19 December 2013
Wassenaar List Controls Intrusion Software
Full report:
http://cryptome.org/2013/12/wassenaar-list-13-1204.pdf
SUMMARY OF CHANGES LIST OF DUAL-USE GOODS & TECHNOLOGIES AND MUNITIONS
LIST
as of 4 December 2013
4.D.4. - new entry for "intrusion software" and new definition
4.E.1.c. - new entry for "intrusion software" and new definition
_____
WA-LIST (13) 1
04-12-2013
THE WASSENAAR ARRANGEMENT
ON
EXPORT CONTROLS FOR CONVENTIONAL ARMS
AND
DUAL-USE GOODS AND TECHNOLOGIES
[Page 209]
Definitions
Cat 4 "Intrusion software"
"Software" specially designed or modified to avoid detection by 'monitoring
tools', or to defeat 'protective countermeasures', of a computer or
networkcapable device, and performing any of the following:
a. The extraction of data or information, from a computer or networkcapable
device, or the modification of system or user data; or
b. The modification of the standard execution path of a program or process
in order to allow the execution of externally provided instructions.
Notes
1. "Intrusion software" does not include any of the following:
a. Hypervisors, debuggers or Software Reverse Engineering (SRE) tools;
b. Digital Rights Management (DRM) "software"; or
c. "Software" designed to be installed by manufacturers, administrators or
users, for the purposes of asset tracking or recovery.
2. Network-capable devices include mobile devices and smart meters.
Technical Notes
1. 'Monitoring tools': "software" or hardware devices, that monitor system
behaviours or processes running on a device. This includes antivirus (AV)
products, end point security products, Personal Security Products (PSP),
Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) or
firewalls.
2. 'Protective countermeasures': techniques designed to ensure the safe execution
of code, such as Data Execution Prevention (DEP), Address Space Layout
Randomisation (ASLR) or sandboxing.
_____
[Page 73]
4. A. 5. Systems, equipment, and components therefor, specially designed
or modified for the generation, operation or delivery of, or communication
with, "intrusion software".
_____
[Page 74]
4. D. 4. "Software" specially designed or modified for the generation, operation
or delivery of, or communication with, "intrusion software".
_____
[Page 74]
4. E. 1.c. "Technology" for the "development" of "intrusion software".
_____
[Page 88]
5. A. 2. a.8. Communications cable systems designed or modified using mechanical,
electrical or electronic means to detect surreptitious intrusion;
Note 5.A.2.a.8. applies only to physical layer security.
|