Penetration Testing mailing list archives
RE: Legality of blue tooth hacking
From: "Shenk, Jerry A" <jshenk () decommunications com>
Date: Wed, 15 Mar 2006 22:29:06 -0500
Wow! That seems a little risky to me. What he's saying may be true...there is no expectation of privacy in the BlueTooth, WiFi and some other specific spectrums. While there may not be an expectation of privacy (from a legal perspective...the user may not know that), what gets done with the data may clearly be illegal. I would think the act of displaying the private information of people at the conference would be a violation of something. This whole debate has been doing on for years in the WiFi world and a lot of people argue strongly on both sides. The place people get into trouble is what they do. In one case, a "security practitioner" modified some files on a network to demonstrate a vulnerability...that was a mistake. I've seen credit card numbers in the clear...obviously using them would clearly be illegal. I have demonstrated information that I've found but prior to demonstrating it, I'm been careful to obfuscate it to the point that I wasn't telling anybody that somebody else's network was vulnerable. -----Original Message----- From: mht3 () earthlink net [mailto:mht3 () earthlink net] Sent: Wednesday, March 15, 2006 8:48 AM To: pen-test () securityfocus com Subject: Legality of blue tooth hacking What is the current legality of blue tooth hacking? At a recent Cisco security product meeting, I observed a security practice director outside snarfing phone numbers and addresses from the various people who were attending the meeting. He got up and presented the information saying there was no law preventing him from snarfing information. I seem to recall attending a conference a while back where the laws regarding this type of blue tooth snarfing was discussed. thanks for the assistance /m ------------------------------------------------------------------------ ------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------ ------ **DISCLAIMER This e-mail message and any files transmitted with it are intended for the use of the individual or entity to which they are addressed and may contain information that is privileged, proprietary and confidential. If you are not the intended recipient, you may not use, copy or disclose to anyone the message or any information contained in the message. If you have received this communication in error, please notify the sender and delete this e-mail message. The contents do not represent the opinion of D&E except to the extent that it relates to their official business. ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- Legality of blue tooth hacking mht3 (Mar 15)
- Re: Legality of blue tooth hacking Cedric Blancher (Mar 16)
- Re: Legality of blue tooth hacking Paul Robertson (Mar 16)
- Re: Legality of blue tooth hacking Tim Hurman (Mar 16)
- <Possible follow-ups>
- RE: Legality of blue tooth hacking Shenk, Jerry A (Mar 16)
- RE: Legality of blue tooth hacking Craig Wright (Mar 16)
- RE: Legality of blue tooth hacking Chris Dalton (Mar 16)
- RE: Legality of blue tooth hacking Craig Wright (Mar 16)
- RE: Legality of blue tooth hacking Cedric Blancher (Mar 18)
- Message not available
- RE: Legality of blue tooth hacking Mark Teicher (Mar 19)
- RE: Legality of blue tooth hacking Mark Teicher (Mar 20)
- Message not available