US to renegotiate arms control rule for hacking tools

Image
AP Washington
Last Updated : Mar 01 2016 | 10:28 AM IST
The Obama administration plans to renegotiate portions of an international arms control arrangement so it's simpler to export tools related to hacking and surveillance software, since those technologies are also used to secure computer networks, a lawmaker said.
The rare reconsideration of a rule agreed to in 2013 by 41 countries is set to be included on a December agenda by the United States.
It makes room to more precisely draft ways to control the spread of such hacking tools without the unintended negative consequences for national cybersecurity and research that industry groups and lawmakers have complained about for months.
As one of those 41 member countries of the 1996 Wassenaar Arrangement, which governs the highly technical world of export controls for arms and certain technologies, the United States agreed to restrict tools related to cyber "intrusion software" that could fall into the hands of repressive regimes.
Yesterday, the co-chairman of the Congressional Cybersecurity Caucus, Rep. Jim Langevin issued a statement revealing the administration's decision to ensure countries discuss the removal of language that would broadly sweep up research tools and technology used to create or otherwise support hacking and surveillance software.
"International cybersecurity policy is a new domain, and it is vital that we work together in order to protect our networks from the many threats they face," Langevin said, applauding the effort thus far.
The White House has said it supports making cyber intrusion tools available overseas for legitimate cybersecurity activities. The White House referred questions Monday to the State and Commerce departments, neither of which responded to requests for comment.
Efforts to come up with a workable US rule have highlighted the difficulty of applying the export controls restricting physical items to a virtual world that relies on the free flow of information for network security.
Many companies operate in multiple countries and routinely employ foreign nationals who test their own corporate networks across borders.
In May, the Commerce Department's Bureau of Industry and Security proposed denying the transfer of offensive tools - defined as software that uses "zero-day" exploits, or unpatched new vulnerabilities, and "rootkit" abilities that allow a person administrator-level access to a system.
But in the cyber world, testing a network often requires determining first how to exploit it and attempting to do so.
*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Mar 01 2016 | 10:28 AM IST

Next Story