Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
What to Upload to SlideShare
Next
Download to read offline and view in fullscreen.

Share

The legalities of hacking back

Download to read offline

This was a keynote presentation given at St. Louis 9/18 Secure World conference

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to like this

The legalities of hacking back

  1. 1. Hacking back: What are the legalities and implications? David Strom SecureWorld STL 9/18 david@strom.com
  2. 2. Agenda • What is the current legal situation? • Hacking back tech and legal history: Google, Lockheed • Two major issues: attribution and intent • Possible countermeasures • Final thoughts
  3. 3. Who I am
  4. 4. 1. Proof of attribution 2. Proof of intent Wait a moment!
  5. 5. Attribution problems • Having as short an elapsed time from the actual event is essential • Lots of finger pointing • Cat-and-mouse game
  6. 6. What potential countermeasures could be used? • Poison pills • DDoS • Real time attack disruption • Remote access of hacker’s network and computers • Create a “red team”
  7. 7. Private/public cooperation at catching hackers
  8. 8. Final thoughts You can find this presentation here: http://slideshare.net/davidstrom And reach me: @dstrom on Twitter david@strom.com http://strominator.com

This was a keynote presentation given at St. Louis 9/18 Secure World conference

Views

Total views

607

On Slideshare

0

From embeds

0

Number of embeds

433

Actions

Downloads

1

Shares

0

Comments

0

Likes

0

×