SlideShare a Scribd company logo
Hacking Tools, a criminal
        offence?
  Benjamin Henrion (FFII.org), 22 Oct 2012
About
● Foundation for a Free Information Infrastructure eV
● Active on many law related subjects:
      ■ ACTA
      ■ Software Patents directive, now Unitary Patent
      ■ IPRED1 (civil) and IPRED2 (criminal)
      ■ Data retention
      ■ Network of software companies and developers
● Personal
      ■ zoobab.com @zoobab
      ■ VoIP industry
      ■ HackerSpace.be
      ■ JTAG and reverse-engineering
Proposed EU directive

● Judicial cooperation in criminal matters:
  combatting attacks against information systems
  (COD 2010/0273)
● Repealing Framework Decision JHA 2005
● Lisbon treaty: new criminal competences for EU
● First reading, deal between Council and Parliament
Parliament press release

"The proposal also target tools used to commit
offences: the production or sale of devices such as
computer programs designed for cyber-attacks, or
which find a computer password by which an
information system can be accessed, would constitute
criminal offences."
EESC opinion

"[...] it will include new elements:
    (a) It penalises the production, sale, procurement
for use, import, distribution or otherwise making
available of devices/tools used for committing the
offences."
Problems
● Tools are "neutral"
● "Hacking" tools have positive/negative use
● Intent: criteria for a judge
● Following this logic, knifes or hammers should be
  banned?
● Publication of exploits is a crime
● Level of security is lowered
● Exodus of security companies abroad, attackers
  from foreign countries are safe
Amendment example - Final art7
Amendment example - Final art8
Amendment example - Art 8bis
Responsabilité des fabriquants
"Les États membres prennent les mesures nécessaires
afin de garantir que les fabricants soient tenus pour
pénalement responsables de la production, de la mise
sur le marché, de la commercialisation, de
l'exploitation, ou du défaut de sécurité suffisante, de
produits et de systèmes qui sont défectueux ou qui
présentent des faiblesses de sécurité avérées qui
peuvent faciliter des cyberattaques ou la perte de
données."
German law of 2007

● "Many    other German security researchers,
  meanwhile, have pulled their proof-of-concept
  exploit code and hacking tools offline for fear of
  prosecution."
Kismac WiFi scanner
Status of the proposed directive

●   Deal in secret closed doors Tri-logue (EC, EP, CM)
●   June 2012
●   Orientation vote in LIBE
●   Blocked because of Schengen discussions
●   Formality in LIBE
●   Formality in Plenary?
Status of the proposed directive

●   Deal in secret closed doors Tri-logue (EC, EP, CM)
●   June 2012
●   Orientation vote in LIBE
●   Blocked because of Schengen discussions
●   Formality in LIBE
●   Formality in Plenary?
Compromise deal

●   Extracts
●   "Intent"
●   "Aiding abetting inciting" examples
●   Still ambiguous
●   "Minor act" not defined
●   Liability for IT systems vendors gone
●   Etc...

More Related Content

What's hot

International business law ch. 17
International business law ch. 17International business law ch. 17
International business law ch. 17
Frank Cavaliere
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
segughana
 
Laws of interest to security professionals
Laws of interest to security professionalsLaws of interest to security professionals
Laws of interest to security professionals
Shivani Gamit
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
Wendy Lile
 

What's hot (18)

Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data Management
 
Security Beyond Compliance: Using Tokenisation for Data Protection by Design ...
Security Beyond Compliance: Using Tokenisation for Data Protection by Design ...Security Beyond Compliance: Using Tokenisation for Data Protection by Design ...
Security Beyond Compliance: Using Tokenisation for Data Protection by Design ...
 
Smartie - Project overview
Smartie - Project overview Smartie - Project overview
Smartie - Project overview
 
International business law ch. 17
International business law ch. 17International business law ch. 17
International business law ch. 17
 
dcb1222 - Feature3
dcb1222 - Feature3dcb1222 - Feature3
dcb1222 - Feature3
 
SMARTIE
SMARTIESMARTIE
SMARTIE
 
Trips
TripsTrips
Trips
 
Trips plus edited
Trips plus editedTrips plus edited
Trips plus edited
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
TRIPS Agreement (Part-1)
TRIPS Agreement (Part-1)TRIPS Agreement (Part-1)
TRIPS Agreement (Part-1)
 
Laws of interest to security professionals
Laws of interest to security professionalsLaws of interest to security professionals
Laws of interest to security professionals
 
Intellectual property in the wto and inter institutional cooperation
Intellectual property in the wto and inter institutional cooperationIntellectual property in the wto and inter institutional cooperation
Intellectual property in the wto and inter institutional cooperation
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Trips
TripsTrips
Trips
 
Mobile Monday Brusselsmeeting220609
Mobile Monday Brusselsmeeting220609Mobile Monday Brusselsmeeting220609
Mobile Monday Brusselsmeeting220609
 
Rin armenia icin 2020
Rin armenia  icin 2020Rin armenia  icin 2020
Rin armenia icin 2020
 
EU data protection issues in IoT
EU data protection issues in IoTEU data protection issues in IoT
EU data protection issues in IoT
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 

Similar to Hacking tools-directive

Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
ClubHack
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
manelmedina
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
segughana
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
Commonwealth Telecommunications Organisation
 

Similar to Hacking tools-directive (20)

Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
 
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
Day 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdfDay 02 - EDPS Technology & Privacy unit.pdf
Day 02 - EDPS Technology & Privacy unit.pdf
 
Software Patents in Europe via caselaw of a Central Patent Court
Software Patents in Europe via caselaw of a Central Patent CourtSoftware Patents in Europe via caselaw of a Central Patent Court
Software Patents in Europe via caselaw of a Central Patent Court
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Cybercrime Risks Eu
Cybercrime Risks EuCybercrime Risks Eu
Cybercrime Risks Eu
 
20161201 witdom bdva summit
20161201 witdom bdva summit20161201 witdom bdva summit
20161201 witdom bdva summit
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Introduction to new technologies
Introduction to new technologiesIntroduction to new technologies
Introduction to new technologies
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
EU Data Protection Regulation 26 June 2012
EU Data Protection Regulation 26 June 2012EU Data Protection Regulation 26 June 2012
EU Data Protection Regulation 26 June 2012
 
Legal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of thingsLegal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of things
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Gikii23 Marsden
Gikii23 MarsdenGikii23 Marsden
Gikii23 Marsden
 
The potential impact of legislation on AI and Machine Learning (New Zealand f...
The potential impact of legislation on AI and Machine Learning (New Zealand f...The potential impact of legislation on AI and Machine Learning (New Zealand f...
The potential impact of legislation on AI and Machine Learning (New Zealand f...
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 

More from zoobab (6)

Stop Software Patents 25C3
Stop Software Patents 25C3Stop Software Patents 25C3
Stop Software Patents 25C3
 
Software authors lost their rights
Software authors lost their rightsSoftware authors lost their rights
Software authors lost their rights
 
Free700
Free700Free700
Free700
 
Euepo
EuepoEuepo
Euepo
 
24 C3 Noooxml
24 C3 Noooxml24 C3 Noooxml
24 C3 Noooxml
 
Software Patents v3.0
Software Patents v3.0Software Patents v3.0
Software Patents v3.0
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Intelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfIntelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Server-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at PricelineServer-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at Priceline
 

Hacking tools-directive

  • 1. Hacking Tools, a criminal offence? Benjamin Henrion (FFII.org), 22 Oct 2012
  • 2. About ● Foundation for a Free Information Infrastructure eV ● Active on many law related subjects: ■ ACTA ■ Software Patents directive, now Unitary Patent ■ IPRED1 (civil) and IPRED2 (criminal) ■ Data retention ■ Network of software companies and developers ● Personal ■ zoobab.com @zoobab ■ VoIP industry ■ HackerSpace.be ■ JTAG and reverse-engineering
  • 3. Proposed EU directive ● Judicial cooperation in criminal matters: combatting attacks against information systems (COD 2010/0273) ● Repealing Framework Decision JHA 2005 ● Lisbon treaty: new criminal competences for EU ● First reading, deal between Council and Parliament
  • 4. Parliament press release "The proposal also target tools used to commit offences: the production or sale of devices such as computer programs designed for cyber-attacks, or which find a computer password by which an information system can be accessed, would constitute criminal offences."
  • 5. EESC opinion "[...] it will include new elements: (a) It penalises the production, sale, procurement for use, import, distribution or otherwise making available of devices/tools used for committing the offences."
  • 6. Problems ● Tools are "neutral" ● "Hacking" tools have positive/negative use ● Intent: criteria for a judge ● Following this logic, knifes or hammers should be banned? ● Publication of exploits is a crime ● Level of security is lowered ● Exodus of security companies abroad, attackers from foreign countries are safe
  • 7. Amendment example - Final art7
  • 8. Amendment example - Final art8
  • 9. Amendment example - Art 8bis Responsabilité des fabriquants "Les États membres prennent les mesures nécessaires afin de garantir que les fabricants soient tenus pour pénalement responsables de la production, de la mise sur le marché, de la commercialisation, de l'exploitation, ou du défaut de sécurité suffisante, de produits et de systèmes qui sont défectueux ou qui présentent des faiblesses de sécurité avérées qui peuvent faciliter des cyberattaques ou la perte de données."
  • 10. German law of 2007 ● "Many other German security researchers, meanwhile, have pulled their proof-of-concept exploit code and hacking tools offline for fear of prosecution."
  • 12. Status of the proposed directive ● Deal in secret closed doors Tri-logue (EC, EP, CM) ● June 2012 ● Orientation vote in LIBE ● Blocked because of Schengen discussions ● Formality in LIBE ● Formality in Plenary?
  • 13. Status of the proposed directive ● Deal in secret closed doors Tri-logue (EC, EP, CM) ● June 2012 ● Orientation vote in LIBE ● Blocked because of Schengen discussions ● Formality in LIBE ● Formality in Plenary?
  • 14. Compromise deal ● Extracts ● "Intent" ● "Aiding abetting inciting" examples ● Still ambiguous ● "Minor act" not defined ● Liability for IT systems vendors gone ● Etc...