On February 28, 2026, the United States launched over 1,000 strikes against Iranian military infrastructure in what President Trump described as "Operation Epic Fury." Within 72 hours, Iran's supreme leader was dead, its nuclear facilities were cratered, and its air defense network โ€” recently upgraded with Chinese-made HQ-9B and Russian S-400 surface-to-air missile systems โ€” had failed to prevent any of it. For analysts watching the Indo-Pacific, the operational data emerging from Iranian airspace carries implications that extend far beyond the Middle East.

The systems that failed over Iran are not obscure. The HQ-9B is the export variant of the PLA's primary long-range air defense system. The S-400 is the crown jewel of Russian integrated air defense, the same system Moscow has marketed to Beijing, New Delhi, and Ankara as a counter to Western air power. Both were deployed to protect Iran's most critical assets. Both were neutralized โ€” not by overwhelming numbers alone, but by a combination of electronic warfare, cyber operations, stealth, and precision that left the systems effectively blind before the first warheads arrived.

The Anatomy of Suppression

The US air campaign against Iran followed a pattern that defense analysts have long theorized but rarely observed at scale: Suppression of Enemy Air Defenses (SEAD) executed not primarily through kinetic destruction of radar sites, but through electronic and cyber degradation of the integrated air defense network itself.

Reports from the opening hours confirm the deployment of EA-18G Growler electronic warfare aircraft โ€” the same platform that neutralized Venezuelan air defenses during the Caracas operation in January 2026. The Growler's AN/ALQ-99 and Next Generation Jammer (NGJ) pods can saturate enemy radar frequencies with noise, inject false targets into tracking systems, and disrupt the data links connecting radars to missile launchers. When these links break, a SAM battery with a theoretical 400-km engagement range becomes a collection of inert tubes pointed at the sky.

The electronic suppression was evidently complemented by cyber operations targeting Iran's command-and-control networks. While specifics remain classified, the pattern โ€” air defense systems that appeared operational on radar but failed to generate firing solutions against incoming threats โ€” suggests degradation at the software level, not merely the electromagnetic one. Iranian operators may have been looking at screens that showed them a sanitized picture while Tomahawk cruise missiles and B-2 Spirit bombers passed through their coverage zones uncontested.

The newly observed low-observable Tomahawk variant โ€” spotted with a glossy black radar-absorbent coating rather than the traditional grey โ€” adds another dimension. A cruise missile that is already difficult to detect against ground clutter becomes functionally invisible when the air defense radar is simultaneously degraded by electronic warfare. The combination is multiplicative, not additive.

The HQ-9B Problem

For defense planners across the Indo-Pacific, the most consequential data point from Iran may be the performance โ€” or non-performance โ€” of the HQ-9B. This system is the export version of the HQ-9, which forms the backbone of the PLA's ground-based air defense network. China operates hundreds of HQ-9 launchers across its eastern seaboard, protecting the military infrastructure that would support any power-projection operation in the Western Pacific.

The HQ-9 family uses a semi-active/active radar homing guidance system with a phased array engagement radar derived โ€” according to most open-source assessments โ€” from technology related to the Russian S-300PMU-2. Its theoretical engagement envelope extends to approximately 200 km against aircraft and includes a limited ballistic missile defense capability. On paper, it is a formidable system. The June 2025 war between the US/Israel and Iran had already raised questions about Chinese air defense exports. The February 2026 strikes appear to have answered them.

The distinction between the export HQ-9B and the domestic HQ-9 variant is important. Export systems typically feature downgraded electronics, older software, and reduced electronic counter-countermeasure (ECCM) capabilities. China's domestic HQ-9 batteries presumably incorporate more advanced processing, better ECCM, and tighter integration with the PLA's broader sensor network โ€” including space-based early warning, over-the-horizon radar, and airborne platforms like the KJ-500.

But the fundamental architecture is shared. The radar physics are similar. The guidance principles are the same. And the electronic warfare techniques that defeated the HQ-9B in Iranian service provide a validated playbook against the broader family. An adversary that has demonstrated the ability to blind one variant of a weapons system has necessarily learned a great deal about blinding the others.

Venezuela, Then Iran: A Pattern Emerges

The Iran operation did not occur in isolation. In January 2026, US forces neutralized Venezuelan air defenses โ€” including Russian-supplied S-300VM systems โ€” during the operation that captured Nicolรกs Maduro. The Venezuelan campaign was smaller in scale but employed the same electronic warfare architecture: Growler aircraft suppressed radar networks while strike platforms operated with near-impunity.

Two successful SEAD campaigns in two months against two different Russian- and Chinese-equipped air defense networks establish something beyond an anecdote. They establish a demonstrated capability. The US military has now proven, under combat conditions, that it can systematically defeat the air defense systems that Russia and China export to their partners โ€” and by extension, the systems whose architecture underpins their own domestic defenses.

This matters for deterrence in a specific and measurable way. Deterrence rests on an adversary's belief that aggression will fail or prove prohibitively costly. An air defense network that an adversary believes can be defeated is an air defense network that does not deter. Every hour of combat footage from Iranian airspace showing uncontested strike operations erodes the confidence that any nation can place in Russian- or Chinese-origin air defense systems as a shield against American air power.

Implications for the Western Pacific

The Indo-Pacific theater differs from the Middle East in scale, geography, and the density of military assets involved. China's integrated air defense system (IADS) is far more extensive than Iran's, incorporating thousands of SAM launchers, hundreds of fighter aircraft, extensive early warning radar networks, and space-based sensors. The PLA's electronic warfare capabilities are also substantially more advanced than Iran's, with dedicated EW units, counter-jamming technology, and hardened communications links.

These differences are real. But they are differences of scale, not of kind. The principles demonstrated over Iran โ€” that integrated air defense networks can be degraded through electronic and cyber attack, that stealth and low-observable munitions can exploit the resulting gaps, and that the combination can render advanced SAM systems ineffective โ€” apply to any network built on similar architecture. The question is not whether the approach works. It is how much capacity is required to apply it at scale.

For the United States and its allies, the answer is substantial but not unlimited. The US Navy and Air Force operate over 160 EA-18G Growlers and are fielding the Next Generation Jammer across the fleet. Japan's own electronic warfare capabilities โ€” including dedicated EW aircraft and the Type 99 electronic warfare system โ€” provide additional capacity. Australia's Growler fleet, operated by No. 6 Squadron RAAF, adds a third axis. The combined allied electronic warfare capacity in the Western Pacific is, by a considerable margin, the most formidable in the world.

The operational lesson from Iran reinforces a structural advantage that defenders and their allies hold in the Western Pacific: the ability to contest and degrade an aggressor's ability to project power beyond its own borders. An air defense network that cannot reliably protect fixed targets on home soil โ€” as Iran's could not โ€” faces even greater challenges protecting mobile naval assets operating hundreds of kilometers from shore, in waters surveilled by allied submarines, maritime patrol aircraft, and space-based sensors.

The AI and Autonomous Dimension

Initial reporting from Operation Epic Fury confirms the first combat use of LUCAS (Low-Cost Unmanned Combat Aerial System) one-way attack drones by US forces. While details remain limited, the deployment signals a shift toward autonomous and semi-autonomous strike systems that compound the challenges facing legacy air defenses.

Traditional SAM systems are optimized to track and engage a limited number of targets within their engagement envelope. They function well against conventional aircraft โ€” large radar cross-sections, predictable flight profiles, limited numbers. They function poorly against swarms of small, low-cost, low-observable drones that can be launched in dozens or hundreds, approach from multiple vectors, and sacrifice themselves to saturate defensive systems.

The LUCAS deployment in Iran may represent an early proof-of-concept. But the trajectory is clear: the US and its allies are investing heavily in autonomous combat systems that exploit precisely the weaknesses that legacy air defenses cannot easily address. The Collaborative Combat Aircraft (CCA) program, the Navy's MQ-25 Stingray, and various classified swarming programs are all designed to multiply the number of threats an adversary must engage while minimizing the cost to the attacker in both treasure and human life.

For nations relying on dense air defense networks as the foundation of their anti-access strategies, this trend poses a fundamental challenge. Each new autonomous system that enters the allied inventory increases the number of targets the defense must engage, dilutes the effectiveness of each SAM battery, and raises the cost of maintaining an air defense network dense enough to provide reliable coverage.

The Credibility Dividend

Deterrence theorists distinguish between capability and credibility. A nation may possess advanced weapons, but if adversaries doubt it will use them โ€” or doubt they will work as advertised โ€” the deterrent effect diminishes. The Iran strikes have done something unusual in the history of deterrence: they have publicly validated, under combat conditions, capabilities that previously existed only in classified assessments and theoretical models.

Before February 28, the ability of US electronic warfare to defeat integrated air defense networks was a theoretical proposition supported by exercises, simulations, and partial data from smaller operations. After February 28, it is an empirical fact documented in satellite imagery, combat footage, and dead air defense batteries.

This credibility dividend extends automatically to every theater where US forces operate or could operate. A military planner in any capital who is contemplating aggression against a US ally or partner must now incorporate the Iran data into their calculations. The question is no longer "can the Americans defeat our air defenses?" The question is "what makes us think our air defenses will perform better than Iran's did?" โ€” and the burden of proof has shifted decisively.

For the Western Pacific specifically, the credibility dividend compounds with the physical deterrent infrastructure already in place: Japan's Ryukyu missile arc, Taiwan's coastal defense batteries, the Philippines' basing agreements, Australia's AUKUS submarine program, and the US forward presence across the region. Each element was already formidable in isolation. The demonstrated ability to neutralize the air defense systems that might shield an aggressor's power projection adds another layer to the deterrent equation โ€” one that is now backed by combat data rather than assumptions.

What Happens Next

Chinese analysts view the Iran strikes as a "wake-up call" for the PLA's electronic warfare and intelligence capabilities. This is likely accurate. China's defense establishment will study the Iranian campaign intensively, seeking to identify the specific techniques used to defeat the HQ-9B and S-400, and to develop countermeasures.

This is the nature of the offense-defense dynamic in electronic warfare: every demonstrated capability triggers adaptation, which triggers counter-adaptation. China will invest in more advanced ECCM, more resilient data links, more distributed sensor architectures, and AI-assisted threat detection to reduce vulnerability to the techniques demonstrated in Iran. Some of these investments will succeed.

But adaptation takes time โ€” years, typically, for fundamental changes to propagate through a military as large as the PLA. And the adapting side faces a permanent disadvantage: the US has demonstrated what it can do with systems that are, by the standards of its own inventory, a generation behind the leading edge. The Next Generation Jammer is still being fielded. The B-21 Raider has not yet seen combat. The autonomous systems pipeline is accelerating. The demonstrated capability is a floor, not a ceiling.

Meanwhile, the political and psychological effects of the Iran campaign are immediate. Every nation that has purchased or is considering purchasing Russian or Chinese air defense systems is now conducting quiet reassessments. Every military planner who relied on those systems as a cornerstone of their defense strategy is recalculating. And every adversary contemplating power projection against a US ally is confronting a simple question with a newly concrete answer: if these systems couldn't protect Tehran, what makes you think they'll protect you?

๐ŸŽฎ Test Air Defense Networks in the Simulator

Deploy layered air defenses and test how electronic warfare, stealth, and autonomous systems interact in our interactive Taiwan Strait simulator.

โ–ถ๏ธ Launch the Simulator

Enjoyed this analysis? Help us keep the lights on and the simulations running.

โ˜• Buy Me a Coffee

Further Reading