🔥Cyber War Erupts: US-Israel Assault 💥
World
🎧



The United States and Israel have been utilizing firepower, alongside extensive cyber operations, in response to recent events. U.S. Central Command has regularly posted about weapons, jets, and ships. Simultaneously, Iranian hackers claimed their first significant cyberattack, targeting Stryker, a U.S. medical technology company. According to General Dan Caine, months, potentially years, of planning went into identifying and preparing key computer networks for disruption. U.S. Cyber Command and US Space Command operatives are described as “first movers,” aiming to hinder Iran’s ability to communicate and respond. Furthermore, intelligence suggests Iran’s attempts to compromise CCTV and traffic cameras sought to disrupt surveillance of key figures. These cyber operations, while not typically decisive alone, represent a critical force multiplier supporting broader military objectives.
CYBER OPERATIONS: A MULTIFACETED STRATEGY
Cyber-espionage and hacking play a significant role in “pre-positioning” for war, fundamentally altering the nature of conflict. General Dan Caine, chairman of the joint chiefs of staff at the Pentagon, described this as enabling the war through months, in some cases years, of planning – the “target set” for strikes. US and Israeli hackers could have infiltrated key computer networks in Iran long before any actual strike was planned. Computer networks behind air defenses or military communications would have been high-priority targets. The Financial Times was told by unnamed sources that CCTV and traffic cameras had been hacked by Israel to create an enormous surveillance network, in order to establish so-called “patterns of life” of Ayatollah Ali Khamenei and his commanders in preparation for the strike that killed him. Internet-connected cameras have become a target in cyber warfare as they “offer real‑time situational awareness of streets, facilities, and movement at very low cost,” Sergey Shykevich, threat intelligence expert at cyber-security company Check Point. This information would be used alongside more traditional intelligence – such as that gathered from human spies. “Cyber isn’t usually the decisive weapon on its own; it’s a force multiplier that helps shape the information environment and supports operations happening on the ground,” said Tal Kollender, former Israeli military cyber-defence specialist and founder of cybersecurity platform Remedio. The US and Israel have a long history of carrying out significant cyber attacks against Iran and are famously secretive about them. For example, officials are still cagey about the infamous destructive Stuxnet hack on Iran’s uranium enrichment facilities in 2010.
TARGETING INFRASTRUCTURE: A SHIFTING LANDSCAPE
The initial strategy focused on disrupting Iran’s ability to “see, communicate and respond” through cyber operations. Commanders in US Cyber Command and US Space Command were described as the “first movers”, disrupting and “blinding Iran’s ability to see, communicate and respond”. Some commentators suggest mobile phone towers were jammed or shut off to prevent the Ayatollah’s security team from being warned about incoming jets, for example. This is not confirmed but we have seen this in other conflicts, such as the war in Ukraine. US Defence Secretary Pete Hegseth also boasted during a more recent press conference that members of the Iranian military “can’t talk or communicate, let alone mount a coordinated and sustained offensive”. The comments echo the words of President Trump when praising the success of the abduction of Venezuelan President Nicolas Maduro. “The lights of Caracas were largely turned off due to a certain expertise that we have,” he said after that operation. It has not been confirmed if the president was referring to a cyber-attack, but in the newly-published US Cyber Strategy he went further in praising his cyber forces for that specific operation, saying that they rendered “our adversaries blind and uncomprehending during a flawless military operation”. This highlights a deliberate strategy of maximizing the impact of cyber operations to create a significant advantage.
SURVEILLANCE AND INTELLIGENCE GATHERING
Beyond direct attacks, cyber operations played a crucial role in intelligence gathering. CCTV and traffic cameras had been hacked by Israel to create an enormous surveillance network, in order to establish so-called “patterns of life” of Ayatollah Ali Khamenei and his commanders in preparation for the strike that killed him. Internet-connected cameras have become a target in cyber warfare as they “offer real‑time situational awareness of streets, facilities, and movement at very low cost,” Sergey Shykevich, threat intelligence expert at cyber-security company Check Point. This information would be used alongside more traditional intelligence – such as that gathered from human spies. “Cyber isn’t usually the decisive weapon on its own; it’s a force multiplier that helps shape the information environment and supports operations happening on the ground,” said Tal Kollender, former Israeli military cyber-defence specialist and founder of cybersecurity platform Remedio. The ability to gather real-time data on movements and activities significantly enhanced the overall strategic picture.
THE HUNT FOR WEAPONIZED DATA
Following the initial strikes, US Defence Secretary Pete Hegseth spoke of a continuing operation to “hunt for more systems to kill”. Cyber operatives were utilizing open source intelligence, satellite imagery analysis, and cyber-espionage to locate military targets in Iran. A possible hint of this came again from Hegseth who praised an intelligence operative he saw in action. “I was talking to a young colonel who’s iterating on how we target and how we find and fix different aspects of what the Iranians are trying to do,” he said, being careful not to give away too much detail. This underscores the proactive and persistent nature of cyber operations, focusing on identifying and exploiting vulnerabilities to maximize the impact of attacks.
INFORMATION WARFARE AND DEBATES
The ongoing war has sparked debates about the role of cyber operations and the need for a more public discussion of related issues. Dr Louise Marie Hurel from the Royal United Services Institute has been pleasantly surprised by the information the US is disclosing. But she argues the war has shown that cyber should be talked about in the same way as conventional action to maintain rules of engagement. “This is an opportunity for us to have a more public debate regarding the support and strategic advantage cyber provides in broader military campaigns and crisis, proportionality, and what counts as a use of force,” she said. This highlights the importance of establishing clear guidelines and frameworks for the use of cyber weapons and the need for ongoing dialogue about the ethical and strategic implications of these technologies.
THE IRANIAN RESPONSE AND LIMITATIONS
Despite Iran’s long-standing capabilities in the cyber domain, the nation has largely been absent in the cyber domain to date. The most notable attack linked to the nation has been the hacking of Stryker, a major US medical technology company, first reported on Wednesday. Iran has long been regarded as a capable cyber power and although the western cyber-security world is braced for attacks either from the state or hackers linked to the state, there has been little activity so far. This suggests potential limitations in Iran's ability to effectively respond in the cyber domain, possibly due to defensive measures or strategic choices. The Stryker incident saw the company’s employee login defaced with a message claiming data had been erased in a ‘wiper’ attack by an Iran-backed group of activists and repeated by Iran’s state broadcaster. It seems implausible that Iran is holding back…[truncated due to length]
This article is AI-synthesized from public sources and may not reflect original reporting.