The Financial Times has disclosed that Israeli intelligence penetrated Tehran’s urban surveillance network to monitor the movements of Iran’s supreme leader, Ayatollah Ali Khamenei, in the run-up to the Feb. 28 military strike that killed him. Over several years, operatives reportedly encrypted and exfiltrated footage from virtually every traffic camera across the Iranian capital to terminals in southern Israel and Tel Aviv, building a continuous visual feed of the city’s streets.
A camera overlooking Pasteur Street proved particularly valuable because it captured where Khamenei’s bodyguards and drivers parked each morning. Israeli analysts created detailed profiles of individual chauffeurs and security personnel — their residences, shift patterns, routes and who they protected — using algorithms to combine imagery with signals and human intelligence. The goal, insiders say, was to map the “life patterns” of the supreme leader and other senior officials so their movements could be predicted and interdictable.
The Pasteur footage was only one strand in a dense web of intelligence. Unit 8200, Mossad operatives, military intelligence briefings and human sources were integrated into a single “intelligence picture.” On the morning of the attack, attackers also sabotaged a cluster of mobile-phone towers near the target area so bodyguards calling one another heard only busy signals, supposedly blinding Tehran’s immediate response network.
Israeli and US planners had reportedly been preparing an operation against Iran for months. Sources cited by the Financial Times said the timetable was adjusted after the surveillance picked up the meeting on Pasteur Street; a planned night strike on Feb. 27 was pushed into the morning of Feb. 28 to coincide with the arrival of multiple senior officials, including Khamenei. CIA informants are said to have corroborated the targeting intelligence, according to insiders.
The episode illustrates the stealthy fusion of cyber and traditional intelligence that modern states can deploy to execute precision strikes against high-value targets. Penetration of urban infrastructure — in this case, municipal traffic cameras and mobile networks — expands the battlefield into everyday civic systems and erodes the distinction between military and civilian spheres. For Tehran, the revelations highlight how ordinary, widely distributed sensors can be weaponised against the very establishments meant to secure public spaces.
There are immediate strategic consequences. Iran is likely to respond by hardening physical and digital perimeters around leadership compounds, accelerating counterintelligence operations and pursuing retaliatory options against assets tied to the perpetrators. More broadly, the case will sharpen debates in capitals worldwide about the vulnerability of smart-city technologies and the risks of relying on widely deployed, networked sensors without robust, state-level cybersecurity protections.
The disclosure also complicates diplomatic terrain. If allied intelligence services cooperated on the strike, the operation raises questions about coalition decision-making, legal authority to target a foreign head of state, and the escalation risks of combining covert cyber intrusions with kinetic force. For adversaries and neutral observers alike, the episode is a lesson in how quickly digital access to urban systems can be converted into lethal operational advantage.
