443.203.9378
·
[email protected]
·
Mon - Fri 9am-5pm
Free Phone Consultation
443.203.9378
·
[email protected]
·
Mon - Fri 9am-5pm
Free Phone Consultation

Day

July 8, 2009
PLA Information Warfare Development Timeline and Nodal Analysis Zulu Meet Analyst, Verisign iDefense The development timeline is consistent with the broad contours of China’s current IW theory. It showed clearly the footprints of China’s common war preparation patterns and People’s war concept. For China, IW is a People’s War, beyond simple “hacking,” and is a...
Read More
Hackerspaces: The Legal Bases Nicolle Neulist “RogueClown” Hacker communities in many cities are becoming interested in starting hackerspaces. Getting together a core of talented, inquisitive, and creative people is an integral part of it, but it is also important to address the legal questions that arise. The goal of this presentation is to make anyone...
Read More
Jailbreaking and the Law of Reversing Fred Von Lohmann Senior Staff Attorney, EFF Jennifer Granick Civil Liberties Director, EFF Using jailbreaking of the iPhone as a primary example, the presentation will be an overview of the laws relating to reverse engineering of hardware and software. Developers who rely on reverse engineering face a thicket of...
Read More
PRESENTER Robert Clark, Attorney ABSTRACT This presentation reviews the important prosecutions, precedents and legal opinions of the last year that affect internet and computer security. We will discuss the differences between legal decisions from criminal cases and civil lawsuits and what that means to the security professional. This presentation is strongly audience driven and it...
Read More
The Year In Computer Crime Cases Jennifer Granick Civil Liberties Director, EFF Its been a booming year for computer crime cases as cops and civil litigants have pushed the envelope to go after people using fake names on social networking sites (the MySpace suicide case), researchers giving talks at DEFCON (MBTA v. Anderson), and students...
Read More
Your Mind: Legal Status, Rights and Securing Yourself PRESENTER James “Myrcurial” Arlen Security Researcher Tiffany Rad President of ELCnetworks, LLC. and Adjunct Professor at University of Southern Maine’s Computer Science Department ABSTRACT As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail...
Read More
Between now and the commencement of Defcon 17, and in no particular order, I will highlight those speakers and sessions that will cover topics directly related to Cyber Warfare and Cyber Law (as opposed to Cyber Security in general). After the final conference proceedings are released, I will post the sessions that I have highlighted...
Read More
Official: NKorea believed behind cyber attacks http://bit.ly/CAArP
Read More
Score one for Twitter in the legal battle over who is responsible for stopping social media imposters. See http://tinyurl.com/lgcnvq
Read More