Penetration Testing mailing list archives

RE: Legality of blue tooth hacking


From: "Craig Wright" <cwright () bdosyd com au>
Date: Fri, 17 Mar 2006 06:51:51 +1100


Hello,
It will depend on the juristiction. It will also depend on the license and contractual terms associated with the 
software.
Copyright does not get removed just because you have changed or obscured the code. In fact the licensing agreement may 
make this act a breach in itself. In fact it is likely that the DMCA 2000 in the US (US copyright) could not only have 
this as a civil contract violation - but also a criminal one.
If the person had created their own code using thge standards (which are publically available) for the device, they 
would not in infringing copyright. If they have reversed engineered it, they may have an issue. If they have "hacked" 
bits of the code to suit what they want to do they could be in trouble. 
Regards
Craig

        -----Original Message----- 
        From: Chris Dalton [mailto:CGDALTON () hibernia com] 
        Sent: Fri 17/03/2006 4:36 AM 
        To: Craig Wright; mht3 () earthlink net; pen-test () securityfocus com 
        Cc: 
        Subject: RE: Legality of blue tooth hacking
        
        

        If you hack the code how does that affect the software license and
        ownership of the software?
        Seems like Legal would not be happy.
        
        Chris G. Dalton C.P.A.
        Corporate Audit Services
        Capital One Financial
        1-504-533-6419 phone
        1-504-533-2355 fax
        
        >>> "Craig Wright" <cwright () bdosyd com au> 03/15/06 10:19 PM >>>
        
        Hi
        
        As the simplest of answers,
        
        "Unauthorised access to computer material". Being a phone does not
        stop
        it also vbeing a computer for the definition of the Act.
        
        Just because the data is not secure does not make the act legal.
        
        I fail to see how the person could argue that the data was public.
        This
        would be impossible if the device was not broadcasting but only
        responded.
        
        Regards
        Craig
        
        -----Original Message-----
        From: mht3 () earthlink net [mailto:mht3 () earthlink net]
        Sent: 16 March 2006 12:48
        To: pen-test () securityfocus com
        Subject: Legality of blue tooth hacking
        
        What is the current legality of blue tooth hacking?
        At a recent Cisco security product meeting, I observed a security
        practice director outside snarfing phone numbers and addresses from
        the
        various people who were attending the meeting. He got up and presented
        the information saying there was no law preventing him from snarfing
        information.  I seem to recall attending a conference a while back
        where
        the laws regarding this type of blue tooth snarfing was discussed.
        
        thanks for the assistance
        
        /m
        
        ------------------------------------------------------------------------
        ------
        This List Sponsored by: Cenzic
        
        Concerned about Web Application Security?
        As attacks through web applications continue to rise, you need to
        proactively protect your applications from hackers. Cenzic has the
        most
        comprehensive solutions to meet your application security penetration
        testing and vulnerability management needs. You have an option to go
        with a managed service (Cenzic ClickToSecure) or an enterprise
        software
        (Cenzic Hailstorm).
        Download FREE whitepaper on how a managed service can help you:
        http://www.cenzic.com/news_events/wpappsec.php
        And, now for a limited time we can do a FREE audit for you to confirm
        your results from other product. Contact us at request () cenzic com
        ------------------------------------------------------------------------
        ------
        
        
        Liability limited by a scheme approved under Professional Standards
        Legislation in respect of matters arising within those States and
        Territories of Australia where such legislation exists.
        
        DISCLAIMER
        The information contained in this email and any attachments is
        confidential. If you are not the intended recipient, you must not use or
        disclose the information. If you have received this email in error,
        please inform us promptly by reply email or by telephoning +61 2 9286
        5555. Please delete the email and destroy any printed copy.
        
        Any views expressed in this message are those of the individual sender.
        You may not rely on this message as advice unless it has been
        electronically signed by a Partner of BDO or it is subsequently
        confirmed by letter or fax signed by a Partner of BDO.
        
        BDO accepts no liability for any damage caused by this email or its
        attachments due to viruses, interference, interception, corruption or
        unauthorised access.
        
        ------------------------------------------------------------------------------
        This List Sponsored by: Cenzic
        
        Concerned about Web Application Security?
        As attacks through web applications continue to rise, you need to
        proactively
        protect your applications from hackers. Cenzic has the most
        comprehensive
        solutions to meet your application security penetration testing and
        vulnerability management needs. You have an option to go with a
        managed
        service (Cenzic ClickToSecure) or an enterprise software (Cenzic
        Hailstorm).
        Download FREE whitepaper on how a managed service can help you:
        http://www.cenzic.com/forms/ec.php?pubid=10025
        And, now for a limited time we can do a FREE audit for you to confirm
        your
        results from other product. Contact us at request () cenzic com
        ------------------------------------------------------------------------------
        
        
        
        


Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within 
those States and Territories of Australia where such legislation exists.

DISCLAIMER
The information contained in this email and any attachments is confidential. If you are not the intended recipient, you 
must not use or disclose the information. If you have received this email in error, please inform us promptly by reply 
email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy.  

Any views expressed in this message are those of the individual sender. You may not rely on this message as advice 
unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by 
a Partner of BDO.

BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, 
interception, corruption or unauthorised access.

Current thread: