Donate for the Cryptome archive of files from June 1996 to the present

19 December 2013

Wassenaar List Controls Intrusion Software

Full report: http://cryptome.org/2013/12/wassenaar-list-13-1204.pdf


SUMMARY OF CHANGES LIST OF DUAL-USE GOODS & TECHNOLOGIES AND MUNITIONS LIST

as of 4 December 2013

4.D.4. - new entry for "intrusion software" and new definition

4.E.1.c. - new entry for "intrusion software" and new definition

_____

WA-LIST (13) 1
04-12-2013

THE WASSENAAR ARRANGEMENT
ON
EXPORT CONTROLS FOR CONVENTIONAL ARMS
AND
DUAL-USE GOODS AND TECHNOLOGIES

[Page 209]

Definitions

Cat 4 "Intrusion software"

"Software" specially designed or modified to avoid detection by 'monitoring tools', or to defeat 'protective countermeasures', of a computer or networkcapable device, and performing any of the following:

a. The extraction of data or information, from a computer or networkcapable device, or the modification of system or user data; or

b. The modification of the standard execution path of a program or process in order to allow the execution of externally provided instructions.

Notes

1. "Intrusion software" does not include any of the following:
a. Hypervisors, debuggers or Software Reverse Engineering (SRE) tools;

b. Digital Rights Management (DRM) "software"; or

c. "Software" designed to be installed by manufacturers, administrators or users, for the purposes of asset tracking or recovery.

2. Network-capable devices include mobile devices and smart meters.

Technical Notes

1. 'Monitoring tools': "software" or hardware devices, that monitor system behaviours or processes running on a device. This includes antivirus (AV) products, end point security products, Personal Security Products (PSP), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) or firewalls.

2. 'Protective countermeasures': techniques designed to ensure the safe execution of code, such as Data Execution Prevention (DEP), Address Space Layout Randomisation (ASLR) or sandboxing.

_____

[Page 73]

4. A. 5. Systems, equipment, and components therefor, specially designed or modified for the generation, operation or delivery of, or communication with, "intrusion software".

_____

[Page 74]

4. D. 4. "Software" specially designed or modified for the generation, operation or delivery of, or communication with, "intrusion software".

_____

[Page 74]

4. E. 1.c. "Technology" for the "development" of "intrusion software".

_____

[Page 88]

5. A. 2. a.8. Communications cable systems designed or modified using mechanical, electrical or electronic means to detect surreptitious intrusion;

Note 5.A.2.a.8. applies only to physical layer security.