Attack Changes the Geometry of Warfare
Theo Nawaf Obaid - Al Jazeera English
Israeli strikes on Doha and Tehran reveal a new capability that could make war more unpredictable and dangerous. The attacks used air-launched ballistic missiles fired from beyond the target's airspace, exploiting a trajectory that defeats current air defenses.
On September 9, 2025, Israel attacked Qatar. There was no battlefield, no front line. Instead, the target was a sovereign state hosting negotiations in which Israel itself was participating. When the missile hit Doha, a dangerous precedent was set.
The same attack structure reappeared on February 28, when the U.S.-Israel war on Iran began, targeting the compound of Supreme Leader Ayatollah Ali Khamenei in Tehran.
In both cases, Israeli aircraft remained outside the target country's airspace and launched a missile that completed the attack independently. That single operational choice eliminated the defining constraint of air warfare: penetration.
The Doha attack was a strategic mistake because it exposed this capability unnecessarily. The target—a Hamas leadership meeting to review a ceasefire proposal from the Trump administration—was political, not strategic. Israel later apologized for the strike, but the reality is that their new capability was revealed.
Israel did not use a conventional bombing model. Instead, they executed an integrated strike sequence based on a mature C7ISR (Command, Control, Communications, Computers, Warfare, Cyber, Awareness, Intelligence, Surveillance, and Reconnaissance) architecture—a system that fuses cyber and cognitive warfare with intelligence and command networks to accelerate decision-making and maintain dominance in modern battle space. This structure enables precise timing, continuous situational awareness, and superior operational accuracy. The aircraft itself is not the decisive factor. The system is.
An Israeli F-15I flew over international waters in the Red Sea and aligned close to the latitude of Yanbu port, Saudi Arabia, but remained outside Saudi airspace. This was deliberate. Any direct route across the Arabian Peninsula required overflying Saudi territory and carried a high probability of interception by Saudi Arabia's sophisticated multi-layered air defense system.
From that corridor, the F-15I launched an air-launched ballistic missile (ALBM) from Israel's Sparrow family, most likely the Silver Sparrow variant. This is an aircraft-carried missile, but after launch it behaves like a heavier medium-range ballistic missile (MRBM). After separating from the aircraft, a booster rocket ignites, pushing the missile into a sub-orbital trajectory, passing through dense atmospheric layers into near-space.
In the mid-course phase, the missile follows a ballistic arc entirely outside the coverage of conventional air defenses. The attack ends in the terminal phase. The missile re-enters the atmosphere steeply at hypersonic speed, diving almost vertically toward the target.
Atmospheric friction generates extreme thermal loads and forms a plasma sheath around the missile, degrading radar stability and complicating fire-control solutions. Velocity remains hypersonic, while the interaction geometry collapses. The threat is not crossing defended airspace. It is piercing it.
At this speed, the missile covers several kilometers per second. The time between establishing a reliable track and impact is measured in seconds. In that window, an integrated air defense system must complete detection, classification, trajectory calculation, interceptor launch, and terminal interception.
Even advanced systems like THAAD, Patriot, and emerging high-altitude interceptors cannot overcome this constraint. They can extend detection range and improve intercept probability. But they cannot create the time or interaction depth that orbital physics has eliminated.
This is the limit. It is not merely technological; it is defined by velocity, friction, and geometry.
The Tehran attack followed the same logic, likely using the Blue Sparrow, a variant from the same missile family, and an alternative launch corridor. The F-15I is assessed to have operated over eastern Syrian or western Iraqi airspace, creating a northward vector into Iran. This reduced distance and simplified the trajectory, but the basic structure remained unchanged.
Different geography, same system.
The technology behind these attacks brings a second layer of consequences. The launch system was integrated onto the F-15I—an older variant—through deep structural and software modifications. That level of integration implies access to source code, mission system architecture, and on-board mission data libraries.
The Sparrow family is also noteworthy: originally developed as a ballistic target missile for missile defense testing, it has been adapted into a long-range strike weapon, marking a clear doctrinal shift from test architecture to operational use.
That matters. Source code governs the logic of the launch platform. On-board libraries govern how it processes sensor input, identifies targets, integrates weapons, and executes attack logic. Together, they define operational sovereignty.
This raises a direct question.
Saudi Arabia is the world's largest buyer of American weapons and operates the largest F-15 fleet outside the United States. Yet the F-15SA—though more advanced—does not operate with this level of sovereign integration. Qatar's F-15QA is similarly restricted.
Why is this level of access permitted in one case and not others?
This is not a minor technical issue. It goes to the core of arms transfers, source code control, on-board library autonomy, and the real independence of advanced air forces.
But the deeper consequences lie beyond procurement.
By demonstrating this capability—first against Qatar, then against Iran—Israel has shown that the model works. Once proven, it can be replicated.
The components already exist in many countries: aircraft capable of carrying heavy payloads, ballistic missile technology, guidance systems, and integration roadmaps. The United States, Russia, China, France, Pakistan, and a few others have the industrial base to develop equivalent architectures.
This pushes the concept to the practical edge of space weaponization—not orbit, but sub-orbit. The system operates beyond the traditional atmospheric interaction zone before re-entering. Once normalized, that boundary erodes.
And once eroded, there is no going back.
The result is a structural shift in vulnerability. The same physics applies to all parties. No defense system is immune to it.
Israel has extended its reach. They have also demonstrated the conditions under which others can do the same. It is now only a matter of time before others can copy this system.
The implications for world leaders are profound. As these capabilities spread, war will become more unpredictable, more dangerous, and more prone to miscalculation, compressing decision timelines and forcing leaders to make momentous choices in minutes rather than days. They may become tools not only of deterrence and warfare, but of coercion, regional competition, and neutralization of strategic rivals.
Geography, distance, and strategic depth are losing their traditional value as warning and protective buffers. A sense of security is fading.