A police officer examines a broken automotive after hundreds of pagers exploded concurrently throughout Lebanon on Sept. 17, 2024. AP Photograph/Hussein Malla
Digital pagers throughout Lebanon exploded concurrently on Sept. 17, 2024, killing 12 and wounding greater than 2,700. The next day, one other wave of explosions within the nation got here from detonating walkie-talkies. The assaults appeared to focus on members of the militant group Hezbollah.
The pagers assault concerned explosives planted within the communications units by Israeli operatives, in accordance with U.S. officers cited by The New York Occasions. Hezbollah had just lately ordered a cargo of pagers, in accordance with the report.
Secretly attacking the availability chain shouldn’t be a brand new approach in intelligence and navy operations. For instance, the U.S. Nationwide Safety Company intercepted laptop {hardware} sure for abroad clients, inserted malware or different surveillance instruments after which repackaged them for supply to sure overseas patrons, a 2010 NSA inside doc confirmed. This differs from accessing a particular particular person’s system, corresponding to when Israel’s Shin Wager secretly inserted explosives right into a cellphone to remotely kill a Hamas bombmaker in 1996.
Hezbollah, a longtime adversary of Israel, had elevated its use of pagers within the wake of the Hamas assault on Israel on Oct. 7, 2023. By shifting to comparatively low-tech communication units, together with pagers and walkie-talkies, Hezbollah apparently sought a bonus in opposition to Israel’s well-known sophistication in monitoring targets by their telephones.

The second wave of explosions in Lebanon concerned walkie-talkies.
AP Photograph
Cellphones: The final word tracker
As a former cybersecurity skilled and present safety researcher, I view mobile units as the final word monitoring instrument for each authorities and business entities – along with customers, criminals and the cell phone supplier itself. In consequence, cell phone monitoring has contributed to the combat in opposition to terrorism, situated lacking individuals and helped remedy crimes.
Conversely, cell phone monitoring makes it simple for anybody to document an individual’s most intimate actions. This may be accomplished for professional functions corresponding to dad and mom monitoring youngsters’s actions, serving to you discover your automotive in a parking zone, and business promoting, or nefarious ends corresponding to remotely spying on a lover suspected of dishonest or monitoring political activists and journalists. Even the U.S. navy stays involved with how its troopers is likely to be tracked by their telephones.
Cellular system monitoring is performed in a number of methods. First, there may be the community location knowledge generated by the cellphone because it strikes previous native cell towers or Stingray units, which legislation enforcement companies use to imitate cell towers. Then there are the options constructed into the cellphone’s working system or enabled by downloaded apps which will result in extremely detailed consumer monitoring, which customers unwittingly comply with by ignoring the software program’s privateness coverage or phrases of service.
This collected knowledge is typically bought to governments or different firms for added knowledge mining and consumer profiling. And trendy smartphones even have built-in Bluetooth, Wi-Fi and GPS capabilities that may assist with finding and monitoring consumer actions world wide, each from the bottom and by way of satellites.
Your cellphone accommodates many sensors that make it helpful – and simple to trace.
Cellular units may be tracked in actual time or near it. Frequent technical strategies embrace conventional radio direction-finding methods, utilizing intelligence satellites or drones, deploying “man within the center” instruments like Stingrays to impersonate mobile towers to intercept and isolate system visitors, or putting in malware corresponding to Pegasus, made by Israeli cyberarms firm NSO to report a tool’s location.
Nontechnical and slower methods of consumer monitoring embrace doubtlessly figuring out common consumer areas from their web exercise. This may be accomplished from web site logs or the metadata contained in content material posted to social media, or contracting with knowledge brokers to obtain any collected location knowledge from the apps {that a} consumer may set up on their system.
Certainly, due to these vulnerabilities, the chief of Hezbollah earlier this 12 months suggested his members to keep away from utilizing mobile telephones of their actions, noting that Israel’s “surveillance units are in your pockets. In case you are in search of the Israeli agent, take a look at the cellphone in your palms and people of your wives and kids.”
Researchers have proven how these options, typically meant for the consumer’s comfort, can be utilized by governments, firms and criminals to trace individuals of their day by day lives and even predict actions. Many individuals nonetheless aren’t conscious of how a lot their cell units disclose about them.
Pagers, nevertheless, in contrast to cell phones, may be tougher to trace relying on whether or not they help two-way communication.
Why go low-tech
A pager that solely receives messages doesn’t present a sign that may facilitate monitoring its proprietor. Subsequently, Hezbollah’s use of pagers probably made it tougher to trace their operatives – thus motivating Israeli intelligence companies’ purported assault on the availability chain of Hezbollah’s pagers.
Utilizing low-tech ways and private couriers whereas avoiding using cell phones and digital instruments additionally made it tough for the technologically superior Western intelligence companies to find Osama bin Laden for years after the 9/11 assaults.
Basically, I consider the adversary in an uneven battle utilizing low-tech methods, ways and know-how will virtually at all times have the ability to function efficiently in opposition to a extra highly effective and well-funded opponent.
A well-documented demonstration of this asymmetry in motion was the U.S. navy’s Millennium Problem struggle sport in 2002. Amongst different issues, the rebel Crimson forces, led by Marine Common Paul van Riper, used low-tech ways together with bike couriers as a substitute of cellphones to evade the Blue forces’ high-tech surveillance. Within the preliminary run of the train, the Crimson staff gained the competition in 24 hours, forcing train planners to controversially reset and replace the situation to make sure a Blue staff victory.
Classes for everybody
The desire for terrorist organizations like Hezbollah and al-Qaida to keep away from utilizing smartphones is a reminder for everybody that you could be, and sure are being tracked in numerous methods and for numerous functions.
Israel’s purported response to Hezbollah’s actions additionally holds a lesson for everybody. From a cybersecurity perspective, it reveals that any system in your life may be tampered with by an adversary at factors alongside the availability chain – lengthy earlier than you even obtain it.

Richard Forno has obtained analysis funding associated to cybersecurity from the Nationwide Science Basis (NSF), the Division of Protection (DOD), and the US Military throughout his tutorial profession.












