{"id":2769,"date":"2026-01-05T01:17:11","date_gmt":"2026-01-05T01:17:11","guid":{"rendered":"https:\/\/law.temple.edu\/ilit\/?p=2769"},"modified":"2026-01-22T17:29:46","modified_gmt":"2026-01-22T17:29:46","slug":"digital-darkness-how-governments-use-digital-repression-to-silence-dissent","status":"publish","type":"post","link":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/","title":{"rendered":"Digital Darkness: How Governments Use Digital Repression to Silence Dissent"},"content":{"rendered":"\n<p>By: Atoosa Haghani, LAW \u201827<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"803\" src=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo-1024x803.jpg\" alt=\"\" class=\"wp-image-2770\" srcset=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo-1024x803.jpg 1024w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo-300x235.jpg 300w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo-768x602.jpg 768w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo-1320x1035.jpg 1320w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>It begins with silence.<\/p>\n\n\n\n<p>Not the absence of noise, but a forced muting, of protests, press, and pain. The Wi-Fi is suddenly out. Social media goes dark. Text messages stop delivering. Entire regions vanish from the internet in seconds.<\/p>\n\n\n\n<p><em>\u201cWe\u2019ve lost contact.\u201d<\/em><br><em>\u201cNo service.\u201d<\/em><br><em>\u201cI can\u2019t reach my family.\u201d<\/em><\/p>\n\n\n\n<p>These phrases have become common in regions gripped by authoritarianism, political unrest, and even in so-called democratic states. Entire populations are being silenced not just by bullets and prisons, but by digital repression. Digital repression is a <a href=\"https:\/\/freedomhouse.org\/report\/special-report\/2020\/digital-transnational-repression-toolkit-and-its-silencing-effects\">growing set of tools<\/a> that includes internet shutdowns, targeted doxxing, and coordinated disinformation campaigns. Despite small-scale workaround technologies like VPNs and personal satellite systems, these shutdowns and intimidation tactics achieve their primary goals of fragmenting resistance and controlling information flow.<\/p>\n\n\n\n<p>This post covers three primary tools of digital repression: government-mandated internet shutdowns, targeted doxxing as a form of digital intimidation, and disinformation campaigns. While complete internet blackouts can have more widespread and immediate effects and are more readily associated with digitally repressive states, established democracies like the US have adopted subtler but equally damaging forms of online control that serve the same fundamental purpose: limiting what people can see, say, and share.&nbsp;<\/p>\n\n\n\n<p><strong>How Governments Shut Down the Internet<\/strong><\/p>\n\n\n\n<p>A nationwide internet blackout is rarely as simple as \u201cpushing a button.\u201d Instead, governments use their power over the internet and telecommunications companies to block or limit access. Under broad legal authorities that cite \u201cnational security\u201d or \u201cpublic order\u201d, officials can force companies to comply with emergency orders that restrict people\u2019s ability to <a href=\"https:\/\/carnegieendowment.org\/research\/2022\/03\/government-internet-shutdowns-are-changing-how-should-citizens-and-democracies-respond?lang=en\">get online<\/a>.&nbsp;<\/p>\n\n\n\n<p>For example, a Minister of Information and Communications Technology might instruct the country\u2019s largest telecom provider to disable mobile data nationwide, which is what happened in <a href=\"https:\/\/www.hrw.org\/report\/2023\/06\/14\/no-internet-means-no-work-no-pay-no-food\/internet-shutdowns-deny-access-basic\">India during protests in Kashmir<\/a> and <a href=\"https:\/\/www.accessnow.org\/press-release\/open-statement-internet-shutdown-amhara\/\">Ethiopia during armed conflict<\/a>. In other cases, the restrictions are more subtle; providers <a href=\"https:\/\/www.weforum.org\/stories\/2022\/10\/internet-shutdowns-explainer\/\">might slow the internet down<\/a> so much that basic browsing becomes impossible. Providers can also block specific websites and apps by targeting their IP addresses or changing domain settings so people cannot reach them. After the <a href=\"https:\/\/www.dw.com\/en\/myanmar-why-is-junta-shutting-down-internet\/a-71770580\">2021 military coup<\/a> in Myanmar, authorities repeatedly ordered telecom companies to cut internet access altogether, leaving millions disconnected for days at a time.&nbsp;<\/p>\n\n\n\n<p>In September 2025, <a href=\"https:\/\/www.nytimes.com\/2025\/09\/07\/world\/asia\/nepal-bans-social-media-platforms.html\">Nepal\u2019s government blocked 26 social media platforms<\/a>, including Facebook, X, YouTube, LinkedIn, Reddit, Signal, and Snapchat, requiring platforms to register locally and appoint grievance officers. This started a digital rights dispute resulting in massive Gen Z-led protests. The government&#8217;s attempt to silence dissent severely backfired and at <a href=\"https:\/\/www.bbc.com\/news\/articles\/cvg9n760gddo\">least 72 people were killed<\/a> in the protests and ultimately forced the Prime Minister to resign. This demonstrated how digital repression can trigger broader political upheaval when populations refuse to accept enforced silence.<\/p>\n\n\n\n<p>These tactics are highly effective. They disrupt organizing efforts, block the circulation of evidence documenting human rights abuses, and prevent outside observers from understanding what is happening on the ground by isolating populations. These shutdowns often target and hit hardest on <a href=\"https:\/\/internews.org\/commentary\/silence-isnt-golden-how-internet-shutdowns-threaten-peoples-rights\/\">marginalized communities that are already economically vulnerable.<\/a>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why Do Governments Shut Down the Internet?<\/strong><\/h3>\n\n\n\n<p>The logic is simple\u2014information is power. Social media and encrypted messaging apps have fundamentally transformed how political action is organized, how state abuses are exposed, and how international support is mobilized. When governments feel threatened by mass protests, war crime investigations, or calls for regime change, digital communication networks represent an existential threat to their control.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In today\u2019s interconnected world, access to the internet is no longer a luxury; it\u2019s a lifeline. It provides access to information within seconds and within a matter of a few clicks. Most importantly, it offers a platform for organizing and truth-telling. <a href=\"https:\/\/www.weforum.org\/stories\/2022\/10\/internet-shutdowns-explainer\/\">Blackouts aren\u2019t just digital inconveniences; they are direct assaults on human rights<\/a>, expression, and public accountability.&nbsp;<\/p>\n\n\n\n<p><strong>Where These Shutdowns Are Occurring&nbsp;<\/strong><\/p>\n\n\n\n<p>In 2024 <a href=\"https:\/\/www.accessnow.org\/campaign\/2024-elections-and-internet-shutdowns-watch\/\">Access Now<\/a> identified at least 23 countries as having high risk for internet shutdowns during election periods, with documented shutdowns in: Azerbaijan, Pakistan, India, Mauritania, Venezuela and Mozambique. These shutdowns coincided with elections, protests, and armed conflict\u2014precisely the moments when populations need reliable access to information most urgently.<\/p>\n\n\n\n<p>India recorded <a href=\"https:\/\/www.aljazeera.com\/news\/2023\/2\/28\/in-2022-the-world-saw-187-internet-shutdowns-84-by-india-alone\">84 shutdowns in 2022, nearly half of the 187 documented globally<\/a>. Between 2016 and 2023, India shut down the internet <a href=\"https:\/\/restofworld.org\/2024\/india-internet-shutdown-record\/\">771 times<\/a>, especially in regions like Manipur, Jammu, and Kashmir with some lasting weeks or months. These blackouts are particularly disruptive because India has accelerated towards a <a href=\"https:\/\/speyside-group.com\/news-insights\/digitalization-in-india-the-governments-role\">digital-first economy<\/a>, where people depend on the internet for banking, access to government benefits, education, and even food delivery. Despite the enormous social and economic cost, <a href=\"https:\/\/www.hrw.org\/report\/2023\/06\/14\/no-internet-means-no-work-no-pay-no-food\/internet-shutdowns-deny-access-basic#:~:text=Internet%20shutdowns%20can%20also%20lead%20to:%20*,Necessary%20*%20Proportionate%20*%20Limited%20in%20scope\">internet shutdowns in India face few legal hurdles<\/a>. Police and magistrates can order blackouts for <a href=\"https:\/\/www.hrw.org\/report\/2023\/06\/14\/no-internet-means-no-work-no-pay-no-food\/internet-shutdowns-deny-access-basic#:~:text=Internet%20shutdowns%20can%20also%20lead%20to:%20*,Necessary%20*%20Proportionate%20*%20Limited%20in%20scope\">vaguely defined reasons like \u201cpublic order,\u201d<\/a> without any need for judicial approval.&nbsp;<\/p>\n\n\n\n<p>In 2022, during protests in the Republic of Karakalpakstan, an autonomous region in Uzbekistan, over proposed constitutional changes that would limit the region&#8217;s autonomy, Uzbekistan\u2019s government restricted both mobile and fixed-line internet access, as <a href=\"https:\/\/freedomhouse.org\/country\/uzbekistan\/freedom-net\/2023\">authorities reportedly arrested journalists, detained bloggers, and even reportedly tortured some for covering the unrest.<\/a> Freedom House rated the country \u201cnot free\u201d for internet access, noting that internet freedom deteriorated significantly due to these measures. <a href=\"https:\/\/chrome-extension\/\/efaidnbmnnnibpcajpcglclefindmkaj\/https:\/upr-info.org\/sites\/default\/files\/country-document\/2023-08\/Presentation_Access_Now_0.pdf\">While some social media platforms later regained access, others like TikTok remain blocked. <\/a>&nbsp;<\/p>\n\n\n\n<p>In Mauritania, <a href=\"https:\/\/www.accessnow.org\/campaign\/2024-elections-and-internet-shutdowns-watch\/\">mobile internet was cut nationwide in March 2023 following the escape of four prisoners<\/a>, echoing earlier restrictions during the contentious 2019 presidential election. These actions show how shutdowns are employed both in response to immediate crises and as preemptive political controls.<\/p>\n\n\n\n<p><strong>The Human Toll of a Digital Blackout<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.hrw.org\/report\/2023\/06\/14\/no-internet-means-no-work-no-pay-no-food\/internet-shutdowns-deny-access-basic\">Journalists can\u2019t report, students miss educational opportunities delivered through digital platforms, and people cannot get in touch with their loved ones<\/a>.&nbsp;<\/p>\n\n\n\n<p>As <a href=\"https:\/\/www.theguardian.com\/world\/2022\/sep\/22\/iran-blocks-capitals-internet-access-as-amini-protests-grow\">Azadeh Akbari, a researcher of cybersurveillance at the University of Twente<\/a>, in the Netherlands, puts it: \u201cSocial media is existential to the mobilization of protesters, not only to coordinate gatherings but also to amplify acts of resistance.\u201d<\/p>\n\n\n\n<p>In occupation and war zones like Gaza, internet blackouts are a tool of warfare, allowing atrocities to occur with reduced international scrutiny. <a href=\"https:\/\/www.haaretz.com\/israel-news\/2023-12-07\/ty-article-magazine\/.premium\/with-hardly-any-internet-access-and-confusing-idf-tweets-gazans-dont-know-where-to-go\/0000018c-3e7b-d53d-a7fc-beff3f3e0000\">During Israeli military operations, repeated blackouts severed communication channels,<\/a> making it impossible for civilians to call ambulances, upload videos of strikes and famine, or reach their families. As NPR reports, some of these <a href=\"https:\/\/www.npr.org\/2024\/03\/03\/1229402063\/gaza-communications-cell-phone-internet-service-blackouts-paltel\">blackouts stem from direct attacks on telecom cables<\/a>, while others were the collateral result of strikes on critical infrastructure. These blackouts are not simply byproducts of war; they are deliberately engineered to prevent the outside world from witnessing state violence and genocide.&nbsp; and genocide.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The U.S. Is Not Immune<\/strong><\/h3>\n\n\n\n<p>The United States has never implemented a nationwide internet shutdown, but federal authorities have demonstrated both the <a href=\"https:\/\/www.amacad.org\/publication\/daedalus\/future-government-pressure-social-media-platforms\">intention and ability to control digital information spaces through alternative mechanisms<\/a>. The U.S. employs an approach of blurring the line between government oversight and intimidation, operating through corporate intermediaries and legal frameworks. This approach relies on government pressure on tech companies, legal threats, and platform policy manipulation to achieve similar goals of controlling information flow during critical moments of online and offline civic engagement. For instance, during <a href=\"https:\/\/www.thefire.org\/supreme-court\/murthy-v-missouri\/opinions\">COVID-19 and the 2020 election period<\/a> several federal agencies sent repeated \u201crequests\u201d to platforms to remove posts about vaccines or election integrity, shaping the architecture of visibility and discourse.<\/p>\n\n\n\n<p>When Twitter (now X) fact-checked Trump\u2019s false tweets <a href=\"https:\/\/www.businessinsider.com\/twitter-fact-checks-false-trump-tweets-mail-in-voting-2020-5\">alleging mail-in ballots would lead to widespread voter fraud<\/a>. In May 2020<a href=\"https:\/\/www.npr.org\/2020\/05\/28\/863932758\/stung-by-twitter-trump-signs-executive-order-to-weaken-social-media-companies\">, he issued an executive order targeting<\/a> Section 230 of the Communications Decency Act. The order directed federal agencies to explore ways to limit platforms\u2019 legal immunity if they engaged in \u201ceditorial conduct,\u201d warning companies that moderating political speech could invite government retaliation. Although the executive order could not change Section 230, it brought light to the administration&#8217;s intent to influence online discourse through regulatory pressure rather than law. By threatening companies like Twitter and Meta with liability, the order pressured platforms to allow political misinformation to circulate unchecked. In the wake of Trump\u2019s election in 2024, major platforms have <a href=\"https:\/\/www.techpolicy.press\/meta-dropped-fact-checking-because-of-politics-but-could-its-alternative-produce-better-results\/\">scaled back political fact-checking<\/a> and content moderation, creating space for disinformation to spread.&nbsp;<\/p>\n\n\n\n<p>While the executive order and its pressure focus on moderating behavior, the effect is that private actors and intermediaries receive more freedom to set the terms of their digital engagement. This approach achieves similar manipulative effects in the online information ecosystem as overt shutdowns in the guise of free speech protection. When student activists protesting U.S. foreign policy are <a href=\"https:\/\/www.nytimes.com\/2024\/05\/02\/nyregion\/college-campus-protests-anonymity.html\">systematically doxxed<\/a>, when <a href=\"https:\/\/www.cnn.com\/2024\/11\/07\/media\/trump-news-media-press-freedom-threats\">broadcasters are repeatedly threatened<\/a> to strip them of their licenses, and when grassroots organizers face <a href=\"https:\/\/www.adl.org\/resources\/report\/trolls-are-organized-and-everyones-target-effects-online-hate-and-harassment\">digital harassment campaigns<\/a>, these all represent American-style digital repression.&nbsp;<\/p>\n\n\n\n<p><strong>Doxxing as Digital Intimidation&nbsp;<\/strong><\/p>\n\n\n\n<p>During Trump&#8217;s second administration, student activists protesting U.S. complicity and aid to Israel during the genocide in Gaza are facing digital retaliation in the form of doxxing<a href=\"https:\/\/www.thefire.org\/research-learn\/doxxing-free-speech-and-first-amendment\">. Doxxing is the practice of publicly revealing personally identifiable information about individuals without their consent.<\/a>&nbsp;<\/p>\n\n\n\n<p>Organizations with clear political alignments have published names, photographs, and personal information of student protesters, many of them international students who face potential immigration consequences. <a href=\"https:\/\/police.tufts.edu\/safety\/doxxing-and-social-media\">This systematic targeting<\/a> serves to \u201cshame, humiliate, bully, harass, or otherwise harm individuals\u201d engaged in constitutionally protected political speech. The practice aims to \u201cintimidate and direct violence at someone,\u201d resulting in many activists who speak out on issues like mass genocide, and <a href=\"https:\/\/www.aclu.org\/news\/free-speech\/some-steps-to-defend-against-online-doxxing-and-harassment\">advocating for basic human rights scared for their safety, professional prospects, and legal status.<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Digital Repression Is a Global Trend<\/strong><\/h3>\n\n\n\n<p>Whether through firewalls, shutdowns, or surveillance, governments around the world are escalating their control over the digital realm. The tools vary by country, but the playbook is familiar. <a href=\"https:\/\/www.journalofdemocracy.org\/articles\/the-road-to-digital-unfreedom-president-xis-surveillance-state\/\">In China, censorship and AI-driven surveillance are totalizing.<\/a><a href=\"https:\/\/www.hrw.org\/report\/2025\/07\/30\/disrupted-throttled-and-blocked\/state-censorship-control-and-increasing-isolation\"> In Russia, social media platforms are blocked to stifle war criticism<\/a>. In the U.S., private actors with political influence are using online intimidation and legal threats to suppress free speech. The broader pattern is clear, governments fear connectivity during times of uncertainty. Because in a connected world, people can tell their own stories. They can resist, organize, and fight back. Because in a connected world, people can tell their own stories. They can resist, organize, and fight back.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Connectivity Is a Human Right<\/strong><\/h3>\n\n\n\n<p>The ability to connect is a human right. <a href=\"https:\/\/www.un.org\/en\/about-us\/universal-declaration-of-human-rights\">Article 19 of the Universal Declaration of Human Rights establishes the right to freedom of expression.<\/a> The UN has consistently affirmed that cutting off internet access violates international human rights law. International law increasingly recognizes the right to internet access as fundamental to freedom of expression and political participation.&nbsp;&nbsp;<\/p>\n\n\n\n<p>But as shutdowns and government-led digital intimidation become widespread, that right is under threat. Governments must be held accountable, not only for when they go dark, but for why. If a regime cannot tolerate scrutiny, it doesn\u2019t need a blackout. It needs reform. Until then, we must defend digital freedom, not just for ourselves, but for everyone whose voices flicker and vanish each time a government flips the switch, in an effort to suppress truth.&nbsp;<\/p>\n\n\n\n<p><em>Atoosa Haghani is a second year J.D. student at Temple University Beasley School of Law and Fulbright Scholar alumna. Her interests include International sanctions compliance, International trade law, and animal welfare policy.<\/em><\/p>\n\n\n\n<p><em>This blog is a part of iLIT\u2019s student blog series. Each year, iLIT hosts a summer research assistant program, during which students may author a blog post on a topic of their choosing at the intersection of law, policy, and technology. You can read more student blog posts and other iLIT publications <\/em><a href=\"https:\/\/law.temple.edu\/ilit\/category\/blog\/\"><em>here<\/em><\/a><em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By: Atoosa Haghani, LAW \u201827 It begins with silence. Not the absence of noise, but a forced muting, of&#8230;<\/p>\n","protected":false},"author":54,"featured_media":2770,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[32,42,34,43],"tags":[90,56,85,72,73,86,88,68,89,87],"class_list":["post-2769","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-digital-surveillance","category-public-interest-tech","category-students","tag-authoritatianism","tag-blog","tag-censorship","tag-digital-security","tag-digital-surveillance","tag-doxxing","tag-government-shutdown","tag-international-law","tag-social-media","tag-voter-fraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Darkness: How Governments Use Digital Repression to Silence Dissent - Temple iLIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Darkness: How Governments Use Digital Repression to Silence Dissent - Temple iLIT\" \/>\n<meta property=\"og:description\" content=\"By: Atoosa Haghani, LAW \u201827 It begins with silence. Not the absence of noise, but a forced muting, of...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/\" \/>\n<meta property=\"og:site_name\" content=\"Temple iLIT\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-05T01:17:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T17:29:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1176\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jamie Sawczyszyn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamie Sawczyszyn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/\"},\"author\":{\"name\":\"Jamie Sawczyszyn\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/7d5f4bc7921036633f229dcb14616237\"},\"headline\":\"Digital Darkness: How Governments Use Digital Repression to Silence Dissent\",\"datePublished\":\"2026-01-05T01:17:11+00:00\",\"dateModified\":\"2026-01-22T17:29:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/\"},\"wordCount\":1905,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg\",\"keywords\":[\"authoritatianism\",\"blog\",\"censorship\",\"digital security\",\"digital surveillance\",\"doxxing\",\"government shutdown\",\"international law\",\"social media\",\"voter fraud\"],\"articleSection\":[\"Blog\",\"Digital Surveillance\",\"Public Interest Tech\",\"Students\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/\",\"url\":\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/\",\"name\":\"Digital Darkness: How Governments Use Digital Repression to Silence Dissent - Temple iLIT\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg\",\"datePublished\":\"2026-01-05T01:17:11+00:00\",\"dateModified\":\"2026-01-22T17:29:46+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#primaryimage\",\"url\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg\",\"contentUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg\",\"width\":1500,\"height\":1176},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#website\",\"url\":\"https:\/\/law.temple.edu\/ilit\/\",\"name\":\"Temple iLIT\",\"description\":\"Institute for Law, Innovation &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/law.temple.edu\/ilit\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\",\"name\":\"Temple iLIT\",\"url\":\"https:\/\/law.temple.edu\/ilit\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png\",\"contentUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png\",\"width\":1465,\"height\":704,\"caption\":\"Temple iLIT\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/7d5f4bc7921036633f229dcb14616237\",\"name\":\"Jamie Sawczyszyn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g\",\"caption\":\"Jamie Sawczyszyn\"},\"url\":\"https:\/\/law.temple.edu\/ilit\/author\/tuu27324\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Darkness: How Governments Use Digital Repression to Silence Dissent - Temple iLIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/","og_locale":"en_US","og_type":"article","og_title":"Digital Darkness: How Governments Use Digital Repression to Silence Dissent - Temple iLIT","og_description":"By: Atoosa Haghani, LAW \u201827 It begins with silence. Not the absence of noise, but a forced muting, of...","og_url":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/","og_site_name":"Temple iLIT","article_published_time":"2026-01-05T01:17:11+00:00","article_modified_time":"2026-01-22T17:29:46+00:00","og_image":[{"width":1500,"height":1176,"url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg","type":"image\/jpeg"}],"author":"Jamie Sawczyszyn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamie Sawczyszyn","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#article","isPartOf":{"@id":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/"},"author":{"name":"Jamie Sawczyszyn","@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/7d5f4bc7921036633f229dcb14616237"},"headline":"Digital Darkness: How Governments Use Digital Repression to Silence Dissent","datePublished":"2026-01-05T01:17:11+00:00","dateModified":"2026-01-22T17:29:46+00:00","mainEntityOfPage":{"@id":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/"},"wordCount":1905,"commentCount":0,"publisher":{"@id":"https:\/\/law.temple.edu\/ilit\/#organization"},"image":{"@id":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#primaryimage"},"thumbnailUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg","keywords":["authoritatianism","blog","censorship","digital security","digital surveillance","doxxing","government shutdown","international law","social media","voter fraud"],"articleSection":["Blog","Digital Surveillance","Public Interest Tech","Students"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/","url":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/","name":"Digital Darkness: How Governments Use Digital Repression to Silence Dissent - Temple iLIT","isPartOf":{"@id":"https:\/\/law.temple.edu\/ilit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#primaryimage"},"image":{"@id":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#primaryimage"},"thumbnailUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg","datePublished":"2026-01-05T01:17:11+00:00","dateModified":"2026-01-22T17:29:46+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/#primaryimage","url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg","contentUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg","width":1500,"height":1176},{"@type":"WebSite","@id":"https:\/\/law.temple.edu\/ilit\/#website","url":"https:\/\/law.temple.edu\/ilit\/","name":"Temple iLIT","description":"Institute for Law, Innovation &amp; Technology","publisher":{"@id":"https:\/\/law.temple.edu\/ilit\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/law.temple.edu\/ilit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/law.temple.edu\/ilit\/#organization","name":"Temple iLIT","url":"https:\/\/law.temple.edu\/ilit\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/","url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png","contentUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png","width":1465,"height":704,"caption":"Temple iLIT"},"image":{"@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/7d5f4bc7921036633f229dcb14616237","name":"Jamie Sawczyszyn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g","caption":"Jamie Sawczyszyn"},"url":"https:\/\/law.temple.edu\/ilit\/author\/tuu27324\/"}]}},"jetpack_featured_media_url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts\/2769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/comments?post=2769"}],"version-history":[{"count":1,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts\/2769\/revisions"}],"predecessor-version":[{"id":2771,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts\/2769\/revisions\/2771"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/media\/2770"}],"wp:attachment":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/media?parent=2769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/categories?post=2769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/tags?post=2769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}