Zello Protest App Blocked in Russia

The Russian government has blocked user access to Zello App which is used to co-ordinate protests

In 2014, when thousands of Ukrainians took to the streets to protest the Kremlin-backed government of Viktor Yanukovych, they relied on Zello, an app that allows users to talk one-on-one, like a walkie-talkie, or in broadcast modes that can reach hundreds or thousands of people at once. 

Since its founding in 2007, Zello has played a key role in protest and activist movements in Turkey, Hong Kong, Venezuela, and the Arab world. On Wednesday, its roughly 400,000 users in Russia were blocked from using the service, according to Bill Moore, the Austin-based company’s CEO.

“This action follows a notice we received last week from the Russian regulator Roskomnadzor that Zello is not in compliance with a law that governs information distribution brokers,” Moore wrote in a draft blog post provided to Defense One. Zello also responded to the law with this blog post in Russian.

The law in question (Federal Law of 27.07.2006 number 149-FZ) forces companies that provide communication and messaging services over the Internet, including Zello, along with email service providers, social networking services, and the like, to give user data to law enforcement upon request and share all encryption keys with the FSB, the Russian security service.

The law has apparently been used to block only one other major service: LinkedIn, in November. “It’s kind of strange. Why LinkedIn? Why Zello? Twitter wouldn’t comply, neither would Google, or Facebook,” Moore said over the phone.

The block was imposed just weeks after thousands of young people took to the streets in Moscow and across Russia, decrying corruption in the government of Vladimir Putin. More than 500 protesters were detained. The government has promised a crackdown.

Moore said Zello has seen “pretty good growth” in Russia. Its main users in the country are taxi and truck drivers, but the app is also popular with protestors and others.

“Russians use the app to connect with family members and friends and to participate in social, political, and humanitarian conversations and events. But it is also used by search and rescue personnel, taxi services, law enforcement, and drivers needing assistance,” Moore said in a statement.

“We didn’t know if it was a threat or they would really do it. When we announced [the block notice] there was a broad, vocal opposition, including among truck drivers,” he said over the phone.

Moore said Zello was working to restore service via workarounds so that users did not have to rely on a virtual private network to use the service, but thinks that might be more difficult than it was in Venezuela or other countries. Still, at press time, Zello had found a workaround.

DefenseOne

You Might Also Read:

Russia’s Attack On Web Freedom:

Russia To Block LinkedIn:

China's Great Wall Into Russian Cybersecurity:

Is There A Truly Secure Messaging App?:

Signal: The Snowden-Approved Crypto App Comes to Android:

 

 

« TeamSpy Malware Returns to Steal Data
Afraid Of AI Taking Your Job? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

eGyanamTech (EGT)

eGyanamTech (EGT)

eGyanamTech provides robust security solutions tailored for Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure systems.

Xcede

Xcede

Xcede are global technology recruitment specialists. We connect companies with exceptional professionals who empower growth.

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (formerly SecurityMadeIn.lu) is the backbone of leading-edge cyber resilience in Luxembourg.

Interpres Security

Interpres Security

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure.