{"id":37430,"date":"2024-09-18T21:45:00","date_gmt":"2024-09-18T21:45:00","guid":{"rendered":"https:\/\/www.lifeandnews.com\/articles\/?p=37430"},"modified":"2024-09-28T12:01:57","modified_gmt":"2024-09-28T12:01:57","slug":"pagers-and-walkie-talkies-over-cellphones-a-security-expert-explains-why-hezbollah-went-low-tech-for-communications","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/pagers-and-walkie-talkies-over-cellphones-a-security-expert-explains-why-hezbollah-went-low-tech-for-communications\/","title":{"rendered":"Pagers and walkie-talkies over cellphones \u2013 a security expert explains why Hezbollah went low-tech for&nbsp;communications"},"content":{"rendered":"\n<p><a href=\"https:\/\/theconversation.com\/profiles\/richard-forno-173226\">Richard Forno<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-maryland-baltimore-county-1667\">University of Maryland, Baltimore County<\/a><\/em><\/p>\n\n\n\n<p>Electronic pagers across Lebanon exploded simultaneously on Sept. 17, 2024, <a href=\"https:\/\/www.nytimes.com\/2024\/09\/18\/world\/europe\/pager-explosions-lebanon-what-we-know.html\">killing 12 and wounding more than 2,700<\/a>. The following day, <a href=\"https:\/\/apnews.com\/article\/lebanon-israel-exploding-pagers-hezbollah-syria-ce6af3c2e6de0a0dddfae48634278288#https:\/\/apnews.com\/article\/lebanon-israel-exploding-pagers-hezbollah-syria-ce6af3c2e6de0a0dddfae48634278288\">another wave of explosions<\/a> in the country came from detonating walkie-talkies. The attacks appeared to target members of the militant group Hezbollah.<\/p>\n\n\n\n<p>The pagers attack <a href=\"https:\/\/www.nytimes.com\/2024\/09\/17\/world\/middleeast\/israel-planted-explosives-in-pagers-sold-to-hezbollah-officials-say.html\">involved explosives<\/a> planted in the communications devices by Israeli operatives, according to U.S. officials cited by The New York Times. Hezbollah had recently ordered a shipment of pagers, according to the report.<\/p>\n\n\n\n<p>Secretly attacking the supply chain is not a new technique in intelligence and military operations. For example, the U.S. National Security Agency <a href=\"https:\/\/arstechnica.com\/tech-policy\/2014\/05\/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant\/\">intercepted computer hardware bound for overseas customers<\/a>, inserted malware or other surveillance tools and then repackaged them for delivery to certain foreign buyers, a 2010 NSA internal document showed. This differs from accessing a specific person\u2019s device, such as when Israel\u2019s Shin Bet secretly inserted explosives into a cellphone to <a href=\"https:\/\/israeled.org\/phone-bomb-kills-terrorist-yahya-ayyash\/\">remotely kill<\/a> a Hamas bombmaker in 1996.<\/p>\n\n\n\n<p>Hezbollah, a longtime adversary of Israel, had increased its use of pagers in the wake of the Hamas attack on Israel on Oct. 7, 2023. By shifting to relatively low-tech communication devices, including pagers and walkie-talkies, Hezbollah apparently <a href=\"https:\/\/www.reuters.com\/world\/middle-east\/pagers-drones-how-hezbollah-aims-counter-israels-high-tech-surveillance-2024-07-09\/\">sought an advantage<\/a> against Israel\u2019s well-known sophistication in tracking targets through their phones.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img src=\"https:\/\/images.theconversation.com\/files\/620294\/original\/file-20240918-18-is2sky.jpg?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt=\"pieces of a destroyed electronic device\"\/><figcaption>The second wave of explosions in Lebanon involved walkie-talkies. <a href=\"https:\/\/newsroom.ap.org\/detail\/LebanonIsraelExplodingPagers\/edd1ab09d2d540e69f12a1dcdba2ca5b\/photo\">AP Photo<\/a><\/figcaption><\/figure>\n\n\n\n<h2>Cellphones: The ultimate tracker<\/h2>\n\n\n\n<p>As a former cybersecurity professional and current <a href=\"https:\/\/cybersecurity.umbc.edu\/richard-forno\/\">security researcher<\/a>, I view cellular devices as the ultimate tracking tool for both government and commercial entities \u2013 in addition to users, criminals and the mobile phone provider itself. As a result, mobile phone tracking has contributed to the <a href=\"https:\/\/www.nytimes.com\/2004\/03\/04\/world\/how-tiny-swiss-cellphone-chips-helped-track-global-terror-web.html\">fight against terrorism<\/a>, <a href=\"https:\/\/www.kcra.com\/article\/data-pings-primary-tools-used-investigators-looking-missing-people\/40964209\">located missing people<\/a> and <a href=\"https:\/\/www.nytimes.com\/interactive\/2019\/04\/13\/us\/google-location-tracking-police.html\">helped solve crimes<\/a>.<\/p>\n\n\n\n<p>Conversely, mobile phone tracking makes it easy for anyone to record a person\u2019s most intimate movements. This can be done for legitimate purposes such as parents tracking children\u2019s movements, helping you find your car in a parking lot, and commercial advertising, or nefarious ends such as remotely spying on a lover suspected of cheating or tracking political activists and journalists. Even the <a href=\"https:\/\/www.wsj.com\/articles\/the-ease-of-tracking-mobile-phones-of-u-s-soldiers-in-hot-spots-11619429402\">U.S. military remains concerned<\/a> with how its soldiers might be tracked by their phones.<\/p>\n\n\n\n<p>Mobile device tracking is conducted in several ways. First, there is the <a href=\"https:\/\/www.usatoday.com\/story\/news\/2015\/08\/23\/baltimore-police-stingray-cell-surveillance\/31994181\/\">network location data<\/a> generated by the phone as it moves past local cell towers or <a href=\"https:\/\/theintercept.com\/2020\/07\/31\/protests-surveillance-stingrays-dirtboxes-phone-tracking\/\">Stingray devices<\/a>, which law enforcement agencies use to mimic cell towers. Then there are the features built into the phone\u2019s operating system or enabled by <a href=\"https:\/\/internethealthreport.org\/2019\/your-mobile-apps-are-tracking-you\/\">downloaded apps<\/a> that may lead to highly detailed user tracking, which users unwittingly agree to by ignoring the software\u2019s privacy policy or terms of service.<\/p>\n\n\n\n<p>This collected data is sometimes <a href=\"https:\/\/www.eff.org\/deeplinks\/2022\/06\/how-federal-government-buys-our-cell-phone-location-data\">sold to governments or other companies<\/a> for additional data mining and user profiling. And modern smartphones also have built-in Bluetooth, Wi-Fi and GPS capabilities that can help with locating and tracking user movements around the world, both from the ground and via satellites. https:\/\/www.youtube.com\/embed\/CxC1KCoGbIM?wmode=transparent&amp;start=0 Your phone contains many sensors that make it useful \u2013 and easy to track.<\/p>\n\n\n\n<p>Mobile devices can be tracked in real time or close to it. Common technical methods include traditional <a href=\"https:\/\/apps.dtic.mil\/sti\/tr\/pdf\/ADA128039.pdf\">radio direction-finding<\/a> techniques, using intelligence satellites or drones, deploying \u201cman in the middle\u201d tools like Stingrays to <a href=\"https:\/\/www.efani.com\/blog\/prevent-stingrays-and-dirtboxes\">impersonate cellular towers<\/a> to intercept and isolate device traffic, or installing malware such as <a href=\"https:\/\/nsarchive.gwu.edu\/document\/27613-6-citizen-lab-report-pegasus-spyware\">Pegasus, made by Israeli cyberarms company NSO<\/a> to report a device\u2019s location.<\/p>\n\n\n\n<p>Nontechnical and slower techniques of user tracking include potentially identifying general user locations from their <a href=\"https:\/\/www.privateinternetaccess.com\/blog\/can-websites-track-your-phone\/\">internet activity<\/a>. This can be done from website logs or the metadata contained in content posted to social media, or contracting with data brokers to receive any collected location data from the apps that a user might install on their device.<\/p>\n\n\n\n<p>Indeed, because of these vulnerabilities, the leader of Hezbollah earlier this year advised his members to <a href=\"https:\/\/www.israelnationalnews.com\/en\/news\/386313\">avoid using cellular phones<\/a> in their activities, noting that Israel\u2019s \u201csurveillance devices are in your pockets. If you are looking for the Israeli agent, look at the phone in your hands and those of your wives and children.\u201d<\/p>\n\n\n\n<p>Researchers have shown how these features, often intended for the user\u2019s convenience, can be used by governments, companies and criminals to track people in their daily lives and even <a href=\"https:\/\/www.rochester.edu\/newscenter\/a-cautionary-tale-about-location-tracking-517892\/\">predict movements<\/a>. Many people still aren\u2019t aware of <a href=\"https:\/\/www.sciencedaily.com\/releases\/2023\/05\/230509122057.htm\">how much their mobile devices disclose about them<\/a>.<\/p>\n\n\n\n<p>Pagers, however, unlike mobile phones, can be harder to track depending on whether they support two-way communication.<\/p>\n\n\n\n<h2>Why go low-tech<\/h2>\n\n\n\n<p>A pager that only receives messages does not provide a signal that can facilitate tracking its owner. Therefore, Hezbollah\u2019s use of pagers likely made it more challenging to track their operatives \u2013 thus motivating Israeli intelligence services\u2019 purported attack on the supply chain of Hezbollah\u2019s pagers.<\/p>\n\n\n\n<p>Using low-tech tactics and personal couriers while avoiding the use of mobile phones and digital tools also made it difficult for the technologically superior Western intelligence agencies to locate Osama bin Laden for years after the 9\/11 attacks.<\/p>\n\n\n\n<p>In general, I believe the adversary in an <a href=\"https:\/\/www.britannica.com\/topic\/asymmetrical-warfare\">asymmetric conflict<\/a> using low-tech techniques, tactics and technology will almost always be able to operate successfully against a more powerful and well-funded opponent.<\/p>\n\n\n\n<p>A well-documented demonstration of this asymmetry in action was the U.S. military\u2019s <a href=\"https:\/\/warontherocks.com\/2015\/11\/millennium-challenge-the-real-story-of-a-corrupted-military-exercise-and-its-legacy\/\">Millennium Challenge<\/a> war game in 2002. Among other things, the insurgent Red forces, led by Marine General Paul van Riper, used low-tech tactics including motorcycle couriers instead of cellphones to evade the Blue forces\u2019 high-tech surveillance. In the initial run of the exercise, the Red team won the contest in 24 hours, forcing exercise planners to controversially reset and update the scenario to ensure a Blue team victory.<\/p>\n\n\n\n<h2>Lessons for everyone<\/h2>\n\n\n\n<p>The preference for terrorist organizations like Hezbollah and al-Qaida to avoid using smartphones is a reminder for everyone that you can be, and likely are being tracked in various ways and for various purposes.<\/p>\n\n\n\n<p>Israel\u2019s purported response to Hezbollah\u2019s actions also holds a lesson for everyone. From a cybersecurity perspective, it shows that any device in your life can be tampered with by an adversary at points along the supply chain \u2013 long before you even receive it.<\/p>\n\n\n\n<p><a href=\"https:\/\/theconversation.com\/profiles\/richard-forno-173226\">Richard Forno<\/a>, Principal Lecturer in Computer Science and Electrical Engineering, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-maryland-baltimore-county-1667\">University of Maryland, Baltimore County<\/a><\/em><\/p>\n\n\n\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/pagers-and-walkie-talkies-over-cellphones-a-security-expert-explains-why-hezbollah-went-low-tech-for-communications-239283\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Richard Forno, University of Maryland, Baltimore County Electronic pagers across Lebanon exploded simultaneously on Sept. 17, 2024, killing 12 and wounding more than 2,700. The following day, another wave of explosions in the country came from detonating walkie-talkies. The attacks appeared to target members of the militant group Hezbollah. The pagers attack involved explosives planted [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":37431,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[47,28,4,8],"tags":[612,3666,15585,885,891,886,860,1749,525],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/37430"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=37430"}],"version-history":[{"count":3,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/37430\/revisions"}],"predecessor-version":[{"id":37609,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/37430\/revisions\/37609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/37431"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=37430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=37430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=37430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}