On Tuesday (today), hundreds of members of the Lebanese terrorist group Hezbollah sustained serious injuries when their communication pagers exploded in southern Lebanon and the suburbs of Beirut, according to security sources reported by Reuters.
What Happened?
A journalist from Reuters witnessed ten Hezbollah members bleeding from wounds in the Dahiyeh area of southern Beirut. A high-ranking Lebanese security official disclosed to Al-Hadath that Israeli operatives infiltrated the communication systems of these devices and triggered the explosions.
Iranian ambassador Mojtaba Amani was reportedly injured in one of the blasts, as stated by the state-owned Mehr News agency. A Hezbollah official, who spoke on condition of anonymity, labeled the incident as the “largest security breach” the group has experienced during nearly a year of conflict with Israel.
Reports indicate that the pagers were called before the explosions to maximize the likelihood that recipients would answer, resulting in more severe injuries. The detonated devices were the latest models recently acquired by Hezbollah, according to three security sources.
Ambulances were seen racing through the southern suburbs of Beirut amidst widespread panic, with residents reporting ongoing explosions even 30 minutes after the initial incidents. The Lebanese Health Ministry urged health workers to report to hospitals, as broadcasted by the Arab media channel NBN.
An Al-Jazeera security source confirmed that the communication devices used by Hezbollah operatives exploded in multiple locations across Lebanon, including Beqaa and southern regions. Another Lebanese security official claimed that Israel hacked into Hezbollah’s radio communication system, causing the detonations.
Who Done This
While Al-Hadath reported that the Israel Defense Forces (IDF) remotely triggered the devices using advanced technology, Israel has not claimed responsibility for the explosions.
Some experts suggested that Israeli Intelligence force 8200 is behind the act or the Israeli Mossad, if we assume that the action were done not via digital attack (hacking into the system, overloading the system, overheating the batteries to fire or explosion) than it unlucky to be the job of the Israel intelligence famous unit of 8200. And is more luckily a work of ground units like the Mossad.
Pagers like Apollo programmable AL-A25 are not equipment with gear enough to explode on themself without some manufactured changes into them. With a simple battery of 1 AA battery it’s also unlikely to be a source of fire or explosion as well. in addition,
How Pager Works?
Pre cell phones became widespread, pagers were a go-to communication device. Though pagers can vary in features and functionality, the basic process of how they work is relatively simple.
When you purchase a pager, it’s assigned a phone number. When someone calls that number, the call is directed to a paging operator. Typically, the caller enters a phone number they want the pager owner to call back, but more on that later.
The paging operator then uses specialized equipment to broadcast a strong radio signal—much stronger than typical cellphone signals. This signal contains information specifically identifying the targeted pager.
Although all pagers in the broadcast area receive the signal, only the intended pager responds by alerting the user with the message.
There are different types of pagers and paging protocols, which means the information displayed can vary. Some pagers, like those used in restaurants, may only be programmed to turn on or off. Others display a phone number for the user to call, and advanced models can receive full text messages.
One key feature of a pager is that it only receives signals; it doesn’t send them. However, some devices, such as certain cell phones, can function like pagers while also sending responses.
I am a software engineer with 20 years of experience of writing code, Software languages, Large scale web application, security and data protection of online digital assets in various software systems and services. I’ve decided to write and share my interests in cyber security online and information security to help and improve white hat security, safety and privacy of our online digital assets, As companies, as individuals or experts providing services. In here you’ll be able to read freely about cyber security threats, detections, common problems, services, news and everything related to information security and cyber security – enjoy and feel free to contact me via the contact page for any question.