Last news in Fakti

Bozhidar Bojanov: After the strike against Hezbollah, let's think about our army, police, customs and special services

Not everything can explode, but everything can transmit information

Sep 18, 2024 10:11 81

Bozhidar Bojanov: After the strike against Hezbollah, let's think about our army, police, customs and special services  - 1

Eight victims and thousands injured in Lebanon after the pagers that "Hezbollah" benefit, have exploded at the same time.

I will comment on this attack from the point of view of national security challenges: this looks like a so-called. "supply chain attack" (attack through the supply chain) and raises serious questions about the security of every device that is used in every unit of the public sector and especially the power structures and the objects of the critical infrastructure.

This commented on "Facebook" Bozhidar Bojanov.

Anyone who buys hardware and software should have full information not only about the manufacturer, but also where the main parts come from, where and who writes the software and where and who assembles it, and what security standards they apply. These checks are not only technological, but also of the ownership and connections of persons in management positions.

Not everything can explode, but everything can transmit information. Both on the Internet, if there is connectivity, and in other ways, in physical proximity. It is likely that the pagers received a message at the same time that activated them, and previously sent information unnoticed.

In this vein, there are concerns about the customs scanners ordered by the office. Along the same lines were my concerns about the validators in the subway, which turned out to be Russian. At first glance and "pager attack" it may sound comical like a "Russian validator", but the risks are serious.

National security agencies are required to monitor such details and analyze supply chains (physical and virtual) to prevent incidents. I don't expect anyone to blow something up in Bulgaria, but breaches for the purpose of extracting information or shutting down systems for the purpose of causing trouble are quite possible.