June 28, 2005 - Above the Law
by Jeff Moss
A popular issue for the world's top security researchers is the unique relationship between security practices and their legal implications. Every aspect of today's security involves some form of legality. The justice system has allowed governments to enforce encryption bans, corporations to file mass lawsuits for identity thefts, and the U.S. Congress to debate the need for federal preemption. Jennifer Granick and Robert Clark continuously offer fresh perspectives on the ever changing legal landscape. This Black Page is dedicated to why I miss crime.
Get Out of Jail, Free.
by Jennifer Granick posted June 28, 2005
Computer security isn’t just about keeping networks safe, its about keeping yourself safe from nebulous criminal laws and civil liabilities that may attach to various computer research activities. This past year, we’ve seen video game companies legally challenge coders who tinker with the way their games appear, Sybase threaten NGSSoftware over the publication of security flaws and the USA Patriot Act come up for renewal. These issues and more impact your life and work. Knowledge is power, and in my talk, I’ll do my best to clearly explain the legal doctrines that may affect computer security experts. I’ll also talk about privacy, civil liberties, free speech, or whatever else it top on the agenda of Black Hat attendees.
Spring Loaded Shotgun Security
by Robert Clark posted June 28, 2005
Is there a lesson to be learned from this early security attempt?
Edward and Bertha Briney inherited an uninhabited old farm house and for "about 10 years, from 1957 to 1967, it was repeatedly broken into the result of a series of trespassing and housebreaking events. The Brineys had posted 'no trespass' signs for several years. But nothing secured the house. Finally, on 'June 11, 1967', Ed cleaned and oiled his 20-gauge shotgun, took it to the old house and secured it to an iron bed with the barrel pointed at the bedroom door. It was rigged with wire from the doorknob to the gun's trigger so it would fire when the door was opened. It was aimed so an intruder would be hit in the stomach but at Bertha’s suggestion it was lowered to hit the legs. Suffice it to say, Marvin Katko trespassed, entered the room and now poor Marvin is six foot two inches tall when he stands on his right foot and five foot six when he stands on his left!!” Katko v. Briney,/ 183 N.W. 2d 657 (1971)
Smile, You're on P2P
If you've logged on to your favorite file sharing peer-to-peer network recently there is a good chance a node is waiting to log your every download. Securing and providing anonymity on p2p systems is a critical step in protecting the free flow of digital information. Luckily, Ian Clarke and Oskar Sandberg are the kind of guys that can pull something like this off. On today's page, Ian takes a look on how to keep peer-to-peer networks dark, searchable, secure and efficient. Whether it is Freenet or their work on the free music-sharing client, Indy, Ian and Oskar have the lockdown on p2p. Word... read more
Big Companies, Big Targets
One of the benefits of working at Black Hat is our exposure to the world’s leading technology researchers. The Black Page is our opportunity to share their research with the world. The Black Page will be sporadically updated, exclusively featuring the Black Hat Briefings speakers, their latest research, and new announcements... read more
The Black Page is always looking for concise and interesting comments from researchers and experts about issues that affect the security community. Contact us here to learn more about submission rules