When U.S. Central Command launched Operation Epic Fury at 1:15 a.m. ET on February 28, 2026, striking IRGC command nodes, air defenses, missile sites, and airfields across Iran, the targets on the receiving end were defended by a military apparatus that years of weapons seizures had already exposed as patchwork and outdated. The operation, framed as a response to hundreds of Iranian missile and drone attacks, did not encounter a peer adversary’s integrated defense network. Instead, it hit a force whose supply chain depends heavily on recycled, mixed-origin hardware, much of it the same gear Tehran has been caught shipping to proxies in Yemen and Somalia. That gap between Iran’s ambitions and its actual arsenal helps explain why U.S. planners treated the strike as a calculated, low-risk operation.
Operation Epic Fury and the Targets It Hit
The strike package that opened Operation Epic Fury was designed around a specific reading of Iranian military vulnerability. According to CENTCOM, initial targets included IRGC command-and-control facilities, Iranian air defenses, missile and drone launch sites, and airfields. That target list reads like a checklist of the very systems Iran has struggled to modernize. While Tehran fields some domestically produced ballistic missiles and drones, its broader air-defense architecture and conventional ground forces rely on aging equipment, a weakness U.S. intelligence has tracked through repeated maritime interdictions over the past several years.
CENTCOM stated the operation was launched to defend against hundreds of Iranian missile and drone attacks on U.S. assets. The framing matters: by describing the threat in volume rather than sophistication, U.S. officials signaled that Iran’s strategy has centered on mass rather than precision. Saturation attacks with cheap drones and older missiles can still cause damage, but they are far easier for modern air defenses to counter than advanced, low-observable systems. The result is a military dynamic where Iran compensates for quality gaps by flooding the battlespace with expendable hardware, a tactic that works against lightly defended targets but collapses against a full U.S. strike package.
What Seized Shipments Reveal About Iran’s Arsenal
The clearest window into the quality of Iran’s military supply chain comes not from classified intelligence but from what has been physically pulled off cargo vessels in the Arabian Sea and Gulf of Aden. The U.S. Department of Justice filed a forfeiture action against over 9,000 rifles and more than 700,000 rounds of ammunition that were en route from Iran to Yemen, allegedly linked to the IRGC. The seized cache included rifles, machine guns, rocket launchers, and anti-tank guided missiles, but the DOJ filing revealed something more telling than the quantities: the weapons were a mix of Iranian, Chinese, and Russian-origin conventional arms. In other words, according to the forfeiture complaint, Iran was not shipping a clean, uniform production line; it was forwarding a grab bag of hardware sourced from multiple countries and eras.
A separate and far larger interdiction, carried out by Yemeni partners with U.S. support, netted over 750 tons of weapons bound for the Houthis. CENTCOM said that shipment included cruise missiles, anti-ship missiles, anti-aircraft missiles, warheads and seekers, drone engines, air-defense equipment, radar systems, and communications equipment, all packed aboard a single vessel. The scale is significant, but so is the composition. A military power with a self-sufficient defense industry does not need to ship radar components and missile seekers to its proxies from consolidated stockpiles; it can simply manufacture new units as needed. The 750-ton seizure instead suggests Iran is redistributing from its own reserves, thinning the very inventory that would need to defend Iranian territory against a strike like Epic Fury.
Tracing the Hand-Me-Down Pipeline
Independent verification of this pattern comes from Conflict Armament Research, which published a technical dispatch on maritime interdictions of weapon supplies to Somalia and Yemen. Using field-based documentation that includes markings, serial numbers, lot numbers, and cross-referencing patterns across multiple seizures, the organization traced weapons in these shipments back to Iranian supply networks. Critically, the analysis confirmed the presence of non-Iranian-origin systems that had been routed through Iran before being sent onward. In this reconstruction, Tehran appears less as a primary manufacturer and more as a logistical hub, collecting older Chinese and Russian equipment and passing it along to allied militias, a conclusion drawn from the group’s detailed interdiction study.
That distinction carries real military consequences. When a country arms its proxies with recycled foreign hardware, it signals limited domestic production capacity for advanced systems. It also means the weapons arriving in Yemen or Somalia are often a generation or more behind current technology, making them easier to detect, intercept, and defeat. For U.S. planners preparing a strike on Iranian soil, the same supply-chain weakness applies in reverse: the air-defense radars, missile guidance systems, and command infrastructure inside Iran draw from the same aging pool. The serial-number evidence from interdicted shipments effectively gave Western analysts a parts catalog for Iran’s military, years before Epic Fury was ordered, highlighting which systems were likely to be encountered and how resilient they might actually be under sustained attack.
Why the Arsenal Gap Shaped the Strike Calculus
Most analysis of U.S. strikes against state adversaries focuses on political risk and escalation dynamics. But the operational reality of Epic Fury was shaped just as much by a technical judgment: Iran’s defenses could be overwhelmed at acceptable cost. The target categories CENTCOM listed (IRGC command-and-control, air defenses, missile and drone launch sites, and airfields) are precisely the systems that require modern, integrated technology to survive a first strike from a peer or near-peer force. An adversary with a dense, networked air-defense grid can force the United States to commit stealth aircraft in large numbers, suppress enemy air defenses over multiple nights, and accept the risk of downed aircraft. By contrast, a force built around older radars, legacy surface-to-air missiles, and ad hoc command links is far more vulnerable to a concentrated opening salvo designed to blind and isolate key nodes.
The hand-me-down arsenal that shows up in interdicted shipments underscores why U.S. planners could treat Epic Fury as a finite, time-bounded operation rather than the opening phase of a prolonged air campaign. If Iran is exporting mixed-origin rifles, anti-tank systems, radar components, and missile seekers to partners abroad, it is by definition drawing down a finite stock of legacy hardware that also underpins its homeland defenses. That dynamic reduces the redundancy and depth of Iran’s own protective umbrella. From Washington’s perspective, this meant that a carefully sequenced strike could achieve outsized effects: degrading the very categories of systems Iran has been cannibalizing to sustain its regional network. The same logistical choices that allowed Tehran to arm proxies in Yemen and Somalia also left it with a brittle, overextended arsenal at home.
The Strategic Cost of a Patchwork Defense
Operation Epic Fury exposed the downside of Iran’s long-standing strategy of trading quality for reach. By spreading older, imported systems across multiple fronts (from the Arabian Peninsula to the Horn of Africa), Tehran built influence but neglected the modernization of its core forces. The seizures documented by U.S. agencies and independent researchers show a pattern of redistribution rather than renewal: weapons and components circulate outward faster than they are replaced by newer, more capable systems. That pattern leaves Iran increasingly reliant on massed volleys of drones and missiles to project power, even as the underlying infrastructure that supports such attacks remains vulnerable to a focused strike. The February operation, aimed squarely at that infrastructure, leveraged this imbalance.
For U.S. military planners, the lesson is that supply chains and interdiction records are not just tools for sanctions enforcement or legal action; they are also intelligence feeds that map an adversary’s true capacity to absorb and respond to attack. The rifles, missile parts, and radar systems intercepted on their way to Yemen and Somalia sketched a rough blueprint of Iran’s own limitations, from the age and origin of its hardware to the strain on its stockpiles. Epic Fury was calibrated against that blueprint. The strike did not need to defeat a cutting-edge integrated defense system; it needed to exploit the vulnerabilities of a patchwork network built on repurposed gear. In doing so, it highlighted how years of seemingly peripheral seizures at sea can shape the risk calculus behind a major operation on land and in the air.
More from Morning Overview
*This article was researched with the help of AI, with human editors creating the final content.