**
In the escalating conflict between the United States, Israel, and Iran, the spotlight has predominantly been on traditional military might, yet a formidable and often overlooked arena is unfolding in the digital realm. While US Central Command releases polished images of airstrikes and naval operations, details regarding cyber operations remain shrouded in secrecy. However, recent statements from top military officials reveal that cyber warfare is a pivotal component of the current strategy against Iran.
The Cyber Dimension of Warfare
Admiral Brad Cooper, commander of US Central Command, recently underscored the multifaceted nature of modern warfare, stating, “We continue with strikes into Iran from seabed to space and cyber-space.” This assertion hints at a significant cyber offensive that complements traditional military tactics, albeit one that is rarely discussed openly in official communications.
Pre-emptive cyber operations have become a cornerstone in preparing for military engagements. General Dan Caine, chairman of the Joint Chiefs of Staff, emphasised that extensive planning went into establishing what is known as the “target set,” a list of key assets for potential strikes. US and Israeli cyber operatives may have infiltrated Iran’s critical computer networks long before any missiles were launched. By targeting air defence systems and military communications, they aimed to cripple Iran’s response capabilities.
Intelligence Gathering Through Cyber Espionage
The use of cyber-espionage is particularly noteworthy in establishing a comprehensive understanding of enemy movements. Reports suggest that Israeli operatives hacked into CCTV and traffic cameras to create a detailed surveillance network, monitoring the activities of Iranian leaders, including Ayatollah Ali Khamenei. Sergey Shykevich, a threat intelligence expert at Check Point, noted that internet-connected cameras provide real-time insights at minimal cost, making them prime targets in cyber warfare.
This intelligence is not solely derived from cyber means; it is often supplemented with traditional espionage techniques. Tal Kollender, a former Israeli military cyber-defence specialist, explained that cyber operations serve as “a force multiplier,” enhancing ground operations by shaping the information environment.
Disruption and Communication Blackouts
In the aftermath of recent strikes, General Caine referred to operatives from US Cyber Command and US Space Command as “first movers,” effectively disrupting Iran’s ability to see, communicate, and respond. Some experts speculate that mobile phone networks were jammed, preventing security personnel from alerting Iranian leaders of incoming attacks—a tactic reminiscent of strategies employed in previous conflicts, including the war in Ukraine.
Defence Secretary Pete Hegseth echoed these sentiments, asserting that Iranian military personnel are currently unable to communicate effectively, thus hampering their ability to coordinate a robust response. This level of disruption indicates a strategic focus on blinding the adversary, which has proved vital in ensuring the success of military operations.
The Role of Cyber Intelligence in Targeting
As the conflict progresses, Hegseth has elaborated on the ongoing search for additional targets within Iran, hinting at the use of advanced tools such as open-source intelligence and satellite imagery analysis in conjunction with cyber-espionage. The integration of Artificial Intelligence (AI) in this process is likely, as evidenced by Hegseth’s comments regarding a young intelligence operative’s innovative targeting methods.
The history of cyber operations between the US, Israel, and Iran is fraught with secrecy. Notable incidents like the Stuxnet attack on Iranian nuclear facilities in 2010 exemplify the importance of maintaining operational security. Public acknowledgment of cyber capabilities could inadvertently reveal strategies and vulnerabilities, a concern echoed by experts in the field.
Iran’s Cyber Response: An Uncertain Landscape
Interestingly, Iran has remained relatively quiet in the cyber domain during this period of conflict, raising questions about its capabilities and response strategies. Historically, Iran has demonstrated its prowess in cyber warfare, as evidenced by previous high-profile attacks like the 2012 assault on Saudi Aramco. Yet, there have been few signs of retaliation in the current conflict, leading some to speculate whether Iranian cyber capabilities have been compromised by pre-emptive strikes.
Recent reports indicate that an Iranian-linked hacking group, Handala, executed a wiper malware attack against medical technology firm Stryker, suggesting that Iran is still capable of offensive cyber operations. Experts warn against underestimating Iran’s ability to respond, with Dr Louise Marie Hurel of the Royal United Services Institute noting the potential for hacktivist groups to act on behalf of the state.
Why it Matters
The unfolding cyber warfare landscape in the conflict between the US, Israel, and Iran highlights a crucial shift in the nature of military engagements. As traditional battlefields evolve, the digital domain becomes increasingly integral to strategic planning and execution. Understanding the implications of cyber operations not only shapes military tactics but also raises essential questions about international law and the rules of engagement in modern warfare. The intersection of technology and conflict is redefining the parameters of power, making it imperative for policymakers and military leaders to navigate these complexities with greater transparency and foresight.