SlideShare a Scribd company logo
1 of 76
Your Mind: Legal Status,
  Rights and Securing
        Yourself
     Tiffany Rad and James Arlen
              DEFCON 17
            August 2, 2009
We’re going to make your brain hurt.

                     In a good way.

     The hurt might even save your brain.

   Disclaimer: Neither of us are speaking
    for our employers. We promise not to
              break the world.


2009-08-02    Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Tiffany Strauchs Rad, MA, MBA, JD

•            President of ELCnetworks, LLC.,
              o Business, tech and security consulting,
                legal services
•            Part-time Adjunct Professor in the computer
             science department at the University of
             Southern Maine
              o computer law and ethics, information
                security
•            Establishing a computer crimes clinic at
             Maine School of Law
•            Organizer of HackME, a hacker space in
             Portland, Maine
2009-08-02            Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
James “Myrcurial” Arlen, CISA

•  Part-time Security Consultant
             o  Fortune   500, Profit 50, based in Toronto
•  Part-time Chief Information Security
   Officer at a mid-sized financial
•  Part-time stringer for Liquidmatrix
   Security Digest
•  Full-time push-the-envelope next-gen
   super-duper visionary strategitarian
•  Founder of think|haus, a hacker space in
   Hamilton, Ontario


2009-08-02                Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
“Data” and “Document” are sometimes,
  but not always interchangeably used
  by lawyers and legislators.

We will use these working definitions:
•  Data: the lowest level of abstraction
   from which information and knowledge
   are derived. IE: Bytes arranged in order.
•  Document: a bounded physical
   representation of body of information
   designed with the capacity (and usually
   intent) to communicate.
2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Living Person (Person in Being)
  or
  Business Organization (Corporate
  Entity)?
•  A company has some legal rights similar to
   a living person
       o  A company can make contracts as well as sue
          and be sued
       o  An Agent can “speak” for the business
          organization




2009-08-02        Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Legal and Technical Differences:

•  Stored Communications
       o  When data has come to rest                                                                    on a device
       o  SCA derived from the ECPA



•  In Transit Communication
       o  When     data is still “moving” between
             devices

       * Please download updated slides!



2009-08-02                         Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Fourth Amendment
“The right of the people to be secure in their persons, houses,
   papers, and effects, against unreasonable searches and
   seizures, shall not be violated, and no Warrants shall issue,
   but upon probable cause, supported by Oath or affirmation,
   and particularly describing the place to be searched, and the
   persons or things to be seized.”


•  Only works inside the borders of the
   USA
•  Doesn’t count *at* the border
•  May be over-ridden by other laws and
   norms - USA PATRIOT ACT

2009-08-02        Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Sanctity of your person is not absolute:

•            T.S.A.
•            Terry stop
•            Warrant
•            Third party permission to search




2009-08-02          Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Sanctity of your “stuff” is even less
  absolute:

•            Computers and compute devices
•            Plain sight/view
•            Non-related data
•            Incomplete warrant




2009-08-02         Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Warrants are applicable to external,
 small computing devices

•            Cell phones
•            PDAs
•            Car Computers (in most states)
•            Medical Devices




2009-08-02          Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Fifth Amendment
“No person shall be held to answer for a capital, or otherwise infamous
   crime, unless on presentment or indictment of a Grand Jury, except in
   cases arising in the land or naval forces, or in the Militia, when in
   actual service in time of War or public danger; nor shall any person be
   subject for the same offense to be twice put in jeopardy of life or limb;
   nor shall be compelled in any criminal case to be a witness against
   himself, nor be deprived of life, liberty, or property, without due
   process of law; nor shall private property be taken for public use,
   without just compensation.”


•  You cannot be forced to incriminate
   yourself
•  No equivalent right in Canada
•  Other jurisdictions?

2009-08-02           Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Consider the various ways in which the
 law treats data…

…For now, just keep in mind data which
 is stored in some way – not moving
 through networks.




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Case One:
•  Data stored in a cloud based
   application with servers in the USA
•  IE: Google doc

•  Search and seizure?
•  By other governments?

•  You are PWN3D



2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Case Two:
•  Data stored in an external backup
   site with servers in the USA
•  IE: Amazon S3

•  Search and seizure?
•  By other governments?

•  You are PWN3D



2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Case Three:
•  Data stored on a rented server with
   an ISP in the USA
•  IE: Rackspace

•  Search and seizure?
•  By other governments?

•  You are PWN3D



2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Case Four:
•  Data stored on an owned server
   with an ISP in the USA
•  IE: local colocation provider

•  Search and seizure?
•  By other governments?

•  You are PWN3D



2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Case Five:
•  Data stored on an owned fileserver
   located in your home in the USA


•  Search and seizure?
•  By other governments?

•  You are PWN3D



2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Case Six:
•  Data stored on an owned laptop
   that is kept in your personal
   possession in the USA

•  Search and seizure?


•  You are PWN3D



2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Case Seven:
•  Data stored on a
   telecommunications device that is
   kept in your personal possession in
   the USA

•  Search and seizure?


•  You are PWN3D

2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Case Eight:
•  Data stored on a data storage media
   that is kept in your personal
   possession in the USA

•  Search and seizure?


•  You are PWN3D



2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Don’t be a fool – encrypt your data!

AES-1024 w/ 32768bit keys FTW!



             …Ok – so what if you encrypt?




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Obfuscated or Encoded (rot13, base64, etc)

•  Commonly used as a legal ‘defense’ for
   DCMA

•  Isn’t going to save you.




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Common off-the-shelf encryption

•  Commercial options: PGP, Ironkey,
   others.
•  Non-Commercial options: GPG,
   Truecrypt, etc.


•  You’ll give up the key.



2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Personal / self-developed encryption:

•  One-time pad
•  You are Bruce Schneier

•  You’ll give up the algorithm and the
   key.




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
All of the above refers to data at rest…



             …What happens if the data is in motion?




2009-08-02           Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Ok – that’s all great… you’re not making
 me feel better about my data, but I
 thought this talk was about my mind.

Lets just take a few minutes to tease
 apart what you mean when you talk
 about the difference between your
 stored data and your mind.


2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Before we launch in though – here’s a piece
 of historical case law to think about…

The contents of your desk/briefcase/valise
 – your “Personal Notes and Effects” have
 some protections…

How does that fall apart in this brave new
 world.

Where do you keep your memory?


2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Pretend it’s still the ’90s.

1990's PDA - "Assistant" -- names, addresses,
  phone numbers, relationships (PII of
  others), your PII+aspirations, future
  events, plans, etc.

Are we talking about “thoughts”/”memories”
  or personal notes and effects?

Are alarm settings legally an agent?


2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Pretend it’s finally the early 00’s.

Connected PDA – same as previous case
 but has some replicated data-stores.

The replicated copies are held by a
 corporation – is there an agency
 relationship?

Does the corporation have rights to your
 memory / knowledge?
2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
What about when the memory is not ‘to
 remember something’ – but rather ‘to
 do some action’?

How about a cron job or scheduled task?

Google Search Alerts?

This is less about data and more about
 agency.


2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
When we transition from “remember
 something” to “remember to do some
 action”… there’s a natural extension to:

“Make a decision for me.”

This is getting really close to the legal
 definition of agency.

We’re already doing this. My Outlook client
 decides whether or not to accept meeting
 invitations based on criteria that I give it.

2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Is there a bright line we can draw to
  distinguish your thoughts and
  memories from those you’ve recorded?


                   …At what point does the
             computer become a legal agent?




2009-08-02     Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
How am I related to my:

»  Computer
»            hardware – chattel
»            software – explicit license with multiple
             corporations

»  Data Storage
»            local - chattel
»            remote – contract with 3rd party

»  Transmission Capability
»            direct – explicit license with the FCC
»            internet – contract with 3rd party
2009-08-02             Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
But is it even possible to “own” a
 computer in the sense that I can own a
 carrot?

If I’m not an owner but merely a
  licensee, who really owns my
  computer?

What the *&^#%!!!!!
2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
…but if the computer isn’t “mine” in a
 reasonable sense, can it still make
 decisions that I am bound to?




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
…is there any other situation where a
 licensed non-entity can apparently
 enter into contracts on behalf of a
 natural person?




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Do I have an explicit or implicit contract
 with my computer?




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Can a computer do these things and
 somehow become legally “alive”?




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
What does it take to become "legally" an
 agent - for yourself or others?




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Can we map out a "cognitive ladder" that
 one of these data/computer/
 information systems can climb towards
 legal maturity?




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
We already have a set of cases which
 describe the legal nature of less than
 adult. Are computer-based agents
 similar to children?




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Various "adult" ages:

»  Age       of   Majority
»  Age       of   License
»  Age       of   Consent
»  Age       of   Criminal Responsibility

All of these vary from 7 - 21

There's quite a gap there in terms of
 capability or capacity for cognition.
2009-08-02          Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
The other obvious place where the law
 has considered the concept of
 cognitive maturity as it relates to legal
 maturity is in the case of mentally
 handicapped adults.

Could a computer pass these tests?

What happens when ELIZA meets
 Rainman.


2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Do these cognitive agents represent your
 thoughts?

If they do, they should have the same
  protections as your mind.

But if they don’t…



2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
What happens when…




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
You can move actual memory out of
 your head and into a device.




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
You’ve probably already done this with
 some things…

•  Do you keep track of phone
   numbers anymore?
•  What about important dates?
•  What are you doing next Thursday?

Let me just ‘borrow’ your phone – how’s
 your memory now?
2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Record of your actions or activities…




•  Are you establishing intent?
•  Can you ever take it back?
•  Your cell phone provider will turn
   over text messages – sometimes
   even without a subpoena.

2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
But I’m a hipster and I want to have
 access to my memory everywhere –



I use Cloud Memory!!!




Who really controls your information?
2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Prosthetic Memory
The Microsoft Research SenseCam




Proven successful in aiding memory
  recall of Alzheimer's patients.
(image © Microsoft – from: http://research.microsoft.com/en-
   us/um/cambridge/projects/sensecam/information.htm)

2009-08-02      Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
…but you actively chose to use all of
 those things…

…you’ve done this to yourself…


…but what if you have no option?



2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Medical prosthetics are no longer “dumb”
 devices…

•            Pacemakers
•            Automatic Defibrillator (BH 2008-Kohno, Fu)
•            Insulin / Drug Pumps
•            Seizure Detection/Control

They include event loggers, wireless
 communications, and vulnerability to
 subpoena.

2009-08-02            Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Public Surveillance beyond the simple CCTV

Future Attribute Screening Technology
(FAST) assesses pre-crime thoughts.

FAST is grounded in research on human behavior and
  psychophysiology, focusing on new advances in behavioral/
  human-centered screening techniques. The aim is a
  prototypical mobile suite (FAST M2) that would be used to
  increase the accuracy and validity of identifying persons
  with malintent (the intent or desire to cause harm).
  Identified individuals would then be directed to secondary
  screening, which would be conducted by authorized
  personnel.



2009-08-02       Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
How the USA Dept. of Homeland Security
 views these things…




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
…Are your thoughts legible at a
 distance?

…Are you ok with a blanket grant on
 what you might be thinking?

…How do you control your biometry
 data once it’s measured and taken by
 others?
2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Employers collecting biometric data on
  employees – what does it reveal about your
  thoughts?
•  FBI is collecting biometric data stored in
    the Clarksburg, West Virginia facility




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
RFID + Security: Don't Mess With Las Vegas?

Third Eye has a new RF-based security system,
   SATS (Security Alert Tracking System) based on a
   wristband biosensor (from SPO Medical) that
   monitors employee's heart rate.
If the rate suddenly increases, management is
   alerted by an RF signal from the wristband.
The premise is that if a casino employee's heart
   starts suddenly beating rapidly, they are likely
   under stress. This could be due to some
   emergency such as a robbery, or possibly
   because the employee is planning a theft.

http://www.rfidgazette.org/security/
2009-08-02       Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
…Where is the boundary between
 thoughts that are private and thoughts
 that are available in the public realm?


Is the man with the magic box stealing my
  soul?



2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
…So my thoughts can be made public
 and can be used against me. At least
 that's out of my control.

...What if my thoughts conspire against
  me?




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
…It's not like there's ever been software
 written that had a flaw...




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
…and bad people like to exploit flaws in
 computer software, and wouldn't mind
 knowing what I'm thinking about...




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
…and since my computer is legally an
 agent and can make binding decisions -
 even contracts on my behalf...




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
…or the government could retroactively
 declare some thought or memory as
 illegal and prosecute me for it...




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
…thanks for scaring the crap outta me…

What can be done?

How can I protect myself?




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
James: IANALJASD
•  I am not a lawyer, just a security
   dude.

Tiffany: IAALBNYL
•  I am a lawyer, but not your lawyer.


             NOTE: If you follow this advice,
                you’re likely safer, but you
                 can be screwed anyways.
2009-08-02         Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Practical measures for keeping your
  thoughts safe while they are stored.

•            Keep them in your home.
•            Use encryption.
•            Don't give any cause to make them look hard.
             Truecrypt hidden partitions are findable.
•            Store data in difficult to subpoena places.
•            Launch your own datastorage satellite.




2009-08-02            Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Practical measures for managing newly
  forming cognitive agents.

•            Beware licensing.
•            Limit capability.
•            Resist the urge to join the digerati.
•            Work to maintain and improve digital civil
             liberty and privacy legislation




2009-08-02             Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
The best advice is simple awareness that
      your mind and your memory
        isn't necessarily your own.




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
In conclusion, we're asking you to do
     your part to engage with the general
     public, legislators and vendors. Help
     them to understand that we may not
    need entirely new ways of dealing with
      what we're creating, but we MUST
       consider the implications prior to
        unleashing our new overlords.


2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
»  If you’re inspired by Carrie Underwood’s
   Before He Cheats, don’t get caught doing
   it on camera…




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
»  Or if you happen to be in range of a FAST
   camera, don’t act stupid and think
   peaceful thoughts…




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
»  …or go into a data base forever with the
   caption “…There can be only one!”
   associated with your image and legal
   name




2009-08-02   Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Q&A


                       followup:
               tiffany@elcnetworks.com
             myrcurial@100percentgeek.net

2009-08-02       Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
Thanks and Notices

                                                                          James “Myrcurial” Arlen
Tiffany Strauchs Rad

Links:                                                                    Links:
http://www.tiffanyrad.com                                                 http://myrcurial.com and
http://www.tiffanyrad.blogspot.com                                        http://www.linkedin.com/in/jamesarlen
                                                                              and sometimes
                                                                          http://liquidmatrix.org/blog
White paper with references on
   Tiffanyrad.com                                                         Thanks: My Family, Friends, and
                                                                             DEFCON organizers.
Thanks: My family, Hackerspaces crew,
   and DEFCON organizers.                                                 Inspiration: my lovely wife and hackerish
                                                                              children, Coffee, Strattera, Club
                                                                              Mate, Information Society, NIN,
                                                                              altruism.
Inspirations: Nothingface, hackerish
    children, EFF, Bard Coffee (Portland,                                 Constructed with: Apple Macbook Pro,
    Maine), European techno, and my                                          Firefox, Powerpoint, angst.
    University of Southern Maine students.



http://creativecommons.org/licenses/by-nc-sa/2.5/ca/
2009-08-02                          Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17

More Related Content

What's hot

International e discovery ceic 2012d
International e discovery ceic 2012dInternational e discovery ceic 2012d
International e discovery ceic 2012dJames Daley
 
A Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesA Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesCESSDA Training
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & EdiscoveryLouise Spiteri
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breaches08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breachesacfesj
 
DMCA & US Laws Impact on Global Commerce
DMCA & US Laws Impact on Global CommerceDMCA & US Laws Impact on Global Commerce
DMCA & US Laws Impact on Global Commercewelcometofacebook
 
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...Jason Haislmaier
 
Intellectual property protection
Intellectual property protectionIntellectual property protection
Intellectual property protectionMSIZI NDABA
 
Public Records, Private Purposes
Public Records, Private PurposesPublic Records, Private Purposes
Public Records, Private PurposesAIIM International
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizurerlhicksjr
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
April 2011 - Business Law & Order - Mark G. Malven
April 2011 - Business Law & Order - Mark G. MalvenApril 2011 - Business Law & Order - Mark G. Malven
April 2011 - Business Law & Order - Mark G. MalvenAnnArborSPARK
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowWinston & Strawn LLP
 
Computer forensics introduction - JurInnov - Eric Vanderburg
Computer forensics introduction - JurInnov - Eric VanderburgComputer forensics introduction - JurInnov - Eric Vanderburg
Computer forensics introduction - JurInnov - Eric VanderburgEric Vanderburg
 
Preemptively Avoiding Patent and Antitrust Issues While Participating in Open...
Preemptively Avoiding Patent and Antitrust Issues While Participating in Open...Preemptively Avoiding Patent and Antitrust Issues While Participating in Open...
Preemptively Avoiding Patent and Antitrust Issues While Participating in Open...Essentiality Check
 

What's hot (20)

June's ARTICLES
June's ARTICLESJune's ARTICLES
June's ARTICLES
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
International e discovery ceic 2012d
International e discovery ceic 2012dInternational e discovery ceic 2012d
International e discovery ceic 2012d
 
A Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesA Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use Licenses
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breaches08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breaches
 
Entrepreneurship Chap 8
Entrepreneurship Chap 8Entrepreneurship Chap 8
Entrepreneurship Chap 8
 
DMCA & US Laws Impact on Global Commerce
DMCA & US Laws Impact on Global CommerceDMCA & US Laws Impact on Global Commerce
DMCA & US Laws Impact on Global Commerce
 
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...
Data Property Rights (Rocky Mountain IP and Technology Institute 2013) (May 2...
 
Intellectual property protection
Intellectual property protectionIntellectual property protection
Intellectual property protection
 
Public Records, Private Purposes
Public Records, Private PurposesPublic Records, Private Purposes
Public Records, Private Purposes
 
New Media Legal Q&A
New Media Legal Q&ANew Media Legal Q&A
New Media Legal Q&A
 
Pls 780 week 8
Pls 780 week 8Pls 780 week 8
Pls 780 week 8
 
Laws Governing E Data And Seizure
Laws Governing E Data And SeizureLaws Governing E Data And Seizure
Laws Governing E Data And Seizure
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
April 2011 - Business Law & Order - Mark G. Malven
April 2011 - Business Law & Order - Mark G. MalvenApril 2011 - Business Law & Order - Mark G. Malven
April 2011 - Business Law & Order - Mark G. Malven
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
Computer forensics introduction - JurInnov - Eric Vanderburg
Computer forensics introduction - JurInnov - Eric VanderburgComputer forensics introduction - JurInnov - Eric Vanderburg
Computer forensics introduction - JurInnov - Eric Vanderburg
 
Preemptively Avoiding Patent and Antitrust Issues While Participating in Open...
Preemptively Avoiding Patent and Antitrust Issues While Participating in Open...Preemptively Avoiding Patent and Antitrust Issues While Participating in Open...
Preemptively Avoiding Patent and Antitrust Issues While Participating in Open...
 

Viewers also liked

Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-withDefcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-withPriyanka Aash
 
Web Security: SQL Injection
Web Security: SQL InjectionWeb Security: SQL Injection
Web Security: SQL InjectionVortana Say
 
Defcon 22-quaddi-r3plicant-hefley-hacking-911
Defcon 22-quaddi-r3plicant-hefley-hacking-911Defcon 22-quaddi-r3plicant-hefley-hacking-911
Defcon 22-quaddi-r3plicant-hefley-hacking-911Priyanka Aash
 
Management vs. Leadership - Linked 2 Leadership
Management vs. Leadership  - Linked 2 LeadershipManagement vs. Leadership  - Linked 2 Leadership
Management vs. Leadership - Linked 2 LeadershipLinked 2 Leadership
 
Professional basic selling skills
Professional basic selling skillsProfessional basic selling skills
Professional basic selling skillsshehzad Chohan
 
Optical fiber communiction system
Optical fiber communiction systemOptical fiber communiction system
Optical fiber communiction systemrahulohlan14
 
Art of Trolling Defcon 19
Art of Trolling Defcon 19Art of Trolling Defcon 19
Art of Trolling Defcon 19openfly
 
Communication progress ltd Startup Grind Tirana Albania
Communication progress ltd Startup Grind Tirana AlbaniaCommunication progress ltd Startup Grind Tirana Albania
Communication progress ltd Startup Grind Tirana AlbaniaCommunication Progress
 
Social Studies - Chapter 1 (Singapore - A Nation in the World)
Social Studies - Chapter 1 (Singapore - A Nation in the World)Social Studies - Chapter 1 (Singapore - A Nation in the World)
Social Studies - Chapter 1 (Singapore - A Nation in the World)Goh Bang Rui
 
Albanian flag
Albanian flagAlbanian flag
Albanian flagAnida Ago
 
Rev. 0527 Basic Math Review Complete
Rev. 0527 Basic Math Review CompleteRev. 0527 Basic Math Review Complete
Rev. 0527 Basic Math Review CompleteStepbk2
 
Social Studies 2016: Issue 1 what does it mean to be a citizen
Social Studies 2016: Issue 1   what does it mean to be a citizenSocial Studies 2016: Issue 1   what does it mean to be a citizen
Social Studies 2016: Issue 1 what does it mean to be a citizenJoey Kayden Lam
 
Rrjeta kompjuterike leksion 1
Rrjeta kompjuterike leksion 1  Rrjeta kompjuterike leksion 1
Rrjeta kompjuterike leksion 1 Xhendris Ismaili
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi ModelBELKA08
 
Njesia Qendrore (Pjeset Perberese) , Lenda : Tik
Njesia Qendrore (Pjeset Perberese)  ,  Lenda : TikNjesia Qendrore (Pjeset Perberese)  ,  Lenda : Tik
Njesia Qendrore (Pjeset Perberese) , Lenda : TikDaniel Duro
 
Social Studies Chapter 1 - Citizenship
Social Studies Chapter 1 - CitizenshipSocial Studies Chapter 1 - Citizenship
Social Studies Chapter 1 - CitizenshipGoh Bang Rui
 

Viewers also liked (20)

Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-withDefcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
 
Web Security: SQL Injection
Web Security: SQL InjectionWeb Security: SQL Injection
Web Security: SQL Injection
 
Defcon 22-quaddi-r3plicant-hefley-hacking-911
Defcon 22-quaddi-r3plicant-hefley-hacking-911Defcon 22-quaddi-r3plicant-hefley-hacking-911
Defcon 22-quaddi-r3plicant-hefley-hacking-911
 
16 Tenses In English
16 Tenses In English16 Tenses In English
16 Tenses In English
 
Management vs. Leadership - Linked 2 Leadership
Management vs. Leadership  - Linked 2 LeadershipManagement vs. Leadership  - Linked 2 Leadership
Management vs. Leadership - Linked 2 Leadership
 
Professional basic selling skills
Professional basic selling skillsProfessional basic selling skills
Professional basic selling skills
 
Optical fiber communiction system
Optical fiber communiction systemOptical fiber communiction system
Optical fiber communiction system
 
MKAD_black_V2
MKAD_black_V2MKAD_black_V2
MKAD_black_V2
 
Art of Trolling Defcon 19
Art of Trolling Defcon 19Art of Trolling Defcon 19
Art of Trolling Defcon 19
 
Communication progress ltd Startup Grind Tirana Albania
Communication progress ltd Startup Grind Tirana AlbaniaCommunication progress ltd Startup Grind Tirana Albania
Communication progress ltd Startup Grind Tirana Albania
 
Social Studies - Chapter 1 (Singapore - A Nation in the World)
Social Studies - Chapter 1 (Singapore - A Nation in the World)Social Studies - Chapter 1 (Singapore - A Nation in the World)
Social Studies - Chapter 1 (Singapore - A Nation in the World)
 
Flamuri shqiptar
Flamuri shqiptarFlamuri shqiptar
Flamuri shqiptar
 
Albanian flag
Albanian flagAlbanian flag
Albanian flag
 
Rev. 0527 Basic Math Review Complete
Rev. 0527 Basic Math Review CompleteRev. 0527 Basic Math Review Complete
Rev. 0527 Basic Math Review Complete
 
myrvete
myrvetemyrvete
myrvete
 
Social Studies 2016: Issue 1 what does it mean to be a citizen
Social Studies 2016: Issue 1   what does it mean to be a citizenSocial Studies 2016: Issue 1   what does it mean to be a citizen
Social Studies 2016: Issue 1 what does it mean to be a citizen
 
Rrjeta kompjuterike leksion 1
Rrjeta kompjuterike leksion 1  Rrjeta kompjuterike leksion 1
Rrjeta kompjuterike leksion 1
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Njesia Qendrore (Pjeset Perberese) , Lenda : Tik
Njesia Qendrore (Pjeset Perberese)  ,  Lenda : TikNjesia Qendrore (Pjeset Perberese)  ,  Lenda : Tik
Njesia Qendrore (Pjeset Perberese) , Lenda : Tik
 
Social Studies Chapter 1 - Citizenship
Social Studies Chapter 1 - CitizenshipSocial Studies Chapter 1 - Citizenship
Social Studies Chapter 1 - Citizenship
 

Similar to DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself

Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeBoyarMiller
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryDan Michaluk
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingAIIM International
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02satyabwati
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyDan Houser
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011John Magnabosco
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation finalDan Michaluk
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_ProvidersJon-Michael C. Brook, CISSP
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastLogikcull.com
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdfMeshalALshammari12
 

Similar to DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself (20)

Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud Computing
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & Policy
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011Exploring Data Privacy - SQL Saturday Louisville 2011
Exploring Data Privacy - SQL Saturday Louisville 2011
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
ACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 WebcastACEDS-Kroll Ontrack 2-24-15 Webcast
ACEDS-Kroll Ontrack 2-24-15 Webcast
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 

More from James Arlen

Notacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next GenerationNotacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next GenerationJames Arlen
 
Notacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security ExpertsNotacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security ExpertsJames Arlen
 
DEFCON17 - Fail Panel
DEFCON17 - Fail PanelDEFCON17 - Fail Panel
DEFCON17 - Fail PanelJames Arlen
 
BlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security ExpertsBlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security ExpertsJames Arlen
 
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowBlack Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowJames Arlen
 
SecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongSecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongJames Arlen
 
The Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitThe Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitJames Arlen
 

More from James Arlen (7)

Notacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next GenerationNotacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next Generation
 
Notacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security ExpertsNotacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security Experts
 
DEFCON17 - Fail Panel
DEFCON17 - Fail PanelDEFCON17 - Fail Panel
DEFCON17 - Fail Panel
 
BlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security ExpertsBlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security Experts
 
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowBlack Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
 
SecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongSecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It Wrong
 
The Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitThe Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black Suit
 

Recently uploaded

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself

  • 1. Your Mind: Legal Status, Rights and Securing Yourself Tiffany Rad and James Arlen DEFCON 17 August 2, 2009
  • 2. We’re going to make your brain hurt. In a good way. The hurt might even save your brain. Disclaimer: Neither of us are speaking for our employers. We promise not to break the world. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 3. Tiffany Strauchs Rad, MA, MBA, JD •  President of ELCnetworks, LLC., o Business, tech and security consulting, legal services •  Part-time Adjunct Professor in the computer science department at the University of Southern Maine o computer law and ethics, information security •  Establishing a computer crimes clinic at Maine School of Law •  Organizer of HackME, a hacker space in Portland, Maine 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 4. James “Myrcurial” Arlen, CISA •  Part-time Security Consultant o  Fortune 500, Profit 50, based in Toronto •  Part-time Chief Information Security Officer at a mid-sized financial •  Part-time stringer for Liquidmatrix Security Digest •  Full-time push-the-envelope next-gen super-duper visionary strategitarian •  Founder of think|haus, a hacker space in Hamilton, Ontario 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 5. “Data” and “Document” are sometimes, but not always interchangeably used by lawyers and legislators. We will use these working definitions: •  Data: the lowest level of abstraction from which information and knowledge are derived. IE: Bytes arranged in order. •  Document: a bounded physical representation of body of information designed with the capacity (and usually intent) to communicate. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 6. Living Person (Person in Being) or Business Organization (Corporate Entity)? •  A company has some legal rights similar to a living person o  A company can make contracts as well as sue and be sued o  An Agent can “speak” for the business organization 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 7. Legal and Technical Differences: •  Stored Communications o  When data has come to rest on a device o  SCA derived from the ECPA •  In Transit Communication o  When data is still “moving” between devices * Please download updated slides! 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 8. Fourth Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” •  Only works inside the borders of the USA •  Doesn’t count *at* the border •  May be over-ridden by other laws and norms - USA PATRIOT ACT 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 9. Sanctity of your person is not absolute: •  T.S.A. •  Terry stop •  Warrant •  Third party permission to search 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 10. Sanctity of your “stuff” is even less absolute: •  Computers and compute devices •  Plain sight/view •  Non-related data •  Incomplete warrant 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 11. Warrants are applicable to external, small computing devices •  Cell phones •  PDAs •  Car Computers (in most states) •  Medical Devices 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 12. Fifth Amendment “No person shall be held to answer for a capital, or otherwise infamous crime, unless on presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.” •  You cannot be forced to incriminate yourself •  No equivalent right in Canada •  Other jurisdictions? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 13. Consider the various ways in which the law treats data… …For now, just keep in mind data which is stored in some way – not moving through networks. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 14. Case One: •  Data stored in a cloud based application with servers in the USA •  IE: Google doc •  Search and seizure? •  By other governments? •  You are PWN3D 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 15. Case Two: •  Data stored in an external backup site with servers in the USA •  IE: Amazon S3 •  Search and seizure? •  By other governments? •  You are PWN3D 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 16. Case Three: •  Data stored on a rented server with an ISP in the USA •  IE: Rackspace •  Search and seizure? •  By other governments? •  You are PWN3D 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 17. Case Four: •  Data stored on an owned server with an ISP in the USA •  IE: local colocation provider •  Search and seizure? •  By other governments? •  You are PWN3D 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 18. Case Five: •  Data stored on an owned fileserver located in your home in the USA •  Search and seizure? •  By other governments? •  You are PWN3D 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 19. Case Six: •  Data stored on an owned laptop that is kept in your personal possession in the USA •  Search and seizure? •  You are PWN3D 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 20. Case Seven: •  Data stored on a telecommunications device that is kept in your personal possession in the USA •  Search and seizure? •  You are PWN3D 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 21. Case Eight: •  Data stored on a data storage media that is kept in your personal possession in the USA •  Search and seizure? •  You are PWN3D 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 22. Don’t be a fool – encrypt your data! AES-1024 w/ 32768bit keys FTW! …Ok – so what if you encrypt? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 23. Obfuscated or Encoded (rot13, base64, etc) •  Commonly used as a legal ‘defense’ for DCMA •  Isn’t going to save you. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 24. Common off-the-shelf encryption •  Commercial options: PGP, Ironkey, others. •  Non-Commercial options: GPG, Truecrypt, etc. •  You’ll give up the key. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 25. Personal / self-developed encryption: •  One-time pad •  You are Bruce Schneier •  You’ll give up the algorithm and the key. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 26. All of the above refers to data at rest… …What happens if the data is in motion? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 27. Ok – that’s all great… you’re not making me feel better about my data, but I thought this talk was about my mind. Lets just take a few minutes to tease apart what you mean when you talk about the difference between your stored data and your mind. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 28. Before we launch in though – here’s a piece of historical case law to think about… The contents of your desk/briefcase/valise – your “Personal Notes and Effects” have some protections… How does that fall apart in this brave new world. Where do you keep your memory? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 29. Pretend it’s still the ’90s. 1990's PDA - "Assistant" -- names, addresses, phone numbers, relationships (PII of others), your PII+aspirations, future events, plans, etc. Are we talking about “thoughts”/”memories” or personal notes and effects? Are alarm settings legally an agent? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 30. Pretend it’s finally the early 00’s. Connected PDA – same as previous case but has some replicated data-stores. The replicated copies are held by a corporation – is there an agency relationship? Does the corporation have rights to your memory / knowledge? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 31. What about when the memory is not ‘to remember something’ – but rather ‘to do some action’? How about a cron job or scheduled task? Google Search Alerts? This is less about data and more about agency. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 32. When we transition from “remember something” to “remember to do some action”… there’s a natural extension to: “Make a decision for me.” This is getting really close to the legal definition of agency. We’re already doing this. My Outlook client decides whether or not to accept meeting invitations based on criteria that I give it. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 33. Is there a bright line we can draw to distinguish your thoughts and memories from those you’ve recorded? …At what point does the computer become a legal agent? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 34. How am I related to my: »  Computer »  hardware – chattel »  software – explicit license with multiple corporations »  Data Storage »  local - chattel »  remote – contract with 3rd party »  Transmission Capability »  direct – explicit license with the FCC »  internet – contract with 3rd party 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 35. But is it even possible to “own” a computer in the sense that I can own a carrot? If I’m not an owner but merely a licensee, who really owns my computer? What the *&^#%!!!!! 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 36. …but if the computer isn’t “mine” in a reasonable sense, can it still make decisions that I am bound to? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 37. …is there any other situation where a licensed non-entity can apparently enter into contracts on behalf of a natural person? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 38. Do I have an explicit or implicit contract with my computer? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 39. Can a computer do these things and somehow become legally “alive”? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 40. What does it take to become "legally" an agent - for yourself or others? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 41. Can we map out a "cognitive ladder" that one of these data/computer/ information systems can climb towards legal maturity? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 42. We already have a set of cases which describe the legal nature of less than adult. Are computer-based agents similar to children? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 43. Various "adult" ages: »  Age of Majority »  Age of License »  Age of Consent »  Age of Criminal Responsibility All of these vary from 7 - 21 There's quite a gap there in terms of capability or capacity for cognition. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 44. The other obvious place where the law has considered the concept of cognitive maturity as it relates to legal maturity is in the case of mentally handicapped adults. Could a computer pass these tests? What happens when ELIZA meets Rainman. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 45. Do these cognitive agents represent your thoughts? If they do, they should have the same protections as your mind. But if they don’t… 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 46. What happens when… 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 47. You can move actual memory out of your head and into a device. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 48. You’ve probably already done this with some things… •  Do you keep track of phone numbers anymore? •  What about important dates? •  What are you doing next Thursday? Let me just ‘borrow’ your phone – how’s your memory now? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 49. Record of your actions or activities… •  Are you establishing intent? •  Can you ever take it back? •  Your cell phone provider will turn over text messages – sometimes even without a subpoena. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 50. But I’m a hipster and I want to have access to my memory everywhere – I use Cloud Memory!!! Who really controls your information? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 51. Prosthetic Memory The Microsoft Research SenseCam Proven successful in aiding memory recall of Alzheimer's patients. (image © Microsoft – from: http://research.microsoft.com/en- us/um/cambridge/projects/sensecam/information.htm) 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 52. …but you actively chose to use all of those things… …you’ve done this to yourself… …but what if you have no option? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 53. Medical prosthetics are no longer “dumb” devices… •  Pacemakers •  Automatic Defibrillator (BH 2008-Kohno, Fu) •  Insulin / Drug Pumps •  Seizure Detection/Control They include event loggers, wireless communications, and vulnerability to subpoena. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 54. Public Surveillance beyond the simple CCTV Future Attribute Screening Technology (FAST) assesses pre-crime thoughts. FAST is grounded in research on human behavior and psychophysiology, focusing on new advances in behavioral/ human-centered screening techniques. The aim is a prototypical mobile suite (FAST M2) that would be used to increase the accuracy and validity of identifying persons with malintent (the intent or desire to cause harm). Identified individuals would then be directed to secondary screening, which would be conducted by authorized personnel. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 55. How the USA Dept. of Homeland Security views these things… 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 56. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 57. …Are your thoughts legible at a distance? …Are you ok with a blanket grant on what you might be thinking? …How do you control your biometry data once it’s measured and taken by others? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 58. Employers collecting biometric data on employees – what does it reveal about your thoughts? •  FBI is collecting biometric data stored in the Clarksburg, West Virginia facility 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 59. RFID + Security: Don't Mess With Las Vegas? Third Eye has a new RF-based security system, SATS (Security Alert Tracking System) based on a wristband biosensor (from SPO Medical) that monitors employee's heart rate. If the rate suddenly increases, management is alerted by an RF signal from the wristband. The premise is that if a casino employee's heart starts suddenly beating rapidly, they are likely under stress. This could be due to some emergency such as a robbery, or possibly because the employee is planning a theft. http://www.rfidgazette.org/security/ 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 60. …Where is the boundary between thoughts that are private and thoughts that are available in the public realm? Is the man with the magic box stealing my soul? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 61. …So my thoughts can be made public and can be used against me. At least that's out of my control. ...What if my thoughts conspire against me? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 62. …It's not like there's ever been software written that had a flaw... 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 63. …and bad people like to exploit flaws in computer software, and wouldn't mind knowing what I'm thinking about... 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 64. …and since my computer is legally an agent and can make binding decisions - even contracts on my behalf... 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 65. …or the government could retroactively declare some thought or memory as illegal and prosecute me for it... 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 66. …thanks for scaring the crap outta me… What can be done? How can I protect myself? 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 67. James: IANALJASD •  I am not a lawyer, just a security dude. Tiffany: IAALBNYL •  I am a lawyer, but not your lawyer. NOTE: If you follow this advice, you’re likely safer, but you can be screwed anyways. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 68. Practical measures for keeping your thoughts safe while they are stored. •  Keep them in your home. •  Use encryption. •  Don't give any cause to make them look hard. Truecrypt hidden partitions are findable. •  Store data in difficult to subpoena places. •  Launch your own datastorage satellite. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 69. Practical measures for managing newly forming cognitive agents. •  Beware licensing. •  Limit capability. •  Resist the urge to join the digerati. •  Work to maintain and improve digital civil liberty and privacy legislation 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 70. The best advice is simple awareness that your mind and your memory isn't necessarily your own. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 71. In conclusion, we're asking you to do your part to engage with the general public, legislators and vendors. Help them to understand that we may not need entirely new ways of dealing with what we're creating, but we MUST consider the implications prior to unleashing our new overlords. 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 72. »  If you’re inspired by Carrie Underwood’s Before He Cheats, don’t get caught doing it on camera… 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 73. »  Or if you happen to be in range of a FAST camera, don’t act stupid and think peaceful thoughts… 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 74. »  …or go into a data base forever with the caption “…There can be only one!” associated with your image and legal name 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 75. Q&A followup: tiffany@elcnetworks.com myrcurial@100percentgeek.net 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17
  • 76. Thanks and Notices James “Myrcurial” Arlen Tiffany Strauchs Rad Links: Links: http://www.tiffanyrad.com http://myrcurial.com and http://www.tiffanyrad.blogspot.com http://www.linkedin.com/in/jamesarlen and sometimes http://liquidmatrix.org/blog White paper with references on Tiffanyrad.com Thanks: My Family, Friends, and DEFCON organizers. Thanks: My family, Hackerspaces crew, and DEFCON organizers. Inspiration: my lovely wife and hackerish children, Coffee, Strattera, Club Mate, Information Society, NIN, altruism. Inspirations: Nothingface, hackerish children, EFF, Bard Coffee (Portland, Constructed with: Apple Macbook Pro, Maine), European techno, and my Firefox, Powerpoint, angst. University of Southern Maine students. http://creativecommons.org/licenses/by-nc-sa/2.5/ca/ 2009-08-02 Your Mind: Legal Status, Rights and Securing Yourself -- DEFCON 17