How did pagers explode in Lebanon and why was Hezbollah using them? Here’s what we know
(CNN) — Hundreds of pagers carried by Hezbollah members in Lebanon blew up nearly simultaneously on Tuesday in an unprecedented attack that surpasses a series of covert assassinations and cyber-attacks in the region over recent years in its scope and execution.
The Iran-backed militant group said the wireless devices began to explode around 3:30 p.m. local time in a targeted Israeli attack on Hezbollah operatives.
CNN learned that Israel was behind the attack, which was a joint operation between Israel’s intelligence service, the Mossad, and the Israeli military. The Lebanese government condemned the attack as “criminal Israeli aggression.”
Israel’s military, which has engaged in tit-for-tat strikes with Hezbollah since the start of the war with Iran-backed Palestinian militant group Hamas in Gaza last year, has refused to comment publicly on the explosions.
The pagers that exploded were new and had been purchased by Hezbollah in recent months, a Lebanese security source told CNN. A Taiwanese manufacturer said on Wednesday the pagers, which bore the company’s mark, had been made by a European distributor.
The Lebanese source did not provide any information on the exact date the pagers were bought or their model.
Experts say the explosions, unprecedented in their scale and nature, underscore Hezbollah’s vulnerability as its communication network was compromised to deadly effect.
Who was affected?
Several areas of the country were affected, particularly Beirut’s southern suburbs, a populous area that is a Hezbollah stronghold.
Footage showed shoppers and pedestrians collapsing in the street following the blasts. The blood-soaked injured bore flesh wounds, clips showed, including lost fingers, damaged eyes, and abdominal lacerations.
At least nine people were killed, including a child, and about 2,800 people were wounded, overwhelming Lebanese hospitals.
Why was Hezbollah using pagers?
Hezbollah has long touted secrecy as a cornerstone of its military strategy, forgoing high-tech devices to avoid infiltration from Israeli and US spyware.
Unlike other non-state actors in the Middle East, Hezbollah units are believed to communicate through an internal communications network. This is considered one of the key building blocks of the powerful group that has long been accused of operating as a state-within-a-state.
At the start of the year, Hezbollah leader Hassan Nasrallah called on members and their families in southern Lebanon, where fighting with Israeli forces across the border has raged, to dump their cellphones, believing Israel could track the movement of the Iran-backed terror network through those devices.
“Shut it off, bury it, put it in an iron chest and lock it up,” he said in February. “The collaborator (with the Israelis) is the cell phone in your hands, and those of your wife and your children. This cell phone is the collaborator and the killer.”
Hezbollah instead went low-tech by turning to pagers, according to Avi Melamed, a former Israeli intelligence official and Middle East analyst.
The pagers would have prompted Hezbollah members to contact one another through those phone lines. But even that option was not without risk.
“Hezbollah regressed back to these devices thinking [they] would be safer for its combatants to use instead of phones which could be GPS targeted,” Melamed said. “These very low-tech devices were used against them and very possibly deepening the stress and embarrassment on its leaders.”
How did the pagers explode?
As Lebanon reels from the attack, speculation has mounted on how low-tech wireless communication devices could have been exploited.
Citing American and other officials briefed on the operation, the New York Times reported Tuesday that Israel hid explosives inside a batch of pagers ordered from Taiwanese manufacturer Gold Apollo and destined for Hezbollah. A switch was embedded to detonate them remotely, it added.
Multiple photos from Lebanon on social media appear to show damaged Gold Apollo pagers.
CNN cannot geolocate the images from social media but has verified they were published on Tuesday, the same day as the explosions. At least one pager shown in the images was a Gold Apollo AR924 model.
Gold Apollo founder Hsu Ching-kuang said its European distributor, a Hungary-based company called BAC Consulting, established a relationship with the Taiwanese firm about three years ago.
At first, BAC only imported Gold Apollo’s pager and communication products, he said. Later, the company told Gold Apollo they wished to make their own pager and asked for the right to use the Taiwanese firm’s brand, he said.
Hsu said Gold Apollo had encountered at least one anomaly in its dealings with the distributor, citing a wire transfer that took a long time to clear.
The AR294 model “is produced and sold by BAC. We only provide brand trademark authorization and have no involvement in the design or manufacturing of this product,” Gold Apollo said in its statement.
CNN has reached out to BAC Consulting and its founder for comment. Budapest-based BAC’s website describes the company as “agents of change with a network of consultants,” finding “innovative solutions” on international relations, the environment, and development and innovation.
Gold Apollo shipped about 260,000 pagers from Taiwan between January 2022 and August 2024 but there is no record of the devices being sent to Lebanon or the Middle East, a senior Taiwanese security official told CNN on Wednesday.
David Kennedy, a former US National Security Agency intelligence analyst, told CNN the explosions seen in videos shared online appear to be “too large for this to be a remote and direct hack that would overload the pager and cause a lithium battery explosion.”
Human operatives inside Hezbollah would have been key to the operation, he added.
“This is one of the most widescale and coordinated attacks that I’ve personally ever seen. The complexity needed to pull this off is incredible,” he said.
“It would have required many different intelligence components and execution. Human intelligence (HUMINT) would be the main method used to pull this off, along with intercepting the supply chain in order to make modifications to the pagers.”
What is the purpose of the attacks?
At least part of the message to Hezbollah is clear: “We can reach you anywhere, anytime, at the day and moment of our choosing and we can do it at the press of a button,” according to CNN’s Chief Law Enforcement and Intelligence Analyst, John Miller.
The operation was also likely designed to create a high-level of paranoia among Hezbollah members, degrade their ability to recruit people, and erode confidence in the leadership of Hezbollah and their ability to secure their operations and people.
Amos Yadlin, a former head of Israeli military intelligence and one of the country’s leading strategic experts, said the Israeli attack displayed “very impressive penetration capabilities, technology and intelligence.”
He speculated on X that Israel could have been sending a warning to Nasrallah.
“It seems the goal was to pass a message that sharpens the dilemma of Nasrallah: how much is he willing to pay for continuing to attack Israel and backing [Hamas leader Yahya] Sinwar?” Yadlin wrote. “The organization, which prides itself on secrecy and a high level of security, found itself penetrated and exposed.”
Asked why Israel might have launched such an attack, Kim Ghattas, a Lebanese journalist and contributing writer to The Atlantic magazine, told CNN that it could be an attempt “to cow Hezbollah into submission, and make clear that an increase of their attacks against Israel will be met with even further violence.”
Or it could be a “prelude to an Israeli large-scale campaign against [Lebanon], at a time when Hezbollah is facing the chaos of this latest very science-fiction-like attack against its operatives.”
Why would Israel want to target Hezbollah?
Israel, which has yet to publicly comment on the deadly incident, leads the list of actors with the intent to degrade Hezbollah, experts say.
It is also one in a small group of countries with the technological ability to infiltrate a supply chain in such a way. “What intelligence service has the demonstrative capability to pull an operation like this off? That’s a very short list with Israel at the top,” said Miller, the CNN analyst.
Israel has been linked to, or accused of, previous remote attacks in the region. Experts believe Israel and the United States were responsible for deploying a complex computer virus called stuxnet that destroyed centrifuges at an Iranian nuclear facility in 2009 and 2010.
In 2020, an Iranian nuclear scientist was assassinated in Tehran by a remote-controlled machine gun operating out of a car that was reportedly using facial recognition. This year, Hamas leader Ismail Haniyeh was killed with an explosive device covertly hidden in the guest house where he was staying in the Iranian capital, a source familiar with the matter told CNN. Iran blamed Israel for the assassinations.
Tuesday’s attack raises tensions in the already inflamed region. Hostilities are at an all-time high between Israel and Hezbollah following Hamas’ October 7 attack on Israel. Hezbollah, which has a formidable arsenal of weapons, has said its attacks on Israel are in solidarity with Hamas and Palestinians in Gaza.
Global leaders have been scrambling to prevent an escalation. US Secretary of Defense Lloyd Austin spoke twice with his Israeli counterpart, Israeli Defense Minister Yoav Gallant, according to two US defense officials.
The official would not specify when the calls took place. Though the two are in regular contact, it’s uncommon to schedule two calls in one day and shows how seriously the US views the current situation.
The-CNN-Wire
™ & © 2024 Cable News Network, Inc., a Warner Bros. Discovery Company. All rights reserved.
CNN’s Christian Edwards, Gianluca Mezzofiore, Jeremy Diamond, Sabrina Shulman, Wayne Chang, Eric Cheung and Jessie Yeung contributed reporting.