Refereed journal article or data article (A1)
Updating the Wassenaar debate once again: Surveillance, intrusion software, and ambiguity
List of Authors: Ruohonen J., Kimppa K.K.
Publisher: ROUTLEDGE JOURNALS, TAYLOR & FRANCIS LTD
Publication year: 2019
Journal: Journal of Information Technology and Politics
Journal name in source: JOURNAL OF INFORMATION TECHNOLOGY & POLITICS
Journal acronym: J INF TECHNOL POLITI
Volume number: 16
Issue number: 2
Start page: 169
End page: 186
Number of pages: 18
ISSN: 1933-1681
DOI: http://dx.doi.org/10.1080/19331681.2019.1616646
Abstract
This paper analyzes a recent debate on regulating cyber weapons through multilateral export controls. The background relates to the amending of the international Wassenaar Arrangement with offensive cyber security technologies known as intrusion software. Implicitly, such software is related to previously unregulated software vulnerabilities and exploits, which also make the ongoing debate particularly relevant. By placing the debate into a historical context, the paper reveals interesting historical parallels, elaborates the political background, and underlines many ambiguity problems related to rigorous definitions for cyber weapons. Many difficult problems remaining for framing offensive security tools with multilateral export controls are also pointed out.
This paper analyzes a recent debate on regulating cyber weapons through multilateral export controls. The background relates to the amending of the international Wassenaar Arrangement with offensive cyber security technologies known as intrusion software. Implicitly, such software is related to previously unregulated software vulnerabilities and exploits, which also make the ongoing debate particularly relevant. By placing the debate into a historical context, the paper reveals interesting historical parallels, elaborates the political background, and underlines many ambiguity problems related to rigorous definitions for cyber weapons. Many difficult problems remaining for framing offensive security tools with multilateral export controls are also pointed out.