Turning Everyday Gadgets into Bombs Is a Bad Idea

Ethical status of turning gadgets into bombs

  • Many see these attacks as crossing a new line by weaponizing ubiquitous civilian tech, eroding basic trust in everyday objects.
  • Others argue war has long involved hidden explosives (suicide bombers, car bombs), so this is not qualitatively new, just another delivery mechanism.
  • There is concern that once a “respectable” democracy uses such tactics and major powers endorse it, the tactic becomes normalized and spreads.

Israel–Hezbollah pager/battery attack

  • Some commenters frame the pager operation as an extremely precise strike on militants, with unprecedented militant-to-civilian casualty ratios, and therefore a “legitimate weapon of war.”
  • Others emphasize the civilian injuries (including at least one child killed) and argue this is indistinguishable from terrorism: attacking people in civilian settings using disguised weapons.
  • Disagreement over whether such attacks will actually reduce future violence or simply escalate and inspire copycats.

Norms, war crimes, and terrorism definitions

  • Several argue for quickly stigmatizing and codifying such attacks as war crimes, likening them to chemical weapons: cheap, effective, but largely unused due to taboo.
  • Debate over the definition of terrorism: some stress that using hidden bombs in civilian life by non-state actors clearly fits; others say state use against militants is different.
  • Broader disputes appear over proportionality, “state vs terrorist” double standards, and whether condemning one side while excusing the other is coherent.

Technical feasibility and supply-chain risk

  • The thread reinforces that booby-trapped batteries are technically straightforward, cheap, and very hard to detect; supply-chain insertion is plausible.
  • People worry about downstream effects: phones, laptops, medical devices, remotes, toys, airline safety, and mass recalls or bans if such attacks proliferate.
  • Some predict public and infrastructure resilience (“people will move on”); others foresee major security changes, especially in aviation.

Mitigations: openness vs control

  • One camp argues for open hardware and FLOSS as a partial defense: more auditability, less “black box” trust.
  • Another camp stresses secure, signed firmware and roots of trust controlled by manufacturers as more realistic protection.
  • Both sides acknowledge these measures are incomplete against sophisticated state or criminal actors and that tamper-evident design may be necessary but hard.