Updating the Wassenaar Debate Once Again: Surveillance, Intrusion Software, and Ambiguity

06/05/2019
by   Jukka Ruohonen, et al.
0

This paper analyzes a recent debate on regulating cyber weapons through multilateral export controls. The background relates to the amending of the international Wassenaar Arrangement with offensive cyber security technologies known as intrusion software. Implicitly, such software is related to previously unregulated software vulnerabilities and exploits, which also make the ongoing debate particularly relevant. By placing the debate into a historical context, the paper reveals interesting historical parallels, elaborates the political background, and underlines many ambiguity problems related to rigorous definitions for cyber weapons. Many difficult problems remaining for framing offensive security tools with multilateral export controls are also pointed out.

READ FULL TEXT
research
03/10/2022

Cyber security and the Leviathan

Dedicated cyber-security functions are common in commercial businesses, ...
research
12/13/2018

A Demand-Side Viewpoint to Software Vulnerabilities in WordPress Plugins

WordPress has long been the most popular content management system (CMS)...
research
07/02/2021

Reinforcement Learning for Feedback-Enabled Cyber Resilience

The rapid growth in the number of devices and their connectivity has enl...
research
02/01/2021

Using a Cyber Digital Twin for Continuous Automotive Security Requirements Verification

A Digital Twin (DT) is a digital representation of a physical object use...
research
11/14/2020

Do Cyber Capabilities and Cyber Power Incentivize International Cooperation?

This paper explores a research question about whether defensive and offe...
research
08/20/2018

The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities

In spite of the growing importance of software security and the industry...
research
10/04/2018

PIMS: A Partitioning-Based Intrusion Management System for Relational Databases

Data-intensive applications exhibit increasing reliance on Database Mana...

Please sign up or login with your details

Forgot password? Click here to reset