pwshub.com

Pagers attack brings to life long-feared supply chain threat

The deadly attack that caused thousands of pagers used by members of Hezbollah to explode Tuesday shines a spotlight on an inconvenient truth: It is virtually impossible to secure the modern electronics supply chain against a determined and sophisticated adversary.

Experts callthe Israeli attack unparalleled in the history of spycraft in its scale and casualty count, and believe the risk is low that other governments will follow suit in rigging consumer electronics this way. But the Lebanon attack brings to life a long-theorized, worst-case scenario that has troubled governments including the United States as electronic devices have grown more complex and global supply chains more convoluted.

The incident may add momentum to political efforts from the U.S. and others to localize more production of critical technologies at home or with trusted allies.

“This exposes the kind of risk that we’ve been running,” said Mark Montgomery, former policy director for the Senate Armed Services Committee, “with hardware and software running in countries of concern.” On Wednesday, more deadly explosions rocked Lebanon, with a state news agency saying some occurred in a brand of two-way radio.

Israel has not claimed or denied responsibility for the attack but informed Washington of its specifics after the operation through intelligence channels, according to U.S. officials who spoke on the condition of anonymity to discuss sensitive matters. The exact origins of the deadly Hezbollah pagers remained a mystery on Wednesday.

While the devices bore the brand name of Taiwanese pager manufacturer Gold Apollo Co., the company told reporters the devices were “entirely handled” by a Hungarian company, BAC Consulting KFT. Hungary’s government posted on social media that BAC had no manufacturing site in the country and The Washington Post could not reach BAC for comment.

Much of the world’s electronics supply chain runs through Taiwan, a self-governed island off the coast of China, or through other countries in East Asia. However, construction of the typical modern gadget involves dozens of countries, with a dizzying number of component suppliers, contractors and subcontractors.

“When you have these global marketplaces, it’s sometimes really hard to figure out exactly where something came from,” said Daniel Castro, vice president of the tech policy think tank Information Technology and Innovation Foundation, who previously audited IT security for federal agencies.

After decades of globalization, officials in Washington had begun warning that dependence on overseas manufacturers for everything from batteries to cargo cranes could bring security risks. Both former president Donald Trump and President Joe Biden have pushed to reshore more high-tech production to the United States, in a rare point of policy agreement. Governments in Europe, China and other parts of the world have launched similar drives.

Hezbollah’s use of pagers, a throwback technology, reflected the growing understanding that more advanced electronic devices like smartphones are easily hacked or modified.

“They can’t use mobile phones. They can’t use pagers. They now can’t use radios,” said Nigel Inkster, former director of operations and intelligence for British intelligence agency MI6, of Hezbollah. “It’s going to be very, very difficult for them in the short term to exercise effective command and control.”

How and where the pagers were tampered with is still unclear and such operations can count among governments’ most closely guarded secrets.

One of the most detailed cases publicly known surfaced in 2014, via documents leaked by former National Security Agency contractor Edward Snowden. They described a secret warehouse where NSA workers intercepted electronic devices shipped from U.S. networking supplier Cisco Systems, without the company’s knowledge. Documents and photos indicated that the workers carefully opened the boxes, implanted surveillance devices into the products, and sent them onward to the unsuspecting overseas customers.

Israeli operatives may have used a similar process to intercept pagers after they were shipped from the factory. It’s also possible the pagers were tampered with at the factory, a scenario that could require the involvement and secrecy of a greater number of people. And some supply chain infiltrations have involved cooperation from a manufacturer.

“Ten years later, and shipment security never improved,” Snowden posted on X on Tuesday. He also called the pager bomb operation a “horrific precedent” and “crime,” saying that “everyone in the world is less safe for it.”

Andrew Hammond, a historian at the Washington-based International Spy Museum, said there is a long history of intelligence agents using everyday devices that hide deadly secrets to kill targets, from a poison-tipped umbrella to exploding landline telephones. But he said that an attack on so many individuals at once with modified gadgets appeared to be unprecedented.

“I certainly can’t think of anything that’s happened on this scale,” Hammond said. “It’s almost flabbergasting.”

Israel has used compromised electronic consumer devices against its enemies in the past. In 1996, Yahya Ayyash, a Hamas bombmaker, was killed when he answered a call from a cellphone rigged with explosives, likely placed there by Israeli operatives through a relative of one of Ayyash’s friends. In 2000, an activist from Fatah, the Palestinian political party, was killed when the cellphone he was using exploded.

Israel, working with the U.S., created a cyberweapon called Stuxnet in the late 2000s that infiltrated computers running Iran’s uranium enrichment centrifuges and slowly caused the spinning machines to fail while making it look like an operator error. The computer worm stunned cybersecurity experts with its sophistication, but also inadvertently spread to other industrial control computers around the world.

Like Stuxnet, this week’s pager attack in Lebanon will likely cause security agencies around the world to reassess the potential threats they face. Michael Watt, a supply chain expert with the business risk consultancy firm Kroll, said governments may begin to increase inspections of shipments of consumer goods going in and out of their ports.

“This should be very much a wake up call for national governments to consider any gaps in their own customs controls,” Watt said.

But the complex web of international trade underpinning the electronics industry depends on the fact that most items cross borders with little scrutiny. “That would lead to additional bottleneck of supply chains if all goods need to be additionally inspected,” Watt added.

In recent years, U.S. officials have become increasingly focused on securing U.S. communications systems against intelligence operations or attacks from China. These efforts have included subsidizing domestic production of cell tower technologies and the chips that power communications systems, banning Chinese telecom gear made by the likes of Huawei, and restricting the use of smartphones from Chinese brands by government employees.

Taiwan, a world leader in electronics manufacturing, has generally been viewed in Washington as a dependable friend and a counterbalance to China, but more recently the U.S. has sought to reduce its dependency on the democratic island that nearby China claims as its own territory.

The Biden administration has pushed for the world’s biggest producer of chips, Taiwan’s TSMC, to move some of its operations to the United States to ensure security for U.S. customers. Trump has on the campaign trail blamed Taiwan for stealing the U.S. chip business.

Source: washingtonpost.com

Related stories
2 weeks ago - Loop claims its earplugs take the edge off noise while keeping you in the moment. We tested three models -- here's what we found.
5 days ago - The combat and stylistic user interface are familiar, but the epic story full of fantasy politics may not be what players expect.
3 weeks ago - Prompt injection, ASCII smuggling, and other swashbuckling attacks on the horizon Microsoft has fixed flaws in Copilot that allowed attackers to steal users' emails and other personal data by chaining together a series of LLM-specific...
1 month ago - Eight-year-old domain hijacking technique still claiming victims Dozens of Russia-affiliated criminals are right now trying to wrest control of web domains by exploiting weak DNS services.…
2 days ago - Pagers — Lithium-ion batteries or supply chain attack may be to blame. Enlarge / An ambulance arrives...
Other stories
11 minutes ago - Act fast to grab this high-performing mesh router for less than $500, keeping you connected while saving some cash too.
11 minutes ago - If the old-school PlayStation is dear to your heart, you can soon relive those totally sweet 1990s memories. Sony is releasing a series of products...
11 minutes ago - If you've got an old phone to part with, T-Mobile is offering both new and existing customers the brand-new Apple iPhone 16 Pro for free with this trade-in deal.
12 minutes ago - Who doesn't want the best for their beloved pooch? Grab some of these tasty treats to make your dog feel special.
18 minutes ago - To be fair, Joe was probably taking a nap The Iranian cyber snoops who stole files from the Trump campaign, with the intention of leaking those documents, tried to slip the data to the Biden camp — but were apparently ignored, according...