[Infowarrior] - Hacker Court @ Blackhat
Richard Forno
rforno at infowarrior.org
Tue Aug 5 01:09:46 UTC 2008
(Disclosure: I know the HC folks quite well, have participated in HC
at BH Federal, and consider these folks good securitygeek
friends.....but having said that, it's still a fun and quite
informative event!! -rf)
http://blog.tenablesecurity.com/2008/08/hacker-court-at.html
Hacker Court at Black Hat!
Hacker Court is once again returning to the Black Hat Briefings! For
our seventh Black Hat presentation, we will be conducting a mock court
trial focused on the issues of entrapment, journalist privilege and
wiretapping, titled "Hack MyFace."
What is "Hacker Court?"
Hacker Court is a loose organization of attorneys, security
professionals and hackers with the goal of demonstrating the dynamics,
frustrations and complexity of computer crime trials.
Teaching Points
The Hacker Court mock trials endeavor to teach a technical audience
the reality of computer crime trials.
Before joining Tenable, I was a free-lance security consultant and
developed a particular interest in computer crime cases after personal
experience in dealing with an intrusion. I thought I knew a lot about
the process, but it wasn’t until I actually worked on a case with the
Federal Defender’s Office in NY that I realized just how naïve I was
on how the legal system really worked. The defendant was even more
naïve and honestly thought that a “jury of his peers” meant that
people like Simple Nomad, Jericho and Rain Forest Puppy would serve on
the jury. After all - his “peers” were hackers!
Since then, I’ve been involved in other cases and these are a few of
the major lessons I’ve learned:
1. Defendants lie, even to their own defense team
2. Admissibility of evidence is up to the judge, not the technology or
its merit
3. A jurist with an infosec background would be disqualified from
serving on a computer crime case
4. Defense experts cannot talk about the case no matter how much the
defendant smears them to his friends
5. There are no “Matlock” moments
6. The trial is all about the attorneys’ performances
7. Technical evidence is boring, especially to the jury
8. A case will most likely not be prosecuted unless there is a 95
chance of a conviction. Corollary: if you go to trial, you're probably
going down.
9. Cross examination of witnesses is brutal
10. The trial may take place years after the crime
The most important (and scary) lesson I learned is that the case will
be won or lost by the side that makes their story compelling and
interesting. Technical details are neither.
How it's Done
The Hacker Court mock trials demonstrate these points by enacting a
courtroom environment where the audience is the jury. There is no pre-
set outcome and we take great pains to make the sure the deck is
pretty evenly stacked (which differs from most trials where the
prosecution usually wins). Although we work out the facts of the case
ahead of time, much of the testimony from witnesses is ad-libbed,
often with amusing results.
Hacker Court differs from an actual trial in that we streamline the
process and have some fun with it. An actual trial can take weeks - we
have 2 hours, which normally wouldn’t cover the opening remarks. Most
trials are also extremely boring, despite what you may see on TV. We
take many liberties to make it fun, which no judge in his right mind
would tolerate in an actual trial. For example, our 2004 presentation
“Pirates of the Potomac: The Curse of the Bl4ck Perl” featured Simple
Nomad as “Captain Jack Hack” (aka “Cracker Jack”), a hacker accused of
“war-sailing” up the Potomac.
This Year's Case
This year’s presentation will once again feature Simple Nomad as the
defendant, a “l33t” hacker who frequently posts to a blog run by a
journalist who investigates cases of identity theft and exposure of
personal information. Nomad claims to have a zero-day exploit that
will work on any social networking site and is goaded by another blog
poster to prove it by exploiting a social networking site called
“MyFace.”
A more complete case summary, along with Speaker bios, may be found at
the Black Hat site.
More information about the Infowarrior
mailing list