Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Bitcoin Is a Real-Time Sentiment Gauge for Weekend Warmongering

    March 4, 2026

    10 Best PS1 JRPGs in Dire Need of a Port

    March 4, 2026

    Civil Engineer & Supervisor Jobs 2026 in Lahore 2026 Job Commercial Pakistan

    March 4, 2026
    Facebook X (Twitter) Instagram
    Wednesday, March 4
    Trending
    • Bitcoin Is a Real-Time Sentiment Gauge for Weekend Warmongering
    • 10 Best PS1 JRPGs in Dire Need of a Port
    • Civil Engineer & Supervisor Jobs 2026 in Lahore 2026 Job Commercial Pakistan
    • U.S. sinks Iranian warship, Hegseth says, as Iran conflict expands – National
    • Time administration ideas for a productive life-style
    • India eye particular efficiency to beat England
    • One startup’s pitch to offer extra dependable AI solutions: crowdsource the chatbots
    • No demand for reimbursement of $2b mortgage from UAE, says SBP governor
    • Devoted Whisper
    • Ripple Outlines Next Steps After Critical XRPL Amendment Bug
    Facebook X (Twitter) Instagram Pinterest Vimeo
    The News92The News92
    • Home
    • World
    • National
    • Sports
    • Crypto
    • Travel
    • Lifestyle
    • Jobs
    • Insurance
    • Gaming
    • AI & Tech
    • Health & Fitness
    The News92The News92
    Home - AI & Tech - Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran
    AI & Tech

    Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran

    Naveed AhmadBy Naveed AhmadMarch 4, 2026No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    On Saturday, U.S. and Israeli jets began a bombing campaign against Iran, killing its supreme leader Ali Khamenei and several senior government officials. The attacks also hit military and civilian targets all across the country, including a girls’ school, where at least 168 children and adults were killed. 

    After a few days of conflict, multiple reports, as well as statements from government officials, suggest that cyber operations played a significant role in the beginning of the war. This shows that in current times, hacking can be an important component of real-world conflicts and war, supporting kinetic strikes and providing intelligence from surveillance activities, as well as being used as part of psychological operations, or psyops.

    The most direct confirmation of a cyber operation playing part in the war came from the U.S. chairman of the joint chiefs of staff Gen. Dan Caine, who said that “coordinated space and cyber operations effectively disrupted communications and sensor networks” in Iran ahead of the attack, “leaving the adversary without the ability to see, coordinate or respond effectively.” 

    The goal, Caine said in a press conference, was to “disrupt, disorient and confuse the enemy.” 

    In another example of a coordinated kinetic-cyber operation, Israel first bombed the offices of two state-owned Islamic Republic of Iran Broadcasting (IRIB) channels. 

    Israel Defense Forces then hijacked the broadcast to air speeches by Donald Trump and Israeli Prime Minister Benjamin Netanyahu urging Iranians to join the fight against the regime, according to The Jerusalem Post. A similar hack against one of the channels happened in January. 

    As part of the operation to kill Khamenei, Israeli spies reportedly used information from hacked traffic cameras across Tehran, according to Financial Times. Citing two anonymous sources, the paper reported that Israel had had access to the camera network for years, as well as “deeply penetrated mobile phone networks.”

    Contact Us

    Do you have more information about hacking operations in the context of the U.S.-Israeli war against Iran? We would love to learn how this affects you. From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email.

    There have also been reported cases of unattributed cyberattacks that strongly appear to be the work of either American or Israeli government hackers.

    According to multiple reports, on the first day of the war, hackers breached a popular Iranian prayer app called BadeSaba Calendar, sending a handful of messages to all users. 

    “For the freedom of our Iranian brothers and sisters, this is a call to all oppressive forces — lay down your weapons or join the forces of liberation,” read one message. “Only in this way can you save your lives. For a free Iran.”

    These messages made it clear that this was a psychological operation with the goal of influencing those who might be more pro-regime than the rest of the population.

    In response to these operations, at least for now, Iranian hackers have been largely ineffective, according to Bloomberg. At this point it’s unclear why Iranian government hackers have been quiet. Perhaps, an expert told Bloomberg, the fact that the internet is effectively shut down inside the country could be a factor.

    It’s important to note that while these operations may very well be real, they also may have not played that significant of a role in the conflict, which makes sense given that war is about dropping bombs. There may also be a tendency from the authorities themselves to exaggerate the effect of cyber operations as a way to intimidate and scare the enemy.

    That appears to have been the case in Venezuela earlier this year, where U.S. officials, including Trump himself, suggested U.S. hackers caused a power outage in Caracas during the operation to abduct President Nicolás Maduro. But, as a Cyberscoop analysis suggested, it’s much more likely that cyber activities played a small role, and it’s much more likely that the partial blackouts were instead caused by fighter jets destroying electrical substations.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleBindbridge raises $3.8m to battle herbicide resistance with AI-designed crop safety
    Next Article Misfiring Japan overcome Taiwan
    Naveed Ahmad
    • Website
    • Tumblr

    Related Posts

    AI & Tech

    One startup’s pitch to offer extra dependable AI solutions: crowdsource the chatbots

    March 4, 2026
    AI & Tech

    Who wants information facilities in house once they can float offshore?

    March 4, 2026
    AI & Tech

    Eight Sleep raises $50M at $1.5B valuation

    March 4, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Demo
    Top Posts

    How to Get a Bigger Penis – The Stem Cell Secret to Natural Penis Enlargement & A Quiz

    February 22, 20261 Views

    10 Totally different Methods to Safe Your Enterprise Premises

    February 19, 20261 Views

    Oatly loses ‘milk’ branding battle in UK Supreme Courtroom

    February 12, 20261 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    How to Get a Bigger Penis – The Stem Cell Secret to Natural Penis Enlargement & A Quiz

    February 22, 20261 Views

    10 Totally different Methods to Safe Your Enterprise Premises

    February 19, 20261 Views

    Oatly loses ‘milk’ branding battle in UK Supreme Courtroom

    February 12, 20261 Views
    Our Picks

    Bitcoin Is a Real-Time Sentiment Gauge for Weekend Warmongering

    March 4, 2026

    10 Best PS1 JRPGs in Dire Need of a Port

    March 4, 2026

    Civil Engineer & Supervisor Jobs 2026 in Lahore 2026 Job Commercial Pakistan

    March 4, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Advertise
    • Disclaimer
    © 2026 TheNews92.com. All Rights Reserved. Unauthorized reproduction or redistribution of content is strictly prohibited.

    Type above and press Enter to search. Press Esc to cancel.