Officials say false message spread rapidly across military and social media channels during Operation Epic Fury; CENTCOM confirms no directive was issued to service members.
WASHINGTON | U.S. defense officials moved swiftly to debunk a viral message falsely attributed to U.S. Cyber Command that claimed American service members were ordered to disable location services on their personal devices and uninstall several commercial applications amid ongoing combat operations against Iran.
Multiple officials told DefenseScoop that the message circulating across military networks and social media platforms did not originate from Cyber Command. The fabricated alert alleged that Uber, Snapchat, and Talabat — a food delivery service operating in the Middle East — had been compromised, posing operational security risks.
“Due to operational security concerns, U.S. Cyber Command does not comment nor discuss cyber intelligence, plans, operations, capabilities, or effects,” a Pentagon official said, adding unequivocally that the command “did not issue messages to U.S. service members to turn off location services on their electronic devices and did not issue messages that applications had been compromised.”
A spokesperson for U.S. Central Command (CENTCOM), which is overseeing the newly launched Iran campaign known as Operation Epic Fury, called the circulating guidance “false.”
Disinformation Surge Amid Active Combat Operations
The debunked alert surfaced hours after joint U.S.-Israel strikes targeting Iranian military infrastructure began. CENTCOM confirmed Sunday that three U.S. service members were killed during the initial phase of the operation.
The viral message reportedly spread across unofficial military channels and was amplified by a social media account with more than 40,000 followers, generating hundreds of thousands of views before officials intervened. Defense analysts say the episode underscores how rapidly unverified information can proliferate during kinetic operations — particularly when adversarial states have demonstrated advanced psychological and cyber influence capabilities.
Iran’s cyber apparatus has long been viewed as capable of blending traditional cyber intrusion tactics with coordinated disinformation campaigns. Last year, the Cybersecurity and Infrastructure Security Agency (CISA) warned that Iranian-affiliated cyber actors frequently exploit “targets of opportunity,” particularly unpatched or outdated software vulnerabilities.
A recent assessment by the Middle East Institute noted that Tehran-linked actors intensified psychological operations during the so-called 12-day conflict between Iran and Israel, leveraging artificial intelligence tools to generate and disseminate disinformation designed to pressure adversaries and shape global narratives.
Companies Deny Compromise Claims
Corporate entities named in the viral message also rejected the claims.
A spokesperson for Uber said the company had “no indication that this rumor is true,” describing the allegations as an “unsubstantiated rumor.”
Similarly, a spokesperson for Snapchat told reporters the company had no evidence supporting the claim that its platform had been compromised.
Talabat did not immediately respond to inquiries.
Operational Security vs. Digital Panic
Military cyber professionals caution that while service members are routinely reminded to exercise operational security (OPSEC) — including prudent use of geolocation-enabled applications — formal directives typically move through established command channels, not anonymous viral posts.
The incident highlights a growing vulnerability in modern conflict: the weaponization of misinformation targeting military personnel directly. As U.S. forces operate in contested digital environments, false advisories can undermine morale, sow confusion, and strain command-and-control structures.
With Operation Epic Fury ongoing, defense officials are emphasizing reliance on official guidance and verified communication channels while closely monitoring adversarial information campaigns.
The Pentagon has not publicly identified the origin of the fabricated message, and Cyber Command referred further inquiries to the Department of Defense.
#CyberCommand, #IranOperation, #CENTCOM, #OPSEC, #CyberWarfare, #DefenseNews⚔️💻,
======
-- By Leticia Jacobs
© Copyright 2026 JWT Communications. All rights reserved. This article cannot be republished, rebroadcast, rewritten, or distributed in any form without written permission.


No comments:
Post a Comment