Intrusion Detection Systems mailing list archives
Re: legality of sacrificial host to prosecute
From: JohnNicholson () aol com (JohnNicholson () aol com)
Date: Wed, 13 Oct 1999 09:59:40 EDT
In a message dated 10/13/1999 8:04:53 AM Eastern Daylight Time, FMartins () pt imshealth com writes:
When we say "this is legal or this is not legal" the question is WHERE? If you have any practice in tracing attackers, you know that in many countries laws are not the same, and sometimes the attacker goes free just because in his own country what he did was just not even specified in his country laws.
You're exactly right, here, Fernando. That's why I try to be careful and specify that I am talking about US law. However, the logic should apply regardless of legal system (granted that assumes that judges and legislators behave rationally, which we all know is a HUGE assumption). And your point about things getting a lot more complicated in court is very true. A defense lawyer is going to point out that logs are just easily alterable ASCII files. That's where we get into the discussion of evidence and chain of custody, but that's a separate topic.
The best exemple i can give you without make any law research, is that " entrapment" is not defined in portuguese laws about cybercrime.
Entrapment is not defined under US laws regarding cybercrime, either. It's a concept of its own and applies as a possible defense to any crime. [Note: When I said, "As I and at least one other person have said..." I meant one other person on this list had posted similar language in this discussion. I was not citing to authority, I just wanted to point out that someone else was saying the same thing without seaching back through my mail file to figure out who posted it.] As far as your example of the bad browser is concerned, you were using a browser to see whether or not you could get into that guy's server. You didn't make a mistake and just happen to pull a file from the wrong place. Granted, you thought you were doing him a favor and being a white hat because you didn't do any damage, but you were still intentionally trying to get access to his server. From your description, it sounds like you got into a honeypot, instead, which is something of a vindication for the concept of honeypots. John
Current thread:
- Re: RE: legality of sacrificial host to prosecute JohnNicholson () aol com (Oct 12)
- <Possible follow-ups>
- Re: legality of sacrificial host to prosecute JohnNicholson () aol com (Oct 12)
- Re: legality of sacrificial host to prosecute Jim Duncan (Oct 12)
- RE: legality of sacrificial host to prosecute Lisbon (Oct 13)
- Re: legality of sacrificial host to prosecute JohnNicholson () aol com (Oct 13)
- RE: legality of sacrificial host to prosecute Lisbon (Oct 13)
- RE: legality of sacrificial host to prosecute Lisbon (Oct 13)
