A Lebanese army bomb disposal specialist wearing a protective gear prepares to detonate a walkie-talkie that was found at the parking of the American University Hospital, in Beirut, on Wednesday. AP
A Lebanese army bomb disposal specialist wearing a protective gear prepares to detonate a walkie-talkie that was found at the parking of the American University Hospital, in Beirut, on Wednesday. AP
A Lebanese army bomb disposal specialist wearing a protective gear prepares to detonate a walkie-talkie that was found at the parking of the American University Hospital, in Beirut, on Wednesday. AP
A Lebanese army bomb disposal specialist wearing a protective gear prepares to detonate a walkie-talkie that was found at the parking of the American University Hospital, in Beirut, on Wednesday. AP

How Israel pager and radio bomb attacks against Hezbollah revive old tactic


Robert Tollast
  • English
  • Arabic

Live updates: Follow the latest on Israel-Gaza

The exploding pager and radio attacks on Hezbollah, while unprecedented in scale, follow a long history of one side in a conflict providing an unsuspecting enemy with rigged or explosive equipment, experts said, pointing to the devastating psychological effects of the assault.

The two waves of attacks killed 32 people, including two children, and wounded about 3,200. The attacks, which have not been claimed by Israel, have dealt a major blow to Hezbollah and pushed fears of all-out war to the highest level since cross-border fire with Israel began on October 8, spurred by the war in Gaza.

“Hezbollah’s members are inevitably going to be really suspicious about whether they can trust the equipment they have or get,” says Larry Regens, a professor of military history who has worked on intelligence projects for numerous US government agencies. “It will create serious problems at least in the short term. The group’s leadership is going to have to replace its existing communications with new devices and figure out how it was compromised.”

Paul McGarr, professor of intelligence studies at the King’s College Centre for the Study of Intelligence in London, outlines just how common the tactic has been.

“In historical terms, efforts to sabotage everyday equipment or materials and transform them into weapons isn't new. The Special Operations Executive developed exploding coal during the Second World War (and also exploding wood), and it was hoped the enemy would throw such devices into industrial furnaces and ship and locomotive boilers and that havoc would ensue. Bizarrely, the SOE also developed fake dead rats packed with explosives for the same purpose, having discovered that factories and ships often disposed of unwanted vermin by throwing them into boilers.”

A demolition class under way in Milton Hall, England, circa 1943 - 1944. Photo: US National Archives and Records Administration
A demolition class under way in Milton Hall, England, circa 1943 - 1944. Photo: US National Archives and Records Administration

About 160 years ago, the tactic was used as the US was torn by conflict, as secessionist southern states sought to stymie their northern enemy, who were richer in raw materials.

“The coal exploding coal idea actually dated to the American Civil War, when Confederate forces had employed the same tactic,” Prof McGarr said. “The results were, at best, minimal, and more of an irritant to enemies than anything. It was, as with the Israeli attack justified primarily a psychological weapon that would sow doubt into the minds of factory workers and force the enemy to invest time and resources in improving the security of its supply chains.”

Modern efforts use fake companies for this end and there has been widespread speculation as to the identity of BAC, a Hungarian firm apparently licensed to build copies of pagers used in the explosions, which were designed by Taiwanese company Gold Apollo. The company firmly denied any knowledge of the plot, while BAC’s website disappeared shortly after the blasts.

The idea of supplying an enemy en masse with compromised communications devices was famously illustrated by the Crypto AG affair. A non-lethal plot, it involved the CIA and West German intelligence agencies buying a Swiss company and maintaining its private sector facade and specialisation in encrypted communications technology. The intelligence agencies controlled every aspect of business, including hiring staff.

From 1971 onwards, the firm sold equipment to Iran, Pakistan and numerous governments in Latin America and Africa – thousands of machines in 120 countries. This enabled the US and West Germany to monitor highly classified cables between foes, or governments of interest, who believed their communications were safely encrypted.

So sophisticated was the operation that many senior staff were unaware of the operation, named Rubikon, until it was investigated by German media in the early 1990s. A separate Cold War effort in the 1980s, Operation Intering, supplied faulty electronics to the Soviets, also through front companies.

The logo of Crypto AG is seen at its headquarters in Steinhausen, Switzerland. Reuters
The logo of Crypto AG is seen at its headquarters in Steinhausen, Switzerland. Reuters

“Some supply chain attacks targeting physical hardware, such as Crypto AG, could be seen to have delivered strategic dividends. But I'd argue this was rare in a Cold War and a post-Cold War context. Cyber supply chain attacks, such as Stuxnet in 2010, have generally proved more impactful,” Prof McGarr says, referring to the Israeli use of a virus on memory sticks smuggled to Iranian nuclear compounds, which crashed computers controlling uranium enrichment.

Many of these attempts to sabotage supply chains are tactically important, Prof McGarr says, but may not have the war-winning strategic effect hoped for.

Kill switches and hidden bombs

Equipping a foe with technology that you can covertly access, and even destroy, was carried over to Afghanistan, where the West and numerous global allies equipped the Mujahideen to fight the Soviet Union.

Aware that some Afghan factions were increasingly radical, the CIA managed to obtain Stinger anti-aircraft missiles, originally given to the Afghans, fearing they would be used against commercial planes by extremists. Some of the weapons were secretly fitted with explosives so they could be remotely disabled in the wrong hands.

The Afghan war became a proxy war in the broader context of the late Cold War. Getty Images
The Afghan war became a proxy war in the broader context of the late Cold War. Getty Images

Other operations have supplied enemies with exploding ammunition. The most well-known example of this was Project Eldest Son, a CIA effort to capture and then dismantle ammunition supplied by China to the Vietnamese Communists. Gunpowder was replaced with high-explosive and ammunition was then covertly inserted into jungle supply dumps secretly by Special Forces.

But the tactic isn’t just something Hezbollah and its Iranian backers should fear. For years, the US worried that adversaries would be able to smuggle defective microchips into military equipment, shutting down high-tech weapons with a signal to a defective semiconductor, one of thousands in a modern jet. The idea was popularised in Ghost Fleet, a 2015 novel by August Cole and Peter Singer, which became required reading at some US military education centres.

A Lockheed Martin F-35 fighter jet at the International Aerospace Exhibition at Schoenefeld Airport, Berlin, on June 5. Reuters
A Lockheed Martin F-35 fighter jet at the International Aerospace Exhibition at Schoenefeld Airport, Berlin, on June 5. Reuters

Today, the US Department of Defence runs a process of evaluating whether semiconductors are tampered with through its Microelectronics Quantifiable Assurance process.

In 2018, there was heated debate as to whether this fear had become reality when engineers at Amazon discovered mysterious chips the size of a grain of rice on circuit boards in servers made by US firm Supermicro, which had production in China. A Bloomberg report later alleged that the chips had been installed covertly by a Chinese intelligence agency, including on devices for the Pentagon. The “spy chips” claim was firmly denied by both Supermicro and the US government.

Mr Regens warns that the West has been far from immune from these tactics.

“Exploding electronics isn't a new way to launch an attack. They just never have had this level of complexity and simultaneous execution. Probably the best previous example was in 1996 when the Israelis modified a phone to target a Palestinian terrorist bomb-maker. Another good example was the failed 2010 attempt by Al Qaeda to use exploding printer cartridges on cargo planes.”

While hugely disruptive, commercial aviation kept going, and Hamas became stronger, something Prof McGarr says Israel would do well to bear in mind.

“Tel Aviv and Washington are cognisant that attacks such as the pager operation are strategically inconsequential, if not strategically damaging. Senior Hezbollah figures don't use electronic communications. Shin Bet know this and in targeting foot soldiers were harvesting low-level intelligence and, when the operation appears to have been compromised, eliminating and injuring individuals that can easily be replaced. Psychologically, Hezbollah has been dealt a blow. But it will recover quickly.”

Prof McGarr says ultimately, these conflicts, sometimes called “irregular,” wars due to the fluid nature of militias involved, can often only be settled politically.

“It will expend time and effort reviewing its supply chain and internal security arrangements. But none of this alters the strategic security or political calculus within the region. While some in Israel and elsewhere might crow over a major success, Netanyahu among them, there are plenty of more sober heads in the security establishments of the US and Israel who will recognise the limitations, and indeed the long-term drawbacks, associated with the pager operation. As with Hamas, a hundred pager-type operations can't substitute for a political settlement.”

Call of Duty: Black Ops 6

Developer: Treyarch, Raven Software
Publisher:  Activision
Console: PlayStation 4 & 5, Windows, Xbox One & Series X/S
Rating: 3.5/5

Top 10 in the F1 drivers' standings

1. Sebastian Vettel, Ferrari 202 points

2. Lewis Hamilton, Mercedes-GP 188

3. Valtteri Bottas, Mercedes-GP 169

4. Daniel Ricciardo, Red Bull Racing 117

5. Kimi Raikkonen, Ferrari 116

6. Max Verstappen, Red Bull Racing 67

7. Sergio Perez, Force India 56

8. Esteban Ocon, Force India 45

9. Carlos Sainz Jr, Toro Rosso 35

10. Nico Hulkenberg, Renault 26

UK%20record%20temperature
%3Cp%3E38.7C%20(101.7F)%20set%20in%20Cambridge%20in%202019%3C%2Fp%3E%0A

Sleep Well Beast
The National
4AD

The candidates

Dr Ayham Ammora, scientist and business executive

Ali Azeem, business leader

Tony Booth, professor of education

Lord Browne, former BP chief executive

Dr Mohamed El-Erian, economist

Professor Wyn Evans, astrophysicist

Dr Mark Mann, scientist

Gina MIller, anti-Brexit campaigner

Lord Smith, former Cabinet minister

Sandi Toksvig, broadcaster

 

What is the FNC?

The Federal National Council is one of five federal authorities established by the UAE constitution. It held its first session on December 2, 1972, a year to the day after Federation.
It has 40 members, eight of whom are women. The members represent the UAE population through each of the emirates. Abu Dhabi and Dubai have eight members each, Sharjah and Ras al Khaimah six, and Ajman, Fujairah and Umm Al Quwain have four.
They bring Emirati issues to the council for debate and put those concerns to ministers summoned for questioning. 
The FNC’s main functions include passing, amending or rejecting federal draft laws, discussing international treaties and agreements, and offering recommendations on general subjects raised during sessions.
Federal draft laws must first pass through the FNC for recommendations when members can amend the laws to suit the needs of citizens. The draft laws are then forwarded to the Cabinet for consideration and approval. 
Since 2006, half of the members have been elected by UAE citizens to serve four-year terms and the other half are appointed by the Ruler’s Courts of the seven emirates.
In the 2015 elections, 78 of the 252 candidates were women. Women also represented 48 per cent of all voters and 67 per cent of the voters were under the age of 40.
 

Mercer, the investment consulting arm of US services company Marsh & McLennan, expects its wealth division to at least double its assets under management (AUM) in the Middle East as wealth in the region continues to grow despite economic headwinds, a company official said.

Mercer Wealth, which globally has $160 billion in AUM, plans to boost its AUM in the region to $2-$3bn in the next 2-3 years from the present $1bn, said Yasir AbuShaban, a Dubai-based principal with Mercer Wealth.

Within the next two to three years, we are looking at reaching $2 to $3 billion as a conservative estimate and we do see an opportunity to do so,” said Mr AbuShaban.

Mercer does not directly make investments, but allocates clients’ money they have discretion to, to professional asset managers. They also provide advice to clients.

“We have buying power. We can negotiate on their (client’s) behalf with asset managers to provide them lower fees than they otherwise would have to get on their own,” he added.

Mercer Wealth’s clients include sovereign wealth funds, family offices, and insurance companies among others.

From its office in Dubai, Mercer also looks after Africa, India and Turkey, where they also see opportunity for growth.

Wealth creation in Middle East and Africa (MEA) grew 8.5 per cent to $8.1 trillion last year from $7.5tn in 2015, higher than last year’s global average of 6 per cent and the second-highest growth in a region after Asia-Pacific which grew 9.9 per cent, according to consultancy Boston Consulting Group (BCG). In the region, where wealth grew just 1.9 per cent in 2015 compared with 2014, a pickup in oil prices has helped in wealth generation.

BCG is forecasting MEA wealth will rise to $12tn by 2021, growing at an annual average of 8 per cent.

Drivers of wealth generation in the region will be split evenly between new wealth creation and growth of performance of existing assets, according to BCG.

Another general trend in the region is clients’ looking for a comprehensive approach to investing, according to Mr AbuShaban.

“Institutional investors or some of the families are seeing a slowdown in the available capital they have to invest and in that sense they are looking at optimizing the way they manage their portfolios and making sure they are not investing haphazardly and different parts of their investment are working together,” said Mr AbuShaban.

Some clients also have a higher appetite for risk, given the low interest-rate environment that does not provide enough yield for some institutional investors. These clients are keen to invest in illiquid assets, such as private equity and infrastructure.

“What we have seen is a desire for higher returns in what has been a low-return environment specifically in various fixed income or bonds,” he said.

“In this environment, we have seen a de facto increase in the risk that clients are taking in things like illiquid investments, private equity investments, infrastructure and private debt, those kind of investments were higher illiquidity results in incrementally higher returns.”

The Abu Dhabi Investment Authority, one of the largest sovereign wealth funds, said in its 2016 report that has gradually increased its exposure in direct private equity and private credit transactions, mainly in Asian markets and especially in China and India. The authority’s private equity department focused on structured equities owing to “their defensive characteristics.”

Living in...

This article is part of a guide on where to live in the UAE. Our reporters will profile some of the country’s most desirable districts, provide an estimate of rental prices and introduce you to some of the residents who call each area home.

Paatal Lok season two

Directors: Avinash Arun, Prosit Roy 

Stars: Jaideep Ahlawat, Ishwak Singh, Lc Sekhose, Merenla Imsong

Rating: 4.5/5

Brief scoreline:

Toss: South Africa, elected to bowl first

England (311-8): Stokes 89, Morgan 57, Roy 54, Root 51; Ngidi 3-66

South Africa (207): De Kock 68, Van der Dussen 50; Archer 3-27, Stokes 2-12

Updated: September 19, 2024, 11:43 AM