Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The legalities of hacking back


Published on

This was a keynote presentation given at St. Louis 9/18 Secure World conference

Published in: Technology
  • Be the first to comment

  • Be the first to like this

The legalities of hacking back

  1. 1. Hacking back: What are the legalities and implications? David Strom SecureWorld STL 9/18
  2. 2. Agenda • What is the current legal situation? • Hacking back tech and legal history: Google, Lockheed • Two major issues: attribution and intent • Possible countermeasures • Final thoughts
  3. 3. Who I am
  4. 4. 1. Proof of attribution 2. Proof of intent Wait a moment!
  5. 5. Attribution problems • Having as short an elapsed time from the actual event is essential • Lots of finger pointing • Cat-and-mouse game
  6. 6. What potential countermeasures could be used? • Poison pills • DDoS • Real time attack disruption • Remote access of hacker’s network and computers • Create a “red team”
  7. 7. Private/public cooperation at catching hackers
  8. 8. Final thoughts You can find this presentation here: And reach me: @dstrom on Twitter