15:15 -18:15 local time (14:15 - 17:15 UTC), with the impact visible at a country level as well. Routing was disrupted too, as the number of IPv4 /24 prefixes (256 IPv4 addresses) announced by Moov Africa Tchad fell from eight to three during the disruption.</p><p>The event was similar to one that <a href="https://www.facebook.com/moovafrica.td/posts/pfbid0kB9W5CkhVJqBq34agPWqG81yeCfLBijKYc6WiLDKLE79nPmhie4T9idZVStc8f6Xl">occurred on January 10</a>, when Moov Africa Tchad and country-level traffic was disrupted for over 12 hours “due to a cut in the optical fiber coming from Cameroon through which Chad has access to the Internet”. During that event, significant volatility was also observed from a routing perspective, as the volume of announced IPv4 address space shifted frequently at a <a href="https://radar.cloudflare.com/routing/as327802?dateStart=2024-01-10&amp;dateEnd=2024-01-11">network</a> and <a href="https://radar.cloudflare.com/routing/td?dateStart=2024-01-10&amp;dateEnd=2024-01-11">country</a> level during the disruption. As we noted last quarter, as a landlocked country, Chad is dependent on terrestrial Internet connections to/through neighboring countries, and the <a href="https://afterfibre.nsrc.org/">AfTerFibre cable map</a> illustrates Chad’s reliance on limited cable paths through Cameroon and Sudan.</p>
    <div>
      <h3>Gambia, Mauritania, Senegal</h3>
      <a href="#gambia-mauritania-senegal">
        
      </a>
    </div>
    <p>A <a href="https://x.com/CloudflareRadar/status/1798546000258417082">reported</a> “network interruption” on the <a href="https://www.submarinecablemap.com/submarine-cable/africa-coast-to-europe-ace">Africa Coast to Europe (ACE) submarine cable</a> disrupted traffic across networks in the Gambia, Mauritania, and Senegal on June 5. <a href="https://radar.cloudflare.com/as25250">AS25250 (Gamtel)</a>, <a href="https://radar.cloudflare.com/as29544">AS29544 (Mauritel)</a>, and <a href="https://radar.cloudflare.com/as37649">AS37649 (Free/Tigo)</a> all saw traffic drop around 23:00 local time (23:00 UTC). As seen in the graphs below, the outage lasted for nearly 11 hours, with traffic recovering just 10:00 local time on June 6 (10:00 UTC). Mauritel saw a near complete outage, while Gamtel and Free/Tigo saw less severe impacts, possibly because they were able to <a href="https://x.com/Gamtel/status/1798513818873831562">shift traffic to back up links</a>.</p><h2>Maintenance</h2>
    <div>
      <h3>Guinea, Gambia, Sierra Leone, Liberia</h3>
      <a href="#guinea-gambia-sierra-leone-liberia">
        
      </a>
    </div>
    <p>Above, we discussed an unexpected network interruption on the ACE submarine cable that caused outages across multiple countries on June 5. However, two months earlier, a planned outage for repair work on the cable also disrupted connectivity across multiple African countries. A <a href="https://twitter.com/jeanfrancis/status/1777231780002615593">communiqúe</a> issued by the Ministry of Posts, Telecommunications and the Digital Economy in Guinea noted in part (translated) “<i>...the ACE (Africa Coast to Europe) network will undergo a planned outage on April 8, 2024, between midnight and 2:00 a.m. morning in the following countries: Guinea, Senegal, Gambia, Sierra Leone and Liberia. This total outage of approximately 2 hours will affect Internet traffic and international calls.</i>”</p><p>The graphs below show the impact to traffic in the listed countries for the planned two-hour repair window, though it appears that traffic did not return fully to expected levels after the repair window concluded – it is unclear why it remained slightly depressed. In addition, despite being listed as one of the impacted countries, no impact to traffic was observed in <a href="https://radar.cloudflare.com/sn?dateStart=2024-04-07&amp;dateEnd=2024-04-08">Senegal</a>.</p>
    <div>
      <h3>Guinea</h3>
      <a href="#guinea">
        
      </a>
    </div>
    <p>Rounding out a trifecta of entries about the ACE submarine cable, planned maintenance work on the cable by <a href="https://guilab.com.gn/">GUILAB</a> reportedly caused a multi-hour outage at <a href="https://radar.cloudflare.com/as37461">AS37461 (Orange Guinea)</a> and at a country level as well, lasting from 12:15 - 15:45 local time (12:15 - 15:45 UTC). (GUILAB is the company in charge of managing the capacity allocated to Guinea on the ACE submarine cable.) The maintenance work was reported by Orange Guinea in two X posts (<a href="https://web.archive.org/web/20240601134921/https://twitter.com/orangeguinee_gn/status/1796901855705907676">1</a>, <a href="https://web.archive.org/web/20240601134922/https://twitter.com/orangeguinee_gn/status/1796901858444755127">2</a>), although these posts were subsequently deleted.</p><h2>Power outage</h2>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>At 18:30 local time (15:30 UTC) on May 2, <a href="https://x.com/KenyaPower_Care/status/1786058653058961589">Kenya Power posted a “Power Outage Alert” on X</a> that stated “<i>At 5:40 PM (EAT) today, Thursday, 2nd May 2024, we experienced a system disturbance on the grid, resulting in power supply disruption in most parts of the country.</i>” The graph below shows the resultant impact on Internet connectivity in the country, with traffic dropping sharply between 17:30 - 17:45 local time (14:30 - 14:45 UTC). The drop in traffic lasted until approximately 21:30 local time (18:30 UTC), the same time that <a href="https://x.com/KenyaPower_Care/status/1786104840990437749">Kenya Power posted a “Power Supply Restoration” notice on X</a>, highlighting the restoration of power to parts of the country. Although the post-outage spike seen in the graph would suggest pent-up demand for online content, a <a href="https://radar.cloudflare.com/ke?dateStart=2024-04-28&amp;dateEnd=2024-05-04">longer-term view</a> of Kenya's Internet traffic shows traffic peaks at the same time (22:00 local time, 19:00 UTC) during the preceding two days as well.</p>
    <div>
      <h3>Ecuador</h3>
      <a href="#ecuador">
        
      </a>
    </div>
    <p>A nationwide <a href="https://www.cnn.com/2024/06/19/americas/ecuador-nationwide-blackout-intl-latam/index.html">power outage in Ecuador on June 19</a> impacted hospitals, homes, and the subway, in addition to causing a major disruption to Internet connectivity. The graph below shows Ecuador’s Internet traffic dropping sharply just after 15:00 local time (20:00 UTC). A <a href="https://x.com/RobertoLuqueN/status/1803531032978661816">post on X from Public Works Minister Roberto Luque</a> explained (translated) “<i>The immediate report that we received from CENACE is that there is a failure in the transmission line that caused a cascade disconnection, so there is no energy service on a national scale.</i>” A subsequent post pointed at a lack of investment in the underlying systems, and noted that as of 18:41 pm local time (23:41 UTC), “<i>95% of the energy has already been restored</i>”. After the initial sharp drop, traffic began to recover fairly quickly, and was effectively back to expected levels by the stated time.</p>
    <div>
      <h3>Albania, Bosnia, Montenegro</h3>
      <a href="#albania-bosnia-montenegro">
        
      </a>
    </div>
    <p>A sudden increase in power consumption related to increased usage due to high temperatures, as well electrical systems being impacted by the heat, caused a <a href="https://www.reuters.com/world/europe/power-blackout-hits-montenegro-bosnia-albania-croatias-adriatic-coast-2024-06-21/">widespread power outage</a> across Montenegro, Bosnia, and Montenegro on June 21. The outage <a href="https://www.msn.com/en-gb/news/world/several-countries-across-europe-have-been-hit-by-a-massive-power-cut/ar-BB1oDYDy">reportedly</a> originated in Montenegro after a 400-kilowatt transmission line exploded. While power outages are generally more localized to a single country, or region within a country, power distribution systems are linked across Balkan countries as part of the <a href="https://international-partnerships.ec.europa.eu/policies/global-gateway/electricity-corridor-western-balkans_en">Trans-Balkan Electricity Corridor</a>.</p><p>Published reports (<a href="https://www.msn.com/en-gb/news/world/several-countries-across-europe-have-been-hit-by-a-massive-power-cut/ar-BB1oDYDy">MSN</a>, <a href="https://www.reuters.com/world/europe/power-blackout-hits-montenegro-bosnia-albania-croatias-adriatic-coast-2024-06-21/">Reuters</a>) noted that electrical networks went down 12:00 - 13:00 local time (10:00 - 11:00 UTC), and that electricity suppliers in the impacted countries started restoring power by mid-afternoon, and had it largely restored by the evening. The graphs below show traffic from Albania, Bosnia, and Montenegro starting to drop around 12:00 local time (10:00 UTC), reaching its nadir in Albania and Bosnia at 12:30 local time (10:30 UTC) and at 13:00 local time (11:00 UTC) in Montenegro. Traffic recovered gradually over the next several hours as power was restored, returning to expected levels by 15:30 local time (13:30 UTC).</p><p>Croatia was reportedly impacted by the power outage as well, but <a href="https://radar.cloudflare.com/hr?dateStart=2024-06-21&amp;dateEnd=2024-06-21">no adverse impact to traffic</a> at a country level is visible during the timeframe that connectivity in the other countries was disrupted.</p><h2>Military action</h2>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>During the two-plus years of the Russia-Ukraine conflict, Ukraine’s power grid has been a frequent target for Russian air attacks. When damage to Ukraine’s electrical power infrastructure occurs as a result of these attacks, Internet connectivity is also disrupted. <a href="https://apnews.com/article/ukraine-power-grid-russian-attacks-c763050237bcc1388747283bf336f8ad">Attacks on May 21</a> caused power outages across a number of areas in Ukraine. The most significant impact was in Sumy, where traffic dropped as low as 82% below the previous week at 00:00 on May 22 local time (21:00 UTC). As the graphs below illustrate, traffic was also lower than the previous week for several hours in Kyiv, Kharkiv, and Vinnytsia, with traffic returning to expected levels by around 08:00 local time (05:00 UTC) on May 22.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6glDuBLv30DAkA6PoUrx3S/0bd46f992616c555f1a339f17f4202f3/11.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pmAMdj3lv6eOeXHyB9D9Z/39888ca8908236c61a9e012bd265f4f2/12.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/640mnWgGRtUsIHSeoILNWV/63ead0b3dfc430f651eb8dcc6cd02c3f/13.png" />
            
            </figure><p>\</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6afAZfCn0vxaQbr81eAFGv/6bb391de75e320ac0a5f851df9733a49/14.png" />
            
            </figure><h2>Technical problems</h2>
    <div>
      <h3>Malaysia</h3>
      <a href="#malaysia">
        
      </a>
    </div>
    <p>As we’ve covered in previous quarterly posts, Internet outages and disruptions aren’t always due to significant wide-scale events like severe weather, power outages, or cable cuts. Sometimes more mundane technical issues can cause problems when users try to access the Internet. One example of this occurred on April 15 in Malaysia, when customers of <a href="https://radar.cloudflare.com/as9930">Time Internet</a> experienced a network outage for nearly two hours. The company explained the reason for the outage in a <a href="https://www.facebook.com/TimeInternet/posts/pfbid0RbJE44cgJvxA9FQSKFTVoe4NbJBdGuwkyXjuB5URiAW78zmgS5x1V8YPUt91ym9Al">contrite post on their Facebook page</a>, stating in part “<i>This Internet service outage was by far the worst in our history - affecting approximately 40% of our customers. … At 5.38pm today, both our primary and secondary Secure DNS servers became unreachable. This means that any browser or service requiring a DNS address resolution was not able to reach its intended site.</i>” Because subscribers could not reach Time Internet’s DNS resolvers, they were unable to resolve hostnames for Internet services, sites, and applications, including those delivered by Cloudflare. This resulted in the drop in traffic seen in the graph below, which started just after 17:00 local time (05:00 UTC), and began to recover approximately an hour later. The company did not provide any additional information on what caused the DNS servers to fail.</p>
    <div>
      <h3>Nepal</h3>
      <a href="#nepal">
        
      </a>
    </div>
    <p>In Nepal, a number of local Internet service providers including <a href="https://radar.cloudflare.com/as45650">AS45650 (Vianet)</a> and <a href="https://radar.cloudflare.com/as139922">AS139922 (Dishhome)</a> rely on Indian provider <a href="https://radar.cloudflare.com/as9498">Bharti Airtel</a> for upstream connectivity, enabling them to reach the rest of the Internet. A <a href="https://kathmandupost.com/money/2024/05/01/isps-warn-of-possible-internet-disruption">published report</a> underscores the reliance, noting “<i>Nepali ISPs buy 70 percent of their internet from Airtel.</i>”</p><p>On April 25, these ISPs <a href="https://www.nepalitelecom.com/latest-internet-shutdown-saga-in-nepal">warned</a> that their services could be interrupted because the Nepali government had not provided them with foreign exchange services that would enable them to pay bandwidth vendors such as Airtel, whom they reportedly owed USD $30 million to. On May 1, Airtel informed the delinquent Nepali providers that Internet services may be interrupted at any time due to the overdue payment, and on May 2, Airtel took that step. The graphs below show Vianet’s traffic dropping to near zero at 16:15 local time (10:30 UTC), recovering to expected levels six hours later. An hour later, at 17:15 local time (11:30 UTC), Dishhome’s traffic dropped significantly, though not as severely as Vianet’s. Dishhome’s traffic also recovered approximately six hours later.</p><p>Dishhome may not have experienced a near-complete outage like Vianet did because Bharti Airtel is one of <a href="https://radar.cloudflare.com/routing/as132799?dateStart=2024-05-02&amp;dateEnd=2024-05-02">four upstream providers used by its parent company</a>, whereas Bharti Airtel is <a href="https://radar.cloudflare.com/routing/as45650?dateStart=2024-05-02&amp;dateEnd=2024-05-02">one of Vianet's two upstream providers</a>.</p><p>A month later, on June 3, <a href="https://radar.cloudflare.com/as45650">AS45650 (Vianet)</a> and <a href="https://radar.cloudflare.com/as17501">AS17501 (Worldlink)</a> in Nepal experienced Internet disruptions that were <a href="https://myrepublica.nagariknetwork.com/news/internet-slowdown-across-nepal-due-to-airtel-network-issues/">reportedly</a> caused by routing issues on Bharti Airtel’s network. On Worldlink, a drop in traffic occurred between 12:15 - 14:00 local time (06:30 - 08:15 UTC), while on Vianet, the loss of traffic took place between 12:15 - 13:15 local time (06:30 - 07:30 UTC).</p><h2>Unknown</h2><p>Most of the Internet disruptions covered in this blog post series have a known root cause, whether admitted/stated by the impacted provider(s) or closely associated with a real world event (severe weather, power outage, etc.) However, other disruptions are observed and even publicized by the impacted provider, but no underlying reason for the outage is ever made public.</p>
    <div>
      <h3>Malaysia</h3>
      <a href="#malaysia">
        
      </a>
    </div>
    <p>On May 21, <a href="https://radar.cloudflare.com/as10030">CelcomDigi (AS10030)</a> <a href="https://x.com/CelcomDigi/status/1792912132406657448">posted on X</a> that it was experiencing an outage on its network, and that it was working to resolve the issue as soon as possible. However. just 12 minutes later, it <a href="https://x.com/CelcomDigi/status/1792915174468301241">published a second post</a> stating that it had fully restored Celcom Internet service. These posts were made at 21:35 and 21:47 local time (13:35 and 13:47) respectively. However, as the graph below shows, traffic volumes had returned to expected levels over an hour earlier, as the observed Internet disruption on Celcom’s network lasted between 18:00 - 20:15 local time (10:00 - 12:15 UTC). (Note that the second disruption shown in the graph below was due to an internal Cloudflare data pipeline issue, and not any sort of problem with Celcom’s network.)</p>
    <div>
      <h3>Starlink</h3>
      <a href="#starlink">
        
      </a>
    </div>
    <p>SpaceX Starlink’s satellite Internet service is unique in that it has an international subscriber base, so outages on its network have a more wide-reaching impact than issues with an ISP that covers a single country. At 01:59 UTC on May 29, <a href="https://radar.cloudflare.com/as14593">Starlink</a> <a href="https://x.com/Starlink/status/1795636172972314730">shared on X</a> that it was currently experiencing a network outage, and that it was actively implementing a solution. Twenty-eight minutes later, it <a href="https://x.com/Starlink/status/1795643144094285883">posted</a> “<i>The network issue has been fully resolved.</i>” This brief outage is visible in the graph below as a slight dip in traffic. However, what is particularly interesting is the spike in traffic to Cloudflare from Starlink’s network following the resolution of the outage. The sharp increase and rapid decline of the traffic curve after service was restored suggests that it may be related to an automated connectivity check of some kind, rather than pent-up user demand for content.</p>
    <div>
      <h3>Chad</h3>
      <a href="#chad">
        
      </a>
    </div>
    <p>A near-complete Internet outage was observed in <a href="https://radar.cloudflare.com/td">Chad</a> on June 5 between 08:15 - 12:00 local time (07:15 - 11:00 UTC), as seen in the graph below. Routing was also impacted, as the number of IPv4 /24 address blocks (256 IPv4 addresses) announced by network providers in the country dropped by as much as 75% during the outage.</p><p>A <a href="https://fr.apanews.net/news/tchad-linternet-coupe-pendant-des-heures/">news item covering the outage</a> noted that only Starlink subscribers retained Internet access during the outage. It also noted that Chad has faced recurring Internet disruptions since 2016, either because of problems with fiber-optic cables, or due to government directed shutdowns in the name of national security. It is unclear what ultimately caused this particular outage.</p>
    <div>
      <h3>India</h3>
      <a href="#india">
        
      </a>
    </div>
    <p>With an <a href="https://www.businessinsider.in/business/telecom/news/reliance-jio-and-airtel-add-nearly-5-million-subscribers-in-january-2024/articleshow/109040220.cms">estimated subscriber base in excess of over 460 million</a>, any Internet disruption affecting <a href="https://radar.cloudflare.com/as55836">Reliance Jio’s network (AS55836)</a> is going to have a widespread impact across India. On June 18, Reliance Jio experienced two disruptions that occurred between 13:15 - 17:15 local time (07:45 - 11:45 UTC). Each disruption lasted less than an hour, and dropped traffic levels to approximately half of those seen at the same time a week prior. <a href="https://www.editorji.com/tech-news/reliance-jio-down-big-outage-disrupts-services-1718706733637">Both mobile and fiber connectivity was affected</a>, and no additional information has been provided by Reliance Jio regarding the root cause of the connectivity issues.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>As we become increasingly dependent on reliable Internet connectivity, we must recognize that that connectivity is itself reliant on a complex and interconnected foundation of physical, technical, and political factors. A failure in any one of these foundational components, whether due to a cable cut, power outage, misconfiguration, or government action, can have a significant impact, disrupting Internet connectivity for millions of users, potentially across multiple countries. While the resilience and reliability of the physical and technical components can be improved through redundancy and best practices, political factors have arguably proven to be the hardest to address. However, organizations like <a href="https://www.accessnow.org/">AccessNow</a>, through their <a href="https://www.accessnow.org/campaign/keepiton/">#KeepItOn</a> campaign, mobilize people, communities, and civil society actors globally to fight against government-directed Internet shutdowns, which can have <a href="https://pulse.internetsociety.org/en/netloss/">significant financial consequences</a>.</p><p>Visit <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for additional insights around Internet disruptions, routing issues, Internet traffic trends, security and attacks, and Internet quality. Follow us on social media at <a href="https://x.com/CloudflareRadar">@CloudflareRadar</a> (X), <a href="https://noc.social/@cloudflareradar">noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or <a>contact us via e-mail</a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">5ka42ShR5MS2QH9vV2Dpn</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Exam-ining recent Internet shutdowns in Syria, Iraq, and Algeria]]></title>
            <link>https://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown/</link>
            <pubDate>Fri, 21 Jun 2024 13:00:02 GMT</pubDate>
            <description><![CDATA[ Similar to actions taken over the last several years, governments in Syria, Iraq, and Algeria have again disrupted Internet connectivity nationwide in an attempt to prevent cheating on exams. We investigate how these disruptions were implemented, and their impact ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The practice of cheating on exams (or at least attempting to) is presumably as old as the concept of exams itself, especially when the results of the exam can have significant consequences for one’s academic future or career. As access to the Internet became more ubiquitous with the growth of mobile connectivity, and communication easier with an assortment of social media and messaging apps, a new avenue for cheating on exams emerged, potentially facilitating the sharing of test materials or answers. <a href="https://www.theguardian.com/technology/2016/may/18/iraq-shuts-down-internet-to-stop-pupils-cheating-in-exams">Over the last decade</a>, some governments have reacted to this perceived risk by taking aggressive action to prevent cheating, ranging from targeted DNS-based blocking/filtering to multi-hour nationwide shutdowns across multi-week exam periods.</p><p>Syria and Iraq are well-known practitioners of the latter approach, and we have covered past exam-related Internet shutdowns in Syria (<a href="/syria-exam-related-internet-shutdowns">2021</a>, <a href="/syria-sudan-algeria-exam-internet-shutdown">2022</a>, <a href="/q2-2023-internet-disruption-summary">2023</a>) and Iraq (<a href="/syria-sudan-algeria-exam-internet-shutdown">2022</a>, <a href="/exam-internet-shutdowns-iraq-algeria">2023</a>) here on the Cloudflare blog. It is now mid-June 2024, and exams in both countries took place over the last several weeks, and with those exams, regular nationwide Internet shutdowns. In addition, Baccalaureate exams also took place in Algeria, and we have written about related Internet disruptions there in the past (<a href="/syria-sudan-algeria-exam-internet-shutdown">2022</a>, <a href="/exam-internet-shutdowns-iraq-algeria">2023</a>). However, in contrast to the single daily shutdowns in Syria and Iraq, the Algerian government opted instead for two multi-hour disruptions each day – one in the morning, one in the afternoon – and appears to be pursuing a content blocking strategy, rather than a full nationwide shutdown.</p><p>As we have done in past year’s posts, we will examine the impact that these shutdowns have on Internet traffic, but also analyze routing information and traffic from other Cloudflare services in an effort to better understand how these shutdowns are being implemented.</p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>The Syrian Telecom Company, to their credit, publishes an exam schedule on social media, with the image below <a href="https://www.facebook.com/photo/?fbid=827972736029921&amp;set=a.449047400589125">published to their Facebook page</a>. The English version was created by applying Google Translate to the image. The schedule shows the date &amp; time of each Internet shutdown (“disconnection”), in addition to the subject(s) of that day’s exam(s). In 2024, exams started on May 26, and went through June 13.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/9lgp9NIpBSo2RWII1nUmh/1331a833433eda16be39e4fda41d3413/Screenshot-2024-06-20-at-1.00.58-PM.png" />
            
            </figure><p>In Syria, <a href="https://radar.cloudflare.com/as29256">AS29256 (Syrian Telecom)</a> is effectively the Internet, as shown <a href="https://radar.cloudflare.com/routing/as29256">in the table below</a>. While there are a few other <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">autonomous systems</a> (ASNs/ASes) registered in Syria, there are only two that currently announce IP address space to the public Internet. As such, the trends seen at a country level for Syria reflect those seen for AS29256, and this is clearly evident in the traffic graphs below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2XEcIEFQPHIKevCJZkVbaM/3be900a49f17d26e90505a2c77704bc0/unnamed--1--2.png" />
            
            </figure><p>Nationwide Internet shutdowns in Syria began on May 26, taking place for varying multi-hour periods from Sunday to Thursday for three consecutive weeks. The graphs below show Internet traffic from the country, as well as AS29256, dropping to zero during the scheduled shutdowns.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6uW4E8cmeiDolFehpOFXaE/113ee0007138f1eccebd2cec87ae2891/image42.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FjHhDRQjGou5kNsIZNzQp/3cb60e3a92c1142f1c483b942db5afa2/image5-3.png" />
            
            </figure><p>In addition, graphs from the Cloudflare Radar <a href="https://radar.cloudflare.com/routing/">Routing</a> pages for <a href="https://radar.cloudflare.com/routing/sy">Syria</a> and <a href="https://radar.cloudflare.com/routing/as29256">AS29256</a> show the number of IPv4 and IPv6 prefixes being announced country-wide and by AS29256 dropping to at or near zero during each shutdown. This ultimately means that there is no Internet path back to systems (IP addresses) connected to Syrian Telecom. Below, we explore why this is important and problematic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5xFTZkPlwMrvEhmn5Tnz42/b7eaffa70e91993663d39a1b5fff9682/image4-4.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1NhFb2khiuAhEJ9Fo8QN19/95f146770a68bf63b87726099eff0143/image47.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3QesstGGtNnaKfBMpRO6GL/f1ea77bb39c751aae45de68096426e00/image15-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7yXJYfsxpfK1mwQs5a2ZLw/b7432284cdd28841c22041eb1d4e323a/image30.png" />
            
            </figure><p>As has been <a href="/syria-sudan-algeria-exam-internet-shutdown">observed in the past</a>, the shutdowns in Syria are <a href="https://x.com/DougMadory/status/1138064496008806400">asymmetrical</a>. That is, traffic can exit the country (via AS29256), but there are no paths for responses to return. The impact of this approach is clearly evident in traffic to <a href="https://one.one.one.one/dns/">Cloudflare’s 1.1.1.1 DNS Resolver</a>. We continue to see traffic to the resolver when the shutdowns take place, and in fact, we see the traffic spike during the shutdowns, as the graph below shows.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2LSn47S6TsjvoLuDx5fKPU/6cc2d335fcbdf706e26887b84d873824/image49.png" />
            
            </figure><p>If we dig into traffic to 1.1.1.1 by protocol, we can see that it is driven by requests over <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/">UDP</a> port 53, the <a href="https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml?&amp;page=2">standard port</a> used for DNS requests over UDP and TCP. (Given the request pattern, that also appears to be the primary way that we see traffic to the resolver from Syria.)</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4CDPlKnjVUF6ViD75S2Zwa/e27da9a43911fd9808bbcadbd097477a/image12-1.png" />
            
            </figure><p>If we remove the UDP line from the graph, we see that request volume for DNS over TCP port 53, as well as <a href="https://developers.cloudflare.com/1.1.1.1/encryption/dns-over-https/">DNS over HTTPS (DoH)</a> and <a href="https://developers.cloudflare.com/1.1.1.1/encryption/dns-over-tls/">DNS over TLS (DoT)</a>, all drops to zero during the shutdowns.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/vWtoXnCHPogP4HfSjm2G5/ea6f8b6fb58f58cff01c70d9ee592f75/image1-18.png" />
            
            </figure><p>Similarly, we can clearly see the shutdowns in HTTP(S) request-based traffic graphs as well, since HTTP(S) is also a TCP-based protocol.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7phbRNoQ9Kg4L1n5F7chjg/572136f844df3879c4486374f5bc5092/image35.png" />
            
            </figure><p>Why do we see this impact? With DNS over UDP, the client simply makes a request to the resolver – no multi-step handshake is involved, as with TCP. So in this case, 1.1.1.1 is receiving these requests, but as shown above, there’s no path for the response to reach the client. Because it hasn’t received a response, the client retries the request, and this flood of retries is manifested as the spike seen in the graphs above.</p><p>However, as we see above, request volume for DNS over TCP, as well as DoH, DoT, and HTTP(S) (which all use TCP), falls to zero during the shutdowns. The lack of a path back to the client means that the <a href="https://www.geeksforgeeks.org/tcp-3-way-handshake-process/">TCP 3-way handshake</a> can’t complete, and thus we don’t see DNS requests over these protocols.</p><p>In looking at 1.1.1.1 Resolver request volume from Syria for popular social media and messaging applications, we can see traffic for facebook.com most closely matches the spikes shown above. Removing facebook.com from the graph, we can also see similar, though more limited, increases for domains used by popular messaging applications WhatsApp, Signal, and Telegram. Facebook and WhatsApp are <a href="https://medialandscapes.org/country/syria/media/social-networks">reportedly</a> the most popular social media and messaging applications in Syria.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7nmo0Zbae88h2VZhbRpd8f/85eaf702c9f638ce544d2b485114aa65/image18.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3gKoz2uKoz2kVIchd0C2vV/7a2a6107c35d3e1433d7d956e0af9fb6/image33.png" />
            
            </figure><p>Although we have focused on the analysis of traffic to Cloudflare’s DNS resolver, and the patterns seen within that traffic, it is also worth highlighting an interesting pattern observed in traffic to Cloudflare’s <a href="https://www.cloudflare.com/application-services/products/dns/">Authoritative DNS</a> platform. (<a href="https://www.cloudflare.com/en-gb/learning/dns/dns-server-types/">DNS resolvers</a> act as a middleman between clients, such as a laptop or phone, and an authoritative DNS server. <a href="https://www.cloudflare.com/en-gb/learning/dns/dns-server-types/">Authoritative DNS servers</a> contain information specific to the domain names they serve, including IP addresses and other types of records.)</p><p>The graph below shows bits/second traffic from Syria for Cloudflare’s <a href="https://www.cloudflare.com/application-services/products/dns/">authoritative DNS service</a> on June 13. (Similar patterns were observed during the other days when shutdowns occurred, but data volume limits the ability to create a graph showing an extended period of time.) In this graph, we can see that at the start of the shutdown (03:00 UTC), traffic rises sharply, effectively plateaus for the duration of the shutdown, and then returns to normal levels. We believe that the traffic pattern illustrated here could be the result of some local resolvers in Syria having the IP addresses for our authoritative DNS servers cached, and are making requests to them. The increased traffic level could be because they are retrying their queries after not receiving responses, but in a less aggressive fashion than the client applications driving the resolver traffic spikes shown above.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fOqZ4ORPIY4znUD1HRb70/06d1cc0e24f13bbb23886eedea3a89a0/unnamed-2.png" />
            
            </figure><p>In summary, Syria appears to be implementing their Internet shutdowns not through filtering, but rather by simply not announcing their IP address space for the duration of the shutdown, thereby preventing any responses from returning to the originating requestor, whether client application, web browser, or local DNS resolver.</p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>On May 19, the Iraqi Ministry of Communication <a href="https://moc.gov.iq/?article=767">posted an update</a> that stated (translated) <i>“The Ministry of Communications would like to note that the Internet service will be cut off for two hours during the general exams for intermediate studies, from six in the morning until eight in the morning, based on higher directives and at the request of the Ministry of Education.”</i> The post came nearly a year after the Iraqi Ministry of Communication <a href="https://www.kurdistan24.net/en/story/31453-Iraq%E2%80%99s-communication-ministry-refuses-to-enforce-internet-blackout-for-final-exams">refused a request from the Ministry of Education to shut down the Internet</a> during the baccalaureate exams as part of efforts to prevent cheating. On May 20, the Iraqi Ministry of Education <a href="https://www.facebook.com/Iraq.Ministry.of.Education/posts/pfbid07ny6LazyvGJED37iCmRkk9h9rNPWeEPtANVu8vaL8gknoaBmwgmVZX9a7LkSbhy2l">posted the schedule</a> for the upcoming set of exams to its Facebook page.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Wb00a9bDq0VYe1zhqFHAR/22aecee54a71bfd430789e976315b040/Screenshot-2024-06-21-at-11.07.18.png" />
            
            </figure><p>Iraq has a much richer network service provider environment than Syria does, with <a href="https://radar.cloudflare.com/routing/iq#a-ses-registered-in-iraq">over 150</a> <a href="https://www.cloudflare.com/en-gb/learning/network-layer/what-is-an-autonomous-system/">autonomous systems (ASNs)</a> registered in the country and announcing IP address space, compared to just <a href="https://radar.cloudflare.com/routing/sy#a-ses-registered-in-syria">two</a> ASNs (both Syrian Telecom) in Syria announcing IP address space. Although traffic in Iraq is generally concentrated among the larger providers, shutdowns are rarely “complete” at a country level because not every autonomous system (network provider) in the country implements a shutdown. (This is due in part to the autonomous Kurdistan region in the north, which often implements similar shutdowns on their own schedule. Network providers in this region are included in Iraq’s country-level graphs.)</p><p>We can see this in a Cloudflare Radar traffic graph that shows the shutdowns at a country level, where traffic is dropping by around 87% during each multi-hour shutdown. In addition to the five networks also shown here (<a href="https://radar.cloudflare.com/as203214">AS203214 (HulumTele)</a>, <a href="https://radar.cloudflare.com/as199739">AS199739 (Earthlink)</a>, <a href="https://radar.cloudflare.com/as58322">AS58322 (Halasat)</a>, <a href="https://radar.cloudflare.com/as51684">AS51684 (Asiacell)</a>, and <a href="https://radar.cloudflare.com/as59588">AS59588 (Zainas)</a>), further analysis finds more than 30 where we observed a complete loss of traffic during the shutdowns, with a number of them downstream of these providers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YkIihynKuDtI63g32YJ0u/3c6f135f0e890145f3b0be6ba6659553/image45.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6W7vWmG8ivneqIJavrTLCU/1b0248818877d395987fca076af52ce6/image28.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ezNpiALAh32m1LyOng14j/ecb5d055692266f0f9c758976204baae/image38.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3bRSpefwBNbcdvMQ2kOkO1/1b072bfd9ffc362923d9a2db06908068/image8-3.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WqSWExs5iBdfDlGTqjXlK/63c853a1b688e0bd4a328881a2b3c280/image22.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5iUNjwfTlp0hz8lqgEnaAV/caf0caa06f14d277ce9a874b0fb9738d/image44.png" />
            
            </figure><p>In contrast to Syria, the changes to announced IP address space during the shutdowns are much less severe in Iraq. Several of the shutdowns are correlated with a drop of ~20-25% in announced IPv4 address space, while a few others saw a drop closer to just 2%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/kAYLZYHK3wnfSh5KNfc33/309f01763d1815a38bf55e1aa42e9725/image51.png" />
            
            </figure><p>At an ASN level, the changes in announced address space were mixed – <a href="https://radar.cloudflare.com/routing/as59588">AS59588 (Zainas)</a>, <a href="https://radar.cloudflare.com/routing/as199739">AS199739 (Earthlink)</a>, and <a href="https://radar.cloudflare.com/routing/as51684">AS51684 (Asiacell)</a> experienced a significant loss, while <a href="https://radar.cloudflare.com/routing/as203214">AS203214 (HulumTele)</a> and <a href="https://radar.cloudflare.com/routing/as58322">AS58322 (Halasat)</a> experienced little to no change.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HoWb2U5b8uBf9aZX5PJAb/e4ae72f055f2f9fd627251769b16d6bd/image13-3.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jJpJYqXgDGeb8So4bMWee/34ba179a6e9fff7b311e057134c34d97/image50.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6sVOgW0xr4mwXUU3id092u/6c198aeb32b840f1142e84ec06822f79/image39.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5H64bnOria4mzCtW7VEs40/178e8f4e060b3be172c97b762c334207/image20.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6k1oSwvj9pwTyHD9OMesEV/a28168e19e0f21ce771166872153c9a4/image24.png" />
            
            </figure><p>Similar to Syria, we can also look at 1.1.1.1 resolver traffic data to better understand how the shutdowns are being implemented. The country-level graphs below suggest that UDP traffic patterns are not visibly changing, suggesting that responses from the resolver are, in fact, getting back to the clients. However, this likely isn’t the case, and such a conclusion is at least in part an artifact of the graph’s time frame and hourly granularity, as well as the inclusion of resolver traffic from Kurdish network providers (ASNs). The shutdowns are more clearly evident in the DNS-over-TCP and DNS-over-HTTPS graphs below, as well as in the graph for HTTP(S) request traffic (both mobile &amp; desktop), which is also TCP-based. In these graphs, the troughs on days that shutdowns occurred generally dip lower than those on the days that the Internet remained available.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/o1NrRFgAMr5FLKa2j4Ktb/b85d5ccf7a9cd7e560229b58130fc91e/image41.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pD02P65uRmaiL73oLzAm9/44ab4e57a7e90ce367e2fc3c3f9e467a/image3-8.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2AscDvWNoxmwWeTGcKyDds/a36e4278a86f651bb75f3a789bb4840b/image27.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/51pfAyJ519aXX0w6KYCm5I/d055dafda12380a3b3b46e748e198ded/image32.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3XlAjHrSgzngJulJRIP36J/b5e8b3058c5441e8dcdff18b347c64e8/image16-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zO7k4idsNJRtohBPYgXhD/676ddfe345adfcab86ea380bdcfa7e54/image43.png" />
            
            </figure><p>In looking at authoritative DNS traffic from Iraq during a shutdown (for June 13 as an example day, as above), we see evidence of a decline in traffic during the time the shutdown occurs.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5LQtyB4CbJBlUjw2PrIBjI/76cdc488ae2d8a0cc46c4441f9ac08ee/image34.png" />
            
            </figure><p>The decline in authoritative DNS traffic is more evident at an ASN level, such as in the graph below for AS203214 (Hulum), effectively confirming that UDP traffic is not getting through here either.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14fZ29LuL3wsJpTnTVbeku/466dd9542998c77af044647e5e3d49ac/image48.png" />
            
            </figure><p>Considering the traffic, 1.1.1.1 Resolver, and authoritative DNS observations reviewed here, it suggests that the Internet shutdowns taking place in Iraq are more complex than Syria’s, as it appears that both UDP and TCP traffic are unable to egress from impacted network providers. As not all impacted network providers are showing a complete loss of announced IP address space during the shutdowns, Iraq is taking a different approach to disrupting Internet connectivity. Although analysis of our data doesn’t provide a definitive conclusion, there are several likely options, and network providers in the country may be combining several. These options revolve around:</p><ol><li><p><b>IP:</b> Block packets from reaching IP addresses. This may be done by withdrawing prefix announcements from the routing table (a brute force approach) or by blocking access to specific IP addresses, such as those associated with a specific application or service (a more surgical approach).</p></li><li><p><b>Connection:</b> Block connections based on <a href="https://www.cloudflare.com/learning/ssl/what-is-sni/">SNI</a>/HTTP headers, or other application data. If a network or on-path device is able to observe the server name (or other relevant headers/data), then the connection can be terminated.</p></li><li><p><b>DNS:</b> Operators of private or ‘internal’ DNS resolvers, offered by ISPs and enterprise environments for use by their own users, can apply content restrictions, blocking the resolution of hostnames associated with websites and other applications.</p></li></ol><p>The consequences of these options are covered in more detail <a href="/consequences-of-ip-blocking">in a blog post</a>. In addition, applying them at common network chokepoints, such as <a href="https://iraqixp.com/">AS212330 (IRAQIXP)</a> or <a href="https://radar.cloudflare.com/routing/as208293">AS208293</a> (<a href="https://alsalam.gov.iq/">AlSalam State Company</a>, associated with the Iraqi Ministry of Communications), can disrupt connectivity at multiple downstream ISPs, without those providers necessarily having to take action themselves.</p>
    <div>
      <h3>Algeria</h3>
      <a href="#algeria">
        
      </a>
    </div>
    <p>As we noted in blog posts in <a href="/syria-sudan-algeria-exam-internet-shutdown">2022</a> and <a href="/exam-internet-shutdowns-iraq-algeria">2023</a>, Algeria has a history of disrupting Internet connectivity during Baccalaureate exams. This has been taking place since <a href="https://www.bbc.com/news/world-africa-44557028">2018</a>, following widespread cheating in 2016 that saw questions leaked online both before and during tests. On March 13, the Algerian Ministry of Education <a href="https://www.aps.dz/en/health-science-technology/51394-ministry-of-education-announces-dates-for-middle-school-and-high-school-final-exams">announced</a> that the Baccalaureate exams would be held June 9-13. As expected, Internet disruptions were observed both country-wide and at a network level. Similar to previous years, two disruptions were observed each day. The first one began at 08:00 local time (07:00 UTC), and except for June 9, lasted three hours, ending at 11:00 local time (10:00 UTC). (On June 9, it lasted until 13:00 local time (12:00 UTC).) The second one began between 14:00-14:30 local time (13:00-13:30 UTC), and lasted until 16:00-17:00 local time (15:00-16:00 UTC) – the end time varied by day.</p><p>As seen in the graphs below, the impact to traffic was fairly nominal, suggesting that wide scale Internet shutdowns similar to those seen in Syria were not being implemented. While this is in line with 2023’s <a href="https://x.com/TheAlgiersPost/status/1535917324485656576">pronouncement</a> by the Minister of Education that there would be no Internet shutdown on exam days, <a href="https://x.com/search?f=live&amp;q=algeria%20exam%20until%3A2024-06-13%20since%3A2024-06-09&amp;src=typed_query">a number of posts on X</a> complained of broader cuts to Internet connectivity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5b4bFM6GwqaslpXJNGxCSu/063e3729ef3197b88dfe367cc91fc0f4/image14-2.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5I0HpVYB36DNHhycNbRUjp/ecc17427d720b5ca90ed554946924dfc/image17.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1pOO1TV09EyRfv5hRlV3sX/950600eac0cd068804f2ce990e93e112/image25.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1brvTsdkG8vlUDB7CNQ6vL/2c4ba312f499adc4893fb8afa5378ca6/image2-6.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4mOPVdahSJQ0n6gzs7cGSL/86fa9d9e06718da3fa7a291c055773b3/image37.png" />
            
            </figure><p>Similar to the analysis above of the shutdowns in Syria and Iraq, we can also review changes to announced IP address space to better understand how connectivity was being disrupted. In this case, as the graphs below show, no meaningful changes to announced IPv4 address space were observed during the days the Baccalaureate exams were given. As such, the observed drops in traffic were not caused by routing changes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7l6qUEMRcrdvShbzdd8y5I/5696832adbe82ab92cef0265df11bdc9/image52.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3gEPeuP0l9czg2nipM8Jjb/8f49d22da1c031d1db5ed2577ec8462f/image21.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6m0XeCwN3lYLot6AutTNaS/7b0034f1106d4e99eaaec28b1cd8e9a5/image6-3.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3oiRlajqzZGBY5Io0dbXkj/234f0120c0002f7ffcf69b6a8bbe0038/image40.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Kv6LndNtCYpsJUhUPF8UT/ae8359550b84298abd5d0994b475cd76/AD_4nXdmsCY4R4OwP5lh6E6PgQdXYDxwUTWl8o5A-sRdNCSBmRNe0Zq7-OlWczYH8tr8q75P8WLqOsd3Po-03gykFfJDJNgqXcOkX4i3KuVp73q1GW7aLXeTNAzkK7yU" />
            
            </figure><p>In the HTTP(S) request traffic graph below, the twice-daily disruptions are highlighted, with the morning one appearing as a nominal drop in traffic, and the afternoon one causing a more severe decline. (The graph shows request traffic aggregated at a country level, but the graphs for the ASNs listed above also show similar patterns.)</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7afFEaI4r2fREfV0o54f2/68f9fe97d63624a99e0868d0de5df096/image19.png" />
            
            </figure><p>In addition, similar patterns are observed in 1.1.1.1 resolver traffic at a country and ASN level, but only for DNS over TCP, DNS over TLS, and DNS over HTTPS, all of which leverage TCP. In the graph below showing only resolver traffic over UDP, there’s no clear evidence of disruptions. However, in the graph that shows resolver traffic over HTTPS, TCP, and TLS, a slight perturbation is visible in the morning, as traffic begins to rise for the day, and a sharper decrease is visible in the afternoon, with both disruptions aligning with the twice daily drops in traffic discussed above.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ydmjTs8hCqfZ4W969jSSy/4120e9a30b2c0c2015c6f097c1f8ee8b/image31.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qSu9orpg29sE5T2cawABq/1ec368088682d0f3d34f1287b3ed7d03/image7-2.png" />
            
            </figure><p>These observations support the conjecture that the Algerian government is likely taking a more nuanced approach to restricting access to content, interfering in some fashion with TCP-based traffic. The conjecture is also supported by an internal tool that helps to understand connection tampering that is based on research co-designed and developed by members of the <a href="https://research.cloudflare.com/">Cloudflare Research</a> team. We will be launching insights into TCP connection tampering on Cloudflare Radar later in 2024 and, in the meantime, technical details can be found in the peer-reviewed paper titled <a href="https://research.cloudflare.com/publications/SundaraRaman2023/">Global, Passive Detection of Connection Tampering</a>.</p><p>The graph below, taken from the internal tool, highlights observed TCP connection tampering in connections from Algeria during the week that the Baccalaureate exams took place. While some baseline level of post-ACK and post-PSH tampering is consistently visible, we see significant increases in post-ACK twice a day during the exam period, at the times that align with the shifts in traffic discussed above. Technical descriptions of post-ACK and post-PSH tampering can be found in the <a href="https://developers.cloudflare.com/radar/glossary/#tcp-resets-and-timeouts">Cloudflare Radar glossary</a>, but in short, tampering post-ACK means an established TCP connection to Cloudflare’s server has been abruptly ended by one or more RST packets <i>before</i> the server sees data packets. Although clients do use RSTs, clients are more likely to close connections with a FIN (as specified by the <a href="https://datatracker.ietf.org/doc/html/rfc9293">RFC</a>). The RST method can also be used by middleboxes that  (i) sees the data packet, then (ii) drops the data packet, then (iii) sends an RST to the server to force the server to close the connection (and very likely another RST to the client too for the same reason). Tampering post-PSH means that something on the path, like a middlebox, (i) saw something it didn't like on an established connection, then (ii) permitted the data to pass but then, (iii) it sends the RST to force endpoints to close the connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/75i4amnWWtCkUaMhftCllH/a612735891aef71331339b9164171d48/image11-1.png" />
            
            </figure><p>Looking beyond Cloudflare-sourced data, aggregated test results from the <a href="https://ooni.org/">Open Observatory of Network Interference (OONI)</a> also show evidence of anomalous behavior. Using <a href="https://ooni.org/install/">OONI Probe</a>, a mobile and desktop app, can probe for potential blocking of websites, instant messaging apps, and censorship circumvention tools. Examining test results from users in Algeria for popular messaging platforms <a href="https://explorer.ooni.org/chart/mat?probe_cc=DZ&amp;since=2024-06-01&amp;until=2024-06-15&amp;time_grain=day&amp;axis_x=measurement_start_day&amp;test_name=whatsapp">WhatsApp</a>, <a href="https://explorer.ooni.org/chart/mat?probe_cc=DZ&amp;since=2024-06-01&amp;until=2024-06-15&amp;time_grain=day&amp;axis_x=measurement_start_day&amp;test_name=telegram">Telegram</a>, <a href="https://explorer.ooni.org/chart/mat?probe_cc=DZ&amp;since=2024-06-01&amp;until=2024-06-15&amp;time_grain=day&amp;axis_x=measurement_start_day&amp;test_name=signal">Signal</a>, and <a href="https://explorer.ooni.org/chart/mat?probe_cc=DZ&amp;since=2024-06-01&amp;until=2024-06-15&amp;time_grain=day&amp;axis_x=measurement_start_day&amp;test_name=facebook_messenger">Facebook Messenger</a> for the first two weeks of June, we clearly see the appearance of test results marked as “Anomaly” starting on June 9. (OONI defines “Anomaly” results as “<i>Measurements that provided signs of potential blocking</i>”.) OONI <a href="https://ooni.org/nettest/tor/">Tor test</a> <a href="https://explorer.ooni.org/chart/mat?probe_cc=DZ&amp;since=2024-06-01&amp;until=2024-06-20&amp;time_grain=day&amp;axis_x=measurement_start_day&amp;test_name=tor">results</a> also show a similar “Anomaly” pattern. Anomalous traffic patterns are also visible for <a href="https://transparencyreport.google.com/traffic/overview?hl=en&amp;fraction_traffic=start:1717200000000;product:19;region:DZ;end:1718495999999&amp;lu=fraction_traffic">Google Web Search</a>, <a href="https://transparencyreport.google.com/traffic/overview?hl=en&amp;fraction_traffic=start:1717200000000;product:21;region:DZ;end:1718495999999&amp;lu=fraction_traffic">YouTube</a>, and <a href="https://transparencyreport.google.com/traffic/overview?hl=en&amp;fraction_traffic=start:1717200000000;product:6;region:DZ;end:1718495999999&amp;lu=fraction_traffic">GMail</a>.</p><p>Although the analysis of these observations and data sets doesn’t provide us with specific details around exactly how the observed Internet disruptions are being implemented, it strongly supports the supposition that network providers in Algeria are, in some fashion, interfering with TCP connections, but not blocking them outright nor shutting down their networks completely. Given that popular messaging platforms, Google properties, Cloudflare’s 1.1.1.1 DNS resolver, and some number of Cloudflare customer sites all appear to be impacted, it suggests that a list of hostnames are being targeted for disruption/interference, <a href="/consequences-of-ip-blocking">either by the SNI or the destination IP address</a>.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Perhaps recognizing the broad negative impact that brute-force nationwide Internet shutdowns have as a response to cheating on exams, some governments appear to be turning to more nuanced techniques, such as content blocking or connection tampering. However, because these are widely applied as well, they are arguably just as disruptive as a full nationwide Internet shutdown. The cause of full shutdowns, such as those seen in Syria, are arguably easier to diagnose than the disruptions to connectivity seen in Iraq and Algeria, which appear to use approaches that are hard to specifically identify from the outside.</p><p>Visit <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for additional insights around these, and other, Internet disruptions. Follow us on social media at <a href="https://x.com/CloudflareRadar">@CloudflareRadar</a> (X), <a href="https://noc.social/@cloudflareradar">noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or contact us via email.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[BGP]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">7I3aMukuPURTotjQ1Njiei</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Q1 2024 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q1-2024-internet-disruption-summary/</link>
            <pubDate>Mon, 29 Apr 2024 13:00:09 GMT</pubDate>
            <description><![CDATA[ The first quarter of 2024 kicked off with quite a few Internet disruptions. Perhaps most interestingly, RPKI, DNS, and DNSSEC issues were among the technical problems that disrupted connectivity for subscribers across multiple network providers ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6k1NK6vOkPAt8lFkq7iKEQ/3e38a7a4846ea723b9227e974d91600b/image1-21.png" />
            
            </figure><p>Cloudflare’s network spans more than 310 cities in over 120 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions. Thanks to recently released Cloudflare Radar <a href="https://developers.cloudflare.com/radar/glossary/#bgp-announcements">functionality</a>, this quarter we have started to explore the impact from a routing perspective, as well as a traffic perspective, at both a <a href="https://twitter.com/CloudflareRadar/status/1768654743742579059">network</a> and <a href="https://twitter.com/CloudflareRadar/status/1773704264650543416">location</a> level.</p><p>The first quarter of 2024 kicked off with quite a few Internet disruptions. <a href="#cablecuts">Damage to both terrestrial and submarine cables</a> caused problems in a number of locations, while <a href="#militaryaction">military action</a> related to ongoing geopolitical conflicts impacted connectivity in other areas. <a href="#governmentdirected">Governments</a> in several African countries, as well as Pakistan, ordered Internet shutdowns, focusing heavily on mobile connectivity. Malicious actors known as <a href="https://www.cloudflare.com/learning/ddos/glossary/anonymous-sudan/">Anonymous Suda</a>n claimed responsibility for <a href="#cyberattacks">cyberattacks</a> that disrupted Internet connectivity in Israel and Bahrain. <a href="#maintenance">Maintenance</a> and <a href="#poweroutages">power outages</a> forced users offline, resulting in observed drops in traffic. And in a more unusual turn, <a href="#orangeespana">RPKI</a>, <a href="#plusnetuk">DNS</a>, and <a href="#russia">DNSSEC</a> issues were among the <a href="#technicalproblems">technical problems</a> that disrupted connectivity for subscribers across multiple network providers.</p><p>As we have noted in the past, this post is intended as a summary overview of observed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter.</p><h2>Cable cuts</h2>
    <div>
      <h3>Moov Africa Tchad</h3>
      <a href="#moov-africa-tchad">
        
      </a>
    </div>
    <p>Reported fiber optic cable damage that occurred in <a href="https://radar.cloudflare.com/cm">Cameroon</a> on January 10 further disrupted connectivity for customers of <a href="https://radar.cloudflare.com/as327802">AS327802 (Moov Africa Tchad / Millicom)</a> a telecommunications provider in Chad. According to a (translated) <a href="https://www.facebook.com/moovafrica.td/posts/pfbid0kB9W5CkhVJqBq34agPWqG81yeCfLBijKYc6WiLDKLE79nPmhie4T9idZVStc8f6Xl">Facebook post from Moov Africa Tchad</a>, “<i>On the afternoon of January 10, 2024, there was a breakdown of the internet due to a cut in the optical fiber coming from Cameroon through which Chad has access to the internet, the one coming from Sudan being unavailable for a while.</i>” It is unclear whether the referenced cable cut occurred in Cameroon or Chad, and the mentioned <a href="https://radar.cloudflare.com/sd">Sudan</a> cable issue may be <a href="/q4-2023-internet-disruption-summary#:~:text=of%20Internet%20service.-,Chad,-On">the one covered in our Q4 2023 summary post</a>. As a landlocked country, Chad is dependent on terrestrial Internet connections to/through neighboring countries, and the <a href="https://afterfibre.nsrc.org/">AfTerFibre cable map</a> illustrates Chad’s reliance on limited cable paths through Cameroon and Sudan.</p><p>The graphs below show that Moov Africa Tchad traffic was disrupted for over 12 hours starting midday (UTC) on January 10, and the disruption was visible at a country level as well. The fiber cut also resulted in significant volatility from a routing perspective, as the volume of announced IPv4 address space shifted frequently at a <a href="https://radar.cloudflare.com/routing/as327802?dateStart=2024-01-10&amp;dateEnd=2024-01-11">network</a> and <a href="https://radar.cloudflare.com/routing/td?dateStart=2024-01-10&amp;dateEnd=2024-01-11">country</a> level during the disruption.</p><p>A second less severe disruption was also observed during the morning (UTC) of January 11. That disruption was <a href="https://twitter.com/DarkWebDispatch/status/1745080174519923165">reportedly</a> due to an <a href="https://crisis24.garda.com/alerts/2024/01/chad-residual-internet-service-disruptions-possible-over-coming-hours-following-hours-long-outage-across-country-jan-10">alleged cyberattack</a> by Anonymous Sudan that targeted <a href="https://radar.cloudflare.com/as328594">AS328594 (SudaChad Telecom)</a>, which is an <a href="https://radar.cloudflare.com/routing/as327802">upstream provider for Moov Africa Tchad</a>.</p>
    <div>
      <h3>Orange Burkina Faso</h3>
      <a href="#orange-burkina-faso">
        
      </a>
    </div>
    <p>On February 15, a brief (~30 minute) but complete significant Internet disruption was observed at <a href="https://radar.cloudflare.com/as37577">AS37577 (Orange Burkina Faso)</a>. According to the translation of a communiqué <a href="https://twitter.com/OrangeBurkina/status/1758179417065464103">posted by the provider on social media</a>, “<i>The incident is due to a fiber cut, which causes a disruption of Internet services for certain customers.</i>” Orange did not specify whether it was a more localized fiber cut, or damage to one of the terrestrial fibers that cross the country. The incident took the network completely offline, as the ASN’s amount of announced IPv4 address space <a href="https://radar.cloudflare.com/routing/as37577?dateStart=2024-02-15&amp;dateEnd=2024-02-15">dropped to zero</a> for the duration.</p>
    <div>
      <h3>MTN Nigeria</h3>
      <a href="#mtn-nigeria">
        
      </a>
    </div>
    <p><a href="https://twitter.com/MTNNG/status/1762909655620063594">MTN Nigeria turned to social media</a> on February 28 to let customers know that “<i>You have been experiencing challenges connecting to the network due to a major service outage caused by multiple fibre cuts, affecting voice and data services.</i>” A <a href="https://crisis24.garda.com/alerts/2024/02/nigeria-lingering-internet-and-telecommunications-disruptions-likely-in-areas-across-country-following-nationwide-outage-feb-28">published report</a> described the impact, noting “<i>Millions of customers nationwide were impacted by the hours-long outage, especially in Lagos.</i>” Connectivity was disrupted for approximately seven hours between 13:30 - 20:30 local time (12:30 - 19:30 UTC), and the provider <a href="https://twitter.com/MTNNG/status/1762972229195702692">posted a followup note</a> just before midnight local time stating that service had been fully restored.</p>
    <div>
      <h3>Digicel Haiti</h3>
      <a href="#digicel-haiti">
        
      </a>
    </div>
    <p>A 16-hour Internet disruption on March 2/3 at <a href="https://radar.cloudflare.com/as27653">AS27653 (Digicel Haiti)</a> was due to a double fiber cut <a href="https://www.reuters.com/world/americas/haitian-police-unions-plead-help-after-attack-main-prison-2024-03-03/">as a result of violence</a> related to attempts to oust Prime Minister Ariel Henry. Starting around 22:00 local time on March 2 (03:00 on March 3), a complete outage was observed for approximately nine hours. Some recovery in traffic occurred for approximately two-and-a-half hours, followed by a three hour near-complete disruption. Digicel Haiti effectively disappeared from the Internet during the nine-hour outage, as no IPv4 or IPv6 address space was announced by the network during that time.</p>
    <div>
      <h3>SKY (Philippines)</h3>
      <a href="#sky-philippines">
        
      </a>
    </div>
    <p>A brief traffic disruption observed on <a href="https://radar.cloudflare.com/as23944">AS23944 (SKY)</a> in the <a href="https://radar.cloudflare.com/ph">Philippines</a> on March 18 was likely related to a fiber cut. In an <a href="https://twitter.com/SKYserves/status/1769688520124227960">advisory posted by SKY</a> on social media, they stated that “<i>SKY services in several areas in Marikina, Pasig and Quezon City are currently affected by a cut-fiber issue</i>”, listing 45 affected areas. Traffic was most significantly impacted between 20:00 - 21:00 local time (12:00 - 13:00 UTC), although full recovery took several more hours. Only a <a href="https://radar.cloudflare.com/routing/as23944?dateStart=2024-03-18&amp;dateEnd=2024-03-18">minor impact to routing</a> resulting from the fiber cut was observed.</p>
    <div>
      <h3>Multiple African countries</h3>
      <a href="#multiple-african-countries">
        
      </a>
    </div>
    <p>On March 14, damage to multiple submarine cables off the west coast of Africa impacted Internet connectivity across multiple countries in West and Southern Africa. The damage was <a href="https://www.itweb.co.za/article/news-analysis-why-undersea-cables-broke-sas-public-cloud/G98Yd7LGK4pvX2PD">reportedly</a> caused by underwater rock falls, and in addition to disrupting Internet connectivity, also <a href="https://web.archive.org/web/20240314144626/https://status.cloud.microsoft/">caused availability issues for Microsoft Azure and Office 365 cloud services</a>.</p><p>The <a href="https://www.submarinecablemap.com/submarine-cable/africa-coast-to-europe-ace">Africa Coast to Europe (ACE)</a>, <a href="https://www.submarinecablemap.com/submarine-cable/sat-3wasc">Submarine Atlantic 3/West Africa Submarine Cable (SAT-3/WASC)</a>, <a href="https://www.submarinecablemap.com/submarine-cable/west-africa-cable-system-wacs">West Africa Cable System (WACS)</a>, and <a href="https://www.submarinecablemap.com/submarine-cable/mainone">MainOne</a> cables <a href="https://www.internetsociety.org/resources/doc/2024/2024-west-africa-submarine-cable-outage-report/">were all damaged</a>, and impacted 13 African countries including <a href="https://radar.cloudflare.com/bj">Benin</a>, <a href="https://radar.cloudflare.com/bf">Burkina Faso</a>, <a href="https://radar.cloudflare.com/cm">Cameroon</a>, <a href="https://radar.cloudflare.com/ci">Côte d’Ivoire</a>, <a href="https://radar.cloudflare.com/gm">Gambia</a>, <a href="https://radar.cloudflare.com/gh">Ghana</a>, <a href="https://radar.cloudflare.com/gn">Guinea</a>, <a href="https://radar.cloudflare.com/lr">Liberia</a>, <a href="https://radar.cloudflare.com/na">Namibia</a>, <a href="http://radar.cloudflare.com/ne">Niger</a>, <a href="https://radar.cloudflare.com/ng">Nigeria</a>, <a href="https://radar.cloudflare.com/za">South Africa</a>, and <a href="https://radar.cloudflare.com/tg">Togo</a>.</p><p>Comparatively brief disruptions were observed in <a href="https://radar.cloudflare.com/ne?dateStart=2024-03-14&amp;dateEnd=2024-03-14">Niger</a>, <a href="https://radar.cloudflare.com/traffic/gn?dateStart=2024-03-14&amp;dateEnd=2024-03-14">Guinea</a>, and <a href="https://radar.cloudflare.com/traffic/gm?dateStart=2024-03-14&amp;dateEnd=2024-03-14">Gambia</a>, lasting from under an hour to approximately two hours.</p><p>However, the disruptions stretched out across multiple days in countries including <a href="https://radar.cloudflare.com/traffic/tg?dateStart=2024-03-11&amp;dateEnd=2024-03-17">Togo</a>, <a href="https://radar.cloudflare.com/traffic/lr?dateStart=2024-03-11&amp;dateEnd=2024-03-17">Liberia</a>, and <a href="https://radar.cloudflare.com/traffic/gh?dateStart=2024-03-11&amp;dateEnd=2024-03-31">Ghana</a>, where it took several weeks for traffic to return to previously observed peak levels.</p><p>Operators in impacted countries attempted to maintain availability by shifting traffic to Google’s <a href="https://www.submarinecablemap.com/submarine-cable/equiano">Equiano</a> submarine cable, which <a href="https://www.capacitymedia.com/article/2czls1jc2s3jtornuuhvk/news/exclusive-equianos-togo-landing-station-sees-4x-increase-in-traffic">reportedly</a> experienced a 4x increase in traffic, and <a href="https://www.moroccoworldnews.com/2024/03/361490/west-africa-internet-outage-highlights-moroccos-crucial-role-in-regional-connectivity">Morocco’s</a> <a href="https://www.submarinecablemap.com/submarine-cable/maroc-telecom-west-africa">Maroc Telecom West Africa</a> submarine cable. Service on the <a href="https://www.linkedin.com/posts/philippe-devaux-218423199_08apr24-west-africa-multiple-cables-outages-activity-7183050367440441344-iyTI?utm_source=share&amp;utm_medium=member_desktop">SAT-3</a> cable was fully restored as of April 6, with repairs on <a href="https://www.linkedin.com/posts/philippe-devaux-218423199_wacsabrcable-sat3abrcable-activity-7187430036432408576-404i?utm_source=share&amp;utm_medium=member_desktop">ACE</a> completed on April 17, repairs to <a href="https://www.linkedin.com/feed/update/urn:li:activity:7187430036432408576/">WACS</a> and <a href="https://www.linkedin.com/posts/philippe-devaux-218423199_wacsabrcable-sat3abrcable-activity-7185980538434801664-dfa3?utm_source=share&amp;utm_medium=member_desktop">MainOne</a> expected to be done by April 28.</p><p>Additional details and observations can be found in our blog post <a href="/undersea-cable-failures-cause-internet-disruptions-across-africa-march-14-2024/"><i>Undersea cable failures cause Internet disruptions for multiple African countries</i></a>.</p>
    <div>
      <h3>Red Sea</h3>
      <a href="#red-sea">
        
      </a>
    </div>
    <p>On February 24, three submarine cables that run through the Red Sea were damaged: the <a href="https://www.submarinecablemap.com/submarine-cable/seacomtata-tgn-eurasia">Seacom/Tata cable</a>, the <a href="https://www.submarinecablemap.com/submarine-cable/asia-africa-europe-1-aae-1">Asia Africa Europe-1</a> (AAE-1), and the <a href="https://www.submarinecablemap.com/submarine-cable/europe-india-gateway-eig">Europe India Gateway</a> (EIG). It is <a href="https://www.bloomberg.com/news/articles/2024-03-06/anchor-from-houthi-sunk-ship-likely-damaged-undersea-cables">believed</a> that the cables were cut by the anchor of the <a href="https://www.wired.com/story/houthi-internet-cables-ship-anchor-path/">Rubymar</a>, a cargo ship that was damaged by a ballistic missile on February 18. At the time of the disruption, Seacom <a href="https://www.itweb.co.za/article/seacom-confirms-cable-outage-in-red-sea/KPNG8v8NyDNM4mwD">confirmed</a> the damage to their cable, while the owners of the other two cables did not publish similar confirmations.</p><p>While the cable cuts <a href="https://www.wired.com/story/houthi-internet-cables-ship-anchor-path/#:~:text=impacted%20countries%20in%20East%20Africa">reportedly</a> impacted countries in East Africa, including <a href="https://radar.cloudflare.com/traffic/tz?dateStart=2024-02-22&amp;dateEnd=2024-02-28">Tanzania</a>, <a href="https://radar.cloudflare.com/traffic/ke?dateStart=2024-02-22&amp;dateEnd=2024-02-28">Kenya</a>, <a href="https://radar.cloudflare.com/traffic/ug?dateStart=2024-02-22&amp;dateEnd=2024-02-28">Uganda</a>, and <a href="https://radar.cloudflare.com/traffic/mz?dateStart=2024-02-22&amp;dateEnd=2024-02-28">Mozambique</a>, no loss of traffic was observed across these countries in <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>.</p><h2>Military action</h2>
    <div>
      <h3>Sudan</h3>
      <a href="#sudan">
        
      </a>
    </div>
    <p>On February 2, Cloudflare observed a loss of traffic at <a href="https://radar.cloudflare.com/as15706">AS15706 (Sudatel)</a> and <a href="https://radar.cloudflare.com/as36972">AS36972 (MTN Sudan)</a>, with a similar loss occurring on February 7 at <a href="https://radar.cloudflare.com/as36998">AS36998 (Zain Sudan / SDN Mobitel)</a>. The disruption at MTN Sudan aligns with a <a href="https://twitter.com/MTNSudan1/status/1753528636949274956">social media post</a> from the provider, in which they stated (translated) “<i>We regret the interruption of all services due to circumstances beyond our control. While we apologize for the inconvenience caused by this interruption, we assure you of our endeavor to restore the service as soon as possible, and you will be notified of the return of the service.</i>” On February 5, several days after their outage started, Zain Sudan published a <a href="https://twitter.com/ZainSudan/status/1754487740102533170">social media post</a> that stated (translated) “<i>Zain Sudan has been constantly striving to maintain communication and Internet service to serve its valued subscribers, and we would like to point out that the current network outage is due to circumstances beyond its control, with our hopes that safety will prevail, and that service will be restored as soon as possible.</i>” Sudatel did not share any information about the status of its network. On February 4, Digital Rights Lab - Sudan <a href="https://twitter.com/drlab_sudan/status/1754134933772128326">posted on social media</a> that “<i>Our sources confirmed that</i> <a href="https://twitter.com/RSFSudan"><i>@RSFSudan</i></a> <i>forces tookover data centers of ISPs in Khartoum, #Sudan.</i>” It is likely that the Internet outages observed across these providers are related to these takeovers, part of the <a href="https://www.cfr.org/global-conflict-tracker/conflict/power-struggle-sudan">military conflict that has been underway in the country</a> since April 15, 2023.</p><p>The disruptions on these networks varied in length. At Sudatel, traffic started to return on February 11. At Zain Sudan, traffic began to return on March 3, corroborated by a <a href="https://twitter.com/ZainSudan/status/1764217865530376300">social media post</a> that stated (translated) “<i>Zain network is gradually returning to work and allows its subscribers to communicate for free for a limited time. Zain promises to continue working to restore its network in the rest of the states.</i>” Traffic had not yet returned on MTN Sudan by the end of the first quarter.</p>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>In February, the Ukraine/Russia war reached the two-year mark, and over that time, we have covered a number of Internet outages in Ukraine caused by conflict-related attacks. On February 22, <a href="https://therecord.media/massive-missile-russian-barrage-internet-outages-blackouts">Russian air strikes on critical infrastructure in Ukraine</a> damaged energy facilities across the country, resulting in widespread power outages. These power outages caused Internet disruptions across multiple regions in Ukraine, including Kharkiv, Zaporizhzhia, Odessa, Dnipropetrovsk Oblast, and Khmelnytskyi Oblast. Traffic initially dropped around 05:00 local time (03:00 UTC), falling as much as 68% in Kharkiv. However, all regions saw lower traffic levels for several days as compared to the week before.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/TBMLgZ73lfMRAB4Jpey7d/222ffab926e47c66ce043ab3fda388b4/Mar-22---Ukraine---Kharkiv.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/VQ0RIhitP3TNnn3pkVtT2/fcbd02cae5fb89c3737bf3bf0309eec4/Mar-22---Ukraine---Khmel.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4s3Twlv8ycp3hRwoTfq7Vd/244fdea99065f2ecf3072ccb2f0d7cb7/Mar-22---Ukraine---Dnipro.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2LDrhWYS0DOwOYd93MRiJH/70f2cf5561ae703f40581303feb058ca/Mar-22---Ukraine---Odessa.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Ej2ZJcMsl0b4pSzOJZYHI/fdd67fe3d9fb0d6caadc0cce0b2f9e17/Mar-22---Ukraine---Zap.png" />
            
            </figure>
    <div>
      <h3>Gaza Strip</h3>
      <a href="#gaza-strip">
        
      </a>
    </div>
    <p>In our <a href="/q4-2023-internet-disruption-summary"><i>Q4 2023 Internet disruption summary</i></a> blog post, we <a href="/q4-2023-internet-disruption-summary#:~:text=In%20addition%20to%20the%20outages%20illustrated%20above">noted that</a> throughout October, November, and December, <a href="https://paltel.ps/en/home">Paltel (Palestine Telecommunications Company)</a> had published several social media posts about disruptions to its landline, mobile, and Internet services. During the first quarter of 2024, similar outages were observed on <a href="https://twitter.com/Paltelco/status/1745813735627727091">January 12</a>, <a href="https://twitter.com/Paltelco/status/1749464176756449631">January 22</a>, and <a href="https://twitter.com/QudsNen/status/1765100306353017128">March 5</a>. Paltel attributes these outages to the ongoing aggression related to the war with Israel.</p><p>The associated outages during the quarter varied in length, from just a few hours to over a week. Each outage is shown in the graphs below, which show Paltel traffic within four Palestinian governorates in the Gaza Strip region. While it appears that the Gaza governorate suffered a disruption to traffic as connectivity remained available, complete outages occurred in the Khan Yunis, Rafah, and Deir al-Balah governorates.</p><p><b>January 12-19</b></p><figure>
    <table>
        <colgroup>
            <col></col>
            <col></col>
        </colgroup>
        <tbody>
            <tr>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/3awubGpVqUX91wiBfu72l8/b0f6d073446e830b304fb1e80f14d963/Jan_12-19_-_Gaza_-_Gaza.png"><img src="https://images.ctfassets.net/slt3lc6tev37/3awubGpVqUX91wiBfu72l8/b0f6d073446e830b304fb1e80f14d963/Jan_12-19_-_Gaza_-_Gaza.png" /></a></figure>
                </td>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/1yxGzVFOk0gVLyZtje7gnw/e188aa8a748e5fe73218cc98950a22a5/Jan_12-19_-_Gaza_-_Khan_Yunis.png"><img src="https://images.ctfassets.net/slt3lc6tev37/1yxGzVFOk0gVLyZtje7gnw/e188aa8a748e5fe73218cc98950a22a5/Jan_12-19_-_Gaza_-_Khan_Yunis.png" /></a></figure>
                </td>
            </tr>
            <tr>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/3ZCHTnNigLCapNMRp6Du9R/17600648639a68925b04ee3158f4384b/Jan_12-19_-_Gaza_-_Rafah.png"><img src="https://images.ctfassets.net/slt3lc6tev37/3ZCHTnNigLCapNMRp6Du9R/17600648639a68925b04ee3158f4384b/Jan_12-19_-_Gaza_-_Rafah.png" /></a></figure>
                </td>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/2dy1u4WsydG2TtEaBFmOPF/07ea2b4e3c94c3fa4afbdbc8771a1aa8/Jan_12-19_-_Gaza_-_Deir_al-Balah.png"><img src="https://images.ctfassets.net/slt3lc6tev37/2dy1u4WsydG2TtEaBFmOPF/07ea2b4e3c94c3fa4afbdbc8771a1aa8/Jan_12-19_-_Gaza_-_Deir_al-Balah.png" /></a></figure>
                </td>
            </tr>
        </tbody>
    </table>
</figure><p><b>January 22-24</b></p><figure>
    <table>
        <colgroup>
            <col></col>
            <col></col>
        </colgroup>
        <tbody>
            <tr>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/4csFWELPuqnSc6nVcpYc5K/a250d1fd1d71cd547bb9b1100ece5a79/Jan_22-24_-_Gaza_-_Gaza.png"><img src="https://images.ctfassets.net/slt3lc6tev37/4csFWELPuqnSc6nVcpYc5K/a250d1fd1d71cd547bb9b1100ece5a79/Jan_22-24_-_Gaza_-_Gaza.png" /></a></figure>
                </td>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/2ogmrVWjlFTErdAmNUSGCr/1c109227deb6863c52b3e447d8b6a6c5/Jan_22-24_-_Gaza_-_Khan_Yunis.png"><img src="https://images.ctfassets.net/slt3lc6tev37/2ogmrVWjlFTErdAmNUSGCr/1c109227deb6863c52b3e447d8b6a6c5/Jan_22-24_-_Gaza_-_Khan_Yunis.png" /></a></figure>
                </td>
            </tr>
            <tr>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/2wINE0xDB1VPPf9fcG3Gcd/203de374fad17372fa68cd2c7ac5dde9/Jan_22-24_-_Gaza_-_Rafah.png"><img src="https://images.ctfassets.net/slt3lc6tev37/2wINE0xDB1VPPf9fcG3Gcd/203de374fad17372fa68cd2c7ac5dde9/Jan_22-24_-_Gaza_-_Rafah.png" /></a></figure>
                </td>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/3H88zS4AETXDokBSY2HwYt/d90233525244dac1cb5dbcd3c12f8869/Jan_22-24_-_Gaza_-_Deir_al-Balah.png"><img src="https://images.ctfassets.net/slt3lc6tev37/3H88zS4AETXDokBSY2HwYt/d90233525244dac1cb5dbcd3c12f8869/Jan_22-24_-_Gaza_-_Deir_al-Balah.png" /></a></figure>
                </td>
            </tr>
        </tbody>
    </table>
</figure><p><b>March 5</b></p><h2>Cyberattacks</h2><p>In addition to the previously discussed cyberattack that impacted connectivity for <a href="https://radar.cloudflare.com/as327802">AS327802 (Moov Africa Tchad / Millicom)</a> on January 11, several other observed Internet disruptions were caused by cyberattacks in the first quarter.</p>
    <div>
      <h3>HotNet Internet Services (Israel)</h3>
      <a href="#hotnet-internet-services-israel">
        
      </a>
    </div>
    <p>Anonymous Sudan <a href="https://twitter.com/DailyDarkWeb/status/1760266153467760708">reportedly</a> launched an attack against <a href="https://radar.cloudflare.com/as12849">AS12849 (HotNet Internet Services)</a>, a major <a href="https://en.wikipedia.org/wiki/Hot_(Israel)">Israeli telecommunications provider</a>. The attack was apparently brief, as it only disrupted traffic between 22:00 on February 20 and 00:00 on February 21 local time (20:00 to 22:00 UTC on February 20). Although brief, the attack succeeded in knocking the provider offline as the <a href="https://radar.cloudflare.com/routing/as12849?dateStart=2024-02-20&amp;dateEnd=2024-02-21">volume of IPv4 and IPv6 address space announced by HotNet</a> fell to zero during the period the attack occurred.</p>
    <div>
      <h3>Zain Bahrain</h3>
      <a href="#zain-bahrain">
        
      </a>
    </div>
    <p>Anonymous Sudan also <a href="https://twitter.com/FalconFeedsio/status/1764364189492236676?s=20">reportedly</a> targeted <a href="https://radar.cloudflare.com/as31452">AS31452 (Zain Bahrain)</a> with a cyber attack. This attack appeared to be less severe than the one that targeted HotNet in Israel, but it also lasted significantly longer, with traffic disrupted between 20:45 on March 3 and 18:15 on March 4 local time (17:45 on March 3 to 15:15 on March 4 UTC). No impact to <a href="https://radar.cloudflare.com/routing/as31452?dateStart=2024-03-03&amp;dateEnd=2024-03-04">announced IP address space</a> was observed. Zain Bahrain acknowledged the connectivity disruption in a <a href="https://twitter.com/ZainBahrain/status/1764678419147538492">social media post on March 4</a>, noting (translated) “<i>We would like to inform you that some customers may encounter difficulties in using some of our services. Our technical team works to avoid these difficulties as quickly as possible.</i>”</p>
    <div>
      <h3>Multiple networks in Ukraine</h3>
      <a href="#multiple-networks-in-ukraine">
        
      </a>
    </div>
    <p>On March 13, <a href="https://therecord.media/ukraine-isps-attacks-solntsepek-sandworm-gru">an attack targeted a number of Ukrainian telecommunications providers</a>, including <a href="https://radar.cloudflare.com/as16066">AS16066 (Triangulum)</a>, <a href="https://radar.cloudflare.com/as34359">AS34359 (Link Telecom Ukraine)</a>, <a href="https://radar.cloudflare.com/as197522">AS197522 (Kalush Information Network)</a>, <a href="https://radar.cloudflare.com/as52074">AS52074 (Mandarun)</a>, and <a href="https://radar.cloudflare.com/as29013">AS29013 (LinkKremen)</a>. Triangulum appeared to be the most significantly impacted, experiencing a near complete loss of traffic between March 13 and March 20, as seen below. Triangulum posted a notice on its <a href="https://www.triangulum.ua/">website</a>, noting in part “<i>On March 13, 2024, a hacker attack was carried out on a number of Ukrainian providers. At 10:28 a.m. on March 13, 2024, a large-scale technical failure occurred on our Company's network, as a result of which it became impossible to provide electronic communication services. The Company's employees, together with employees of the Cyber ​​Police and the National Cyber ​​Security Coordination Center, are taking comprehensive measures around the clock aimed at restoring the entire range of services as soon as possible. Services are being restored gradually. Full recovery may take several days.</i>”</p><p>Other affected providers experienced comparatively shorter connectivity disruptions. The near complete outage at Mandarun lasted approximately a day, while the others saw outages lasting around seven hours, starting around 11:30 local time (09:30 UTC) on March 13, with connectivity returning to typical levels around 08:00 local time (06:00 UTC) on March 14.</p><h2>Government directed</h2>
    <div>
      <h3>Comoros</h3>
      <a href="#comoros">
        
      </a>
    </div>
    <p>Following protests against the re-election of President Azali Assoumani, authorities in <a href="https://radar.cloudflare.com/km">Comoros</a> <a href="https://www.bbc.com/news/world-africa-68027892">reportedly</a> shut down Internet connectivity on January 17. While some disruption was visible to traffic at a country level between 12:00 local time on January 17 (09:00 UTC) and 17:30 local time on January 19 (14:30 UTC), it was significantly more noticeable in the traffic from <a href="https://radar.cloudflare.com/as36939">AS36939 (Comores Telecom)</a>, which saw several periods of near-complete outage across the two-day span. Although Comores Telecom announces a limited amount of IPv4 address space, it saw significant volatility on January 17 &amp; 18, dropping to zero several times.</p>
    <div>
      <h3>Sudatel Senegal/Expresso Telecom and Tigo/Free (Senegal)</h3>
      <a href="#sudatel-senegal-expresso-telecom-and-tigo-free-senegal">
        
      </a>
    </div>
    <p>On February 4, the Minister of Communication, Telecommunications, and Digital Affairs in <a href="https://radar.cloudflare.com/sn">Senegal</a> <a href="https://twitter.com/samirasawlani/status/1754453336894415340">ordered</a> the suspension of mobile Internet connectivity starting at 22:00 local time (22:00 UTC). The suspension followed protests that erupted in the wake of the postponement of the presidential election. Traffic from <a href="https://radar.cloudflare.com/as37196">AS37196 (Sudatel Senegal/Expresso Telecom)</a> fell sharply at the time the suspension went into effect, recovering around 07:30 local time (07:30 UTC) on February 7. Traffic from <a href="https://radar.cloudflare.com/as37649">AS37649 (Tigo/Free)</a> fell at around 09:30 local time (09:30 UTC) on February 5, with the provider <a href="https://twitter.com/free_senegal/status/1754521065894633896">notifying subscribers of the suspension via social media</a>. Traffic on Tigo/Free recovered around midnight local time (00:00 UTC) on February 7, and the provider again <a href="https://twitter.com/free_senegal/status/1755188473781211523">used social media to inform subscribers of service availability</a>. No changes were observed to announced IP address space for either provider, indicating that the suspension of mobile Internet connectivity was not done at a routing level.</p><p>A little more than a week later, on February 13, the government in Senegal <a href="https://intlmonitor.com/africa/internet-shutdown-in-senegal-ahead-of-protests-over-vote-delay/">again ordered</a> the suspension of mobile Internet connectivity in an effort to prevent "the spread of hateful and subversive messages online." ahead of a march planned by activist groups which aimed to express dissent against the postponement of the presidential election. The mobile Internet shutdown was most visible on Tigo/Free, which saw a significant disruption between 10:15 and 19:45 local time (10:15 - 19:45 UTC).</p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>According to a <a href="https://www.business-standard.com/world-news/no-govt-instructions-to-block-internet-during-polls-pakistan-telecom-body-124020800226_1.html">published report</a>, The Pakistan Telecommunication Authority (PTA) said that Internet services would remain available as citizens went to the polls on February 8 to elect a new government. However, on that day, <a href="https://therecord.media/pakistan-cuts-internet-as-voters-head-to-polls">Pakistani authorities cut mobile Internet access</a> across the country as the nation’s voters went to cast their ballots, with the authorities <a href="https://therecord.media/pakistan-cuts-internet-as-voters-head-to-polls">attributing the move</a> "to maintain law and order" in the wake of the violence that occurred the previous day. The impact of the ordered shutdown was visible across multiple Internet providers in <a href="https://radar.cloudflare.com/pk">Pakistan</a>, including <a href="https://radar.cloudflare.com/traffic/as59257?dateStart=2024-02-08&amp;dateEnd=2024-02-09">AS59257 (Zong/CMPak)</a>, <a href="https://radar.cloudflare.com/traffic/as24499?dateStart=2024-02-08&amp;dateEnd=2024-02-09">AS24499 (Telenor Pakistan)</a>, and <a href="https://radar.cloudflare.com/traffic/as45669?dateStart=2024-02-08&amp;dateEnd=2024-02-09">AS45669 (Jazz/Mobilink)</a>, lasting from 07:00 until 20:00 (02:00 - 15:00 UTC), with traffic returning to expected levels approximately nine hours later. A <a href="https://pulse.internetsociety.org/blog/pakistan-elections-2024-the-unexpected-cost-of-mobile-service-disruptions">post on the Internet Society’s Pulse blog</a> estimated that the shutdown cost Pakistan nearly USD $18.5M in lost Gross Domestic Product.</p>
    <div>
      <h3>Chad</h3>
      <a href="#chad">
        
      </a>
    </div>
    <p>Several Internet disruptions were observed in <a href="https://radar.cloudflare.com/td">Chad</a> between February 28 and March 7. The first one started at 10:45 local time on February 28 and lasted until 18:00 local time on March 1 (09:45 on February 28 - 17:00 on March 1). Shorter disruptions lasting just a few hours each were also observed on March 3, 4, and 7. The apparent shutdowns came in the <a href="https://www.aljazeera.com/news/2024/2/28/chad-announces-several-deaths-after-foiled-intelligence-office-attack">wake of political violence</a> in the country. Notable drops in announced IPv4 address space aggregated across networks in the country were observed coincident with the February 28, March 3, and March 4 shutdowns, although it isn’t clear why a similar drop did not occur on March 7.</p><h2>Power outages</h2>
    <div>
      <h3>Tajikistan</h3>
      <a href="#tajikistan">
        
      </a>
    </div>
    <p>According to a <a href="https://eurasianet.org/swathes-of-tajikistan-crippled-by-unexplained-power-outage">published report</a>, a widespread multi-hour power outage occurred in <a href="https://radar.cloudflare.com/tj">Tajikistan</a> on March 1, possibly related to increased electricity usage by electric heaters as temperatures across the country neared freezing. The outage began around 11:00 local time (06:00 UTC), and lasted for approximately three hours. The impact on Internet traffic from the country is visible in the graph below. Although power was restored around 14:00 local time (09:00 UTC), Internet traffic did not return to expected levels until around 05:00 local time the next day (midnight UTC on March 2).</p><p>Although power outages most often have the biggest impact on Internet traffic, as computers and home/office routers shut down, this outage also appeared to impact network infrastructure within the country, as the aggregate volume of announced IPv4 address space across the country dipped slightly when the power was out.</p>
    <div>
      <h3>Tanzania</h3>
      <a href="#tanzania">
        
      </a>
    </div>
    <p>On March 4, the <a href="https://www.tanesco.co.tz">Tanzania Electricity Corporation (TANESCO)</a> <a href="https://twitter.com/tanescoyetutz/status/1764632209409949938">posted a notice on social media</a> regarding an ongoing power outage. It stated (translated) “<i>The Tanzania Electricity Corporation (TANESCO) has notified the public that there has been an error in the National Grid system, resulting in a lack of electricity service in some areas of the country including Zanzibar. Our experts are continuing their efforts to ensure that the electricity service returns to its normal state. The organization apologizes for any inconvenience caused.</i>” The power outage disrupted Internet connectivity in <a href="https://radar.cloudflare.com/tz">Tanzania</a>, causing an observed drop in traffic between 13:30 and 23:00 local time (10:30 - 20:00 UTC).</p><h3>Orange España<p>Network <a href="https://www.cloudflare.com/learning/network-layer/what-is-routing/">routing</a> is the process of selecting a path across one or more networks, and on the Internet, routing relies on the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/">Border Gateway Protocol (BGP)</a>. Historically, the exchange of BGP routing information was based on trust between providers, but over time, security mechanisms such as <a href="/rpki/">Resource Public Key Infrastructure (RPKI)</a> have been developed to prevent abuse of the system by bad actors. RPKI is a cryptographic method of signing records that associate a BGP route announcement with the correct originating AS number. ROA (Route Origin Authorization) records provide a means of verifying that an IP address block holder has authorized an <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">AS (Autonomous System)</a> to originate routes to that one or more prefixes within the address block. Cloudflare has <a href="/tag/rpki">published a number of blog posts</a> over the years about the importance of, and our support for, RPKI. Properly implemented and configured, RPKI and ROAs help support routing security, effectively preventing behavior like <a href="https://www.cloudflare.com/learning/security/glossary/bgp-hijacking/">BGP hijacking</a>.</p><p>The <a href="https://www.ripe.net/">RIPE NCC</a> (“RIPE”) is one of five <a href="https://en.wikipedia.org/wiki/Regional_Internet_registry">Regional Internet Registries (RIRs)</a> that provides Internet resource allocation and registration, and coordination activities. RIPE’s region covers Europe, the Middle East, and Central Asia. On January 3, a malicious actor took advantage of lax account security on the part of RIPE and <a href="https://radar.cloudflare.com/as12479">AS12479 (Orange España)</a> and <a href="https://blog.benjojo.co.uk/post/rpki-signed-but-not-secure">used credentials found on the public Internet</a> to log into Orange España’s RIPE account. Once in control of the account, the attacker published multiple ROAs with “bogus” origins, rendering thousands of routes originated by AS12479 “RPKI-invalid”, which <a href="https://www.kentik.com/blog/digging-into-the-orange-espana-hack/">resulted in carriers that reject RPKI-invalid routes to stop carrying a large amount of Orange España’s IP space</a>.</p><p>Because Cloudflare enforces RPKI validation, we also rejected the RPKI-invalid routes. We would have started trying to reach Orange España over our default route toward some of our transit providers, but because they also perform RPKI validation, traffic would have been dropped within those provider networks as well. Because of this, from Cloudflare’s perspective, this incident caused a drop in traffic from Orange España between 16:45 and 19:45 local time (14:45 - 17:45 UTC) as well as a <a href="https://radar.cloudflare.com/routing/as12479?dateStart=2024-01-03&amp;dateEnd=2024-01-03">notable drop in announced IPv4 address space from AS12479</a>.</p><p>Orange España <a href="https://twitter.com/orange_es/status/1742616775647265035">confirmed on social media</a> that its RIPE account had been improperly accessed, and as a result of the incident, <a href="https://www.ripe.net/publications/news/mandatory-2fa-on-ripe-ncc-access-accounts/">RIPE has made two-factor authentication (2FA) mandatory</a> for logins. For additional insights into the incident, <a href="https://www.kentik.com/blog/digging-into-the-orange-espana-hack/">Doug Madory at Kentik</a> and <a href="https://blog.benjojo.co.uk/post/rpki-signed-but-not-secure">Ben Cartwright-Cox at bgp.tools</a> have both published detailed analyses and timelines.</p>
    <div>
      <h3>MaxNet (Ukraine)</h3>
      <a href="#maxnet-ukraine">
        
      </a>
    </div>
    <p>On January 11, subscribers of <a href="https://radar.cloudflare.com/as34700">AS34700 (MaxNet)</a> in <a href="https://radar.cloudflare.com/ua">Ukraine</a> experienced a nine-hour Internet outage. Initial traffic loss occurred around 16:00 local time (14:00 UTC), and recovered around 01:00 local time on January 12 (23:00 UTC on January 11). An initial <a href="https://www.facebook.com/maxnetua/posts/pfbid0Y3chUrPemhcBgEhFERwEWi6muqzUeoSkas4M8EgiFpwT3Jkgy5M3jUh6wknHJan2l">social media post</a> from the provider explained the reason for the outage, noting (translated) “<i>Dear subscribers! Due to the flooding of one of the hub sites due to a utility malfunction, some areas of the city may be without services, partially or completely. We are doing our best to restore services, but it takes time. Further information regarding the opening times will be published as soon as the emergency works have been completed.</i>” A <a href="https://www.facebook.com/maxnetua/posts/pfbid012Nymu8ft9NPFi9fkQHrd9zGHb8un69ceECVXw72irJbBAkB3TXBRju1YqRSzSbLl">subsequent post</a> informed subscribers that Internet connectivity had been restored. The flooding apparently impacted core routing infrastructure as well, as the <a href="https://radar.cloudflare.com/routing/as34700?dateStart=2024-01-11&amp;dateEnd=2024-01-12">volume of IPv4 address space announced by MaxNet</a> also fell to zero between 16:00 and 22:00 local time (14:00 - 20:00 UTC).</p><h3>Plusnet (United Kingdom)</h3><p>A traffic disruption observed on <a href="https://radar.cloudflare.com/as6871">AS6871 (Plusnet)</a> in the <a href="https://radar.cloudflare.com/gb">United Kingdom</a> on January 15 was initially <a href="https://twitter.com/Plusnet/status/1746939378428006549">characterized as a “mass outage”</a> by the provider in replies to customer complaints on social media. However, the underlying cause of the disruption turned out to be significantly less sensational – it was apparently <a href="https://www.ispreview.co.uk/index.php/2024/01/broadband-isp-plusnet-recovers-from-dns-linked-mass-outage.html">linked to problems with their DNS servers</a>. Because subscribers were unable to successfully resolve hostnames using Plusnet’s default DNS resolvers, this ultimately manifested itself as a drop in traffic from the network for approximately two hours, between 16:00 and 18:00 local time (and UTC). Users that had configured their systems to use a third-party DNS resolver, such as <a href="https://one.one.one.one/dns/">Cloudflare’s 1.1.1.1 service</a>, did not experience a service disruption.</p><h3>Russia</h3><p><a href="https://www.cloudflare.com/learning/dns/common-dns-issues/">DNS issues</a> also impacted users in Russia during January, though in a different way than Plusnet subscribers in the UK experienced. A <a href="https://circleid.com/posts/20240130-dnssec-failure-causes-massive-website-outages-on-russian-internet">reported</a> <a href="https://www.cloudflare.com/dns/dnssec/how-dnssec-works/">DNSSEC</a> failure on January 30 resulted in .ru domains becoming inaccessible for several hours. (DNSSEC creates a secure domain name system by adding cryptographic signatures to existing DNS records. By checking its associated signature, you can verify that a requested DNS record comes from its authoritative name server and wasn’t altered en-route, as opposed to a fake record injected in a man-in-the-middle attack.)</p><p>The <a href="https://datatracker.ietf.org/doc/html/rfc8914#name-extended-dns-error-code-6-d">DNSSEC validation failure</a> resulted in <a href="/unwrap-the-servfail">SERVFAIL</a> responses to DNS lookups against Cloudflare’s 1.1.1.1 resolver for hostnames in the .ru country code top level domain (ccTLD). At peak, 68.4% of requests received SERVFAIL responses. The Coordination Center for the .ru ccTLD <a href="https://t.me/fontankaspb/51445">confirmed</a> that it was working on the “technical problem affecting the .ru zone associated with the global DNSSEC infrastructure” but didn’t provide any additional details around the root cause of the problem, such as a potential issue with a DNSSEC key rollover. The .ru ccTLD experienced a <a href="https://ianix.com/pub/dnssec-outages/20190816-ru/">similar DNSSEC-related outage</a> for several hours on August 16, 2019, as well.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4o14ywdQmVwPQqLccSR9ov/8181788b95cf51f492820977417be76a/Jan-30---Russia---ru-DNSSEC.png" />
            
            </figure>
    <div>
      <h3>AT&amp;T (United States)</h3>
      <a href="#at-t-united-states">
        
      </a>
    </div>
    <p>Starting just before 04:00 Eastern / 03:00 Central (09:00 UTC) on February 22, AT&amp;T subscribers in several cities across the United States <a href="https://abcnews.go.com/US/att-outage-impacting-us-customers-company/story?id=107440297">experienced mobile service interruptions</a>. Impacted cities included Atlanta, Houston, and Chicago, with connectivity disrupted for approximately eight hours. Cloudflare data showed that as the problem began, <a href="https://radar.cloudflare.com/as7018">AT&amp;T (AS7018)</a> traffic <a href="https://twitter.com/CloudflareRadar/status/1760694610689442114">dropped as much as 45% in Chicago and 18% in Dallas</a>, as compared with the previous week.</p><p>According to a <a href="https://web.archive.org/web/20240223235440/https://about.att.com/pages/network-update">“network update” published by AT&amp;T</a>, “<i>Based on our initial review, we believe that today’s outage was caused by the application and execution of an incorrect process used as we were expanding our network, not a cyber attack.</i>”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5kg2gdTuPBJ1MPirymlvfG/bd816a37733a151f434d33354b9fd81b/pasted-image-0-4.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3drORCJTXNtO7IrJMUrjog/4dbc2cc56bdf6581205d03c7475dee16/pasted-image-0--1--2.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tTYc2dO4kHkZR4wvUlIzy/466bf1559696466e91072e4f00faa603/pasted-image-0--2--2.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7BwYMWXW6hGIzZTUIVmBht/6ea7e5bd4093a3b9171b159ff19c7f47/pasted-image-0--3--1.png" />
            
            </figure><h2>Maintenance</h2>
    <div>
      <h3>Vodafone Egypt</h3>
      <a href="#vodafone-egypt">
        
      </a>
    </div>
    <p>Between 05:15 and 11:30 local time (03:15 - 09:30 UTC) on March 5, customers of <a href="https://radar.cloudflare.com/as36935">AS36935 (Vodafone Egypt)</a> experienced disruptions to their mobile Internet connectivity, with observed traffic from the network <a href="https://twitter.com/CloudflareRadar/status/1764951344954122467">dropping as much as 70% below expected levels</a>. A (translated) <a href="https://twitter.com/VodafoneEgypt/status/1764947072376074428">social media post</a> from the provider noted in part “<i>We apologize that some areas are currently affected by difficulties in operating the 4G service due to updates that took place this morning.</i>” <a href="https://www.africanwirelesscomms.com/news-details?itemid=7392&amp;post=vodafone-egypt-sees-205-million-egp-fine-509046">As a result of the 4G network outage</a>, Vodafone was required to compensate affected customers, and was also fined by <a href="https://www.tra.gov.eg/en/">Egypt's National Telecommunications Regulatory Authority</a> (NTRA).</p>
    <div>
      <h3>Ocean Wave Communication (Myanmar)</h3>
      <a href="#ocean-wave-communication-myanmar">
        
      </a>
    </div>
    <p>Just before noon local time (05:15 UTC) on March 12, a significant drop in traffic was observed on <a href="https://radar.cloudflare.com/as136442">AS136442 (Ocean Wave)</a>, a consumer fiber and business Internet service provider in <a href="https://radar.cloudflare.com/mm">Myanmar</a>. A (translated) social media post from the provider noted “<i>Ocean Wave customers, please be informed that there will be no internet/ slow connection due to network maintenance.</i>” The connectivity disruption lasted approximately seven hours, with traffic returning to typical levels just before 19:00 local time (12:15 UTC).</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Two notable submarine cable damage events during the first quarter again highlighted the importance of protecting submarine cables, and the risks associated with them passing through/near geopolitically sensitive areas. Given the <a href="https://blog.telegeography.com/2023-mythbusting-part-3">reliance on submarine cables for carrying Internet traffic</a>, this will continue to be an issue for many years to come.</p><p>The Orange España incident also shed light on the importance of securing operationally important resources with <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">multi-factor authentication</a>, a topic that Cloudflare has <a href="/how-cloudflare-implemented-fido2-and-zero-trust">written about in the past</a>. Organizations like RIPE play a critically important behind-the-scenes role in functioning of the Internet, arguably obligating them to take all practical precautions when it comes to securing their systems in order to prevent malicious actors from taking actions that could broadly disrupt Internet connectivity.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center">Cloudflare Radar Outage Center</a>, via social media, and in posts on <a href="/tag/cloudflare-radar/">blog.cloudflare.com</a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (X), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or contact us via <a>email</a>.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p></h3> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <guid isPermaLink="false">48Rzo73JqvkA5I3YzT2Coi</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Q4 2023 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q4-2023-internet-disruption-summary/</link>
            <pubDate>Mon, 22 Jan 2024 14:00:27 GMT</pubDate>
            <description><![CDATA[ In this post, we review selected Internet disruptions observed by Cloudflare during the fourth quarter of 2023, supported by traffic graphs from Cloudflare Radar and other internal Cloudflare tools, and grouped by associated cause or common geography ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/46eFEiFp8AtgmQcdps6Inx/29327b0a230c82cce34efc2118a2d974/image48-1.png" />
            
            </figure><p>Cloudflare’s network spans more than 310 cities in over 120 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions.</p><p>During previous quarters, we tracked a number of government directed Internet shutdowns in Iraq, intended to prevent cheating on academic exams. We expected to do so again during the fourth quarter, but there turned out to be no need to, as <a href="#governmentdirected">discussed below</a>. While we didn’t see that set of expected shutdowns, we did observe a number of other Internet outages and disruptions due to a number of commonly seen causes, including <a href="#fibercabletrouble">fiber/cable issues</a>, <a href="#poweroutages">power outages</a>, extreme <a href="#weather">weather</a>, infrastructure <a href="#maintenance">maintenance</a>, general <a href="#technicalproblems">technical problems</a>, <a href="#cyberattacks">cyberattacks</a>, and unfortunately, <a href="#militaryaction">military action</a>. As we have noted in the past, this post is intended as a summary overview of observed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter.</p><h2>Government directed</h2>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>In a slight departure from the usual subject of this blog post, this time we lead off with coverage of government directed Internet shutdowns that didn’t happen. <a href="https://radar.cloudflare.com/iq">Iraq</a> has been a frequent subject of this series of posts, as they have historically implemented daily multi-hour Internet shutdowns during exam periods, intended to prevent cheating. Earlier this year, there was some hope that this practice might be ending, and in our <a href="/q2-2023-internet-disruption-summary/">Q2 2023 Internet disruption summary</a> post, we noted “<i>In the weeks prior to the start of this year’s shutdowns, it was </i><a href="https://www.kurdistan24.net/en/story/31453-Iraq%E2%80%99s-communication-ministry-refuses-to-enforce-internet-blackout-for-final-exams"><i>reported</i></a><i> that the Iraqi Ministry of Communications had announced it had refused a request from the Ministry of Education to impose an Internet shutdown during the exams as part of efforts to prevent cheating. Unfortunately, this refusal was short-lived, with shutdowns ultimately starting two weeks later.</i>” In addition to these second quarter shutdowns, they also occurred during the third quarter across multiple weeks in July, August, and September.</p><p>During the fourth quarter, the third round of 12th grade high school final exams was scheduled to begin on November 13 and end on November 21, taking place at 13:00 local time, as shown in the schedule below, which was <a href="https://www.facebook.com/photo.php?fbid=661695112830032&amp;set=pb.100069686486016.-2207520000&amp;type=3">published</a> on the Iraqi Ministry of Education’s Facebook page.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/EU7icSaMHzAeCVQs5Bitq/c0ad971a6ceeadb81a4d5a94900ab133/image53.png" />
            
            </figure><p>November 2023 exam schedule in Iraq</p><p>However, in looking at Internet traffic for Iraq during that period, it appears that the nationwide Internet shutdowns that would have normally taken place did not occur, as the graph shows a very consistent diurnal pattern with no evidence of disruptions to Internet connectivity like we have seen in the past. Additionally, other <a href="https://twitter.com/accessnow">civil society groups</a>, <a href="https://twitter.com/IODA_live">academic researchers</a>, and <a href="https://twitter.com/dougmadory">Internet analysts</a> that also monitor these shutdowns did not report seeing any related drops in traffic. It is unclear whether a request for shutdowns was submitted by the Ministry of Education and again refused by the Ministry of Communications, or if no request was ever submitted for this round of exams. Regardless, we hope that Iraq continues to keep the Internet connected during future rounds of exams.</p><h2>Military action</h2>
    <div>
      <h3>Palestine</h3>
      <a href="#palestine">
        
      </a>
    </div>
    <p>On Saturday, October 7, 2023, attacks from the Palestinian group Hamas launched from the Gaza Strip against the south of Israel started a new <a href="https://en.wikipedia.org/wiki/October_2023_Gaza%E2%88%92Israel_conflict">conflict</a> in the region, with Israel <a href="https://apnews.com/live/israel-hamas-war-live-updates#0000018b-0f83-d2a1-a1df-8fcb0a320000">officially declaring</a> the next day that it was at war. This had an almost immediate impact on Internet traffic in both <a href="https://radar.cloudflare.com/il">Israel</a> and <a href="https://radar.cloudflare.com/ps">Palestine</a>, with traffic in the former showing ~170% growth as compared to the prior week, and ~100% growth in the latter as compared to the previous week. These trends are discussed in our October 9 blog post, <a href="/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks/"><i>Internet traffic patterns in Israel and Palestine following the October 2023 attacks</i></a>.</p><p>However, in the hours and days following the initial attacks, a number of Palestinian Internet providers saw traffic fall significantly, with many winding up largely or totally offline, potentially as a result of power outages caused by <a href="https://apnews.com/article/israel-palestinians-gaza-hamas-rockets-airstrikes-tel-aviv-11fb98655c256d54ecb5329284fc37d2">retaliatory Israeli airstrikes</a>. Impacted networks included <a href="https://radar.cloudflare.com/as42314">AS42314 (fusion)</a>, <a href="https://radar.cloudflare.com/as203905">AS203905 (DCC_North_ASN)</a>, <a href="https://radar.cloudflare.com/as210974">AS210974 (AjyalFI)</a>, <a href="https://radar.cloudflare.com/as60268">AS60268 (DIGITAL-COMMUNICATION-PALESTINE-ASN)</a>, <a href="https://radar.cloudflare.com/as60353">AS60353 (DCC_RAFAH_ASN)</a>, <a href="https://radar.cloudflare.com/as62027">AS62027 (DCC_Khanyouns_ASN)</a>, <a href="https://radar.cloudflare.com/as57704">AS57704 (SPEED-CLICK-LTD)</a>, <a href="https://radar.cloudflare.com/as199046">AS199046 (JETNET)</a>, and <a href="https://radar.cloudflare.com/as213207">AS213207 (TechHub-HiNet)</a>, as shown in the graphs below.</p><p>In addition to the outages illustrated above, throughout October, November, and December, <a href="https://www.paltel.ps/en/home">Paltel (Palestine Telecommunications Company)</a> posted a number of times on <a href="https://twitter.com/Paltelco">its official X account</a> about disruptions to its landline, mobile, and Internet services, citing causes including <a href="https://twitter.com/Paltelco/status/1718007432494911717">fiber damage due to bombardment</a> and <a href="https://twitter.com/Paltelco/status/1724727009673101574">fuel depletion</a>. Posts were made on <a href="https://twitter.com/Paltelco/status/1718007432494911717">October 27</a>, <a href="https://twitter.com/Paltelco/status/1719529153471320550">October 31</a>, <a href="https://twitter.com/Paltelco/status/1725159705796821048">November 16</a>, <a href="https://twitter.com/Paltelco/status/1731740390691066263">December 4</a>, <a href="https://twitter.com/Paltelco/status/1735324896677216391">December 14</a>, <a href="https://twitter.com/Paltelco/status/1737380988064272472">December 20</a>, and <a href="https://twitter.com/Paltelco/status/1739668361837936669">December 26</a>. The associated outages varied in length, some lasting for hours, while others lasted for multiple days — each outage is shaded in the graphs below, which show Paltel traffic within four Palestinian governorates in the Gaza Strip region.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2GIWlojCibbJx9f1t7GKxe/67ca726673664f4da6f3386ef857770a/Dec---Oct---Palestine---Gaza.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3LgG6g0LuUPd6eV7OjXRvz/7de10b9e30e86312b6e9df9a122c1dd0/Dec---Oct---Palestine---Rafah.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LPxqCpcM3KKwRdBICyTFu/57ef31df6cdbb2cc16de4443629ec8c0/Dec---Oct---Palestine---Khan-Yunis.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7o0kLqhbSeHw2XEtJJiBUv/375182eeb397c52cf94ce3217bcdd260/Dec---Oct---Palestine---Deir-al-Balah.png" />
            
            </figure><h2>Fiber/cable trouble</h2>
    <div>
      <h3>Namibia</h3>
      <a href="#namibia">
        
      </a>
    </div>
    <p>On November 13, <a href="https://radar.cloudflare.com/as36996">Telecom Namibia (AS36996)</a> <a href="https://twitter.com/TelecomNamibia/status/1723311216850796563">reported</a> that it was experiencing interruptions to its fixed voice and data services in several areas, resulting from cable theft. The impact of these interruptions is shown in the figure below, with Internet traffic disrupted between 13:45 local time (11:45 UTC) on November 13 and 08:30 local time (06:30 UTC) on November 14. The disruption to connectivity due to cable theft was not an isolated incident, as the provider posted several additional notices on its <a href="https://twitter.com/TelecomNamibia">social media accounts</a> in November and December about similar occurrences.</p>
    <div>
      <h3>Cuba</h3>
      <a href="#cuba">
        
      </a>
    </div>
    <p>A day later, on November 14, <a href="https://radar.cloudflare.com/as27725">ETECSA (AS27725)</a> <a href="https://twitter.com/ETECSA_Cuba/status/1724442186282909760">posted</a> a notice about a terrestrial fiber cut that disrupted Internet services. As the state-owned telecommunications provider in <a href="https://radar.cloudflare.com/cu">Cuba</a>, the cut impacted Internet traffic nationwide, as well as at a network level, as seen in the graphs below. The disruption was relatively short-lived, occurring between 06:30 - 08:15 local time (11:30 - 13:15 UTC), with a <a href="https://twitter.com/ETECSA_Cuba/status/1724499677041594801">follow-up post</a> announcing the re-establishment of Internet service.</p>
    <div>
      <h3>Chad</h3>
      <a href="#chad">
        
      </a>
    </div>
    <p>On December 7 &amp; 8, a near-complete outage observed in <a href="https://radar.cloudflare.com/td">Chad</a> was <a href="https://www.msn.com/fr-xl/actualite/other/tchad-connexion-internet-r%C3%A9tablie-apr%C3%A8s-des-heures-de-coupure/ar-AA1lcaMM">reportedly</a> due to fiber optic cable cuts in neighboring countries. A published article cited <a href="https://radar.cloudflare.com/as328594">SudaChad</a> as claiming that the outage seen in the graphs below was due to an issue with CAMTEL, a <a href="https://www.camertoday.com/camtel-and-sudachad-assess-relationship-pledge-further-commitment-for-better-results/">Cameroonian partner</a>. It also cites <a href="https://moovafrica.td/">Moov Africa’s (formerly known as Millicom Chad)</a> <a href="https://www.facebook.com/moovafrica.td/posts/pfbid0V63Pse2WEMqB5FsdkzAwwJppZLjwJry9MeYV8jUZZUNJZqu9WFG6fQfAURbMKop2l">apology</a> to customers, which points at “<i>the fiber-optic cut in Cameroon and Sudan</i>'' as the root cause. Since simultaneous cuts in fiber optic cables in Chad’s two neighboring countries would certainly be an unusual occurrence, it isn’t clear if such an event happened, though <a href="https://radar.cloudflare.com/routing/as328594">routing data for SudaChad</a> shows that the network’s two upstream providers are <a href="https://radar.cloudflare.com/routing/as15706">AS15706 (Sudatel)</a> in <a href="https://radar.cloudflare.com/sd">Sudan</a> and <a href="https://radar.cloudflare.com/routing/as15964">AS15964 (CAMNET)</a> in <a href="https://radar.cloudflare.com/cm">Cameroon</a>. The three providers are also partners on the <a href="https://www.capacitymedia.com/article/29ysrmpai1ti3q95wj474/news/african-three-partner-on-cameroon-chad-sudan-terrestrial-upgrade">WE-AFRICA-NA terrestrial cable</a>, which stretches from Port-Sudan on the Red Sea in Sudan to Kribi on the Atlantic Ocean in Cameroon via Chad, but it isn’t known whether that cable system was involved in this outage.</p><p>The disruption lasted approximately fourteen hours, from 20:00 local time on December 7 until 10:15 local time on December 8 (19:00 UTC on December 7 until 09:15 UTC on December 8), with the impact visible country-wide, as well as at SudaChad and several downstream network providers.</p><h2>Cyberattacks</h2>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>Ukrainian Internet provider Kyivstar <a href="https://twitter.com/TwiyKyivstar/status/1734527519972298888">announced</a> on the morning of December 12 that they were the “target of a powerful hacker attack”. They noted that the attack caused a “technical failure” that resulted in mobile communication and Internet access becoming temporarily unavailable. Although <a href="https://radar.cloudflare.com/as15895">Kyivstar</a> has been targeted by around <a href="https://www.barrons.com/news/ukraine-s-main-phone-operator-recovering-two-days-after-cyberattack-41ba9ee3">500 cyberattacks</a> since Russia launched its invasion of Ukraine in February 2022, this was <a href="https://www.reuters.com/technology/cybersecurity/ukraines-kyivstar-restores-services-after-cyberattack-parent-veon-says-2023-12-19/">reportedly</a> the largest attack to date. A <a href="https://therecord.media/russians-infiltrated-kyivstar-months-before">subsequent report</a> referenced an interview with Illia Vitiuk, the head of the cybersecurity department at Ukraine’s security service (SBU), in which he claimed that “<i>the hackers attempted to penetrate Kyivstar in March 2023 or earlier, managed to get into the system at least as early as May, and likely gained full access to the network in November.</i>”</p><p>Recovery took several days, with Kyivstar <a href="https://twitter.com/TwiyKyivstar/status/1735732558783033831">posting</a> on December 15 that “the Internet is everywhere” but warning that connection speeds might be slightly reduced. These posts align with the traffic disruption shown in the figure below, which lasted from 06:30 local time (04:30 UTC) on December 12 until 14:00 local time (12:00 UTC) on December 15.</p><h2>Power outages</h2>
    <div>
      <h3>Brunei</h3>
      <a href="#brunei">
        
      </a>
    </div>
    <p>A major <a href="https://borneobulletin.com.bn/key-services-affected-by-power-outage/">power outage</a> in <a href="https://radar.cloudflare.com/bn">Brunei</a> on October 17 disrupted key services including mobile and fixed Internet connectivity. Starting around 11:30 local time (03:30 UTC), traffic was disrupted for approximately 13 hours, recovering to expected levels around just after midnight local time on October 18 (16:45 UTC). Two <a href="http://www.unn.com.bn/">Unified National Networks</a> <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">autonomous systems</a> (<a href="https://radar.cloudflare.com/as10094">AS10094</a> and <a href="https://radar.cloudflare.com/as131467">AS131467</a>) saw lower traffic volumes during the power outage.</p>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>A widespread power outage in <a href="https://radar.cloudflare.com/ke">Kenya</a> on November 11 disrupted Internet connectivity across the county for approximately seven hours. An X <a href="https://twitter.com/KenyaPower_Care/status/1723395753173750170">post from Kenya Power</a> at 20:30 local time (17:30 UTC) reported a partial power outage, stating “<i>We have lost power supply to parts of the country. Our engineers are working to restore supply to the affected areas.</i>” Kenya Power kept customers informed of progress, posting updates at <a href="https://twitter.com/KenyaPower_Care/status/1723419016805392777">22:00</a>, <a href="https://twitter.com/KenyaPower_Care/status/1723447354869596441">23:57</a>, and the <a href="https://twitter.com/KenyaPower_Care/status/1723499883921826270">morning of November 12</a>, with the final update reporting “<i>We have successfully restored normal power supply in all the areas that were affected by the partial outage.</i>”</p>
    <div>
      <h3>Curaçao</h3>
      <a href="#curacao">
        
      </a>
    </div>
    <p>On November 14, a <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02zDjsA6PNXrJbvNRnbPsCqmYp1ZkyeQ76T8Wm5ppW6Nw34uWnHgPjFD4H7F1Lp2Cdl?comment_id=653239830306646&amp;__cft__[0]=AZWpmwt39YsibkYuAxOzfgXMMpqxQJmoMRw7wP4MoF1xoeyjXm7zTBb7a5qZDlQVSdPRy3aRUqWXPtlZXp3ixvLhXibRz0e5Q-hUCyOh7OEaWxAUQIRXC66H0Vu4UoyAk-ovL89HVTjCLy9PxQ_TebGFwR3i8z5LuynvWizmPlFajA&amp;__tn__=R]-R">Facebook post from Aqualectra</a>, the water and power company in <a href="https://radar.cloudflare.com/cw">Curaçao</a>, stated in part, “<i>Around 14:00 this afternoon, a blackout occurred. Preliminary investigation indicates that one of the main cables responsible for transporting electricity between the substations at Nijlweg and Weis experienced a short circuit. It is important to emphasize that this is not due to a lack of production capacity.</i>” The power outage resulted in a near complete loss of traffic at <a href="https://radar.cloudflare.com/traffic/as52233">Flow Curaçao (AS52233)</a>, with significant disruptions also visible at <a href="https://radar.cloudflare.com/traffic/as11081">United Telecommunication Services (AS11081)</a> and at a country level, as seen in the graphs below. The disruption lasted eight hours, from 14:00 until 22:00 local time (18:00 UTC on November 14 until 02:00 UTC on November 15).</p>
    <div>
      <h3>Sri Lanka</h3>
      <a href="#sri-lanka">
        
      </a>
    </div>
    <p>After stabilizing its electrical infrastructure in the wake of 2022’s problems with its electrical power grid, <a href="https://apnews.com/article/sri-lanka-crisis-power-outage-imf-ff6c24554d5dcf74160f11740148e3ee">the failure of a main transmission line</a> caused an island-wide power outage in <a href="https://radar.cloudflare.com/lk">Sri Lanka</a> on December 9, in turn disrupting Internet connectivity. Traffic from the island nation initially dropped by around 50% starting around 16:45 local time (11:15 UTC). <a href="https://www.adaderana.lk/news.php?nid=95513">Repairs took several hours</a>, with the country’s Internet traffic returning to expected levels around 01:00 local time on December 10 (19:30 UTC).</p>
    <div>
      <h3>Panama</h3>
      <a href="#panama">
        
      </a>
    </div>
    <p>On the morning of December 24, Panamanian electric distribution company <a href="https://www.ensa.com.pa/">ENSA</a> <a href="https://twitter.com/ENSApanama/status/1738947871146123372">initially reported</a> an event that affected electrical services to their customers. A <a href="https://twitter.com/ENSApanama/status/1738954995179848162">subsequent report</a> posted just 30 minutes later provided additional details, pointing to an incident in the “National Interconnected System” that affected the electrical supply in a number of areas, but <a href="https://twitter.com/ENSApanama/status/1738987254234640746">within an hour</a>, it had spread nationally. Although the initial regional power issues did not have a noticeable impact on <a href="https://radar.cloudflare.com/pa">Panama’s</a> Internet traffic, the loss of traffic in the graph below aligns with the national growth of the power outage, occurring at 11:45 local time (16:45 UTC). Traffic returned to expected levels at around 15:00 local time (20:00 UTC), aligning with an <a href="https://twitter.com/ENSApanama/status/1739027796733681703">X post from ENSA</a> stating that “<i>At 3:12pm the supply of electrical energy to all our clients has been normalized after an event at the Transmission level originating in the Panama 1 Substation of ETESA.</i>”</p><h2>Weather</h2>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>Internet disruptions in <a href="https://radar.cloudflare.com/ua">Ukraine</a> due to the conflict there have been covered in <a href="/searchresults#q=%22internet%20disruption%22%20ukraine&amp;sort=date%20descending">multiple quarterly Internet disruption summary blog posts</a> over the last two years. However, in November, connectivity in multiple areas of the country was disrupted by power outages caused by a major winter storm. Snow and high winds <a href="https://www.reuters.com/world/europe/winter-storm-causes-power-outages-road-closures-ukraine-2023-11-27/">knocked out power</a> to hundreds of towns and villages, damaging electrical power infrastructure. The impact is visible in the graphs below as a drop in traffic occurring around 01:00 local time on November 27 (23:00 UTC on November 26), observed in regions including Donetsk, Kherson Oblast, and Luhansk. Traffic appeared to return to expected levels early in the morning local time on November 28.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3vH3c3G46L4nD6EEOVklAi/87fc0dcba92a7fa097628c30eb34b881/pasted-image-0-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5vblMILsQHpP7QejIiK4We/ddf24b10384fe004ccbbfa3ecd9a0ab7/pasted-image-0--1--1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Uwzflw7gJFzYm1mxJ6zIL/2d20c3b393a74618da8ef1c5589bd314/pasted-image-0--2--1.png" />
            
            </figure>
    <div>
      <h3>Mexico</h3>
      <a href="#mexico">
        
      </a>
    </div>
    <p>On October 25, <a href="https://en.wikipedia.org/wiki/Hurricane_Otis">Hurricane Otis</a> made landfall near Acapulco, a popular tourist destination in <a href="https://radar.cloudflare.com/mx">Mexico</a>. In addition to catastrophic structural damage, it was <a href="https://www.nesdis.noaa.gov/news/hurricane-otis-causes-catastrophic-damage-acapulco-mexico">reported</a> that “<i>more than 10,000 utility poles were destroyed, knocking out power and internet/communications across the region, while numerous transmission lines, electrical substations, and a power plant were also heavily damaged.</i>” This damage to electrical and communications infrastructure in the area resulted in significant disruption to Internet connectivity. As shown in the graph below, Internet traffic from Acapulco dropped by around 80% as Otis made landfall. Traffic started to show some growth in early November, but peak volumes remained relatively consistent, and well below pre-hurricane levels, through the end of the year. (Several large spikes are visible on December 26 &amp; 30, but it isn’t clear what those are associated with.) Although Acapulco’s tourism industry <a href="https://bnnbreaking.com/world/mexico/acapulcos-resilience-from-hurricane-devastation-to-holiday-destination/">experienced a notable recovery</a> heading into the end of the year, it appears that infrastructure recovery has not been quite as swift.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6RqwYAx8KEBBCRS5ehEYxE/181a383c698b18180088758f09ed3228/pasted-image-0--3--1.png" />
            
            </figure>
    <div>
      <h2>Fire</h2>
      <a href="#fire">
        
      </a>
    </div>
    
    <div>
      <h3>Hawaii</h3>
      <a href="#hawaii">
        
      </a>
    </div>
    <p>Last quarter, we <a href="/q3-2023-internet-disruption-summary/#fire">reported</a> on the impact of wildfires that started on August 7 in Hawaii, including killing nearly 100 people, as well as destroying homes, businesses, and infrastructure, causing power outages and disrupting Internet connectivity. One of the most impacted areas was the town of Lahaina, where Internet connectivity remained sparse for weeks after the fires began. Repair and restoration efforts continued throughout the fourth quarter, with traffic clearly growing throughout October, with peak levels in November and December approaching pre-fire levels.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1n3qqN1BbwojGibaAVCslA/1a8d15204ed25e23706dc080578fed86/Dec-31---United-States---Hawaii---Lahaina.png" />
            
            </figure><h2>Maintenance</h2>
    <div>
      <h3>Yemen</h3>
      <a href="#yemen">
        
      </a>
    </div>
    <p>Two maintenance-related Internet disruptions impacted Internet connectivity in <a href="https://radar.cloudflare.com/ye">Yemen</a> in the fourth quarter. The first lasted over four hours during the morning of November 10, from 03:10 - 07:45 local time (00:10 - 04:45 UTC), and followed two other disruptions the prior day. The impact was visible at a country level, as well as at a network level on <a href="https://radar.cloudflare.com/as30873">PTC-YemenNet (AS30873)</a>.</p><p>An Associated Press <a href="https://apnews.com/article/yemen-internet-outage-israel-hamas-war-houthis-4255eccf371e558b7912ddcd94d706d7">article</a> noted that in a statement to the state news agency, Yemen’s Public Telecom Corp. (PTC-YemenNet) blamed the outage on maintenance, apparently of the <a href="https://www.submarinecablemap.com/submarine-cable/falcon">FALCON submarine cable</a>. The article also cited a <a href="https://subsea.gcxworld.com/clarification-yemen-internet-outage/">statement</a> from <a href="https://subsea.gcxworld.com/">GCX</a>, the operator of the FALCON cable, regarding scheduled maintenance to the cable system that had been in planning for the previous three months.</p><p>The second maintenance-related disruption occurred on December 15 just before 23:00 local time (20:00 UTC). An X <a href="https://twitter.com/AlnomeirMosfer/status/1735770808545423518">post from Mosfer Alnomeir</a>, the Minister of Telecommunication and Information Technology in Yemen, explained what happened: “<i>We note that half an hour ago there was an interruption in the Internet service that lasted approximately 30 minutes. This is while engineers carry out emergency replacement and upgrade work on some service equipment. Service was restored immediately. On behalf of the team, I say thank you for your understanding.</i>” Once again, the impact was visible at both a country and network level.</p><h2>Technical problems</h2>
    <div>
      <h3>Australia</h3>
      <a href="#australia">
        
      </a>
    </div>
    <p>"Changes to routing information" after a "routine software upgrade" were <a href="https://www.reuters.com/business/media-telecom/singtel-owned-optus-says-massive-australia-outage-was-after-software-upgrade-2023-11-13/">reportedly</a> responsible for a multi-hour Internet outage at Australian telecommunications provider <a href="https://radar.cloudflare.com/as4804">Optus (AS4804)</a> on November 8 local time. Connectivity began to drop just after 04:00 Sydney time, with the outage lasting from 04:30 - 10:00 Sydney time (17:30 - 23:00 UTC on November 7). Traffic didn’t fully recover to expected levels until around 23:00 Sydney time (12:00 UTC).</p><p>The network issue <a href="https://www.reuters.com/business/media-telecom/australia-investigate-optus-internet-phone-outage-2023-11-08/">impacted</a> more than 10 million customers, as well as hospitals and payment and transport systems, and drew comparisons to <a href="/cloudflares-view-of-the-rogers-communications-outage-in-canada">July 2023’s outage at Canadian provider Rogers Communications</a>. Optus <a href="https://www.aph.gov.au/DocumentStore.ashx?id=2ed95079-023d-49d5-87fd-d9029740629b&amp;subId=750333">submitted a report</a> to the Australian Senate Standing Committee on Environment and Communications that detailed the cause of the outage, noting “<i>It is now understood that the outage occurred due to approximately 90 PE routers automatically self-isolating in order to protect themselves from an overload of IP routing information. … This unexpected overload of IP routing information occurred after a software upgrade at one of the Singtel internet exchanges (known as STiX) in North America, one of Optus’ international networks. During the upgrade, the Optus network received changes in routing information from an alternate Singtel peering router. These routing changes were propagated through multiple layers of our IP Core network. As a result, at around 4:05am (AEDT), the pre-set safety limits on a significant number of Optus network routers were exceeded.</i>” The report also detailed the recovery efforts and timelines for consumer Internet, DNS, and mobile services.</p>
    <div>
      <h3>Armenia</h3>
      <a href="#armenia">
        
      </a>
    </div>
    <p><a href="https://www.facebook.com/telecomarmenia.am/posts/pfbid0KaB276aGQeDpsb2Q5fi9J3ybVdzPzqZ49aw1GyiHpAWCszXGEMntYLaitYBPPN8bl">Failure of international links</a> caused a brief Internet disruption at <a href="https://radar.cloudflare.com/as12297">Telecom Armenia (AS12297)</a> on November 11, similar to a <a href="https://tech.news.am/eng/news/317/internet-failures-in-armenia-due-to-outage-of-main-and-backup-communication-nodes-on-territory-of-georgia.html">disruption that occurred almost exactly a year earlier</a>. As shown in the graph below, the disruption began just around 15:15 local time (11:15 UTC), with short periods where traffic dropped to zero. Traffic recovered to expected levels by 21:00 local time (17:00 UTC). As one of the largest telecommunications providers in the country, the service disruption was visible at a country level as well.</p>
    <div>
      <h3>United Kingdom</h3>
      <a href="#united-kingdom">
        
      </a>
    </div>
    <p>A sizable drop in traffic was observed between 15:00 and 21:30 local time (15:00 - 21:30 UTC) on mobile and broadband Internet provider <a href="https://radar.cloudflare.com/as206067">Three UK (AS206067)</a> on December 1, as seen in the graph below. Although the provider <a href="https://twitter.com/ThreeUK/status/1730600392029802858">acknowledged</a> that customers were experiencing issues and provided several updates (<a href="https://twitter.com/ThreeUK/status/1730698310611058926">1</a>, <a href="https://twitter.com/ThreeUK/status/1730891263837159762">2</a>, <a href="https://twitter.com/ThreeUK/status/1730909430449873229">3</a>, <a href="https://twitter.com/ThreeUK/status/1730983680196178156">4</a>) on service restoration over the next day, it never disclosed any additional information on the cause of the disruption. However, a <a href="https://www.datacenterdynamics.com/en/news/three-blames-network-outage-on-technical-issue-at-one-of-its-data-centers/">published report</a> stated that Three UK blamed technical issues at one of its data centers as the cause of the problem, which impacted more than 20,000 users.</p>
    <div>
      <h3>Egypt</h3>
      <a href="#egypt">
        
      </a>
    </div>
    <p>On December 5, <a href="https://radar.cloudflare.com/as8452">Telecom Egypt (AS8452)</a> <a href="https://twitter.com/telecomegypt/status/1732073702605410364">posted</a> on X that a technical malfunction affecting one of their main network devices was responsible for an Internet disruption that occurred on their network, which also impacted connectivity on several other network providers, including <a href="https://radar.cloudflare.com/as24863">LINKdotNET (AS24863)</a>, <a href="https://radar.cloudflare.com/as24835">Vodafone Egypt (AS24835)</a>, and <a href="https://radar.cloudflare.com/as36992">Etisalat (AS36992)</a>, as well as traffic at a national level, as seen in the graphs below. Although <a href="https://pub468.ayam.news/115707">one news report claimed</a> that the disruption, which occurred between 14:15 - 00:00 local time (12:15 - 22:00 UTC), was due to damage to the <a href="https://www.submarinecablemap.com/submarine-cable/flag-europe-asia-fea">FLAG</a> and <a href="https://www.submarinecablemap.com/submarine-cable/seamewe-4">SeaMeWe-4</a> submarine cables, a <a href="https://twitter.com/telecomegypt/status/1732300454711755192">subsequent post from Telecom Egypt</a> about service restoration dispelled that claim, noting “<i>The company also confirms that there is no truth to what has been circulated on some social media sites about the presence of a break in one of the submarine cables.</i>”</p>
    <div>
      <h3>Tunisia</h3>
      <a href="#tunisia">
        
      </a>
    </div>
    <p>A <a href="https://twitter.com/Lechatquirit/status/1736366153855811657">reported DNS server outage</a> (albeit unconfirmed) at <a href="https://radar.cloudflare.com/tn">Tunisian</a> Internet provider <a href="https://radar.cloudflare.com/as37705">Topnet (AS37705)</a> caused a brief Internet disruption for the provider’s customers on December 17, also impacting traffic volumes at a national level. The incident lasted less than two hours, from 13:00 - 14:45 local time (12:00 - 13:45 UTC).</p>
    <div>
      <h3>Guinea</h3>
      <a href="#guinea">
        
      </a>
    </div>
    <p>An <a href="https://twitter.com/orangeguinee_gn/status/1738145903515517298">unspecified incident</a> on the <a href="https://radar.cloudflare.com/as37461">Orange Guinée (AS37461)</a> network impacted Internet connectivity, as well as telephone calls and text messages during the morning of December 22. The graph below shows a near-complete outage on the network between 09:15 - 11:30 local time (09:15 - 11:30 UTC). The provider <a href="https://twitter.com/orangeguinee_gn/status/1738181857324253552">posted a subsequent update</a> regarding the restoration of calls, text messages, and Internet connectivity.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Within the <a href="https://radar.cloudflare.com/year-in-review/2023#internet-outages">Cloudflare Radar 2023 Year in Review</a>, we highlighted over 180 major Internet disruptions that were observed year-to-date through the end of November, though the actual number was likely closer to 200 by the end of the year. While that may seem like a lot, it is worth nothing that the actual number is even higher, as these posts are not exhaustive in their coverage of such events. For example, while we covered the Internet shutdown in Manipur, India that took place across multiple months in 2023, <a href="https://internetshutdowns.in/">internetshutdowns.in</a> shows that over 90 more smaller localized shutdowns were put into place across the country.</p><p>In addition, 2024 is shaping up to be an important year for elections, with voting taking place in more than <a href="https://www.weforum.org/agenda/2023/12/2024-elections-around-world/">50 countries around the world</a>. Unfortunately, some countries have taken to implementing Internet shutdowns or otherwise disrupting Internet connectivity during elections. The <a href="https://freedomonlinecoalition.com/joint-statement-internet-shutdowns-and-elections/">Freedom Online Coalition’s Joint Statement on Internet Shutdowns and Elections</a> details the detrimental effects of such actions. The Cloudflare Radar team will be monitoring for election-related Internet shutdowns, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center">Cloudflare Radar Outage Center</a>, via social media, and in posts on <a href="/tag/cloudflare-radar/">blog.cloudflare.com</a>.</p><p>Follow us on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (X), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or contact us via email.</p>
    <div>
      <h2>Watch on Cloudflare TV</h2>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <guid isPermaLink="false">3jPeETqqS2lSPcVevWFbub</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Q3 2023 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q3-2023-internet-disruption-summary/</link>
            <pubDate>Wed, 25 Oct 2023 13:05:00 GMT</pubDate>
            <description><![CDATA[ In this post, we review selected Internet disruptions observed by Cloudflare during the third quarter of 2023, supported by traffic graphs from Cloudflare Radar and other internal Cloudflare tools, and grouped by associated cause or common geography ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5dk6TMORhkty538Rk55VxX/625b390a1bbc25ad1bd67e4f8a3cf813/image12-1.png" />
            
            </figure><p>Cloudflare operates in more than 300 cities in over 100 countries, where we interconnect with over 12,500 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions.</p><p>We have been publishing these summaries since the first quarter of 2022, and over that time, the charts on Cloudflare Radar have evolved. Many of the traffic graphs in early editions of this summary were screenshots from the relevant traffic pages on Radar. Late last year, we launched the ability to download graphs, and earlier this year, to embed dynamic graphs, and these summaries have taken advantage of those capabilities where possible. Sharp-eyed readers may notice an additional evolution in some of the graphs below: yellow highlighting indicating an observed “traffic anomaly”. Identification of such anomalies, along with the ability to be notified about them, as well as a timeline enhancement (embedded below) to the <a href="https://radar.cloudflare.com/outage-center/">Cloudflare Radar Outage Center</a>, were launched as part of Birthday Week at the end of September. More information on these new features can be found in our <a href="/traffic-anomalies-notifications-radar/">announcement blog post</a>.</p><p>As we have seen in previous quarters, Iraq pursued an aggressive plan of <a href="#governmentdirected">government-directed</a> Internet shutdowns intended to prevent cheating on exams, and several other African countries implemented politically motivated shutdowns. <a href="#cablecuts">Damage</a> to several submarine cables, as well as <a href="#maintenance">planned maintenance</a> to others, caused Internet disruptions across a number of countries during the third quarter. Natural disasters, including <a href="#fire">wildfires</a> and an <a href="#earthquake">earthquake</a>, caused issues with connectivity, as did <a href="#poweroutages">power outages</a> in multiple countries. An acknowledged <a href="#cyberattack">cyberattack</a> resulted in a major US university intentionally disconnecting from the Internet, while a number of other major Internet providers <a href="#unspecifiedissues">acknowledged problems</a> on their networks without ever disclosing the root cause of those problems.</p><p><i>(Note that the Internet disruptions related to the Israel/Palestine conflict are not covered in this post, as they began on October 7 in Q4 of 2023. Disruptions related to this conflict are being tracked, with additional insights found on the </i><a href="/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks/"><i>Cloudflare blog</i></a><i> and </i><a href="https://twitter.com/CloudflareRadar"><i>@CloudflareRadar</i></a><i> on X/Twitter.)</i></p><h2> Government directed</h2><p>Because the Internet has become a critical communications tool, Internet shutdowns are often used by governments as a means of controlling communication both within a country and with the outside world. These government-directed shutdowns are imposed for a variety of reasons, including during periods of civil unrest and protests around elections, and as a deterrent against cheating during exams.</p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>As we have discussed in past summaries, Internet shutdowns are used by some governments in an attempt to prevent cheating on national high school or baccalaureate exams. These shutdowns have a nationwide impact, and it isn’t clear whether they are ultimately successful at mitigating cheating. As we have also discussed in the past, such shutdowns frequently occur in <a href="https://radar.cloudflare.com/iq">Iraq</a>, and that was certainly the case during the third quarter, with rounds of shutdowns occurring during all three months.</p><p>The first round of exam-related Internet shutdowns during the quarter in Iraq was a continuation of a set that started in June, and continued on into July, targeting cheating on 9th and 12th grade exams. On ten days between July 4 and July 17, Internet connectivity was shut down on <a href="https://radar.cloudflare.com/as203214">AS203214 (HulumTele)</a>, <a href="https://radar.cloudflare.com/as59588">AS59588 (ZAINAS-IQ)</a>, <a href="https://radar.cloudflare.com/as199739">AS199739 (Earthlink)</a>, <a href="https://radar.cloudflare.com/as203735">AS203735 (Capacities-LTD)</a>, <a href="https://radar.cloudflare.com/as51684">AS51684 (ASIACELL)</a>, and <a href="https://radar.cloudflare.com/as58322">AS58322 (Halasat)</a> in Iraq (except for the Kurdistan Region) between 04:00 - 08:00 local time (01:00 - 05:00 UTC).</p><p>During the second week of August, several networks in the Kurdistan region of Iraq again implemented daily exam-related Internet shutdowns due to a <a href="https://twitter.com/964English/status/1688157983170322432">second round of exams for 12th grade students</a>. These shutdowns took place between 06:00 - 08:00 local time (03:00 - 05:00 UTC), and impacted <a href="https://radar.cloudflare.com/as21277">AS21277 (Newroz Telecom)</a>, <a href="https://radar.cloudflare.com/as48492">AS48492 (IQ-Online)</a>, and <a href="https://radar.cloudflare.com/as59625">AS59625 (KorekTel)</a> from August 6-13. These two hour shutdowns were <a href="/q2-2023-internet-disruption-summary/">similar to those seen in the region</a> in June.</p><p>A second round of 9th grade exams in August drove a week of Internet shutdowns across Iraq (except the Kurdistan region) between August 21 and August 29. Connectivity was shut down between 04:00 - 08:00 local time (01:00 - 05:00 UTC) across the same networks impacted by the shutdowns implemented in July.</p><p>Following the second round of 9th grade exams in August, the second round of 12th grade exams in Iraq (except the Kurdistan region) occurred in September, and with these exams, came yet another round of Internet shutdowns. Impacting the same set of network providers as the previous two months, these shutdowns occurred between September 17-30. However, while they started at the same time (04:00 local time, 01:00 UTC), they were shorter than previous rounds, ending an hour earlier (07:00 local time, 04:00 UTC).</p>
    <div>
      <h3>Senegal</h3>
      <a href="#senegal">
        
      </a>
    </div>
    <p>On July 31, following the arrest of the Senegalese opposition leader, the Senegalese Ministry of Communication, Telecommunications and the Digital Economy <a href="/q2-2023-internet-disruption-summary/">once again</a> <a href="https://pulse.internetsociety.org/shutdowns/senegal-government-imposes-mobile-internet-shutdown">ordered the disconnection of mobile Internet connectivity</a> in <a href="https://radar.cloudflare.com/sn">Senegal</a> as shown in the communiqué below. These disruptions to mobile Internet access were visible on two of the four network providers within the country: <a href="https://radar.cloudflare.com/as37196">AS37196 (Sudatel Senegal)</a> and <a href="https://radar.cloudflare.com/as37649">AS37649 (Tigo/Free)</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1JxpkeVNrHblQw8c1MCQYP/a7b634889eef67ea5152dfab56df93e9/Screenshot-2023-10-23-at-17.14.06.png" />
            
            </figure><p>As shown in the graphs below, the shutdowns began mid-morning local time, generally between 08:00 and 10:00, from July 31 through August 5, and ended early the next morning, generally between midnight and 02:00. The final shutdown on August 5 was an exception, ending at 22:00 local time on both networks. (Senegal is UTC+0, so the local times are the same as UTC.)</p>
    <div>
      <h3>Ethiopia</h3>
      <a href="#ethiopia">
        
      </a>
    </div>
    <p>Following days of clashes between the federal military and local militia, <a href="https://www.nasdaq.com/articles/mobile-internet-outages-in-ethiopias-amhara-amid-fighting-residents-say">mobile Internet connectivity was shut down</a> in Amhara, <a href="https://radar.cloudflare.com/et">Ethiopia</a>. Cloudflare saw traffic to the region drop around 21:00 local time (18:00 UTC) on August 2. This is the second time that authorities have shut down mobile Internet connectivity in Amhara in 2023 — the first time was on April 6 after protests broke out following the federal government’s move to disband regional security forces. (Note that the country is no stranger to Internet shutdowns, as they have taken such action <a href="https://docs.google.com/spreadsheets/d/1DvPAuHNLp5BXGb0nnZDGNoiIwEeu2ogdXEIDvT4Hyfk/edit?usp=sharing">multiple times over the last several years</a>.) Despite <a href="https://www.accessnow.org/press-release/amhara-internet-shutdown/">calls to restore connectivity</a>, mobile Internet remained unavailable through the end of the third quarter, as seen in the figure below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6PWWbRPqM5CfHRsG2wQUoT/336ca24a21f24153a7a60263a59a73f8/Sep-30---Ethiopia---Amhara.png" />
            
            </figure>
    <div>
      <h3>Gabon</h3>
      <a href="#gabon">
        
      </a>
    </div>
    <p>On August 26, following contentious presidential elections in <a href="https://radar.cloudflare.com/ga">Gabon</a>, Internet connectivity was shut down in order to <a href="https://www.france24.com/fr/afrique/20230826-pr%C3%A9sidentielle-au-gabon-couvre-feu-instaur%C3%A9-et-internet-coup%C3%A9">"prevent the spread of calls for violence"</a>. As shown in the figure below, traffic began to fall just before 17:00 local time (16:00 UTC), and remained at zero through approximately 07:30 local time (06:30 UTC) on August 30. <a href="https://www.reuters.com/world/africa/gabonese-military-officers-announce-they-have-seized-power-2023-08-30/">Connectivity was restored</a> hours after military officers seized power in the country, placing President Ali Bongo under house arrest and naming a new leader after the country’s election body announced Bongo had won a third term.</p><h2> Cable cuts</h2>
    <div>
      <h3>Cameroon</h3>
      <a href="#cameroon">
        
      </a>
    </div>
    <p>On July 7, an X/Twitter <a href="https://twitter.com/Camtelonline/status/1677298034852483075">post</a> from <a href="https://camtel.cm/">Cameroon Telecommunications</a> alerted subscribers to disruptions to voice and data services, with a subsequent <a href="https://twitter.com/Camtelonline/status/1677384867238252545">post</a> nearly six hours later noting that services had been re-established. Although these posts did not provide details on the cause of the disruption, a <a href="https://www.facebook.com/camtelonline/posts/pfbid02VFYsyC5tKEPr2TLcEXRd9ShE8gq8pWHYA253reirbGHjb9tb3UCptjc3CogYLJ1il">Facebook post</a> from the operator included an attached communiqué explaining that “<i>The optical fibre has been severed by road maintenance operations, causing major disruptions in the delivery of our services.</i>” The figure below shows the impact of this fiber damage, with traffic from <a href="https://radar.cloudflare.com/as15964">AS15964 (CAMNET-AS)</a> dropping sharply around 11:30 local time (10:30 UTC), and returning to expected levels by 18:00 local time (17:00 UTC).</p>
    <div>
      <h3>Liberia</h3>
      <a href="#liberia">
        
      </a>
    </div>
    <p>Damage to the <a href="https://www.submarinecablemap.com/submarine-cable/africa-coast-to-europe-ace">Africa Coast to Europe (ACE)</a> submarine cable disrupted Internet connectivity in <a href="https://radar.cloudflare.com/lr">Liberia</a> on July 28. A <a href="https://www.facebook.com/TelecommunicationsAuthorityLIBERA/posts/pfbid0ZHbnyKHtkUPycRke7dspbQQ1GdKpfTdc2fQm1HmSLaip1ds28kwm7gRYLoBeoVUnl">Facebook post</a> from the <a href="http://lta.gov.lr">Liberia Telecommunications Authority (LTA)</a> noted “The Liberia Telecommunications Authority(LTA) announces the temporary interruption of all nationwide Internet services due to the breakdown of the Africa Coast to Europe Cable in Ivory Coast.” and also highlighted that the ACE cable serves as the “sole source of internet connectivity between Europe and Liberia”. The figure below shows a near complete loss of traffic starting at 13:00 local time (13:00 UTC) and gradually recovering over the next several hours, returning to expected levels by 17:00 local time (17:00 UTC).</p>
    <div>
      <h3>Togo, Benin, Namibia, and the Republic of Congo (Brazzaville)</h3>
      <a href="#togo-benin-namibia-and-the-republic-of-congo-brazzaville">
        
      </a>
    </div>
    <p>On August 6, the <a href="https://www.submarinecablemap.com/submarine-cable/west-africa-cable-system-wacs">West African Cable System (WACS)</a> and the <a href="https://www.submarinecablemap.com/submarine-cable/sat-3wasc">South Atlantic 3 (SAT–3)</a> undersea cables were <a href="https://www.kentik.com/blog/dual-subsea-cable-cuts-disrupt-african-internet/">damaged by an undersea landslide</a> in the Congo Canyon, located at the mouth of the Congo River. The damage to the cables impacted Internet connectivity in <a href="https://radar.cloudflare.com/tg">Togo</a>, <a href="https://radar.cloudflare.com/bj">Benin</a>, <a href="https://radar.cloudflare.com/na">Namibia</a>, and the <a href="https://radar.cloudflare.com/cg">Republic of Congo (Brazzaville)</a>. Social media posts from <a href="https://twitter.com/TelecomNamibia/status/1688867775601844224">Telecom Namibia</a> and <a href="https://twitter.com/canalboxcongo/status/1688856878988623872">Canalbox Congo</a> alerted subscribers that connectivity would be impacted as a result of the damage to the cables.</p><p>Cable repair ship <a href="https://www.marinetraffic.com/en/ais/home/shipid:761048/zoom:10">CS Leon Thevenin</a> was called upon to perform repairs, but it took <a href="https://twitter.com/philBE2/status/1696246908954542552">several weeks for it to arrive</a> at the site of the damage, and then <a href="https://twitter.com/philBE2/status/1699071287807955020">additional time to perform the repairs</a>, which were <a href="https://www.news24.com/news24/tech-and-trends/news/internet-speed-relief-a-snapped-undersea-cable-is-now-fixed-20230907">reportedly completed on September 6</a>. Network operators in impacted countries were able to <a href="https://www.kentik.com/blog/dual-subsea-cable-cuts-disrupt-african-internet/">shift some traffic to alternate cables</a>, such as Google’s <a href="https://www.submarinecablemap.com/submarine-cable/equiano">Equiano</a> cable, which went live in February 2023.</p><p>As such, the graphs below illustrate that there was not a complete loss of traffic for impacted countries. To that end, traffic in Togo appeared to recover several weeks before the cable repairs were completed. The full impact is harder to see in the graphs for Benin, Namibia, and the Republic of Congo (Brazzaville) because the selected timeframe is long enough to force data aggregation at a daily level, but it is clearly visible in graphs covering shorter periods of time (with data aggregation at an hourly level) during the weeks after the cable cut occurred.</p>
    <div>
      <h3>South Sudan</h3>
      <a href="#south-sudan">
        
      </a>
    </div>
    <p>Highlighting the interconnected nature of the Internet, fiber cuts in <a href="https://radar.cloudflare.com/ug">Uganda</a> caused a brief Internet disruption for customers on <a href="https://radar.cloudflare.com/as37594">MTN South Sudan (AS37594)</a> on August 14, occurring between 13:00 - 15:00 local time (11:00 - 13:00 UTC), and <a href="https://stats.labs.apnic.net/cgi-bin/aspop?c=ss">impacting an estimated 438,000 users</a>. An X/Twitter <a href="https://twitter.com/MTNSSD/status/1691086728457531392">post</a> from the provider that afternoon told subscribers “<i>We sincerely apologize for the network issues experienced over the last couple of hours. It was due to multiple fiber cuts in Uganda.</i>”</p><h2> Cyberattack</h2>
    <div>
      <h3>University of Michigan</h3>
      <a href="#university-of-michigan">
        
      </a>
    </div>
    <p>On August 27, a “significant security concern” led the <a href="https://umich.edu/">University of Michigan</a> to <a href="https://www.mlive.com/news/ann-arbor/2023/08/significant-security-concern-prompted-internet-outage-at-university-of-michigan.html">shut down the Internet</a> on the Ann Arbor, Flint and Dearborn campuses. Although the shutdown occurred at the start of the new school year, classes continued as scheduled, but an <a href="https://web.archive.org/web/20230829122845/https://www.umich.edu/announcements/">announcement</a> posted by the University detailed the impact of disconnecting from the Internet, including potential delays in financial aid refunds and the unavailability of certain campus systems. The impact of the disconnection can be seen in the figure below, appearing as a significant drop in traffic starting just before 14:00 local time (18:00 UTC) on August 27, and lasting until just after 08:00 local time (12:00 UTC) on August 30 on <a href="https://radar.cloudflare.com/as36375">AS36375 (UMICH-AS-5)</a>, the primary autonomous system used by the University of Michigan.</p><h2> Fire</h2>
    <div>
      <h3>Lahaina, Hawaii</h3>
      <a href="#lahaina-hawaii">
        
      </a>
    </div>
    <p>In early August, a <a href="https://en.wikipedia.org/wiki/2023_Hawaii_wildfires">series of wildfires</a> broke out in the state of Hawaii, predominantly on the island of Maui. The town of <a href="https://en.wikipedia.org/wiki/Lahaina,_Hawaii">Lahaina</a> was one of the hardest hit, with the fires <a href="https://mauinow.com/2023/10/05/one-more-lahaina-fire-victim-identified-by-police-death-toll-is-98-unaccounted-for-is-12/">killing nearly 100 people</a>, as well as destroying homes, businesses, and infrastructure, causing power outages and disrupting Internet connectivity. The graph below shows traffic to Cloudflare from Lahaina dropping to near zero around 21:00 local time on August 7 (07:00 UTC on August 8), and remaining at minimal levels through August 30. Some recovery of Internet traffic can be seen through the end of September as cleanup and repairs progressed, and as wireless operators <a href="https://www.fiercewireless.com/wireless/wireless-operators-scramble-restore-service-after-maui-wildfires">deployed temporary network assets</a> in an effort to restore some service capacity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6QPriwnFS9bqWubV8OofZu/ac93e1a4c38141cdcc9d8d43cc2ccb25/Sep-30---US---Hawaii---Lahaina.png" />
            
            </figure><h2> Earthquake</h2>
    <div>
      <h3>Morocco</h3>
      <a href="#morocco">
        
      </a>
    </div>
    <p>At 23:11 local time on September 8 (22:11 UTC), a <a href="https://twitter.com/LastQuake/status/1700271514925297843?s=20">magnitude 6.8 earthquake</a> occurred in <a href="https://radar.cloudflare.com/ma">Morocco</a>, centered 79 kilometers (49 miles) southwest of Marrakesh. Nearly 3,000 deaths were reported as a result of the quake, and <a href="https://en.wikipedia.org/wiki/2023_Marrakesh%E2%80%93Safi_earthquake#Impact">significant damage was reported</a>, including the collapse of schools, houses, and historic buildings. Power outages and infrastructure damage also impacted Internet connectivity in the region, leading to largely localized disruptions.</p><p>The country-level graph below shows a nominal loss of traffic in Morocco after the earthquake, remaining slightly lower than expected for approximately four days. However, the impacts are more evident at a regional level, with the earthquake causing an immediate 64% drop in traffic in Marrkesh-Safi, a 64% loss in Souss-Massa, and a 49% decline in Casablanca-Settat. Peak traffic levels in these regions remained slightly lower than those seen in previous weeks for several days after the earthquake occurred.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Qn9u4J8L1g6m8FGnk5s99/1530fc7ceb43330b5b2a0d15a48c8e4d/Sep-8-13-Morocco---regional.jpeg.jpeg" />
            
            </figure><h2> Power outages</h2>
    <div>
      <h3>Curaçao</h3>
      <a href="#curacao">
        
      </a>
    </div>
    <p>On July 27, a <a href="https://twitter.com/CloudflareRadar/status/1684688380200718336">malfunction at a major Aqualectra Utility power distribution center</a> resulted in 70% of neighborhoods in <a href="https://radar.cloudflare.com/cw">Curaçao</a> losing power. The power outage resulted in an island-wide Internet disruption. As seen in the graph below, Internet traffic fell sharply at around 12:30 local time (16:30 UTC), remaining largely flat for approximately five hours before starting to recover around 17:30 local time (21:30 UTC). The start of the recovery aligns with the timing of a <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02pAwrM5qat5vsRpxpGeDz9AfJyqzeyXYT4AVecxjCJWN93QyKsGRCktzWnCLWsHX5l">Facebook post made at 18:00 local time</a> by Aqualectra Utility noting that “<i>55% of Curaçao’s power supply has been restored.</i>” The ongoing traffic increase is in line with additional neighborhoods having power restored, with traffic returning to expected levels by around 22:00 local time (2:00 UTC on July 28).</p>
    <div>
      <h3>Brazil</h3>
      <a href="#brazil">
        
      </a>
    </div>
    <p>A <a href="https://abcnews.go.com/Business/wireStory/widespread-blackout-leaves-parts-brazil-electricity-102282449">widespread power outage in Brazil</a> starting at 08:30 local time (11:30 UTC) on August 15 resulted in a nominal disruption to Internet traffic within the country. Although the power outage represented a loss of approximately <a href="https://www.linkedin.com/pulse/bazil-blackout-15th-august-2023-member-ieee-cigre-eei">27% of the total electric load</a> at the time it occurred, the impact to the country’s Internet traffic was much lower, as seen in the graph below. Traffic returned to expected levels by around 11:30 local time (14:30 UTC).</p>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>A “system disturbance” at 21:45 local time (18:45 UTC) on August 25 led to “loss of bulk power supply to various parts of the country” in <a href="https://radar.cloudflare.com/ke">Kenya</a>, according to an <a href="https://twitter.com/CloudflareRadar/status/1695235744258838585">X/Twitter post</a> from <a href="https://www.kplc.co.ke/">Kenya Power</a>. The impact of the power outage is visible in the graph below, with traffic dropping as power is lost. Subsequent updates from Kenya Power on August 26 (<a href="https://twitter.com/KenyaPower_Care/status/1695195264670183754">1</a>, <a href="https://twitter.com/KenyaPower_Care/status/1695229820823556483">2</a>, <a href="https://twitter.com/KenyaPower/status/1695353129368277431">3</a>) highlighted the progress made in restoring electricity across the country. Internet traffic from the country returned to expected levels by 03:00 on August 27 (00:00 UTC).</p>
    <div>
      <h3>French Guiana</h3>
      <a href="#french-guiana">
        
      </a>
    </div>
    <p>An 11-hour Internet disruption in <a href="https://radar.cloudflare.com/gf">French Guiana</a> on August 27 was the result of a <a href="https://www-franceguyane-fr.translate.goog/actualite/faitsdivers/coupure-delectricite-saint-laurent-du-maroni-et-ses-environs-retrouvent-le-courant-950591.php?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp">power outage</a> caused by “<i>a problem that occurred at the energy evacuation station which connects Petit-Saut to the Kourou-Saint-Laurent line</i>”. The power outage caused a nationwide drop in Internet traffic between 11:00 local time (14:00 UTC) and 22:00 local time (01:00 UTC on August 28), visible in the graph below.</p>
    <div>
      <h3>Tunisia</h3>
      <a href="#tunisia">
        
      </a>
    </div>
    <p>A fire at the <a href="https://www.steg.com.tn/fr/index.html">Tunisian Company of Electricity and Gas</a> power station in Rades, Ben Arous Governorate caused a <a href="https://crisis24.garda.com/alerts/2023/09/tunisia-power-outages-ongoing-nationwide-early-sept-20">widespread power outage</a> in <a href="https://radar.cloudflare.com/tn">Tunisia</a>, resulting in an Internet disruption starting at 01:00 local time (00:00 UTC) on September 20. Traffic remained lower than expected for approximately five hours, as shown in the graph below, in line with a <a href="https://africannugget.com/new-tunisia-suffers-widespread-power-outage/">published report</a> that noted “<i>The unexpected outage lasted for over four hours in some areas of the country.</i>”</p>
    <div>
      <h3>Barbados</h3>
      <a href="#barbados">
        
      </a>
    </div>
    <p>A September 21 <a href="https://www.facebook.com/blpconline/posts/pfbid024uwgnaqzD57ca5sJ21mZcnffdHeMkPzthekwaUNWaio7PuyWJNvEVBpPquY2KAqWl">Facebook post</a> from <a href="https://www.blpc.com.bb/">The Barbados Light &amp; Power Company Limited</a> noted that the company was aware of an outage affecting customers, and that they were “<i>working to promptly and safely restore power in the shortest time possible.</i>” This outage resulted in a significant drop in Internet traffic from the country starting at 11:30 local time (15:30 UTC). A subsequent <a href="https://www.facebook.com/blpconline/posts/pfbid02dG4fzDSJfjS7Q2NnacvLjU6rSp52UyjPMerX9xjnJQNcEwr2KVq27twKRLaufwLEl">Facebook post</a> from the utility company at 20:00 local time (00:00 UTC on September 22) noted that power had been restored to all customers. Ahead of full power restoration, Internet traffic had returned to expected levels around 17:00 local time (21:00 UTC).</p><h2> Maintenance</h2>
    <div>
      <h3>Guinea</h3>
      <a href="#guinea">
        
      </a>
    </div>
    <p><a href="https://en.wikipedia.org/wiki/Guin%C3%A9enne_de_Large_Bande">La Guinéenne de la Large Bande</a>, also known as GUILAB, is the company responsible for managing the capacity allocated to the country of <a href="https://radar.cloudflare.com/gn">Guinea</a> on the <a href="https://www.submarinecablemap.com/submarine-cable/africa-coast-to-europe-ace">Africa Coast to Europe (ACE)</a> submarine cable. According to a (translation of the) <a href="https://www.facebook.com/photo?fbid=1096640891463744&amp;set=a.787672269027276">communiqué posted by the company</a> on Facebook, planned maintenance on the cable would be taking place between 22:00 on July 14 and 06:18 "sharp" on July 15 (22:00 on July 14 and 06:18 on July 15 UTC). This maintenance resulted in a complete Internet outage in Guinea, as seen in the graph below. It appears that the ACE submarine cable is Guinea’s sole international Internet connection, with no other backup submarine or terrestrial connectivity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/cRXHlT0Q2qbtZvWVvZ9hW/0386fa98651ca3acc25ab9451b41f664/Screenshot-2023-10-23-at-18.02.31.png" />
            
            </figure>
    <div>
      <h3>Palau</h3>
      <a href="#palau">
        
      </a>
    </div>
    <p>Just a few days later, planned maintenance to another submarine cable took <a href="https://radar.cloudflare.com/pw">Palau</a>, an island country in the western Pacific, completely offline for several days. According to a <a href="https://www.facebook.com/connectingpalau/posts/pfbid0213hUTxWFruhe3K211F6VRNL9iLZzV5Y3vMvJoscDgQyQeVdZ1a5ip81dkFnp5egsl">press release from the Palau National Communications Corporation (PNCC)</a> posted to their Facebook page, “<a href="https://belaucable.com/"><i>BSCC (Belau Submarine Cable Corporation)</i></a><i> has been notified that an emergency repair will be undertaken on the </i><a href="https://www.submarinecablemap.com/submarine-cable/sea-us"><i>SEA – US cable network</i></a><i> in Guam from Tuesday, July 18th 7:00 a.m. Palau time, and expected to be completed 5:00 p.m. Saturday, July 22nd. … For safety reasons, repairs can only be undertaken when the cable is not powered. Since BSCC’s Palau Cable Network No 1 connects to SEA – US for onward transport to Guam, BSCC will be unable to provide service for the duration of the repair. BSCC will be unable to provide any international connectivity for Palau. The only available international connection will be via PNCC satellite connection, which will provide limited capacity compared to normal cable service.</i>”</p><p>The graph below shows that Cloudflare did not see any appreciable traffic from Palau’s backup satellite connection during the duration of the repairs, as traffic dropped to zero at 07:00 local time on July 18 (22:00 UTC on July 17), and remained there until around 18:00 local time on July 21 (09:00 UTC), as the repairs were completed earlier than expected. A <a href="https://www.pnccpalau.com/img/pages/news/2023/2023072118/palaus-internet-service-restored-effective-july-21-2023.jpg">PNCC press release</a> confirmed this early completion, noting “<i>PNCC is pleased to inform the public that Internet and Mobile Data services for our customers have been restored, due to the early completion today of the emergency repairs on the SEA-US Submarine Cable System, our main off-island internet connection.</i>”</p><h2> Unspecified issues</h2>
    <div>
      <h3>Spectrum (Charter Communications)</h3>
      <a href="#spectrum-charter-communications">
        
      </a>
    </div>
    <p>At 14:03 Eastern Time (18:03 UTC) on August 17, the X/Twitter support account for <a href="https://www.spectrum.com/">Spectrum</a>, a brand of US-based Internet service provider <a href="https://corporate.charter.com/about-charter">Charter Communications</a>, posted a statement that noted “<i>We are aware of an outage affecting customers in Alabama, Georgia and Tennessee. We apologize for the inconvenience and are working to resolve as quickly as possible. Thank you.</i>” The graphs below show the varied impacts to traffic seen from <a href="https://radar.cloudflare.com/as20115">Spectrum (AS20115)</a> across the listed states, as well as Texas, which wasn’t initially cited by Spectrum as having an issue, though customers quickly called it out.</p><p>A near complete outage was observed in Tennessee between 12:30 - 14:00 local time (17:30 - 19:00 UTC), while a brief drop in traffic at 12:00 local time (17:00 UTC) and quick recovery ahead of another drop at 13:30 local time (18:30 UTC) was seen in Alabama. Georgia also saw an initial drop in traffic at 13:00 local time (17:00 UTC) ahead of a larger fall at 14:30 local time (18:30 UTC), while traffic from Texas only experienced a decline at 13:30 local time (18:30 UTC). Traffic volumes from all four impacted states recovered within several hours — approximately three hours after the initial post, Spectrum’s support account <a href="https://twitter.com/Ask_Spectrum/status/1692283651088892075">stated</a> “<i>We have received confirmation repairs have been completed and services have been restored to affected customers in the Alabama, Georgia and Tennessee area.</i>”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gHHA0gEAJVro9BP4x7YhZ/879f681f5b97abca6fa60fadb27004f2/Aug-17---US---Tennessee.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2xMtXNg9V20ofyqAAXyM8Q/313e0cf80407978b6d34c4d40e4e4788/Aug-17---US---Alabama.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Q3MwtERj1XuSy1vixSRNw/d28188b5e18cd0db2b2a152617a9ced1/Aug-17---US---Georgia.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6w9apq0T1yH238tYxAS7xX/1da7e64febf5deca94405f50f68a88f8/Aug-17---US---Texas.png" />
            
            </figure>
    <div>
      <h3>Starlink</h3>
      <a href="#starlink">
        
      </a>
    </div>
    <p>On September 12, satellite Internet service provider <a href="https://www.starlink.com/">SpaceX Starlink</a> experienced a brief but complete outage. The graph below shows traffic from <a href="https://radar.cloudflare.com/AS14593">AS14593 (SPACEX-STARLINK)</a> dropping at 23:15 UTC, but quickly recovering, returning to normal within 90 minutes. At 00:33 UTC on September 13, <a href="https://twitter.com/Starlink/status/1701756057171951888">Starlink shared an X/Twitter post</a> stating “<i>Starlink is currently in a network outage, and we are actively implementing a solution. We appreciate your patience, we'll share an update once this issue is resolved</i>” and just over an hour later, posted “<i>The network issue has been fully resolved</i>”.</p>
    <div>
      <h3>Sky UK</h3>
      <a href="#sky-uk">
        
      </a>
    </div>
    <p>During the evening (UTC) of September 19, <a href="https://twitter.com/search?f=live&amp;q=outage%20(%40skyuk)%20until%3A2023-09-20%20since%3A2023-09-19&amp;src=typed_query">numerous complaints could be found on social media</a> about a nationwide outage across the <a href="https://radar.cloudflare.com/gb">United Kingdom</a> on <a href="https://radar.cloudflare.com/as5607">Sky Broadband (AS5607)</a>. A sharp drop in traffic from Sky Broadband can be seen in the graph below starting at 21:00 UTC, but a full outage did not appear to have taken place. Traffic volumes below expected levels lasted until approximately 01:00 UTC on September 20. While the issue was <a href="https://twitter.com/SkyHelpTeam/status/1704416323717980310">acknowledged by Sky’s support account</a> on X/Twitter, no root cause for the disruption was ever provided.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>As we’ve noted in past quarterly summaries, this report is intended as a summary overview of observed disruptions, and not an exhaustive or complete list of issues that have occurred during the quarter. Some disruptions not covered here were visible in our data, but never acknowledged by the impacted provider, while others were reported by industry colleagues based on their measurement methodologies, but not clearly obvious in our traffic graphs.</p><p>As we indicated above, the Cloudflare Radar Outage Center now includes information on observed traffic anomalies as well as verified outages. Interested users can subscribe to notifications for both anomalies and outages — our <a href="/traffic-anomalies-notifications-radar/">blog post</a> includes more information on how to do so.</p><p>Visit <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for additional insights around Internet disruptions. Follow us on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (Twitter), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or contact us via email.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <guid isPermaLink="false">4bmuTknUrxJ8DUOH11OzR2</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Q2 2023 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q2-2023-internet-disruption-summary/</link>
            <pubDate>Thu, 27 Jul 2023 13:05:00 GMT</pubDate>
            <description><![CDATA[ In this post, we review selected Internet disruptions observed by Cloudflare during the second quarter of 2023, supported by traffic graphs from Cloudflare Radar and other internal Cloudflare tools, and grouped by associated cause or common geography ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2EsAmtsLnCpLq5r9OakjdR/51939154d1cff6dedc9ab5b84587111a/Global-Latency_new-colours-1.png" />
            
            </figure><p>Cloudflare operates in more than 300 cities in over 100 countries, where we interconnect with over 12,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions.</p><p>The second quarter of 2023 was a particularly busy one for Internet disruptions, and especially for government-directed Internet shutdowns. During the quarter, we observed many brief disruptions, but also quite a few long-lived ones. In addition to the <a href="#government-directed">government-directed Internet shutdowns</a>, we also observed partial or complete outages due to <a href="#severe-weather">severe weather</a>, <a href="#cable-damage">cable damage</a>, <a href="#power-outages">power outages</a>, general or unspecified <a href="#technical-problems">technical problems</a>, <a href="#cyberattacks">cyberattacks</a>, <a href="#military-action">military action</a>, and <a href="#infrastructure-maintenance">infrastructure maintenance</a>.</p><p>As we have noted in the past, this post is intended as a summary overview of observed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter.</p><h2> Government directed</h2><p>Late spring often marks the start of a so-called “exam season” in several Middle Eastern and African countries, where students sit for a series of secondary school exams. In an attempt to prevent cheating on these exams, governments in the countries have taken to implementing wide-scale Internet shutdowns covering time periods just before and during the exams. We have covered these shutdowns in the past, including <a href="/sudans-exam-related-internet-shutdowns/">Sudan</a> and <a href="/syria-exam-related-internet-shutdowns/">Syria</a> in 2021 and <a href="/syria-sudan-algeria-exam-internet-shutdown/">Syria, Sudan, and Algeria</a> in 2022. This year, we saw governments in <a href="/exam-internet-shutdowns-iraq-algeria/">Iraq, Algeria</a>, and Syria taking such actions.</p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>In the weeks prior to the start of this year’s shutdowns, it was <a href="https://www.kurdistan24.net/en/story/31453-Iraq%E2%80%99s-communication-ministry-refuses-to-enforce-internet-blackout-for-final-exams">reported</a> that the Iraqi Ministry of Communications had announced it had refused a request from the Ministry of Education to impose an Internet shutdown during the exams as part of efforts to prevent cheating. Unfortunately, this refusal was short-lived, with shutdowns ultimately starting two weeks later.</p><p>In Iraq, two sets of shutdowns were observed: one impacted networks nationwide, except for the Kurdistan Region, while the other impacted networks within the Kurdistan Region. The former set of shutdowns were related to 9th and 12th grade exams, and were scheduled to occur from June 1 through July 15, between 04:00 and 08:00 local time (01:00 - 05:00 UTC). The graphs below show that during June, shutdowns took place on June 1, 4, 6, 8, 11, 13, 15, 17, 21, 22, 24, 25, and 26, resulting in significant disruptions to Internet connectivity. The shutdowns were implemented across a number of network providers, including <a href="https://radar.cloudflare.com/as203214">AS203214 (HulumTele</a>), <a href="https://radar.cloudflare.com/as59588">AS59588 (Zain)</a>, <a href="https://radar.cloudflare.com/as199739">AS199739 (Earthlink)</a>, <a href="https://radar.cloudflare.com/as203735">AS203735 (Net Tech)</a>, <a href="https://radar.cloudflare.com/as51684">AS51684 (Asiacell)</a>, and <a href="https://radar.cloudflare.com/as58322">AS58322 (Halasat)</a>. The orange-highlighted areas in the graphs below show traffic on each network provider dropping to zero during the shutdowns.</p><p>As noted above, exam-related Internet shutdowns were also implemented in the Kurdistan region of Iraq. One <a href="https://www.basnews.com/en/babat/809911">report</a> quoted the Minister of Education of the Kurdistan Regional Government as stating "<i>The Internet will be turned off as needed during exams, but just like in previous years, the period of the Internet shutdown will not be lengthy, but rather short.</i>” To that end, the observed shutdowns generally lasted about two hours, occurring between 06:30 and 08:30 local time (03:30 - 05:30 UTC) on June 3, 6, 10, 13, 17, and 24. The graphs below show the impact across three network providers in the region: <a href="https://radar.cloudflare.com/as21277">AS21277 (Newroz Telecom)</a>, <a href="https://radar.cloudflare.com/as48492">AS48492 (IQ Online)</a>, and <a href="https://radar.cloudflare.com/as59625">AS59625 (KorekTel)</a>.</p><p>Additional details about both sets of Internet shutdowns in Iraq can be found in our June 13 blog post: <a href="/exam-internet-shutdowns-iraq-algeria/"><i>Exam-related Internet shutdowns in Iraq and Algeria put connectivity to the test</i></a>.</p>
    <div>
      <h3>Algeria</h3>
      <a href="#algeria">
        
      </a>
    </div>
    <p>2023 marks the <a href="https://www.newarab.com/news/algeria-blocks-internet-stop-cheating-during-final-exams">sixth year</a> that Algeria has disrupted Internet connectivity to prevent cheating during nationwide exams. In <a href="/syria-sudan-algeria-exam-internet-shutdown/">2022</a>, we noted that “<i>it appears that the Algerian government has shifted to a content blocking-based approach, instead of a wide-scale Internet shutdown.</i>” It appears that the same approach was taken this year, as we again observed two nominal drops in traffic during each of the exam days, rather than a complete loss of traffic. These traffic shifts were observed on mobile network providers <a href="https://radar.cloudflare.com/as33779">AS33779 (Ooredoo/Wataniya)</a>, <a href="https://radar.cloudflare.com/as327931">AS327931 (Djezzy/Optimum)</a>, and <a href="https://radar.cloudflare.com/as327712">AS327712 (Mobilis/Telecom Algeria)</a>. The first disruption takes place between 08:00 - 12:00 local time (07:00 - 11:00 UTC), with the second occurring between 14:00 - 17:00 local time (13:00 - 16:00 UTC).</p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>After implementing four exam-related Internet shutdowns in 2022, this year saw just two. On June 25 and 26, Internet shutdowns took place between 05:00 - 08:30 local time (02:00 - 05:30 UTC). <a href="https://radar.cloudflare.com/as29256">Syrian Telecom (AS29256)</a>, the government-affiliated telecommunications company, informed subscribers in a <a href="https://www.facebook.com/syriantelecomcompany/posts/pfbid02vPpu2tTyEtxsaqupSF3MvqxrsMLTvJGpzYVvwzoQ3CFX3xuZJ23euJFkXxdZbtubl">Facebook post</a> that the Internet would be cut off at the request of the <a href="http://www.syrianeducation.org.sy/">Ministry of Education</a>.</p>
    <div>
      <h3>Senegal</h3>
      <a href="#senegal">
        
      </a>
    </div>
    <p>In Senegal, <a href="https://www.reuters.com/world/africa/senegals-protest-hit-capital-left-with-looted-shops-debris-2023-06-03/">violent protests</a> over the sentencing of opposition leader Ousmane Sonko to jail led the government to <a href="https://pulse.internetsociety.org/shutdowns/senegal-blocks-social-media-and-instant-messaging-amidst-protests">restrict access to platforms</a> including WhatsApp, Facebook, Twitter, Instagram, TikTok, Telegram, Signal, and YouTube. On June 4, the Senegal Ministry of Communication issued a statement temporarily suspending mobile Internet access, with a followup statement on June 6 ending the suspension. These disruptions to mobile Internet access were visible on two network providers within the country: <a href="https://radar.cloudflare.com/as37196">AS37196 (Sudatel Senegal)</a> and <a href="https://radar.cloudflare.com/as37649">AS37649 (Tigo/Free)</a>.</p><p>As shown in the graphs below, the shutdowns on Sudatel Senegal occurred from 15:00 local time on June 3 through 01:00 local time on June 5, and then again from 13:00 local time on June 5 until 01:00 local time on June 6. The three shutdowns seen on Tigo/Free took place between 15:30 - 19:00 local time on June 3, from 13:45 local time on June 4 until 02:05 local time on June 5, and from 13:05 local time on June 5 through 01:00 local time on June 6. (Senegal is UTC+0, so the local times are the same as UTC.)</p>
    <div>
      <h3>Mauritania</h3>
      <a href="#mauritania">
        
      </a>
    </div>
    <p>In Mauritania, <a href="https://www.barrons.com/news/mauritania-cuts-mobile-internet-after-violent-protests-d92e7204">authorities cut off mobile Internet services</a> after protests over the death of a young man in police custody. The shutdown began at 23:00 local time on May 30, and lasted six days, with connectivity returning at 23:00 local time on June 6. (Mauritania is UTC+0, so the local times are the same as UTC.) The graphs below show a near complete loss of Internet traffic during that period from <a href="https://radar.cloudflare.com/as37541">AS37541 (Chinguitel)</a> and <a href="https://radar.cloudflare.com/as37508">AS37508 (Mattel)</a>, two mobile network providers within the country.</p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>On May 9, Imran Khan, former Prime Minister of Pakistan was <a href="https://www.bbc.com/news/world-asia-65541518">arrested on corruption charges</a>. Following the arrest, <a href="https://www.aljazeera.com/news/2023/5/9/pakistan-blocks-social-media-platforms-restricts-internet">violent protests</a> erupted in several cities, leading the government of Pakistan to order the <a href="https://www.theguardian.com/world/2023/may/09/pakistan-former-pm-imran-khan-arrested-in-islamabad">shutdown of mobile Internet services</a>, as well as the <a href="https://www.aljazeera.com/news/2023/5/9/pakistan-blocks-social-media-platforms-restricts-internet">blocking of several social media platforms</a>. The figures below show the impact of the ordered shutdown to traffic on four mobile network providers within the country: <a href="https://radar.cloudflare.com/as24499">AS24499 (Telenor Pakistan)</a>, <a href="https://radar.cloudflare.com/as59257">AS59257 (China Mobile Pak)</a>, <a href="https://radar.cloudflare.com/as45669">AS45669 (Mobilink/Jazz)</a>, and <a href="https://radar.cloudflare.com/as56167">AS56167 (Ufone/PTML)</a>. The ordered shutdown caused a complete loss of Internet traffic from these networks that started at 22:00 local time (17:00 UTC) on May 9 at Telenor and China Mobile Pakistan, 18:00 local time (13:00 UTC) on Mobilink/Jazz, and 01:00 local time on May 10 (20:00 UTC on May 9) at Ufone/PTML. Traffic was restored at 22:00 local time (17:00 UTC) on May 12.</p><p>Looking at Cloudflare Radar’s <a href="/introducing-radar-internet-quality-page/">recently launched</a> <a href="https://radar.cloudflare.com/quality/pk">Internet Quality page for Pakistan</a> during the duration of the shutdown, we observed that median latency within Pakistan dropped slightly after mobile networks were shut down, shown in the graph below. Prior to the shutdown, median latency (as observed to Cloudflare and a set of other providers) was in the 90-100ms range, while afterward, it averaged closer to 75ms. This may be a result of users shifting to lower latency fixed broadband connections – several fixed broadband providers in the country experienced increased traffic volumes while the mobile networks were unavailable.</p><p>Additional details about the mobile network shutdowns, content blocking, and the impact at an administrative unit and city level can be found in our May 12 blog post <a href="/cloudflares-view-of-internet-disruptions-in-pakistan/"><i>Cloudflare’s view of Internet disruptions in Pakistan</i></a>.</p>
    <div>
      <h3>India</h3>
      <a href="#india">
        
      </a>
    </div>
    <p>Internet shutdowns are unfortunately frequent in India, with digital rights organization Access Now <a href="https://www.accessnow.org/press-release/keepiton-internet-shutdowns-2022-india/">reporting</a> at least 84 shutdowns within the country in 2022. The shutdowns are generally implemented at a more local level, and often last for a significant amount of time. One such shutdown took place in the northeastern Indian state of Manipur <a href="https://www.thehindu.com/news/national/other-states/curfew-in-eight-districts-of-manipur-mobile-internet-services-suspended-over-tribal-stir/article66809376.ece">starting on May 3</a> after the escalation of ethnic conflict, and was <a href="https://internetfreedom.in/the-duration-of-internet-shutdowns-in-manipur-crosses-10-days-iff-wrote-to-manipur-chief-secretary-urging-scrutiny-of-orders-keepiton/">reportedly</a> intended to <i>“thwart the design and activities of anti-national and anti-social elements… by stopping the spread of disinformation and false rumours''</i> and the likelihood of <i>“serious disturbances to the entire peaceful coexistence of the communities and maintenance of public order”</i>. Mobile data services were <a href="https://internetfreedom.in/manipur-letter-50-days-internet-shutdown/">initially suspended for a five-day period</a>, with the suspension continually extended through additional templated orders issued every five days.</p><p>The graphs below show the impact of the ordered shutdown to traffic from two major network providers in Manipur. Traffic from both <a href="https://radar.cloudflare.com/as45609">AS45609 (Airtel)</a> and <a href="https://radar.cloudflare.com/as9829">AS9829 (BSNL)</a> fell significantly around 18:00 local time (12:30 UTC) on May 4. Traffic on Airtel has remained low, and continued to drop further through the end of June. Traffic on BSNL showed slight signs of recovery starting in early June, but remains extremely low.</p><p>The shutdown order remains in place as of the time of this writing (late July).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5HwP1642cnLTIhbn0dXbq4/204f5a2b4ea57b219b19b73636ab38e8/May-June---India---Manipur---45609.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1GEtoALCbrzva79cbSFBJU/2abbc7a0abf1d3be0d29625920f557e8/May-June---India---Manipur---9829.png" />
            
            </figure><h2>Severe weather</h2>
    <div>
      <h3>Guam</h3>
      <a href="#guam">
        
      </a>
    </div>
    <p>On May 24, <a href="https://apnews.com/article/super-typhoon-mawar-guam-pacific-fd49b810f85f69d1e86f9ee6b0cc3583">“Super Typhoon” Mawar</a> wreaked havoc on the US territory of Guam, causing widespread physical damage after it made landfall, taking down trees, buildings, power lines, and communications infrastructure across the island. One result of this damage was a significant disruption to Internet connectivity, as shown in the country-level graph below. Restoration efforts started almost immediately, with <a href="https://guampowerauthority.com/bulletin/">Guam Power Authority</a>, <a href="https://bettertogether.pr.co/">Docomo Pacific</a>, and <a href="https://www.facebook.com/gtateleguam/">GTA Teleguam</a> all posting regular status updates on their websites and/or social media accounts.</p><p>Among the two Internet providers, <a href="https://radar.cloudflare.com/as9246">GTA Teleguam (AS9246)</a> was largely able to complete service restoration in June, with traffic returning to pre-storm levels around June 17, as seen in the graph below. In fact, in a <a href="https://www.facebook.com/gtateleguam/posts/pfbid02yRSxmMzPZoy4q7chjwZ9YugUoGuf3Y1rd8dx479xC23AsaDHbdVC2v8PcRcWNYAjl">June 20 Facebook post</a> they noted that “<i>As of today, a majority of our wireless network cell sites are operational.</i>” However, recovery at <a href="https://radar.cloudflare.com/as3605">Docomo Pacific (AS3605)</a> is taking significantly longer. The graph below shows that as of the end of June, traffic remained significantly below pre-storm levels.</p><h2>Cable damage</h2>
    <div>
      <h3>Bolivia</h3>
      <a href="#bolivia">
        
      </a>
    </div>
    <p>On June 19, COTAS, a Bolivian telecommunications company, posted an <a href="https://t.co/q4yobPwM8i">update on their Facebook page</a> that alerted users that a fiber optic cable had been cut in the town of Pongo. As seen in the graphs below, this cut significantly disrupted Internet connectivity across COTAS and two other network providers in the country: <a href="https://radar.cloudflare.com/as25620">AS25620 (COTAS)</a>, <a href="https://radar.cloudflare.com/as27839">AS27839 (Comteco)</a>, and <a href="https://radar.cloudflare.com/as52495">AS52495 (Cotel)</a> between 13:00 - 18:00 local time (17:00 -  22:00 UTC).</p>
    <div>
      <h3>The Gambia</h3>
      <a href="#the-gambia">
        
      </a>
    </div>
    <p>Gamtel, the state telecommunications company in The Gambia, notified subscribers via a <a href="https://twitter.com/Gamtel/status/1666466756909584386">Twitter post on June 7</a> of a localized fiber cut, and then of <a href="https://twitter.com/Gamtel/status/1666763123502505985">additional cable cuts on June 8</a>. These fiber cuts disrupted Internet connectivity on <a href="https://radar.cloudflare.com/as25250">AS25250 (Gamtel)</a> between 14:00 local time on June 7 and 00:00 local time on June 9, with traffic volumes down as much as 80% as compared to the previous period. (The Gambia is UTC+0, so the local times are the same as UTC.)</p>
    <div>
      <h3>Philippines</h3>
      <a href="#philippines">
        
      </a>
    </div>
    <p><a href="https://twitter.com/pldt/status/1665670783388254208">An advisory posted on Twitter</a> by Philippines telecommunications provider PLDT at 18:43 local time (10:43 UTC) on June 5 stated “<i>One of our submarine cable partners confirms a loss in some of its internet bandwidth capacity, and thus causing slower Internet browsing. We are working with our partners to provide alternate capacity that would restore the browsing experience in the next few hours.</i>” The traffic graph below shows a minor disruption to Internet traffic for <a href="https://radar.cloudflare.com/as9299">AS9299 (PLDT)</a> starting around 14:00 local time (06:00 UTC), and the “slower Internet browsing” noted by PLDT is evident in the Internet quality graphs below, with increased latency and decreased bandwidth evident around that same time. PLDT stated in a <a href="https://twitter.com/pldt/status/1665851245096218624">subsequent tweet</a> that as of 06:22 local time on June 6 (22:22 UTC on June 5), “<i>Our submarine cable partner confirms supplementing additional capacity, restoring browser experience.</i>”</p><h2>Power outages</h2>
    <div>
      <h3>Curaçao</h3>
      <a href="#curacao">
        
      </a>
    </div>
    <p><a href="https://www.aqualectra.com/">Aqualectra</a> is the primary utility company in Curaçao, providing water and power services. On June 8, they posted a series of alerts to their Facebook page (<a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02P57AWLNqLjpGBYgS2sKmmMkNJw2hYGk5mBgBJAAHnoEzSXnB8e2ssssnZEWfXdSdl">1</a>, <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid0ZKYCagJHtZBP9fo2M63ZuCYXGh35xL7rv8priq27is58oK8QpffTQhvuNr8J8xwJl">2</a>, <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid0nwEgCw9X68rqdTjJWTM9N1g9icKhWBAyYHV3vjMavMTJpFhhmgV3DRCYNpw4WYzNl">3</a>, <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02rzN9MHqEH4BZ8TJ3HCJJhXrxfzgA1g6quiRnc5S3M8uoUi5Jd2eV1BudEaRRFa5Zl">4</a>) regarding a power outage impacting “all neighborhoods”, caused by a malfunction in one of the main power cables connected to the substation at Parera. This loss of power impacted Internet connectivity on the island, with a significant loss of traffic observed at a country level, as seen in the graph below, as well as across several Internet service providers, including <a href="https://radar.cloudflare.com/as11081">AS11081 (UTS)</a>, <a href="https://radar.cloudflare.com/as52233">AS52233 (Columbus Communications)</a>, and <a href="https://radar.cloudflare.com/as27660">AS27660 (Curaçao Telecom)</a>. A <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02Lq9WQPt8RRKk2hcY3Mo32Zx33t38XabqQoVjvWBBKMyLTT62jXBWJuxwX43jLrXgl">followup Facebook post</a> dated 01:25 local time on June 9 (05:25 UTC) confirmed the restoration of power to all neighborhoods.</p>
    <div>
      <h3>Portugal</h3>
      <a href="#portugal">
        
      </a>
    </div>
    <p>A power outage at an Equinix data center in Prior Velho (near Lisbon) on the afternoon of June 6 affected local utilities, banking services, and court networks, according to published reports (<a href="https://www.publico.pt/2023/06/06/tecnologia/noticia/falhas-afectam-operadoras-internet-nacionais-2052421">1</a>, <a href="https://www.dn.pt/sociedade/falha-de-energia-no-prior-velho-perturba-internet-em-portugal-16486572.html">2</a>). Portuguese Internet service provider MEO was also impacted by the power outage, which caused a drop in traffic for <a href="https://radar.cloudflare.com/as3243">AS3243 (MEO-RESIDENCIAL)</a> and <a href="https://radar.cloudflare.com/as15525">AS15525 (MEO-EMPRESAS)</a>, seen in the graphs below. The disruptions caused by the power outage also impacted connectivity quality within Portugal, as the Radar Internet quality graphs below highlight – a concurrent drop in bandwidth and increase in latency is visible, indicating that end users likely experienced poorer performance during that period of time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1S6Vc0X6EP6RuHf6c7TnFW/45976cbce229d73954c9f1b28dff2a33/June-6---Portugal---AS3243.jpeg.jpeg" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/64e52Dfjd4mgkjSTYyWXTa/e2084dcdef47e10229d8753e3f6c5a94/June-6---Portugal---AS15525.jpeg.jpeg" />
            
            </figure>
    <div>
      <h3>Botswana</h3>
      <a href="#botswana">
        
      </a>
    </div>
    <p>A countrywide power outage in Botswana on May 19 caused an Internet disruption that lasted about 90 minutes, from 10:45 until 12:15 local time (08:45 - 10:15 UTC), visible in the graph below. A <a href="https://twitter.com/BPCBw/status/1659542170640982016">tweet from Botswana Power Corporation</a> provided public notice of the incident, but did not include a root cause.</p>
    <div>
      <h3>Barbados</h3>
      <a href="#barbados">
        
      </a>
    </div>
    <p>On April 4, <a href="https://twitter.com/TweetBLPC/status/1643278955808423937">The Barbados Light &amp; Power Company tweeted an “Outage Notice”</a>, stating “<i>We are aware that our customers across the island are currently without electricity.</i>” Posted at 11:46 local time (15:46 UTC), the notice comes shortly after a significant drop in traffic was observed country-wide, indicating that the power outage also impacted Internet connectivity across the country. After posting several additional updates throughout the day, a final update posted at 18:00 local time (22:00 UTC) indicated that power had been restored to 100% of impacted customers. The graph below shows that traffic took several additional hours to return to normal levels. (Note that the orange highlighting in the graph represents the duration of the disruption, and the red shading is related to an internal data collection issue.)</p><h2>Technical problems</h2>
    <div>
      <h3>Namibia</h3>
      <a href="#namibia">
        
      </a>
    </div>
    <p>A seven-hour Internet disruption observed in Namibia on June 15 and 16 was caused by unspecified “technical challenges” faced by Telecom Namibia. According to a <a href="https://twitter.com/TelecomNamibia/status/1669654083706277888">tweet</a> from the provider, “<i>Telecom Namibia experienced technical challenges on its fixed and mobile data services on Thursday leading to intermittent Internet connectivity.</i>” The impact of these challenges is visible in both the country- and network-level traffic graphs below.</p>
    <div>
      <h3>Solomon Islands</h3>
      <a href="#solomon-islands">
        
      </a>
    </div>
    <p>Unspecified “technical reasons” also disrupted mobile Internet connectivity for Our Telekom customers in the Solomon Islands on April 26 and 27. An April 26 <a href="https://www.facebook.com/ourtelekom/posts/pfbid0vFYKtzqP9J7WuRXQYb2ihXRfoU92kCN5dxGkq3SG5LCSVXCwt5fTrgxxhTadhsFxl">Facebook post</a> from Our Telekom simply stated “<i>Our mobile data network is currently down due to technical reasons.</i>” The graphs below show a significant drop in traffic for <a href="https://radar.cloudflare.com/as45891">AS45891 (Our Telekom/SBT)</a> between 06:30 local time on April 27 (19:30 UTC on April 26) and 17:00 local time on April 27 (06:00 UTC). The loss of mobile traffic from Our Telekom also impacted traffic at a country level, as the graph shows a similar disruption for the Solomon Islands.</p>
    <div>
      <h3>SpaceX Starlink</h3>
      <a href="#spacex-starlink">
        
      </a>
    </div>
    <p>With an increasingly global service footprint, disruptions observed on SpaceX Starlink potentially impact users across <a href="https://www.starlink.com/map">multiple countries</a> around the world. Just before midnight UTC on April 7, Internet traffic seen from <a href="https://radar.cloudflare.com/as14593">AS14593 (SpaceX-Starlink)</a> began to decline significantly. The disruption was short-lived, with traffic returning to expected levels within two hours. According to a <a href="https://twitter.com/elonmusk/status/1644505414296322048">Twitter post from Elon Musk</a>, CEO of SpaceX, the problem was “<i>Caused by expired ground station cert</i>” (an expired digital certificate associated with one or more Starlink ground stations, likely preventing communication between the satellite constellation and the ground station(s)).</p>
    <div>
      <h3>Madagascar</h3>
      <a href="#madagascar">
        
      </a>
    </div>
    <p>In Madagascar, a “problem with the backbone”, <a href="https://twitter.com/GroupeTelma/status/1644264342840303617">reported by Telma Madagascar</a>, caused a loss of as much as two-thirds of Internet traffic between 09:15 - 14:00 local time (06:15 - 11:00 UTC) on April 7. The graphs below show that the backbone issue disrupted traffic at a national level, as well as for <a href="https://radar.cloudflare.com/as37054">AS37054 (Telma Madagascar)</a>.</p>
    <div>
      <h3>United Kingdom</h3>
      <a href="#united-kingdom">
        
      </a>
    </div>
    <p>On April 4, UK Internet provider <a href="https://www.virginmedia.com/">Virgin Media</a> suffered multiple service disruptions that impacted Internet connectivity for broadband customers. The first outage started just before 01:00 local time (midnight UTC)l, lasting until approximately 09:00 local time (08:00 UTC). The second outage started around 16:00 local time (15:00 UTC), with traffic volumes going up and down over the next several hours before appearing to stabilize around 21:30 local time (20:30 UTC).</p><p>Virgin Media’s Twitter account acknowledged the early morning disruption several hours after it began, <a href="https://twitter.com/virginmedia/status/1643157411417542656">posting</a> “<i>We’re aware of an issue that is affecting broadband services for Virgin Media customers as well as our contact centres. Our teams are currently working to identify and fix the problem as quickly as possible and we apologise to those customers affected.</i>” <a href="https://twitter.com/virginmedia/status/1643230963797831682">A subsequent post</a> after service restoration noted “<i>We’ve restored broadband services for customers but are closely monitoring the situation as our engineers continue to investigate. We apologise for any inconvenience caused.</i>”</p><p>However, the second disruption was acknowledged on Virgin Media’s Twitter account much more rapidly, with a <a href="https://twitter.com/virginmedia/status/1643288614585917450">post</a> at 16:25 UTC stating “<i>Unfortunately we have seen a repeat of an earlier issue which is causing intermittent broadband connectivity problems for some Virgin Media customers. We apologise again to those impacted, our teams are continuing to work flat out to find the root cause of the problem and fix it.</i>”</p><p>Although no additional details have been shared via social media by Virgin Media about the outages or their resolution, some additional information was <a href="https://twitter.com/ANRKJosh/status/1643344176006721539">shared via Twitter by an apparent customer</a>, who posted “<i>Virgin Media engineers re-seated fibre cards and reset hub equipment to restore service. TTL was extended as a workaround to maintain stability whilst a permanent fix is implemented.</i>”</p><p>Additional details about the Virgin Media outage can be found in our April 4 blog post: <a href="/virgin-media-outage-april-4-2023/"><i>Cloudflare’s view of the Virgin Media outage in the UK</i></a>.</p><h2>Cyberattacks</h2>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>As we have covered in <a href="/tag/ukraine/">past blog posts</a>, the physical war between Russia and Ukraine also has a very active online component, with traffic shifts, cyberattacks, and traffic rerouting all observed since the conflict began in February 2022. In early May 2022, we observed traffic from several Ukrainian network providers being rerouted through <a href="https://radar.cloudflare.com/as201776">AS201776 (Miranda Media)</a>, a Crimean-based, Russian-controlled network operator. (This rerouting is discussed in more detail in two blog posts: <a href="/tracking-shifts-in-internet-connectivity-in-kherson-ukraine/"><i>Tracking shifts in Internet connectivity in Kherson, Ukraine</i></a> and <a href="/one-year-of-war-in-ukraine/"><i>One year of war in Ukraine: Internet trends, attacks, and resilience</i></a>.)</p><p>A little more than a year later, on May 26, we observed an Internet outage at Miranda Media. Traffic started to fall around 16:30 local time (13:30 UTC), dropping to zero around 18:15 local time (15:15 UTC). The outage disrupted connectivity on the Crimean Peninsula and parts of occupied Ukraine and lasted until approximately 06:00 local time on May 27 (03:00 UTC). Published reports (<a href="https://therecord.media/skolkovo-foundation-cyberattack-russia-ukraine">1</a>,<a href="https://riskybiznews.substack.com/p/risky-biz-news-iranian-hacktivists">2</a>) suggest that the outage was due to a cyberattack targeting Miranda Media, reportedly carried out by Ukrainian hacktivists.</p>
    <div>
      <h3>Russia</h3>
      <a href="#russia">
        
      </a>
    </div>
    <p>Russian satellite provider Dozor Teleport, <a href="https://www.datacenterdynamics.com/en/news/russian-satellite-comms-firm-dozer-taken-offline-by-wagner-affiliated-hacker-group-report/">whose customers include</a> Russia’s Ministry of Defense, ships of the Northern Fleet, Russian energy firm Gazprom, remote oil fields, the Bilibino nuclear power plant, the Federal Security Service (FSB), Rosatom, and other organizations, experienced a multi-hour outage on June 29. The outage, which occurred between 01:30 - 17:30 UTC, was reportedly the result of a cyberattack that <a href="https://www.washingtonpost.com/technology/2023/06/30/satellite-hacked-russian-military/">at least two groups claimed responsibility for</a>.</p><h2>Military action</h2>
    <div>
      <h3>Chad</h3>
      <a href="#chad">
        
      </a>
    </div>
    <p>Multiple Internet disruptions occurred in Chad on April 23 and 24, impacting several Internet providers, and were ultimately visible at a country level as well. As seen in the graphs below, the outages occurred from 04:30 - 06:00 local time (03:30 - 05:00 UTC) and 15:00 - 20:00 local time (14:00 - 19:00 UTC) on April 23, and 04:00 - 08:30 local time (03:00 - 07:30 UTC) on April 24. The impacted network providers in Chad included <a href="https://radar.cloudflare.com/AS327802">AS327802 (Millicom Chad)</a>, <a href="https://radar.cloudflare.com/as327756">AS327756 (Airtel Chad)</a>, <a href="https://radar.cloudflare.com/as328594">AS328594 (Sudat Chad)</a>, and <a href="https://radar.cloudflare.com/as327975">AS327975 (ILNET-TELECOM)</a>. The outages were <a href="https://crisis24.garda.com/alerts/2023/04/chad-residual-internet-service-disruptions-possible-over-coming-hours-following-hours-long-outage-across-country-april-23">reportedly</a> caused by damage to fiber infrastructure that links Chad with neighboring Cameroon and Sudan, with the latter experiencing Internet service disruptions amid clashes between the Sudanese Armed Forces (SAF) and Rapid Support Forces (RSF).</p>
    <div>
      <h3>Sudan</h3>
      <a href="#sudan">
        
      </a>
    </div>
    <p>As noted above, military action in Sudan disrupted Internet connectivity in Chad in April. Starting in mid-April, multiple Internet outages were observed at major Sudanese Internet providers, three of which are shown in the graphs below. The fighting in the country has led to <a href="https://www.datacenterdynamics.com/en/news/internet-disruption-continues-for-mtn-in-sudan-as-conflict-rumbles-on/">fuel shortages and power cuts</a>, ultimately disrupting Internet connectivity.</p><p><a href="https://radar.cloudflare.com/as15706">AS15706 (Sudatel)</a> experienced complete Internet outages from 03:00 on April 23 to 17:00 on April 24 local time (01:00 on April 23 to 15:00 on April 24 UTC) and again from 03:00 on April 25 until 01:00 on April 28 local time (01:00 on April 25 to 23:00 on April 27 UTC). Internet connectivity on <a href="https://radar.cloudflare.com/as36972">AS36972 (MTN</a>) was disrupted between 03:00 and 12:00 local time on April 16 (01:00 - 10:00 UTC) and again between 20:00 on April 27 until 02:00 on April 29 (18:00 on April 27 to 00:00 on April 29). After a nominal multi-day recovery, a long-term near complete outage started on May 5, lasting for multiple weeks. Similar to MTN, multiple extended outages were also observed on <a href="https://radar.cloudflare.com/as33788">AS33788 (Kanar Telecommunication)</a>. After seeing a significant drop in traffic midday on April 19, a near complete outage is visible between 12:00 on April 21 and 01:00 on April 29 (10:00 on April 21 to 23:00 on April 28 UTC), with a very brief minor recovery late in the day on April 24. A longer duration outage began around 00:00 local time on May 11 (22:00 on May 10 UTC), also lasting for multiple weeks.</p><p>Additional details about the Internet disruptions in Sudan can be found in our May 2 blog post: <a href="/sudan-armed-conflict-impact-on-the-internet-since-april-15-2023/"><i>Effects of the conflict in Sudan on Internet patterns</i></a>.</p><h2>Maintenance</h2>
    <div>
      <h3>Togo, Republic of Congo (Brazzaville), Burkina Faso</h3>
      <a href="#togo-republic-of-congo-brazzaville-burkina-faso">
        
      </a>
    </div>
    <p>Repair work on the <a href="https://www.submarinecablemap.com/submarine-cable/west-africa-cable-system-wacs">West Africa Cable System (WACS)</a> submarine cable disrupted Internet connectivity across multiple countries, including Togo, Republic of Congo (Brazzaville), and Burkina Faso on April 6. According to the Google translation of a <a href="https://www.facebook.com/canalboxcongo/posts/pfbid0ugigSynCcSkHJ9iMTYur85nE6WrCZTHTua5SvNpYV53LhS8tByCa7ASH9691iUAxl">Facebook post from Canalbox Congo</a>, the repair work was likely to cause “very strong disruptions on Internet connections with the risk of a total outage”. (Canalbox (GVA) is an African telecommunications operator that provides services <a href="https://www.gva.africa/a-propos-de-gva/">across multiple countries in Africa</a>.)</p><p>The graph below for <a href="https://radar.cloudflare.com/as36924">AS36924 (GVA-Canalbox)</a> shows three overlapping outage annotations, with each related to a disruption observed on that autonomous system (network) in one of the impacted countries. In the Republic of Congo (Brazzaville), a significant traffic disruption is visible between 16:15 - 23:15 local time (15:15 - 22:15 UTC). In Burkina Faso, the disruption happened earlier and was less severe, taking place between 09:15 - 18:00 local time (09:15 - 18:00 UTC), with a similar impact in Togo, where traffic was disrupted between 11:00 - 23:15 local time (11:00 - 23:15 UTC).</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Because of how tightly interwoven the Internet has become with commerce, financial services, and everyday life around the world, any disruption to Internet connectivity ultimately carries an economic impact. The providers impacted by disruptions caused by unexpected or unavoidable events such as cable cuts or severe weather generally try to minimize the scope and duration of such disruptions, ultimately limiting the economic impact. However, in the case of government-directed Internet shutdowns, the damage to the economy is ultimately self-inflicted. The <a href="https://www.internetsociety.org/">Internet Society’s</a> new <a href="https://pulse.internetsociety.org/blog/measure-the-economic-impact-of-internet-shutdowns-with-the-internet-society-pulse-netloss-calculator">Net Loss Calculator</a> now provides a way to quantify this damage, enabling the public, advocacy groups, and governments themselves to understand the potential cost of an Internet shutdown from gross domestic product (GDP), foreign direct investment (FDI), and unemployment perspectives.</p><p>Visit <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for additional insights around Internet disruptions. Follow us on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (Twitter), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or contact us via <a>email</a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <guid isPermaLink="false">QwVhXOMCWabCUrifsbXUS</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Exam-related Internet shutdowns in Iraq and Algeria put connectivity to the test]]></title>
            <link>https://blog.cloudflare.com/exam-internet-shutdowns-iraq-algeria/</link>
            <pubDate>Tue, 13 Jun 2023 13:18:16 GMT</pubDate>
            <description><![CDATA[ During the first two weeks of June 2023, we’ve seen Iraq implementing a series of multi-hour shutdowns that will reportedly occur through mid-July, as well as Algeria taking similar actions to prevent cheating on baccalaureate exams ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hc7ueoSaOW3nZ5Vxmfjcd/77407b7b2cc0bc248bee9b615d38f8b9/1937.png" />
            
            </figure><p>Over the last several years, governments in a number of countries in the Middle East/Northern Africa (MENA) region have taken to implementing widespread nationwide shutdowns in an effort to prevent cheating on nationwide academic exams. Although it is unclear whether such shutdowns are actually successful in curbing cheating, it is clear that they take a financial toll on the impacted countries, with <a href="https://www.accessnow.org/mena-internet-shutdowns-during-exams/">estimated losses</a> in the millions of US dollars.</p><p>During the first two weeks of June 2023, we’ve seen Iraq implementing a series of multi-hour shutdowns that will reportedly occur through mid-July, as well as Algeria taking similar actions to prevent cheating on baccalaureate exams. Shutdowns in Syria were <a href="https://smex.org/syria-internet-shutdowns-planned-despite-promises-to-keep-it-on/">reported</a> to begin on June 7, but there’s been no indication of them in traffic data as of this writing (June 13). These actions echo those taken in <a href="/q2-2022-internet-disruption-summary/">Iraq, Syria, Sudan, and Algeria</a> in 2022 and in <a href="/syria-exam-related-internet-shutdowns/">Syria</a> and <a href="/sudans-exam-related-internet-shutdowns/">Sudan</a> in 2021.</p><p><i>(Note: The interactive graphs below have been embedded directly into the blog post using a new </i><a href="https://twitter.com/CloudflareRadar/status/1666078235384479745"><i>Cloudflare Radar feature</i></a><i>. This post is best viewed in landscape mode when on a mobile device.)</i></p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>Iraq had <a href="https://www.kurdistan24.net/en/story/31453-Iraq%E2%80%99s-communication-ministry-refuses-to-enforce-internet-blackout-for-final-exams">reportedly committed</a> on May 15 to <b>not</b> implementing Internet shutdowns during the 2023 exam season, with a <a href="https://moc.gov.iq/?page=312">now unavailable page</a> on the Iraqi Ministry of Communications web site (although <a href="https://web.archive.org/web/20230515211944/https://moc.gov.iq/?page=312">captured in the Internet Archive’s Wayback Machine</a>) noting (via Google Translate) “<i>Her Excellency the Minister of Communications, Dr. Hayam Al-Yasiri: We rejected a request to cut off the internet service during the ministerial exams.</i>” However, that commitment was apparently short-lived, as the first shutdown was implemented just a couple of weeks later, on June 1. The shutdowns observed across Iraq thus far have impacted networks and localities nationwide, with the exception of the autonomous Kurdistan region. However, networks in that region have experienced their own set of connectivity restrictions due to local exams.</p><p>In Iraq, the impact of the shutdowns between 04:00 - 08:00 local time (01:00 - 05:00 UTC) is clearly visible at a country level, as seen in the figure below.</p><p>The impact is, of course, also visible in the network-level graphs shown below, with traffic dropping to or near zero during each of the four-hour shutdown windows.</p><p>The shutdowns are also visible in the BGP announcement activity from the impacted networks, with spikes in announcement volume clearly visible around the shutdown windows each day that they have occurred. The announcement activity represents withdrawals ahead of the shutdown, removing routes to prefixes within the network, effectively cutting them off from the Internet, and updates after the shutdown period has ended, restoring the previously withdrawn routes, effectively reconnecting the prefixes to the Internet. (Additional announcement activity may also be visible for periods outside of the scheduled shutdowns, and is likely unrelated.)</p><p>While the shutdowns discussed above didn’t impact the Kurdistan region of Iraq, that region has also chosen to <a href="https://www.basnews.com/en/babat/809911">implement their own shutdowns</a>. In the Kurdistan region, exams started June 3, we saw shorter traffic disruptions across three local network providers on June 3, 6, 10, and 13. The disruptions lasted from 06:30 - 07:30 local time (03:30 to 04:30 UTC) on the 3rd, and 06:40 - 08:30 local time (03:30 to 05:30 UTC) on the 6th, 10th, and 13th). Impacted regions include Erbil, Sulaymaniyah, and Duhok.</p><p>BGP announcement activity for the impacted networks in the Kurdistan region did not show the same patterns as those observed on the other Iraqi network providers discussed above.</p><p>Both sets of shutdowns in Iraq are also visible in traffic to Cloudflare’s <a href="https://1.1.1.1/dns/">1.1.1.1 DNS resolver</a>, although they highlight a difference in usage between the autonomous Kurdistan region and the rest of the country. The “totalTcpUdp” graph (blue line) below shows requests made to the resolver over UDP or TCP on <a href="https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml?&amp;page=2">port 53</a>, the standard port used for DNS requests. The “totalDoHDoT” graph (orange line) below shows requests made to the resolver using <a href="https://developers.cloudflare.com/1.1.1.1/encryption/dns-over-https/">DNS-over-HTTPS</a> or <a href="https://developers.cloudflare.com/1.1.1.1/encryption/dns-over-tls/">DNS-over-TLS</a> using port <a href="https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml?&amp;page=8">443</a> or <a href="https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml?&amp;page=15">853</a> respectively.</p><p>In the “totalTcpUdp” graph, we can see noticeable drops in traffic that align with the dates and times where we observed the traffic disruptions across Kurdistani networks. This drop in DNS traffic, combined with the lack of BGP announcement activity, suggests that the Internet disruptions in the Kurdistan region may be implemented as widespread blocking of Internet traffic, rather than routing-based shutdowns.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RurKF2pkeJe18zyhticmY/f6573e33a1c53957a47f96e34292954e/June-13---Iraq---1111---tcpudp.png" />
            
            </figure><p>In the “totalDoHDoT” graph below, we can see noticeable drops in traffic that align with the dates and times where we observed the traffic disruptions in the rest of Iraq.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vYdGa4A6CqvW8bVFu426I/1abb129bf75efd41a833ba6cef934db2/June-13---Iraq---1111---dohdot.png" />
            
            </figure><p>It isn’t immediately clear why there is a difference in the use of 1.1.1.1 between the two parts of the country.</p>
    <div>
      <h3>Algeria</h3>
      <a href="#algeria">
        
      </a>
    </div>
    <p>In Algeria, it appears that the country is following a <a href="/syria-sudan-algeria-exam-internet-shutdown/">similar pattern as that seen in 2021 and 2022</a>, with two multi-hour Internet disruptions each day. Also similar to last year, it appears that they are pursuing a content blocking-based approach, instead of the wide-scale Internet shutdowns implemented in 2021, as impacted networks are not experiencing complete outages, nor do they show patterns of BGP announcement activity.</p><p>A <a href="https://www.trtafrika.com/fr/africa/algerie-demarrage-des-epreuves-du-baccalaureat-lacces-a-internet-perturbe-13577416">published report</a> indicates that two Internet disruptions will be implemented each day between June 11 and June 15. The first takes place between 08:00 - 12:00 local time (07:00 - 11:00 UTC), with the second occurring between 14:00 - 17:00 local time (13:00 - 16:00 UTC). These disruptions are visible in the shaded areas of the network-level graphs below as two distinct drops in traffic each day.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>In cooperation with the <a href="https://www.internetsociety.org/">Internet Society</a> and Lebanese digital rights organization <a href="https://smex.org/who-we-are/">SMEX</a>, digital rights organization <a href="https://www.accessnow.org/about-us/">Access Now</a> is coordinating a <a href="https://www.accessnow.org/campaign/no-exam-shutdown/">#NoExamShutdown</a> campaign across social media platforms. The campaign calls on MENA governments to end the practice of Internet shutdowns during exams, and aims to highlight how these shutdowns undermine human rights and disrupt essential social, political, economic, and cultural activities. Cloudflare Radar will continue to bring visibility to these, and other similar Internet disruptions, as they occur. You can follow them through the <a href="https://radar.cloudflare.com/outage-center">Cloudflare Radar Outage Center</a>, or by following Cloudflare Radar on <a href="https://twitter.com/CloudflareRadar">Twitter</a> or <a href="https://noc.social/@cloudflareradar">Mastodon</a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Outage]]></category>
            <guid isPermaLink="false">zaF9kfmiIctDLZkSQqs37</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Internet disruptions overview for Q1 2023]]></title>
            <link>https://blog.cloudflare.com/q1-2023-internet-disruption-summary/</link>
            <pubDate>Wed, 12 Apr 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ In this post, we review selected Internet disruptions observed by Cloudflare during the first quarter of 2023, supported by traffic graphs from Cloudflare Radar and other internal Cloudflare tools, and grouped by associated cause or common geography ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4VUi9G44aEUHbAdC9pRKtR/ead4d82bbf4871254e699f0310bea0f7/image9-1.png" />
            
            </figure><p>Cloudflare operates in more than 285 cities in over 100 countries, where we interconnect with over 11,500 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions.</p><p>We entered 2023 with Internet disruptions due to causes that ran the gamut, including several government-directed Internet shutdowns, cyclones, a massive earthquake, power outages, cable cuts, cyberattacks, technical problems, and military action. As we have noted in the past, this post is intended as a summary overview of observed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter.</p>
    <div>
      <h2>Government directed</h2>
      <a href="#government-directed">
        
      </a>
    </div>
    
    <div>
      <h3>Iran</h3>
      <a href="#iran">
        
      </a>
    </div>
    <p>Over the last six-plus months, government-directed Internet shutdowns in <a href="https://radar.cloudflare.com/ir">Iran</a> have largely been in response to protests over the death of Mahsa Amini while in police custody. While these shutdowns are still occurring in a limited fashion, a notable shutdown observed in January was intended to <a href="https://twitter.com/CloudflareRadar/status/1616061427948699648">prevent cheating on academic exams</a>. Internet shutdowns with a similar purpose have been observed across a number of other countries, and have also <a href="https://en.radiofarda.com/a/iran-cuts-internet-access-to-prevent-cheating-in-university-exams/30058425.html">occurred in Iran in the past</a>. Access was restricted across <a href="https://radar.cloudflare.com/as44244">AS44244 (Irancell)</a> and <a href="https://radar.cloudflare.com/as197207">AS197207 (MCCI)</a>, with lower traffic levels observed in Alborz Province, Fars, Khuzestan, and Razavi Khorasan between 08:00 to 11:30 local time (04:30 to 08:00 UTC) on January 19.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Gp04uQGdec3nomTnB8zQG/a8143fdcbc613c3873b2ce5110d04620/January-19---Iran---AS44244-AS197207---shaded.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7heRXxiAOovouFzDhTpCDp/f5e783c632f8dbbaa7833f45d2320128/January-19---Iran---multiple-regions---shaded.png" />
            
            </figure>
    <div>
      <h3>Mauritania</h3>
      <a href="#mauritania">
        
      </a>
    </div>
    <p>On March 6, Internet traffic across the three major mobile network providers in <a href="https://radar.cloudflare.com/mr">Mauritania</a> was disrupted amid a <a href="https://www.france24.com/en/africa/20230306-four-jihadists-escape-in-deadly-prison-break-in-mauritania">search for four jihadist prisoners that escaped from prison</a>. Starting around 10:00 local time (10:00 UTC), <a href="https://twitter.com/CloudflareRadar/status/1632747652608581633">a drop in traffic was observed</a> at <a href="https://radar.cloudflare.com/as37541">AS37541 (Chinguitel)</a>, <a href="https://radar.cloudflare.com/as29544">AS29544 (Mauritel)</a>, and <a href="https://radar.cloudflare.com/as37508">AS37508 (Mattel)</a>, as well as at a country level. The Internet disruption lasted for multiple days, with traffic starting to recover around 13:45 local time (13:45 UTC) on March 12, after Mauritanian authorities <a href="https://www.reuters.com/world/africa/mauritania-says-three-fugitives-killed-after-prison-break-2023-03-12/">reported</a> that three of the escapees had been killed, with the fourth detained after a shootout.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1lLelKNjCuVaVuUicwRLMg/268750b448006385527e67f33dfd280d/Screenshot-2023-04-11-at-15.44.33.png" />
            
            </figure>
    <div>
      <h3>Punjab, India</h3>
      <a href="#punjab-india">
        
      </a>
    </div>
    <p>A <a href="https://twitter.com/CloudflareRadar/status/1637126453320994816">shutdown of mobile Internet connectivity</a> in Punjab, <a href="https://radar.cloudflare.com/in">India</a> began on March 19, ordered by the local government amid concerns of protest-related violence. Although the initial shutdown was ordered to take place between March 18, 12:00 local time and March 19, 12:00 local time, it was extended several times, ultimately lasting for three days. Traffic for <a href="https://radar.cloudflare.com/as38266">AS38266 (Vodafone India)</a>, <a href="https://radar.cloudflare.com/as45271">AS45271 (Idea Cellular Limited</a>), <a href="https://radar.cloudflare.com/as45609">AS45609 (Bharti Mobility)</a>, and <a href="https://radar.cloudflare.com/as55836">AS55836 (Reliance Jio Infocomm)</a> began to fall around 12:30 local time (07:00 UTC) on March 18, recovering around 12:30 local time (07:00 UTC) on March 21. However, it was <a href="https://indianexpress.com/article/cities/chandigarh/amritpal-crackdown-mobile-internet-services-restored-sangrur-moga-suspended-tarn-taran-ferozepur-8514057/">subsequently reported</a> that connectivity remained shut down in some districts until March 23 or 24.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4UW7NuL90gpFugklrHkMFj/b29fb524b106655dcda07feafb298e7f/Mar-21---India---Punjab.png" />
            
            </figure>
    <div>
      <h2>Cable cuts</h2>
      <a href="#cable-cuts">
        
      </a>
    </div>
    
    <div>
      <h3>Bolivia</h3>
      <a href="#bolivia">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/BO">Bolivian</a> ISP <a href="https://radar.cloudflare.com/as27839">Cometco (AS27839)</a> <a href="https://www.facebook.com/ComtecoRL/posts/pfbid02NUx5DvJkmkyzaawxDcqVppuCzYem79r1ynKJrgLep7FtdFN3CxJZ7aqYh4B6tMZTl">reported on January 12</a> that problems with international fiber links were causing degradation of Internet service. Traffic from the network <a href="https://twitter.com/CloudflareRadar/status/1613738486527410178">dropped by approximately 80%</a> starting around 16:00 local time (20:00 UTC) before returning to normal approximately eight hours later. It isn’t clear whether the referenced international fiber links were terrestrial connections to neighboring countries, or issues with submarine cables several network hops upstream. As a landlocked country, Bolivia is not directly connected to any submarine cables.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3kFiOkYrZbJ4S0UY6LHmSM/36b8191e61cf0409a892fbd10e8b9bd4/January-12---Bolivia---AS27839.png" />
            
            </figure>
    <div>
      <h3>Anguilla</h3>
      <a href="#anguilla">
        
      </a>
    </div>
    <p>On February 18, a <a href="https://www.facebook.com/anguillagovernment/posts/pfbid0Eu5GWZ7ki84qd3obWDqy53xHjkq3denTWiPhuqz82DMJh5km62qz6hupmR5bPmWUl">Facebook post from the Government of Anguilla</a> noted that there was a <i>“Telecommunications Outage affecting both service providers, FLOW &amp; DIGICEL.”</i> The <a href="https://www.facebook.com/photo/?fbid=574797941360615&amp;set=pb.100064912413035.-2207520000">accompanying graphic</a> noted that the outage was due to a “subsea fiber break”. Although not confirmed, the break likely occurred on the <a href="https://www.submarinecablemap.com/submarine-cable/eastern-caribbean-fiber-system-ecfs">Eastern Caribbean Fiber System (ECFS)</a>, as this is the only submarine cable system that <a href="https://www.submarinecablemap.com/country/anguilla">Anguilla is connected to</a>. The figures below show a clear drop in traffic around 09:00 local time (13:00 UTC) in <a href="https://radar.cloudflare.com/ai">Anguilla</a> and at <a href="https://radar.cloudflare.com/as2740">AS2740 (Caribbean Cable Communications, acquired by Digicel)</a> and to a lesser extent at <a href="https://radar.cloudflare.com/as11139">AS11139 (Cable &amp; Wireless, parent company of Flow Anguilla)</a>. The disruption lasted for over two days, with traffic returning to normal levels around 15:00 local time (19:00 UTC) on February 20, corroborated by a follow-on <a href="https://www.facebook.com/photo.php?fbid=575450987961977&amp;set=pb.100064912413035.-2207520000.&amp;type=3">Facebook post from the Government of Anguilla</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2f1hTry63iukpv1YBj6vln/182b5b68961590271ef118b5d9c9a5de/Feb-18---Anguilla.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7bEOkVh1WxwGWJIZ7S7MlV/4fdf1987860ecddf055b543d3ba6b7f1/Feb-18---Anguilla---AS2740.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2D5n6hTjmMKoDx41VsiO38/67983aae4c5dc50a90ad3232cc5716b8/Feb-18---Anguilla---AS11139.png" />
            
            </figure>
    <div>
      <h3>Bangladesh</h3>
      <a href="#bangladesh">
        
      </a>
    </div>
    <p>A brief connectivity disruption was observed on <a href="https://radar.cloudflare.com/bd">Bangladeshi</a> provider <a href="https://radar.cloudflare.com/as24389">Grameenphone</a> on February 23, between 11:45-14:00 local time (05:45-08:00 UTC). According to a <a href="https://www.facebook.com/Grameenphone/posts/pfbid0SAvEqoqFaVLXKBSLdA1MMfZQBS4bN5KWMCiQunPNcfeLP6G31LCZrWEULcoDwwhsl">Facebook post from Grameenphone</a>, the outage was caused by fiber cuts due to road maintenance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Pr2v9me7tPs2TfgopSd8Q/f4c6c5752331c393002e421cca6f2924/Feb-23---Bangladesh---Grameenphone---shaded.png" />
            
            </figure>
    <div>
      <h3>Venezuela</h3>
      <a href="#venezuela">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/ve">Venezuela</a>, and more specifically, <a href="https://radar.cloudflare.com/as8048">AS8048 (CANTV)</a>, are no stranger to Internet disruptions, seeing several (<a href="/q1-2022-internet-disruption-summary/">Q1</a>, <a href="/q2-2022-internet-disruption-summary/">Q2</a>) during 2022, as well as <a href="https://internetdisruption.report/2019/12/15/internet-disruption-report-november-2019/">others</a> in <a href="https://internetdisruption.report/2020/06/21/internet-disruption-report-april-2020/">previous</a> years. During the last couple of days in February, a few small outages were observed on CANTV’s network in several Venezuelan states. However, a more significant near-complete outage <a href="https://twitter.com/CloudflareRadar/status/1630623104790675471">occurred on February 28</a>, starting around midnight local time (04:00 UTC), and lasting for the better part of the day, with traffic recovering at 17:30 local time (21:30 UTC). A <a href="https://twitter.com/salaprensaCantv/status/1630584346200424450">Tweet posted the morning of February 28 by CANTV</a> referenced an outage in their fiber optic network, which was presumably the cause.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5rRylzT7RFWj45NlUsLwRw/a629352cdc04b723a4d1615fe0158d56/Feb-28---Venezuela---multiple-states---CANTV.png" />
            
            </figure>
    <div>
      <h2>Power outages</h2>
      <a href="#power-outages">
        
      </a>
    </div>
    
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>A <a href="https://www.dw.com/en/power-outage-plunges-pakistan-into-darkness/a-64484771">country-wide power outage</a> in <a href="https://radar.cloudflare.com/pk">Pakistan</a> on January 23 impacted more than 220 million people, and resulted in a significant drop in Internet traffic <a href="https://twitter.com/CloudflareRadar/status/1617506479296188416">being observed</a> in the country. The power outage began at 07:34 local time (02:34 UTC), with Internet traffic starting to drop almost immediately. The figure below shows that traffic volumes dropped as much as 50% from normal levels before recovering around 04:15 local time on January 24 (23:15 UTC on January 23). This power outage was reportedly due to a “sudden drop in the frequency of the power transmission system”, which led to a “widespread breakdown”. Nationwide power outages have also occurred in Pakistan in <a href="https://www.theguardian.com/world/2021/jan/10/pakistan-power-gradually-being-restored-after-nationwide-blackout">January 2021</a>, <a href="https://profit.pakistantoday.com.pk/2018/05/16/technical-fault-at-tarbela-leaves-several-cities-without-electricity/">May 2018</a>, and <a href="https://www.theguardian.com/world/2015/jan/25/massive-power-failure-plunges-80-of-pakistan-into-darkness">January 2015</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1shnHo1xc524nyPmr6lF78/5eb0147f6bb653468eb1b3ef294a305a/January-23---Pakistan---1d.png" />
            
            </figure>
    <div>
      <h3>Bermuda</h3>
      <a href="#bermuda">
        
      </a>
    </div>
    <p><a href="https://belco.bm/">BELCO</a>, the power company servicing the island of <a href="https://radar.cloudflare.com/bm">Bermuda</a>, <a href="https://twitter.com/BELCOBERMUDA/status/1621601974285123585">tweeted about</a> a mass power outage affecting the island on February 3, and linked to their <a href="https://portal.belco.bm/app/outage/outageMap.jsp">outage map</a> so that customers could track restoration efforts. BELCO’s tweet was posted at 16:10 local time (20:10 UTC), approximately one hour after a <a href="https://twitter.com/CloudflareRadar/status/1621616687240953856">significant drop was observed</a> in Bermuda’s Internet traffic. The power outage, and subsequent Internet disruption, lasted over five hours, as BELCO <a href="https://twitter.com/BELCOBERMUDA/status/1621690284311515137">later tweeted</a> that “<i>As of 9.45 pm [00:45 UTC, February 4], all circuits have been restored.</i>”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/sTvXIF6AKTMlxTlhTuyru/cae2d2cabffa73af303bfee9d7577380/Feb-3---Bermuda-full-day-shaded.png" />
            
            </figure>
    <div>
      <h3>Argentina</h3>
      <a href="#argentina">
        
      </a>
    </div>
    <p>Soaring temperatures in <a href="https://radar.cloudflare.com/ar">Argentina</a> triggered a <a href="https://www.batimes.com.ar/news/argentina/argentina-hit-by-huge-power-outage-affecting-several-provinces.phtml">large-scale power outage</a> across the country that resulted in <a href="https://twitter.com/CloudflareRadar/status/1631098752982196234">multi-hour Internet disruption</a> on March 1. Internet traffic dropped by approximately one-third during the disruption, which lasted from 16:30 to 19:30 local time (19:30 to 22:30 UTC). Cities that experienced visible impacts to Internet traffic during the power outage included Buenos Aires, Cordoba, Mendoza, and Tucuman.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1lwSMoALv8lVuNaXMuIOLH/4b127f05f0b062ff32d69de47a415dde/Mar-1---Argentina.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HU4dmFL5YfZfV51WdVp9n/3141f96d29116fb1d3d905c0228d99ad/Mar-1---Argentina---city.jpeg.jpeg" />
            
            </figure>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>Just a few days later on March 4, Kenya Power <a href="https://twitter.com/KenyaPower_Care/status/1632042740035862530">issued</a> a Customer Alert at 18:25 local time (15:25 UTC) regarding a nationwide power outage, noting that it had <i>“lost bulk power supply to various parts of the country due to a system disturbance.”</i> The alert came approximately an hour after the country’s Internet traffic dropped significantly. A <a href="https://twitter.com/KenyaPower_Care/status/1632131538094551040">subsequent tweet</a> dated midnight local time (21:00 UTC) claimed that “<i>electricity supply has been restored to all areas countrywide</i>” and the figure below shows that traffic levels returned to normal levels shortly thereafter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Dinc1PcG6PWbHokeo9G0S/e42a87f37165ec7c742d8979e25b87fd/Mar-4---Kenya.png" />
            
            </figure>
    <div>
      <h2>Earthquake</h2>
      <a href="#earthquake">
        
      </a>
    </div>
    
    <div>
      <h3>Turkey</h3>
      <a href="#turkey">
        
      </a>
    </div>
    <p>On February 5, a <a href="https://earthquake.usgs.gov/earthquakes/eventpage/us6000jllz/executive">magnitude 7.8 earthquake</a> occurred 23 km east of Nurdağı, Turkey, <a href="https://www.cnn.com/2023/02/05/europe/earthquake-hits-turkey-intl-hnk/index.html">leaving many thousands dead and injured</a>. The quake, which occurred at 04:17 local time (01:17 UTC), was believed to be the strongest to hit Turkey since 1939. The widespread damage and destruction resulted in significant disruptions to Internet connectivity in multiple areas of the country, as shown in the figures below. Although Internet traffic volumes were relatively low because it was so early in the morning, the graphs show it <a href="https://twitter.com/CloudflareRadar/status/1622560385411825665">dropping even further</a> at or around the time of the earthquake. Nearly half a day later, traffic volumes in selected locations were between 63-94% lower than at the same time the previous week. A month later, after several aftershocks, <a href="https://twitter.com/CloudflareRadar/status/1633145887961542662">traffic volumes had mostly recovered</a>, although some regions were still struggling to recover.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/h9GtvamYD4HwDXOceKt5e/55944cd87bc93ac748ae3466eca01e73/pasted-image-0-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6IffAy2A3vQXoG6LyU8N70/8f083c34127862fd9a9b1cda736ad4af/pasted-image-0--1--1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WE3hKlOxKYd1ppTjELD1I/af9b4e9a3417ae4a0af5b3bbf8e0c8a7/pasted-image-0--2--1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6313GiOLiYt4UIS5dsMzCy/95287e705d35d0cfffc8bc9ad833a301/pasted-image-0--3--1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1b59EV06o6hULW28TYDYVn/50418d5da0d1a60b3b88d536e4994036/pasted-image-0--4--1.png" />
            
            </figure>
    <div>
      <h2>Weather</h2>
      <a href="#weather">
        
      </a>
    </div>
    
    <div>
      <h3>New Zealand</h3>
      <a href="#new-zealand">
        
      </a>
    </div>
    <p>Called the “<a href="https://www.dailymail.co.uk/sciencetech/article-11748949/Map-reveals-Cyclone-Gabrielles-trail-destruction.html">country’s biggest weather event in a century</a>”, Cyclone Gabrielle wreaked havoc on northern <a href="https://radar.cloudflare.com/nz">New Zealand</a>, including infrastructure damage and power outages impacting tens of thousands of homes. As a result, regions including Gisborne and Hawkes Bay <a href="https://twitter.com/CloudflareRadar/status/1625543249501855744">experienced Internet disruptions</a> that lasted several days, starting at 00:00 local time on February 14 (11:00 UTC on February 13). The figures below show that in both regions, peak traffic volume returned to pre-cyclone levels around February 19.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ka9mAE9zVNtCX8CYKB0sX/8cb4ef15c4f2164d312624fda0a09ec9/Feb-14-20---NZ---Gisborne.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1fcBb8L6myZjgKWeehe2Rs/fa64350a94f235d50af70dd6681b3474/Feb-14-20---NZ---Hawkes-Bay.png" />
            
            </figure>
    <div>
      <h3>Vanuatu</h3>
      <a href="#vanuatu">
        
      </a>
    </div>
    <p>Later in February, <a href="https://www.ifrc.org/press-release/cyclone-judy-wreaks-havoc-across-vanuatu-red-cross-ready-respond">Cyclone Judy</a> hit the South Pacific Ocean nation of <a href="https://radar.cloudflare.com/vu">Vanuatu</a>, the South Pacific Ocean nation made up of roughly 80 islands that stretch 1,300 kilometers. The Category 4 cyclone damaged homes and caused power outages, resulting in a significant drop in the country’s Internet traffic. On February 28, <a href="https://twitter.com/CloudflareRadar/status/1631259857151041536">Vanuatu’s traffic dropped by nearly 80%</a> as the cyclone struck, and as seen in the figure below, it took nearly two weeks for traffic to recover to the levels seen earlier in February.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/74QUIZUeEC3bhaJoTOowZJ/aae01783ec18c72893e0da277ccaa3e4/Mar-14---Vanuatu.png" />
            
            </figure>
    <div>
      <h3>Malawi</h3>
      <a href="#malawi">
        
      </a>
    </div>
    <p>Cyclone Freddy, said to be <a href="https://www.csmonitor.com/World/Africa/2023/0314/Destructive-record-breaking-cyclone-batters-Malawi-Mozambique-twice">the longest-lasting, most powerful cyclone on record</a>, hit <a href="https://radar.cloudflare.com/mw">Malawi</a> during the weekend of March 11-12, and into Monday, March 13. The resulting damage <a href="https://twitter.com/CloudflareRadar/status/1635711974179733512">disrupted Internet connectivity</a> in the east African country, with traffic dropping around 11:00 local time (09:00 UTC) on March 13. The disruption lasted for over two days, with traffic levels recovering around 21:00 local time (19:00 UTC) on March 15.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4QNqm3w3d83KuoXdxBlwfk/ee2d614358cbc6aa6867068bb4f5bc01/Mar-13-15---Malawi.png" />
            
            </figure>
    <div>
      <h2>Technical problems</h2>
      <a href="#technical-problems">
        
      </a>
    </div>
    
    <div>
      <h3>South Africa</h3>
      <a href="#south-africa">
        
      </a>
    </div>
    <p>Just before 07:00 local time (05:00 UTC) on February 1, <a href="https://radar.cloudflare.com/za">South African</a> service provider <a href="https://radar.cloudflare.com/as37053">RSAWEB</a> initially <a href="https://twitter.com/RSAWEB/status/1620646112343502848">tweeted</a> about a problem that they said was impacting their cloud and VOIP platforms. However, in several subsequent tweets, they noted that the problem was also impacting <a href="https://twitter.com/RSAWEB/status/1620672856983236608">internal systems</a>, as well as <a href="https://twitter.com/RSAWEB/status/1620688317611384837">fiber</a> and <a href="https://twitter.com/RSAWEB/status/1620735281094877184">mobile</a> connectivity. The figure below shows traffic for RSAWEB dropping at 06:30 local time (04:30 UTC), a point at which it would normally be starting to increase for the day. Just before 16:00 local time (14:00 UTC), RSAWEB <a href="https://twitter.com/RSAWEB/status/1620782687853350913">tweeted</a> <i>“...engineers are actively working on restoring services post the major incident. Customers who experienced no connectivity may see some services restoring.”</i> The figure below shows a sharp increase in traffic around that time with gradual growth through the evening. However, full restoration of services across all of RSAWEB’s impacted platforms took a full week, according to a February 8 <a href="https://twitter.com/RSAWEB/status/1623254114057478145">tweet</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/338PQDcKfcKAiiQ8ZBB0lv/741c3874482f77bbea7a6b256a670a0b/Feb-1---South-Africa---AS37053---full-day.png" />
            
            </figure>
    <div>
      <h3>Italy</h3>
      <a href="#italy">
        
      </a>
    </div>
    <p>An unspecified “international interconnectivity problem” impacting Telecom Italia caused a <a href="https://twitter.com/CloudflareRadar/status/1622253904036597760">multi-hour Internet disruption</a> in <a href="https://radar.cloudflare.com/it">Italy</a> on February 5. At a country level, a nominal drop in traffic is visible in the figure below starting around 11:45 local time (10:45 UTC) with some volatility visible in the lower traffic through 17:15 local time (16:15 UTC). However, the impact of the problem is more obvious in the traffic graphs for <a href="https://radar.cloudflare.com/as3269">AS3269</a> and <a href="https://radar.cloudflare.com/as16232">AS16232</a>, both owned by Telecom Italia. Both graphs show a more significant loss of traffic, as well as greater volatility through the five-plus hour disruption.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6jY3qHS2L2aqiMo83IBMOd/0e62740e8292e6d1d9a617f0b0d3730e/Feb-5---Italy.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1oJTmRTQpgII5eqb61c2bF/c21e9a4996ac26274849921e1cbc6949/Feb-5---Italy---AS3269.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2YrDCTPoBjh4JF6b6oo6nt/bc14a843efbf8ab0fa7e107ff55f48c7/Feb-5---Italy---AS16232.png" />
            
            </figure>
    <div>
      <h3>Myanmar</h3>
      <a href="#myanmar">
        
      </a>
    </div>
    <p>A <a href="https://elevenmyanmar.com/news/fire-breaks-out-at-mpt-exchange-office-in-mayangon-cutting-off-mpt-phone-line-and-internet">fire at an exchange office of MPT</a> (Myanma Posts and Telecommunications) on February 7 disrupted Internet connectivity for customers of the Myanmar service provider. A <a href="https://www.facebook.com/mptofficialpage/posts/pfbid049j26HDBSJyrn21akG7HWHkE9uQLbwqD1tQiucBJvTyfZjU1aLqGZV1QHFmUyL5Yl?__tn__=-R">Facebook post</a> from MPT informed customers that <i>“We are currently experiencing disruptions to our MPT's services including MPT's call centre, fiber internet, mobile internet and mobile and telephone communications.”</i> The figure below shows the impact of this disruption on MPT-owned <a href="https://radar.cloudflare.com/as9988">AS9988</a> and <a href="https://radar.cloudflare.com/as45558">AS45558</a>, with traffic dropping significantly at 10:00 local time (03:30 UTC). Significant recovery was seen by 22:00 local time (15:30 local time).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7pTv7CAAaVpbc3wrZr9DmB/bac7744ba0f5d1798968b6168c85a25b/Feb-7---Myanmar---AS9988.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TGwyw1Y7RSHLw6S7GWvNV/3aa6849a1f58fda2318b581c25981cfb/Feb-7---Myanmar---AS45558.png" />
            
            </figure>
    <div>
      <h3>Republic of the Congo (Brazzaville)</h3>
      <a href="#republic-of-the-congo-brazzaville">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/as37451">Congo Telecom</a> <a href="https://twitter.com/CloudflareRadar/status/1635969801859260419">tweeted</a> a “COMMUNIQUÉ” on March 15, alerting users to a service disruption due to a “network incident”. The impact of this disruption is clearly visible at a <a href="https://radar.cloudflare.com/cg">country</a> level, with <a href="https://twitter.com/CloudflareRadar/status/1635969801859260419">traffic dropping sharply</a> at 00:45 local time (23:45 on March 14 UTC), driven by complete outages at <a href="https://radar.cloudflare.com/as37463">MTN Congo</a> and Congo Telecom, as seen in the graphs below. While traffic at MTN Congo began to recover around 08:00 local time (07:00 UTC), Congo Telecom’s recovery took longer, with traffic beginning to increase around 17:00 local time (16:00 UTC). Congo Telecom <a href="https://twitter.com/CongoOfficiel/status/1636440652899598368">tweeted</a> on March 16 that the nationwide Internet outage had been resolved. MTN Congo did not acknowledge the disruption on social media, and neither company provided more specific information about the reported “network incident”.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5KwUIma8b5zD4lfrdxF0XI/93f2a8876fa75a0a55d1f130f5631d6e/Mar-15---Congo.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5KecQrfHWxYfZqJ8hdRve5/f54089c6263af7f6ae49eeb60e2ca947/Mar-15---Congo---MTN-COngo.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WCWqMSXUTniwGlg15M8sp/136a115fd4c26c1b49e7446f35bfd8f2/Mar-14-16---Congo---CongoTelecom.png" />
            
            </figure>
    <div>
      <h3>Lebanon</h3>
      <a href="#lebanon">
        
      </a>
    </div>
    <p>Closing out March, <a href="https://twitter.com/CloudflareRadar/status/1641093991792771072">disruptions</a> observed at <a href="https://radar.cloudflare.com/as39010">AS39010 (Terranet)</a> and <a href="https://radar.cloudflare.com/as42334">AS42334 (Mobi)</a> in <a href="https://radar.cloudflare.com/lb">Lebanon</a> may have been related to a strike at upstream provider <a href="https://radar.cloudflare.com/as42003">Ogero Telecom</a>, common to both networks. A <a href="https://developingtelecoms.com/telecom-business/operator-news/14763-network-blackout-imminent-in-lebanon-as-ogero-workers-strike-over-pay.html">published report</a> quoted the Chairman of Ogero commenting on the strike, <i>“We are heading to a catastrophe if a deal is not found with the government: the network will completely stop working as our generators will gradually run out of fuel. Lebanon completely relies on Ogero for its bandwidth, leaving no one exempt from a blackout.”</i> Traffic at both Terranet and Mobi dropped around 05:00 local time (03:00 UTC) on March 29, with the disruption lasting approximately 4.5 hours, as traffic recovered at 09:30 local time (07:30 UTC).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66zRN55X26vdKh6gTOO2AQ/2895c53b6bf7e78b2ce0b9ff8b61b07c/Mar-29---Lebanon---AS39010.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/320LovoI7dlpnVcggOe2LL/b71d2b694422df6e7ec9cdd8028a3244/Mar-29---Lebanon---AS42334.png" />
            
            </figure>
    <div>
      <h2>Cyberattacks</h2>
      <a href="#cyberattacks">
        
      </a>
    </div>
    
    <div>
      <h3>South Korea</h3>
      <a href="#south-korea">
        
      </a>
    </div>
    <p>On January 29, <a href="https://radar.cloudflare.com/kr">South Korean</a> Internet provider LG Uplus suffered <a href="https://twitter.com/CloudflareRadar/status/1620238717821616129">two brief Internet disruptions</a> which were reportedly caused by possible <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attacks</a>. The first disruption occurred at 03:00 local time (18:00 UTC on January 28), and the second occurred at 18:15 local time (09:15 UTC). The disruptions impacted traffic on <a href="https://radar.cloudflare.com/as17858">AS17858</a> and <a href="https://radar.cloudflare.com/as3786">AS3786</a>, both owned by LG. The company was <a href="https://koreajoongangdaily.joins.com/2023/02/06/business/industry/Korea-LG-U-DDoS/20230206175514381.html">reportedly</a> hit by a second pair of DDoS attacks on February 4.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66DKF7ki9ypTWWFx8zHOUF/911a8d2e00a5ec9cd18e71bb394ceb03/January-29---Korea---LG-Uplus.png" />
            
            </figure>
    <div>
      <h3>Guam</h3>
      <a href="#guam">
        
      </a>
    </div>
    <p>In a March 17 <a href="https://twitter.com/DocomoPacificGu/status/1636541123299782657">tweet</a> posted at 11:30 local time (01:30 UTC), Docomo Pacific reported an outage affecting multiple services, with a subsequent <a href="https://twitter.com/DocomoPacificGu/status/1636668541150855169">tweet</a> noting that <i>“Early this morning, a cyber security incident occurred and some of our servers were attacked”</i>. This outage is visible at a country level in <a href="https://radar.cloudflare.com/gu">Guam</a>, seen as a significant drop in traffic starting around 10:00 local time (00:00 UTC) in the figure below. However, in the graph below for <a href="https://radar.cloudflare.com/as3605">AS3605 (ERX-KUENTOS/Guam Cablevision/Docomo Pacific)</a>, the cited outage results in a near-complete loss of traffic starting around 05:00 local time (19:00 on March 16 UTC). Traffic returned to normal levels by 18:00 local time on March 18 (08:00 UTC).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1h9sTZmSWiTcXsbxC4bWpu/eee3deccc5308690b3e9dbf72e2e73e9/Mar-16-18---Guam-.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/eQuiNjHwlyA8xVKoAkmH7/5495ecf8b680d4125f21e9e08ff8e7b2/Mar-16-18---Guam---DocomoPacific.png" />
            
            </figure>
    <div>
      <h2>Ukraine/Military Action</h2>
      <a href="#ukraine-military-action">
        
      </a>
    </div>
    <p>In February, the conflict in <a href="https://radar.cloudflare.com/ua">Ukraine</a> entered its <a href="/one-year-of-war-in-ukraine/">second year</a>, and over this past year, we have tracked its impact on the Internet, highlighting <a href="/internet-traffic-patterns-in-ukraine-since-february-21-2022/">traffic shifts</a>, <a href="/ukraine-update/">attacks</a>, <a href="/tracking-shifts-in-internet-connectivity-in-kherson-ukraine/">routing changes</a>, and <a href="/q4-2022-internet-disruption-summary/">connectivity disruptions</a>. In the fourth quarter of 2022, a number of disruptions were related to attacks on electrical infrastructure, and this pattern continued into the first quarter of 2023.</p><p>One such disruption occurred in Odessa on <a href="https://twitter.com/CloudflareRadar/status/1618602213965692930">January 27</a>, amid <a href="https://www.aerotime.aero/articles/russian-missile-attack-in-ukraine-hits-kyiv-and-energy-plants-near-odessa">news</a> of Russian airstrikes on local energy infrastructure. As seen in the figure below, Internet traffic in Odessa usually begins to climb just before 08:00 local time (06:00 UTC), but failed to do so that morning after several energy infrastructure facilities near Odessa were hit and damaged. Traffic remained lower than levels seen the previous week for <a href="https://twitter.com/CloudflareRadar/status/1618929482366066691">approximately 18 hours</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/51JUidtqCzao7GVzlTDsV4/00f2ac27aea3098cd47d0c44f43e261b/pasted-image-0--5--1.png" />
            
            </figure><p>Power outages resulting from <a href="https://kyivindependent.com/pm-shmyhal-energy-sites-in-8-ukrainian-regions-hit-in-russian-march-9-attack/">Russian attacks on energy generation and distribution facilities</a> on <a href="https://twitter.com/CloudflareRadar/status/1633800306898214916">March 9</a> resulted in disruptions to Internet connectivity in multiple locations around Ukraine. As seen in the figures below, traffic dropped below normal levels after 02:00 local time (00:00 UTC) on March 9. Traffic in Kharkiv fell over 50% as compared to previous week, while in Odessa, traffic fell as much as 60%. In Odessa, Mykolaiv, and Kirovohrad Oblast, <a href="https://twitter.com/CloudflareRadar/status/1633801985777442823">traffic recovered</a> by around 08:00 local time (06:00 UTC), while in Kharkiv, the disruption lasted nearly two days, <a href="https://twitter.com/CloudflareRadar/status/1635258134758391808">returning to normal levels</a> around 23:45 local time (21:45 UTC) on Friday, March 10.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ogLqkj6uTPtLc3XZMSBXF/e7ef440c819ecfe124453d28715b355d/pasted-image-0--6--1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Gd8SS9bHwnSg6NmbuPv7B/2c121b8fd2b39c449a831736991f3bf5/pasted-image-0--7--1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4VrQO9LOJz8vFUdxdLnaOl/491ef1a71380f322c05fd4447cb9a7f5/pasted-image-0--8--1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ybp74x39jJXuuboWwPSsE/de75596c6af4bc0f71930494eca5340d/pasted-image-0--9--2.png" />
            
            </figure>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>The first quarter of 2023 seemed to be particularly active from an Internet disruption perspective, but hopefully it is not a harbinger of things to come through the rest of the year. This is especially true of government-directed shutdowns, which occurred fairly regularly through 2022. To that end, civil society organization <a href="https://www.accessnow.org/">Access Now</a> recently published their <a href="https://www.accessnow.org/internet-shutdowns-2022/"><i>Internet shutdowns in 2022</i></a> report, finding that In 2022, governments and other actors disrupted the internet at least 187 times across 35 countries. Cloudflare Radar is proud to support Access Now’s <a href="https://www.accessnow.org/campaign/keepiton/">#KeepItOn</a> initiative, using our data to help illustrate the impact of Internet shutdowns and other disruptions.</p><p>To follow Internet disruptions as they occur, check the <a href="https://radar.cloudflare.com/outage-center">Cloudflare Radar Outage Center (CROC)</a> or the <a href="https://developers.cloudflare.com/api/operations/radar_get_AnnotationsOutages">Radar API</a>. On social media, follow <a href="https://twitter.com/cloudflareradar">@CloudflareRadar on Twitter</a> or <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <guid isPermaLink="false">5Iv328iCD6mgOu1ZybMnG7</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s commitment to the 2023 Summit for Democracy]]></title>
            <link>https://blog.cloudflare.com/cloudflare-commitment-to-the-2023-summit-for-democracy/</link>
            <pubDate>Tue, 28 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is proud to participate in and contribute commitments to the 2023 Summit Summit for Democracy because we believe that everyone should have access to an Internet that is faster, ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On Tuesday, March 28, 2023, the US Government will launch the <a href="https://www.state.gov/summit-for-democracy-2023/">Summit for Democracy 2023</a>, following up on the inaugural <a href="https://www.state.gov/summit-for-democracy-2021/">Summit for Democracy 2021</a>. The Summit is co-hosted by the United States, Costa Rica, Zambia, the Netherlands, and South Korea. Cloudflare is proud to participate in and contribute commitments to the Summit because we believe that everyone should have access to an Internet that is faster, more reliable, more private, and more secure.  We work to ensure that the responsibility to respect human rights is embedded throughout our business functions. Cloudflare’s mission — to help build a better Internet — reflects a long-standing belief that we can help make the Internet better for everyone.</p><p>Our mission and core values dovetail with the Summit’s goals of strengthening democratic governance, respect for human rights and human rights defenders, and working in partnership to strengthen respect for these values. As we have <a href="/applying-human-rights-frameworks-to-our-approach-to-abuse/">written about before</a>, access to the Internet allows activists and human rights defenders to expose abuses across the globe, allows collective causes to grow into global movements, and provides the foundation for large-scale organizing for political and social change in ways that have never been possible before.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5rSJ6ucWgBy2LkLs1AU6uJ/6622ab0532e0a40defb39f373a3afda6/Screenshot-2023-03-28-at-11.34.32.png" />
            
            </figure>
    <div>
      <h3>What is the Summit for Democracy?</h3>
      <a href="#what-is-the-summit-for-democracy">
        
      </a>
    </div>
    <p>In December 2021, in an effort to respond to challenges to democracy worldwide, the United States held the first ever global Summit for Democracy. The Summit provided an opportunity to strengthen collaboration between democracies around the world and address common challenges from authoritarian threats.  The United States invited over 100 countries plus the President of the European Commission and the United Nations Secretary-General. The Summit focused on three key themes: (1) defending against authoritarianism; (2) addressing and fighting corruption; and (3) promoting respect for human rights, and gave participants an opportunity to announce commitments, reforms, and initiatives to defend democracy and human rights. The Summit was followed by a Year of Action, during which governments implemented their commitments to the Summit.</p><p>The 2023 Summit will focus more directly on partnering with the private sector to promote an affirmative vision for technology by countering the misuse of technology and shaping emerging technologies so that they strengthen democracy and human rights, which Cloudflare supports in theory and in practice.</p><p>The three-day Summit will highlight the importance of the private sector’s role in responding to challenges to democracy. The first day of the Summit is the <a href="https://www.state.gov/summit-for-democracy-2023/#March28">Thematic Day</a>, where Cabinet-level officials, the private sector and civil society organizations will spotlight key Summit themes. On the second day of the Summit, the <a href="https://www.state.gov/summit-for-democracy-2023/#March29">Plenary Day</a>, the five co-hosts will each host a high-level plenary session. On the final day of the Summit, <a href="https://www.state.gov/summit-for-democracy-2023/#March30">Co-Host Event Day</a>, each of the co-hosts will lead high-level regional conversations with partners from government, civil society, and the private sector.</p><p>Cloudflare will be participating in the Thematic Day and the Co-Host Event Day in Washington, DC, in addition to other related events.</p>
    <div>
      <h3>Cloudflare commitments</h3>
      <a href="#cloudflare-commitments">
        
      </a>
    </div>
    <p>In advance of the 2023 Summit, the United States issued a <a href="https://www.state.gov/wp-content/uploads/2023/02/Private-Sector-Call-to-Advance-Democracy-1.pdf">Call to Action</a> to the private sector to consider commitments that advance an affirmative agenda for democratic renewal. The United States encouraged the private sector to make commitments that align with the <a href="https://www.state.gov/presidential-initiative-for-democratic-renewal-drl-office-of-global-programs-efforts/">Presidential Initiative on Democratic Renewal</a>, the <a href="https://www.state.gov/declaration-for-the-future-of-the-internet">Declaration on the Future of the Internet</a>, and the Summit’s four objectives:</p><ul><li><p>Countering the misuse of technology</p></li><li><p>Fighting corruption</p></li><li><p>Protecting civic space</p></li><li><p>Advancing labor rights</p></li></ul><p>Cloudflare answered the United States’s call to action and made commitments to (1) help democratize post-quantum cryptography; (2) work with researchers to share data on Internet censorship and shutdowns; and (3) engage with civil society on Internet protocols and the application of privacy-enhancing technologies.</p>
    <div>
      <h3>Democratizing post-quantum cryptography by including it for free, by default</h3>
      <a href="#democratizing-post-quantum-cryptography-by-including-it-for-free-by-default">
        
      </a>
    </div>
    <p>At Cloudflare, we believe to enhance privacy as a human right the most advanced cryptography needs to be available to everyone, free of charge, forever. Cloudflare has committed to including post-quantum cryptography for free by default to all customers – including individual web developers, small businesses, non-profits, and governments. In particular, this will benefit at-risk groups using Cloudflare services like humanitarian organizations, human rights defenders, and journalists through <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, as well as state and local government election websites through the <a href="https://www.cloudflare.com/athenian/">Athenian Project</a>, to help secure their websites, APIs, cloud tools and remote employees against future threats.</p><p>We believe everyone should have access to the next era of <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity standards</a>–instantly and for free. To that end, Cloudflare will also publish vendor-neutral roadmaps based on NIST standards to help businesses secure any connections that are not protected by Cloudflare. We hope that others will follow us in making their implementations of post-quantum cryptography free so that we can create a secure and private Internet without a “quantum” up-charge.  More details about our commitment is <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-democratizes-post-quantum-cryptography-by-delivering-it-for-free/">here</a> and <a href="/post-quantum-crypto-should-be-free/">here</a>.</p>
    <div>
      <h3>Working with researchers to better document Internet censorship and shutdowns</h3>
      <a href="#working-with-researchers-to-better-document-internet-censorship-and-shutdowns">
        
      </a>
    </div>
    <p>Cloudflare commits to working with researchers to share data about Internet shutdowns and selective Internet traffic interference and to make the results of the analysis of this data public and accessible. The Cloudflare Network includes 285 locations in over 100 countries, interconnects with over 11,500 networks globally, and serves a significant portion of global Internet traffic. Cloudflare shares aggregated data on the Internet's patterns, insights, threats and trends with the public through <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>, including providing alerts and data to help organizations like <a href="https://www.accessnow.org/">Access Now's</a> <a href="https://www.accessnow.org/campaign/keepiton/">KeepItOn</a> coalition, the <a href="https://freedomonlinecoalition.com/">Freedom Online Coalition</a>, the <a href="https://www.internetsociety.org/">Internet Society</a>, and <a href="https://ooni.org/">Open Observatory of Network Interference</a> (OONI) monitor Internet censorship and shutdowns around the world. Cloudflare commits to working with research partners to identify signatures associated with connection tampering and failures, which are believed to be caused primarily by active censorship and blocking. Cloudflare is well-positioned to observe and report on these signatures from a global perspective, and will provide access to its findings to support additional tampering detection efforts.</p>
    <div>
      <h3>Engaging with civil society on Internet protocols and the development and application of privacy-enhancing technologies</h3>
      <a href="#engaging-with-civil-society-on-internet-protocols-and-the-development-and-application-of-privacy-enhancing-technologies">
        
      </a>
    </div>
    <p>Cloudflare believes that meaningful consultation with civil society is a fundamental part of building an Internet that advances human rights. As Cloudflare works with Internet standards bodies and other Internet providers on the next-generation of privacy-enhancing technologies and protocols, like protocols to <a href="/dns-encryption-explained/">encrypt Domain Name Service</a> records and <a href="/handshake-encryption-endgame-an-ech-update/">Encrypted Client Hello</a> (ECH) and privacy enhancing technologies like OHTTP, we commit to direct engagement with civil society and human rights experts on standards and technologies that might have implications for human rights.</p><p>Cloudflare has long worked with industry partners, stakeholders, and international standards organizations to build a more private, secure, and resilient Internet for everyone. For example, Cloudflare has built privacy technologies into its network infrastructure, helped develop and deploy TLS 1.3 alongside helping lead QUIC  and other Internet protocols, improve transparency around routing and public key infrastructure (PKI), and operating a public DNS resolver that supports encryption protocols. Ensuring civil society and human rights experts are able to contribute and provide feedback as part of those efforts will make certain that future development and application of privacy-enhancing technologies and protocols are consistent with human rights principles and account for human rights impacts.</p><p>Our commitments to democratizing post-quantum cryptography, working with researchers on Internet censorship and shutdowns, and engaging with civil society on Internet protocols and the development and application of privacy-preserving technologies will help to secure access to a free, open, and interconnected Internet.</p>
    <div>
      <h3>Partnering to make the Summit a success</h3>
      <a href="#partnering-to-make-the-summit-a-success">
        
      </a>
    </div>
    <p>In the lead-up to the Summit, Cloudflare has been working in partnership with the US Department of State, the National Security Council, the US Agency for International Development (USAID), and various private sector and civil society partners to prepare for the Summit. As part of our involvement, we have also contributed to roundtables and discussions with the Center for Strategic and International Studies, GNI, the Design 4 Democracy Coalition, and the Freedom Online Coalition. Cloudflare is also participating in official meetings and side events including at the Carnegie Endowment for International Peace and the Council on Foreign Relations.</p><p>In addition to the official Summit events, there are a wide range of events organized by civil society which the <a href="https://accountabilitylab.org/">Accountability Lab</a> has created a <a href="https://summit4democracy.org/">website</a> to highlight. Separately, on Monday, March 27 the <a href="https://globaldemocracycoalition.org/">Global Democracy Coalition</a> convened a <a href="https://globaldemocracycoalition.org/event/partners-for-democracy-day/">Partners Day</a> to organize civil society and other non-governmental events. Many of these events are being held by some of our Galileo partners like the National Democratic Institute, the International Republican Institute, Freedom House, and the Council of Europe.</p><p>Cloudflare is grateful for all of the hard work that our partners in government, civil society, and the private sector have done over the past few months to make this Summit a success. At a time where we are seeing increasing challenges to democracy and the struggle for human rights around the world, maintaining a secure, open, Internet is critical. Cloudflare is proud of our participation in the Summit and in the commitments we are making to help advance human rights. We look forward to continuing our engagement in the Summit partnership to fulfill our mission to help build a better Internet.</p> ]]></content:encoded>
            <category><![CDATA[USA]]></category>
            <category><![CDATA[Human Rights]]></category>
            <category><![CDATA[Post-Quantum]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Protocols]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Project Galileo]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">5NzVC7zRmPw0EB11aLk3Ou</guid>
            <dc:creator>Zaid Zaid</dc:creator>
            <dc:creator>Patrick Day</dc:creator>
        </item>
    </channel>
</rss>