

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
The wassenaar arrangement is an international agreement aimed at managing the risks to regional and global security arising from the trade of conventional arms and dual-use goods and technologies. The impact of the wassenaar arrangement on the cyber-security industry, specifically the proposed restrictions on cyber-weapons such as intrusion malware, exploits, and ip surveillance products. Participating countries include australia, austria, belgium, and others.
Typology: Study Guides, Projects, Research
1 / 3
This page cannot be seen from the preview
Don't miss anything!
The Wassenaar Arrangement
In light of the end of the Cold War, individuals from the previous COCOM trade control administration perceived that COCOM's East-West center was no more the proper premise for fare controls. There was a need to build up another course of action to manage dangers to provincial and global security and solidness identified with the spread of routine weapons and double utilize products and innovations. (Genesis of the Wassenaar Arrangement, 2016)
The WA was intended to advance transparency, trade of perspectives and information and more prominent obligation in exchanges of routine arms and double utilize products and innovations, accordingly forestalling destabilizing aggregations. It supplements and strengthens, without duplication, the current administrations for non-multiplication of weapons of mass demolition and their conveyance frameworks, by concentrating on the dangers to global and provincial peace and security which may emerge structure exchanges of combat hardware and touchy double utilize merchandise and advances where the dangers are judged most prominent.
Countries like Australia, Austria, Belgium, Canada, the Czech Republic, Denmark, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Japan, Luxembourg, the Netherlands, New Zealand, Norway, Poland, Portugal, the Russian Federation, the Slovak Republic, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States participated in meeting held at Wassenaar, Netherlands, on 18 and 19 December 1995. (The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies, 1995).
[Type here]
The Wassenaar Arrangement controlling the sale of technology and software which could be used as weapons is threatening the choke the cyber-security industry, according to a consortium of cyber-security companies.
The US Commerce Department’s Bureau of Industry and Security (BIS) proposed changes to the Wassenaar arrangement on May 20. The change would apply Wassenaar Arrangement controls to software and tools commonly used by security researchers and penetration testers. Penetration testers are hacker’s companies hire to find vulnerabilities in their network and products. The proposed change is designed to stop human rights abuses and ensure dissident groups, or internationally blacklisted states, cannot be sold surveillance software, or cyber-attack tools, by
tools to numerous law enforcement agencies, including the US Federal Bureau of Investigation (FBI) and UK National Cime Agency (NCA). Google is also concerned the legislation would hamper researchers' ability to share information and delay the discovery of new software vulnerabilities – a development that would leave general web users more vulnerable to attack by hackers. “It’s through diligent research that we uncover and fix bugs — like Heartbleed and Poodle — that can cause serious security issues for web users around the world,” read Google’s statement. (Stevenson, 2015, July)