Iran's Cybersecurity Command has implemented a sweeping and severe security directive, banning all government officials and their security personnel from using any device capable of connecting to the internet or public telecommunication networks. This includes personal and government-issued smartphones, laptops, tablets, and smartwatches. The policy, reported by the IRGC-affiliated Fars news agency on December 5, 2025, is a direct response to escalating fears of cyber-espionage and the use of mobile device tracking for targeted assassinations by foreign adversaries, particularly Israel. The move represents a radical shift towards a policy of complete digital isolation for key personnel, prioritizing physical security over the operational efficiencies of modern communication.
The directive is absolute, prohibiting the use of any 'smart' or connected device by the specified personnel. The stated rationale is that such devices pose an unacceptable risk, as they can be exploited for:
The policy explicitly references past incidents, including the assassination of Iranian nuclear scientists and the recent coordinated attacks in Lebanon where pagers and walkie-talkies provided to Hezbollah were remotely detonated. This context suggests the decision is driven by a perceived failure of defensive cybersecurity measures to protect high-value targets.
This policy, while potentially effective at preventing certain types of attacks, will have significant negative consequences for government operations.
The directive must be understood within the broader context of the long-standing covert conflict between Iran and its adversaries, including Israel and the United States. This 'shadow war' has increasingly played out in the cyber domain, with both sides engaging in espionage, sabotage, and influence operations. Iran perceives itself as being under constant cyber-assault and views this extreme measure as a necessary defense for its key personnel and leadership.
While few other nations would consider such a drastic measure, the Iranian directive offers several key takeaways for security leaders:
This policy is an extreme form of network isolation, completely air-gapping individuals from public networks to prevent tracking and remote exploitation.
Mapped D3FEND Techniques:
The ban on all smart devices is an extreme policy to limit the hardware available for an adversary to target.
Mapped D3FEND Techniques:
The Iranian government's directive represents the most extreme form of network isolation: complete physical and logical separation of personnel from all public networks. This approach is taken when the threat of targeted kinetic attacks enabled by cyber-espionage outweighs the need for operational efficiency. For organizations protecting extremely high-value individuals or assets, a less extreme version can be applied: 1. Air-Gapped Networks: For handling top-secret information, maintain physically separate, air-gapped networks that have no connection to the internet. Data is transferred via controlled, one-way diodes or manual transfer with removable media. 2. Secure Enclaves: Provide high-value targets with a 'clean' device used only for sensitive communications within a secure, isolated network, and a separate 'dirty' device for all personal and internet-based activity. This compartmentalizes the risk. 3. SCIFs: For government and defense, this principle is embodied by the Sensitive Compartmented Information Facility (SCIF), a physically and technically secured room or area where no personal electronic devices are permitted.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats