Hezbollah Pager Explosion Incident
On September 17, 2024, a series of explosions occurred across Lebanon involving hundreds of pagers used by Hezbollah. Similar explosions involving radios were reported the following day on September 18. Hezbollah’s decision to use pagers and radios instead of smartphones, due to concerns about internal wiretapping, had long been known. However, this explosion incident suggests that even these alternative means may have become targets of Israeli operations.

Many of the exploded pagers were identified as products from the Taiwanese company “Gold Apollo.” However, the company denied responsibility, claiming that the products were manufactured under a licensing agreement by the Hungarian company “BAC Consulting KFT.” The Hungarian government also emphasized that BAC did not possess manufacturing facilities within its borders, further complicating the issue. Meanwhile, the exploded radios bore the label “ICOM,” but Japan’s ICOM stated that the devices were not their genuine products but counterfeit.
Military Information Warfare and Possible Israeli Involvement
This incident is not merely a defect in communication devices but is evaluated as an example of military information warfare and the vulnerabilities in supply chain security. Western media suggest that Israel’s Unit 8200, a cyber warfare division, is likely behind this operation. Unit 8200 has a history of disrupting the communication networks of adversaries, and analysts widely believe this incident is another example of its efforts to neutralize Hezbollah’s communication networks. According to reports from The New York Times and Reuters, Israel allegedly used a shell company to implant PETN explosives in 5,000 pagers purchased by Hezbollah, which were then remotely detonated. This is viewed as a new form of information warfare, surpassing mere wiretapping to physically eliminate the enemy’s military equipment.
Supply Chain Security Vulnerabilities and Threats
The background enabling such attacks lies in the vulnerabilities of supply chain security. As global electronic supply chains become more complex, the likelihood of malicious interference during production and distribution increases. This incident has demonstrated that states or groups targeting specific equipment can embed explosives or remote-controlled systems during the manufacturing process. It signals the need to redefine traditional cybersecurity concepts. The era has arrived where monitoring and verification across hardware security and the entire supply chain are essential, far beyond the scope of defending against simple hacking.

International Response and Strengthening Supply Chain Security
The international community has recognized the threats posed to supply chain security and is gradually establishing stronger countermeasures. Earlier this year, the United States passed a law banning the import of certain products, citing cases where surveillance and hacking capabilities were discovered in Chinese applications and CCTV equipment. The European Union has also strengthened its inspections of supply chain security concerning critical infrastructure within its member states. Similarly, South Korea has introduced the “SW Supply Chain Security Roadmap” to block the domestic entry of foreign products that could threaten national security. These measures are not merely about enhancing security but are part of an international strategy to control supply chains.
Future Outlook and Challenges
It is anticipated that the competition to maintain technological superiority will grow increasingly fierce. This recent incident highlights how hardware-based attacks can transcend the scope of IT security, reaffirming that supply chain security is directly tied to national security. Consequently, governments and relevant organizations worldwide are pushing forward policies to strengthen supply chain security, while military and intelligence agencies are likely to actively consider strategies to weaponize supply chains. The future international order is expected to evolve beyond traditional military conflicts, transforming into a new type of battlefield where technology and information are intertwined.