On 28 February 2026, Israel and the United States launched coordinated strikes against Iran — Operation Roaring Lion and Operation Epic Fury respectively — targeting nuclear facilities, ballistic missile infrastructure, IRGC leadership, and the compound of Supreme Leader Ali Khamenei, who was killed in the opening strikes. Iran’s response, Operation True Promise IV, included ballistic missile and drone attacks across the Persian Gulf, the closure of the Strait of Hormuz, and the reactivation of proxy networks from Lebanon to Yemen.
This analysis applies the intelligence discipline’s frameworks — classical, structural, and cross-disciplinary — to the conflict. The cumulative finding is not a simple verdict of success or failure but a structural diagnosis: the intelligence system performed its designed function with precision and thereby produced the conditions for strategic surprise. The system that made Iran legible as a target set could not make Iran legible as a political actor, and the campaign’s theory of victory depended on exactly the knowledge the system was not designed to produce.
I. The intelligence system worked
The first group of analyses establishes that the intelligence apparatus performed its operational function successfully. The prewar intelligence landscape shows the intelligence community produced accurate assessments — the DNI testified in March 2025 that Iran was not building a nuclear weapon — but that these assessments were structurally irrelevant to a policy decision already in motion. This is not the classical intelligence failure (wrong assessment leads to bad policy) but the fourth configuration: correct assessment, structural irrelevance.
The decapitation operation demonstrates the system’s operational capability at its apex — multi-discipline collection (HUMINT, SIGINT, IMINT, cyber) fused into a targeting product that located and killed the most protected individual in the Iranian state. The Iranian counterintelligence failure is the mirror image: the MOIS-IRGC rivalry, the Supreme Leader as coordination node, and the structural impossibility of counterintelligence against a technologically superior adversary explain why the Iranian system could not defend against penetration it could not detect. The intelligence system worked. The targets were struck.
II. The theory of victory did not
The second group of analyses shows that operational success did not produce strategic success because the campaign’s theory of victory rested on assumptions the intelligence system was not asked — or not designed — to evaluate.
The key assumptions check surfaces five unstated premises: that decapitation produces paralysis, that retaliatory capability was sufficiently degraded, that allies would absorb costs, that diplomacy had been exhausted, and that proxy networks depend on Iranian direction. Each assumption is contested by the evidence the intelligence system itself could have produced — but the assessment-policy relationship had already foreclosed the question.
Compellence theory reveals the deepest structural problem: the campaign operated on compellent logic (forcing Iran to change behavior) but violated compellence’s requirements. The strikes destroyed the adversary’s exit rather than offering one. They killed the decision-maker who could have ordered compliance. They inverted the coercive timeline so that Iran now imposes costs on the coalition rather than absorbing them. The campaign destroyed its own theory of victory’s prerequisite.
The diplomatic-intelligence paradox compounds the failure: negotiations in Oman proceeded simultaneously with strike planning, and the “breakthrough” offered on 27 February may itself have been an exercise in reflexive control — shaping U.S. decision-making so that every available option served Iran’s interests.
III. The adversary was illegible where it mattered
The third group of analyses explains why the intelligence system could not evaluate the assumptions on which the theory of victory depended. The answer is structural, not correctable.
The adversary as legibility problem applies James C. Scott’s framework: the intelligence system rendered Iran legible as a target set — coordinates, capabilities, patterns of life — while destroying the situated, relational, narrative knowledge that the adversary’s post-strike resilience depends on. The legibility that enabled the strikes created the blind spots where surprise originated.
Iranian strategic culture and the mirror-imaging problem identifies three elements of Iranian strategic culture — revolutionary identity, martyrdom as strategic resource, and strategic patience (sabr) — that the rational-actor model systematically misreads. The intelligence system could characterize these cultural elements; it could not incorporate them into its operational products because the products’ categories do not encode them.
The decapitation strike as necropolitical act reframes the assassination through Mbembe’s necropolitics — not as an operational event but as a sovereign act constituting Iran as a death zone. The structural asymmetry (one side can kill the other’s leader; the reverse is impossible) shapes the adversary’s counter-strategy and explains why military destruction can produce political resilience rather than collapse. Within the adversary’s framework, the same physical event — the death of Khamenei — is simultaneously a necropolitical success (target eliminated) and a necropolitical failure (martyr created).
IV. The post-strike environment exceeds the system’s design
The fourth group of analyses examines the post-strike conflict environment — the domain shift, the information dynamics, and the adversary’s adapted posture — that the intelligence system must now operate in but was not designed for.
Iran’s most consequential retaliation operates in an economic domain the military intelligence apparatus was not built to address. The Hormuz closure, the LNG facility strikes, the compound shipping disruption — these require economic intelligence (energy markets, supply chain analysis, allied economic tolerance) that exists in the intelligence community but is not institutionally integrated with the military intelligence system tracking the conflict.
The asymmetric escalation analysis maps how the post-strike conflict disperses across domains, geographies, and actors in ways that overwhelm the collection architecture designed for the bounded pre-strike target set. The post-strike narrative shows how the rapid disclosure of operational details functions as information operation — serving domestic, allied, and adversary audiences simultaneously while imposing OPSEC costs the intelligence community accepted but did not fully price.
Proxy networks as complex adaptive systems challenges the intelligence system’s hierarchical model of Iranian proxy control. In the post-strike environment — with the central node destroyed and communications disrupted — the proxy network’s behavior emerges from agent-level interactions rather than central direction. The intelligence system monitoring only the Tehran-to-proxy channel will miss the behaviors that emerge from the network’s internal dynamics.
V. Alternative analytical approaches
The final group of analyses applies frameworks designed to operate where the standard intelligence apparatus cannot — to bound the adversary’s action space even when intent is opaque, to map the gap between what the analyst can see and what the adversary can do, and to generate structured alternatives to the assessments the system produces by default.
Constraint-based reasoning maps what Iran can and cannot do regardless of intent — capability envelopes, hard boundaries, structural invariants — and finds the conflict converges structurally toward attrition, with duration determined by the intersection of constraint curves rather than strategic decisions.
The legibility-constraint integration formalizes the combined method: legibility analysis identifies where the analyst’s categories end; constraint analysis maps the adversary’s action space beyond that boundary; the gap between them is the structural origin of surprise.
An analysis of competing hypotheses applied to Iran’s post-strike strategy evaluates four competing readings — attritional exhaustion, escalation to negotiate, regime survival, and revolutionary mobilization — against the available evidence. A scenario analysis projects these hypotheses forward into a cone of plausible futures, identifying the diagnostic indicators that would signal which trajectory is materializing and the collection requirements each demands.
Reflexive control and the Oman channel applies the framework to the specific case of the diplomatic track — asking whether Iran’s participation in the Oman negotiations was itself an exercise in shaping U.S. decision-making.
VI. The structural diagnosis
The cumulative argument across these analyses is that the 2026 Iran war reveals a structural property of the intelligence system, not a correctable error. The system is designed to make the adversary legible — visible, characterizable, targetable — through categories that enable military action. This legibility is what makes the system powerful. It is also what makes the system blind to the adversary’s capacity for responses that operate outside those categories: narrative resilience, economic warfare, emergent proxy coordination, attritional patience calibrated against American political cycles.
The intelligence system did not fail in the 2026 case. It succeeded — at the task it was designed for. The strategic surprise originated not in what the system missed but in what the system’s categories cannot encode: the adversary’s self-understanding, the political meaning of destruction within the adversary’s framework, the campaign’s self-defeating compellent logic, and the emergent dynamics of a post-strike environment that no central planner on either side designed or controls.
Whether this structural diagnosis produces institutional adaptation — extending the intelligence system’s categories to include economic, cultural, and emergent-systems analysis alongside military targeting — is the question the ongoing conflict will answer.