Previously, we
wrote several times about the
Wassenaar Agreement , which extends to Western countries. They regulate the rules for selling exploits, spyware, and other dual-use software tools (dual-use technologies) to countries that are not allies of these countries. With the
leakage of data from the Italian cyber group Hacking Team, this issue was even more
relevant , since it sold its cyber-tools to various countries and their special services without exception.

The Wassenaar Agreement places restrictions on the export of software tools, but cannot regulate their use by any of the parties. In May of this year, Russia and China
concluded an agreement on the rules of conduct in cyberspace or an agreement enshrining such behavior at the diplomatic level. The contract itself is public and
posted on the website of the Russian government. Now China can
conclude a similar agreement with the United States.
')

Fig. The first page of the “non-aggression cyberpack” between the Russian Federation and China.
Relatively speaking, the document establishes at the diplomatic level the obligations of the parties that they will not organize state-sponsored cyber attacks against each other, including important infrastructure facilities that can seriously harm the state’s defenses. The document also regulates the fact that its signatories will adhere to certain general cybersecurity rules.
Something similar to the mentioned document can be signed between China and the United States, which is timed to coincide with the visit of the head of China to the United States this month. The document will also regulate the rules of conduct in cyberspace and the rejection of state-sponsored cyber attacks on important infrastructure facilities (banking sector, industrial sector, nuclear facilities, etc.). Studies of leading US security companies show that most cyber attacks on US infrastructure are carried out precisely from China. One of the most awe-inspiring research was
published by FireEye (Mandiant) and was dedicated to the APT1 cyber group.
Chinese cyber groups also specialize in cyber attacks in order to install special backdoors (implants) used to steal intellectual property, which is a constant headache for the US government. This item may be included in the agenda for the discussion of this contract.