Politics

Mobile web minimize after Mauritania presidential ballot

Mobile web has been minimize since Monday night time in Mauritania’s capital, AFP journalists noticed, after scuffles broke out following the announcement that incumbent Mohamed Ould Cheikh El Ghazouani had received the presidential election.

Witnesses reported disturbances in working-class districts of Nouakchott on Monday night, hours after ultimate provisional outcomes confirmed that Ghazouani had comfortably received re-election in Saturday’s presidential ballot.

The witnesses didn’t specify the extent of the dysfunction to AFP.

Nouakchott appeared calm on Tuesday, with companies open as regular.

The authorities haven’t commented on the cell web cuts.

Internet restrictions have grow to be a standard tactic by governments world wide within the face of protests.

Related News

Second-place candidate, anti-slavery activist Biram Dah Abeid, on Monday denounced “massive fraud” and threatened peaceable road demonstrations.

Abeid stated he was ready for his personal groups to supply election outcomes earlier than taking a “final decision”.

The aftermath of the 2019 election, which introduced Ghazouani to energy, was marked by clashes and the arrest of opponents in addition to nationals of neighbouring nations accused of collaborating in demonstrations.

It was additionally accompanied by a 10-day web blackout.

AFP

All rights reserved. This materials, and different digital content material on this web site, will not be reproduced, revealed, broadcast, rewritten or redistributed in complete or partly with out prior specific written permission from PUNCH.

Contact: [email protected]

Source

Co-editor

About Author

You may also like

Politics

Protesting Zamfara neighborhood barricades Govt House, faults troops withdrawal

There was tension in Gusau, the Zamfara State capital on Sunday, as residents of Bini village in the Maru Local
Politics

How to spice up your checking account, cellular pockets safety

Cybercriminals are constantly devising new ways to exploit vulnerabilities and steal sensitive information. DANIEL ADAJI outlines ways to safeguard your