Overview
Explore the legal landscape surrounding full spectrum computer network (active) defense in this 55-minute conference talk from Black Hat USA 2013. Delve into the complexities of "hacking back" and active defense strategies, examining both easily legal areas and controversial issues. Learn about technology and sensors in relation to ECPA and service provider exceptions, information control and management through DRM, and various active defense techniques including honeypots, beacons, and deception. Investigate the legal implications of open source business intelligence gathering, focusing on CFAA, economic espionage, and theft of trade secrets. Gain insights into trace back methods and retrieval of stolen data under CFAA. Understand the importance of collaboration between computer security professionals and legal counsel, and learn how to effectively communicate technical aspects of computer security to attorneys and juries. Engage in audience-driven discussions that provide practical takeaways for navigating the legal aspects of active defense in cybersecurity.
Syllabus
Black Hat USA 2013 - Legal Aspects of Full Spectrum Computer Network (Active) Defense
Taught by
Black Hat