What they're not telling you: # Iran-Linked Media Floats Data Tax On Hormuz Undersea Internet Cables An Iranian Revolutionary Guard Corps-affiliated media outlet has openly proposed that Tehran begin charging tolls on submarine internet cables passing through the Strait of Hormuz—a move that would effectively weaponize digital infrastructure and potentially disrupt trillions in daily financial transactions worldwide. Tasnim News published an article titled "Three Practical Steps for Generating Revenue from Strait of Hormuz Internet Cables," framing the proposal as Iran reassessing its sovereignty over the strategic waterway. The outlet claimed that Tehran has been economically deprived of benefits tied to the digital chokepoint it controls.
What the Documents Show
This represents a significant escalation in how state-linked Iranian actors publicly conceptualize the Strait of Hormuz—not merely as an energy chokepoint controlling oil and gas flows, but as a digital one controlling the fiber-optic cables that carry the world's internet traffic. The cables in question carry extraordinary financial weight. According to Tasnim, these submarine fiber-optic cables facilitate more than $10 trillion in financial transactions daily, transmitting cloud synchronization, enterprise networks, voice traffic, and payment systems across the globe. The outlet emphasized that any disruption—whether from natural causes, ship anchors, or intentional damage—could impose catastrophic losses on the world economy. The cables use advanced technologies including DWDM (Dense Wavelength Division Multiplexing) and double-armored standards, yet remain vulnerable to physical sabotage in an area where Iran exercises considerable naval control.
Follow the Money
The three-step revenue scheme outlined by Tasnim targets the operational and corporate infrastructure of global commerce. First, Iran would require telecom consortia and cable operators to obtain permits for laying and operating cables through the strait, with initial licensing fees and ongoing annual renewal payments. Second, Iran would assert legal jurisdiction over major technology companies using these cables—explicitly naming Google, Microsoft, Amazon, and Meta—effectively making them subject to Iranian regulatory demands. The third step remains partially obscured in available reporting, but the pattern is unmistakable: Tehran views digital infrastructure as a leverage point equivalent to its long-standing dominance over physical oil shipments. What mainstream coverage typically downplays is the plausibility of this threat. Unlike oil tankers that can reroute around the Cape of Good Hope at significant cost, submarine cables follow fixed underwater paths.
What Else We Know
Cutting or damaging even a single cable would disrupt service across multiple regions. Iran's naval presence in the Strait gives it genuine capacity to enforce such a scheme, whether through direct cable damage, ship boarding operations, or regulatory harassment of companies refusing compliance. The IRGC's explicit public articulation of this strategy—rather than keeping it confidential—suggests either deliberate signaling to the West or preparatory groundwork for implementation. For ordinary people, this matters because internet speed, financial transaction reliability, and cloud service availability depend on these cables remaining uninterrupted. Any successful Iranian extortion or sabotage campaign would ripple through banking systems, streaming services, enterprise networks, and communications infrastructure globally. The proposal transforms what was previously understood as a geopolitical energy crisis into a potential digital crisis, with consequences touching every person whose work, finances, or communications depend on internet infrastructure.
Primary Sources
- Source: ZeroHedge
- Category: Unexplained
- Cross-reference independently — don't take our word for it.
Disclosure: NewsAnarchist aggregates from public records, API feeds (Federal Register, CourtListener, MuckRock, Hacker News), and independent media. AI-assisted synthesis. Always verify primary sources linked above.

