Can phones be rigged to explode like the pagers in Lebanon? Experts say it's possible but unlikely - Action News
Home WebMail Saturday, November 23, 2024, 08:04 PM | Calgary | -12.0°C | Regions Advertise Login | Our platform is in maintenance mode. Some URLs may not be available. |
World

Can phones be rigged to explode like the pagers in Lebanon? Experts say it's possible but unlikely

Given the deadly explosions of pagers owned by members of Hezbollah this week, many smartphone users are asking if their devices could also be remotely set to explode. While it's technically possible, experts say the level of technology and more rigorous security processes involved in phone manufacturing mean it's unlikely.

Concern understandable given deadly detonations, but experts say smartphones more secure than pagers

Men and women stand outside a coffee shop on a busy city street. They are all looking at their phones.
People use their phones outside a coffee shop in Toronto in July 2022. The explosions of pagers used by Hezbollah in Lebanon earlier this week has raised questions about the safety of smartphones, but security experts say the level of technology and more rigorous security for phones means it's unlikely they could be compromised in the same way. (Cole Burston/The Canadian Press)

The series of deadly explosions of devices owned by Hezbollah membersthis week has raised some questions about whether the average smartphone owner should be concerned that theirdevice could also be remotely set to explode.

But security experts are downplaying the potential threat posed by such devices, saying it's highly improbable that the average person's phone is at risk of exploding like the pagers and walkie-talkies that blew up in Lebanon this week, killing dozens and wounding around 3,000.

"Theconcern is understandable and it's technically possible, but it's generally unlikely," saidHadis Karimipour,Canada Research Chair in secure and resilient cyber-physical systems at the University of Calgary.

She and other security experts say it's important to note that outside agents had gained physical access to the pagers and modified them before they exploded.

Although Israel has neither confirmed or denied its involvement in the explosions,it iswidely believedthat intelligence officials from the country were responsible for the attacks.

It is believed the devices may have beenintercepted at some point in the manufacturing supply chain, where an explosive was inserted, along with some kind of trigger mechanism. Or, as was reported by the New York Times,the devices were manufactured by a front company.

WATCH | Hezbollah leader Hassan Nasrallah addresses attacks, blames Israel:

Pager attacks crossed 'red lines,' Hezbollah chief says

7 days ago
Duration 0:20
Hezbollah leader Hassan Nasrallah accused Israel on Thursday of targeting thousands of pagers in a wave of attacks that hit Lebanon this week. Israel has neither confirmed nor denied its involvement in the explosions.

Major brands have strong security

Either way, Karimpour says, "that's something that needs a high level of sophistication and intention,"and she notesthat it's "not something that can happen" during theregular smartphone manufacturing process.

For a smartphone to be similarly compromised, Karimipour says, it would require access to the phones at the hardware level within the manufacturing chain.

She saysit's "very, very difficult" to get access to this process with major brands because of the level of quality control.

Remains of an exploded pager on display on a surface.
A photo taken Wednesday in Beirut's southern suburbs shows the remains of pagers that exploded. Hundreds of devices used by Hezbollah members exploded across Lebanon over two days this week, killing dozens and wounding thousands more in blasts that the Iran-backed militant group blamed on Israel. (AFP/Getty Images)

Difficult to add explosives to phones

Josep Jornet, a professor of electrical and computer engineering at Northeastern University and the associate director of the school's Institute for the Wireless Internet of Things, says it's also important to note that the technology used in pagers is very old.

If you opened an old electronic device, for example, Jornet says you'd be able to see most of the components and potentially add something by hand.

But with a smartphone, he says just opening it can be a challenge as it's sealed to be waterproof. However, once opened, you'd find many black chips, or integrated circuits on a piece of silicon.

"It's very hard to to do something to a phone at that level with your hands without someone noticing," he said. "So it's going to be very difficult to add explosives to your phones."

WATCH |How were devices used by Hezbollah made to explode?:

How did attackers turn Hezbollah's devices into bombs?

8 days ago
Duration 2:42
After a second wave of deadly explosions in Lebanon, experts are now analyzing how attackers were able to penetrate Hezbollahs security to rig thousands of pagers and other devices with explosives.

However, Jornet did say that it would be possible for highly skilled individuals to take control of your phone remotely, whether or not there's an explosive inside.

Once they have control, they may be able to send unwanted images and messages from your phone or wipe it clean, Jornet says, but that doesn't mean they could make the device explode, unless they had already physically manipulated it.

"Even if you say, 'But maybe they can do something soit overheats.' Allthe phones today have failsafesthat even if they get really hot, they will just switch off."

Phone supply chains more secure

Richard Forno, assistant director of the University of Maryland, Baltimore County's Center for Cybersecurity, suggested people can trust thattheir smartphoneshaven't been tampered with because the supply chains andmanufacturing processes for them are much more secure.

For example, he says Apple doesn'tgive a contract out to just any company in China. According to Forno, Apple would require these companies to have due diligence,proper security, employee vettingand a host of othermeasures.

"Apple actively monitors every step of the manufacturing process, which includes randomlytesting what comes off the assembly line," Forno said.

A uniformed worker wearing gloves reaches for a part on an circuit board assembly line as others work around him.
Workers assemble parts on the production line at the Foxconn complex where some iPhones are made in the southern Chinese city of Shenzhen on May 26, 2010. Experts note that smartphone makers require the companies they use to build the devices to have due diligence,proper security, employee vettingand a host of othermeasures. (Kin Cheung/The Associated Press)

He noted that for those in the West, the security of the supply chain is not a huge concern. However, if someone buys a phone from aback-end dealer off a shady website, he says it would be difficult to know where they're sourcing their materials from.

"That might be a cause for concern. Forthe average person, their iPhone, their Pixel phone,I have faith in the supply chain overseen by Google and Apple."

How to protect your phone

Still,Karimipour says that despite the low probabilityof our phones becomingdangerous explosive devices,there are actionspeople can take to ensuresmartphoneswon't be compromised.

Most importantly, she says,people need to stick withestablishedmanufacturers and trusted retailers.

"Generally, trusted companies have better quality control and it's more likely to detect if there is any tampering."

She saysit's also important to regularly update the software on your phone and to use security features like multi-factor authentication, where users must provide a password and additionalidentityverification likeafingerprint, to gain access to their device or accounts.

Taking these basic security steps makes it more difficult for outside actors to gainremote access to your devices, she says, noting that it's also important to keep your phonein a secure place and take good care of it so that"noone can physically manipulate it or remove the battery."