Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Hacking back:
What are the legalities and
implications?
David Strom
SecureWorld STL 9/18
david@strom.com
Agenda
• What is the current legal situation?
• Hacking back tech and legal history: Google, Lockheed
• Two major issues: ...
Who I am
1. Proof of attribution
2. Proof of intent
Wait a moment!
Attribution problems
• Having as short an elapsed time from the
actual event is essential
• Lots of finger pointing
• Cat-...
What potential countermeasures
could be used?
• Poison pills
• DDoS
• Real time attack disruption
• Remote access of hacke...
Private/public cooperation at
catching hackers
Final thoughts
You can find this presentation here:
http://slideshare.net/davidstrom
And reach me:
@dstrom on Twitter
davi...
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
The legalities of  hacking back
Upcoming SlideShare
Loading in …5
×

The legalities of hacking back

491 views

Published on

This was a keynote presentation given at St. Louis 9/18 Secure World conference

Published in: Technology
  • How will you feel when your Ex girlfriend is in bed with another man? Don't let this happen. Get her back with... ◆◆◆ http://ow.ly/mOLD301xGxr
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

The legalities of hacking back

  1. 1. Hacking back: What are the legalities and implications? David Strom SecureWorld STL 9/18 david@strom.com
  2. 2. Agenda • What is the current legal situation? • Hacking back tech and legal history: Google, Lockheed • Two major issues: attribution and intent • Possible countermeasures • Final thoughts
  3. 3. Who I am
  4. 4. 1. Proof of attribution 2. Proof of intent Wait a moment!
  5. 5. Attribution problems • Having as short an elapsed time from the actual event is essential • Lots of finger pointing • Cat-and-mouse game
  6. 6. What potential countermeasures could be used? • Poison pills • DDoS • Real time attack disruption • Remote access of hacker’s network and computers • Create a “red team”
  7. 7. Private/public cooperation at catching hackers
  8. 8. Final thoughts You can find this presentation here: http://slideshare.net/davidstrom And reach me: @dstrom on Twitter david@strom.com http://strominator.com

×