Critical Briefing: Cyber Threats, Crimes, and Security

advertisement
Critical Briefing: Cyber
Threats, Crimes, and Security
Panelists:
Kara Altenbaumer – Price, Kibble & Prentice, a USI Company
Theodore Angelis – K&L Gates LLP
Daimon Geopfert – McGladrey LLP
Ryan Harkins – Microsoft Corporation
Pablos Holman – Intellectual Ventures Laboratory
June 11, 2013
© Copyright 2013 by K&L Gates LLP. All rights reserved.
Threat Assessment: Today’s big threats, and
how hackers and criminals are succeeding
klgates.com
Pablos Holman
Futurist. Inventor. Hacker
klgates.com
Hacking and Data Breach
Case Studies
klgates.com
klgates.com
The Spectrum of Cyber Attacks
 Advanced Persistent Threats (“APT”)
 Data Breach and Malware
 Denial of Service attacks (“DDoS”)
 Domain name hijacking
 Corporate impersonation and Phishing
 Employee mobility and disgruntled
employees
 Lost or stolen laptops and mobile
devices
 Inadequate security and systems: first
party and third-party vendors
klgates.com
Advanced Persistent Threats
 targeted, persistent, evasive and advanced
 nation state sponsored
P.L.A. Unit 61398
“Comment Crew”
klgates.com
Advanced Persistent Threats
 United States Cyber Command and director of the
National Security Agency, Gen. Keith B. Alexander,
has said the attacks have resulted in the “greatest
transfer of wealth in history.”
Source: New York Times, June 1, 2013.
klgates.com
Advanced Persistent Threats
 Penetration: Spear Phishing
 67 percent of organizations admit that their current
security activities are insufficient to stop a targeted
attack.*
 Duration:
 average = 356 days**
 Discovery: External Alerts
 55 percent are not even aware of intrusions*
*Source: Trend Micro, USA.
http://www.trendmicro.com/us/enterprise/challeng
es/advance-targeted-attacks/index.html
**Source: Mandiant, “APT1, Exposing One of
China’s Cyber Espionage Units”
klgates.com
Case Study 1 – Industrial Company in Midwest
klgates.com
Case Study 1 – Industrial Company in Midwest
klgates.com
Case Study 2 – Technology/Electronics Co.
Began With Unauthorized Wire Transfer
 CFO returned from vacation and sees
outgoing $250k wire transfer she did not
.
initiate
 Bank explained it received wire authorization
and follow-up email authorization
 Phone confirmation protocol not followed because
hackers cleverly timed transfer during planned phone
outage at CFO’s company
 Thankfully, client able to cancel wire in time
klgates.com
Case Study 2 – Technology/Electronics Co.
Investigation Ensued
 Access via compromised machine, but
perpetrator forwarded wire confirmation to
.
mikeuser101@yahoo.com
 Same account identified in public source
phishing site impersonating Re-Max
klgates.com
Case Study 2 – Technology/Electronics Co.
Investigation Ensued
 CFO confirmed she previously searched on
Re-Max websites and browser cache confirms
likely infection vector .
 Testing in sandbox environment indicated no
apparent malware or malicious code installed
klgates.com
Prevention and Protection: Defense and
protection methods, and what insurance to
maintain
Data Breach: A Big
Problem
Header
Header
Text
Text
Header
Header
Text
Text
Header
Header
Text
Text
15
So what to do?
Pressures
How you respond matters
17
Form a Team and a Plan
Misconceptions
•
Compliance ≠ Security
• Don’t ask the security team to build the walls and roof until you’ve laid the foundation
• Security is not bought • Tools are tools, not solutions
• Security threats do not only come from “out there”
• Attacks by rogue employees, mistakes, and fraud are not common, but result in immense damage when they occur
• Remember, once the bad guys breach your external boundary they are now a version of insider threat
19
Misconceptions
•
Risk is introduced when basic controls are viewed as “the”
solution rather than the start of a solution
• Creates blind spots and false sense of security
• Creates “islands” rather than defense in depth
• Controls not focused on current threats and tactics
•
The examples in this presentation are “real world” and attempt to demonstrate the effectiveness of basic controls versus modern adversaries
•
After we talk about what is broken we’ll do our best to describe some possible solutions
20
Case Study #1: Signature Bypass
•
Control Example – PCI:
• 11.4.b Confirm IDS and/or IPS are configured to alert personnel of suspected compromises.
• 11.4.c Examine IDS/IPS configurations and confirm IDS/IPS
devices are configured, maintained, and updated per vendor instructions to ensure optimal protection.
•
Control Example – ISO:
•
•
10.4.1 Detection, prevention, and recovery controls to protect against malicious code and appropriate user awareness procedures should be implemented.
10.4.1d Installation and regular update of malicious code detection and repair software to scan computers and media as a precautionary control, or on a routine basis; 21
Case Study #1: Signature Bypass
• In English…
• Is AV deployed?
• Is it on users systems, servers, mail, etc.?
• Are scans run regularly?
• Is IDS/IPS deployed?
• Is it where it should be?
• Are the signatures updated regularly? 22
Case Study #1: Signature Bypass
•
Reality
• Fully automated IDS/IPS can be noisy and dangerous
•
•
•
•
IDS/IPS/AV main functionality is signature based
These same signatures are available to the attackers
•
•
Alerts turned off or thresholds raised to do the same
After that first critical transaction is blocked by mistake this
typically goes away temporarily on a permanent basis
Attackers purchase the same subscriptions and appliances you have to perform QA of their malware products
So what do attackers do with available signatures?
•
•
•
•
Mutation
Encoding and Packing
Encryption •
Network and File
Avoid AV detection by never touching the disk
23
Case Study #1: Signature Bypass
• Demo #1: Antivirus bypass
Attacker: 192.168.10.10
Target: 192.168.10.202
AV: Avast
• Food for thought…
24
Case Study #1: Signature Bypass
•
Malware Generation Rates
25
Case Study #2: Social Engineering
• So, now I know malware is dangerous. But how do they get it into the environment?
• Fun with Social Engineering
• Fancy name for traditional “con games”
• Attacking an environment via (technical) manipulation of people • Focused on user habits, mannerisms, human nature, entrenched organizational procedures and activities
• The attack vector of choice for many advanced attackers
• Effectiveness of typical countermeasures such as firewalls, anti‐virus, and intrusion detection systems are greatly reduced
26
Case Study #2: Social Engineering
• Cyber criminals are increasingly turning to social networks, as opposed to email services, to attack users as it is much more difficult to monitor and control and users are more likely to fall for scams because of inherent trust relationships
• Attacks are happening “inside the castle” with mainly local anti‐
virus as the last line of defense which is a scary thought
• Pharming
• Phishing
• Spear Phishing
• Whaling
27
Case Study #2: Social Engineering
• Demo #2: Social Engineering Demo
Google Mail
Target: 192.168.10.202
OS: Patched WinXP
Linkedin.com
Attacker:
192.168.10.10
LinkedIn Clone
28
Case Study #3:
Good Example of a Bad Example
•
The Phone Call…
•
•
•
•
•
“Uh, buddy, we can really use some help. Can you be here
tomorrow?”
“I’ll do my best. What’s wrong?”
“We think we’ve had a breach. We need some help figuring out what
is going on.”
“Ok, I’ll start making plans. What makes you think you’ve been
breached?”
“Somebody just moved $1,500,000 out of our corporate bank accounts
to China.”
•
•
•
•
As an investigator, we call this a clue
“That is suspicious. What do you have for us to work with?”
“Are you trying to be funny? You were just here. We haven’t changed
much.”
“Ok, let’s see what we can do…”
Case Study #3:
Good Example of a Bad Example
•
This is called a bad day
Unaffected
Users
1
5
Known Event
Start
Bank
2
4
Affected User
3
Recommendations
•
•
Bring security into Risk Management process
Necessary to create APPROPRIATE controls
•
•
•
•
Horses and fences…
It is not meant to bring risk to zero
It is only meant to create a rational, non‐emotional approach to managing risk External Drivers
Notice the loop…
Industry
Regulatory
Threats
Risk Management
Oversight
Internal Drivers
Business Processes
Policies and Procedures
Metrics
Resources
Deploy and Educate
Analyze and Design
Implement
31
Recommendations
• Understand that modern threats are built to bypass preventative controls
• Adjust your focus to robust detective and corrective controls
32
Recommendations
• Move from point solutions to consolidated monitoring
• Correlate disparate systems logs (patterns in timing, traffic, behavior, etc.)
• Understand attacker tendencies and battle plans
• Modern attackers are after profit
• Understand what they want, how they’d get to it, and how they’d get it out
• “87% percent of victims had evidence of the breach in their log files, yet missed it.“ Verizon 2010 Data Breach Report
33
Recommendations
• Understand that AV is becoming less and less effective
• It is still a foundational element of your security posture, but don’t place sole reliance on these solutions • Utilize different AV solutions at different points in the network
• Robust patching including more than just the Operating System
• Browsers, office apps, third‐party apps (Java, Flash, Quicktime, etc.)
• User awareness training
•
•
•
•
•
What is Social Engineering? How does it work? What are popular tactics? Hint: Make it about THEIR risk…
If you can afford it, conduct a social engineering test at least once a year
Do NOT punish failure, identify areas that need additional training
Don’t forget your customers and business partners…
• When was the last time you did a CIRT exercise?
34
Summary
• Don’t Panic
• Plan to fail, but plan to fail gracefully
• Ability to know when a control has failed
• Ability to recover quickly and with minimal damage
• We’ve pointed out methods to bypass individual types of controls on a case by case basis
• Consolidated, robust controls in a defense‐in‐depth manner are effective
• Do not become a “hacker snack”
• Hard and crunchy on the outside, soft and gooey in the middle
• Every hoop you force the attacker to jump through is a chance for you to detect them… if you are watching
• You don’t need to out run the bear…
35
3rd Party Cyber Liability Coverage –
Losses Suffered by Your Clients or Patients
Other 3rd Party Cyber Liability Coverages
1st Party Cyber Liability Coverage –
Loss Suffered Directly By An Insured
The Insurance Gap – Cyber and Privacy
are NOT typically covered under…
The Importance of a Knowledgeable Broker
 The Application/Underwriting Submission Process:



An involved process as an Application is typically required prior to release of a formal quote
Supplemental information (internal control details such as encryption techniques used, experience of IT
department, etc) may be required
Finally, a call between an underwriters/carrier tech experts and client IT department may be
necessary/beneficial
 Negotiating the marketplace – Coverage is not standardized



Modular format of Privacy and Liability coverage – what clauses fit a particular risk, which need to be
amended and which can be excluded
Internal contract language varies from carrier to carrier (and current market supports over 30 carriers
offering coverage)
Example: Per record lost breach notification limit or sublimited coverage by dollar amount (i.e., a Limit of
User Records breached ala 2 million users, vs. a set dollar sub limit for notification costs
 The Importance of a sophisticated Broker – The USI advantage:




USI has a dedicated team of Cyber and Privacy Liability experts to advise clients
USI has access to the leading markets in Cyber and Privacy Liability
USI has negotiated complex cyber and privacy coverages across industries
USI stands ready to assist clients and prospects navigate this new landscape
Corrections and Remedies: Going after the bad
guys and implementing workable fixes
klgates.com
klgates.com
42
Example 1
klgates.com
klgates.com
klgates.com
klgates.com
klgates.com
klgates.com






























Microsoft Mail Internet Headers Version 2.0
Received: from smtp1.klgates.com (192.168.50.12) by uspexhub01.kldomain.com
(10.50.51.20) with Microsoft SMTP Server (TLS) id 8.1.436.0; Tue, 11 May 2010
12:17:07 -0400
Received: from mail193-tx2-R.bigfish.com (65.55.88.114) by smtp2.klgates.com
(192.168.50.12) with Microsoft SMTP Server (TLS) id 8.1.436.0; Tue, 11 May
2010 12:17:09 -0400
Received: from mail193-tx2 (localhost.localdomain [127.0.0.1]) by
mail193-tx2-R.bigfish.com (Postfix) with ESMTP id D9FBA160826D
for
<david.bateman@klgates.com>; Tue, 11 May 2010 16:17:06 +0000 (UTC)
Received: from TX2EHSMHS031.bigfish.com (unknown [10.9.14.239])
by
mail193-tx2.bigfish.com (Postfix) with ESMTP id B2436D7004B
for
<david.bateman@klgates.com>; Tue, 11 May 2010 16:17:06 +0000 (UTC)
Received: from snt0-omc4-s16.snt0.hotmail.com (65.55.90.219) by
TX2EHSMHS031.bigfish.com (10.9.99.131) with Microsoft SMTP Server id
14.0.482.44; Tue, 11 May 2010 16:17:05 +0000
Received: from SNT119-W20 ([65.55.90.200]) by snt0-omc4-s16.snt0.hotmail.com
with Microsoft SMTPSVC(6.0.3790.4675);
Tue, 11 May 2010 09:17:05 -0700
Message-ID: <SNT119-W207333051C3972D0BCDFBDC7FA0@phx.gbl>
Content-Type: multipart/alternative;
boundary="_5ed71e7b-bb19-4fdf-86fd-8318a8696e4b_"
X-Originating-IP: [76.121.52.87]
From: Bill Clinton <seattlestalker@hotmail.com>
To: <david.bateman@klgates.com>
Subject: Can You Find Me?
Date: Tue, 11 May 2010 16:17:05 +0000
Importance: Normal
FILETIME=[65BF99E0:01CAF125]
X-Reverse-DNS: snt0-omc4-s16.snt0.hotmail.com
klgates.com
Return-Path: seattlestalker@hotmail.com






























Microsoft Mail Internet Headers Version 2.0
Received: from smtp1.klgates.com (192.168.50.12) by uspexhub01.kldomain.com
(10.50.51.20) with Microsoft SMTP Server (TLS) id 8.1.436.0; Tue, 11 May 2010
12:17:07 -0400
Received: from mail193-tx2-R.bigfish.com (65.55.88.114) by smtp2.klgates.com
(192.168.50.12) with Microsoft SMTP Server (TLS) id 8.1.436.0; Tue, 11 May
2010 12:17:09 -0400
Received: from mail193-tx2 (localhost.localdomain [127.0.0.1]) by
mail193-tx2-R.bigfish.com (Postfix) with ESMTP id D9FBA160826D
for
<david.bateman@klgates.com>; Tue, 11 May 2010 16:17:06 +0000 (UTC)
Received: from TX2EHSMHS031.bigfish.com (unknown [10.9.14.239])
by
mail193-tx2.bigfish.com (Postfix) with ESMTP id B2436D7004B
for
<david.bateman@klgates.com>; Tue, 11 May 2010 16:17:06 +0000 (UTC)
Received: from snt0-omc4-s16.snt0.hotmail.com (65.55.90.219) by
TX2EHSMHS031.bigfish.com (10.9.99.131) with Microsoft SMTP Server id
14.0.482.44; Tue, 11 May 2010 16:17:05 +0000
Received: from SNT119-W20 ([65.55.90.200]) by snt0-omc4-s16.snt0.hotmail.com
with Microsoft SMTPSVC(6.0.3790.4675);
Tue, 11 May 2010 09:17:05 -0700
Message-ID: <SNT119-W207333051C3972D0BCDFBDC7FA0@phx.gbl>
Content-Type: multipart/alternative;
boundary="_5ed71e7b-bb19-4fdf-86fd-8318a8696e4b_"
X-Originating-IP: [76.121.52.87]
From: Bill Clinton <seattlestalker@hotmail.com>
To: <david.bateman@klgates.com>
Subject: Can You Find Me?
Date: Tue, 11 May 2010 16:17:05 +0000
Importance: Normal
FILETIME=[65BF99E0:01CAF125]
X-Reverse-DNS: snt0-omc4-s16.snt0.hotmail.com
klgates.com
Return-Path: seattlestalker@hotmail.com
192.168.50.12
65.55.90.200
76.121.52.87
65.55.90.200
KLGATES.COM
192.168.50.12
76.121.52.87
klgates.com






























Microsoft Mail Internet Headers Version 2.0
Received: from smtp1.klgates.com (192.168.50.12) by uspexhub01.kldomain.com
(10.50.51.20) with Microsoft SMTP Server (TLS) id 8.1.436.0; Tue, 11 May 2010
12:17:07 -0400
Received: from mail193-tx2-R.bigfish.com (65.55.88.114) by smtp2.klgates.com
(192.168.50.12) with Microsoft SMTP Server (TLS) id 8.1.436.0; Tue, 11 May
2010 12:17:09 -0400
Received: from mail193-tx2 (localhost.localdomain [127.0.0.1]) by
mail193-tx2-R.bigfish.com (Postfix) with ESMTP id D9FBA160826D
for
<david.bateman@klgates.com>; Tue, 11 May 2010 16:17:06 +0000 (UTC)
Received: from TX2EHSMHS031.bigfish.com (unknown [10.9.14.239])
by
mail193-tx2.bigfish.com (Postfix) with ESMTP id B2436D7004B
for
<david.bateman@klgates.com>; Tue, 11 May 2010 16:17:06 +0000 (UTC)
Received: from snt0-omc4-s16.snt0.hotmail.com (65.55.90.219) by
TX2EHSMHS031.bigfish.com (10.9.99.131) with Microsoft SMTP Server id
14.0.482.44; Tue, 11 May 2010 16:17:05 +0000
Received: from SNT119-W20 ([65.55.90.200]) by snt0-omc4-s16.snt0.hotmail.com
with Microsoft SMTPSVC(6.0.3790.4675);
Tue, 11 May 2010 09:17:05 -0700
Message-ID: <SNT119-W207333051C3972D0BCDFBDC7FA0@phx.gbl>
Content-Type: multipart/alternative;
boundary="_5ed71e7b-bb19-4fdf-86fd-8318a8696e4b_"
X-Originating-IP: [76.121.52.87]
From: Bill Clinton <seattlestalker@hotmail.com>
To: <david.bateman@klgates.com>
Subject: Can You Find Me?
Date: Tue, 11 May 2010 16:17:05 +0000
Importance: Normal
FILETIME=[65BF99E0:01CAF125]
X-Reverse-DNS: snt0-omc4-s16.snt0.hotmail.com
klgates.com
Return-Path: seattlestalker@hotmail.com
192.168.50.12
65.55.90.200
76.121.52.87
Comcast Cable
Washington
76.121.52.87
klgates.com
76.121.52.87
klgates.com
Forensics + Subpoena Power = Success
 “John Doe” lawsuits
 Extensive use in Internet cases due to anonymity and
fake identities
 Allow discovery into identity, location and activities of
online users
 Governed by local rules and procedures
klgates.com
klgates.com
TEN BENEFITS OF CIVIL LITIGATION
1. Speed
2. Independent filing decision
3. Simplicity of process
4. Scalable resources
5. Lower burden of proof
6. No 4th Amendment limitations
7. Lower ECPA standards
8. No consumer loss required
9. Modest costs
10. Publicity
• Brand protection
• Restore customer confidence
• Deterrent to bad actors
klgates.com
Example 2
klgates.com
Phishing, Hacking and Customer Fraud

Visible link:
https://www.citibank.com/signin/citifi/scripts/login2/update_pin.jsp
Actual link:
http://61.128.198.62/Verify/
klgates.com
Phishing, Hacking and Customer Fraud
klgates.com
Phishing, Hacking and Customer Fraud
klgates.com
Phishing, Hacking and Customer Fraud
klgates.com
Cooperation with Law Enforcement
From: billing@msn.com
To: [recipients]
Sent: Tuesday, September 30, 2011 5:43 PM
Subject: MSN Billing Update
Dear MSN Customer,
SPOOFED E-MAIL ADDRESS
We regret to inform you that technical difficulties arose with the installation of new software upgrades
Unfortunately part of our customer database, and backup system became inactive. In order to enjoy your
MSN experience and keep your account active, we will require you to enter your information in our online
billing center at your convenience or calling our customer support team (1-877-676-3678). The average
hold time is 45 minutes.
As an added incentive to using the web based account center we offer 50% credit to your next bill. Please
take a moment and re-enter your account information at our secure online account center by visiting:
http://billing.msn.com@msn6.dr.ag/5CFGs46hdWrQJ_4643fJdBDbmS5gd66JF4fFFhf540EGDdTjj20BBEyr556yS3/secure.asp
Sincerely,
Sandy Page
MSN Billing Department
klgates.com
Cooperation with Law Enforcement
1. K&L Gates files Doe lawsuit in Seattle
9. Handoff to FBI for box seizure
8. Investigation reveals
phisher resident at address
2. Subpoena to SF hosting for
<dr.ag> -- identifies sub-assignee
of IP address
3. Subpoena to sub-assignee
identifies name and Yahoo! email address for domain owner
7. Subpoena to Qwest identifies
DSL subscriber in Iowa
4. Yahoo! provides Austrian
contact information for domain
owner
6. Some log-in IPs resolve to
Qwest
5. Austrian domain owner explains
that he runs re-direct site, and
provides log-in IPs
klgates.com
Cooperation with Law Enforcement
klgates.com
Example 3
klgates.com
Cybersquatting and Domain Protection
aberceombie.com
klgates.com
klgates.com
“Brandit” domain name portfolio excerpts
1-800FLOWERSCOM.com
FOX-SPORTS.ORG
NY-TIMES.ORG
AMERICAEXPRESS.ORG
1800FLOWERCOM.com
FOX-SPORTS.net
NY-TIMES.net
AMERICAEXPRESSCARD.ORG
FOXAPORTS.net
NYTIME.net
AMERICAEXPRESSCARD.net
BARNEANDNOBLES.net
FOXDPORTS.net
NYTIMESCOM.ORG
AMERICANEXPRESCARD.ORG
BARNESNNOBLE.net
FOXNEWSCOM.ORG
NYTIMESCOM.net
BARNESNOBLE.ORG
FOXNEWSCOM.net
NYTIMESE.ORG
FOXPORTS.ORG
NYTIMESE.net
HOMEDEPOTCENTER.net
FOXPORTS.net
NYTIMESEE.ORG
HOMEDEPOTCOM.net
FOXPSORTS.ORG
NYTIMESEE.net
HOMEDEPOTS.ORG
HOMESDEPOT.net
HOMESDEPOTS.ORG
HOMESDEPOTS.net
NYTIMEZ.ORG
ASJKEEVES.net
NYTIMEZ.net
ASK-JEEVE.net
BOSTONHERALDS.ORG
BOSTONHERALDS.com
AMERICANEXPRESSCAD.com
AMERICANEXPRESSCARD.ORG
AMERICANEXPRESSCARDCOM.ORG
AMERICANEXPRESSCARDCOM.com
WWWALMART.ORG
WWWALMART.net
WWWASHINGTONTIMES.com
WWWASHINGTONTIMES.net
BOSTON-HERALD.net
BOSTONHERALD.ORG
AMERICANEXPRESCARD.net
AMERICANEXPRESSCARDCOM.net
ASK-JEEVE.ORG
ASK-JEEVE.com
AMERICANEXPRESCARD.com
ASKEJEVES.ORG
AAMAZON.ORG
ASKEJEVES.net
ASKHEEVE.com
AAMZON.ORG
AAMZON.net
klgates.com
CNNCOM.net
CNNNEWS.net
Cybersquatting and Domain Protection
klgates.com
Cybersquatting and Domain Protection
klgates.com
klgates.com
Example 4
klgates.com
Affiliate Misbehavior and Tracking
klgates.com
Affiliate Misbehavior and Tracking
From: CostcoClub@bestjobsbargains.com
To: kylierobinson69@hotmail.com
Subject: RE: Your Costco Gift Card is Expiring kylierobinson69
Date: Mon, 7 Dec 2009 22:56:30 -0500
klgates.com
Affiliate Misbehavior and Tracking
klgates.com
Affiliate Misbehavior and Tracking
From: CostcoClub@bestjobsbargains.com
To: kylierobinson69@hotmail.com
Subject: RE: Your Costco Gift Card is Expiring kylierobinson69
Date: Mon, 7 Dec 2009 22:56:30 -0500
klgates.com
Affiliate Misbehavior and Tracking
klgates.com
Affiliate Misbehavior and Tracking
bestjobsbargains.com
clickbooth.com
offerawards.com
Offerawards.com/G/int?campaignID=445&subcid=CD43878
klgates.com
Cooperation with Law Enforcement
klgates.com
Approaches to Obtaining Discovery
klgates.com
Identifying Sources of Discovery
 Emails
 Email Provider
 Tracing email header information
 Websites
 Hosting
 Registrar / Privacy Protection
 URL links, source code and images





Payment Processor Records
IP addresses
Phone numbers (VOIP)
Internal Server logs
Test Purchases
klgates.com
Preservation
 Consider requesting preservation of data
 Some providers have a limited window of retention
 Chance of sketchier entities purging data after
request.
 Nonparties are not required to preserve documents
 Many will voluntarily preserve if requested
 Pre-discovery preservation order may be obtained,
Fed. R. Civ. P. 26(d)(1).
klgates.com
Subpoena Considerations
 How long is data preserved?
 Urgency and timeline




Time to get subpoena issued
Time to get subpoena served
Time for subscriber notice
Time for recipient response
klgates.com
Subpoena Considerations
 Where to serve subpoenas
 www.search.org/programs/hightech/isp/
klgates.com
Subpoena Considerations
 Account holder may get
notice and opportunity
to object
 Service provider policy
 Statute, e.g., cable
company
 Court imposed
obligation
 Account holder has
standing to contest
disclosure
klgates.com
Cable Companies
 Regular ISP vs Cable Company ISP
 Cable Communications Policy Act of 1984
(CCPA), 47 U.S.C. § 551
 Advance consent obtained or
advance notice of compliance with
an order compelling disclosure of
personally identifiable customer
information, 551(c)(1), 551(c)(2)(B)
 Cable companies providing
Internet follow CCPA. Require a
court order
 However, several circuits have
ruled Internet service is not “Cable
service” under CCPA
klgates.com
Publicity
 Streisand Effect
 “An attempt to censor
or remove a piece of
information backfires,
causing the
information to be
widely publicized”
klgates.com
Limits on Subpoenas -First Amendment Right to
Anonymous Speech
 First Amendment protection
recognized for truth, opinion,
commentary – even if unpleasant
 Hurdle for discovery:
 Cahill v. Doe (Delaware)
 Dendrite International v. Does
(NJ)
 CyberSLAPP
 Are postings the defendant’s right
to free speech in connection with a
public issue?
 Bloggers as Journalists
 News Gatherers’ Privilege under
the First Amendment
 State Constitutional Rights
 Reporters’ Shield Laws
klgates.com
Limits on Subpoenas -No Content
Stored Communications Act (SCA),18 U.S.C. § 2702
Electronic Communications Service (“ECS”)

provides the ability to send and receive communications

may not divulge contents “while in electronic storage”

electronic storage:


(a) temporary, intermediate storage incidental to transmission
(b) storage for backup protection
Remote Computing Service (“RCS”)


provides computer storage or processing services
may not divulge contents of any communication which is carried or maintained on the
service solely for the purpose of providing storage or computer processing services
klgates.com
Limits on Subpoenas -No Content
Stored Communications Act (SCA),18 U.S.C. § 2702
Some exceptions
 Lawful consent of sender or intended recipient
 Protection of the rights or property of the provider
Legal controversy regarding forced “consent”
 California previously ordered juror who posted evidence, during trial, to give content to
access his Facebook page. Juror No. 1 v. Superior Court of Sacramento County
 Scope of mandatory “consent” being litigated in Cal. Ct. of Appeals in Facebook v.
Superior Court of Los Angeles County
klgates.com
DDOS ATTACKS
ADWARE
BOTNETS
CONTEXTUAL ADS
ANONYMOUS POSTS
SEARCH ENGINE OPTIMIZATION
CLICK FRAUD
SPIM
PARASITE SITES
CHILD PROTECTION UNAUTHORIZED ACCESS
SCRAPING
PIRACY
SPOOFING
EMAIL THREATS
HACKING
SOCIAL NETWORKS
PHISHING
SCAREWARE
MALVERTISING
TRAFFIC HIJACKING
DEEP PACKET INSPECTION
SPAM
ONLINE DEFAMATION
DOMAIN DEFENSE
CYBERSQUATTING
klgates.com
DRM
SPYWARE
9
Data Breaches: questions
Where and
what law?
Who?
•
•
•
•
End users
Business
Regulators
Others
How else can
you protect
yourself?
94
Download