All animals are equal. Some are just more equal than others.
The Computer Fraud and Abuse Act, otherwise known as 18 USC 1030, allows private parties to sue for 'unauthorized access to a networked computer'.
This is to stop black hats, right?
Wrong. Threats of legal action based on this and other laws are used on a regular basis stop legitimate research and disclosure of significant flaws in systems.
Examples of the use or threats of legal action will be discussed at length. Methods to protect researchers, publishers and conference organizers will be discussed as well.