Hacking ▍

Legal & lab discipline

Legal & ethics — applies to every tool in this hub

These rules apply to all tools in Hack Tools/. Not legal advice. Re-read before any field work.

Standing rules

  1. Owned hardware or written authorization. Every test target must either belong to tjscientist or be covered by explicit, written authorization from the owner with a defined scope.
  2. Document the lab kit. Maintain a list of targets tjscientist owns, with photos and serial numbers if applicable. Keep authorization letters in Hack Tools/_shared/authorizations/ (gitignored if version-controlled).
  3. Distinguish “lab” from “in the wild”. Replaying a captured signal back into the same controlled environment tjscientist owns is fine. Transmitting against neighbors’ equipment, public infrastructure, or vehicles is not.
  4. No jamming. Continuous-wave jamming of any band is illegal under FCC and most equivalents regardless of intent. Don’t.
  5. No unauthorized access. BadUSB, MouseJack, BLE injection, evil portals — all are unauthorized-access territory when used against equipment tjscientist doesn’t own and isn’t paid to test.

RF transmit

  • Power, frequency, and duty cycle are regulated. Aviation, public-safety, amateur (without a license), and licensed-commercial bands are off-limits.
  • Region restrictions vary. Custom firmwares (Momentum, Unleashed, etc.) remove the firmware-side guardrails — that shifts responsibility to the operator, it does not legalize anything.
  • Replay attacks against rolling-code remotes (KeeLoq variants) are usually bounded by the manufacturer key — capture and replay often fails by design. Even when it works, replay against a vehicle or door you don’t own is grand theft / breaking-and-entering territory.

RFID / NFC

  • Reading a card tjscientist carries: legal.
  • Reading a card found on the ground: murky.
  • Reading a card from someone else’s pocket without consent: depending on jurisdiction, somewhere between mischief and computer fraud.
  • Cloning building-access cards without explicit written authorization from the building owner: illegal under U.S. CFAA and equivalents.

BadUSB / MouseJack / BLE injection

  • Computer-attack territory. Connecting to or injecting into a machine tjscientist does not own, without written permission, is unauthorized access (CFAA in the U.S.).
  • “Awareness” payloads that just open a web page still count.

WiFi audits

  • Deauthentication, evil-portal, EAPOL capture against networks tjscientist doesn’t own: illegal.
  • Beacon spam in public spaces: depending on jurisdiction, regulatory violation (interference) plus potentially unauthorized access.

Public disclosure

  • If something tjscientist finds is novel and exploitable, prefer responsible disclosure. The vendor first; CERT/CC or a coordinated path second; public last.
  • Do not publicize specific keys, algorithms, or payloads that could be used to compromise third-party systems unless those have already been published by a primary research source.

What this means for Claude in this project

  • Decline to write or document attacks targeted at third parties, named systems tjscientist doesn’t own, or specific public infrastructure.
  • Decline to research bypass techniques framed as “for a friend’s…” or “my client gave me permission” without that permission being verifiable.
  • When generating payloads, default to WAIT_FOR_BUTTON_PRESS first lines, narrow scope, and clear “lab use only” comments.
  • When in doubt, ask tjscientist to confirm the scope before producing.