Skip to main content

Archived Article — The Daily Perspective is no longer active. This article was published on 7 March 2026 and is preserved as part of the archive. Read the farewell | Browse archive

World

The New Frontier of Conflict: When Security Cameras Become Weapons

Military forces are exploiting consumer surveillance systems for targeting and damage assessment, exposing a fundamental flaw in global supply chains

The New Frontier of Conflict: When Security Cameras Become Weapons
Image: Ars Technica
Key Points 3 min read
  • Iranian state-linked hackers attempted to compromise hundreds of security cameras across the Middle East between February and March 2026, coinciding with military strikes.
  • Hikvision and Dahua cameras were targeted using vulnerabilities known for years but rarely patched by owners, demonstrating a persistent security maintenance crisis.
  • Hacked cameras provide real-time targeting intelligence, damage assessment after strikes, and cost far less than satellites or drones while offering superior ground-level angles.
  • The responsibility gap between manufacturers, device owners, and victims makes this an intractable policy problem absent coordinated global standards.

As the military conflict in the Middle East escalated in late February 2026, security researchers detected something unusual: a surge in digital attacks against ordinary street cameras. Within days, according to Check Point Research, hundreds of these intrusion attempts had been targeted at Hikvision and Dahua surveillance systems across Israel, Qatar, Bahrain, Cyprus, and other regions experiencing active conflict. The timing was no coincidence. The hacking campaign aligned precisely with Iran's missile and drone strikes, suggesting military units were using compromised cameras to gather reconnaissance, assess damage, and plan subsequent attacks.

Security camera mounted on wall
Hacked surveillance cameras are becoming tools of modern military reconnaissance.

This is not an isolated incident.Experts believe the camera hacks were meant to gain access to street level imagery across desired targeting areas, assess impact damage, and collect evidence of a successful attack to use in military reports and propaganda videos. During the 2025 Israel-Iran conflict, Iranian operators gained access to a street camera overlooking Israel's Weizmann Institute of Science minutes before a ballistic missile strike. Ukrainian and Russian forces have been trading control of cameras across their contested borders. Even Hamas hackers attempted to hijack Israeli surveillance systems following the October 2023 escalation.

What makes this tactic particularly worrying is its cost-effectiveness and accessibility.Analysts assess that the Iranian operators may be compromising cameras to obtain battle damage assessment following missile strikes or to support targeting calibration before launches consistent with Tehran's broader doctrine of integrating cyber capabilities with military operations. A hacked camera provides superior tactical information compared to satellite imagery or drones, yet requires minimal investment. It avoids air defences. It offers ground-level perspectives that overhead surveillance cannot match. For any military planner, the logic is obvious.

The Vulnerability Question

The cameras being exploited are not cutting-edge military systems. They are mass-market devices installed on building facades, street corners, and critical infrastructure across every country.All of these security flaws have patches. Each vulnerability targeted in the recent campaign was discovered between 2017 and 2025. Years of fixes were available. Yetmany devices remain unpatched and directly accessible from the internet, creating easy entry points.

This is the core problem: accountability is fractured. The camera manufacturer (Hikvision or Dahua) releases patches. The system owner chooses whether to install them. The municipality or business deploying the camera rarely performs the update. The person whose home is monitored has no say in any of this chain. As cybersecurity researcher Beau Woods has observed, the victim and the device owner are not the same person. The incentive to secure the camera falls on no one in particular.

When a Hikvision camera becomes a conduit for military surveillance, no single actor bears clear responsibility. The manufacturer argues it provided patches. The owner claims insufficient technical expertise or awareness. The government that issued no mandatory security standards sits on the sidelines. This diffusion of accountability is the central governance failure underlying the problem.

A Pragmatic Path Forward

Critics from the left will correctly point out that profit-driven manufacturers have cut corners on security to compete on price. They have a point. Hikvision and Dahua have been criticised for over a decade regarding cybersecurity practices and human rights concerns. Manufacturers should bear more responsibility for shipped devices.

Those on the right will counter that individuals and organisations must take basic hygiene steps: change default passwords, segment networks, monitor for unusual access. This too is valid. Personal responsibility matters.

Yet neither argument resolves the fundamental issue. Consumer-grade IoT devices cannot be secured through voluntary manufacturer initiative alone, nor through user diligence when users lack technical expertise. The solution requires coordinated action: mandatory firmware updates, network isolation standards, transparency requirements, and clearer liability frameworks. Australia should advocate for such standards within international forums rather than waiting for market forces or individual responsibility to fill the void.

The uncomfortable reality is that civilian surveillance infrastructure will continue to be weaponised in future conflicts unless governments, manufacturers, and device owners coordinate. The cost of inaction is borne by populations whose security depends on systems they do not control and do not maintain. That is an unacceptable asymmetry.

Sources (5)
James Callahan
James Callahan

James Callahan is an AI editorial persona created by The Daily Perspective. Reporting from conflict zones and diplomatic capitals with vivid, immersive storytelling that puts the reader on the ground. As an AI persona, articles are generated using artificial intelligence with editorial quality controls.