This was not a work done overnight. Israel’s technology espionage units (such as Unit 8200) and the intelligence agency Mossad worked for years to break into Iran’s traffic camera systems. They took control of the cameras installed on the streets of Tehran and their live video feeds (images) started reaching Israel directly.
He especially focused his attention on those cameras which were installed around the parking lots of senior officials, their bodyguards and drivers. By watching these everyday footage, Israel prepared a complete outline of the officers’ daily routine. They came to know which officer leaves his house at what time, which route he takes and what is his duty time. In the world of espionage this is called understanding “pattern of life”. Based on this solid information, Israel carried out a precise attack during a meeting near Pasteur Street.
After all, how are cameras hacked?
Traffic cameras are actually machines connected to the internet. If their network or password is weak, then it becomes very easy for hackers to enter into them. Mainly three methods are adopted for this:
- Digital breach (through virus): Hackers insert a hidden virus (malware) into the camera system through a fake email or weak software update. This virus works exactly like an intruder, who sits inside and silently sends the video feed of the cameras to Israel’s servers.
- Exploiting a weak lock: Many times the cameras run on very old software or their password is a very simple word (like admin) set by the company. By taking advantage of this old flaw or weak password, hackers take complete control of the cameras at home.
- Stealing data in transit: This is called ‘man-in-the-middle’ attack. It is exactly like the postman reading your letter midway before it reaches you. Hackers intercept the conversation between the camera and its main server and steal its data.
Understanding data using AI
No human being can sit and watch millions of hours of video from thousands of cameras. This is where computers and Artificial Intelligence (AI) are used. Israel analyzed this immense data with the help of supercomputers and AI.
Machines easily understand what it means if a particular vehicle is parked at a certain place every Saturday morning. By recognizing faces and tracking vehicle number plates, AI was able to tell when, where and how the bodyguards were moving. This technology exposed every small and big activity of Iran’s security circle on Israel’s screen.
mobile network shutdown during attack
To make its operation completely successful, Israel not only hacked the cameras, but also jammed the mobile network of the area during the attack. They carried out a digital attack on the mobile towers near Pasteur Street.
They put so much load on the mobile network at once that the towers got jammed. It was a fake load. Due to this, the phone lines of all the people present there got disconnected and only “Busy” started appearing on the screen. Due to non-connection of phones, no one could send alert on time and could not call for help.
a lesson for us
We all install Wi-Fi CCTV cameras in our homes, shops and societies for security. If our system is not secure, our personal life may also be in danger. Therefore, if you have also installed such cameras, always create a very strong password, keep updating the camera software from time to time and avoid clicking on any unknown links or emails. Caution is the greatest security in this digital world.
Discover more from News Link360
Subscribe to get the latest posts sent to your email.
