Playing With (Digital) Fire

As any fan of martial arts knows, one of the best moves is to take an attacker's weapon and turn it back on them. In 2016, that's just what Beijing did – in cyberspace: after American operatives used a particular bit of code to attack Chinese computer systems, Chinese hackers took it, repurposed it, and used it to attack a bunch of US allies, according to The New York Times.

The technical details of the story are fascinating, but it also raises some big political questions:

If countries can't control their cyber arsenals, can they at least establish some ground rules for how they are used? Avoiding a destructive free-for-all in cyberspace may depend on it. But hacking tools aren't like conventional or nuclear arms, where countries have agreed to enforceable limits on capabilities and behavior. They're invisible, with no real way to count them or verify they've been destroyed, and prone to being stolen.

And despite an ongoing attempt by the US and its allies to deter bad behavior by indicting hackers, imposing sanctions, and even threatening military force in response to malicious cyber-attacks, there's nothing in cyberspace comparable to the doctrine of mutually assured destruction that has helped deter and prevent conflicts between nuclear-armed powers.

Why is that so difficult? For one thing, it's relatively easy to hide your identityor get hired guns to do your bidding in cyberspace – making it hard for the victims of cyber-attacks to be 100 percent confident in targeting their response.

There's also a lot of mischief that state-backed hackers can get up to that is short of outright war, but can still hurt an adversary (think: swiping personal data that can help identify spies or stealing trade secrets). Governments don't want to give those capabilities up. This helps explain why attempts to establish widely agreed, enforceable "cyber norms" have made limited progress, despite 15 years of wrestling with the issue at the UN.

The upshot: We already knew the US was struggling to secure its cyber arsenal. Now we know that just using a cyber weapon means there's a risk it'll be stolen and used by someone else. As more countries gain access to these tools, reaching a basic agreement on rules of behavior will become even more important.

More from GZERO Media

- YouTube

Frederic Werner discusses the importance of AI for global impact at the 2025 AI for Good Summit in Geneva, in an exclusive Global Stage interview with GZERO's Tony Maciulis. They discuss the future of AI and its role in solving humanity's challenges, from harnessing quantum computing to closing the digital divide.

- YouTube

Elon Musk wants to start a new political party and it’s already making waves. In this episode of Ian Bremmer’s Quick Take, Ian unpacks Musk’s so-called “America Party,” driven by Musk’s frustration with both Republicans and Democrats.

UK Prime Minister Keir Starmer and Mayor of London Sadiq Khan leave the St Paul’s Cathedral, where a service of commemoration took place to mark the 20th anniversary of the deadly July 7, 2005, London bombings in which four suicide bombers targeted London's public transport system, in London, United Kingdom, on July 7, 2025.
REUTERS/Chris J. Ratcliffe
- YouTube

As Independence Day approaches, President Trump is delighted to learn that one of America's most ferocious revolutionaries has... mellowed out. #PUPPETREGIME

Demonstrators with US and Ukrainian flags rally near the U.S. Capitol ahead of President Donald Trump’s address to a joint session of Congress in Washington, D.C., USA, on March 4, 2025.

Matrix Images/Gent Shkullaku

Here’s a short guide to making sense of why the US cut shipments of Patriot interceptor missiles to Kyiv and how it could affect the course of the Russia-Ukraine war.