19 December 2013
Wassenaar List Controls Intrusion Software
SUMMARY OF CHANGES LIST OF DUAL-USE GOODS & TECHNOLOGIES AND MUNITIONS
as of 4 December 2013
4.D.4. - new entry for "intrusion software" and new definition
4.E.1.c. - new entry for "intrusion software" and new definition
WA-LIST (13) 1
THE WASSENAAR ARRANGEMENT
EXPORT CONTROLS FOR CONVENTIONAL ARMS
DUAL-USE GOODS AND TECHNOLOGIES
Cat 4 "Intrusion software"
"Software" specially designed or modified to avoid detection by 'monitoring
tools', or to defeat 'protective countermeasures', of a computer or
networkcapable device, and performing any of the following:
a. The extraction of data or information, from a computer or networkcapable
device, or the modification of system or user data; or
b. The modification of the standard execution path of a program or process
in order to allow the execution of externally provided instructions.
1. "Intrusion software" does not include any of the following:
a. Hypervisors, debuggers or Software Reverse Engineering (SRE) tools;
b. Digital Rights Management (DRM) "software"; or
c. "Software" designed to be installed by manufacturers, administrators or
users, for the purposes of asset tracking or recovery.
2. Network-capable devices include mobile devices and smart meters.
1. 'Monitoring tools': "software" or hardware devices, that monitor system
behaviours or processes running on a device. This includes antivirus (AV)
products, end point security products, Personal Security Products (PSP),
Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) or
2. 'Protective countermeasures': techniques designed to ensure the safe execution
of code, such as Data Execution Prevention (DEP), Address Space Layout
Randomisation (ASLR) or sandboxing.
4. A. 5. Systems, equipment, and components therefor, specially designed
or modified for the generation, operation or delivery of, or communication
with, "intrusion software".
4. D. 4. "Software" specially designed or modified for the generation, operation
or delivery of, or communication with, "intrusion software".
4. E. 1.c. "Technology" for the "development" of "intrusion software".
5. A. 2. a.8. Communications cable systems designed or modified using mechanical,
electrical or electronic means to detect surreptitious intrusion;
Note 5.A.2.a.8. applies only to physical layer security.