Precedents

Even if we narrow our discussion to U.S. federal law, there are no no firm answers to whether an activity is legal. As this book goes to press, honeypot technologies and their use are relatively new; organizations are only now beginning to adopt them as security mechanisms. For example, this book is the first to focus on honeypot technologies. Very few people have extensive experience with the technologies and issues involved, including the security community. If the security community is just starting to develop and deploy these technologies, then it stands to reason that the legal community has not yet had the opportunity to address them.

No U.S. federal statute directly or specifically addresses honeypot technologies. No doubt ...

Get Honeypots: Tracking Hackers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.