Anesthesia of Consumption and Surgery of Control: A Two-Phase Model of Authoritarian Governance of the Digital Space in Russia
Social science has long sought to explain why citizens of authoritarian states do not mount mass resistance against systems that openly restrict their rights. Traditional answers reduce to either fear of repression or ideological indoctrination. Neither, however, fully accounts for the phenomenon observed in post-Soviet Russia at the turn of the twenty-first century: the relatively voluntary and widespread surrender of civil liberties in exchange for material and informational comfort.
This article develops the conceptual model of “two-phase authoritarianism,” in which coercion gives way to temptation in the first phase, so that by the second — once society has already been stripped of its means of resistance — the transition to totalitarianism becomes technically and politically feasible. The events of March 2026 in Moscow — the activation of “whitelists” of permitted internet resources during a deliberate shutdown of mobile communications — serve as a marker of that transition.
An important theoretical instrument actively deployed by authoritarian governments to legitimize control over the internet is the concept of “digital sovereignty.” Originally developed in democratic contexts as a safeguard against the monopolistic practices of transnational platforms, it has been repurposed by Russia, China, and kindred regimes to justify the state’s right to shut down, filter, and reshape the information environment. “Sovereign internet,” in this reading, is not a right of citizens to secure communications — it is the state’s right to determine which communications are possible at all.
PHASE ONE: THE SOCIAL CONTRACT OF MANAGED CONSUMPTION
The first stage of the two-phase model spans roughly the first two decades of Vladimir Putin’s rule. It is defined by a specific social contract that can be stated simply: the state does not interfere with consumption — society does not interfere with governance.
The mechanism of this contract is well documented. Oil revenues in the 2000s and early 2010s allowed Russia’s middle class to access Western standards of consumption: shopping malls, foreign travel, smartphones, and streaming services. Simultaneously, independent media, judicial independence, and electoral competition were systematically dismantled — but in a manner calibrated so that the majority of the population did not feel the direct material consequences.
Scholars have termed this phenomenon “welfare authoritarianism” or “pleasure authoritarianism“: a regime that sustains its legitimacy not through ideological mobilisation but by ensuring a rising level of consumption. Citizens trade participation in public life for a guarantee of private comfort, and consider the exchange acceptable so long as that comfort persists.
The digital dimension of this contract was fundamental. Russia in the first decade of the century had a comparatively open internet. YouTube, Facebook, Instagram, Twitter — all were freely accessible. Blocked sites were marginal in number and in public consciousness. This “internet freedom” functioned as a partial substitute for the real-world freedom that had been quietly removed: people could read what they wished and, therefore, took to the streets less often.
The regime deliberately cultivated the illusion of openness in the digital space — as a pressure valve for social discontent. When real-world pressure grew too acute, the valve was closed. This observation recurs across numerous analyses of the evolution of the Russian internet, and it is accurate.
THE BREAK: FEBRUARY 2022 AND ITS CONSEQUENCES
The full-scale invasion of Ukraine in February 2022 shattered this contract on several fronts simultaneously. First, international sanctions and the voluntary withdrawal of Western corporations made consumerist comforts materially unattainable: IKEA, McDonald’s, Apple Pay, Netflix, and Instagram disappeared. Second, mass anti-war protests — the largest in more than a decade — demonstrated that a segment of society was prepared to break the contract even under direct police pressure. Third, and most consequential for our model, the state concluded that as long as a person retains access to uncontrolled information, they remain potentially disloyal.
The initial response was surgical: blocking Instagram and Facebook, throttling Twitter/X, tightening regulations on VPN services. But these measures remained half-hearted — they left people with the practical sense that censorship could technically be circumvented. The systemic shift came later.
On February 20, 2026, Putin signed a law requiring telecommunications operators to suspend services upon instruction from the Federal Security Service. The stated purpose was counterterrorism. The practical function was to give the FSB direct administrative authority to shut down communications in any region of the country, without judicial oversight of any kind. The law took effect ten days after signature.
Beginning March 6, 2026, Moscow residents reported pervasive mobile network outages. According to Forbes, operators received orders to restrict network operations in specific areas of the city. On March 14, 2026, a “whitelist” system was activated — a defined list of resources accessible during the shutdown.
THE ARCHITECTURE OF THE WHITELIST
The composition of the list is analytically revealing. It includes: government services (Gosuslugi, official agency portals); state-controlled information platforms (VKontakte, Odnoklassniki, Yandex); e-commerce services (Ozon, Wildberries, Samokat, Burger King, SDEK, car-sharing); banking applications (Alfa-Bank, VTB, the Mir payment system); and state media (RIA Novosti, Zvezda, Match TV, VGTRK).
Conspicuously absent from the list: any independent or foreign news source; social networks not under state control; messaging applications; and any tool capable of allowing users to verify the actual state of affairs outside official channels.
The architecture of the list follows a coherent and unambiguous logic. This is not a list of resources essential for survival — it is notably lacking, for instance, in medical services or emergency infrastructure. It is a list of controlled existence: a person may order food, pay a bill, call a taxi — but cannot learn why communications are down, what is occurring in the city, or consult with anyone outside official channels.
What we observe, therefore, is not the destruction of comfort but its restructuring: comfort is preserved precisely and only to the degree that it does not threaten control. The state does not deprive a person of pizza delivery — it deprives a person of the ability to know that pizza delivery and the FSB now share the same infrastructure.
PHASE TWO: COMFORT AS INSTRUMENT, NOT COMPENSATION
This is what qualitatively distinguishes the second phase from the first. In the first phase, comfort functioned as compensation — a substitute for freedom. In the second, it becomes an instrument of control: a permitted set of actions within an enclosed space. The difference between a gilded cage and a bare one ceases to matter; what matters is that neither can be exited.
The law of February 20, 2026, is precisely such an act of normalisation: it converts ad hoc disconnections — practiced before, but extrajudicially — into a legal procedure. From this point forward, any shutdown of communications is not an act of arbitrary power but the enforcement of law. Legal form does not constrain; it legitimizes.
CONCLUSIONS
The situation described above permits the following theoretical and practical conclusions.
First, twenty-first-century authoritarianism does not merely suppress freedom — it replaces freedom with a simulacrum of well-being. This substitution is not a temporary tactic but a structural element that allows the regime to minimize the costs of overt repression during the first phase.
Second, the transition from the first phase to the second is not an abrupt rupture — it is prepared by the gradual technical, legal, and institutional construction of a control infrastructure. Those who failed to register the first phase find themselves unprepared for the second.
Third, the whitelist of internet resources is not merely a technical solution — it is the concentrated expression of a new social ontology: only what is permitted is real. This represents “information sovereignty” in its most radical and unmediated form.
Fourth, the legal normalisation of communications shutdowns is the key step that transforms the extraordinary into the routine. Further comparative analysis of legislative trajectories in states exhibiting similar dynamics is necessary if adequate mechanisms of protection and resistance are to be developed in time.


