Hackerspaces: The Legal Bases Nicolle Neulist “RogueClown” Hacker communities in many cities are becoming interested in starting hackerspaces. Getting together a core of talented, inquisitive, and creative people is an integral part of it, but it is also important to address the legal questions that arise. The goal of this presentation is to make anyone...Read More
Jailbreaking and the Law of Reversing Fred Von Lohmann Senior Staff Attorney, EFF Jennifer Granick Civil Liberties Director, EFF Using jailbreaking of the iPhone as a primary example, the presentation will be an overview of the laws relating to reverse engineering of hardware and software. Developers who rely on reverse engineering face a thicket of...Read More
PRESENTER Robert Clark, Attorney ABSTRACT This presentation reviews the important prosecutions, precedents and legal opinions of the last year that affect internet and computer security. We will discuss the differences between legal decisions from criminal cases and civil lawsuits and what that means to the security professional. This presentation is strongly audience driven and it...Read More
The Year In Computer Crime Cases Jennifer Granick Civil Liberties Director, EFF Its been a booming year for computer crime cases as cops and civil litigants have pushed the envelope to go after people using fake names on social networking sites (the MySpace suicide case), researchers giving talks at DEFCON (MBTA v. Anderson), and students...Read More
Your Mind: Legal Status, Rights and Securing Yourself PRESENTER James “Myrcurial” Arlen Security Researcher Tiffany Rad President of ELCnetworks, LLC. and Adjunct Professor at University of Southern Maine’s Computer Science Department ABSTRACT As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail...Read More
Between now and the commencement of Defcon 17, and in no particular order, I will highlight those speakers and sessions that will cover topics directly related to Cyber Warfare and Cyber Law (as opposed to Cyber Security in general). After the final conference proceedings are released, I will post the sessions that I have highlighted...Read More
Many Cyber Warfare analysts have noted the pivotal role that Twitter played in the recent (and possibly ongoing) Cyber Warfare efforts related to the Iranian election dispute. See http://tinyurl.com/lfq5pa and also http://tinyurl.com/nl56wj. However, is Twitter exposing themselves to negligence liability, and if so, is there something they can do about it? Cyber experts agree that...Read More
Recent Comments