North America

Cyber operations shape the opening of the Iran war

US and Israel reportedly exploit traffic cameras and hijack state TV, accountability diffuses across classified systems and vendors

Images

Lorenzo Franceschi-Bicchierai Lorenzo Franceschi-Bicchierai techcrunch.com

U.S. and Israeli strikes on Iran were preceded and accompanied by cyber operations that targeted civilian infrastructure, including Tehran traffic cameras and Iranian state television, according to TechCrunch and other reporting it cites. U.S. Joint Chiefs chair Gen. Dan Caine said “coordinated space and cyber operations” disrupted Iranian communications and sensor networks ahead of the opening attacks. The Financial Times, cited by TechCrunch, reported that Israeli intelligence used access to hacked traffic cameras in Tehran to help locate Iran’s supreme leader Ali Khamenei, who was killed in the initial wave.

The episode illustrates how modern war is increasingly assembled from contractors, commercial platforms, and opaque technical systems that sit outside the traditional chain of command. A cyber operation that disables “sensor networks” can be decisive without ever being visible to the public, and without leaving a clear evidentiary trail that a parliament, a court, or even an internal inspector general can later examine. When the same campaign includes hijacking television broadcasts to air messages urging the population to rise up—TechCrunch cites the Jerusalem Post describing a takeover of Islamic Republic of Iran Broadcasting after Israeli bombs hit IRIB offices—the line between military targeting and mass persuasion blurs in practice, not in theory.

This also changes what “success” looks like for the institutions involved. Cyber units can claim operational impact that is hard to falsify, commanders can frame electronic disruption as a force multiplier for kinetic strikes, and vendors can market the conflict as proof that their tools are indispensable. TechCrunch notes that authorities may exaggerate cyber effects; it points to earlier U.S. claims about hacking-caused blackouts in Venezuela that analysts argued were more likely the result of physical damage to substations. That ambiguity is not a side effect—it is a feature that protects reputations, budgets, and procurement choices when outcomes are contested.

The most immediate second-order effect is institutional: responsibility disperses. If a strike depends on years-long penetration of telecom networks, compromised consumer apps used for psychological messaging, and commandeered broadcast infrastructure, accountability becomes a question of who wrote which contract and who signed which authorization—details that are typically classified or buried in procurement language.

Caine described the objective as to “disrupt, disorient and confuse the enemy.” The reporting suggests the same approach also makes it harder to reconstruct who did what, and when, once the bombing is over.