Export control on cybertechnologies

Authors

Abstract

This article seeks to analyze the different positions and reactions emanating from the incorporation of cybertechnologies into the Wassenaar Arrangement list. On that basis, it is intended to reflect to what extent it is feasible and convenient to regulate the transfer of this type of information technology, and especially, perform it through an international regime that has as an essential objective the fight against the proliferation of weapons. It is finally the difference in the nature of goods—cybertechnologies vs. traditional weapons—, the characteristics of the definitions incorporated and the lack of consensus and norms around cybersecurity which has generated opposition to the amendment and problems in its implementation.

Keywords:

Cybertechnologies, proliferation, export control, dual use, intrusion soft- ware, cybertechnologies, proliferation, export control, dual use, intrusion software

Author Biography

Camila Javiera Hernández, Investigadora Independiente

Cientista política. Licenciada en Ciencia Política por la Pontificia Universidad Católica de Chile. Magíster en Conflicto, Seguridad y Desarrollo por el King’s College, Reino Unido.

References

Adi, Mohammad-Munir (2013). The usage of social media in the Arab Spring. Berlín: LIT Verlag Münster.

Álvarez, Daniel y Francisco Vera (2017). «Ciberseguridad y derechos humanos en América Latina». En Agustina del Campo (compiladora), Hacia una internet libre de censura 2: Perspectivas en América Latina. 1.ª ed. Buenos Aires: Universidad de Palermo.

Anderson, Collin (2015). Considerations on Wassenaar Arrangement control list additions for surveillance technologies. Nueva York: Access. Disponible en http://bit.ly/2kUQIpM.

Beck, Michael, Cassady Craft, Seema Gahlaut y Scott Jones (2002). Strengthening multilateral export controls: A non proliferation priority. Athens: Center for International Trade and Security, Universidad de Georgia. Disponible en http://bit.ly/2xVkMen.

Bratus, Sergey, DJ Capelis, Michael Locasto y Anna Shubina (2014). «Why Wassenaar’s definitions of intrusion software and controlled items put security research and defense at risk, and how to fix it». Comentario público. Disponible en http://bit.ly/2JGmS6u.

Bohnenberger, Fabian (2017). «The proliferation of cyber surveillance technologies: Challenges and prospects for strengthened export controls». Strategic Trade Review, 4: 81-102. Disponible en http://bit.ly/2M7gH9X.

Bonarriva, Joanna, Michell Koscielski y Edward Wilson (2009). «Export controls: An overview of their use, economic effects, and treatment in the global trading system». Documento de trabajo ID-23. Disponible en http://bit.ly/2Mbn1xi.

Bronowicka, Joanna y Ben Wagner (2015). «Between international relations and arms controls: Understanding export controls for surveillance technologies». Przegląd Politologiczny, 3: 153-165. DOI: 10.14746/pp.2015.20.3.11.

Crail, Peter (2006). «Implementing UN Security Council Resolution 1.540». The Non-proliferation Review, 13 (2): 355-399. DOI: 10.1080/10736700601012193.

Dullien, Tomas, Vicenzo Iozzo y Mara Tam (2015). «Surveillance, software, security, and export controls: Reflections and recommendations for the Wassenaar Arrangement licensing and enforcement officers meeting». Informe. Disponible en http://bit.ly/2sPk4tt.

Flynn, Cristin y Brian Fletcher (2016). «Export controls and cybersecurity tools: Renegotiating Wassenaar». RSA Conference, 20 a 22 de julio de 2016. Singapur. Disponible en http://bit.ly/2sRtzIC.

Fuhrmann, Matthew (2008). «Exporting mass destruction? The determinants of dual-use trade». Journal of Peace Research, 45 (5): 633-652. DOI: 10.1177/0022343308094324.

Herr, Trey (2016). «Malware counter-proliferation and the Wassenaar Arrangement». Octava Conferencia Internacional sobre Ciber Conflicto. DOI: 10.2139/ssrn.2711070.

Herr, Trey y Paul Rosenzweig (2015). «Cyber weapons and export control: Incorporating dual use with the prep model». Journal of National Security Law & Policy, 8 (2): 1-19. DOI: 10.2139/ssrn.2501789.

Heupel, Monica (2007). «Implementing UN Security Council Resolution 1.540: A division of labor strategy». Carnegie Papers, 87: 1-21. Disponible en http://ceip.org/2HwamBD.

Hibbs, Mark (2011). The future of the nuclear suppliers group. Washington DC: Carnegie Endowment for International Peace.

Hirschhorn, Eric (2010). The export control and embargo handbook. Nueva York: Oxford University Press.

Kraig, Michael (2009). United Nations Security Council Resolution 1.540 at the crossroads: The challenge of implementation. Muscatine: The Stanley Foundation. Disponible en http://bit.ly/2LA0I3c.

McGuire, Cheri (2016) «Prepared testimony and statement for the record of Cheri F. McGuire». Presentación ante el Comité de la Cámara de Estados Unidos sobre Seguridad Nacional, Subcomité sobre Ciberseguridad, Protección de Infraestructura y Tecnologías de Seguridad, 12 de enero de 2016. Disponible en http://bit.ly/2xRwN4J.

Pyetranker, Innokenty (2015). «An umbrella in a hurricane: Cyber technology and the December 2013 Amendment to the Wassenaar Arrangement». Northwestern Journal of Technology and Intellectual Property, 13 (2): 154-179. Disponible en http://bit.ly/2kZ7mVy.

Ramírez Morán, David (2016). «La ciberseguridad en el contexto del arreglo de Wassenaar». Boletín IEEE, 1: 270-276. Disponible en http://bit.ly/2kWyxjF.

Rodríguez, Aldo (2014). Bienes intangibles, licencias y regalías. Ciudad de México: LAWGIC.

Sidel, Victor y Barry Levy (2007). «Proliferation of nuclear weapons: Opportunities for control and abolition». American Journal of Public Health, 97 (9): 1.589-1.594. DOI: 10.2105/AJPH.2006.100602.

Stinnett, Douglas, Bryan Early, Cale Horne y Johannes Karreth (2011). «Complying by denying: Explaining why States develop nonproliferation export controls». International Studies Perspectives, 12 (3): 308-326. DOI: 10.1111/j.1528-3585.2011.00436.x.

Wagner, Ben (2012). After the Arab Spring: New paths for human rights and the internet in European foreign policy. Bruselas: Unión Europea. Disponible en http://bit.ly/2kZ9Tz2.