Israeli services turned Tehran’s street-camera grid into an intelligence and targeting network that fed a strike against senior Iranian leadership. AP reported that Israeli operators tracked Ayatollah Ali Khamenei with hacked street cameras and other intelligence, while Reuters placed the February 28 strike campaign inside a wider U.S.-Israeli air war against Iran.
Iran built much of the camera grid for internal coercion. UN investigators said authorities expanded CCTV coverage in public spaces to enforce hijab rules, used drones with cameras, and installed facial-recognition software at Amirkabir University in 2024. Amnesty described a large surveillance campaign against women and girls in streets and vehicles. Tehran built a coercive camera grid for domestic control, then left a hostile service a ready-made sensor network.
AP said Tehran’s cameras had faced repeated hacks since 2021. AP also reported that one intelligence official and one person briefed on the operation said Israeli services had hacked almost all Tehran traffic cameras for years, moved data to servers in Israel, and fed algorithms with footage that exposed routes, addresses, parking patterns, and security details. Iranian lawmaker Mahmoud Nabavian later said Israel had access to intersection cameras and learned about a high-level security meeting through city cameras; Persian reporting in AsrIran repeated the same claim.
Open reporting does not name the exact entry path. AP noted that many internet-linked cameras sit online with minimal security and often keep outdated systems, weak patching, or generic passwords. AP also noted that sanctions pushed Iran toward older gear, Chinese-made electronics, and pirated software, which likely widened exposure. Reuters reported that Indian officials tightened testing rules for internet-connected CCTV because hostile actors operate such cameras from afar and because officials feared spying through camera hardware and software. Israeli operators did not need a brilliant exploit if Iranian camera management stayed loose.
AI seems to have changed the scale of camera exploitation. AP reported that AI now sorts huge video flows in near real time and that algorithms in the Iranian operation helped map routes, workplaces, and protection patterns. Former Shin Bet official Amit Assa told AP that cameras mattered because they confirmed identity inside a wider mix that included undercover agents and bugged conversations. Street-camera hacking no longer ends with raw footage; analysts now get searchable movement data fast enough to support live targeting.
Camera hacking formed part of a wider cyber fight, not a stand-alone stunt. Reuters documented wartime hacks against Iranian apps and websites on March 1, 2026, and Reuters earlier reported a destructive attack claimed by Predatory Sparrow against Bank Sepah in June 2025. AP also cited Check Point data showing a spike in Iranian attacks on cameras in Israel, Bahrain, and the UAE, which analysts linked to target monitoring and bomb-damage review. Israel and Iran now treat civilian camera grids as battle sensors. �
Reporting still leaves gaps. AP tied the deepest operational details to unnamed officials and a briefed source, so full scope and duration stay less certain than the broad judgment that Israel penetrated Iranian camera systems and folded camera feeds into strike planning. Strong evidence supports the broad judgment. Less evidence supports the sweeping claim about years-long access to nearly every Tehran traffic feed.
Main lesson is hard and simple. Iran built a surveillance grid to watch citizens and police dissent. Israel reportedly turned that same grid into a strike chain. Rulers got domestic control. Foreign services got roads, routines, faces, and habits.
