Skip to content
NUPI skole

Johann Ole Willers

Former employee

Contactinfo and files

Summary

Aktivitet

Hacker telefonen din fra tusenvis av mil unna – uten at du merker det
Podcast

Hacker telefonen din fra tusenvis av mil unna – uten at du merker det

Teknologi som kan overvåke telefonen din kan forhindre terrorisme og kriminalitet. Men hva skjer når teknologien som i utgangspunktet skulle bidra...

  • Defence
  • Security policy
  • Cyber
  • Defence
  • Security policy
  • Cyber
Publications
Publications
Report

Surveillance Technology at the Fair: Proliferation of Cyber Capabilities in International Arms Markets

State cyber capabilities are increasingly abiding by the “pay-to-play” model—both US/NATO allies and adversaries can purchase interception and intrusion technologies from private firms for intelligence and surveillance purposes. NSO Group has repeatedly made headlines in 2021 for targeting government entities in cyberspace, but there are many more companies selling similar products that are just as detrimental. These vendors are increasingly looking to foreign governments to hawk their wares, and policymakers have yet to sufficiently recognize or respond to this emerging problem. Any cyber capabilities sold to foreign governments carry a risk: these capabilities could be used against individuals and organizations in allied countries, or even in one’s home country. Because much of this industry operates in the shadows, research into the industry in aggregate is rare. This paper analyzes active providers of interception/intrusion capabilities within the international surveillance market, cataloguing firms that have attended both ISSWorld (i.e., the Wiretapper’s Ball) and international arms fairs over the last twenty years.1 This dataset mostly focuses on Western firms and includes little on Chinese firms, due to historical under-attendance of Chinese firms at ISSWorld. However, the overarching nature of this work will help policymakers better understand the market at large, as well as the primary arms fairs at which these players operate. This paper identifies companies explicitly marketing interception/intrusion technology at arms fairs, and answers a series of questions, including: what companies are marketing interception/intrusion capabilities outside their headquartered region; which arms fairs and countries host a majority of these firms; and what companies market interception/intrusion capabilities to US and NATO adversaries? The resulting dataset shows that there are multiple firms headquartered in Europe and the Middle East that the authors assess, with high confidence, are marketing cyber interception/intrusion capabilities to US/NATO adversaries. They assume that companies offering interception/intrusion capabilities pose the greatest risk, both by bolstering oppressive regimes and by the proliferation of strategic capabilities.2 Many such firms congregate at Milipol France, Security & Policing UK, and other arms fairs in the UK, Germany, Singapore, Israel, and Qatar. The authors found that 75 percent of companies likely selling interception/intrusion technologies have marketed these capabilities to governments outside their home continent. Five irresponsible proliferators—BTT, Cellebrite, Micro Systemation AB, Verint, and Vastech—have marketed their capabilities to US/NATO adversaries in the last ten years.3 This paper categorizes these companies as potentially irresponsible proliferators because of their willingness to market outside their continents to nonallied governments of the United States and NATO—specifically, Russia and China.4 By marketing to these parties, these firms signal that they are willing to accept or ignore the risk that their products will bolster the capabilities of client governments that might wish to threaten US/NATO national security or harm marginalized populations. This is especially the case when the client government is a direct US or NATO adversary. This globalizing shift is important for two reasons. First, it indicates a widening pattern of proliferation of cyber capabilities across the globe. Second, many firms in the surveillance and offensive cyber capabilities markets have long argued for the legitimacy of their business model by pointing to the perceived legitimacy of their customers; yet, their marketing strategies contradict this argument. As the recent indictment of several former US intelligence personnel working for the United Arab Emirates (UAE) confirms, capabilities originally focusing on one target set may be expanded for other intelligence uses.5 When these firms begin to sell their wares to both NATO members and adversaries, it should provoke national security concerns for all customers. This paper profiles these important trends for their practical security impacts, and to enable further research into this topic. The authors suggest that the United States and NATO create know-your-customer (KYC) policies with companies operating in this space; work with arms fairs to limit irresponsible proliferators’ attendance at these events; tighten export-control loopholes; and name and shame both irresponsible vendors and customers. The authors encourage policymakers to focus their efforts to rein in companies that sell these capabilities directly to adversaries, or those willing to ignore the risk that their capabilities may be misused. The dataset presented below is open for use by others who might similarly seek to bring some measure of light to an industry that remains so insistently in the dark.

  • Defence and security
  • Security policy
  • NATO
  • Cyber
  • Intelligence
  • Peace, crisis and conflict
  • Humanitarian issues
LarsGjevikissuebrief_large.jpg
  • Defence and security
  • Security policy
  • NATO
  • Cyber
  • Intelligence
  • Peace, crisis and conflict
  • Humanitarian issues
Publications
Publications
Chapter

Digital Vulnerabilities and the Sustainable Development Goals in Developing Countries

How does digitalization lead to new kinds of global connections and disconnections in the developing countries? And which role does digitalization play for the UN’s Sustainable Development Goals? This entry focuses on cybersecurity capacity building (CCB) and the sustainability of development processes in developing countries.

  • Cyber
  • Development policy
  • International organizations
  • United Nations
  • Cyber
  • Development policy
  • International organizations
  • United Nations
Publications
Publications
Scientific article

The Political Economy of Policy Vacuums: The European Commission on Demographic Change

Supranational organisations can only confront politico-economic issues that are recognised as important. Typically, issues gain recognition either when they provide an external shock to the system, shaking political actors into action, or when they are framed as important in policy networks concerned with developing the appropriate scientific approach. Ideally political and scientific actors align in creating pressures to recognise the issue as salient and to mobilise organisational responses. Issues differ in their capacity to be driven by both political and scientific pressures, creating crisis management, technocratic, and reform agenda outcomes. Here we explore a further variation, where pressures around an issue are insufficient, creating a policy vacuum. We examine one such policy vacuum in Europe: demographic change. This issue belongs to no particular Directorate-General in the European Commission, but is subject to policy frames from DG EMPL and DG ECFIN. Without sufficient political and scientific pressures, no particular policy position is occupied and advocated despite recognition of the issue’s importance. We discuss the role of policy vacuums and the need for their identification in political economy research.

  • Governance
  • The EU
  • Governance
  • The EU
Bildet viser medlemmer av Free Syrian Army på patrulje.
Research Project
2018 - 2022 (Completed)

The Market for Anarchy

The Market for Anarchy project seeks to better understand how state behaviour is shaped by assessments of and responses to different types of risks....

  • Security policy
  • International economics
  • Conflict
  • Climate
  • Governance
  • International organizations
  • Security policy
  • International economics
  • Conflict
  • Climate
  • Governance
  • International organizations