It is a huge technical operation to intercept an order and replace it with modified devices without the target knowing. Particularly when the target has to be extra careful in ordering things in the first place to avoid sanctions.
In contrast sending out an “execute order 66” message is pretty trivial to trigger them
This wasn’t an interception. The devices were designed and manufactured by Israeli intelligence. They just licensed out brandnames through shell companies, and convinced Hezbollah to buy models from their agents by conventional spycraft.
Not a ton is known, by from what I understand the explosives were part of a secondary board added to the pagers, which would also have the ability to listen for a separate signal or look for a specific one the pager received.
Well, they had to make room inside for the high explosive charge, so it was never going to be a slight change to an off-the-shelf product. There’s not typically a lot of dead space in a pager.
I saw some videos about how strong C4 actually is. A single capacitor could in theory hold the payload we have seen. That would also hide it if the device were opened.
There are videos capturing lots of explosions going off simulataneously. Since pagers already can recieve messages and these devices were deeply infiltrated, they likely added a special trigger message to set them off. THis could also allow other scenarios, like only setting off one (for whatever reason).
Well yes but then you’d have to send all those messages, not too hard for a big organisation, but to make a specific message trigger it you would have to do something to the chips on it. And that’s what I’m wondering.
If they can plant explosives they can 100% tap into the circuit or maybe reprogram the board. The CIA is known to be able to do this to specific devices by plucking them from the mail. Mossad could likely do their own production run and ship that to Hezbollah.
I wonder about the technical part of this.
Was it timer based?
Was it based upon which number sent a message?
A lot of the ideas I have would require a huge technical operation, instead of the “just added explosives” angle.
It is a huge technical operation to intercept an order and replace it with modified devices without the target knowing. Particularly when the target has to be extra careful in ordering things in the first place to avoid sanctions.
In contrast sending out an “execute order 66” message is pretty trivial to trigger them
How would this message trigger the explosive?
Taking control of a shipping container, opening all of pagers and adding some explosives is obvious and not too hard for people with that power.
Replacing all the chips, or hacking their firmware, is different, and is what I’m asking about.
Most bombs that use a phone as the trigger use the speaker for example. But in these pagers that would have already set off loads.
This wasn’t an interception. The devices were designed and manufactured by Israeli intelligence. They just licensed out brandnames through shell companies, and convinced Hezbollah to buy models from their agents by conventional spycraft.
Yes, more evidence comes to light.
I believe they triggers a cell in the LIPO batteries to overheat causing the explosive material to explode.
Not a ton is known, by from what I understand the explosives were part of a secondary board added to the pagers, which would also have the ability to listen for a separate signal or look for a specific one the pager received.
Thanks. This is more along the lines of what I’m interested in.
A custom made board for this increases the difficulty and size of this operation by a lot.
Well, they had to make room inside for the high explosive charge, so it was never going to be a slight change to an off-the-shelf product. There’s not typically a lot of dead space in a pager.
I saw some videos about how strong C4 actually is. A single capacitor could in theory hold the payload we have seen. That would also hide it if the device were opened.
Is there data on what the payload actually was?
I don’t think there is at the moment.
May have been done at the source of the manufacturing.
Not sure that falls under “intercepted”
There are videos capturing lots of explosions going off simulataneously. Since pagers already can recieve messages and these devices were deeply infiltrated, they likely added a special trigger message to set them off. THis could also allow other scenarios, like only setting off one (for whatever reason).
Well yes but then you’d have to send all those messages, not too hard for a big organisation, but to make a specific message trigger it you would have to do something to the chips on it. And that’s what I’m wondering.
If they can intercept the message where it isn’t encrypted, they can simply sniff the messages coming on the page and wait for their signal.
Then, they can trigger the explosive to a specific message.
That’s a wild guess though.
If they can plant explosives they can 100% tap into the circuit or maybe reprogram the board. The CIA is known to be able to do this to specific devices by plucking them from the mail. Mossad could likely do their own production run and ship that to Hezbollah.
Yes I want to know more.