When Nadim Kobeissi was a child growing up in Beirut in the early 2000s, sonic booms created by the Israel Defense Forces' planes in the skies above Lebanon would occasionally rattle his home, generating enough noise and concussive force that he and his family would sometimes sleep in the hallways to avoid pieces of glass from shattered windows falling onto them in the night. The psychological effect—which he believes was intentional—was long-lasting. Even years later, after he'd left Lebanon, the sound of fireworks would make him start subconsciously sweating and shaking.
This week, the booms rippling across Lebanon came not from Israeli jets streaking across the sky, but from electronic devices exploding in people's pockets and hands. Yet Kobeissi, now a security researcher based in Paris, says the lingering fear following the attack is familiar: When he speaks to his family members who are still in Lebanon, they tell him that their iPhones have been heating up, and ask whether they're right to be worried.
“They're wondering, is my phone being hacked? Is it going to blow up?” Kobeissi says. “It's worse than the sonic booms, because it's completely novel, and it's almost impossible to explain to them.”
On Tuesday and Wednesday, explosives hidden in thousands of pagers—and later walkie-talkies and other electronic devices—detonated across Lebanon in an apparent attack targeting the membership of the militant group Hezbollah. The unprecedented, stunning operation, which has been widely attributed to Israel despite no claim of responsibility by any Israeli government agency, killed at least 32 people, including at least four children and several hospitals workers, and injured more than 3,300 others, according to the country's health ministry. It flooded Lebanese hospitals with victims—members of Hezbollah and bystanders alike—who have in many cases lost eyes, fingers, and hands. In one instance Wednesday, walkie-talkies exploded at a funeral for three Hezbollah leaders and a child killed the day before, sending waves of panic through the crowd.
Exactly how Israel may have secreted explosive material into so many thousands of gadgets and remotely detonated those payloads remains far from clear. Theories about the operation have come to a consensus, though: that an Israeli intelligence agency likely carried out a supply chain attack that used a Hungarian front company to build devices with batteries laced with the explosive PETN—and even embedded metal ball bearings in pagers' cases to increase the lethality of their payload—before impersonating a legitimate supplier and selling them in Lebanon.
The exact motivation behind the attack still remains the subject of speculation, beyond Israel's escalating tensions with Hezbollah in the midst of its scorched-earth war in Gaza following Hamas' October 7 attack on the country. But the fact that the explosions were largely carried out by weaponizing communication devices is no coincidence, says Bruce Schneier, a security- and surveillance-focused author and researcher who teaches cybersecurity policy at the Harvard Kennedy School of Government. Schneier points out that the psychological effect of the operation, following years of Israeli government and military hacking of its adversaries' smartphones and computers, is to sow paranoia in every last remaining means of communication and coordination that the country's enemies possess.
“They don't trust their smartphones, so they reach back to these more archaic devices, and those blow up. What's next?” says Schneier. “Everything becomes less efficient, because they can't communicate well.”
Schneier describes the paranoia-inducing effect of the operation as a kind of ongoing “tax” on Hezbollah as an organization. “There are a lot of things you can't do if you can't trust your comms,” he says. Schneier compares the end result to the nearly incommunicado state of a hunted figure like Osama bin Laden, who in his final years was reduced to sending messages only via the human couriers who visited his secret compound in Pakistan.
That paranoia, in fact, has been seeded among Lebanon's population for years. Israel's pager- and walkie-talkie-based attacks follow repeated public warnings from Hezbollah leader Hassan Nasrallah about the surveillance dangers of smartphones, given Israeli intelligence's well-known hacking prowess. “Please break it, bury it, lock it up in a metal box,” Nasrallah said in one speech. In another, he appeared on Lebanese television next to an image of an iPhone circled in red with a slash across it. “These are deadly spies,” he warned. Cell phones were reportedly banned from Hezbollah meetings in favor of pagers.
Now the older, alternative devices Hezbollah has fallen back to carry even greater fears of injury or death. And that fear has come to encompass communications electronics more broadly: At Wednesday's funeral for victims of Tuesday's attack, for instance—an event that was itself the target of another attack—attendees were asked to remove the batteries from their phones.
Creating distrust of communication devices within Hezbollah may well be Israel's purposeful tactic of “preparing the battle space” ahead of impending Israeli military operations against Lebanon, says Thomas Rid, a professor of strategic studies at Johns Hopkins University and author of Active Measures, who specializes in disinformation and influence operations. He compares the operation to cyberattacks or physical attacks on “command-and-control” infrastructure at the beginning of a conflict, such as the United States' efforts, documented in former NSA chief Michael Hayden's book Playing to the Edge, to destroy the Iraqi military's fiber-optics-based communications in 2003 in order to “herd” the enemy's military toward more easily intercepted radio-based communications.
“This is taking attacks on command-on-control to a whole new level,” Rid says. “They sent the message: ‘No, we’re not just penetrating these devices and bugging them, we're literally blowing them up, taking away the confidence you might have had in your command-and-control and also in any future devices that you might procure.’”
For Israeli intelligence, Rid notes, the attack also represents a stunning reassertion of its power and public image following its disastrous failure to prevent Hamas' attacks of October 7. “This operation goes a long way in terms of demonstrating that they are, perhaps, the most creative and the most ruthless intelligence establishment on the planet right now,” he says.
Thanks to the collateral damage of Israel's brazen offensive, however, its effects—both physical and psychological—have by no means been limited to Hezbollah operatives. The French-Lebanese security researcher Kobeissi, who now works as the founder and CEO of Paris-based tech firm Symbolic Software, says he's already seen false rumors and misleading videos spread among Lebanese people, suggesting for instance that iPhones, too, are exploding. “People are losing their minds, because it's scary as shit, and that's the point,” he says. “It's impossible to think about this as limiting Hezbollah's communications and capabilities without realizing it's also going to have a terrorizing effect on the adjacent population.”
Kobeissi argues that the attack's collateral damage will shape how a generation of people think about Western technology in Lebanon and beyond. “The average Lebanese person doesn't have a specific understanding of what it means to conduct a supply chain attack,” he says. “What they see is that a device made by an American ally, a device they rely on, may blow up. And it's unfortunate that the Israeli intelligence community didn't consider the knock-on effects that this could have globally.”
Aside from that issue of trust, Israel's attack also represents an escalation, says Harvard's Bruce Schneier—a new kind of attack that, now that it's been demonstrated, is sure to be seen again in some form, perhaps even in an act of retaliation against Israel itself.
“It’s not just Hezbollah that should worry. If I were Ukraine, I’d be worried. If I were Russia, I’d worry. If I were Israel, I’d worry. This doesn’t just go one way,” he says. “Now we all live in a world of connected devices that can be weaponized in unexpected ways. What does that world look like?”