On March 1st, the US and Israel launched their new military campaign, Operation Epic Fury, that resorted to AI and drones to attack the Iranian command structure through a cyber kinetic warfare.
The new war is no longer confined within the boundaries of the distance a missile can travel but the strength of a digital signal. Cyber kinetic warfare is an integration of cyber capabilities with military operations, facilitating physical attacks, such as targeting critical infrastructure and disrupting systems.
Wars Algorithmic Digital Fog
As the operation began, a wave of digital confusion swept through military circles with a viral message, falsely claiming to be from US Cyber Command, urged troops to disable location services, claiming that apps like Uber and Snapchat were compromised.
While officials quickly exposed the rumor, the incident highlighted the psychological pressure of modern cyber wars.
Even if the message was false, the fear of war driving cyber security threats remained high among personnel on the ground. In Iran, the situation was more terrible: a regime-imposed blackout plunged 90 million people into digital silence.
The destruction of cyber security protocols meant that people could not check on each other as connectivity fell to 1%.
“The command did not issue messages to US service members to turn off location services on their electronic devices and did not issue messages that applications had been compromised,” a Department of War official clarified to DefenseScoop.
Experts have pointed out that the Iran cyber war situation has changed with the government using shutdowns to conceal repression from within while also facing pressure from outside.
The chaos was compounded by a sophisticated cyber attack on Iran that bypassed state sensors. In one signal breach, BadeSaba Calendar -a popular religious calendar app- was hacked to send push notifications to citizens, declaring, “It’s time for a reckoning.”
This cyber kinetic integration showed that even the most private digital spaces are now part of the front line. To identify vulnerable access points, some actors may have even utilized techniques like war chalking cyber security to mark accessible networks for exploitation during the initial confusion.
Cyber Destruction Taking Over
Beyond the screens, the physical hardware of war has also seen a radical transformation through cyber kinetic methods. The US military deployed “LUCAS” drones, one-way attack tools that cost $35,000 each.
These were modeled after the very technology Iran once pioneered, Iran’s Shahed-136s, representing a massive cyber physical attack on traditional defense models. It is a sobering shift toward “disposable” warfare that changes how we value military assets.
“History was made yesterday,” said retired Rear Admiral Lorin Selby, adding, “the era of the $35,000 weapon has begun.”
The cyber kinetic attack strategy allowed the US to complement fighter jets and Big Tech hardware, with disposable tech. The use of these drones in cyber wars signals a shift where volume and intelligence outweigh pure muscle.
“The Ayatollah was unable to avoid our Intelligence and Highly Sophisticated Tracking systems and, working closely with Israel, there was not a thing he, or the other leaders that have been killed along with him, could do,” President Donald Trump said in a Truth Social post.
The military’s reliance on these networks means the threat of war driving cyber security breaches through cyber-attacks also increases, with each side seeking an advantage. By using digital twins, the military commanders would be able to play out the mission in a virtual space before a single drone was launched.
Following the escalation in the region, analysts believe we are entering a period of prolonged cyber wars. The destruction of the cyber security infrastructure in Tehran is likely to invite retaliatory strikes by proxy groups.
According to security companies, the world may soon see war chalking of cyber security efforts targeting Western infrastructure as a means of retaliatory strikes by these groups. In conclusion, “Operation Epic Fury” proved that cyber kinetic actions are no longer a secondary front, but the heart of modern warfare itself.
Inside Telecom provides you with an extensive list of content covering all aspects of the tech industry. Keep an eye on our Cybersecurity sections to stay informed and up-to-date with our daily articles.