Norwich University student Bob Pelletier continues his review of the role of honeypots in intrusion detection work. In this article he looks at fears that using honeypots might constitute entrapment. I (Kabay) have made minor editorial changes to his text to fit the format of this newsletter.* * *There are many benefits of using honeypots, and they are therefore becoming commonplace in many security strategies. However, there are legal issues associated with honeypot technologies.I am not a lawyer and what follows is not legal advice and should not be the sole basis for readers\u2019 decisions in this matter. It is best to consult a lawyer qualified in this area of practice before implementing a honeypot.Many factors dictate whether the use of a honeypot is legal or illegal. These articles do not cover all of these factors, but they do explain precautions that can be taken before implementing a honeypot so that you can comply with applicable federal laws.The first step to insure the legality of a honeypot is to define the goal of the system. Create policies that will outline exactly what information is going to be collected and to what end. There should be no misconceptions about what a honeypot system is being implemented for. Being upfront with the purpose of a honeypot can defuse accusations of secrecy or trickery. This is especially important in a production atmosphere where corporate policies need to be followed.A system banner should also be installed on the honeypot stating that users of the system may be monitored. As will be discussed later, this can eliminate charges of entrapment. Refer to Appendix A of \u201cSearching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations,\u201d created by the Department of Justice, for sample banners: https:\/\/www.cybercrime.gov\/s&smanual2002.htmThe next step that should be taken before implementing a honeypot is to research the laws and regulations in the particular location the system will be installed. Different countries and even different states will treat honeypots in a different manner. These subtle differences must be studied and understood. Many laws may govern honeypot use, but these articles will cover three general legal issues associated with honeypots. These three categories are entrapment, privacy and liability.Opponents of honeypot systems often claim that they are a form of entrapment. Entrapment is legally defined by the Supreme Court as \u201cthe conception and planning of an offense by an officer, and his procurement of its commission by one who would not have perpetrated it except for the trickery, persuasion, or fraud of the officers.\u201d This definition implies that a victim of entrapment must be tricked or persuaded to do something that he or she would not have normally done. Honeypots do not persuade attackers to take action against them. The systems are most often discovered through scans by blackhats. In this case, the attacker is taking initiative to find a vulnerable system so therefore cannot claim entrapment after the fact. Some will argue that an attacker would not have exploited a honeypot if it were not there to begin with. However, providing a target for a crime is not the same as encouraging one.Another hole in the entrapment argument is that it applies only to officers of the law. Private honeypot owners will not be prosecuted with entrapment because they are acting independently of the government. Government agencies and those affiliated with the law can be convicted of entrapment, but only if they encourage attacks as mentioned earlier. Proving an attacker\u2019s disposition to hacking can eliminate most entrapment accusations.* * *In the next article in this series, Bob Pelletier ( mailto:email@example.com ) looks at the privacy issues involved in using honeypots.