Turning Everyday Gadgets into Bombs Is a Bad Idea
Ethical status of turning gadgets into bombs
- Many see these attacks as crossing a new line by weaponizing ubiquitous civilian tech, eroding basic trust in everyday objects.
- Others argue war has long involved hidden explosives (suicide bombers, car bombs), so this is not qualitatively new, just another delivery mechanism.
- There is concern that once a “respectable” democracy uses such tactics and major powers endorse it, the tactic becomes normalized and spreads.
Israel–Hezbollah pager/battery attack
- Some commenters frame the pager operation as an extremely precise strike on militants, with unprecedented militant-to-civilian casualty ratios, and therefore a “legitimate weapon of war.”
- Others emphasize the civilian injuries (including at least one child killed) and argue this is indistinguishable from terrorism: attacking people in civilian settings using disguised weapons.
- Disagreement over whether such attacks will actually reduce future violence or simply escalate and inspire copycats.
Norms, war crimes, and terrorism definitions
- Several argue for quickly stigmatizing and codifying such attacks as war crimes, likening them to chemical weapons: cheap, effective, but largely unused due to taboo.
- Debate over the definition of terrorism: some stress that using hidden bombs in civilian life by non-state actors clearly fits; others say state use against militants is different.
- Broader disputes appear over proportionality, “state vs terrorist” double standards, and whether condemning one side while excusing the other is coherent.
Technical feasibility and supply-chain risk
- The thread reinforces that booby-trapped batteries are technically straightforward, cheap, and very hard to detect; supply-chain insertion is plausible.
- People worry about downstream effects: phones, laptops, medical devices, remotes, toys, airline safety, and mass recalls or bans if such attacks proliferate.
- Some predict public and infrastructure resilience (“people will move on”); others foresee major security changes, especially in aviation.
Mitigations: openness vs control
- One camp argues for open hardware and FLOSS as a partial defense: more auditability, less “black box” trust.
- Another camp stresses secure, signed firmware and roots of trust controlled by manufacturers as more realistic protection.
- Both sides acknowledge these measures are incomplete against sophisticated state or criminal actors and that tamper-evident design may be necessary but hard.