The Internet Kill Switch Iran Built While the West Was Busy Debating Age Verification

The Internet Kill Switch Iran Built While the West Was Busy Debating Age Verification
Photo by hosein charbaghi / Unsplash

The most politically significant event of January 8th, 2026, was not broadcast on television, did not trend on social media, and was not reported by wire services for several hours. It was visible, in real time, only to a small number of people staring at network monitoring dashboards, and what they saw was nothing and silence. Which was precisely the problem.

Not the silence of a misconfigured router, which at least has the decency to announce itself. Not the silence of a server that went down at 3am because someone in facilities unplugged the wrong thing. This is a different quiet entirely. It is the silence of an entire country, 90 million people and all the devices they own, collectively ceasing to generate the low, constant hum of existence that every connected nation produces simply by being online.

On the evening of January 8th, 2026, at approximately 8pm Tehran time, that silence arrived. And it was, from a purely technical standpoint, deeply impressive in a way that should give anyone with a passing interest in democratic governance a prolonged and uncomfortable pause.

The cause was economic. Iran's rial had shed roughly 40 percent of its value since June. The merchants of the Grand Bazaar had reached the end of their patience. Protests spread with the speed that tends to alarm governments which have historically addressed inconvenient public sentiment with blunt instruments. The regime reached for the largest blunt instrument available to a modern state: the internet kill switch.

What followed was not merely a political event. It was a masterclass in applied network control, seven years in the making, and it tells us considerably more about the future of state power over digital infrastructure than most policymakers have yet chosen to absorb.

How Countries Used to Disappear: The Sledgehammer

To appreciate what happened in January 2026, one must first understand what previous shutdowns looked like, because the contrast is the point.

The internet is held together by a protocol called BGP, Border Gateway Protocol. Think of it as the global postal address registry for the internet. Every organisation that connects to the internet registers its block of IP addresses with this system, essentially announcing to every router on earth: "I exist, I am here, and here is how to reach me." These announcements propagate globally within minutes, and every router on the internet updates its map accordingly. It is, charmingly, run almost entirely on trust, because the people who designed it in the 1980s assumed everyone involved would behave like reasonable academics, which tells you something about the optimism of the period.

When Iran performed its November 2019 shutdown, known as Bloody November, its major carriers simply withdrew those announcements. Iranian IP address blocks stopped being advertised. Routers everywhere quietly updated their maps, and Iran vanished from the global internet like a city going dark in a time-lapse. The whole operation was immediately visible to anyone watching BGP feeds in real time: a cascade of route withdrawals, a country-shaped hole appearing in the global routing table. Blunt, effective, and obvious as a brick through a window.

January 2026 was rather different. Iran's BGP announcements stayed up. The routes remained in the global routing table. From the perspective of the world's routers, Iran was present, reachable, and apparently fine. Traffic sent toward Iranian addresses was accepted, traversed normal paths, arrived at the border of Iran's network, and then, silently, went nowhere. The 2019 shutdown was a locked door with a sign reading CLOSED. The 2026 shutdown was a door that looked open from the outside until you tried to walk through it.

The Iranian state had moved the kill switch from the infrastructure layer to the software layer. This distinction matters enormously.

The Scalpel: DNS, TLS, and Why Invisible Censorship Is Worse

To understand what the regime actually did, a brief detour into how internet connections work is unfortunately necessary and, fortunately, less tedious than it sounds.

When you type a web address into a browser, two things happen before any actual content is exchanged. First, your device asks a DNS server, a Domain Name System server, essentially a telephone directory for the internet, to translate the human-readable address into a numerical IP address that routing infrastructure can actually use. This query travels across the network in plain text. Iran's infrastructure can intercept it, examine it, and simply decline to answer, or answer with something false. Without a valid IP address, your browser cannot proceed. The pipes may be technically open. The directory has been removed.

If you somehow bypass DNS, by using a hardcoded IP address, or a cleverly configured alternative, you encounter the second problem. Before any encrypted communication can begin, your device sends an opening handshake message called a ClientHello. Buried in this message, in plain text, before encryption has even been negotiated, is a field called SNI, Server Name Indication, which contains the domain name of the server you are trying to reach. It exists in plain text because the receiving server needs to know which security certificate to present, and is one of the more unfortunate design decisions in the history of internet protocols. Deep packet inspection equipment sitting at Iran's network border reads that SNI field, compares it against a list of permitted destinations, and for anything not on the whitelist, drops the connection entirely. Your browser reports "connection refused." There is no message explaining why. There is only silence, which is precisely the point.

The combination of DNS blocking and SNI-based filtering is, from a policy perspective, a remarkably targeted instrument. The regime is not turning off the internet in any structural sense. It is removing the signposts and examining every envelope before it leaves the sorting office. Critically, all of this leaves no trace in the BGP data that international monitors have historically used to document shutdowns.

Watching the Lights Go Out: What the Monitoring Data Showed

Georgia Institute of Technology's IODA project, Internet Outage Detection and Analysis, uses three instruments to measure national connectivity. Active probing is a global sweep of ping and traceroute packets: computers around the world continuously test whether addresses in every country respond. BGP monitoring watches the routing table for withdrawals. And the telescope observes what researchers call Internet Background Radiation.

That last one deserves explanation, because it is both technically elegant and mildly unsettling. Every connected device generates, continuously and involuntarily, a low-level noise of unsolicited packets, misconfigured servers sending traffic to wrong addresses, software making requests it was never intended to make, the digital equivalent of a city's ambient sound. Point a large passive receiver at the IP address space belonging to any country and that background noise tells you, with reasonable accuracy, whether those addresses are occupied by active devices or whether the place has gone dark.

On January 8th, IODA's telescope went quiet over Iran. Active probing dropped to roughly three percent response rates, a number that sits in the clinical space between "technically not zero" and "operationally meaningless." That three percent almost certainly represents government officials and security services on the whitelisted privileged connectivity that the regime maintained throughout. Everyone else: nothing.

The initial signs of recovery appeared around January 24th in the telescope data, and more sharply in active probing on January 27th. A country coming back online looks, in this data, like a city gradually illuminating after a power cut, district by district, network by network, until the overall shape becomes recognisable again. The shutdown, from first dark to meaningful recovery, lasted the better part of three weeks, surpassing every previous Iranian internet suppression event in both duration and completeness.

When Software Ran Out: Jamming the Sky

Starlink, the low-earth-orbit satellite internet constellation, presented an obvious bypass. Point a terminal at the sky, and the state's carefully constructed DNS and SNI filtering infrastructure becomes irrelevant, because your traffic is no longer traversing Iranian ground infrastructure at all.

The regime's response was to move the fight to a layer that predates the internet entirely. Military-grade mobile jammers, operating on the Ku-band frequencies that Starlink terminals use, were deployed to overwhelm the signal. The approach reportedly resembles equipment used by Russia in Ukraine, which suggested a degree of technical knowledge-sharing between Moscow and Tehran that security researchers noted with the kind of professional concern that precedes policy recommendations nobody acts on in time.

There is no software patch for a jammer. There is no routing workaround. The electromagnetic environment simply becomes too noisy for the signal to survive. If the DNS and SNI blocking represents a Layer 7 intervention, operating at the application level of the network stack, then jamming represents something below Layer 1, an attack on the physical medium before data has even been encoded. Iran had, by this point, covered every layer of the model, from radio frequency to application protocol, and deployed a separate legal framework to govern all of it.

The Architecture of Privilege: White SIMs and the Two-Tier Internet

In July 2025, six months before the January shutdown, Iran passed a regulation that deserves considerably more international attention than it received. Under this framework, access to the global internet was formally reclassified from a default condition of civilian connectivity to a privilege granted based on professional necessity and, one reasonably infers, political reliability.

The mechanism was a system of white SIM cards, special mobile lines issued to government officials, security personnel, and vetted journalists, whose devices are associated at the carrier level with routing policies that connect to the global internet. Everyone else connects, by default, only to the National Information Network: Iran's state-controlled domestic intranet, a walled garden of approved content that the regime has been constructing for exactly this purpose.

The same physical mobile infrastructure, the same towers, the same spectrum, the same hardware, routes traffic differently depending on which SIM card you carry. Your identity, as adjudicated by the state, determines your routing policy. The shutdown of January 2026 was not a crisis response improvised under pressure. It was the activation of an architecture that had been designed, legislated, and tested across multiple years. The protests in the Grand Bazaar did not create Iran's digital control system. They merely provided the occasion for deploying it at full scale.

The Bill, Itemised

For those who prefer their geopolitics expressed in numbers rather than network topology, the shutdown generated some figures worth contemplating. The Iranian Minister of Communications acknowledged a cost of approximately $35.7 million per day. Online sales collapsed by roughly 80 percent. The Tehran Stock Exchange lost 450,000 points across four days. Financial transactions in January 2026 dropped by 185 million compared to normal levels.

Every one of those 185 million missing transactions is, in network terms, a connection that was never established, a DNS query that received no answer, an SNI field that was read and discarded, a TCP handshake that was never completed. The economic damage and the packet loss are the same event described in different units.

What these figures also reveal is the regime's calculus. The $35.7 million daily cost was being tracked in real time by the Ministry of Communications. The decision to sustain the shutdown despite that figure is a straightforward statement of priorities: the suppression of organising capacity was valued more highly than the economic productivity that internet connectivity enables. This is, stripped of diplomatic language, what the deployment of a two-tier internet architecture by a state against its own population actually means in practice.

The Iterative Firewall: Getting Better at This

The progression from 2019 to 2026 constitutes, for a network engineer, something recognisable as a mature iterative development process. Each shutdown has served as a live operational test. Each bypass method that succeeded in 2019 was studied and addressed before the next deployment. Each residual leakage was plugged. VPNs that circumvented SNI filtering prompted refinements in DPI rulesets. Starlink workarounds prompted the procurement of jamming equipment. The legal gap that made formal internet tiering administratively awkward was closed by legislation in July 2025.

The 2019 shutdown was a BGP withdrawal: globally visible, forensically obvious, internationally embarrassing. By 2026, the operation targeted DNS at the application layer, TLS at the transport layer, satellite signals at the physical layer, and administrative access at the SIM provisioning level, with legislation underneath providing procedural legitimacy. The full stack had been addressed. The earlier version was a hammer. The current version is a scalpel, and it has been sharpened on each previous occasion it was used.

A Brief and Hypocritical Interlude About Western Democracies

At this point, a responsible publication must acknowledge the rather loud elephant that has been sitting in the corner of this article, occasionally clearing its throat.

Several Western democracies have spent the better part of the last three years implementing, or enthusiastically attempting to implement, systems that require users to verify their age before accessing legal content online. The United Kingdom's Online Safety Act. Various American state laws. The EU's push for platform-level identity verification. The justification, delivered with the particular moral confidence of legislators who have discovered that no one will argue with child safety in public, is that children must be protected from harmful content, and the only reliable way to do this is to ensure that the internet knows who everyone is before letting them proceed.

This argument skips rather briskly past the inconvenient observation that the £1,000 iPhone currently in your teenager's pocket was purchased, presumably, by you, the parent, and arrives in your home connected to a router that you pay a monthly bill to maintain, running on a mobile data plan that appears on your credit card statement, and that every major mobile operating system has offered robust parental controls for the better part of a decade. The tools for responsible parenting of a child's internet access exist, are not technically demanding, and do not require the architecture of a national identity verification system to function. What they do require is a parent who has decided that supervising a minor's online activity is, in fact, their job rather than the state's. The alternative being proposed, building a surveillance-adjacent identity layer into internet access for every adult in the country so that a subset of teenagers whose parents cannot be bothered cannot stumble across legal content, is the digital equivalent of installing CCTV in every bedroom in the nation because some households don't believe in door locks. It is, in short, an infrastructural solution to a parenting problem, proposed by legislators who have confused the two, and cheered on by a commentariat that has decided the word "children" ends all further debate. It does not.

The technical mechanism most commonly proposed for age verification is, depending on the specific implementation, either a government-issued identity document uploaded to a third-party verification service, or a biometric check, or a credit card confirmation, all of which require an individual to associate their real identity with their browsing behaviour before their connection is permitted. This is, it should be noted, structurally identical in concept to the white SIM architecture Iran formally institutionalised in July 2025: a system in which your identity, as documented and approved by a central authority, determines what you are permitted to access on the internet and under what conditions.

The differences are real. Iran's version denies access entirely and uses it as an instrument of political control. Western versions, in theory, merely gate specific categories of content and are administered independently of the state. These distinctions matter and should not be dismissed. What should also not be dismissed is the infrastructure being constructed.

Age verification requires an identity layer on top of internet access. Once that infrastructure exists, the databases, the verification services, the API integrations with internet platforms, the legal frameworks establishing identity-gating as a legitimate regulatory mechanism, the question of what categories of content require identity verification before access is simply a policy question, not a technical one. The technical apparatus, once built to protect children from adult content, is equally capable of being repurposed to protect the political establishment from inconvenient journalism. This is not a slippery slope argument. It is a description of how infrastructure works.

One notes, with no particular relish, that Iran's National Information Network was also initially justified partly on the grounds of protecting citizens from harmful foreign content. The rhetorical packaging differs. The packet filtering logic is recognisably similar.

Western policymakers drafting age verification legislation should perhaps read IODA's Iran monitoring data before their next committee session. Not because the UK Government or the US Congress is about to implement military-grade satellite jammers. But because the comfortable assumption that "we would never use this infrastructure that way" is doing a very great deal of heavy lifting on behalf of a very great deal of dangerous architecture.

What the Packets Saw

The IODA telescope, which had gone dark over Iran on January 8th, began seeing background radiation from Iranian addresses again in the final days of January. The quiet return of unsolicited packets, misconfigured servers resuming their background chatter, devices reconnecting and generating the ordinary noise of existence, this is what a country coming back online looks like in the data.

What the monitoring data also shows, for anyone willing to read it carefully, is the trajectory. Each iteration of Iran's shutdown capability has been more sophisticated, more deniable, and more complete than the last. The 2026 version left no BGP trace. It was legislatively grounded. It was technically multi-layered. It maintained a privileged connectivity tier for the approved class while effectively isolating everyone else. It deployed jamming when software proved insufficient. And it was activated not as an emergency measure but as the routine operation of an infrastructure that had been years in the planning.

The 90 million people who disappeared from the internet on January 8th did not disappear because Iran lacks the technical capacity to connect them. They disappeared because a political decision was made, implemented through a legal framework passed six months earlier, using technical infrastructure refined across seven years of live deployment. The packets were not lost. They were stopped. By design, at every layer, with increasing precision, by a state that has spent a considerable amount of time and institutional energy learning exactly how to do it.

The network engineers at IODA will continue to watch the telescope data. The monitoring organisations will continue to document what the BGP tables reveal and conceal. The policy analysts will continue to write reports that governments will continue to absorb at the pace characteristic of institutions that prefer to address infrastructure vulnerabilities after they become crises.

And somewhere in the background, quieter now but still visible to those watching the right data feeds, the Iranian internet hums with the subdued energy of a population that has been reconnected. For the moment. Until the next protest. Until the next currency collapse. Until the next occasion the state decides to exercise the architecture it has so carefully constructed.

The packets do not lie. What they saw in January 2026 was not an emergency. It was a demonstration.

If you found this useful, consider that the Keystone Collective operates on enthusiasm and caffeine rather than venture capital or government grants. A small contribution via the link below keeps the telescope pointed in the right direction. Thank you.

Donate

References

Meng, A., Dainotti, A. and Bischof, Z. (2026). 'Iran's latest internet blackout extends to phones and Starlink', The Conversation, 16 January. Available at: https://theconversation.com/irans-latest-internet-blackout-extends-to-phones-and-starlink-273439 (Accessed: 24 March 2026).

Filterwatch (2026). Total blackout: A technical breakdown of the January 2026 shutdown. Available at: https://filter.watch/english/2026/01/16/investigative-report-technical-breakdown-of-the-january-2026-shutdown/ (Accessed: 24 March 2026).

CircleID (2026). 'Why Starlink is failing to pierce Iran's total internet blackout', 12 January. Available at: https://circleid.com/posts/why-starlink-is-failing-to-pierce-irans-total-internet-blackout (Accessed: 24 March 2026).

Schneier, B. (2026). 'Why Tehran's two-tiered internet is so dangerous', Foreign Policy, 24 February. Available at: https://foreignpolicy.com/2026/02/24/tehran-internet-tiered-connectivity-shutdown/ (Accessed: 24 March 2026).

Rostoum, E. (2025). 'Access denied: The UK Online Safety Act misses its mark', Center for European Policy Analysis, 18 August. Available at: https://cepa.org/article/access-denied-the-uk-online-safety-act-misses-its-mark/ (Accessed: 24 March 2026).

Georgia Institute of Technology (2025). 'Internet Outage Detection and Analysis (IODA)'. Available at: https://ioda.inetintel.cc.gatech.edu/ (Accessed: 24 March 2026).

Read more