Dual Use Tech Regulation
Dual Use Tech Regulation
An important perspective for us at Data Rights is to be tech-agnostic when long-term solutions are needed. Technologies change, democratic values stay. We see the temptation to reinvent the wheel every time there is a new technology hatching. Often, this temptation needs to be fought. Otherwise civil society and researchers will always be reactive, trying to catch up with the private sector. It is exhausting and frankly, where is our added value in that dynamic?
We particularly feel this regarding dual use technologies. According to the European Commission, dual use items are “goods, software and technology that can be used for both civilian and military applications”. Because these technologies and software have military advantages, States have incentives to push investments and limit regulation for their industry to be ahead of the curve.
Examples of the dual use technologies or software:
- Biometric recognition
- Artificial intelligence (AI)
- Spyware
- Satellite visualisation
Why is this important?
Another way to see dual use technology is to picture it as a powerful technology that is wonderful in times of democratic stability, but is extremely potent if a government decides to use it against its population. Extremely potent in the sense that it can harm a high number of people, quickly (unlike for instance, a knife). Put simply, these are technologies that are amazing, but can quickly become surveillance technology in hands of powerful players. These technologies are often deployed with public money to make the population safer, to avoid fraud, or just to make things simpler. A few examples:
- Uganda's deployment of biometric IDs on its population became a way to surveil it and crackdown on human rights;
- European States are now able to use AI with face recognition for law enforcement purposes. Given how most EU states are gradually increasing surveillance on human rights defenders in the name of law enforcement, this is worrying;
- The used of spyware by States, originally meant for intelligence purposes, quickly became used in Europe to surveil journalists and human rights defenders in countries like Poland, Spain and Hungary.
Methods
Primary means of action for this programme are advocacy and strategic litigation where we can be useful, for instance with third party intervention and/or involvement with litigation strategy.
Status of work
Data Rights' first employee started work a few months ago! Building blocks of this programme are being fleshed out as we write.
Projects
We helped set up a spyware litigation and advocacy coalition; the PEGA coalition. The coalition was officially launched on June 18th 2025, from EDRi's offices. As part of this coalition we already intervened in a Polish case that reached the European Court of Human Rights, the Brezja case. This case's stakes are high as it involves a Pegasus target whose phone communications were extracted, including 10 years of text messages that were later reorganised to rebuild a new narrative. This is a powerful illustration that spyware is a powerful tool to support the tampering with evidence by authorities. Here is our joint intervention.
Still, a past project may be relevant to mention. In 2019 Data Rights' Director, Lori Roussey, was granted the right to intervene in Privacy International's proceedings against the use of hacking by the UK's intelligence, security and cyber agency (the GCHQ). More details in the resources section below, and here.
Resources
- Dual use technology regulation
- Access Now produced a brochure on the topic in 2018
- Quentin M., Paile S., Tsukanova M., and Viski A. 2013. Controlling the Trade of Dual-Use Goods - A Handbook. PIE Peter Lang.
- Sukumar, Arun. 2017. “The UN GGE Failed. Is International Law in Cyberspace Doomed As Well?” Lawfare blog.
- Yasuhara, Yoko. 1991. "The Myth of Free Trade: The Origins of COCOM 1945–1950". The Japanese Journal of American Studies, 4: 127–148. This resource is about the historic root of dual use technologies regulation, at the initiative of the US to weaken the USSR economy.
- Wassenaar Arrangement
- Bratus, Sergey, et al. 2014. “Why Wassenaar Arrangement’s Definitions of Intrusion Software and Controlled Items Put Security Research and Defense At Risk—And How To Fix It”. Computer Science Department, Dartmouth College.
- Galperin, Eva et al. 2015. “What Is the U.S. Doing About Wassenaar, and Why Do We Need to Fight It?” Electronic Frontier Foundation (EFF) website.
- Galperin, Eva et al. 2016. “House Grills State Department Over Wassenaar Arrangement” Electronic Frontier Foundation (EFF) website.
- Granick, Jennifer. 2014. “Changes to Export Control Arrangement Apply to Computer Exploits and More”. Center for Internet and Society, Stanford Law School.
- US Department of Commerce, Bureau of Industry and Security (BIS). 2015. “Wassenaar Arrangement 2013 Plenary Agreements Implementation: Intrusion and Surveillance Items”.
- Wassenaar Arrangement, Secretariat. 1996. Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies. Founding Document. WA-DOC (17) PUB 001.
- Wassenaar Arrangement, Secretariat. 2013. Public Statement 2013 Plenary Meeting of Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies. Vienna.
- Spyware
- Data Rights
- CPDP 2025, panel of spyware and cybersecurity with GFF, Data Rights, cybersecurity expert Sven Herping, former MEP Sophie in 't Veld and Mme Buchta, Closing the Digital Backdoor: Strengthening Vulnerability Management to Combat Spyware, May 21st, 2025
- Data Rights Founder intervention, Privacy International and other vs GCHQ, 2019
- Intervention in Privacy International’s case against the hacking powers of the British NSA, the GCHQ agency. Data Rights’ founder intervened in 2019 to bring information of issues of the French regime on the regulation of hacking by intelligence services. Unfortunately the court did not rule on the substance of the case due to the consideration that all British legal remedies had not been exhausted by Privacy International before they referred the case to the ECtHR. This case was analysing the different hacking capabilities of GCHQ and led the British services to improve their internal accountability. Although unrelated to this case, to give a sense of the activities of GCHQ at the time it is useful to point out that they had hacked into the telecommunications provider of the European Commission, the European Parliament and the European Council, to impress the NSA. To read more on this operation.
- More details on this intervention here.
- PEGA Coalition (Data Rights, HCLU, Iridia, Panoptikon, Homo Digitalis, GFF and Share). 2025. Intervention in the Brejza case before the European Court of Human Rights.
- This case is the Polish Pegasus case currently before the European Court of Human Right (ECtHR). This case’s stakes are high as the previous spyware case before the ECtHR was dismissed by the court. The Brezja case is a case bringing multiple Pegasus targets who were infected on instructions of Polish authorities. Mr Brezja was infected due to his belonging to the political opposition to the far right. Pegasus was used to collect huge amounts of data sets from his phone, including 10 years of texts. Once extracted, this data was rearranged and/or merged by authorities to create a new narrative, and then sent to the press. The goal was to destroy his reputation. Mme Brezja, his attorney, was also infected. This case is a robust illustration of how much powerful spyware in the hand of authorities can lead to egregious abuses of power focussed on tampering with facts to manipulate the public and elections. Last but not least, it is noteworthy that Pegasus was sent on Mr Brezja based on the excuse of the fight against corruption, not the protection of national security. Since then Polish authorities have found that how Pegasus was used violated Polish laws. Although this is a positive development, we see that the Polish government is pushing against the review of the ECtHR of the Polish cases. Pushing back on human rights accountability is not the way forward.
- Exégètes Amateurs, French litigation coalition created by H. Roy and where several members of Data Rights met before creating Data Rights
- Exegetes Amateurs, Brief challenging the Intelligence Laws of France, 2027
- In the context of the Exégètes litigation coalition (French Data Network, Quadrature du net, and FFDN - the federation of non-profit ISPs of France), Data Rights founder Lori Roussey, with the support of Data Rights advisor Hugo Roy, developed in 2017 the coalition’s sections on hacking rules of France’s intelligence services. This work formed part of the case against the entirety of France intelligence rules. This brief of 2017 came one year afer the Exegetes referred the reform of intelligence powers to the French Constitutional Council and won the closure of a surveillance loophole on all wireless communications. Soon after this 2017 brief was sent to the Conseil d’État the case was referred to the EU’s top court, the CJEU. Before the CJEU Privacy International intervened in our case, and this led to the 2020 ruling Quadrature du net et alia. Read Data Rights’ take on the CJEU ruling.
- Read the 2017 brief [FR] to France’s top administrative court, the Conseil d’État, about hacking powers of intelligence services in France. The document is long, you might want to search for keywords: Budapest; Cybercrime; Stuxnet; Wannacry.
- External
- CitizenLab. 2012. “Backdoors are Forever: Hacking Team and the Targeting of Dissent?” The Citizen Lab.
- CitizenLab. 2013. “For Their Eyes Only: The Commercialization of Digital Spying” The Citizen Lab.
- Fidler, Mailyn. 2015. “Regulating the Zero-Day Vulnerability Trade: A Preliminary Analysis.” A Journal of Law and Policy for the Information Society, 11(2):405–83.
- Biometrics
- Roussey L., 2023, Digital ID Litigation & Dual Use presentation at the Alan Turing Institute
- Artificial Intelligence
- To start with, regarding the AI act we recommend Sandra Wachter's paper published in 2024. She summarised it in a helpful video.
- Fang, Lee. 2019. “Google continues investments in military and police AI technology through venture capital arm”. The Intercept.
- Gasler, 2020. “Thousands of contracts highlight quiet ties between Big Tech and U.S. military”. NBC News.
- Wong, J. C., 2019. “'We won't be war profiteers': Microsoft workers protest $480m army contract”. The Guardian.