RE: Legality of blue tooth hacking

From: Craig Wright (cwright@bdosyd.com.au)
Date: Wed Mar 15 2006 - 23:19:32 EST


Hi

As the simplest of answers,

"Unauthorised access to computer material". Being a phone does not stop
it also vbeing a computer for the definition of the Act.

Just because the data is not secure does not make the act legal.

I fail to see how the person could argue that the data was public. This
would be impossible if the device was not broadcasting but only
responded.

Regards
Craig

-----Original Message-----
From: mht3@earthlink.net [mailto:mht3@earthlink.net]
Sent: 16 March 2006 12:48
To: pen-test@securityfocus.com
Subject: Legality of blue tooth hacking

What is the current legality of blue tooth hacking?
At a recent Cisco security product meeting, I observed a security
practice director outside snarfing phone numbers and addresses from the
various people who were attending the meeting. He got up and presented
the information saying there was no law preventing him from snarfing
information. I seem to recall attending a conference a while back where
the laws regarding this type of blue tooth snarfing was discussed.

thanks for the assistance

/m

------------------------------------------------------------------------
------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to
proactively protect your applications from hackers. Cenzic has the most
comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go
with a managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm
your results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------
------

Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists.

DISCLAIMER
The information contained in this email and any attachments is confidential. If you are not the intended recipient, you must not use or disclose the information. If you have received this email in error, please inform us promptly by reply email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy.

Any views expressed in this message are those of the individual sender. You may not rely on this message as advice unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by a Partner of BDO.

BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, interception, corruption or unauthorised access.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:41 EDT