June 28, 2005 - Above the Law
by Jeff Moss
A popular
issue for the world's top security researchers is
the unique relationship between security practices
and their legal implications. Every aspect of today's
security involves some form of legality. The justice
system has allowed governments to enforce encryption
bans, corporations to file mass lawsuits for identity
thefts, and the U.S. Congress to debate the need for
federal preemption. Jennifer
Granick and Robert
Clark continuously offer fresh perspectives on
the ever
changing legal landscape. This Black Page is dedicated
to why I miss crime.
Get Out of Jail, Free.
by Jennifer Granick posted June 28, 2005
Computer
security isn’t just about keeping networks safe,
its about keeping yourself safe from nebulous criminal
laws and civil liabilities that may attach to various
computer research activities. This past year, we’ve
seen video game companies legally
challenge coders who tinker with the way their
games appear, Sybase threaten
NGSSoftware over the publication of security flaws
and the USA
Patriot Act come up for renewal. These issues
and more impact your life and work. Knowledge is power,
and in my talk, I’ll do my best
to clearly explain the legal doctrines that may affect
computer security experts. I’ll also talk about
privacy, civil liberties, free speech, or whatever
else it top on the agenda of Black Hat attendees.
Spring Loaded Shotgun Security
by Robert Clark posted June 28, 2005
Is there a lesson to be learned from this early security attempt?
Edward and Bertha Briney inherited an uninhabited old farm house and for "about 10 years, from 1957 to 1967, it was repeatedly broken into the result of a series of trespassing and housebreaking events. The Brineys had posted 'no trespass' signs for several years. But nothing secured the house. Finally, on 'June 11, 1967', Ed cleaned and oiled his 20-gauge shotgun, took it to the old house and secured it to an iron bed with the barrel pointed at the bedroom door. It was rigged with wire from the doorknob to the gun's trigger so it would fire when the door was opened. It was aimed so an intruder would be hit in the stomach but at Bertha’s suggestion it was lowered to hit the legs. Suffice it to say, Marvin Katko trespassed, entered the room and now poor Marvin is six foot two inches tall when he stands on his right foot and five foot six when he stands on his left!!” Katko v. Briney,/ 183 N.W. 2d 657 (1971)
Smile, You're on P2P
If you've logged on to your favorite file sharing peer-to-peer network recently there is a good chance a node is waiting to log your every download. Securing and providing anonymity on p2p systems is a critical step in protecting the free flow of digital information. Luckily, Ian Clarke and Oskar Sandberg are the kind of guys that can pull something like this off. On today's page, Ian takes a look on how to keep peer-to-peer networks dark, searchable, secure and efficient. Whether it is Freenet or their work on the free music-sharing client, Indy, Ian and Oskar have the lockdown on p2p. Word... read more
Big Companies, Big Targets
One of the benefits of working at Black Hat is our exposure to the world’s leading technology researchers. The Black Page is our opportunity to share their research with the world. The Black Page will be sporadically updated, exclusively featuring the Black Hat Briefings speakers, their latest research, and new announcements... read more
The Black Page is always looking for concise and interesting comments from researchers and experts about issues that affect the security community. Contact us here to learn more about submission rules