{"title":"Branching Out: Factors Motivating Nondemocratic Use of Commodity Spyware","authors":"Katharine Palmer","doi":"10.1080/08850607.2023.2202345","DOIUrl":null,"url":null,"abstract":"Abstract Utilizing a conceptual framework of branching in—the ability of the state to utilize internal assets and mechanisms—and branching out—the solicitation of external services—this article introduces several criteria that states must fulfill in order to branch in, namely infrastructure control, offensive cyber capability, and sufficient resources. Subsequently, failure to meet one or more of these criteria forces a branch out toward commodity spyware. Nuances in this argument and the inherent features of commodity spyware also highlight the use of such services even by “branch-in capable” states. The findings within this article offer a broad overview of the factors predilecting state use of commodity spyware, with general applications for both nondemocratic and democratic states.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"2013 1","pages":""},"PeriodicalIF":0.4000,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Intelligence and Counterintelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/08850607.2023.2202345","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
Abstract Utilizing a conceptual framework of branching in—the ability of the state to utilize internal assets and mechanisms—and branching out—the solicitation of external services—this article introduces several criteria that states must fulfill in order to branch in, namely infrastructure control, offensive cyber capability, and sufficient resources. Subsequently, failure to meet one or more of these criteria forces a branch out toward commodity spyware. Nuances in this argument and the inherent features of commodity spyware also highlight the use of such services even by “branch-in capable” states. The findings within this article offer a broad overview of the factors predilecting state use of commodity spyware, with general applications for both nondemocratic and democratic states.