Tehran depicts Mossad agents physically plugging into airgapped Iranian nuclear networks. Real intelligence officers say that is not how it works. Or is it? Today's prompt from Daniel is about the hit show Tehran versus the gritty, often boring, and occasionally terrifying reality of Israeli intelligence operations inside the Islamic Republic. We are diving into the gap between Hollywood dramatization and actual tradecraft, looking at everything from Unit eight-two-hundred's cyber reach to the human networks managed by Unit five-oh-four.
It is a perfect time to talk about this, especially with the third season having just dropped. There is a massive debate in intelligence circles right now about how these shows affect operational security and whether the glamorization actually makes the real work harder. By the way, today's episode is powered by Google Gemini three Flash. I am Herman Poppleberry, and I have been digging through a lot of Ronen Bergman's reporting to prep for this one.
And I am Corn. I am the one who usually asks if the cool gadget in the movie actually exists. In this case, Daniel is pretty skeptical. He is pointing out the classic trope of using a foreign agent to compromise an airgapped network, which, on paper, sounds like a screenwriting shortcut. But when you look at the twenty-twenty-five Twelve Day War or the twenty-twenty Natanz incident, the reality might be even weirder than the fiction.
That is the hook. The show portrays Mossad as having this extensive, almost casual on-ground presence in Tehran. Israeli agents are running around, conducting offensive cyber ops from laptops in back alleys, and managing vast networks of dissidents. Daniel's point is that the reality is often much more remote. We see drones being smuggled in pieces or operations launched from secondary bases. But then you have these interviews with people involved in the twenty-twenty-five campaign who suggest that actual cells were built and trained inside Iran to launch physical attacks.
It is that tension between the remote keyboard warrior image and the boots on the ground reality. Let's start with the big one Daniel mentioned: the airgapped network problem. In the show, they need a human asset to physically bridge the gap. In the real world, we have the Stuxnet precedent. Herman, most people think Stuxnet was just a magic piece of code that flew through the air, but it had to get in there somehow.
It did. And it was not an Israeli agent in a leather jacket sneaking into the facility. The most credible reporting suggests it was a combination of supply chain compromise and infected USB drives. They targeted external contractors—people who worked for companies providing industrial control systems to the Natanz facility. These contractors would use their laptops or thumb drives at the facility, unaware they were carrying a digital Tomahawk missile.
So the human asset in reality isn't necessarily a willing spy or a trained agent. It is a disgruntled or just plain careless engineer who likes to use his work USB for his home music collection.
Usually it is even more subtle than that. For Stuxnet, the malware was designed to spread through local area networks and removable drives specifically to jump that air gap. It waited for a bridge. What Tehran gets wrong is the level of direct control. In the show, the hacker is often sitting there watching a progress bar. In reality, once you launch a cyber-physical attack like that, you are often fire and forget. You don't have a live feed of the centrifuges spinning out of control. You find out it worked when the International Atomic Energy Agency reports a sudden drop in enrichment output three months later.
That is significantly less cinematic. No one wants to watch a show where the protagonist waits three months for a PDF report from a United Nations bureaucrat. But let's talk about the physical risk. Why is physical infiltration of these sites so rare compared to what we see on screen?
Because it is a suicide mission for almost zero marginal gain. If you can achieve a sixty percent probability of success using a supply chain attack or a remote cyber operation, you take that every time over a ten percent chance of success with an agent on the ground who might get caught and spark a massive international incident. The Iranian security apparatus, especially the Intelligence Ministry and the IRGC's intelligence wing, is incredibly paranoid and actually quite good at counter-intelligence. They have ringed security. To get a physical person inside a site like Fordow or Natanz involves passing through multiple layers of biometric checks and internal surveillance.
But how do they manage those layers? In the show, they use high-tech masks or voice modulators. Is there any reality to that, or is it just biometric spoofing?
It is mostly digital spoofing now. In the real world, if you want to bypass a biometric scanner at a nuclear site, you don't wear a Mission Impossible mask. You hack the database that holds the authorized fingerprints or retinal scans and you insert your operative’s data into a white list for a forty-eight-hour window. Then, when the guard scans the badge, the computer says Authorized. The human guard is just looking at a screen that says green for go.
Yet, we have seen cases where things physically explode. Natanz in twenty-twenty, for example. There was a major explosion in the centrifuge assembly hall. Initial reports hinted at a cyberattack causing a power surge, but later reporting suggested an explosive device was actually smuggled into the building, possibly hidden inside a table or a piece of heavy equipment that was being installed.
And that is where the show and reality start to converge. That is a human intelligence operation. Someone had to know what equipment was being ordered, where it was being staged, and how to get an explosive device inside it without it being detected by X-rays or sniffer dogs. That is not just a guy with a laptop; that is a years-long operation of infiltrating the supply chain. Think about the logistics of that. You have to intercept a specific piece of specialized industrial equipment, disassemble it, plant a stable explosive that won't be set off by vibrations during shipping, and reassemble it so perfectly that a nuclear engineer won't notice a single mismatched screw.
It feels like the cyber part of Mossad's reputation is often a cover for the human part. It is easier for a regime to say we were hacked by a sophisticated foreign virus than to admit our head of procurement for the nuclear program is on the Mossad payroll.
That is a huge point. Admitting to a HUMINT breach is an admission of systemic failure and internal rot. It means you can't trust the guy sitting in the office next to you. Cyber is cleaner for both sides. But we have to distinguish between Mossad and Unit eight-two-hundred. Most of the high-end cyber stuff—the actual coding of the exploits—happens in eight-two-hundred, which is military intelligence. Mossad is the agency that handles the messy stuff: the recruitment, the ground logistics, and the kinetic actions.
Daniel mentioned that he finds the use of a foreign asset to bridge an air gap to be a plot loophole. If you are Mossad, and you have the capability to recruit a high-level Iranian official, why would you risk a foreign agent who looks and sounds out of place?
You wouldn't. The illegal agent—the one who goes in under a fake identity from another country—is a rare and precious resource. Most real operations rely on locals. These are Iranians who, for various reasons—ideology, money, or being compromised—decide to work against the regime. The twenty-eighteen operation where Mossad stole the nuclear archive from a warehouse in Tehran is a prime example. They didn't send a busload of Israelis. They used a large team, many of whom were likely local assets or highly trained specialists who knew the terrain perfectly.
That archive heist was wild. They literally used torches to cut through safes and drove the documents out in trucks. It was very Ocean's Eleven, which I guess is the one time reality actually out-Hollywooded Hollywood.
It was, but even then, the prep work was years of boring surveillance. They knew the exact shift changes of the guards because they had someone watching the building for months. They knew which safes held which documents. That is the part Tehran skips—the three years of sitting in a van eating cold sandwiches before the twenty minutes of action.
Wait, how do they even do surveillance in a city as paranoid as Tehran without getting picked up by the Mahalleh or the local neighborhood watchers?
In reality, you don't use a van with tinted windows. You use static surveillance. You rent an apartment across the street using a front company. You set up high-resolution cameras that use AI to log license plates and recognize faces, and you beam that data out via satellite so there’s no physical trail. If the police raid the apartment, they find a tripod and some wires, but no agent. The show needs the agent to be physically looking through binoculars for the drama, but the reality is a server in Tel Aviv doing the pattern recognition.
Let's shift to the Twelve Day War in twenty-twenty-five. This is something we touched on in Episode seven-hundred-thirty-eight, but it really highlights the internal sabotage angle Daniel is talking about. The Iranian air defenses were effectively blinded during the initial strikes. How much of that was remote cyber versus internal tampering?
The consensus now is that it was a dual-key operation. You had the remote signals intelligence units jamming frequencies and sending false data packets, but you also had internal components. Reporting from the aftermath suggests that certain radar installations had hardware Trojans installed months or even years prior. These are physical modifications to the circuit boards that can be triggered remotely or at a specific time.
So you are saying someone had to physically touch those radar units before the war even started.
Or they touched the components while they were being manufactured or refurbished. This is the deep supply chain attack. If you know Iran is buying radar spare parts from a third-party distributor in Europe or Asia, you intercept that shipment, swap the boards for ones with your special features, and let the Iranians install them for you. You don't need an agent to sneak into the base; you let the Iranian Air Force technicians do the work for you.
That is brilliant and terrifying. It also makes the Tehran show look a bit simplistic. In the show, the protagonist is always in a race against time. In reality, the race was won three years ago when a shipping container sat in a port for two extra days.
Right. But there is also the dissident factor. Daniel mentions the show's focus on Mossad managing networks of dissidents. This is a very sensitive area. There is documented evidence of groups like the People's Mujahedin of Iran, or the MEK, being used as the hands for certain operations. The assassination of the nuclear scientist Mohsen Fakhrizadeh in twenty-twenty used a remote-controlled machine gun, but the logistics of getting that weapon into the country and positioning it on a rural road required a significant ground presence.
The Fakhrizadeh hit is a fascinating case study in the remote versus physical debate. It was a high-tech weapon—satellite-controlled, AI-assisted for facial recognition and to compensate for the lag—but it was physically there. It had to be driven to the spot, set up, and then the vehicle was rigged to self-destruct.
And that is where the cells Daniel mentioned come in. You can't do that with one person. You need a team for reconnaissance, a team for logistics, a team for the technical setup, and a team to handle the exfiltration or the destruction of evidence. The interviews Daniel is referencing suggest that Mossad has moved toward building indigenous cells. These are people living in Iran, blending in, who might not even know they are working for Israel initially. They might think they are working for a private business or a different political group.
The false flag recruitment. That is classic tradecraft. Hey, we are an international environmental group looking for data on Iranian water levels, can you go take some photos of this specific area near a military base?
Precisely. And by the time the asset realizes they are taking photos of a missile silo, they are already on the hook for espionage. They are burned, and Mossad uses that leverage to get them to do more dangerous things. The show Tehran portrays the relationship between the handler and the asset as very personal and often emotional. In reality, it is usually much more transactional and, frankly, colder.
Does that coldness ever backfire? If you treat someone like a tool, don't they eventually flip or just stop caring?
It happens all the time. That’s why vetted assets are so rare. Most agencies prefer unwitting assets. If you don't know you're a spy, you can't be a double agent. You're just a guy doing his job, but your job happens to involve moving a crate that contains a specialized sensor. The drama in Tehran comes from the will they, won't they tension between spies, but in the real world, the best asset is the one who goes home, kisses their spouse, and has no idea they just helped take down a regional power grid.
I want to go back to Unit five-oh-four. For the listeners who aren't familiar, we usually hear about Mossad and Unit eight-two-hundred, but five-oh-four is the military's HUMINT unit. How do they fit into the Iran picture?
Unit five-oh-four traditionally focused on neighboring countries—Lebanon, Syria, Jordan. But as the Shadow War with Iran intensified, their mandate expanded. They are the ones who excel at tactical HUMINT. If Mossad is looking at the long-term strategic goal of stopping the nuclear program, Unit five-oh-four is often looking at the now. Where are the convoys moving tonight? Who is the commander on the ground at this specific IRGC base? They work very closely with the special forces of the IDF, like Sayeret Matkal.
So if there is a physical sabotage mission—like the one Daniel mentioned that degraded air defenses—it might actually be a five-oh-four operation or a joint task force rather than just The Mossad.
Most likely. The distinction is important because five-oh-four operates with a military mindset. Their assets are often recruited from border regions or through military channels. They are very good at the smuggling part—getting drones, explosives, or communication gear across borders that are supposed to be sealed. Think of them as the fixers who handle the physical border crossings that Mossad prefers to avoid.
This brings up a point about the Twelve Day War context. We talked about internal sabotage. There was a report about an Iranian agent—let's call him a double agent—who was actually a Mossad asset sitting inside the IRGC's own internal security wing. He was the one who allegedly disabled the kill switches for the air defense network.
That is the ultimate loophole Daniel is looking for. Why use a foreign asset? You don't. You use the guy whose job it is to check for foreign assets. If you compromise the gatekeeper, the gate stays open. That is the real gold standard of intelligence. The TV show needs a protagonist we can identify with, usually an Israeli woman with a complex backstory. The reality is often a middle-aged Iranian colonel who is bitter about his pension and has a cousin in Los Angeles who needs a green card.
It is the MICE acronym. Money, Ideology, Compromise, Ego. Most of the real-world stuff we see in the public domain fits into those buckets. The Ideology part is interesting in the Iran context. There is a genuine, deep-seated opposition to the regime among many Iranians. They don't see working with Mossad as betraying their country, but as saving their country from the IRGC.
And Mossad leans into that. Their public messaging—even the stuff the former heads of Mossad say in interviews—is often directed at the Iranian people. They want to project an image of being everywhere. This is a form of psychological warfare. If the IRGC believes there is a Mossad agent under every bed, they spend all their time arresting their own people, which does the work of degrading the regime for you.
That is a really interesting second-order effect. By being too glamorized, shows like Tehran might actually be helping Israeli intelligence by reinforcing the myth of their omnipotence.
It is a double-edged sword. On one hand, it creates this superman myth that scares the adversary. On the other hand, it can lead to copycat paranoia where the Iranian regime cracks down so hard that it actually catches real assets. There was a case a few years ago where the Iranians claimed to have busted a huge Mossad ring, and while some of it was clearly propaganda, some of the details about the communication gear they found were eerily similar to known tradecraft.
What kind of gear are we talking about? Is it the classic burst transmitter from the Cold War?
It’s evolved. Now it’s covert communications or COVCOM. It looks like a standard consumer device—a router, a game console, or even a smart fridge—but it has a hidden partition that uses a specialized, low-probability-of-intercept signal to talk to a satellite. The show makes it look like they are hacking on a laptop in a basement, but in reality, they might be sending data through a modified PlayStation five that’s just sitting in a living room.
So the show might inadvertently be giving the Iranian security services a training manual on what to look for?
Not a manual per se, but it raises the general level of awareness. If everyone in Tehran is watching a show where a spy uses a specific type of encrypted phone, the real spy using a similar phone is in more danger. This is why real tradecraft is constantly evolving. The moment something becomes public knowledge or a TV trope, it is dead.
Let's talk about the drones. Daniel mentioned smuggling drones and operating from a remote base. We saw this in the attack on the Isfahan drone factory in twenty-twenty-three. Those were quadcopter style drones, which have a very limited range. They didn't fly from Israel. They had to be launched from within a few kilometers of the target.
That is a local launch operation. You have a cell inside the country that receives the components—maybe hidden in commercial cargo—assembles them in a safe house, and then drives to a park or a rooftop near the target. They launch, the drone does its thing, and they disappear into the city. That is a massive logistical challenge. You need a safe house, a vehicle, local knowledge of the patrol routes, and a way to get out if things go wrong.
And that is where the cells become critical. If you are launching a physical attack in the heart of a city like Isfahan, you are basically burning that cell. Once the drones go off, the security forces are going to swarm the area. You need a very sophisticated escape and evasion plan.
And that is the part that is never in the public domain. How do they get out? Do they have rat lines through the mountains into Iraqi Kurdistan? Do they have legend identities that allow them to just go back to their day jobs the next morning? That is the part that Daniel is right about—we may never know the full picture because that is the most guarded secret of any intelligence agency: the exfiltration route.
But how do you maintain a rat line for decades? Doesn't the route eventually get discovered?
You don't use the same route. You use disposable infrastructure. You pay a smuggler to move a package across the border. The smuggler doesn't know it’s a person, and they don't know who you are. They just know they get ten thousand dollars to leave a truck in a certain spot. It’s the compartmentalization that keeps it alive. In Tehran, the characters all know each other and meet in cafes. In reality, if two agents in the same cell meet face-to-face, someone probably made a huge mistake.
It is the difference between a one-off mission and a sustainable presence. If Mossad is building these indigenous cells, they want them to stay active for years. You don't blow a ten-year asset on a single drone strike unless that strike is absolutely critical.
Right. Which suggests that the strikes we actually see—the ones that make the news—are just the tip of the iceberg. For every drone that hits a factory, there are probably twenty missions that are just about gathering data, testing sensors, or placing those hardware Trojans we talked about.
So, to Daniel's question: is Tehran credible?
I would say it is thematically credible but operationally flawed. The theme of a deep, pervasive Israeli presence that uses a mix of high-tech and human assets is real. The operational details—the specific ways they infiltrate, the speed at which they move, and the foreign agent lead—are dramatized for television. The real Mossad is much more patient, much more reliant on local proxies, and much more likely to use a boring supply chain exploit than a daring physical break-in.
It is like the difference between a surgical strike and poisoning the well. The show is a surgical strike. The reality is poisoning the well over a decade so the enemy doesn't even know they are sick until they try to run.
That is a great way to put it. And the poison is often digital. We have seen reports of Iranian port systems being shut down, their gas station payment networks being crippled, and even their state television being hacked to show protest messages. Those are eight-two-hundred ops. They are designed to show the Iranian public that the regime cannot provide basic services or security.
Wait, the gas station hack was fascinating. That wasn't just about stopping cars; it was about the social engineering aspect, right?
When the screens at the gas stations were hacked, they didn't just go blank. They displayed the phone number of the Supreme Leader’s office with a message saying, If you want gas, call this number. That is a brilliant piece of psychological warfare. It turns a technical failure into a direct confrontation between the citizen and the state. That’s the kind of soft sabotage that a show like Tehran struggles to depict because it’s not as exciting as a shootout.
And that feeds back into the HUMINT recruitment. If the guy working at the gas station can't feed his family because the payment system is down, he is a lot more likely to listen when someone offers him a few hundred dollars for a simple favor.
It is a feedback loop. Cyber operations create the conditions for human recruitment, and human assets provide the ground truth and physical access needed for more advanced cyber operations. The airgapped problem Daniel highlighted is the perfect example. You use a human to get you the initial access, then the cyber guys take over and move laterally through the network, and then maybe you use another human to physically confirm the damage.
So, what are the practical takeaways for someone watching these shows or reading the news about these operations? First, I think it is about looking for the why behind the operational choices. If a show depicts something that seems unnecessarily risky, it probably is. Real intelligence is about risk mitigation. If there is a way to do it from a basement in Tel Aviv, they aren't sending someone to a basement in Tehran.
Second, realize that the cyber and physical worlds are no longer separate. Every physical piece of infrastructure—a radar, a centrifuge, a power grid—has a digital heartbeat. Infiltrating one often means infiltrating the other. The Twelve Day War showed us that you can win a war before the first shot is fired by simply making sure the enemy's equipment doesn't work when they flip the switch.
And third, media literacy. Daniel is skeptical because he knows the tradecraft. For the average viewer, it is important to remember that even based on true events means ninety percent speculation. The real stuff is hidden behind layers of classification and, more importantly, layers of deception. Mossad wants you to believe certain things about how they operate because it protects the way they actually operate.
The best legend is the one that everyone thinks is the truth. If the Iranians are busy looking for foreign agents who look like the girl from Tehran, they are going to miss the quiet guy in the procurement office who has been sending encrypted files for five years.
It is the hidden in plain sight paradox. We actually have an episode on that—Episode fourteen-fifty-nine—about Iranian missile cities. They are these massive underground facilities that the regime shows off on TV, but they are so huge and have such specific signatures that they are actually quite easy to track from space. The real secrets aren't the big underground bunkers; they are the small, nondescript offices in the middle of a busy street.
That is where the real work happens. It is not in the missile city; it is in the software update for the missile's guidance system that was vetted by a compromised engineer. It’s why the IRGC is so terrified of its own shadow right now. They’ve had several high-profile purges recently where they’ve arrested dozens of their own officers. That paranoia is a direct result of the gap between what they see in the media—the super-spy image—and the reality of their own internal vulnerabilities.
So, what is the future here? As AI becomes more integrated into these operations—like the automated gun used in the Fakhrizadeh hit—does the human element become less important?
I think it is the opposite. As the technical side becomes more automated and remote, the human on the ground becomes the only way to verify what is actually happening. You can't trust a satellite photo to tell you what is happening inside a reinforced bunker. You need a person to go in there, or at least someone who knows the person who goes in there. AI and cyber are tools, but the intent and the ground truth are still human.
It is a weird world where the more high-tech we get, the more we rely on the oldest profession in the world—well, the second oldest.
Spying. Yeah. And it is not going away. If anything, the Shadow War is just going to get more complex. We are seeing a move toward autonomous sabotage—devices that can sit dormant for years and then make independent decisions based on local sensor data.
That sounds like a plot for Season four of Tehran.
It probably will be. But the real version will be a lot more boring and a lot more effective. Think less ticking clock and more slow-motion train wreck that the victim doesn't even realize is happening until the impact occurs.
Let's wrap it up there. We've looked at the gap between the cinematic Mossad and the operational reality. We have seen how airgapped systems are bridged not by daring break-ins, but by patient supply chain attacks and human fallibility. And we have seen how the Twelve Day War proved that internal sabotage is often the most effective weapon in a high-tech conflict.
Big thanks to our producer, Hilbert Flumingtop, for keeping the wheels on this thing. And thanks to Modal for providing the GPU credits that keep our scripts flowing.
This has been My Weird Prompts. If you are enjoying these deep dives, do us a favor and leave a quick review on Apple Podcasts or wherever you are listening. It actually helps more than you think.
We are also on Telegram—just search for My Weird Prompts to get notified when new episodes drop.
See you in the next one.
Take care.