After IT-enabled explosions, Israeli air raids kill hundreds in Beirut
C |
yber warfare is a new frontier. Lines of code are as effective as bullets and some of the attacks target not just the battlefield but also critical infrastructures of hostile nations.
A striking example of modern warfare is Israel’s recent attack on Hezbollah operatives in Lebanon. The operation, blending traditional warfare with cutting-edge technology, involved the use of compromised pagers and bomb-laden walkie-talkies. At least 20 people were killed and more than 450 injured. This highlighted the increasing significance of cyber warfare, where nations target enemy’s communication systems and critical infrastructure to achieve strategic goals. The attack on Hezbollah underscores how vulnerable even non-digital technologies can be when used in a modern conflict setting.
The Israeli attack on Lebanon represented a significant breach of both cyber security and physical security. Initial investigations revealed that Mossad, an Israeli agency, was behind the operation. The attack was carried out by embedding explosive devices in 5,000 pagers manufactured by a company before they were provided to Hezbollah operatives. Hezbollah had been using these pagers to avoid advanced signals intelligence and geo-location tracking by Israel. However, the reliance on this seemingly outdated technology did not prevent the attack. This underscores the dangers of supply chain vulnerabilities. Trusted communication technologies can always be weaponised in an asymmetric war.
The first wave of explosions occurred when the compromised pagers detonated at locations across Lebanon, leading to the deaths of nine individuals and injuring nearly 3,000 other people. It was reported that Hezbollah operatives had received messages from their leaders on these pagers shortly before the devices exploded. This suggested that these communications triggered the deadly blasts. The impact of these explosions was immense, not only in terms of casualties but also in terms of the fear and confusion it sowed among the public. Ambulances struggled to reach the wounded amidst the chaos and people grew suspicious of anyone using mobile devices, suspecting them to be rigged with explosives.
The violence escalated further the next day when a number of walkie-talkies used by Hezbollah exploded near a funeral procession for victims of the pager blasts. These walkie-talkies, purchased by Hezbollah five months ago, caused additional deaths and injuries, bringing the total toll to 20 dead and more than 450 injured.
Walkie-talkies, first developed during World War II, were one pivotal for both military and civilian communications. The handheld radios allowed soldiers and emergency responders to communicate in real-time over short distances, especially in areas where other communication systems were unreliable. Despite their usefulness, walkie-talkies are vulnerable, particularly in the modern cybersecurity landscape. Unlike encrypted digital communications, traditional walkie-talkies rely on unsecured radio frequencies, making them easy targets for interception and manipulation. In this case, Israeli intelligence exploited the fact by embedding remote detonation devices in these, turning an essential communication tools into a lethal weapon.
Initial investigations have suggested that Mossad, the Israeli spy agency, was behind the operation. The attack was carried out by embedding explosive devices in 5,000 pagers provided for Hezbollah operatives.
Pagers—once considered groundbreaking technology—had had a crucial role in communication before the rise of mobile phones. These compact devices operated through radio frequency signals, alerting users to new messages via a beep or vibration. Pagers were particularly useful in sectors like healthcare, where professionals needed to receive urgent updates. However, pagers had their limitations. They could not send replies and were dependent on the availability of RF signals, which could be unreliable in certain locations. By the 1990s, the rise of mobile phones, which offered integrated voice and data services, made pagers largely obsolete. Yet, as the Hezbollah case demonstrates, even supposedly outdated technologies can be weaponised.
The attack on Hezbollah’s communication network was not just a technical breach but well planned cyber-physical warfare. Hezbollah had chosen to use pagers in an effort to evade the sophisticated tracking systems of their enemy. The hardware supply chain circumvented the precaution. By embedding explosives in pagers during the manufacturing process, Israeli intelligence turned seemingly benign devices into deadly weapons. This operation revealed a significant weakness in Hezbollah’s communication infrastructure, its reliance on outdated technology.
There have been other kinds of cyber attacks in the past. The 2021 SolarWinds attack in the United States exposed critical vulnerabilities in global supply chains, affecting thousands of organisations, including some US government agencies. The attackers, suspected to be Russian intelligence, had exploited weaknesses in the software supply chain to infiltrate sensitive systems. The 2017 WannaCry ransom-ware attack affected more than 200,000 computers in 150 countries.
In 2020, a major data security breach in Pakistan revealed vulnerabilities in the country’s national database and highlighted the need for improved cybersecurity infrastructure and protective measures.
The Israeli attack on Hezbollah holds critical lessons for other nations. The sophisticated nature of the operation demonstrates the potential for cyberattacks to exploit weaknesses in supply chains and communication systems.
To mitigate these risks, states and government must implement rigorous security measures, conduct regular vulnerability assessments and foster international cooperation on cybersecurity issues. This includes establishing cyber norms and agreements with global partners to enhance collective defence and resilience. Securing supply chains and managing vendor risks must be a top priority.
The writer is a researcher and analyst in the field of cybersecurity