TEHRAN- In a startling example of modern cyber-enabled warfare, Israeli intelligence reportedly spent years hacking into Tehran’s traffic camera network to monitor the movements of Ayatollah Ali Khamenei, Iran’s now-deceased Supreme Leader, information that helped shape the operation that led to his killing.
According to a detailed report by the Financial Times, nearly all of the city’s cameras, originally deployed to monitor traffic and public order, were covertly compromised and used as an intelligence beachhead.
Security officials familiar with the matter say the infiltrated cameras were not isolated tools, but part of a sophisticated, long-term surveillance operation.
The hacked feeds were allegedly encrypted and transmitted to servers in Tel Aviv and southern Israel, allowing analysts to build detailed “patterns of life” for Khamenei and his security detail, including daily routes, arrival times, and where bodyguards parked their vehicles.
The surveillance work reportedly began years earlier, with Israeli intelligence gaining access to video streams across the city.
By combining this visual data with artificial intelligence and advanced algorithms, analysts were able to process vast amounts of information to track the movements of key Iranian officials.
One camera in particular, positioned to capture activity near Khamenei’s compound on Pasteur Street, proved especially valuable in piecing together his routines and protective details.
The hacked traffic camera network formed only one layer of a much broader intelligence apparatus that included signals intelligence, mobile network infiltration, and human sources.
Officials told FT that the US Central Intelligence Agency (CIA) provided confirmation of Khamenei’s location on the day of the operation, offering crucial human-intelligence support to complement the digital surveillance.
Israeli forces reportedly used this comprehensive intelligence picture to time and execute a precision strike on February 28, 2026, killing Khamenei and multiple senior officials.
Planners chose a daytime operation, unusual in traditional assassination missions, to maintain tactical surprise, relying on the real-time data from the hacked cameras to confirm his presence at the meeting location.
The revelation that city infrastructure designed for civilian traffic monitoring could be co-opted for deep intelligence collection highlights a growing vulnerability in urban surveillance systems.
Experts say the case underscores how seemingly benign technology can be weaponised when integrated with sophisticated cyber capabilities and geopolitical objectives.
Iran’s state surveillance systems, including traffic cameras and mobile networks, were originally intended to bolster regime control and public safety.
Yet, according to reports, those very systems became a conduit for foreign intelligence, turning Iran’s urban monitoring architecture into an effective tool for adversaries.
The use of hacked traffic cameras in such a high-stakes operation raises broader questions about the security of ubiquitous surveillance infrastructure and the ethics of dual-use technology in international conflict.
As governments and cities worldwide expand their camera networks, critics warn that without robust cybersecurity safeguards, these systems can become liabilities as much as assets.



