In the midst of the uncertainty surrounding one of the largest air strikes Lebanon has ever witnessed, Israeli analyzes reveal an unprecedented scenario that explains the targeting of dozens of “Hezbollah” sites at the same time, amid talk of significant penetration into the party’s command and control structure.

According to what was reported on the “Maariv” website, citing an analysis presented by analyst Shanaka Anselm Pereira, information circulating among circles loyal to “Hezbollah” indicates the possibility that Israel tracked the IP addresses of party officials during a meeting via the “Zoom” application, and was able to determine the locations of about 100 targets simultaneously, and then carried out the strikes within just 10 minutes.

However, the report confirms that this mechanism was not recognized by the Israeli army, nor has it been verified by any major media outlet, noting that this information came from “Tier-4” sources, and was not supported by Israeli, American, or independent intelligence reports.

However, the analyst explains that the importance of this story does not lie in the extent of its authenticity, but rather in what it reveals about the nature of the operation itself, as 100 leadership sites were targeted in three main areas: the southern suburb of Beirut, the Bekaa, and southern Lebanon, within a period of time not exceeding 10 minutes.

He pointed out that the targets included intelligence headquarters, missile infrastructure, sites belonging to the “Radwan” force, and the drone operating unit affiliated with “Hezbollah,” an information confirmed by the Israeli army, while the pivotal question remains: How were these targets identified at the same time?

Pereira believes that what happened embodies intelligence superiority, not just air superiority, considering that “hitting 100 targets in succession means air control, but hitting them within 10 minutes means intelligence control.”

The analysis shows that this capability requires accurate and real-time location data for each target, constantly updated, and combined with field information for use within an “attack package” that is executed before the targets can move.

The report presents several possibilities for the source of this information, including tracking IP addresses, mobile phone data, communications interception (SIGINT), human information, or a combination of these tools, stressing that the end result is the same: deep penetration into Hezbollah’s operational structure.

The report recalls Operation Pager in September 2024, which demonstrated Israel’s ability to penetrate supply chains, considering that what is happening today may represent a development towards penetrating digital communications instead of physical means.

If the “Zoom” hypothesis is correct, this indicates a qualitative shift from targeting devices to targeting digital infrastructure, as what is no longer required is planting field tools, but rather merely connecting the target to the network.

The report estimates that Hezbollah’s response may be to abandon digital means and return to traditional communications, such as reporters and direct meetings, but this option in turn creates weak points, as field movement can be tracked via satellites and drones.

The analysis concludes that any change in the method of communication will slow down the pace of decision-making within the party, weakening its ability to coordinate, and putting it in front of what it calls an “intelligence trap”: either using technology and being hacked, or abandoning it and losing effectiveness.

He stresses that the Israeli army is not obligated to confirm this narrative to achieve its goal, as its spread is sufficient to push Hezbollah to believe that its system has been hacked, which negatively affects its performance, whether the hack is real or not.

In summary, these data reveal that the battle is no longer limited to the ground, but rather is taking place deep within networks and communications, where doubt itself turns into a weapon that confuses the opponent and reshapes the rules of confrontation.