Internet Shutdowns and Surveillance in War Zones: What Experts Want You to Understand

Published
Written by:
Rachita Jain
Rachita Jain
VPN Staff Editor

At TechNadu, we’ve been looking into how internet safety during war actually works in real-world situations where the stakes are high, like conflict zones and places with heavy internet restrictions. Instead of relying on assumptions or generic advice, we reached out to independent organizations that deal with these issues directly.

For this Q&A, Jillian C. York from the Electronic Frontier Foundation (EFF) shared insights on what people really face when it comes to surveillance, internet shutdowns, and trying to stay informed under pressure. The focus here isn’t on any single tool or product; it’s more about understanding the real risks and how digital exposure actually works in these environments.

The idea behind this approach is pretty simple: get input straight from experts who work in digital rights and privacy, so readers can see a more grounded, realistic picture of what’s going on and make better-informed decisions.

Rachita Jain: If I’m inside a country like Iran right now, how should I realistically think about my safety before trying to access outside information?

Jillian: People should begin from the assumption that internet access during periods of conflict or unrest is not just a technical issue, but a personal safety issue. Risks to certain groups—like journalists, political activists, and minority communities—might be higher, and it’s important that each person consider their individual circumstances as they make decisions.

EFF encourages people to think about their threat model: who might be interested in monitoring them, what devices they rely on, who they communicate with, and what the consequences could be if those activities were exposed. Our Surveillance Self-Defense project includes a guide to creating a security plan.

It is also important to recognize that safety decisions are deeply contextual. What is appropriate or safe for one person may not be safe for another. In highly repressive environments, even seemingly ordinary online behavior can attract attention.

Rachita Jain: If I attempt to bypass restrictions or use tools to access blocked content, what kinds of consequences could I actually face if I’m detected?

Jillian: The consequences can vary widely depending on the legal and political environment, the specific tools being used, and the profile of the individual involved.

In some cases, authorities may throttle or block connections associated with circumvention tools. In others, users may face device confiscation, questioning, intimidation, detention, or legal prosecution. Risks can increase significantly during moments of political unrest or armed conflict, when governments often expand surveillance and enforcement powers.

While many tools offer enhanced privacy or even anonymity, governments like that of Iran may take extraordinary measures to monitor certain individuals.

Rachita Jain: When the internet is heavily restricted or completely shut down, what are the safest and most realistic ways people manage to stay informed?

Jillian: Historically, people rely on a mix of interpersonal networks, offline information sharing, diaspora communities, satellite media, and whatever limited connectivity remains available.

During shutdowns, information often travels through small trusted networks rather than broad public channels. People may share screenshots, downloaded articles, voice notes, or updates passed between contacts with intermittent access.

At the same time, shutdowns create fertile conditions for rumors and disinformation. When access to independent verification disappears, false information can spread quickly through messaging apps and word of mouth. In those situations, caution and verification become especially important.

It is also worth emphasizing that there is often no completely “safe” way to stay informed during a total shutdown. People frequently operate under conditions of uncertainty and risk.

Rachita Jain: How do authorities typically monitor or control online activity during conflicts like this, and how much visibility do they really have into what I do?

Jillian: Governments use a combination of technical and legal mechanisms to monitor and shape online activity.

These can include blocking platforms and websites, throttling traffic, restricting mobile data, filtering keywords, compelling telecommunications providers to cooperate with authorities, monitoring public social media activity, and conducting device searches at checkpoints or during arrests.

The degree of visibility authorities have depends on many factors, including what services are being used, whether communications are encrypted, whether devices are compromised, and how centralized internet infrastructure is within a country.

One important distinction is between metadata and content. Even when authorities cannot easily read encrypted messages, they may still be able to observe patterns such as who is communicating, when, from where, and how often. In some contexts, that information alone can create risks.

Rachita Jain: If I rely on digital tools to communicate or access information, what risks might I be underestimating in a situation like this?

Jillian: People often focus narrowly on the security of a single app or tool while underestimating broader operational risks, including:

Rachita Jain: What are some practical steps I can take to reduce my exposure, even if I don’t have technical expertise?

Jillian: There are a number of practical habits that can reduce risk without requiring advanced technical knowledge.

Our Surveillance Self-Defense guides can help individuals improve upon many of these habits.

Most importantly, people should avoid assuming that any tool offers perfect security. Digital safety is about reducing risk, not eliminating it.

Rachita Jain: In your experience, what do people often get wrong about staying safe online during situations like the Iran conflict?

Jillian: One common misconception is rooted in the binary thinking of “safe” vs “unsafe”—for instance, the idea that by using a particular tool, your communications are completely safe—or that a particular security tool that’s appropriate for one situation is appropriate for every situation. In reality, digital security is layered, and constantly changing, so each new situation requires thinking about one’s specific threat model and security plan.

Another common mistake is the idea that visibility equals safety. Just because millions of others are using a given tool does not inherently mean that there’s safety in numbers. Today’s governments often use sophisticated tools to target individuals that are on their radar.

Finally, in moments of crisis, it’s important to avoid overstating what technology can do. Secure tools are important, but aren’t a substitute for careful judgement and realistic assessments of risk.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: