Lebanon pager blasts: What we know about the Hezbollah device explosions

Gerrit De Vynck, Sammy Westfall, Elizabeth Dwoskin
The Washington Post
Pagers in the hands or pockets of Hezbollah agents have exploded across Lebanon killing at least nine people and injuring thousands.

At 3:30 p.m. Tuesday in Lebanon, thousands of pagers used by the militant group Hezbollah exploded across the country, wounding at least 2,800 people and killing at least nine, according to health officials.

The massive apparent attack raised immediate questions about how the tiny devices could have exploded at the same time.

Hezbollah blamed the attack on Israel. The Israel Defense Forces declined to comment on whether it was responsible.

Sign up to The Nightly's newsletters.

Get the first look at the digital newspaper, curated daily stories and breaking headlines delivered to your inbox.

Email Us
By continuing you agree to our Terms and Privacy Policy.

Israel uses sophisticated cyberespionage methods to spy on and track members of the militant groups it opposes, including Hamas and Hezbollah. It has also built a far-ranging surveillance system using facial recognition to monitor Palestinians in the West Bank.

But the scale of such an attack, targeting thousands of Hezbollah members at once by use of their own devices is unprecedented.

How did the pagers explode?

Israeli operatives probably intercepted the pagers somewhere in the supply chain and rigged them with explosives before Hezbollah got them, said Emily Harding, deputy director of the International Security Program at Center for Strategic and International Studies, a Washington think tank.

Videos posted of the attack on social media suggest that the “explosive devices were integrated into the pagers,” N.R. Jenzen-Jones, director of Armament Research Services, a weapons research firm, said in a post on X. “The scale suggests a complex supply-chain attack, rather than a scenario in which devices were intercepted and modified in transit.”

Cellphones long ago replaced pagers for most people, but the devices are still widely available. They’re part of the same complex electronics supply chains connecting manufacturers in Asia with resellers all over the world.

Two photos published to social media in the aftermath of the attack show the singed and crumbled back panels of pagers with “GOLD” written in text above a model number “AR-9.” The design of the text matches that emblazoned on the back of the “AR-924” pager model produced by Gold Apollo Co., which uses a lithium battery.

Gold Apollo, based in Taiwan, is one of the primary producers of pagers in the world. A representative for the company did not respond to a request for comment.

“This looks to be perhaps the most extensive physical supply chain attack in history,” said Dmitri Alperovitch, chairman of the Silverado Policy Accelerator, a national security think tank.

Could lithium batteries be responsible?

Modern consumer devices, including some pagers, have lithium-ion batteries that can explode or catch on fire if they get too hot or come into direct contact with metals. Still, it is unlikely that a lithium battery caused Tuesday’s explosions, experts say.

Lithium batteries as small as a regular Double-A battery can explode and cause burns, said Richard Meier, principal expert with Meier Fire Investigation, who has overseen many investigations into lithium battery fires. In one case, a small battery exploded in a person’s pocket after coming into contact with loose change, causing severe burns.

Lithium batteries that overheat can reach 2,000 degrees Fahrenheit, Meier said. Devices are generally designed to vent this heat, but if they don’t, “the battery can and will explode,” he said.

Some batteries rely on the devices’ own software to regulate their use and temperature, so it is theoretically possible to hack into a pager and trigger its battery to heat to the point that it explodes, Meier said.

At the same time, videos of the attack posted to social media show the pagers exploding instantaneously, rather than catching fire. Overheating lithium batteries sometimes explode, but also catch fire or throw off streams of superheated material in unpredictable ways.

“I’ve seen enough lithium battery fires to know that what we’re seeing in published videos is not consistent with a battery fire,” said Jake Williams, a security researcher and vice president of research and development at Hunter Strategy, a security consulting firm. “The electrochemistry in cheap batteries simply doesn’t support detonating them all in a very short time period like was observed.

Instead, the explosive material may have been placed into the batteries themselves, Williams said.

Why were Hezbollah members using pagers?

In July, Reuters reported that Hezbollah had turned to pagers in recent months for communication after banning the use of cellphones from the battlefield, out of concern that Israel could use them to locate and monitor fighters.

Pagers don’t have cameras or microphones, making them less risky for people who are concerned about surveillance, said Harding.

Paramedics transport an injured person to the American University of Beirut Medical Center (AUBMC) after an incident involving Hezbollah members' wireless devices in Beirut, Lebanon.
Paramedics transport an injured person to the American University of Beirut Medical Center (AUBMC) after an incident involving Hezbollah members' wireless devices in Beirut, Lebanon. Credit: WAEL HAMZEH/EPA

Could Israel have carried out such an attack?

Israel’s cyber-capabilities are well known. The IDF’s Unit 8200, composed of thousands of soldiers, develops technology to collect intelligence and monitor the military’s targets. The unit’s veterans often go on to work at prominent cybersecurity companies or found their own start-ups. Israel has used cellphone data to monitor the movement of people in Gaza during the war.

Israel’s military and spy agencies have assassinated the country’s enemies from afar for decades. Technology has played a chief role in some of the attacks.

In 1996, Yahya Ayyash, Hamas’ chief bombmaker, was killed when he answered a rigged cellphone, likely part of an operation by Israeli agents, The Post reported. And in 2012, U.S. officials confirmed that the U.S. and Israel had jointly developed a cyberweapon known as Stuxnet intended to slow Iran’s nuclear weapons program. The weapon inadvertently infected industrial control computers around the world.

Private Israeli companies create and sell sophisticated cybersecurity and surveillance software as well. A 2021 investigation by The Washington Post and 16 media partners found that Israeli firm NSO Group had sold military-grade spyware to other governments that used it to infiltrate cellphones used by journalists, politicians and activists.

Still, the attack is unprecedented and raises new legal questions about Israel’s compliance with international law said Tal Mimran, academic director of the International Law Forum at Hebrew University and a former legal adviser to the IDF.

“A beeper attack is a new type of attack, we haven’t seen it,” Mimran said. “Were they able to properly assess the people who will be injured by the attack? How many casualties would be considered collateral damage?”

Rachel Chason in Jerusalem and Meg Kelly and Ellen Nakashima in Washington contributed to this report.

© 2024 , The Washington Post

Latest Edition

The Nightly cover for 12-11-2024

Latest Edition

Edition Edition 12 November 202412 November 2024

Labor to bin its controversial Nature Positive laws.