Listen to the article

By Staff Writer
A new report reveals how Chinese surveillance technology, delegated censorship, and bandwidth discounts have made mobile operators central to Tehran’s infrastructure of oppression.
When the British not for profit organisation ARTICLE 19 published “Tightening the Net: China’s Infrastructure of Oppression in Iran” this month, it confirmed what many in the security community have long suspected: Chinese technology firms have been the foundational architects of Iran’s digital repression apparatus. The report is the first comprehensive open source analysis of the China Iran nexus. It arrives as Iran endures its most severe information blackout since the Islamic Revolution to shield its oppression.
Buried within the report’s detailed mapping of the China Iran digital authoritarian partnership is a finding with profound implications for corporate accountability and the future of telecommunications in authoritarian states: the central role that mobile network operators, and MTN Irancell in particular, play in implementing Iran’s censorship and surveillance regime.
The operator as enforcer
The conventional understanding of internet censorship in Iran centres on the state owned Telecommunications Infrastructure Company (TIC), which controls the country’s international internet gateways. In this model, TIC serves as the chokepoint through which all international traffic flows and can be throttled or severed.
The ARTICLE 19 report reveals a more sophisticated and distributed reality. Drawing on information from experts on digital infrastructure in Iran, the report establishes that internet filtering has been substantially delegated to major operators, specifically MCI, an affiliate of the IRGC linked Telecommunication Company of Iran (TCI), and to Irancell, now led by an IRGC commander. The rationale is operationally pragmatic: outsourcing filtering to operators reduces the technical burden on TIC’s centralised infrastructure. In return, cooperating operators receive approximately a 20 per cent discount on their bandwidth costs.
The economics are stark: operators are financially incentivised to become the regime’s frontline censors. Every megabyte of throttled dissent comes at a discount.
This is not merely a technical arrangement. During periods of protest, the report notes, Iranian authorities perpetrate internet shutdowns through “a decentralised system of direct pressure on ISPs”. The operators are not passive carriers whose infrastructure happens to be commandeered. They are active participants in a system that selectively disrupts communications to suppress political expression, conceal human rights abuses, and isolate civilian populations from the outside world.
Huawei’s shadow over Irancell
MTN Irancell, Iran’s second largest mobile provider, operates at the intersection of several risk vectors documented in the ARTICLE 19 report. In 2011, Huawei completed a sale of telecom equipment to MTN Irancell Telecommunications Services. While Huawei denied at the time that it was developing censorship and surveillance tools for Iran, the nature and timing of this engagement must be understood against the backdrop of Huawei’s broader Iranian operations.
The report documents that Huawei had sought a partnership with MobinNet, Iran’s then sole nationwide wireless broadband provider, as early as 2010, a deal worth at least 1.3 million euros. Based on documents seen by Reuters, the partnership would have provided Huawei support for monitoring communications traffic in real time at the request of security agencies. Those familiar with the matter indicated that MobinNet began using Huawei’s deep packet inspection (DPI) tools when it launched operations.
DPI technology is the backbone of modern internet surveillance and censorship. It allows network operators to inspect, classify, and selectively block or throttle traffic based on content, rather than merely routing it. In the hands of an authoritarian government, DPI transforms a mobile operator from a neutral carrier into a precision instrument of repression, capable of identifying encrypted VPN traffic, targeting specific applications, and monitoring individual communications.
The United States subsequently charged Huawei with fraud for using Hong Kong based Skycom to conceal its Iran business, including activity that aided human rights abuses against protesters. The arrest of Huawei executive Meng Wanzhou in Canada in 2018 on a US extradition request related to Iran sanctions evasion triggered an international crisis when China arbitrarily detained two Canadian citizens for over 1,000 days in apparent retaliation.
MTN Group’s Iranian entanglement
For MTN Group, Africa’s largest telecommunications company by subscribers, the ARTICLE 19 report adds a new dimension of legal and reputational risk to an already fraught Iranian investment.
MTN Irancell is a joint venture between MTN Group (49 per cent) and the Iran Electronic Development Company (51 per cent), which is directly controlled by the Iranian Ministry of Defence. The operation has long been one of the most controversial elements of MTN’s portfolio, attracting scrutiny over sanctions compliance, governance, and the broader ethical implications of operating critical communications infrastructure in a state that systematically weaponises that infrastructure against its own citizens and for terrorism abroad.
The ARTICLE 19 findings sharpen these concerns in several ways. First, the confirmation that operators like Irancell actively implement internet filtering, and receive financial incentives to do so, means that MTN Group, through its joint venture, is not merely operating in a challenging regulatory environment. It is profiting from a censorship architecture that has been used to suppress protest movements, conceal mass killings, and facilitate surveillance of human rights defenders, journalists, and ethnic and religious minorities.
Second, the documented role of Chinese supplied equipment in Iran’s filtering and surveillance infrastructure creates a compound risk. If Irancell’s network incorporates Huawei DPI tools, whether procured directly or inherited through the broader telecommunications supply chain, then MTN Group’s corporate responsibility extends to the deployment of Chinese surveillance technology in the service of Iranian state repression.
When a mobile operator receives a 20 per cent bandwidth discount in exchange for filtering internet traffic during a crackdown that has killed an estimated 30,000 people, the distinction between commercial pragmatism and complicity collapses.
Third, the January 2026 information blackout, described by ARTICLE 19 as unprecedented in the near total control Iran exercised over internet, phone, banking, healthcare, and emergency response, raises questions about what role, if any, Irancell played in implementing or facilitating the shutdown. The report’s finding that shutdowns are executed through direct pressure on ISPs and mobile operators makes this a material corporate governance question for MTN Group’s board and shareholders.
The Chinese architecture behind the curtain
MTN Irancell’s predicament cannot be understood in isolation. The ARTICLE 19 report maps a comprehensive ecosystem of Chinese technology transfer that has built Iran’s infrastructure of oppression over more than fifteen years.
ZTE Corporation signed a contract with TCI as early as December 2010 to develop a nationwide integrated monitoring system capable of surveilling voice calls, SMS, email, chat, and internet traffic through DPI technology. ZTE operated through a front company, Beijing 8 Star International Co., and an Iranian subsidiary, ZTE Parsian, to conceal its direct involvement. The US Justice Department found ZTE guilty of sanctions violations in 2017. In 2022, the US Commerce Department established that ZTE had conspired with Far East Cable Company Limited (FECCL) to further hide its Iranian business, with FECCL agreeing to supply parts to Iranian telecom company Rightel for ten years, indicating deep, long term dependency on Chinese supply chains.
Tiandy Technologies and Hikvision have supplied AI powered surveillance cameras, facial recognition systems, and ethnicity tracking tools to the IRGC and other Iranian security agencies through a network of local distributors including Faragostar Persia Electronics, Persia Systems, and Tartan Dezh Ariana. Faragostar brokered a distribution deal with Iran’s Ministry of Interior for Dahua equipment in 2020. These are the same companies whose technology has been used to monitor Uyghurs in China.
Overarching all of this is the satellite dimension. China’s transfer of BeiDou military grade satellite navigation signals to Iran since 2021, combined with Iran’s announced 2025 plan to fully abandon GPS in favour of the Chinese alternative, has enabled counterspace capabilities that were on display during the January 2026 blackout. While the specific electronic warfare hardware used to disrupt Starlink is assessed as likely Russian origin, it operates within a broader tripartite technology cooperation framework that has made Iran’s information control capabilities more sophisticated and more brutal with each successive crackdown.
Cyber sovereignty: the ideology behind the infrastructure
What makes the China Iran digital authoritarian nexus particularly durable is that it is not merely transactional. It is normative. Both regimes have embraced what they call “cyber sovereignty”, the principle that states have absolute authority over their domestic internet governance, unencumbered by law or principles of internet freedom.
Iran’s National Information Network (NIN), designed to create a walled domestic internet equivalent to China’s Great Firewall, has been developed in deliberate emulation of the Chinese model. The report documents that SCC Secretary Abolhassan Firoozabadi explicitly called China a successful model in internet censorship and filtering. In 2014, Iran’s Ministry of ICT announced an agreement with the Cyberspace Administration of China on cooperation in internet and ICT technology development, with Iran’s Information Technology Organisation welcoming Chinese companies to participate in NIN implementation.
This authoritarian alignment extends to multilateral fora. Iran’s 2023 contribution to the UN Global Digital Compact mentioned “sovereignty” 29 times and explicitly advocated for national information networks as a framework for international cooperation, effectively seeking global legitimacy for its domestic internet repression. The architecture of impunity being constructed is as much about norms as it is about technology.
What comes next
The ARTICLE 19 report lands at an inflection point. Iran is poised to launch a national AI platform in March 2026 that is expected to feature facial recognition technology, a capability that has already been used to identify and arrest women for violations of hijab laws. The deepening AI cooperation pledged by Iran’s Minister of ICT and China’s MIIT in May 2025 suggests that Chinese technical expertise will be embedded in this platform.
Meanwhile, China’s September 2025 launch of a prototype satellite internet firewall demonstrates the capability to extend content controls into space using AI powered autonomous filtering. While no direct Iran engagement has been documented, China’s strategy of exporting cyber sovereignty through the Digital Silk Road, of which Iran is an active partner, makes such extension a matter of when, not whether.
For telecommunications companies operating in Iran, the implications are increasingly stark. The distributed censorship model documented by ARTICLE 19 means that operators cannot credibly claim to be neutral carriers caught in the crossfire of geopolitical conflict. They are commercially incentivised participants in a repression architecture built on Chinese technology, justified by a shared authoritarian ideology, and deployed against civilian populations during the deadliest crackdown in the Islamic Republic’s history.
MTN Group faces a choice that many multinational corporations have sought to defer but that events in Iran are making inescapable: whether the financial returns from operating in an authoritarian market justify the reputational, legal, and moral costs of being integrated into its machinery of oppression.
The infrastructure of oppression has vendors, operators, and balance sheets. The question is no longer whether we can trace the supply chain of repression, but what we intend to do with the evidence.
