Hezbollah's pager network has been hit by a presumed cyberattack. Image: X Screengrab

Encrypted pagers used by Hezbollah and their sponsors in Lebanon and Syria simultaneously started exploding on September 17.  

The pagers were the backbone of Hezbollah and Iranian communications in Lebanon and Syria. It has now been destroyed along with wounding at least at least 2,800 and killing eight Hezbollah and Iranians connected with them, including Iran’s ambassador to Lebanon, who was wounded.

We will probably learn more about how many pagers exploded in the coming days. There is now video of some of the pagers exploding and video of hospitals crowded with wounded (See below). Hezbollah has blamed Israel for the operation, according to news reports.

Lacking communications except on public cellular phones, it will be difficult for Hezbollah to launch coordinated missile attacks on Israel, as they have done as recently as the last few days. That does not mean they won’t try, of course, but the shutdown of their communications system is a definite setback.  

YouTube video

If the attack was launched by Israel, which has not been confirmed, it would indicate that Israel is (1) retaliating for Hezbollah attacks and (2) seeking to hobble Hezbollah’s military operations if Israel launches an attack on Lebanon, as many project will soon happen.

Details of exactly how this feat was accomplished are still under wraps.  News reports say that the pagers exploded by overheating their lithium batteries.  This means that while the pagers sent and received encrypted messages, their operating systems were not secure.

One of our readers reports his suspicion that the pagers were modified somewhere in transit and contained explosives. In reviewing the latest videos it does look as if the devices exploded.

This suggests that the operation against Hezbollah was conducted over a period of time, with superb intelligence and access to pagers’ origins or waypoints.

In 1996, Hamas bomb maker Yahya Ayyash was killed in Gaza City when his cell phone exploded during his weekly phone call to his father in the West Bank. It was a targeted assassination by the Shin Bet, Israel’s internal security service. If this is a repeat performance on a massive scale, it would be unprecedented.

Encrypted pagers can be text only or text and voice. Many of them, even US brands, are made in Asia. China offers a number of models.

It is likely that the pagers used by Hezbollah were dual voice-text devices, meaning they were bigger than small text pagers and resemble a walkie-talkie. Such devices would have a larger lithium battery to support voice communications and allow longer-range operations.

One assumes, therefore, that it was possible to infect the pagers with malware that could override temperature controls inside the pagers and “cook” the batteries.

Lithium-ion batteries are prone to explosion. Devices have gone off unexpectedly even on airlines. Temperature is one way to detonate a battery, although there are other methods.

But more is involved.  It is obvious that while the pagers were encrypted, their signals could still be tracked, meaning that it was possible to identify the Hezbollah operatives and those cooperating with them, especially Iranians, who were part of the network. 

It is likely only pagers belonging to Hezbollah-linked terrorists and their leaders were targeted. There are no reports, as yet, of civilians such as first responders experiencing exploding pagers.

The last time this level of cyberattack was mounted, that we know of, was the US and Israeli attack on Iran’s uranium enrichment centrifuges in 2010.

Known as the Stuxnet computer worm, it caused the controllers of the centrifuges to speed them up too fast until they broke down and their spinning carbon-carbon rotors disintegrated.  So far as is known, there were no casualties in the Stuxnet attack. 

By its very nature, a pager is safer to use than a cellular phone because it is essentially a radio and is not connected to the internet or to social media.

However, pagers require repeater stations, providing a way for an adversary to collect signals intelligence electronically and, in the latest case, allegedly to introduce software changes to working pagers. 

The fact that the Hezbollah network covered Lebanon and Syria suggests it was a large and extensive network. It would be interesting to know what telecommunications suppliers helped Hezbollah build out the system and who provided the pagers.

Stephen Bryen is senior correspondent at Asia Times. He served as staff director of the Near East Subcommittee of the US Senate Foreign Relations Committee and as a deputy undersecretary of defense for policy. 

This article was originally published on his Weapons and Strategy Substack, and is republished with permission.

Join the Conversation

5 Comments

  1. Israelis can do this the citizen of the entire western nations- their benfactors. West knows it and tries hard to avoid this .That effort to avoid will lead to the slow death of the west It’s religion is already either Scofiled Bible or in case of France – it is the Shoa.

  2. At this point, I’d suggest Hezbollah buy some Tesla cars… I think they’d get a big discount on them…

  3. According to the Islamic doctrine of predestination, Allah knows everything, past, present and future, he preordains it. I wonder why he hates his true believers?

    1. “Allah hates his believers just like the Christian God hates his. This should make you think…”