Iran's surveillance network became Israel's weapon: AI turns cameras into targeting tools

Reviewed byNidhi Govil

2 Sources

Share

Israel used Iran's own street cameras to track down Ayatollah Ali Khamenei on February 28, demonstrating how surveillance systems built to control dissent can be weaponized by adversaries. With nearly three million unprotected cameras worldwide and AI enabling real-time analysis, cybersecurity experts warn that the infrastructure authoritarian states build to maintain control may expose their leaders to the greatest risk.

Israel Hijacked Street Camera Network to Track Iranian Leader

On February 28, Israel tracked down Iranian leader Ayatollah Ali Khamenei using Tehran's own surveillance systems, according to an intelligence official with knowledge of the operation and another person briefed on it who spoke to the Associated Press on condition of anonymity

1

. The operation relied on hacked surveillance footage from Iran's camera network, transforming infrastructure designed to control dissent into an Israel targeting tool that enabled adversarial exploitation in wartime. This marked a vivid demonstration of how surveillance systems installed by governments can be turned against them, despite repeated warnings that Iran's cameras had been compromised since 2021

2

.

Source: Seattle Times

Source: Seattle Times

Iran has installed tens of thousands of cameras across Tehran in response to waves of protests, most recently in January when massive nationwide demonstrations ended in a bloody crackdown

1

. Last year, a senior Iranian politician warned publicly that cameras had been compromised by Israel, posing a national security threat. Yet the warnings went unheeded, and the hijacked street camera network became instrumental in locating one of the nation's most protected figures.

Vulnerability of Surveillance Systems Exposes Global Security Crisis

The Iran camera network incident highlights a pressing security dilemma facing governments worldwide. Conor Healy, director of research at surveillance research publication IPVM, captured the irony: "The infrastructure authoritarian states build to make their rule unassailable may be what makes their leaders most visible to the people trying to kill them"

1

. His observation raises a critical question about trust in an era of cyberwarfare between nations.

Source: ET

Source: ET

Security engineer Paul Marrapese discovered in 2019 that he could easily hack millions of cameras from his California home office. Despite his repeated warnings, the number of unprotected cameras continues to grow. A scan this year revealed nearly three million vulnerable camera feeds in almost every country, including nearly 2,000 cameras in Iran alone

2

. "They're just dumb little things... It's fish in a barrel," Marrapese told the AP, describing how many cameras are installed with minimal security, lacking proper passwords or security patches

1

.

The vulnerabilities extend beyond poor cybersecurity practices. Even surveillance systems on networks sealed off from the internet remain exposedβ€”it takes just one insider to compromise such systems. "Humans are kind of the weakest link," Marrapese noted

2

.

Artificial Intelligence Enables Real-Time Target Identification

What transforms weaponizing surveillance systems from theoretical threat to operational reality is Artificial Intelligence (AI). Intelligence agencies can now sift through vast amounts of surveillance footage to identify targets almost instantlyβ€”a task that once required teams of analysts working for weeks or months

1

. With simple keyword searches, AI can scan feeds and deliver real-time target identification, enabling militaries to locate people, vehicles, and other objectives with unprecedented speed.

Cryptographer and security expert Bruce Schneier explained the shift: "It used to be that you could hack the cameras, but humans had to do the real work of figuring out where the person was. With AI systems... you can do a lot more automatically"

2

. This capability fundamentally changes the calculus of hacking in wartime, making hundreds of millions of poorly secured cameras connected to the internet potential intelligence goldmines.

Hacking Cameras Shifts From Theory to Wartime Reality

For years, cybersecurity experts warned that cameras could be exploited for war, but these concerns remained largely theoretical. That changed in 2023 when Hamas hacked surveillance cameras in southern Israel ahead of its October 7 attack, allowing the group to monitor Israeli army patrols

1

. That same year, a Ukrainian official reported that Russia attempted to hijack cameras near missile targets, a trend that continued in 2024 when Russians hacked cameras in Kyiv and at border crossings

2

.

Eyal Hulata, Israel's former national security adviser and senior fellow at the Foundation for the Defense of Democracies, acknowledged that Israel faces constant cyberattacks from Iran but has defended against them so far. "There is high alert on all cyber fronts," he stated

1

. The mutual targeting underscores how cyberwarfare between nations increasingly focuses on exploiting surveillance infrastructure that governments depend on for both security and social control.

As AI capabilities advance and camera networks expand globally, the question of who controls surveillance systems becomes central to national security. The incident in Tehran serves as a stark warning: the tools built to watch citizens can just as easily be turned to watchβ€”and targetβ€”those in power.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

Β© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo