Skip to Content

Hackers today are testing mobile devices ever more strenuously, but the work often stands on shaky legal ground, according to Jennifer Granick, an attorney for ZwillGen, a law firm that specializes in legal issues related to the Internet. Granick was formerly civil liberties director for the Electronic Frontier Foundation.

Presenting at Black Hat, a computer security conference in Las Vegas, Granick outlined the tricky legal landscape that faces researchers trying to work in mobile. While historically, companies have often been reluctant to open their arms to hackers, mobile devices introduce new challenges, such as having to deal with tangled FCC regulations, and laws that aren’t designed for modern devices.

For example, Granick explained, techniques such as jailbreaking iPhones to run non-Apple approved software are governed under U.S. copyright law. The U.S. Copyright Office reviews its rules every three years, and did add exemptions to allow jailbreaking. However, since the iPad didn’t exist the last time this review happened, jailbreaking these devices exists in a legal limbo.

Just to work on devices often requires taking some legal risk. Companies such as Apple lock down mobile devices and software through restrictive developers’ agreements and end-user license agreements, as well as with technical protections that are backed by law.

One particularly tricky area is location-based services. In many cases, Granick said, how communications are classified can determine how severe the legal risk connected with hacking them becomes. Accessing communications in a way that could be considered wiretapping comes with strict legal penalties, but accessing stored communications is sometimes treated differently. Under some interpretations, Granick said, there might be reason to classify communications between users and companies such as Foursquare so that intercepting them would be considered wiretapping.

Considering the fierce debates already going on around the info that passes through mobile devices, Granick’s talk illustrated the legal difficulties of pinning down exactly what goes on.

Deep Dive

Uncategorized

Embracing CX in the metaverse

More than just meeting customers where they are, the metaverse offers opportunities to transform customer experience.

Identity protection is key to metaverse innovation

As immersive experiences in the metaverse become more sophisticated, so does the threat landscape.

The modern enterprise imaging and data value chain

For both patients and providers, intelligent, interoperable, and open workflow solutions will make all the difference.

Scientists have created synthetic mouse embryos with developed brains

The stem-cell-derived embryos could shed new light on the earliest stages of human pregnancy.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.