Data Centers Are Now Military Targets
Iran struck AWS facilities in the Gulf. Israel hit Tehran banking servers. A civilian messaging app became a psyops weapon. Data infrastructure is the new frontline of warfare — and the perception gap between who calls it terrorism and who calls it strategy is enormous.

Iran has struck three cloud data centers in the Gulf. Israel hit banking servers in Tehran. A civilian messaging app got hijacked to broadcast surrender messages during live combat. Data infrastructure — the servers that run your bank, your hospital, your military payroll — is now a frontline of war. And the gap between who calls these strikes terrorism and who calls them strategy tells you more about the conflict than the strikes themselves.
In early March, Iran hit two Amazon Web Services data centers in the UAE and one in Bahrain. Damage was moderate. Disruption wasn't. Banking went down. Consumer services broke. Then on March 11, a strike destroyed a server facility linked to Bank Sepah in Tehran — the bank that processes salary payments for Iran's Revolutionary Guard and regular army. Military paychecks stopped. Online banking went dark.
That same day, an IRGC-affiliated news outlet published a hit list. Twenty-nine tech targets across Bahrain, Israel, Qatar, and the UAE. Five AWS facilities. Five Microsoft. Six IBM. Three Palantir. Four Google. Three Nvidia. Three Oracle. Iran called them "legitimate targets associated with Israel."
They're American companies.
The new kill list isn't generals. It's servers.
CSIS, the Washington-based think tank, published its analysis this week with a blunt title: "Data Is Now the Front Line of Warfare." The argument is straightforward. Modern militaries don't just use data — they can't function without it. AI-enabled targeting, logistics, intelligence analysis, drone coordination — all of it runs through cloud infrastructure.
The pattern started in Ukraine. Microsoft engineers worked around the clock to defend against Russian cyberattacks in 2022. Cisco helped Kyiv secure critical infrastructure. Palantir's software runs inside Ukraine's Ministry of Defence. Clearview AI helps identify Russian operatives at checkpoints. SpaceX gave them Starlink when conventional internet got destroyed.
Tech companies aren't bystanders anymore. They're combatants — at least in the eyes of whoever's on the receiving end.
That's the perception gap. CSIS frames Iran's target list as a wake-up call for American defence policy. The message: protect your tech companies the way you protect military bases. Iran frames the same list differently. If American cloud servers help Israel run its war, those servers are military infrastructure. Al-Fanar Media, a Middle Eastern outlet, puts it in starker terms: "The integrity of information is now a matter of global security."
Same servers. Same explosions. Completely different stories about what they mean.
When your messaging app becomes a weapon
The physical attacks grabbed headlines. The quieter operation may matter more.
In March 2026, attackers breached BadeSaba, a widely-used Iranian civilian app. During a live military crisis — bombs falling, sirens sounding — the app started pushing surrender-style messages and anti-regime content to millions of users.
BadeSaba wasn't a random target. It was the app people actually used during emergencies. The place they went for alerts, updates, trusted information. Cyberwarzone's analysis describes the logic: "If attackers can influence the channels people use to receive alerts, guidance, updates, or trusted instructions, they can shape perception and reaction without needing to destroy infrastructure directly."
You don't need to knock out a power grid when you can knock out trust.
This fits an older pattern, now running at industrial scale. The Internet Freedom Foundation analysed over 30 reports on information warfare and censorship spanning from 2021 to March 2026. Their finding: "The information environment has itself become a theatre of war, and social media platforms are its willing or negligent stage managers."
The researchers flagged something they call "forensic cosplay." Fabricated heatmaps and technical visualisations that look like rigorous analysis but arrive at predetermined conclusions. In one case, a viral thread claiming a New York Times photograph from Tehran was AI-generated reached 600,000 views. The analysis was performed on a screenshot of an Instagram post. Not the original image. The debunking came later. It didn't travel as far.
The $67 billion arms race you don't see
The cyber warfare market hit $39 billion in 2025. It's projected to reach $67 billion by 2035. That money funds offensive and defensive AI capabilities, zero-day exploits, digital surveillance tools, and the teams that deploy them.
This isn't theoretical. The Iran-Israel war has produced the most visible cyber-physical conflict in history. Data centers are getting bombed. Messaging apps are getting hijacked. Military payrolls are being disrupted through server strikes. And the tools to detect manipulation are themselves being weaponised as disinformation.
Here's the part that doesn't make Western headlines. The same week Iran published its 29-target tech list, China's Cyberspace Administration ordered social media platforms to censor content deemed as spreading "fear of marriage" or "anxiety about childbirth." Canada introduced surveillance legislation that would let police access digital data on suspicion alone, lowering the legal threshold from "reasonable grounds to believe" to "reasonable grounds to suspect." The US House debated extending Section 702 surveillance powers while discussing whether to add privacy protections.
Three countries. Three different approaches to controlling digital space. All happening in the same news cycle. The first gets covered as warfare. The second as domestic policy. The third as a legislative debate. The mechanism is identical: states asserting control over the infrastructure that carries information.
What the coverage reveals
CNN and Fox News covered Iran's tech target list as a threat to American companies. The framing: these are US corporate assets, and the government needs to protect them. CSIS recommends deterrence policy — treating data centres like military installations.
Iranian state media covered the same list as proportional response. If American tech runs Israeli operations, American tech is a legitimate military target. Al Jazeera's reporting sits between these poles, noting the civilian consequences while acknowledging the military logic.
The Internet Freedom Foundation, writing from India, skipped the geopolitics entirely. Their frame: platforms are architecturally incapable of distinguishing verified reports from deepfakes "calibrated to trigger outrage." Engagement algorithms don't check whether content is real. They check whether it keeps you scrolling. In wartime, that design choice becomes a force multiplier for whoever's producing the most emotionally potent content.
No major Latin American or African outlet covered the data center strikes as a systemic story. Coverage stayed regional — Middle East war news, not global infrastructure news. That absence matters. If your banking runs on AWS and nobody's telling you those servers are on a target list, you're making decisions without information.
What this looks like from here
Warfare used to destroy things you could see. Bridges, buildings, airfields. Now it destroys things you depend on without thinking about them. The server that processes your hospital records. The app that sends emergency alerts. The cloud that stores your country's financial system.
The perception gap isn't just about who's right or wrong. It's about what you're even allowed to know is happening. A data center strike in Bahrain affects banking in Mumbai, logistics in Singapore, services in Nairobi. But if it's framed as a Middle East war story, most of the world never connects the dots.
The information environment didn't become a battlefield this week. It's been one for years. What changed is that someone started bombing the servers.
Sources & Verification
Based on 5 sources from 5 regions
- CSISNorth America
- CyberwarzoneEurope
- Internet Freedom FoundationSouth Asia
- Al-Fanar MediaMiddle East
- GlobeNewsWire / SNS InsiderInternational
Keep Reading
AI Deepfakes Flood the Iran War. What's Real?
Over 110 AI deepfakes with pro-Iran messaging identified in two weeks. How artificial intelligence is weaponising information in the 2026 Iran conflict.
Censorship Deals, Deepfake Hires, Mass Surveillance
A landmark US censorship settlement, deepfake job candidates, Canada expanding police surveillance powers, and Nigeria buying mass AI monitoring. This is how information gets weaponised right now.
Same War, Same Day, Three Victory Claims. All Believed.
On Day 21 of the Iran war, Trump, Netanyahu, and Mojtaba Khamenei each claimed victory simultaneously. Different audiences accepted different claims. That's the story.
Explore Perspectives
Get this delivered free every morning
The daily briefing with perspectives from 7 regions — straight to your inbox.
Free · Daily · Unsubscribe anytime
🔒 We never share your email