A1 Vertaisarvioitu alkuperäisartikkeli tieteellisessä lehdessä
Updating the Wassenaar debate once again: Surveillance, intrusion software, and ambiguity
Tekijät: Ruohonen J., Kimppa K.K.
Kustantaja: ROUTLEDGE JOURNALS, TAYLOR & FRANCIS LTD
Julkaisuvuosi: 2019
Journal: Journal of Information Technology and Politics
Tietokannassa oleva lehden nimi: JOURNAL OF INFORMATION TECHNOLOGY & POLITICS
Lehden akronyymi: J INF TECHNOL POLITI
Vuosikerta: 16
Numero: 2
Aloitussivu: 169
Lopetussivu: 186
Sivujen määrä: 18
ISSN: 1933-1681
DOI: https://doi.org/10.1080/19331681.2019.1616646
Tiivistelmä
This paper analyzes a recent debate on regulating cyber weapons through multilateral export controls. The background relates to the amending of the international Wassenaar Arrangement with offensive cyber security technologies known as intrusion software. Implicitly, such software is related to previously unregulated software vulnerabilities and exploits, which also make the ongoing debate particularly relevant. By placing the debate into a historical context, the paper reveals interesting historical parallels, elaborates the political background, and underlines many ambiguity problems related to rigorous definitions for cyber weapons. Many difficult problems remaining for framing offensive security tools with multilateral export controls are also pointed out.
This paper analyzes a recent debate on regulating cyber weapons through multilateral export controls. The background relates to the amending of the international Wassenaar Arrangement with offensive cyber security technologies known as intrusion software. Implicitly, such software is related to previously unregulated software vulnerabilities and exploits, which also make the ongoing debate particularly relevant. By placing the debate into a historical context, the paper reveals interesting historical parallels, elaborates the political background, and underlines many ambiguity problems related to rigorous definitions for cyber weapons. Many difficult problems remaining for framing offensive security tools with multilateral export controls are also pointed out.