How Israeli Hackers Used Tehran’s Traffic Cameras to Track Khamenei Before the Strike

The Financial Times reports that Israeli intelligence infiltrated Tehran’s traffic-camera network and other electronic systems to track Ayatollah Ali Khamenei’s movements before a Feb. 28 strike that killed him. The operation combined camera feeds, signals intelligence and human sources to produce a detailed “intelligence picture,” illustrating how urban infrastructure can be weaponised in targeted killings.

A beautiful view of Ali Qapu Palace in Esfahan, Iran with vibrant purple flowers in the foreground.

Key Takeaways

  • 1Israeli operatives reportedly hacked nearly every traffic camera in Tehran and transmitted encrypted footage to Israeli terminals over several years.
  • 2A camera on Pasteur Street allowed analysts to observe the routines of Khamenei’s drivers and bodyguards, enabling precise targeting of his movements.
  • 3Unit 8200, Mossad field teams, military intelligence and human sources were integrated into a single intelligence picture used to time the strike.
  • 4Attackers also disrupted local mobile-phone towers to impede communications among Khamenei’s security detail on the morning of the strike.
  • 5The case demonstrates the strategic risk posed by networked urban infrastructure and raises legal and escalation concerns about cyber-enabled kinetic operations.

Editor's
Desk

Strategic Analysis

This episode signals a new normal in which state actors fuse persistent cyber surveillance of urban infrastructure with classic espionage and kinetic capability to carry out decapitation strikes. The operational success reported here will accelerate an arms race in both offensive digital reconnaissance and defensive hardening of civic sensors. Democracies and autocracies alike must confront an uncomfortable trade-off: the convenience and efficiency of networked public systems versus their potential to be repurposed as conduits for lethal intelligence. Absent new international norms or robust national protections for critical civic networks, other capitals will face similar vulnerabilities, and the margin for miscalculation between covert operations and open conflict will continue to shrink.

China Daily Brief Editorial
Strategic Insight
China Daily Brief

The Financial Times has disclosed that Israeli intelligence penetrated Tehran’s urban surveillance network to monitor the movements of Iran’s supreme leader, Ayatollah Ali Khamenei, in the run-up to the Feb. 28 military strike that killed him. Over several years, operatives reportedly encrypted and exfiltrated footage from virtually every traffic camera across the Iranian capital to terminals in southern Israel and Tel Aviv, building a continuous visual feed of the city’s streets.

A camera overlooking Pasteur Street proved particularly valuable because it captured where Khamenei’s bodyguards and drivers parked each morning. Israeli analysts created detailed profiles of individual chauffeurs and security personnel — their residences, shift patterns, routes and who they protected — using algorithms to combine imagery with signals and human intelligence. The goal, insiders say, was to map the “life patterns” of the supreme leader and other senior officials so their movements could be predicted and interdictable.

The Pasteur footage was only one strand in a dense web of intelligence. Unit 8200, Mossad operatives, military intelligence briefings and human sources were integrated into a single “intelligence picture.” On the morning of the attack, attackers also sabotaged a cluster of mobile-phone towers near the target area so bodyguards calling one another heard only busy signals, supposedly blinding Tehran’s immediate response network.

Israeli and US planners had reportedly been preparing an operation against Iran for months. Sources cited by the Financial Times said the timetable was adjusted after the surveillance picked up the meeting on Pasteur Street; a planned night strike on Feb. 27 was pushed into the morning of Feb. 28 to coincide with the arrival of multiple senior officials, including Khamenei. CIA informants are said to have corroborated the targeting intelligence, according to insiders.

The episode illustrates the stealthy fusion of cyber and traditional intelligence that modern states can deploy to execute precision strikes against high-value targets. Penetration of urban infrastructure — in this case, municipal traffic cameras and mobile networks — expands the battlefield into everyday civic systems and erodes the distinction between military and civilian spheres. For Tehran, the revelations highlight how ordinary, widely distributed sensors can be weaponised against the very establishments meant to secure public spaces.

There are immediate strategic consequences. Iran is likely to respond by hardening physical and digital perimeters around leadership compounds, accelerating counterintelligence operations and pursuing retaliatory options against assets tied to the perpetrators. More broadly, the case will sharpen debates in capitals worldwide about the vulnerability of smart-city technologies and the risks of relying on widely deployed, networked sensors without robust, state-level cybersecurity protections.

The disclosure also complicates diplomatic terrain. If allied intelligence services cooperated on the strike, the operation raises questions about coalition decision-making, legal authority to target a foreign head of state, and the escalation risks of combining covert cyber intrusions with kinetic force. For adversaries and neutral observers alike, the episode is a lesson in how quickly digital access to urban systems can be converted into lethal operational advantage.

Share Article

Related Articles

📰
No related articles found