Skip to content
Case Studies

Bangladesh: Internet Shutdown During the 2024 Uprising

Bangladesh2024-07-18National (170 million people)Tor / Snowflakeamateur radiooffline-first apps7 min read
On this page

Bangladesh's July–August 2024 internet shutdown was the longest and most technically complex in the country's history. A student-led uprising against a quota system for government jobs escalated into a national political crisis. The government responded with layered communication controls — full blackouts, bandwidth throttling, and targeted blocking of social media and circumvention tools — deployed across 170 million people over 22 days.

Bangladesh — 170 million people

Background: Centralized Infrastructure, Centralized Control

Bangladesh's internet architecture has a structural vulnerability: all domestic traffic passes through a small number of International Internet Gateways (IIGs). This concentration, built for cost efficiency, makes nationwide shutdown straightforward. Authorities can restrict access either by instructing individual ISPs or by applying controls upstream at the IIG level, affecting all downstream users simultaneously.

The government body responsible, the Bangladesh Telecommunication Regulatory Commission (BTRC), issued most directives informally (often via WhatsApp messages to operators) with no published orders and no formal legal process. This opacity made it impossible for citizens or journalists to verify or challenge restrictions in real time.

Bangladesh had imposed internet disruptions before: brief blackouts during protests in 2015, 2018, and 2021. But the July–August 2024 shutdown was categorically different in scope, duration, and the layering of methods used.

The Shutdown: Five Phases Over 22 Days

The shutdown was documented in a joint investigation by Digitally Right and OONI (Open Observatory of Network Interference), published in 2025. Their analysis identified five distinct phases:

  1. Jul 15–17

    Targeted throttling and campus blocks

    Mobile internet throttled at university areas. Facebook blocked on mobile networks via TLS interference.
  2. Jul 18–23

    Full national blackout — 5 days

    All mobile and fixed internet cut. OONI confirmed near-complete disconnection. At least 143 deaths reported during this period.
  3. Jul 24–30

    Partial restoration with platform blocks

    Broadband returned; mobile data restricted. Facebook, YouTube, WhatsApp, TikTok, and most messaging apps remained blocked.
  4. Jul 31–Aug 5

    VPN blocking + second full blackout

    Commercial VPNs blocked. Second total blackout on August 5 — the deadliest day of protests (223 more deaths). PM Hasina resigned and fled.
  5. After Aug 5

    Progressive restoration

    Connectivity progressively restored as political situation stabilized. Platform blocks gradually lifted.
0%25%50%75%100%% of baselineJul 14NormalJul 17Campus cutsBlackoutJul 21PartialJul 28Aug 52nd blackoutAug 12Restoring
Approximate internet traffic relative to pre-shutdown baseline. Based on OONI and NetBlocks measurement data — exact values are illustrative of the documented pattern.

What Worked and What Didn't

What worked
  • Tor with Snowflake bridges remained accessible for some users throughout — Snowflake disguises traffic as WebRTC, making it harder to block than standard VPNs
  • SMS on mobile networks remained partially functional even during data blackouts, as it uses the signaling channel separately from data
  • Fixed broadband (fiber to home) was restored earlier than mobile data after the July 18–23 blackout
  • Offline-first apps with pre-downloaded content (maps, cached news) continued working without internet
  • International organizations monitoring network conditions from outside Bangladesh (OONI, IODA, NetBlocks) provided real-time evidence of the shutdown's extent
What didn't work
  • WhatsApp, Signal, and Telegram (the primary tools for coordination and family contact) were blocked or nonfunctional during the full blackouts
  • Standard commercial VPNs (ProtonVPN, NordVPN, TunnelBear) were blocked during the July 31–August 5 phase
  • Mobile data was the first to be cut and last to be restored, leaving the 90%+ of Bangladeshis who access internet via smartphone without connectivity longest
  • International calls to Bangladesh reached phones that were simply offline — no infrastructure could bridge a total blackout
  • Evidence of abuses was difficult to document and share during the blackout, which is consistent with the shutdown's apparent purpose

The Circumvention Layer

The blocking of commercial VPNs in late July prompted a shift to more specialized circumvention tools. Tor's Snowflake pluggable transport disguises traffic as ordinary WebRTC browser calls, making it significantly harder to fingerprint and block than VPN protocols. The Tor Project reported sustained usage from Bangladesh throughout the shutdown.

PHASE 1
Throttling & targeted blocks
Phase 1
PHASE 2
Social media & messaging blocked
Phase 2
PHASE 3
VPNs blocked (DPI)
Phase 3
PHASE 4
Full internet blackout
Phase 4
Escalating control →
Phase 1VPNs, normal apps (slower)
Phase 2Commercial VPNs, Tor
Phase 3Tor + Snowflake, obfs4
Phase 4Satellite, HF radio only
Pattern documented across Bangladesh (2024), Iran (2025), Myanmar (2021), Russia (ongoing), and others. Each phase adds new controls on top of previous ones; prepare circumvention tools for every phase before it arrives.

The Bangladesh shutdown demonstrated a pattern now seen across multiple countries: initial platform blocks prompt a shift to VPNs; VPN blocking prompts a shift to traffic obfuscation tools; obfuscation tools require more sophisticated detection to block. Each escalation raises the technical cost for the censor but also raises the technical barrier for ordinary users.

Iran faced a similar escalation during its June 2025 wartime shutdown. Russia has been engaged in this cat-and-mouse cycle continuously since 2022.

Lessons

  1. Centralized internet infrastructure is a shutdown risk, not just a reliability risk.

    Bangladesh's IIG chokepoints were built for economic efficiency. They also made nationwide shutdown a single administrative decision. Countries where all traffic passes through a small number of government-accessible gateways face this exposure regardless of their political situation today.

  2. Shutdowns follow escalation patterns that can be anticipated.

    The sequence — throttling, platform blocks, full blackout, VPN blocking — has appeared in Bangladesh, Iran, Myanmar, and Ethiopia. Each phase signals what is coming next. Communities that pre-install Tor with Snowflake before a crisis have better options than those who try to download it after platforms are blocked.

  3. Commercial VPNs fail under targeted blocking; traffic obfuscation survives longer.

    ProtonVPN, NordVPN, and TunnelBear were blocked within days of the July 31 VPN crackdown. Tor with Snowflake continued operating. The difference is that Snowflake disguises traffic as WebRTC, while commercial VPN protocols have recognizable fingerprints that DPI (deep packet inspection) equipment can identify and block.

  4. Full blackouts cannot be circumvented with software.

    During the July 18–23 and August 5 full disconnections, no circumvention tool provided access because no internet connectivity existed to obfuscate. The only options in a full blackout are radio-based systems (HF amateur radio, Meshtastic) or satellite links that bypass terrestrial infrastructure entirely.

  5. Opacity in shutdown orders makes accountability harder.

    Bangladesh's directives were issued informally, often by WhatsApp, with no published legal basis. This pattern — documented also in India, Ethiopia, and Pakistan — means citizens cannot challenge shutdowns through legal processes during the event. Post-event documentation (as the OONI/Digitally Right report provides) becomes the primary accountability mechanism.

  6. Mobile internet is more vulnerable than fixed broadband.

    Mobile data was cut first and restored last in every phase of the Bangladesh shutdown. Fixed broadband connections to homes and businesses restored earlier. Communities and organizations with wired connections to their premises have a resilience advantage that mobile-only users do not.

Preparing for Shutdown Risk

The most effective preparation happens before a shutdown begins. Once platforms are blocked, downloading new tools becomes difficult. Once VPNs are blocked, setting up Tor requires technical knowledge many users don't have. Once the full blackout starts, no software preparation helps.

For communities in countries with shutdown history or risk: pre-install Tor Browser and configure Snowflake bridges in advance; establish out-of-band communication plans (SMS trees, pre-agreed check-in times) that don't rely on internet-dependent apps; and consider whether any members have amateur radio licenses or satellite communicators that could bridge a full blackout.

Was this page helpful?