SlideShare une entreprise Scribd logo
1  sur  77
Your Mind: Legal Status, Rights and Securing Yourself Tiffany Rad and James Arlen Blackhat USA 2009 Briefings July 29th, 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
  ,[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
  ,[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
  ,[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
  ,[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object]
[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009 http://creativecommons.org/licenses/by-nc-sa/2.5/ca/

Contenu connexe

Tendances

2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 PrivacyLance Hoffman
 
Gurley Testimony on Lap Top Privacy and Information Seizures at the Border-Se...
Gurley Testimony on Lap Top Privacy and Information Seizures at the Border-Se...Gurley Testimony on Lap Top Privacy and Information Seizures at the Border-Se...
Gurley Testimony on Lap Top Privacy and Information Seizures at the Border-Se...Susan Gurley
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeamOneI1MBA11
 
Business in usa eng
Business in  usa engBusiness in  usa eng
Business in usa engelite01pm
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Copyright litigation handbook contents and overview
Copyright litigation handbook   contents and overviewCopyright litigation handbook   contents and overview
Copyright litigation handbook contents and overviewRaymond Dowd
 
Ray dowd copyright, ethics & social media- what the connected lawyer needs t...
Ray dowd  copyright, ethics & social media- what the connected lawyer needs t...Ray dowd  copyright, ethics & social media- what the connected lawyer needs t...
Ray dowd copyright, ethics & social media- what the connected lawyer needs t...Raymond Dowd
 
Data, databases and what you can do with them
Data, databases and what you can do with themData, databases and what you can do with them
Data, databases and what you can do with themBrowne Jacobson LLP
 
A Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesA Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesCESSDA Training
 
Mediation Privilege (Daily Journal 5-10-13)
Mediation Privilege (Daily Journal 5-10-13)Mediation Privilege (Daily Journal 5-10-13)
Mediation Privilege (Daily Journal 5-10-13)Erica Bristol
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
Perkins Analysis on US Patriot
Perkins Analysis on US PatriotPerkins Analysis on US Patriot
Perkins Analysis on US Patriotjessiethe3rd
 

Tendances (15)

2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Hot Topics in Data Breach Litigation
Hot Topics in Data Breach LitigationHot Topics in Data Breach Litigation
Hot Topics in Data Breach Litigation
 
Gurley Testimony on Lap Top Privacy and Information Seizures at the Border-Se...
Gurley Testimony on Lap Top Privacy and Information Seizures at the Border-Se...Gurley Testimony on Lap Top Privacy and Information Seizures at the Border-Se...
Gurley Testimony on Lap Top Privacy and Information Seizures at the Border-Se...
 
Data Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident SimulationData Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident Simulation
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Big data: legal firms play ‘Moneyballʼ
Big data: legal firms play ‘Moneyballʼ Big data: legal firms play ‘Moneyballʼ
Big data: legal firms play ‘Moneyballʼ
 
Business in usa eng
Business in  usa engBusiness in  usa eng
Business in usa eng
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Copyright litigation handbook contents and overview
Copyright litigation handbook   contents and overviewCopyright litigation handbook   contents and overview
Copyright litigation handbook contents and overview
 
Ray dowd copyright, ethics & social media- what the connected lawyer needs t...
Ray dowd  copyright, ethics & social media- what the connected lawyer needs t...Ray dowd  copyright, ethics & social media- what the connected lawyer needs t...
Ray dowd copyright, ethics & social media- what the connected lawyer needs t...
 
Data, databases and what you can do with them
Data, databases and what you can do with themData, databases and what you can do with them
Data, databases and what you can do with them
 
A Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesA Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use Licenses
 
Mediation Privilege (Daily Journal 5-10-13)
Mediation Privilege (Daily Journal 5-10-13)Mediation Privilege (Daily Journal 5-10-13)
Mediation Privilege (Daily Journal 5-10-13)
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Perkins Analysis on US Patriot
Perkins Analysis on US PatriotPerkins Analysis on US Patriot
Perkins Analysis on US Patriot
 

En vedette

Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Tyler Shields
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Stephan Chenette
 
Understanding and Competing against Blackhat Local SEO tactics
Understanding and Competing against Blackhat Local SEO tacticsUnderstanding and Competing against Blackhat Local SEO tactics
Understanding and Competing against Blackhat Local SEO tacticsMike Ramsey
 
Bh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleriBh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleriHai Nguyen
 
Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22 Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22 dandb-technology
 
Phil Pearce - Blackhat analytics
Phil Pearce - Blackhat analyticsPhil Pearce - Blackhat analytics
Phil Pearce - Blackhat analyticsMarketing Festival
 
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...SearchCon
 
BlackHat 2014 - xsssniper
BlackHat 2014 - xsssniperBlackHat 2014 - xsssniper
BlackHat 2014 - xsssniperViyat Bhalodia
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Vasile
 
Introduction to Blackhat SEO
Introduction to Blackhat SEOIntroduction to Blackhat SEO
Introduction to Blackhat SEOMax Ogienko
 
Blackhat Analytics 2 @ Superweek
Blackhat Analytics 2  @ SuperweekBlackhat Analytics 2  @ Superweek
Blackhat Analytics 2 @ SuperweekPhil Pearce
 
Blackhat Analytics - DarkScore test to printout
Blackhat Analytics - DarkScore test to printoutBlackhat Analytics - DarkScore test to printout
Blackhat Analytics - DarkScore test to printoutPhil Pearce
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Securityeugenet
 
Hide Android applications in images
Hide Android applications in imagesHide Android applications in images
Hide Android applications in imagesAnge Albertini
 
Building Trojan Hardware at Home
Building Trojan Hardware at HomeBuilding Trojan Hardware at Home
Building Trojan Hardware at HomeE Hacking
 
Heybe Pentest Automation Toolkit - BlackHat USA 2015
Heybe Pentest Automation Toolkit - BlackHat USA 2015Heybe Pentest Automation Toolkit - BlackHat USA 2015
Heybe Pentest Automation Toolkit - BlackHat USA 2015Bahtiyar Bircan
 
BlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo TalkBlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo TalkSimon Bennetts
 

En vedette (20)

Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
 
Understanding and Competing against Blackhat Local SEO tactics
Understanding and Competing against Blackhat Local SEO tacticsUnderstanding and Competing against Blackhat Local SEO tactics
Understanding and Competing against Blackhat Local SEO tactics
 
Bh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleriBh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleri
 
Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22 Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22
 
Khoo
KhooKhoo
Khoo
 
Phil Pearce - Blackhat analytics
Phil Pearce - Blackhat analyticsPhil Pearce - Blackhat analytics
Phil Pearce - Blackhat analytics
 
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...
 
BlackHat 2014 - xsssniper
BlackHat 2014 - xsssniperBlackHat 2014 - xsssniper
BlackHat 2014 - xsssniper
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
 
Introduction to Blackhat SEO
Introduction to Blackhat SEOIntroduction to Blackhat SEO
Introduction to Blackhat SEO
 
Blackhat Analytics 2 @ Superweek
Blackhat Analytics 2  @ SuperweekBlackhat Analytics 2  @ Superweek
Blackhat Analytics 2 @ Superweek
 
Blackhat Analytics - DarkScore test to printout
Blackhat Analytics - DarkScore test to printoutBlackhat Analytics - DarkScore test to printout
Blackhat Analytics - DarkScore test to printout
 
Faraday Blackhat 2011 Arsenal
Faraday Blackhat 2011 ArsenalFaraday Blackhat 2011 Arsenal
Faraday Blackhat 2011 Arsenal
 
prestiva_blackhat
prestiva_blackhatprestiva_blackhat
prestiva_blackhat
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Security
 
Hide Android applications in images
Hide Android applications in imagesHide Android applications in images
Hide Android applications in images
 
Building Trojan Hardware at Home
Building Trojan Hardware at HomeBuilding Trojan Hardware at Home
Building Trojan Hardware at Home
 
Heybe Pentest Automation Toolkit - BlackHat USA 2015
Heybe Pentest Automation Toolkit - BlackHat USA 2015Heybe Pentest Automation Toolkit - BlackHat USA 2015
Heybe Pentest Automation Toolkit - BlackHat USA 2015
 
BlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo TalkBlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo Talk
 

Similaire à Your Mind: Legal Status, Rights, and Securing Yourself

DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data BreachShawn Tuma
 
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Shawn Tuma
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyAmy Larrimore
 
Dark Web What it is & How Does it Work
Dark Web What it is & How Does it WorkDark Web What it is & How Does it Work
Dark Web What it is & How Does it WorkOnsite Helper
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonMateus BahiaRicardo
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )Megan Espinoza
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingAIIM International
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Vivastream
 
IFTBOH - Privacy: Billion-Dollar Companies Built on YOU
IFTBOH - Privacy: Billion-Dollar Companies Built on YOUIFTBOH - Privacy: Billion-Dollar Companies Built on YOU
IFTBOH - Privacy: Billion-Dollar Companies Built on YOUNicole Fucile-Borsian
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
Privacy morwell june 09
Privacy morwell june 09 Privacy morwell june 09
Privacy morwell june 09 brentcarey
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 

Similaire à Your Mind: Legal Status, Rights, and Securing Yourself (20)

DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data Breach
 
Agency Systems
Agency SystemsAgency Systems
Agency Systems
 
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
 
Dark Web What it is & How Does it Work
Dark Web What it is & How Does it WorkDark Web What it is & How Does it Work
Dark Web What it is & How Does it Work
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Privacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of nonPrivacy and anonymity have been reduced to the point of non
Privacy and anonymity have been reduced to the point of non
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud Computing
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
 
IFTBOH - Privacy: Billion-Dollar Companies Built on YOU
IFTBOH - Privacy: Billion-Dollar Companies Built on YOUIFTBOH - Privacy: Billion-Dollar Companies Built on YOU
IFTBOH - Privacy: Billion-Dollar Companies Built on YOU
 
Chapter2
Chapter2Chapter2
Chapter2
 
Privacy morwell june 09
Privacy morwell june 09 Privacy morwell june 09
Privacy morwell june 09
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 

Your Mind: Legal Status, Rights, and Securing Yourself

  • 1. Your Mind: Legal Status, Rights and Securing Yourself Tiffany Rad and James Arlen Blackhat USA 2009 Briefings July 29th, 2009
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57. Your Mind: Legal Status, Rights and Securing Yourself - BlackHat USA 2009
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.

Notes de l'éditeur

  1. ---SPEAKING NOTES---BEGIN--- ---SPEAKING NOTES-----END---