Legal

Title Speakers Conference Tags
A Non-Attribution-Dilemma and its Impact on Legal Regulation of Cyberwar Michael Grunert Deepsec-2012 - Vienna, Austria Legal Cyberwar
Computer Search And Seizure Marcia Hofmann ShmooCon-2011 - Washington DC, USA Security Legal
Data Retention In The Eu Five Years After The Directive Axel Arnbak , Katarzyna Szymielewicz , Patrick Breyer , Ralf Bendrath , Axel Arnbak , Katarzyna Szymielewicz Chaos Communication Congress-27 - Berlin, Germany Legal
Network Neutrality And Qos - A Contradiction? Andreas Bogk Chaos Communication Congress-27 - Berlin, Germany Security Legal
Who'S Afraid Of The Search And Surveillance Bill? Marissa Johnpillai KiwiCon-2010 - Wellington, New Zealand Legal
Electronic Voting System Anonymous Speaker BugCon-2010 - Mexico Security Others Legal
Computer-Related Crime In Mexico, 10 Years Later Ivonne V. Muñoz BugCon-2010 - Mexico Legal Law Enforcement
Can Cyber Criminals Move Freely? Righard J. Zwienenberg CyberSec -2010 - Brussels, Belgium Security Legal Cyberwar
Determining State Responsibility For Cyber Attacks Russell Buchan CyberSec -2010 - Brussels, Belgium Security Legal Cyberwar
Legal Developments In Hardware Hacking Jennifer Granick , Matt Zimmerman DEF CON-18 - Las Vegas, USA Security Legal
Striking Back Web Attackers Striking Attackers SyScan-2010 - HangZhou, China Security Infrastructure Web Legal Forensics
Legal Training Anonymous Speaker CCDCOE-2010 - Estonia Security Legal
Blurring Boundaries: Crime And Espionage Online Nart Villeneuve CCDCOE-2010 - Estonia Security Others Legal Cyberwar
Cyber Security From Article 4 And 5 Perspective Ulf Häussler CCDCOE-2010 - Estonia Security Intrusion Detection Incident Response Legal
Different Legal Constructs For State Responsibility Maeve Dion CCDCOE-2010 - Estonia Security Legal
Track Keynote: Comprehensive Approach To International Cyber Security Eneken Tikk CCDCOE-2010 - Estonia Security Legal Application Security
Criminal Law Approach To Cyber Defence In Coe, Eu And Un Marco Gercke CCDCOE-2010 - Estonia Legal Cyberwar
Attacking Voip And Understanding What Cyber-Crime Is Doing” Sandro Gauci AthCon-2010 - Athens, Greece Security Legal Law Enforcement Compliance
How Not To Get Pwnd By Your Clients: Legal Issues For The Information Security Professional Richard Goldberg QuahogCon-2010 - USA Legal
Legal Aspects Of Computer Network Security And Privacy Robert Clark SOURCE Boston-2010 - Boston, USA Security Privacy Legal
Cybercrime And The Law Enforcement Response Thomas J. Holt CarolinaCon6-2010 - Raleigh, USA Security Legal Law Enforcement
Knowing Me, Knowing You Brian Honan SOURCE Barcelona-2009 - Barcelona, Spain Security Privacy Legal
Toward A New Legal Framework For Cybersecurity Deirdre K. Mulligan 18th USENIX Security Symposium-2009 - Montreal, Canada Security Legal
Hackerspaces: The Legal Bases Nicolle ( rogueclown ) Neulist DEF CON-17 - Las Vegas, USA Security Legal
Your Mind: Legal Status, Rights And Securing Yourself James "Myrcurial" Arlen DEF CON-17 - Las Vegas, USA Security Legal
Your Mind: Legal Status, Rights And Securing Yourself James Arlen , Tiffany Strauchs Rad Blackhat USA-2009 - Las Vegas, USA Security Legal
The Gentlemen'S Agreement - Pwning Friends Legally For Fun, ????, And Profit! Zachary Fasel , Matthew Jakubowski , Josh Krueger ShmooCon-2009 - Washington DC, USA Security Others Legal
Dissolving An Industry As A Hobby Peter Sunde HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Media Legal
How To Build Your Own Password Cracker With A Disassembler And A Little Vm Magic Matthew Geiger HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Legal Forensics
Real Id Act And Rfid: Privacy And Legal Implications Tiffany Strauchs Rad The Last HOPE-2008 - USA Security Privacy Legal
Botnet Research, Mitigation And The Law Alexander Muentz The Last HOPE-2008 - USA Security Legal
Hacking International Networks And System(S) Using Voip Da Beave , Jfalcon The Last HOPE-2008 - USA Security Media Legal
Home Is Where The Heart Is? The Question Of Jurisdiction Douglas Spink The Last HOPE-2008 - USA Security Privacy Legal
Identification Card Security: Past, Present, Future Doug Farre The Last HOPE-2008 - USA Security Legal
Phreaking 110: The State Of Modern Phreaking I-ball The Last HOPE-2008 - USA Security Access Legal
Warrantless Laptop Searches At U.S. Borders Decius The Last HOPE-2008 - USA Security Privacy Legal
Criminal Hackertools According To § 202C Stgb Horst Speichert TROOPERS-2008 - Munich, German Security Analysis Legal Testing
Measurements, Uncertainties, And Legal Issues David Dagon 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats-2008 - San Francisco, USA Security Legal
An Update On Riaa Lawsuits Under The Dmca Sapna Kumar CarolinaCon-4 - Raleigh, USA Security Others Legal
How To Make Tor Play Well With The Rest Of The Internet Roger Dingledine SOURCE Boston-2008 - Boston, USA Security Anonymity Legal
Legal Issues For Bot-Net Researches And Mitigators Alexander Muentz ShmooCon-2008 - Washington DC, USA Security Legal
When Lawyers Attack! - Dealing With The New Rules Of Electronic Discover John ( jur1st ) Benson ShmooCon-2008 - Washington DC, USA Security Community Legal Compliance
Protecting Your It Infrastructure From Legal Attacks- Subpoenas, Warrants And Transitive Trust Alexander Muentz DEF CON-15 - Las Vegas, USA Security Infrastructure Legal
Disclosure And Intellectual Property Law: Case Studies Ennifer Granick Blackhat USA-2007 - Las Vegas, USA Security Legal
Computer And Internet Security Law—A Year In Review 2006–2007 Robert Clark Blackhat USA-2007 - Las Vegas, USA Security Legal
Security Breaches Are Good For You Adam Shostack ShmooCon-2007 - Washington DC, USA Security Legal
Legal Aspects Of Internet &Amp; Computer Network Defense: A Year In Review Computer And Internet Security Law 2005-2006 Robert Clark DEF CON-14 - Las Vegas, USA Security Legal
Legal Aspects Of Computer Self-Defense And Aggressive Self-Defense Robert W. Clark DEF CON-14 - Las Vegas, USA Security Legal
Signaling Vulnerabilities In Law Enforcement Wiretapping Systems Matt Blaze 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Legal
Law Enforcement Wiretaps: Background And Vulnerabilities Sandy Clark , Matt Blaze , Eric Cronin , Micah Sherr HOPE Number 6-2006 - USA Security Legal
Anonym.Os: Security And Privacy, Everywhere You Go (Build It!) Taylor Banks , Gavin Mead , Kevin Miller , Beth Milliken ShmooCon-2006 - Washington DC, USA Security Anonymity Access Privacy Monitoring Risk Legal Development
A Discussion About Modern Disk Encryption Systems Jacob Appelbaum Chaos Communication Congress-22 - Berlin, Germany Security Legal
E-Voting: The Silent Decline Of Public Control Ulrich Wiesner Chaos Communication Congress-22 - Berlin, Germany Security Legal
Old Skewl Hacking-Infrared - How To Break Into The Hotel System Major Malfunction SyScan-2005 - Singapore Security Privacy Cryptography Legal
Sniffing Conference Networks: Is It Legal? Is It Right? Paul Ohm , William R. Cheswick , Abe Singer , Mike Scher 14th USENIX Security Symposium-2005 - Baltimore, USA Security Panel Legal
Top Ten Legal Issues In Computer Security Jennifer Granick DEF CON-13 - Las Vegas, USA Security Legal
Legal And Ethical Aspects Of Wardriving Frank Thornton , Matthew L. Shuchman DEF CON-13 - Las Vegas, USA Security Legal
Legal Aspects Of Computer Network Defense-A Government Perspective &Amp; A Year In Review Important Precedents In Computer And Internet Security Law 2004 - 2005 Major Robert Clark Blackhat USA-2005 - Las Vegas, USA Security Legal
U.S National Security, Individual And Corporate Information Security, And Information Security Providers C. Forrest Morgan Blackhat USA-2005 - Las Vegas, USA Security Risk Legal
I Voted? How The Law Increasingly Restricts Independent Security Research Cindy Cohn 13th USENIX Security Symposium-2004 - San Diego, USA Security Legal
Hackers And The Law Wendy Seltzer , Annalee Newitz , Dr. D. Kaloper The Fifth HOPE -2004 - USA Security Panel Legal
How To Talk To The Press Stephen Cass The Fifth HOPE -2004 - USA Security Legal
Retaliation With Honeypots Laurent Oudot The Fifth HOPE -2004 - USA Security Legal
Slaying The Corporate Litigation Dragon: Emerging The Victor In An Intellectual Property Cybersuit Atom Smasher The Fifth HOPE -2004 - USA Security Web Legal
When Corporations Attack Wendy Seltzer , Acidus , Virgil Griffith , Dan Morgan The Fifth HOPE -2004 - USA Security Panel Legal
Legal Liability And Security Incident Investigation Jennifer Stisa Granick Blackhat USA-2004 - Las Vegas, USA Security Legal
Managing Election Data: The California Recall Bev Harris Blackhat USA-2004 - Las Vegas, USA Security Analysis Legal
The Case For Assurance In Security Products Brian Snow 12th USENIX Security Symposium-2003 - Washington DC, USA Security Legal
What Hackers Need To Know About Post 9/11 Legal Changes Cindy Cohn DEF CON-11 - Las Vegas, USA Security Legal
Lawful Interception Of Ip: The European Context Jaya Baloo Blackhat Europe-2003 - Amsterdam, The Netherlands Security Privacy Legal Development
Lawful Interception Of Ip Traffic: The European Context Jaya Baloo Chaos Communication Congress-19 - Berlin, Germany Security Legal Development
Freedom To Tinker Edward W. Felten 11th USENIX Security Symposium-2002 - San Francisco, USA Security Legal
Dmca Legal Update Mike Godwin , Eric Grimm , Robin Gross H2K2-2002 - USA Security Legal
Digital Demonstrations: Criminal Ddos Attack Or Cyber Sit-In? Anonymous H2K2-2002 - USA Security Legal
The Patriot Act Anonymous H2K2-2002 - USA Security Legal
The Rip Act, Anti-Terrorism Laws, And Data Retention Caspar Bowden Chaos Communication Congress-18 - Berlin, Germany Security Legal
Gpl: Gnu General Public License And Derivative Works Mikko Valimaki Chaos Communication Congress-18 - Berlin, Germany Security Legal
A Maze Of Twisty Little Statutes, All Alike: The Electronic Communications Privacy Act Of 1986(And Its Application To Network Service Providers) Mark Eckenwiler 10th USENIX Security Symposium-2001 - Washington DC, USA Security Privacy Legal
Digital Millenium Copyright Act Dario D. Diaz , Esq. DEF CON-09 - Las Vegas, USA Security Legal
So You Got Your Lame Ass Sued: A Legal Narrative The Defendant DEF CON-09 - Las Vegas, USA Security Legal
Key Legal Implications Of Computer Network Defense Walter Gary Sharp Blackhat USA-2001 - Las Vegas, USA Security Legal
The Legal Panel Martin Garbus , Ed Hernstadt , Robin Gross H2K-2000 - USA Security Panel Legal
Mock Trial - The Mpaa Vs. 2600 Anonymous H2K-2000 - USA Security Legal
Big Brother Is Watching You: Camera Surveillance In Germany Jadis Chaos Communication Congress-16 - Berlin, Germany Security Monitoring Legal
Overview Of Certification Systems: X.509, Ca, Pgp And Skip. Ed Gerck Blackhat USA-1999 - Las Vegas, USA Security Privacy Community Legal