In a stunning revelation that underscores the depths of modern intelligence warfare, reports have emerged detailing how Israel’s Mossad and allied agencies, including elements of U.S. intelligence, maintained long-term access to Tehran’s extensive traffic camera network. This covert operation, spanning years, provided unprecedented visibility into the movements of Iran’s top leadership, culminating in the targeted assassination of Supreme Leader Ayatollah Ali Khamenei on Saturday, March 1, 2026, in a precision Israeli airstrike on a heavily guarded compound near Pasteur Street in central Tehran.

The Financial Times, drawing from multiple current and former Israeli intelligence officials as well as other knowledgeable sources, described a sophisticated, multi-layered surveillance effort that turned Iran’s own urban monitoring infrastructure against its rulers. Nearly all of Tehran’s traffic cameras—part of a vast system originally designed to manage congestion, enforce traffic laws, and, crucially, surveil the population and regime opponents—had been compromised long before the strike. Footage from these cameras was quietly encrypted and relayed in real time to secure servers in Tel Aviv and southern Israel, feeding into Israel’s advanced signals intelligence apparatus.

This digital penetration was no isolated hack but part of a broader, years-long campaign orchestrated primarily by Israel’s elite Unit 8200 (the cyber and signals intelligence branch of the Israel Defense Forces) in close collaboration with the Mossad’s human intelligence operations. Analysts used complex algorithms to process the streams, mapping out the “daily rhythms” of senior Iranian officials. Patterns emerged: routine routes, shift changes for bodyguards, parking habits of security teams, and even subtle behavioral cues that revealed when high-value targets like Khamenei were present at specific locations.

One particularly valuable camera angle, positioned to overlook a secure area near the supreme leader’s compound, captured where Khamenei’s loyal protection detail parked their personal vehicles. This seemingly mundane detail allowed Israeli operatives to track the arrivals and departures of highly trained drivers and guards, building a detailed picture of the regime’s inner circle. By the morning of the strike, intelligence confirmed that Khamenei and several senior figures were gathered inside the targeted building, enabling a swift, devastating response.

Tehran has been pummelled by US and Israeli air strikes since Saturday, when they killed Ayatollah Khamenei

The operation extended beyond cameras. Israeli intelligence reportedly infiltrated mobile phone networks in Tehran, intercepting communications and geolocation data to corroborate visual feeds. On the day of the attack, cellular service was disrupted along Pasteur Street—jamming antennas to create busy signals for anyone attempting to warn the compound—ensuring the element of surprise remained intact. This cyber disruption, combined with the hacked camera network, created a near-perfect intelligence picture, described by one source as knowing “Tehran like we know Jerusalem.”

U.S. involvement played a critical supporting role. The CIA had tracked senior Iranian leaders, including Khamenei, for months prior, sharing actionable intelligence with Israeli counterparts. This collaboration allowed for precise timing adjustments, ensuring the strike hit when key figures were confirmed present. The assault began with a rapid sequence of precision-guided munitions—some reports indicate three initial strikes within 60 seconds—followed by additional waves that neutralized command structures, ballistic missile sites, and other strategic assets. The operation marked a dramatic escalation in the long-standing shadow war between Israel and Iran, shifting from targeted assassinations of mid-level commanders to the elimination of the regime’s apex figure.

Khamenei, aged 86 and in power since 1989, had long been seen as the unassailable pillar of the Islamic Republic. His death, along with dozens of high-ranking officials including Revolutionary Guard leaders and the defense minister, has plunged Iran into chaos. The regime’s response has included vows of severe retaliation, but the loss of centralized command has complicated any immediate counteractions. Tehran has accused Israel and the United States of launching an unprovoked war, while Western capitals have framed the strikes as defensive measures amid heightened regional tensions.

The hacked traffic cameras highlight Israel’s technological edge in asymmetric warfare. Iran’s surveillance state, ironically built to suppress dissent, became a liability when compromised by a more advanced adversary. Unit 8200’s expertise in cyber infiltration, honed through operations like Stuxnet against Iran’s nuclear program over a decade earlier, enabled this sustained breach without detection. Human assets recruited by Mossad provided on-the-ground validation, while military intelligence processed vast data into actionable daily briefings.

This revelation has sparked intense debate about the ethics and implications of such deep penetration. Critics argue it represents an unprecedented invasion of sovereignty, while supporters view it as a necessary response to Iran’s proxy attacks, nuclear ambitions, and threats against Israel. The operation’s success demonstrates how integrated cyber, signals, and human intelligence can decisively alter geopolitical realities.

As the dust settles in Tehran, the world watches to see how the power vacuum unfolds. Succession processes within the Islamic Republic are opaque, and the loss of Khamenei could fracture the regime’s cohesion. For Israel and its allies, the strike represents a strategic triumph born of patience and innovation—years of quiet surveillance yielding a moment of decisive action.

The full scope of the intelligence campaign may never be entirely known, but the hacked cameras of Tehran stand as a symbol of how invisible digital threads can unravel even the most fortified regimes. In an era of perpetual shadow conflicts, this episode serves as a stark reminder that no system is truly secure when a determined adversary gains persistent access from within.