Israel used hacked phones of Iranian bodyguards to track senior leaders during June conflict

A new report has revealed how Israel managed to target senior Iranian leaders during the June conflict by exploiting a simple weakness — mobile phones carried by bodyguards and drivers.

Phones Became Israel’s Tracking Tool

According to officials, top political and military leaders avoided using cell phones themselves, knowing they could be traced. But their security teams, assistants, and drivers did not follow the same rules. Many of them carried personal phones and even used them for social media during the war.

This mistake gave Israel a powerful advantage. By hacking into those devices, Israeli intelligence was able to monitor the movements of some of Iran’s most senior officials and scientists. Officials explained that while leaders avoided direct exposure, the constant presence of armed escorts and staff with phones created digital trails that were easy to follow.

The reliance on phones by guards and aides turned out to be the biggest vulnerability. Despite Iran increasing security measures once it learned of possible attacks, the use of these devices still opened doors for Israel to locate and strike key figures.

Israel’s Decapitation Plan at Start of War

The report describes that Israel had prepared a strategy to weaken Iran’s leadership from the very beginning of the 12-day conflict, which started on June 13. The plan focused on striking top commanders and decision-makers before they could coordinate defenses after the surprise assault.

In one of the first operations, Israeli forces tracked a high-ranking commander. He had gathered senior staff for an emergency meeting. Soon after, the meeting place was bombed. The strike killed him and his team. Israeli defense officials said this was possible because they traced digital signals from the phones of people around him.

How Cyber Attacks on Industrial Control Systems Can Endanger Lives ?

The attacks were designed to destabilize Iran’s command structure at the outset of the war. Israeli sources admitted that the unusually large number of bodyguards and staff members surrounding top figures worked in their favor. Every phone in the vicinity provided another possible route for monitoring.

“Using so many guards is a weakness we could exploit,” one official said. Israel viewed the massive security presence not as a barrier, but as a digital footprint that revealed exact locations.

Mistakes Continued Despite New Rules

Iranian security teams received orders to stop using mobile phones near officials after the early strikes. They began relying on walkie-talkies, and only team leaders carried communication devices. Commanders instructed these leaders not to travel directly with high-profile figures.

The strict rules were not always followed. In one incident, a group of guards ignored the order. They kept using their cell phones. This mistake allowed Israel to trace a meeting of senior political leaders. But in that case, the strike missed the intended targets.

Kristi Noem fires FEMA’s 24 IT staff after massive cybersecurity breach

Israel fought the June war for nearly two weeks and launched heavy attacks on Iran’s leadership, nuclear scientists, missile program, and uranium enrichment sites. Israeli officials said the strikes were necessary to prevent Iran from advancing plans to harm their country.

The exposure of how the operation used phones shows that technology and human error play a crucial role in modern conflicts. Even with tight security, one simple oversight can lead to devastating results.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Spanish police arrest suspect accused of hacking exam system to change grades

Spanish police have arrested a 21-year-old man suspected of...

Kristi Noem’s aide escalates immigration row into Hollywood-level drama with Kim Kardashian

In a collision of celebrity power and political fire,...

Gavin Newsom mocks Melania Trump with AI Vanity Fair cover calling himself “The American King”

California governor Gavin Newsom has taken his social media...

Kristi Noem fires FEMA’s 24 IT staff after massive cybersecurity breach

Homeland Security Secretary Kristi Noem has taken a dramatic...

2.5 Billion Gmail Users on Alert as Google Issues Urgent Security Warning

Google has issued an urgent warning to 2.5 billion...

Gavin Newsom mocks JD Vance’s “tiny brain” in fiery social media clash

A sharp war of words has broken out online...

Tesla hacker restores missing crash logs exposing Autopilot pedestrian collision

In April 2019, a tragic accident took place in...

Gavin Newsom slams Trump’s troop deployments as dangerous militarization of U.S. cities

California Governor Gavin Newsom has raised sharp concerns about...

Epstein donations raise new questions after report links Dalai Lama to Manhattan visits

When people talk about the people who visited Jeffrey...

Related Articles

Popular Categories

error: Content is protected !!