SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
Export Controls on
Intrusion Software
Collin Anderson (@CDA)
Tom Cross (@_decius_)
Do Export Controls on Intrusion Software
Threaten Security Research?
Truth is… we don’t know.
(We’re not lawyers and this isn’t legal advice.)
Truth is… the Government doesn’t know.
(At least they are asking questions.)
Truth is… nobody knows.
(We don’t even agree about this...)
Outline:
1. Some Basics
a. What is the problem?
b. How do export controls work generally?
2. How these new Wassenaar rules work
a. IP Network Surveillance Systems
b. Intrusion Software
c. “Technology” for the development of Intrusion Software
3. Implications
a. Could these rules regulate “full disclosure” and “open source?”
b. Do these rules apply to Vulnerability Research?
c. Could these rules regulate coordinated disclosure or bug bounties?
d. Could these rules regulate training classes?
e. What if I leave pen testing tools on my laptop when I travel?
f. What about foreign coworkers or my company’s offices in other countries?
g. What about reverse engineering tools? Debuggers? Exploit generators? Jailbreakers?
h. If I ask BIS for permission, will I get a license?
4. What can we do about it?
The Basics
Surveillance is Big Business!
What’s the problem?
The Problem:
1. The Citizen Lab correctly identified 21 customers of Hacking Team.
2. The US DEA and US Army are customers. DEA are using the technology out of their embassy in Bogota, Colombia.
3. Hacking Team sold its technology to three agencies in Morocco. The Moroccan government's intimidation of civil society… is
nothing more than an attempt to silence legitimate criticism.
4. Hacking Team have been evading the legitimate questions from UN investigators regarding the sale of
technology to Sudan.
5. NICE Systems appears to have sold Hacking Team spyware to Azerbaijan, Uzbekistan, and Denmark.
6. Hacking Team are trying to secure a sale to the Rapid Action Battalion (RAB), a Bangladesh police unit
described by Human Rights Watch as a “death squad” involved in torture and extrajudicial killings.
7. Hacking team reinstated support contracts with the Ethiopian government despite reports of the targeting of Ethiopian US-based
journalists by Hacking Team's spyware.
8. Our lobbying of the Italian government on export controls worked. We wrote to the Italian Ministry of Economic
Development, over 100 parliamentarians, and to the regional Government calling for unilateral export controls on Hacking Team's spyware. We were
successful in that the Italian government implemented the controls that we had been calling for and temporarily suspended Hacking Team's operations,
citing “possible uses concerning internal repression and violations of human rights”.
The Solution:
What is the Wassenaar Arrangement?
How do export controls work in the US?
<-------- ITAR (International Traffic in Arms Regs)
● Governed by the State Department
● Controls Military Items (US Munitions List)
● Includes items for “National Police” forces
● Includes Military Encryption Items
● Includes items that hinder the operation of
adversary electronics
● Includes items that “exploit” the
electromagnetic spectrum (regardless of
transmission medium).
EAR (Export Administration Regulations) -------------------------------------------------------->
● Governed by the US Bureau of Industry and Security (BIS)
● Controls “Dual Use Items” - Civilian items that have military applications
● Includes controls on Cryptography
● The new controls on “Intrusion Software” fit here
Wait, didn’t we win the crypto wars?
License Exception TSU
The New Rules
IP Network Surveillance Systems
5. A. 1. j. IP network communications surveillance systems or equipment, and specially designed components therefor, having all of the
following:
1. Performing all of the following on a carrier class IP network (e.g., national grade IP backbone):
● Analysis at the application layer (e.g., Layer 7 of Open Systems Interconnection (OSI) model (ISO/IEC 7498-1));
● Extraction of selected metadata and application content (e.g., voice, video, messages, attachments); and
● Indexing of extracted data; and
2. Being specially designed to carry out all of the following:
● Execution of searches on the basis of ‘hard selectors’; and
● Mapping of the relational network of an individual or of a group of people.
What is “Intrusion Software?”
“Software” specially designed or modified to avoid detection by ‘monitoring
tools’, or to defeat ‘protective countermeasures’, of a computer or network
capable device, and performing any of the following:
• The extraction of data or information, from a computer or network capable
device, or the modification of system or user data; or
• The modification of the standard execution path of a program or process in
order to allow the execution of externally provided instructions.
● ‘Monitoring tools’: “software” or hardware devices, that monitor system behaviours or processes running on a device. This includes
antivirus (AV) products, end point security products, Personal Security Products (PSP), Intrusion Detection Systems (IDS), Intrusion
Prevention Systems (IPS) or firewalls.
● ‘Protective countermeasures’: techniques designed to ensure the safe execution of code, such as Data Execution Prevention (DEP),
Address Space Layout Randomisation (ASLR) or sandboxing
Is “Intrusion Software” Controlled?
NO
Then what IS controlled?
4. A. 5. Systems, equipment, and components therefore,
specially designed or modified for the generation, operation
or delivery of, or communication with, “Intrusion Software”.
4. D. 4. “Software” specially designed or modified for the
generation, operation or delivery of, or communication with,
“Intrusion Software”.
“Technology” is also controlled
4. E. 1. c. “Technology” for the “development” of “Intrusion
Software”.
Technology - Specific information necessary for the “development”,
“production”, or “use” of a product. The information takes the form of ‘technical
data’ or ‘technical assistance’.
NOTE: “Intrusion Software” itself is NOT controlled, but information necessary
for the “development” of “Intrusion Software” IS controlled, including “technical
data” and “technical assistance.”
The Implications
What about Full Disclosure and Open Source?
15 CFR 734.3 - The following items are not subject to the EAR:
Publicly available technology and software… that:
(i) Are already published or will be published as described in §734.7 of this
part;
(ii) Arise during, or result from, fundamental research, as described in §734.8
of this part;
(iii) Are educational, as described in §734.9 of this part;
Encryption vs. “Intrusion Software” Stuff
Encryption:
● License Exception TSU
● Must be publicly available
● Must be open source
● You must email BIS and notify them
Controlled Stuff related to “Intrusion Software”:
● 15 CFR 734.3(b)(4)
● Must be publicly available
● Does NOT need to be open source
● BIS does NOT need to be notified
Is Vulnerability Research Covered?
BIS, in the federal register: “Technology for the development of intrusion software
includes proprietary research on the vulnerabilities and exploitation of computers and network-
capable devices.”
BIS, in the FAQ on their website: “The proposed rule would not control… Information
about the vulnerability, including causes of the vulnerability.”
BIS, also in the FAQ on their website: “Neither the disclosure of the vulnerability
nor the disclosure of the exploit code would be controlled under the proposed rule.”
However: “The proposed rule would control…
Technical data to create a controllable exploit that can reliably and predictably defeat
protective countermeasures and extract information
Information on how to prepare the exploit for delivery or integrate it into a command and
delivery platform.”
Coordinated Disclosure and Bug Bounties
From the BIS FAQ: “Any technical data sent to an
anti-virus company or software manufacturer with the
understanding that the information will be made publicly
available, would not be subject to the EAR.
However, "technology" that is not intended to be
published would be subject to the control.”
Planning to disclose a mitigation bypass?
Sharing Exploit Toolkit Samples?
If you discover an exploit toolkit in the wild and want to
share it with other infosec professionals or software
vendors across borders, apparently, this may not be
allowed under the proposed rule.
BIS, in their FAQ: “Exploit toolkits would be described in
proposed ECCN 4D004… There are no end user or end use
license exceptions in the proposed rule.”
What about training classes?
On the one hand: Technical data to create a controllable exploit that can reliably and
predictably defeat protective countermeasures and extract information. Information on how to
prepare the exploit for delivery or integrate it into a command and delivery platform.
On the other hand, 15 CFR 734.7(a)(4): Release at an open conference, meeting,
seminar, trade show, or other open gathering.
(i) A conference or gathering is “open” if all technically qualified members of the public are eligible to
attend and attendees are permitted to take notes or otherwise make a personal record (not
necessarily a recording) of the proceedings and presentations.
(ii) All technically qualified members of the public may be considered eligible to attend a conference or
other gathering notwithstanding a registration fee reasonably related to cost and reflecting an intention
that all interested and technically qualified persons be able to attend, or a limitation on actual
attendance, as long as attendees either are the first who have applied or are selected on the basis of
relevant scientific or technical competence, experience, or responsibility (See Supplement No. 1 to
this part, Questions B(1) through B(6)).
Planning to travel outside the USA?
§ 740.14 Baggage (BAG).
(a) Scope. This License Exception authorizes individuals leaving the United States either temporarily
(i.e., traveling) or longer-term (i.e., moving) and crew members of exporting or reexporting carriers to
take to any destination, as personal baggage, the classes of commodities, software and technology
described in this section.
BIS, in the Federal Register: “No license exceptions would be available for these items,
except certain provisions of License Exception GOV, e.g., exports to or on behalf of the United States
Government pursuant to § 740.11(b) of the EAR.”
What about foreign coworkers & offices?
BIS, in their FAQ: “The proposed rule does not provide for any exceptions to
deemed export license requirements.”
BIS on “Deemed Export” - “Release of controlled technology to foreign
persons in the U.S. are "deemed" to be an export to the person’s country or
countries of nationality.”
Also, BIS, in their FAQ: “There is no license exception for intra-company
transfers or internal use by a company headquartered in the United States
under the proposed rule.”
Debuggers and exploit generators?
BIS, in their FAQ: “General purpose tools, such as IDEs, are not described
under proposed ECCN 4D004 because they are not "specially designed" for the
generation of "intrusion software." Some penetration testing tools (FAQ #12)
and exploit toolkits (FAQ #18) are described in proposed ECCN 4D004, as they
are command and delivery platforms for "intrusion software."”
Jailbreaking Software?
BIS, in their FAQ: “If particular jailbreak software did meet all the
requirements for classification under ECCN 4D004 (such as a commercially
sold delivery tool "specially designed" to deliver jailbreaking exploits) then it
would be subject to control and a license would be required to export it from
the United States. Note that if such software were "publicly available," it
would not be subject to the Export Administration Regulations.”
Will I get a license?
BIS, in the Federal Register: “Note that there is a policy
of presumptive denial for items that have or support
rootkit or zero-day exploit capabilities.”
Dave Aitel: “If you are modular in any way, you facilitate
0day. An 0day is just a program after all. So anything that
can execute commands or auto update is now "default
deny" for export.”
What do we do about it?
Comment Period?
At the time these slides were composed, the
open comment period will close before
Defcon, on July 20th, 2015.
However, we anticipate that BIS may extend
this comment period, or open up a new one in
the future.
Key Points:
● At least, the US has published their interpretations and asked for feedback.
○ The Wassenaar Negotiators did not.
○ Many countries in Europe have enacted this without publishing information about how
they plan to interpret it.
● Regulators will probably be responsive to clear, negative impacts the regs will have on:
○ Legitimate information security research.
○ Legitimate computer security work.
○ Legitimate business activity and the economy as a whole.
● Regulators will not be responsive to vitriol or paranoid, overly broad misinterpretations of
their proposed regs.
○ Its important to relate potential problems to the specific statements that regulators
have made about how they interpret the regulations.
Stay Informed:
Federal Register: https://www.federalregister.
gov/articles/2015/05/20/2015-11642/wassenaar-arrangement-2013-plenary-
agreements-implementation-intrusion-and-surveillance-items
BIS FAQ: http://www.bis.doc.gov/index.php/licensing/embassy-faq
Regs list: https://lists.alchemistowl.org/mailman/listinfo/regs

Weitere ähnliche Inhalte

Was ist angesagt?

Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesDavid Shepherd
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersVi Tính Hoàng Nam
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentOnward Security
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityGreat Bay Software
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsRoger Johnston
 
Nova Technical Services Tscm
Nova Technical Services TscmNova Technical Services Tscm
Nova Technical Services Tscmmjbergstrom
 
TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-SweepingPaul Andrews
 
Cybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdCybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdDr. Idris Ahmed
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?Alan Tatourian
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulipTheMindSmith
 
Feisal nanji himss 13 -- finalfinalfinal
Feisal nanji   himss 13 -- finalfinalfinalFeisal nanji   himss 13 -- finalfinalfinal
Feisal nanji himss 13 -- finalfinalfinalFeisal Nanji
 
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksHunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksF _
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingCellebrite
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 

Was ist angesagt? (20)

Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
 
Hacking3e ppt ch06
Hacking3e ppt ch06Hacking3e ppt ch06
Hacking3e ppt ch06
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insiders
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
 
Nova Technical Services Tscm
Nova Technical Services TscmNova Technical Services Tscm
Nova Technical Services Tscm
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-Sweeping
 
Cybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics LtdCybersecurity Presentation by Tecomex Forensics Ltd
Cybersecurity Presentation by Tecomex Forensics Ltd
 
ICS CERT- Incidence Reports
ICS CERT- Incidence ReportsICS CERT- Incidence Reports
ICS CERT- Incidence Reports
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulip
 
Feisal nanji himss 13 -- finalfinalfinal
Feisal nanji   himss 13 -- finalfinalfinalFeisal nanji   himss 13 -- finalfinalfinal
Feisal nanji himss 13 -- finalfinalfinal
 
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT AttacksHunting The Shadows: In Depth Analysis of Escalated APT Attacks
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 

Ähnlich wie DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion software

The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceValdez Ladd MBA, CISSP, CISA,
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsUltraUploader
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxInfosectrain3
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Yuval Sinay, CISSP, C|CISO
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxinfosec train
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisAntonio Parata
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdfSoniaCristina49
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Travis
 

Ähnlich wie DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion software (20)

The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documents
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ht r32
Ht r32Ht r32
Ht r32
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware Analysis
 
security onion
security onionsecurity onion
security onion
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.Infragard HiKit FLASH Alert.
Infragard HiKit FLASH Alert.
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 

Mehr von Felipe Prado

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryFelipe Prado
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...Felipe Prado
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsFelipe Prado
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionFelipe Prado
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101Felipe Prado
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentFelipe Prado
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareFelipe Prado
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...Felipe Prado
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationFelipe Prado
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceFelipe Prado
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionistFelipe Prado
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksFelipe Prado
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityFelipe Prado
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsFelipe Prado
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchFelipe Prado
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...Felipe Prado
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksFelipe Prado
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationFelipe Prado
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncFelipe Prado
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesFelipe Prado
 

Mehr von Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion software

  • 1. Export Controls on Intrusion Software Collin Anderson (@CDA) Tom Cross (@_decius_)
  • 2. Do Export Controls on Intrusion Software Threaten Security Research? Truth is… we don’t know. (We’re not lawyers and this isn’t legal advice.) Truth is… the Government doesn’t know. (At least they are asking questions.) Truth is… nobody knows. (We don’t even agree about this...)
  • 3. Outline: 1. Some Basics a. What is the problem? b. How do export controls work generally? 2. How these new Wassenaar rules work a. IP Network Surveillance Systems b. Intrusion Software c. “Technology” for the development of Intrusion Software 3. Implications a. Could these rules regulate “full disclosure” and “open source?” b. Do these rules apply to Vulnerability Research? c. Could these rules regulate coordinated disclosure or bug bounties? d. Could these rules regulate training classes? e. What if I leave pen testing tools on my laptop when I travel? f. What about foreign coworkers or my company’s offices in other countries? g. What about reverse engineering tools? Debuggers? Exploit generators? Jailbreakers? h. If I ask BIS for permission, will I get a license? 4. What can we do about it?
  • 7. The Problem: 1. The Citizen Lab correctly identified 21 customers of Hacking Team. 2. The US DEA and US Army are customers. DEA are using the technology out of their embassy in Bogota, Colombia. 3. Hacking Team sold its technology to three agencies in Morocco. The Moroccan government's intimidation of civil society… is nothing more than an attempt to silence legitimate criticism. 4. Hacking Team have been evading the legitimate questions from UN investigators regarding the sale of technology to Sudan. 5. NICE Systems appears to have sold Hacking Team spyware to Azerbaijan, Uzbekistan, and Denmark. 6. Hacking Team are trying to secure a sale to the Rapid Action Battalion (RAB), a Bangladesh police unit described by Human Rights Watch as a “death squad” involved in torture and extrajudicial killings. 7. Hacking team reinstated support contracts with the Ethiopian government despite reports of the targeting of Ethiopian US-based journalists by Hacking Team's spyware. 8. Our lobbying of the Italian government on export controls worked. We wrote to the Italian Ministry of Economic Development, over 100 parliamentarians, and to the regional Government calling for unilateral export controls on Hacking Team's spyware. We were successful in that the Italian government implemented the controls that we had been calling for and temporarily suspended Hacking Team's operations, citing “possible uses concerning internal repression and violations of human rights”.
  • 9. What is the Wassenaar Arrangement?
  • 10. How do export controls work in the US? <-------- ITAR (International Traffic in Arms Regs) ● Governed by the State Department ● Controls Military Items (US Munitions List) ● Includes items for “National Police” forces ● Includes Military Encryption Items ● Includes items that hinder the operation of adversary electronics ● Includes items that “exploit” the electromagnetic spectrum (regardless of transmission medium). EAR (Export Administration Regulations) --------------------------------------------------------> ● Governed by the US Bureau of Industry and Security (BIS) ● Controls “Dual Use Items” - Civilian items that have military applications ● Includes controls on Cryptography ● The new controls on “Intrusion Software” fit here
  • 11. Wait, didn’t we win the crypto wars?
  • 14. IP Network Surveillance Systems 5. A. 1. j. IP network communications surveillance systems or equipment, and specially designed components therefor, having all of the following: 1. Performing all of the following on a carrier class IP network (e.g., national grade IP backbone): ● Analysis at the application layer (e.g., Layer 7 of Open Systems Interconnection (OSI) model (ISO/IEC 7498-1)); ● Extraction of selected metadata and application content (e.g., voice, video, messages, attachments); and ● Indexing of extracted data; and 2. Being specially designed to carry out all of the following: ● Execution of searches on the basis of ‘hard selectors’; and ● Mapping of the relational network of an individual or of a group of people.
  • 15. What is “Intrusion Software?” “Software” specially designed or modified to avoid detection by ‘monitoring tools’, or to defeat ‘protective countermeasures’, of a computer or network capable device, and performing any of the following: • The extraction of data or information, from a computer or network capable device, or the modification of system or user data; or • The modification of the standard execution path of a program or process in order to allow the execution of externally provided instructions. ● ‘Monitoring tools’: “software” or hardware devices, that monitor system behaviours or processes running on a device. This includes antivirus (AV) products, end point security products, Personal Security Products (PSP), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) or firewalls. ● ‘Protective countermeasures’: techniques designed to ensure the safe execution of code, such as Data Execution Prevention (DEP), Address Space Layout Randomisation (ASLR) or sandboxing
  • 16. Is “Intrusion Software” Controlled? NO
  • 17. Then what IS controlled? 4. A. 5. Systems, equipment, and components therefore, specially designed or modified for the generation, operation or delivery of, or communication with, “Intrusion Software”. 4. D. 4. “Software” specially designed or modified for the generation, operation or delivery of, or communication with, “Intrusion Software”.
  • 18. “Technology” is also controlled 4. E. 1. c. “Technology” for the “development” of “Intrusion Software”. Technology - Specific information necessary for the “development”, “production”, or “use” of a product. The information takes the form of ‘technical data’ or ‘technical assistance’. NOTE: “Intrusion Software” itself is NOT controlled, but information necessary for the “development” of “Intrusion Software” IS controlled, including “technical data” and “technical assistance.”
  • 20. What about Full Disclosure and Open Source? 15 CFR 734.3 - The following items are not subject to the EAR: Publicly available technology and software… that: (i) Are already published or will be published as described in §734.7 of this part; (ii) Arise during, or result from, fundamental research, as described in §734.8 of this part; (iii) Are educational, as described in §734.9 of this part;
  • 21. Encryption vs. “Intrusion Software” Stuff Encryption: ● License Exception TSU ● Must be publicly available ● Must be open source ● You must email BIS and notify them Controlled Stuff related to “Intrusion Software”: ● 15 CFR 734.3(b)(4) ● Must be publicly available ● Does NOT need to be open source ● BIS does NOT need to be notified
  • 22. Is Vulnerability Research Covered? BIS, in the federal register: “Technology for the development of intrusion software includes proprietary research on the vulnerabilities and exploitation of computers and network- capable devices.” BIS, in the FAQ on their website: “The proposed rule would not control… Information about the vulnerability, including causes of the vulnerability.” BIS, also in the FAQ on their website: “Neither the disclosure of the vulnerability nor the disclosure of the exploit code would be controlled under the proposed rule.” However: “The proposed rule would control… Technical data to create a controllable exploit that can reliably and predictably defeat protective countermeasures and extract information Information on how to prepare the exploit for delivery or integrate it into a command and delivery platform.”
  • 23. Coordinated Disclosure and Bug Bounties From the BIS FAQ: “Any technical data sent to an anti-virus company or software manufacturer with the understanding that the information will be made publicly available, would not be subject to the EAR. However, "technology" that is not intended to be published would be subject to the control.”
  • 24. Planning to disclose a mitigation bypass?
  • 25. Sharing Exploit Toolkit Samples? If you discover an exploit toolkit in the wild and want to share it with other infosec professionals or software vendors across borders, apparently, this may not be allowed under the proposed rule. BIS, in their FAQ: “Exploit toolkits would be described in proposed ECCN 4D004… There are no end user or end use license exceptions in the proposed rule.”
  • 26. What about training classes? On the one hand: Technical data to create a controllable exploit that can reliably and predictably defeat protective countermeasures and extract information. Information on how to prepare the exploit for delivery or integrate it into a command and delivery platform. On the other hand, 15 CFR 734.7(a)(4): Release at an open conference, meeting, seminar, trade show, or other open gathering. (i) A conference or gathering is “open” if all technically qualified members of the public are eligible to attend and attendees are permitted to take notes or otherwise make a personal record (not necessarily a recording) of the proceedings and presentations. (ii) All technically qualified members of the public may be considered eligible to attend a conference or other gathering notwithstanding a registration fee reasonably related to cost and reflecting an intention that all interested and technically qualified persons be able to attend, or a limitation on actual attendance, as long as attendees either are the first who have applied or are selected on the basis of relevant scientific or technical competence, experience, or responsibility (See Supplement No. 1 to this part, Questions B(1) through B(6)).
  • 27. Planning to travel outside the USA? § 740.14 Baggage (BAG). (a) Scope. This License Exception authorizes individuals leaving the United States either temporarily (i.e., traveling) or longer-term (i.e., moving) and crew members of exporting or reexporting carriers to take to any destination, as personal baggage, the classes of commodities, software and technology described in this section. BIS, in the Federal Register: “No license exceptions would be available for these items, except certain provisions of License Exception GOV, e.g., exports to or on behalf of the United States Government pursuant to § 740.11(b) of the EAR.”
  • 28. What about foreign coworkers & offices? BIS, in their FAQ: “The proposed rule does not provide for any exceptions to deemed export license requirements.” BIS on “Deemed Export” - “Release of controlled technology to foreign persons in the U.S. are "deemed" to be an export to the person’s country or countries of nationality.” Also, BIS, in their FAQ: “There is no license exception for intra-company transfers or internal use by a company headquartered in the United States under the proposed rule.”
  • 29. Debuggers and exploit generators? BIS, in their FAQ: “General purpose tools, such as IDEs, are not described under proposed ECCN 4D004 because they are not "specially designed" for the generation of "intrusion software." Some penetration testing tools (FAQ #12) and exploit toolkits (FAQ #18) are described in proposed ECCN 4D004, as they are command and delivery platforms for "intrusion software."”
  • 30. Jailbreaking Software? BIS, in their FAQ: “If particular jailbreak software did meet all the requirements for classification under ECCN 4D004 (such as a commercially sold delivery tool "specially designed" to deliver jailbreaking exploits) then it would be subject to control and a license would be required to export it from the United States. Note that if such software were "publicly available," it would not be subject to the Export Administration Regulations.”
  • 31. Will I get a license? BIS, in the Federal Register: “Note that there is a policy of presumptive denial for items that have or support rootkit or zero-day exploit capabilities.” Dave Aitel: “If you are modular in any way, you facilitate 0day. An 0day is just a program after all. So anything that can execute commands or auto update is now "default deny" for export.”
  • 32. What do we do about it?
  • 33. Comment Period? At the time these slides were composed, the open comment period will close before Defcon, on July 20th, 2015. However, we anticipate that BIS may extend this comment period, or open up a new one in the future.
  • 34. Key Points: ● At least, the US has published their interpretations and asked for feedback. ○ The Wassenaar Negotiators did not. ○ Many countries in Europe have enacted this without publishing information about how they plan to interpret it. ● Regulators will probably be responsive to clear, negative impacts the regs will have on: ○ Legitimate information security research. ○ Legitimate computer security work. ○ Legitimate business activity and the economy as a whole. ● Regulators will not be responsive to vitriol or paranoid, overly broad misinterpretations of their proposed regs. ○ Its important to relate potential problems to the specific statements that regulators have made about how they interpret the regulations.
  • 35. Stay Informed: Federal Register: https://www.federalregister. gov/articles/2015/05/20/2015-11642/wassenaar-arrangement-2013-plenary- agreements-implementation-intrusion-and-surveillance-items BIS FAQ: http://www.bis.doc.gov/index.php/licensing/embassy-faq Regs list: https://lists.alchemistowl.org/mailman/listinfo/regs