Saturday, December 21, 2024
spot_img
spot_img
HomeBusinessClimate / EnvironmentPagers and Walkie-talkies over cellphones

Pagers and Walkie-talkies over cellphones

– In general, I believe the adversary in an asymmetric conflict using low-tech techniques, tactics and technology will almost always be able to operate successfully against a more powerful and well-funded opponent. But from a cybersecurity perspective, Israel’s attack on Hezbollah’s pagers shows that any device in your life can be tampered with by an adversary at points along the supply chain – long before you even receive it.

By Richard Forno

Electronic pagers across Lebanon exploded simultaneously on September 17, 2024, killing 12 and wounding more than 2,700. The following day, another wave of explosions in the country came from detonating walkie-talkies. The attacks appeared to target members of the militant group Hezbollah.

The pagers attack involved explosives planted in the communications devices by Israeli operatives, according to US officials cited by The New York Times. Hezbollah had recently ordered a shipment of pagers, according to the report.

Secretly attacking the supply chain is not a new technique in intelligence and military operations. For example, the US National Security Agency intercepted computer hardware bound for overseas customers, inserted malware or other surveillance tools and then repackaged them for delivery to certain foreign buyers, a 2010 NSA internal document showed. This differs from accessing a specific person’s device, such as when Israel’s Shin Bet secretly inserted explosives into a cellphone to remotely kill a Hamas bombmaker in 1996.

Hezbollah, a longtime adversary of Israel, had increased its use of pagers in the wake of the Hamas attack on Israel on October 7, 2023. By shifting to relatively low-tech communication devices, including pagers and walkie-talkies, Hezbollah apparently sought an advantage against Israel’s well-known sophistication in tracking targets through their phones.

Cellphones: The ultimate tracker

As a former cybersecurity professional and current security researcher, I view cellular devices as the ultimate tracking tool for both government and commercial entities – in addition to users, criminals and the mobile phone provider itself. As a result, mobile phone tracking has contributed to the fight against terrorismlocated missing people and helped solve crimes.

Conversely, mobile phone tracking makes it easy for anyone to record a person’s most intimate movements. This can be done for legitimate purposes such as parents tracking children’s movements, helping you find your car in a parking lot, and commercial advertising, or nefarious ends such as remotely spying on a lover suspected of cheating or tracking political activists and journalists. Even the U.S. military remains concerned with how its soldiers might be tracked by their phones.

spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

spot_img
spot_img
spot_img

Caribbean News

St Lucia public sector employees’ one-off $500 bonus for Christmas can block a hole

  CASTRIES, St Lucia - Prime Minister Philip J. Pierre, on December 18, 2024, announced that in addition to monthly salary payments, public sector...

Global News

Taiwan’s new tourism programs to boost trade and travel

  MIAMI, USA – The Taiwan Tourism Administration (TTA) recently launched one promotional event and another under the Ministry of Transportation and Communications (MOTC),...