Wassenaar Agreement List
Another difference between the VA and COCOM is the lack of a veto on revisions to these lists. While, under COCOM, each member could veto the easing (or inclusion) of new technologies on the ammunition or ammunition checklists, national governments have room for discretion under the new system to respect the consensus on transfer restrictions. This creates the potential for increasing divergences in the implementation of controls between group members. The content of the rejection notifications for Phase I will be based on the following indicative or indicative list, but will not be limited to it: the plenary has accepted a number of changes to the checklists, including with regard to elements of potential interest to terrorists, such as electronic jammers, unmanned aircraft , and the particular weight was placed on portable air defence systems. The VA stressed that the VA remains committed to transparency and contact with non-participating states and international organizations, with the aim of promoting the VA`s objectives, and noted that the VA made special efforts towards China in 2005. Finally, during the plenary session, the VA decided to publish the VA checklists. The Assembly adopted best practice guidelines on internal compliance programs for dual-use goods and technologies and “Best Practices for the Transfer of Subsequent (Re-Export) Controls for Conventional Weapons Systems.” The European Parliament adopted Mr De Gong`s report (EPP-ED, DE) on the european Parliament and Council`s proposed directive on the protection of persons within the European Union. In addition, the Assembly has made a number of amendments to the checklists. Documents Primary documents, including contractual texts and related memorandums, statements and other related documents.
In December 2013, the list of technologies for exports for limited exports was amended to include internet-based surveillance systems. New technologies under the export control system include intrusion software – software designed to defeat computer or network protections, to extract data or information – and IP network surveillance systems. During the meeting, participating States also reaffirmed their willingness to intensify their efforts to prevent the acquisition of conventional weapons, dual-use goods and other technologies by terrorists. The plenary also approved changes to the checklists. The amendments pay particular attention to objects that may be used for terrorist purposes, such as the export of MANPADS.B.