New to the mailing list, sorry if this is formatted improperly.

Does the 'intrusion software' category include open-source stuff like
Metasploit?

Also, how will this affect software security testing by private companies?
Many infosec consulting companies have in-house proprietary software for
pentesting.


On Wed, Jan 8, 2014 at 1:38 PM, <d...@geer.org> wrote:

>
> Keying off of one phrase alone,
>
>  > This combat is about far more than crypto...
>
> I suggest you immediately familiarize yourself with last month's
> changes to the Wassenaar Agreement, perhaps starting here:
>
>
> http://oti.newamerica.net/blogposts/2013/international_agreement_reached_controlling_export_of_mass_and_intrusive_surveillance
>
> Precis: Two new classes of export prohibited software:
>
> Intrusion software
>
>     "Software" specially designed or modified to avoid detection
>     by 'monitoring tools', or to defeat 'protective countermeasures',
>     of a computer or network capable device, and performing any of
>     the following:
>
>     a. The extraction of data or information, from a computer or
>     network capable device, or the modification of system or user
>     data; or
>
>     b. The modification of the standard execution path of a program
>     or process in order to allow the execution of externally provided
>     instructions.
>
> IP network surveillance systems
>
>     5. A. 1. j. IP network communications surveillance systems or
>     equipment, and specially designed components therefor, having
>     all of the following:
>
>     1. Performing all of the following on a carrier class IP network
>     (e.g., national grade IP backbone):
>
>     a. Analysis at the application layer (e.g., Layer 7 of Open
>     Systems Interconnection (OSI) model (ISO/IEC 7498-1));
>
>     b. Extraction of selected metadata and application content
>     (e.g., voice, video, messages, attachments); and
>
>     c. Indexing of extracted data; and
>
>     2. Being specially designed to carry out all of the following:
>
>     a. Execution of searches on the basis of 'hard selectors'; and
>
>     b. Mapping of the relational network of an individual or of a
>     group of people.
>
>
> All the same arguments that applied exportation bans for crypto
> software apply here, especially that of pointlessness.
>
> --dan
>
> [ Software doesn't spy on people; people spy on people ]
>
> _______________________________________________
> cryptography mailing list
> cryptography@randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
>
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to