Iran Today

The Splinternet: Iran's Authoritarian Internet

The Beta Test

Before the blackout, there was the veil.

In 2023, the Islamic Republic deployed AI-powered cameras on highways and city streets across Tehran, Isfahan, and Mashhad. The cameras used facial recognition to identify women whose hijab did not meet the state’s requirements. No human officer was needed. The system auto-detected, auto-identified, auto-fined. The penalty arrived by text message. A second offense triggered vehicle impoundment. A third led to a summons.

The cameras were manufactured by Tiandy, a Chinese company whose facial recognition algorithms were originally developed for a different population — the Uyghurs of Xinjiang.1 The “ethnicity tracking” capability, designed to identify Uyghur faces in crowds of Han Chinese, was repurposed in Iran to identify uncovered hair beneath a headscarf. The same code that surveilled a persecuted minority in western China surveilled women on the Hemmat Expressway.

Alongside the cameras, the regime launched the Nazer app — from the Arabic word for “watcher.” Nazer encouraged regime loyalists to photograph women they deemed “improperly veiled” and submit the images through the app. The submissions were processed by the same facial recognition infrastructure, matching photographs against national ID databases. Citizens became surveillance agents. Neighbors reported neighbors. The social fabric itself was wired into the system.

This was not about modesty. This was about building a database.

By January 2026, when protests erupted across all thirty-one provinces, the regime possessed a facial recognition network that had been trained on millions of faces over three years. The cameras that had identified unveiled women now identified protesters. The Nazer app’s reporting infrastructure — designed to crowdsource moral enforcement — was repurposed to crowdsource the identification of demonstrators. The transition from gender apartheid to political repression required no new hardware. Only a change in the targeting parameters.

Gender apartheid was the beta test for totalitarian digital control.


The Chinese Foundation

The surveillance cameras were one layer. The deeper architecture was the internet itself.

Iran’s National Information Network — the NIN — was conceived in the early 2010s as a sovereign domestic intranet. The vision: a network under total state control, capable of functioning independently of the global internet. Domestic email, domestic search, domestic social media, domestic banking — all routed through infrastructure the regime owned and could monitor.

The model was explicit. Iranian officials publicly cited China’s Great Firewall as the template. The technical assistance came from Huawei, which provided core networking equipment for the NIN’s backbone — the same company that built the infrastructure enabling China’s internet censorship at scale.2

The NIN was not a crude block. It was a filtering architecture — designed to allow certain traffic (banking, ride-sharing, state-approved messaging) while inspecting and blocking everything else. Deep packet inspection appliances examined every packet transiting the network, identifying the protocols being used, the destinations being sought, and the content being transmitted. The DPI boxes could distinguish between a Telegram message and a banking transaction, between a VPN tunnel and a Snapp ride request. This granularity allowed the regime to maintain economic function while suppressing political communication.

The Architecture of Control

Huawei: NIN backbone infrastructure (routing, switching, data centers) | Tiandy: Facial recognition cameras with “ethnicity tracking” (Xinjiang-derived) | Hikvision: Supplementary surveillance cameras and AI-driven crowd analytics | BeiDou: Chinese satellite navigation system — reduced Iran’s GPS dependence, enabled GPS spoofing of Starlink terminals

China’s role went beyond hardware sales. By encouraging Iran to adopt the BeiDou navigation system as an alternative to American GPS, China reduced Iran’s dependence on a system the United States could theoretically degrade — while simultaneously enabling the GPS spoofing attacks that crippled Starlink during the January crackdown. When Iranian jammers broadcast fake GPS signals to confuse Starlink terminals, the spoofing technology was of Chinese origin, originally developed to help oil tankers evade sanctions by falsifying their locations.

The relationship was symbiotic. Iran got a surveillance state. China got a field test — the largest real-world deployment of its “cyber sovereignty” model outside Chinese borders.


The Russian Shield

Chinese technology provided the foundation — the cameras, the NIN, the filtering architecture. Russian technology provided the kinetic layer — the ability to suppress alternatives when the domestic internet was shut down.

The Kalinka electronic warfare system, transferred under the 2025 Russia-Iran Strategic Partnership, was designed to hunt and kill satellite internet connections. It detected the electromagnetic signature of Starlink user terminals — the phased-array antennas that SpaceX calls “Dishy” — and directed high-power jamming beams at the uplink frequencies. A Starlink terminal that cannot transmit to the satellites overhead is a decorative plate on a rooftop.

The Tobol system attacked from the other direction. Originally designed to protect Russian military satellites from electronic interference, Tobol was repurposed as an offensive tool — jamming the downlink signals from Starlink satellites to ground terminals. If Kalinka blinded the terminal’s ability to speak, Tobol deafened its ability to listen.

Together, they effectively disabled or degraded approximately forty thousand of fifty thousand Starlink terminals during the crackdown.3

The deployment pattern revealed something beyond technology transfer. Mobile jamming units were positioned in specific neighborhoods — concentrated around protest hotspots and known activist residences. This tactical deployment mirrored Russian doctrine in Ukraine, where Orlan-10 drones paired with ground-based jammers to create localized electronic warfare bubbles. The similarity suggests not just equipment sales but advisory support — Russian electronic warfare specialists either present in Iran or providing remote operational guidance.

Iran’s use of Kalinka exceeded operational parameters observed even in the Ukraine theater. In Ukraine, Kalinka targeted military Starlink terminals on frontlines. In Iran, it targeted civilian terminals in residential neighborhoods. The system designed for war between armies was turned against a civilian population.


The Proof of Concept

Imagine you are a security official in Beijing, or Moscow, or Riyadh, or Minsk. You have watched your own population grow restless. You have seen what smartphones and social media did in Tunisia, Egypt, and Sudan. You have worried that the next protest might be yours.

Then you watch Iran in January 2026.

You watch a government sever internet access for ninety million people — not with the crude disconnection of cables, but through protocol-level sabotage that keeps the state online while the population goes dark. You watch it jam a constellation of American satellites using Russian electronic warfare systems. You watch it spoof GPS signals using Chinese technology. You watch it destroy its own domestic internet rather than allow coordination through domestic platforms. You watch it fill the information vacuum with its own narrative — foreign conspiracy, terrorist labeling, fabricated body counts — and you note that for twelve days, with no alternative source of information, millions of citizens believed it.

And you note the international response. Condemnation, yes. Sanctions on a few individuals, yes. But no intervention. No military consequence. No diplomatic rupture sufficient to threaten the regime’s survival. The political cost of the blackout was, as the regime calculated, lower than the political cost of visible atrocities.

Iran 2026 is the proof of concept for a splinternet — a world in which the internet has fractured into sovereign zones, each controlled by the state that encloses it. The technology required is documented and replicable.

The components:

Layer 1 — Surveillance. AI-powered facial recognition cameras at every intersection. Citizen-reporting apps that conscript the population as informants. National databases linking faces to identities to addresses. Built and exported by Chinese companies with Xinjiang experience.

Layer 2 — Filtering. A domestic intranet modeled on the Great Firewall, with deep packet inspection at every node. The ability to allow banking while blocking messaging, to permit state media while suppressing foreign news. Granular, adaptable, and commercially available.

Layer 3 — Suppression. Electronic warfare systems that can neutralize satellite internet — the “last resort” that populations in censored countries have relied on since 2022. Russian-origin, combat-tested, and for sale to any buyer the Kremlin approves.

Layer 4 — Narrative. State media filling the information void with a prepared script. Forced confessions. Fabricated casualty figures. The labeling of all dissent as foreign terrorism. This layer requires no imported technology — only the willingness to lie at scale.

Iran assembled all four layers and activated them simultaneously. The result: an entire population silenced, and the world did not see what was happening until it was over.

The Splinternet Stack: Chinese surveillance cameras + Chinese intranet architecture + Russian satellite jammers + state narrative warfare = a blackout kit any authoritarian government can buy off the shelf.


The Comparative

Iran 2026 was not the first digital crackdown. But it was qualitatively different from every precedent.

China operates the most sophisticated internet censorship system in the world. The Great Firewall inspects, filters, and selectively blocks content with remarkable granularity. But China has never imposed a total blackout on its 1.4 billion citizens during domestic unrest. The economic cost would be catastrophic. China’s model is permanent, invisible filtration — not the explosive severing of connectivity. The Firewall is a scalpel. Iran 2026 was a guillotine.

Russia has tested “RuNet” isolation — the ability to disconnect the Russian internet from the global network. Exercises in 2019 and 2021 demonstrated partial capability. But Russia has never deployed a total blackout during domestic unrest, not even during the anti-mobilization protests of 2022. The Russian model remains aspirational. Iran’s is operational.

Myanmar’s military junta imposed rolling internet blackouts after the February 2021 coup — targeting cellular networks in specific regions, sometimes for months. But Myanmar’s shutdowns were blunt: cellular towers turned off, entire regions darkened. The junta lacked the capability to maintain state connectivity while severing civilian access. Iran’s protocol-level sabotage was orders of magnitude more sophisticated — a selective darkness that kept the security state online.

Iran 2026 represents the convergence: Chinese surveillance depth, Russian electronic warfare capability, and a regime willing to accept total economic destruction as the price of silence. No previous government had assembled all three. No previous government had demonstrated that satellite internet — the technology hailed as the authoritarian-proof information channel — could be neutralized by a determined state with Russian jammers and Chinese spoofing technology.

The lesson is not reassuring. The components are commercially available. The expertise is transferable. The doctrine is documented. Any government that controls its domestic internet infrastructure, purchases Chinese surveillance equipment, and acquires Russian electronic warfare systems can replicate what Iran did in January 2026. The question is not whether the splinternet is coming. It is whether anyone outside the authoritarian world is building the countermeasures.


The Honest Ledger

The “splinternet” framing has limits. Not every authoritarian government has the technical capacity or the economic willingness to replicate Iran’s total blackout. The economic cost — $35.7 million per day by the regime’s own admission, likely far more — is a deterrent for states more integrated into the global economy than Iran.4 China, for instance, would face trillions in losses from a total shutdown, which is precisely why Beijing has never attempted one.

Russia and China may have provided technology to Iran for profit rather than as part of a coordinated “axis of authoritarianism.” Arms dealers sell to whoever pays. The strategic alignment is real, but the conspiracy framing overstates the coordination.

The NIN’s destruction was a sign of weakness, not strength. A regime confident in its filtering capabilities would not need to destroy its own domestic internet. The “total scorch” reflected panic — a recognition that even the domestic platforms the regime had built and monitored were being used for coordination. The splinternet model works best when the domestic intranet functions smoothly. Iran’s failure to maintain even that layer suggests the model is less robust than it appears.

And the blackout did not achieve its ultimate objective. The evidence got out — slowly, partially, but enough. Satellite imagery corroborated mass burials.5 Leaked government documents confirmed death tolls. The international community eventually saw what happened. The twelve-day window of silence bought the regime time but not impunity. The forensic reconstruction the blackout was meant to prevent has begun.

What survived was not technology. It was the determination of people who carried memory cards through mountain passes, ran relay software on kitchen-table laptops, and verified footage frame by frame in apartments across three continents. The splinternet is a machine. Its adversary is a network of human beings who refuse to let atrocities happen in the dark. That contest is not settled.



This article is part of The Digital Siege. For the diaspora network that pierced the blackout, see The Psiphon Army. For the regime’s war against the journalists who broadcast the evidence, see The Assassination Bureau.

Footnotes

  1. Article 19, “Tightening the Net: China’s Infrastructure of Oppression in Iran,” February 2026; The Guardian, “Chinese Technology Underpins Iran’s Internet Control, Report Finds,” February 9, 2026

  2. Chatham House, “Iran’s Internet Shutdown Signals a New Stage of Digital Isolation,” January 2026; Article 19, “Tightening the Net: China’s Infrastructure of Oppression in Iran,” February 2026

  3. United24 Media, “Iran Reportedly Tested Russian Electronic Warfare Against Starlink During Mass Protests,” January 2026; IranWire, “Why There’s No Starlink Access During Nationwide Shutdown in Iran?,” January 2026

  4. IranWire, “$35.7 Million a Day: The Hidden Cost of Iran’s Internet Blackout,” January 2026; Wikipedia, “2026 Internet Blackout in Iran,” accessed February 2026

  5. Iran International, “More Evidence of Mass Killings Surfaces Despite Iran Internet Blackout,” January 21, 2026; satellite imagery analysis by Maxar Technologies and Iran Human Rights corroborating mass burial sites