Legal issues in computer security research
by
Mike Doherty
Link
Embed
Share
Beginning
This slide
Copy link URL
Copy link URL
Copy iframe embed code
Copy iframe embed code
Copy javascript embed code
Copy javascript embed code
Share
Tweet
Share
Tweet
Slide 1
Slide 1 text
No content
Slide 2
Slide 2 text
Who am I?
Slide 3
Slide 3 text
No content
Slide 4
Slide 4 text
HELLO YES THIS IS LAWYER
Slide 5
Slide 5 text
Motivation
Slide 6
Slide 6 text
While the only secure computer is one that is turned off, the need for running systems overwhelms us.
Slide 7
Slide 7 text
tech ↕ society
Slide 8
Slide 8 text
3 Questions What Why How
Slide 9
Slide 9 text
What
Slide 10
Slide 10 text
2 relevant laws
Slide 11
Slide 11 text
Criminal law Mischief Unauthorized use
Slide 12
Slide 12 text
Copyright law Encryption Security
Slide 13
Slide 13 text
Criminal law
Slide 14
Slide 14 text
Mischief in relation to data
Slide 15
Slide 15 text
No content
Slide 16
Slide 16 text
4 acts Destroy/alter Render meaningless Obstruct use Obstruct use
Slide 17
Slide 17 text
10 years
Slide 18
Slide 18 text
Theft of data
Slide 19
Slide 19 text
Theft of data
Slide 20
Slide 20 text
Unauthorized use of computer
Slide 21
Slide 21 text
4 acts Obtain service Intercept Computer crime Have a password
Slide 22
Slide 22 text
Fraudulently and without colour of right
Slide 23
Slide 23 text
No content
Slide 24
Slide 24 text
What is unauthorized?
Slide 25
Slide 25 text
Terms of service
Slide 26
Slide 26 text
“You may not do any of the following while accessing or using [Twitter]: ... probe, scan, or test the vulnerability of any system”
Slide 27
Slide 27 text
No content
Slide 28
Slide 28 text
The core problem
Slide 29
Slide 29 text
No content
Slide 30
Slide 30 text
Things changed
Slide 31
Slide 31 text
Times changed Ubiquity Public-by-default Service-oriented Always-on
Slide 32
Slide 32 text
The bottom line
Slide 33
Slide 33 text
Copyright law
Slide 34
Slide 34 text
Fair dealing Research Education Criticism News reporting
Slide 35
Slide 35 text
Security & encryption research (with strings attached)
Slide 36
Slide 36 text
The strings Requires copying Lawful original Notification/consent No criminal acts “Responsible” disclosure
Slide 37
Slide 37 text
Legal uncertainty
Slide 38
Slide 38 text
The bottom line
Slide 39
Slide 39 text
How
Slide 40
Slide 40 text
White hat hackers are hired by businesses... Black hat hackers, who work independently, are intent upon destruction
Slide 41
Slide 41 text
Risk mitigation
Slide 42
Slide 42 text
Behave responsibly
Slide 43
Slide 43 text
Plan disclosure early
Slide 44
Slide 44 text
Get lawyers involved early
Slide 45
Slide 45 text
Be wary of software vendors who don't know they're software vendors
Slide 46
Slide 46 text
Co-ordinated disclosure
Slide 47
Slide 47 text
No content
Slide 48
Slide 48 text
Recieved disclosure 13 48
Slide 49
Slide 49 text
Recieved disclosure Acknowledgement 13 28 48
Slide 50
Slide 50 text
Recieved disclosure Acknowledgement Fixed the vuln 13 28 14 48
Slide 51
Slide 51 text
Recieved disclosure Acknowledgement Fixed the vuln Public security advisory 13 28 14 2 48 4
Slide 52
Slide 52 text
Appearances matter
Slide 53
Slide 53 text
Disclose via an intermediary
Slide 54
Slide 54 text
We deserve better
Slide 55
Slide 55 text
Advocate for change
Slide 56
Slide 56 text
Questions Mike Doherty hashbang.ca / @mikedoherty_ca
Slide 57
Slide 57 text
Thanks Images: Emma Poliquin Statham Cook collection tracktwentynine @ flickr blackeycove @ flickr rama @ wikimedia