Feds appeal loss in PGP compelled-passphrase case
,----[ Quote ]
| It's time to take another look at the intriguing case of United States v.
| Boucher, which may set the ground rules for whether or not criminal
| defendants can be compelled to divulge encryption passphrases.
`----
http://www.news.com/8301-13578_3-9854034-38.html?part=rss&subj=news&tag=2547-1_3-0-20
N. Dakota Judge rules that "host -l" command constitutes hacking
,----[ Quote ]
| A North Dakota judge issued a ruling in Sierra Corporate Design v. Ritz that
| has some pretty stunning implications about the use of the "host -l" command
| when accessing DNS records. In the judgment (which was prepared by the
| plaintiff's counsel and sent to the judge), the use of the "host -l" command
| is tantamount to computer hijacking and hacking.
`----
http://www.downloadsquad.com/2008/01/17/n-dakota-judge-rules-that-host-l-command-constitutes-hacking/
Related:
Animal Rights Activists Forced to Hand Over Encryption Keys
,----[ Quote ]
| If you remember, this was sold to the public as essential for fighting
| terrorism. It's already being misused.
`----
http://www.schneier.com/blog/archives/2007/11/animal_rights_a.html
Judge: Man can't be forced to divulge encryption passphrase
,----[ Quote ]
| In this case, Judge Niedermeier took the second approach. He said that
| encryption keys can be "testimonial," and even the prosecution's alternative
| of asking the defendant to type in the passphrase when nobody was looking
| would be insufficient.
`----
http://www.news.com/8301-13578_3-9834495-38.html?tag=nefd.blgs
>From Zero to Holy $&*#!
,----[ Quote ]
| What if Linux and Free and Open Source Software became illegal to use due
| to “national security?” Never mind the fact that the American military uses
| it. Never mind the fact that Microsoft funded both political parties in the
| year 2000. Never mind that Richard Stallman has accused Microsoft of
| enabling terrorism in the first place.
`----
http://nixedblog.thenixedreport.com/?p=55
UK gov sets rules for hacker tool ban
,----[ Quote ]
| A revamp of the UK's outdated computer crime laws is long overdue. However,
| provisions to ban the development, ownership and distribution of
| so-called "hacker tools" draw sharp criticism from industry. Critics point
| out that many of these tools are used by system administrators and security
| consultants quite legitimately to probe for vulnerabilities in corporate
| systems.
`----
http://www.theregister.co.uk/2008/01/02/hacker_toll_ban_guidance/
German Security Professionals in the Mist
,----[ Quote ]
| This hope was important because earlier this year the German Government had
| introduced similar language into Section 202c StGB of the computer crime
| laws, which would have made the mere possession of (creates, obtains or
| provides access to, sells, yields, distributes or otherwise allows access to)
| tools like John, Kismet, KisMAC, Nessus, nmap, and the ability to Google
| effectively a crime.
`----
http://www.beskerming.com/commentary/2007/08/12/249/German_Security_Professionals_in_the_Mist
BitTorrent Admin Monitored by US Government, Forced to Dump Linux
,----[ Quote ]
| Sk0t, an ex-administrator of the EliteTorrents BitTorrent tracker is to have
| his internet connection forcibly monitored by the US Government. If that
| wasn’t bad enough, the monitoring software is Windows based - which means he
| is being forced to ditch Linux - or face being barred from the internet.
`----
http://torrentfreak.com/bittorrent-admin-monitored-by-us-government-forced-to-dump-linux/
|
|