Bureau of Industry and Security May 20, 2015 – Federal Register Recent Federal Regulation Documents

Wassenaar Arrangement 2013 Plenary Agreements Implementation: Intrusion and Surveillance Items
Document Number: 2015-11642
Type: Proposed Rule
Date: 2015-05-20
Agency: Department of Commerce, Bureau of Industry and Security
The Bureau of Industry and Security (BIS) proposes to implement the agreements by the Wassenaar Arrangement (WA) at the Plenary meeting in December 2013 with regard to systems, equipment or components specially designed for the generation, operation or delivery of, or communication with, intrusion software; software specially designed or modified for the development or production of such systems, equipment or components; software specially designed for the generation, operation or delivery of, or communication with, intrusion software; technology required for the development of intrusion software; Internet Protocol (IP) network communications surveillance systems or equipment and test, inspection, production equipment, specially designed components therefor, and development and production software and technology therefor. BIS proposes a license requirement for the export, reexport, or transfer (in-country) of these cybersecurity items to all destinations, except Canada. Although these cybersecurity capabilities were not previously designated for export control, many of these items have been controlled for their ``information security'' functionality, including encryption and cryptanalysis. This rule thus continues applicable Encryption Items (EI) registration and review requirements, while setting forth proposed license review policies and special submission requirements to address the new cybersecurity controls, including submission of a letter of explanation with regard to the technical capabilities of the cybersecurity items. BIS also proposes to add the definition of ``intrusion software'' to the definition section of the EAR pursuant to the WA 2013 agreements.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.