Israel’s veiled threat to Moscow came just after Russian media warned traffic cameras in Moscow were vulnerable to the same exploits that Israel reportedly used to monitor Ayatollah Khamenei’s residence before assassinating him.
Israeli military spokeswoman Anna Ukolova has drawn outrage in Moscow after threatening that Russian authorities who “wish Israel ill” could be subject to “elimination,” while suggesting Israel could hack into Russian closed-circuit television cameras to identify and track targets.
Asked by a journalist with Russian radio broadcaster RBC whether Israel had access to Russian traffic cameras, Ukolova declined to answer directly but warned that “Khamenei’s elimination shows our capabilities are serious” and that “no one who wishes us harm will be left aside.”

此前,俄罗斯媒体曾警告称,莫斯科交通摄像头在漏洞面前同样脆弱,据称以色列曾利用此类手段在刺杀哈梅内伊前对其官邸进行严密监控。
紧随其后,以色列军方发言人安娜·乌科洛娃(Anna Ukolova)威胁称:凡是“对以色列心怀不轨”的俄方官员都可能面临“清除”;此言一出,在莫斯科引发轩然大波。她还进一步暗示,以色列可以入侵俄罗斯的闭路电视监控系统,以精准识别并追踪目标。

当被俄罗斯 RBC 广播电台记者问及以色列是否已获取俄交通摄像头的访问权限时,乌科洛娃拒绝正面回应,但她警告称:“对哈梅内伊的清除已彰显了我们的实力不容小觑”,“任何企图伤害我们的人,都绝不会被姑息。”

She added, ominously, “I hope Moscow does not wish Israel ill right now – I’d like to believe that.”
In response to a post by Russian philosopher Alexander Dugin, who wrote that the IDF spokeswoman threatened that “Russian authorities [will] be killed if they take [an] anti-Israel position,” Ukolova claimed Dugin was spreading “fake news.” But she declined to clarify how her remarks had been incorrectly interpreted.

她补充道,言语间透着威胁:“我真诚地希望莫斯科此刻并没有对以色列心怀不轨——我想这么认为。”
俄罗斯哲学家亚历山大·杜金(Alexander Dugin)曾发文指出,这位国防军发言人是在威胁“如果俄罗斯当局采取反以色列立场,其官员将被杀害”。对此,乌科洛娃声称杜金在传播“假消息”。然而,她并未解释其言论究竟被如何误读。

##bas64img##

图:以色列国防军女发言人安娜·乌科洛娃在俄罗斯RBC电台上威胁俄罗斯当局,如果他们在战争中采取反以色列的立场,他们将被杀死。她说,以色列控制着俄罗斯所有的网络摄像头,可以轻松地攻击包括普京在内的任何人。

Ukolova’s statements came just days after it was revealed that a large number of Russian CCTVs were potentially using BriefCam – an Israeli video analysis software that closely matches the descxtion of a program the Netanyahu regime reportedly deployed to track Iranian movements outside the home of Iran’s Supreme Leader before they assassinated him during their February 28 sneak attack.
On March 12, Russian outlet Mash revealed that the Israeli software BriefCam “has been used in Russia by private providers since the 2010s.” Founded at Israel’s Hebrew University in 2007, BriefCam uses AI to let users “review hours of video in minutes” and “make [their] video searchable, actionable and quantifiable.” In 2024, BriefCam was absorbed by a Dutch subsidiary of the Canon Group named Milestone Systems, which publicly pledges to “amplify what organizations of any size can see, do and achieve with video.”

乌科洛娃此番表态前不久,有消息披露:俄罗斯境内大量闭路电视摄像头可能正运行 BriefCam 软件——这是一款以色列研发的视频分析软件。据称,内塔尼亚胡政权曾利用该软件追踪伊朗最高领袖宅邸外的动态,随后在 2 月 28 日的突袭行动中将其暗杀。
3 月 12 日,俄媒 Mash 爆料称,以色列软件 BriefCam 自 2010 年代起便在俄罗斯被私人服务商广泛使用。BriefCam 始创于 2007 年的以色列希伯来大学,其核心 AI 技术可让用户“在数分钟内审阅长达数小时的视频”,并使视频内容具备“可搜索、可量化、可执行”的特性。2024 年,BriefCam 被佳能集团旗下的荷兰子公司 Milestone Systems 收购。该子公司曾公开承诺:要“助力各种规模的机构提升在视频监控领域的洞察力、行动力与成就”。

“Our patented VIDEO SYNOPSIS® technology condenses hours of surveillance into a short summary by overlaying multiple events—each tagged with its original timestamp—onto a single frx, letting you filter them by obxt type and attributes,” the company’s BriefCam page crows. An analysis by Al Jazeera revealed those attributes include “gender, age group, clothing, movement patterns and time spent in a given location.”
Originally deployed by Israel’s Ministry of Housing and Construction to safeguard illegal settlements in occupied East Jerusalem, BriefCam has been used by governments all over the world, including those in the United Kingdom, New Zealand, Pakistan, Israel, Mexico, United Arab Emirates, Canada, Indonesia, Singapore, Thailand, Brazil, Germany, South Africa, Netherlands, Australia, Japan, India, Spain, Taiwan. It’s also been deployed in the US, with police in Hartford, Connecticut adopting the software in 2022. In 2025, a French court found the government’s use of BriefCam was illegal, citing multiple violations of French and European privacy laws.
As of publication, BriefCam appears to be incorporated into dozens of so-called “video monitoring systems,” including Milestone’s own VMS XProtect surveillance system.

该公司在 BriefCam 的产品页面上自诩其“独家专利视频摘要技术”:通过将多段不同时点发生的事件画面重叠在同一帧,并将数小时的监控浓缩成简短摘要,用户能通过“对象类型”和“属性”进行精准过滤。据半岛电视台分析,这些属性包括“性别、年龄组、着装、运动轨迹以及在特定地点的逗留时间”。

BriefCam 最初由以色列住房和建设部部署,用于保护其在被占领的东耶路撒冷设立的非法定居点。随后,该软件已扩散至全球多个国家和地区的政府,包括英国、新西兰、巴基斯坦、以色列、墨西哥、阿联酋、加拿大、印度尼西亚、新加坡、泰国、巴西、德国、南非、荷兰、澳大利亚、日本、印度、西班牙和台湾(地区)。美国亦有部署,如康涅狄格州哈特福德警方就在 2022 年采用了该软件。然而在 2025 年,法国法院判定政府使用 BriefCam 系非法行为,理由是该软件多处违反了法国及欧洲的隐私法。

截至发稿时,BriefCam 似乎已被整合进数十套所谓的“视频监控系统”中,其中包括 Milestone 旗下的 VMS XProtect 监控系统。



图:一段宣传视频展示了 BriefCam 存在于在大量监控系统中。

A promotional video shows the numerous surveillance systems that BriefCam operates within.
According to the Russian outlet Mash, a number of prominent Moscow businesses, institutions, and buildings use VMS XProtect surveillance system, including the Institute of Theoretical and Experimental Biophysics of the Russian Academy of Sciences, a 72-story skyscraper named “Eurasia,” and a huge exhibit space known as the Zotov Center. Though Milestone officially ended operations in Russia in 2022 amid the war in Ukraine, Mash reports that some software distributors in Russia “still offer to install the hacked software and hide this in the documents.”
Wyatt Reed is an editor at The Grayzone. As an international correspondent, he’s covered stories in over a dozen countries. Follow him on Twitter/X at @wyattreed13.

据俄罗斯媒体 Mash 报道,莫斯科境内多家知名企业、机构及建筑物都在使用 VMS XProtect 监控系统,其中包括俄罗斯科学院理论与实验生物物理研究所(ITEB RAS)、高达 72 层的“欧亚大陆”摩天大楼(Eurasia Tower),以及名为“佐托夫中心”(Zotov Center)的大型展览空间。尽管 Milestone 因乌克兰战争在 2022 年正式停止了在俄业务,但据 Mash 披露,俄罗斯境内仍有一些软件分销商“在文档中掩饰并继续提供破解版软件的安装服务”。

(完)