isaca m 19 cook - Law Seminars International

advertisement
Evolving Threats: Fighting
Online Fraudulent Activity
LSI Conference, S.F.
William J. Cook
Bill Cook
Evolving Online Threats
» Partner, Wildman Harrold,
Chicago
» Retail response to CPP and
PCI failure claims
» Intellectual Property, Internet
and Web law (Business
Continuity and Security)
» 90 trials
» Expert presentations on
Internet liability before U.S.
House Judiciary Comm., GAO,
FCC
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
» Chicago IMNA Board
Member, Immediate Past
President
» Former Head of US DOJ
Computer Crime Task Force;
Counter-Espionage
Coordinator and CounterTerrorist Coordinator; DOJ
FEMA Coordinator
(Chicago)
» NRC Committee on Critical
Infrastructure Protection and
the Law
September 26, 2006
2
Spam
Evolving Online Threats
» 9 of 10 Internet emails are spam
» 6 of the 9 carry a payload
» Virus
» Bots
» Denial of service attacks
» VOIP attacks
» Virginia AG v. California
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
3
Webpage
BIA Security Crisis
Evolving Online Threats
» May 17, 2005 court continues security
requirements and applied to wireless
» Cobell v. Norton, Fed. 12/05/01
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
4
Other Vendor Issues
NY AG v. ACLU
Evolving Online Threats
»Secret contributor list
»Webpage representations
»The vendor did it
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
5
FTC v. Yesmail Inc. d/b/a Once Corporation
Software ate my homework
Evolving Online Threats
» Yesmail sent unsolicited commercial e-mail after consumers
asked it to stop
» FTC fine $50,717
» Yesmail sent e-mail on behalf of its clients more than 10
business days after recipients had asked it to stop.
» Yesmail offers e-mail marketing services, including sending
commercial e-mail and processing unsubscribe requests from
recipients.
» Yesmail said it’s spam filtering software filtered out certain
unsubscribe requests from recipients which resulted in Yesmail
failing to honor unsubscribe requests by sending thousands of
commercial e-mail messages to recipients more than 10 business
days after their requests.
» http://www.ftc.gov/opa/2006/11/yesmail.htm
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
6
Spoofing
Evolving Online Threats
» The unauthorized use of a third-party domain name
as the sender's name in an e-mail message. Most
often used by spammers, spoofing the name of a
popular retailer or organization entices the recipient
to read the full message
» Handled as ID theft
» No federal prosecutions
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
7
FTP Site Compromise
Evolving Online Threats
» Client’s President accessed competitor’s FTP site and
obtained customer lists, vendor price lists, source code
» Criminal and civil actions filed against Client at the same
time as FBI search of corporate offices
» Issues regarding security, expectation of privacy
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
8
Spyware
Evolving Online Threats
»
»
»
»
»
»
»
Software that covertly gathers user information through the user's Internet
connection without his or her knowledge, usually for advertising purposes.
Typically bundled as a hidden component of freeware or shareware
programs that can be downloaded from the Internet
spyware monitors user activity on the Internet and transmits that
information in the background to someone else.
Spyware can also gather information about e-mail addresses and even
passwords and credit card numbers.
Spyware steals from the user by using the computer's memory resources
and also by eating bandwidth
Because spyware exists as independent executable program, its has the
ability to monitor keystrokes, scan files on the hard drive, snoop other
applications, such as chat programs or word processors, install other
spyware programs, read cookies, change the default home page on the
Web browser, consistently relaying this information back to the spyware
author who will either use it for advertising/marketing purposes or sell the
information to another party.
Violation of ECPA? Computer Fraud & Abuse Act?
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
9
Michigan Becomes First State to Employer
Liability for Workplace Identity Theft
Evolving Online Threats
» June 2005 announced that Michigan will allow
employee lawsuits against employers
» Michigan Ct. of Appeals allows employee
victim to recover $275,000
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
10
Ramifications of Stolen Computers
Evolving Online Threats
» Company’s outsource healthcare information to vendors
» Client’s employee database of health information, personal
credit cards and other personal information missing
» Business Associate rule
» Vendor suffers intrusion and laptops stolen
» Internal investigation
» HIPAA exposure identified
» Potential employee legal action(s) identified
» Vendor forced to meet ISO 17799 and corporate standards
» Prepared and oversaw E&Y ISO 17799 security audit
and evaluated compensating controls
» Negotiated vendor contract changes and remediation
» Rewrote security provisions for vendor contracts
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
11
Defecting CEO
Evolving Online Threats
» CEO and 5 key employees left ecommerce client with
trade secret information to start up competing company
» Forced forensic analysis of departed hard drives to locate
stolen information
» Evaluated Economic Espionage Act referral/not applicable
» Opponents clearly understood liability and embarrassment
if they did not cooperate
» Used threat of litigation to achieve client’s business
strategy without actually having to go to court
» Negotiated return of all data and essentially shut down
potential competitor
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
12
I.D. Theft: Russian Carding
Evolving Online Threats
» Some estimates: 20% of credit card transactions are
fraudulent
» Since Feb. 2005, sensitive personal records
exposed in security breaches: 93,771,829
» Russian carding contributes $1 Billion annually to
Russian economy
» Russian cards sponsor events at the Kremlin
» Underground pages bragging about:
» Infiltrating bank processors
» Attacks on specific financial targets
» Breaching 3DES
» Posting databases
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
13
CPP (CPC) Designation
Evolving Online Threats
» Case against merchant begins with designation
as a common point of purchase (CPP) or a
common point of compromise (CPC)
» CPP is determined by reverse analysis of credit
card or debit card activity
» Credit card association or agent makes contact
» Date of alleged fraud may be remote
» Forensic Audit triggered
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
14
Moving Parts
Evolving Online Threats
»
»
»
»
»
»
»
»
»
»
»
Visa, MC, AmEx, Discovery
Issuing banks
Acquiring banks
Merchants that accept fraudulent credit cards,
increasingly located in Europe
POS software vendors
Insurance companies and brokers
Public relations
Stockholder issues
Board of Director issues
Consumer disclosure issues and Secret Service nondisclosure request
Disclosure / cooperation with federal agencies
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
15
Downstream Liability Issues
Evolving Online Threats
» Standard of care before intrusion
» How much due diligence can be proven
» Corporate policies
» Public relations
» SEC and Stockholder issues
» Board of Director issues
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
16
Questions?
Evolving Online Threats
William J. Cook, Esq.
Wildman Harrold Allen & Dixon LLP
225 West Wacker Drive
Chicago, IL 60606-1229
312.201.2000 (General Number)
312.201.2555 (Fax)
cook@wildmanharrold.com
WILDMAN HARROLD | ATTORNEYS AND COUNSELORS
September 26, 2006
17
Download