|
||
|
||

On 28 February, as American and Israeli fighter jets and missiles headed towards Tehran under the codenames Operation Epic Fury and Operation Roaring Lion, a second front opened silently. No bombs, no blasts, but with equally devastating consequences. Within hours, connectivity to the internet in Iran collapsed to 1% to 4% of normal levels, and its Supreme Leader was killed. Nearly ninety million people plunged into a digital blackout. Government news websites went offline. Payment systems failed. In Tehran, Isfahan, and Shiraz, everyday apps stopped responding. This was what sector analysts would later call the largest coordinated cyberattack in history.
The ongoing conflict in Iran lays bare a truth that has been rehearsed for years. The central dispute of contemporary geopolitics is no longer fought solely with tanks, missiles, or pipelines, but in the invisible architecture that connects—and disconnects—entire societies from the global data and information system. Iran has unwittingly become the exposed laboratory for the new digital order emerging for the entire Global South, extending far beyond a war where drones are the main stars.
The first revelation of the conflict is that the Iranian internet collapse has no single cause—and this ambiguity is politically charged. The independent organisation NetBlocks confirmed the near-extinction of Iranian digital traffic from 28 February, attributing it to a “regime-imposed blackout”. Analysts, however, point out that denial-of-service attacks (DDoS), deep intrusions into critical systems, and electronic warfare operations coordinated by Israel and the US contributed in parallel to the collapse.
The result is a double layer of darkness. On one hand, the Iranian state, fearing the circulation of information and enemy coordination from within, activated its “whitelisting” system—which maintains internet access only for groups loyal to the government. On the other, external agents worked to erase what remained. The blackout was, simultaneously, a hybrid warfare weapon and an internal control mechanism, two logics that mutually reinforce each other.
The attack on the religious app BadeSaba illustrates the psychological dimension of this conflict. The app, with over 5 million downloads, was compromised and began displaying alerts urging Iranian armed forces to “lay down arms and join the people”. The operation was timed to coincide with the airstrikes, sowing confusion at the exact moment when the regime’s defences needed clarity. This shows that any widely adopted app—even a prayer calendar—can become a tactical vector in hybrid warfare.
What happened in February 2026 did not come from nowhere. Iran has lived for years under a form of blockade that does not disconnect the country from the internet all at once, but gradually erodes access to crucial services—public clouds, developer platforms, digital payment methods—until connectivity becomes a precarious privilege. Instead of a total blackout, what was observed before the war was a programmed strangulation, with combined sanctions and corporate decisions withdrawing technical support, credentials, and integrations, leaving universities, startups, and public bodies trapped in a kind of geopolitical dial-up internet in the age of generative AI.
This intervention showed us clearly that the strategic frontier is no longer just the desert or the Strait of Hormuz, but the control panels of global providers that can, with a few clicks, degrade throughput, cut APIs, or suspend accounts under the neutral mantle of “compliance”. The private law of platforms—terms of use, internal policies, risk criteria—becomes, in practice, an arm of foreign policy, imposing punishments with devastating effects on work, education, and social organisation.
More than that, we saw that support from countries like China and Russia with precise information makes a big difference when technology is at the centre. This war, for example, marked the end of the orbital surveillance monopoly, with the rise of the Chinese startup MizarVision as a disruptive pivot, offering high-resolution commercial satellites that democratise real-time intelligence and challenge the exclusive dominance of Western giants. This technological convergence exposes vulnerabilities in the American air superiority doctrine, allowing Iran and allies to access advanced algorithmic analyses of movement patterns and sensor fusion, thereby redefining the balance of power in the Middle East and signalling the future of a multipolar orbital geopolitics.
It is in this context of chronic suffocation and the growing importance of AI-obtained information that Iran’s National Information Network (NIN)—the sovereign intranet developed over the last decade—must be read. Without romanticism, but also without reductionism. Critics point out that this architecture facilitates censorship, monitoring, and repression, consolidating a high-democratic-cost “sovereign firewall” model like that in China.
But the 2026 conflict also revealed that countries under sanctions without some form of segmentation and their own infrastructure are exposed to ideal territory for espionage, ransomware, and remote sabotage. Without the NIN, the regime’s capacity to maintain payment systems and emergency communications would have collapsed even more rapidly. The bunker is real—even if its inhabitants are a theocracy.
The genuine dilemma is that the same infrastructure that can protect populations from external shocks is the one that can be used to monitor, silence, and repress them. This tension is at the heart of the digital sovereignty issue for the Global South.
The least visible dimension of the conflict, but perhaps the most enduring, is the “cloud war”. AI chips and access to major platforms have become diplomatic currency as relevant as military bases or oil agreements. By conditioning the supply of advanced semiconductors, computing credits, and specialised support to strategic alignments, Washington turns CEOs into special envoys and forces Global South countries to choose not just political alliances, but entire technology stacks.
Added to this is private orbital sovereignty: low-orbit satellite constellations, controlled by companies, can decide whether a conflict area will have broadband or remain in digital darkness. The precedent of selective coverage adjustments in war zones, as in Ukraine, shows that, without robust space governance frameworks, essential connectivity risks being treated as a tactical asset, manipulable by coalitions of governments and billionaires. The country also showed us another interesting side of digital hybrid warfare. Data centres and offices of US technology companies in neighbouring countries became targets of unprecedented attacks by Tehran. This situation cast a large shadow of uncertainty over billions in planned AI digital infrastructure investments in the Gulf. Today, Khamenei’s government has listed big tech facilities, including Palantir, as potential attack targets.
In the same move, the line between civil and military technology has been dissolved. The consortium between Palantir and Anduril combines systems like Maven and Lattice to integrate sensor, vehicle, and weapons data in real time, automating tactical decisions under proprietary software licensed according to specific geopolitical interests. Those without their own means of military data collection and inference will end up dependent on a security stack that can be switched off from outside at any moment. Experts also warn of the growing role of AI in offensive operations. Iran, with over a decade of history in attacks against American and Israeli critical infrastructure, has concrete incentives to employ all available resources as the conflict intensifies.
For countries like Brazil, Indonesia, South Africa, or any nation aspiring to technological autonomy, Iran is an uncomfortable mirror. The 2026 blackout is not an aberration but the plausible future for any country that accepts, without contest, the privatisation of connectivity, orbit, and algorithmic decision-making over collective life. The strategic response cannot be limited to hardening defences in the Iranian mould—replicating the NIN’s isolation would mean paying an unacceptable democratic price. Nor can it ignore the harshest lesson of the conflict: that unrestricted technological dependence becomes strategic vulnerability.
The “Meltnet” concept, which I have discussed in some texts , proposes an intermediate way out through a mosaic of interoperable national networks under a trust federalism, with auditable safeguards for data transit. In this model, what passes between networks is not decided in Washington, Brussels, or a Big Tech boardroom, but in multilateral protocols combining encryption, verifiable logs, and distributed arbitration mechanisms. Under the BRICS aegis, Global South countries could anchor part of their traffic in jointly financed cables, data centres, and satellites—with rules resistant to unilateral coercion. The New Development Bank (NDB) has a central role in financing regional public clouds and alternative traffic paths via submarine cables that offer institutional “escape routes” for countries under sanctions.
In the end, the war in Iran shows that digital sovereignty is not the abstract right to “pull the plug” or localise data, but the concrete capacity to govern, audit, and invest in trust infrastructures that protect populations from external shocks without suffocating their internal rights. The invisible fence that today encloses and, at the same time, protects Iran foreshadows the future for any country that does not actively contest the rules of the digital board. Meltnet, on the other hand, indicates that there is still room to redraw the map—making interdependence a negotiated choice, not a silent hijacking.
Operation Epic Fury and the Remnants of Iran’s Nuclear Program
Iran’s Internet Blackout Extends Into Second Week, NetBlocks Says
Cyber Warfare in the U.S.–Israel vs. Iran Conflict: Roaring Lion & Epic Fury
Hacked Prayer App Sends ‘Surrender’ Messages to Iranians Amid Israeli Strikes
Chinese Intelligence Company Tracking U.S. Military Assets During Iran Operations
The End of the Monopoly on Orbital Surveillance in the Iran-US Conflict, by Samuel Spellmann
Palantir and Anduril Form Consortium to Merge AI Defense Capabilities
Iran Includes American Tech Giants on List of New Targets
Musk Ordered Shutdown of Starlink Satellite Service as Ukraine Retook Territory
DDoS Activity Following Operation Epic Fury / Roaring Lion
Escalation in the Middle East: Operation Epic Fury
Iran’s digital arsenal: when invisible fences are erected in the conflict.
Welcome to Meltnet and
About the Internet and Internets
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC