RE: Legality of blue tooth hacking




Hello,
It will depend on the juristiction. It will also depend on the license and contractual terms associated with the software.
Copyright does not get removed just because you have changed or obscured the code. In fact the licensing agreement may make this act a breach in itself. In fact it is likely that the DMCA 2000 in the US (US copyright) could not only have this as a civil contract violation - but also a criminal one.
If the person had created their own code using thge standards (which are publically available) for the device, they would not in infringing copyright. If they have reversed engineered it, they may have an issue. If they have "hacked" bits of the code to suit what they want to do they could be in trouble.
Regards
Craig

-----Original Message-----
From: Chris Dalton [mailto:CGDALTON@xxxxxxxxxxxx]
Sent: Fri 17/03/2006 4:36 AM
To: Craig Wright; mht3@xxxxxxxxxxxxx; pen-test@xxxxxxxxxxxxxxxxx
Cc:
Subject: RE: Legality of blue tooth hacking



If you hack the code how does that affect the software license and
ownership of the software?
Seems like Legal would not be happy.

Chris G. Dalton C.P.A.
Corporate Audit Services
Capital One Financial
1-504-533-6419 phone
1-504-533-2355 fax

>>> "Craig Wright" <cwright@xxxxxxxxxxxxx> 03/15/06 10:19 PM >>>

Hi

As the simplest of answers,

"Unauthorised access to computer material". Being a phone does not
stop
it also vbeing a computer for the definition of the Act.

Just because the data is not secure does not make the act legal.

I fail to see how the person could argue that the data was public.
This
would be impossible if the device was not broadcasting but only
responded.

Regards
Craig

-----Original Message-----
From: mht3@xxxxxxxxxxxxx [mailto:mht3@xxxxxxxxxxxxx]
Sent: 16 March 2006 12:48
To: pen-test@xxxxxxxxxxxxxxxxx
Subject: Legality of blue tooth hacking

What is the current legality of blue tooth hacking?
At a recent Cisco security product meeting, I observed a security
practice director outside snarfing phone numbers and addresses from
the
various people who were attending the meeting. He got up and presented
the information saying there was no law preventing him from snarfing
information. I seem to recall attending a conference a while back
where
the laws regarding this type of blue tooth snarfing was discussed.

thanks for the assistance

/m

------------------------------------------------------------------------
------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to
proactively protect your applications from hackers. Cenzic has the
most
comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go
with a managed service (Cenzic ClickToSecure) or an enterprise
software
(Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm
your results from other product. Contact us at request@xxxxxxxxxx
------------------------------------------------------------------------
------


Liability limited by a scheme approved under Professional Standards
Legislation in respect of matters arising within those States and
Territories of Australia where such legislation exists.

DISCLAIMER
The information contained in this email and any attachments is
confidential. If you are not the intended recipient, you must not use or
disclose the information. If you have received this email in error,
please inform us promptly by reply email or by telephoning +61 2 9286
5555. Please delete the email and destroy any printed copy.

Any views expressed in this message are those of the individual sender.
You may not rely on this message as advice unless it has been
electronically signed by a Partner of BDO or it is subsequently
confirmed by letter or fax signed by a Partner of BDO.

BDO accepts no liability for any damage caused by this email or its
attachments due to viruses, interference, interception, corruption or
unauthorised access.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to
proactively
protect your applications from hackers. Cenzic has the most
comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a
managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic
Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm
your
results from other product. Contact us at request@xxxxxxxxxx
------------------------------------------------------------------------------






Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists.

DISCLAIMER
The information contained in this email and any attachments is confidential. If you are not the intended recipient, you must not use or disclose the information. If you have received this email in error, please inform us promptly by reply email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy.

Any views expressed in this message are those of the individual sender. You may not rely on this message as advice unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by a Partner of BDO.

BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, interception, corruption or unauthorised access.


Relevant Pages

  • Re: Will the real hacker please stand up and raise their hand
    ... security concepts, but cannot run a sniffer to save their life, ... Subject: Hackers and Employment ... managed service or an enterprise software ... Download FREE whitepaper on how a managed ...
    (Pen-Test)
  • Re: Pentester convicted..
    ... and thus politely forcing them take responsibility for the protection of privacy of the data they carry. ... and ignored the first 2 reports. ... A security pro notices a flaw, checks to make sure he is not on crack ... Download FREE whitepaper on how a managed service ...
    (Pen-Test)
  • Re: [lists] Re: What to spend on a pentest
    ... Only the vulnerability test needs to be performed by a visa certified vulnerability tester. ... You'll notice the annual pen-test requirement in 11.3 doesn't specify that ... > Officer Information Systems Security infosysec.net ... You have an option to go with a managed service (Cenzic ...
    (Pen-Test)
  • Re: What is being a pen tester really like?
    ... network architecture, security awareness, etc. ... >> What I would like to know is what is being a pen tester really like? ... As attacks through web applications continue to rise, ... Download FREE whitepaper on how a managed service can ...
    (Pen-Test)
  • Re: Licensed Penetration Tester LPT
    ... Subject: Licensed Penetration Tester LPT ... Expert in Security Policy Assessments ... applications continue to rise, ... how a managed service can ...
    (Pen-Test)