
Spyware As A Service: Challenges In Applying Export Controls To Cloud-Based Cyber-Surveillance Software – Analysis
By Kolja Brockmann and Lauriane Héau
For all their legitimate law-enforcement and intelligence-gathering uses, cyber-surveillance tools are prone to abuse. Among other things, they can be used by states to target political opponents or to oppress certain ethnic or religious groups, or to steal an adversary’s data or...