Sections

Services

Information

UK United Kingdom

Cold War to cyber war, here’s how weapon exports are controlled

The Financial Times last week reported the UK government is pushing for new restrictions on software – in particular, on tools that would prevent surveillance by the state. This was the focus of negotiations…

The Wassenaar Arrangement was designed for physical weaponry, so can it be extended to digital tools too? powtac

The Financial Times last week reported the UK government is pushing for new restrictions on software – in particular, on tools that would prevent surveillance by the state.

This was the focus of negotiations to incorporate cyber security technologies into the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies.

We can regard those negotiations as an effort to deal with intractable problems in a complex world. Or we could see them as the digital equivalent of King Canute: entertaining, self-involved and rather silly.

Wasse-what?

Wassenaar was born of the Cold War in 1996. The idea was to inhibit the Soviets (and Chinese) by preventing the export of military equipment and the technology that could be used to make, maintain or defeat that equipment.

As the Cold War faded the focus moved to restrictions on exports to countries such as Iraq and Iran. It also reflected anxieties about terrorists gaining access to new ways of killing people.

zesakgraf

Wassenaar takes its name after one of the ritzier suburbs of The Hague, the place VIPs visit year after year for important international negotiations. (It’s much easier to trade in upmarket restaurants that are out of sight of what happens when a drone hits a car, your government engages in chemical warfare or children play hopscotch in a minefield.)

The Arrangement involves 41 of the world’s leading powers, all of which (including those proudly emphasising their neutrality) gain substantial revenue through the sale of military materiel.

What does it do?

It is concerned with restrictions on proliferation of technology that is used in warfare. Its origins are traceable to the first years of last century, where major powers faced a few problems.

They wanted to make money by selling cannons, torpedoes and other high technology but had moments of squeamishness about that equipment getting into the wrong hands.

The same countries emphasising nonproliferation were often arming people on the sly (think former US Marine Corps Lieutenant Colonel Oliver North’s sale of arms to Iran in the mid-1980s), and because much technology can be used for both good and evil.

net_efekt

The software that drives a high precision lathe might be used to make surgical instruments – or something deadly. Conversely, supercomputers useful for developing bombs might have also peaceful functions.

A decade ago the US recognised that in the “age of cyberwarfare” – or a threatened “cybergeddon” in which powerstations would melt down, ATMs and phones would die and sewers would overflow – software might be just as important as bravery and bits of metal.

In particular, it sought to restrict the export of “strong crypto”, software tools that would enable states, businesses and individuals to impede surveillance by law enforcement and national security agencies.

US cyberactivists responded by displaying particular algorithms on T-shirts. Others noted that it was easier to stop the export of a factory than the know-how embodied in five CDs.

What does this mean for us, then?

inoneear

The push to include cybersecurity in Wassenaar negotiations is unlikely to be effective but will reassure nervous politicians and officials.

It will be accepted by much industry, such as the banks, and connectivity providers such as phone companies and internet service providers who are already cooperating with governments and will continue, because they’re legally bound to do so.

What does the push mean for most of us? If you are a terrorist it probably doesn’t mean much, given indications that security services are flooded with information and typically rely on old-fashioned (read: effective) mechanisms – the mole, the anonymous tip-off – rather than decrypting email in a language few spooks understand.

If you’re a human rights advocate you will continue to alert people to tools such as The Onion Router) in an effort to foil the secret police in Syria, China, Indonesia or Saudi Arabia.

If you are the leader of an emerging economy you’ll hope that a friendly nation hasn’t bugged your cabinet room, or assume that it has, or cut a special deal – you give me the illicit code, I give you a trade concession.

There are no easy answers in a wicked world.

Join the conversation

1 Comment sorted by

  1. Ben Marshall

    Writer

    Thanks, Bruce Arnold. Useful summary and context.

    So, let me get this straight - the UK government, having willingly accepted the US has broken net security and installed all kinds of backdoors and malware across the globe and made it possible for criminals and corrupt states to use these backdoors and malware, now proposes to take away ordinary citizens' and business owners' options of restoring some safety to the system?

    I couldn't agree more about effective security intelligence gathering from 'traditional' means, and would make the point that for the diminishing returns of the NSA's illegal data gathering, they are also creating a culture in which the traditional information gathering techniques are less valued and funded, creating a less safe State.

    Am I missing something?

    report