Skip to content
Search

Latest Stories

News

Playing With (Digital) Fire

Playing With (Digital) Fire

As any fan of martial arts knows, one of the best moves is to take an attacker's weapon and turn it back on them. In 2016, that's just what Beijing did – in cyberspace: after American operatives used a particular bit of code to attack Chinese computer systems, Chinese hackers took it, repurposed it, and used it to attack a bunch of US allies, according to The New York Times.

The technical details of the story are fascinating, but it also raises some big political questions:


If countries can't control their cyber arsenals, can they at least establish some ground rules for how they are used? Avoiding a destructive free-for-all in cyberspace may depend on it. But hacking tools aren't like conventional or nuclear arms, where countries have agreed to enforceable limits on capabilities and behavior. They're invisible, with no real way to count them or verify they've been destroyed, and prone to being stolen.

And despite an ongoing attempt by the US and its allies to deter bad behavior by indicting hackers, imposing sanctions, and even threatening military force in response to malicious cyber-attacks, there's nothing in cyberspace comparable to the doctrine of mutually assured destruction that has helped deter and prevent conflicts between nuclear-armed powers.

Why is that so difficult? For one thing, it's relatively easy to hide your identityor get hired guns to do your bidding in cyberspace – making it hard for the victims of cyber-attacks to be 100 percent confident in targeting their response.

There's also a lot of mischief that state-backed hackers can get up to that is short of outright war, but can still hurt an adversary (think: swiping personal data that can help identify spies or stealing trade secrets). Governments don't want to give those capabilities up. This helps explain why attempts to establish widely agreed, enforceable "cyber norms" have made limited progress, despite 15 years of wrestling with the issue at the UN.

The upshot: We already knew the US was struggling to secure its cyber arsenal. Now we know that just using a cyber weapon means there's a risk it'll be stolen and used by someone else. As more countries gain access to these tools, reaching a basic agreement on rules of behavior will become even more important.

More For You

​Chief Superintendent of the police force's National Security Department Steve Li Kwai-wah speaks at the West Kowloon Magistrates' Courts building after the verdict in the national security collusion trial of pro-democracy media tycoon Jimmy Lai, in Hong Kong, China, on December 15, 2025.

Chief Superintendent of the police force's National Security Department Steve Li Kwai-wah speaks at the West Kowloon Magistrates' Courts building after the verdict in the national security collusion trial of Jimmy Lai, founder of the now-defunct pro-democracy newspaper Apple Daily, in Hong Kong, China, on December 15, 2025.

REUTERS/Lam Yik
156: After a 156-day trial, Hong Kong’s High Court found media tycoon Jimmy Lai guilty on national security charges on Monday. Lai, who advocated for democracy in the semi-autonomous Chinese city before the 2019 crackdown, now faces life imprisonment. The decision is another blow for Hong Kong’s pro-democracy movement. [...]
People pay respects at Bondi Pavilion to victims of a shooting during a Jewish holiday celebration at Bondi Beach, in Sydney, Australia, December 15, 2025.

People pay respects at Bondi Pavilion to victims of a shooting during a Jewish holiday celebration at Bondi Beach, in Sydney, Australia, December 15, 2025.

REUTERS/Hollie Adams
Australia’s Jewish community in mourning againA Hanukkah celebration at Australia’s Bondi Beach yesterday turned into a bloodbath when a pair of gunmen opened fire on the crowd, killing 15 and injuring dozens more. It was the worst mass shooting in Australia since 1996, a massacre that prompted the country to impose strict gun laws. The toll this [...]
An ally under suspicion

Donald Trump at the NATO Summit in Brussels, Belgium. - 25/05/2017 - Belgium / Brussels - Julien Mattia / Le Pictorium.

Julien Mattia via Reuters Connect
In an unprecedented move last week, Denmark labeled its ally the United States as a potential security risk. A report by the Danish Defense Intelligence Service argued Washington is using its economic and military power to “assert its will,” creating new security risks for Europe and for Greenland, Denmark’s semi-autonomous territory.NATO allies [...]
​Then-US President George W. Bush with then-People's Republic of China President Jiang Zemin following their meeting at Bush's ranch in Crawford, Texas, on October 25, 2002.

Then-US President George W. Bush waves as he stands with then-People's Republic of China President Jiang Zemin after the two gave statements to the press following their meeting at Bush's ranch in Crawford, Texas, on October 25, 2002.

Twenty-five years ago, Destiny’s Child, NSYNC, and Britney Spears were atop the US charts, “Google” was a little known search website with a weird name, and two things happened that would shape the world we live in today, where populism defines politics and great power competition is back. First, Congress passed a bill that paved the way for China [...]