Retaliatory Hacking: Risky Business or Legitimate Corporate Security?



Similar documents
JAN (a) The obstruction, impairment, or hindrance of the. (b) The obstruction, impairment, or hindrance of any

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

The Law of Web Application Hacking. CanSecWest March 9, 2011 Marcia Hofmann, EFF

CHAPTER 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS

Legislative Language

THE COUNTY OF MONTGOMERY POLICIES AND PROCEDURES FALSE CLAIMS AND WHISTLEBLOWER PROTECTIONS

In an age where so many businesses and systems are reliant on computer systems,

Legal and Ethical Issues Facing Computer & Network Security Researchers

Information Security Law: Control of Digital Assets.

Please see Section IX. for Additional Information:

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

114 th Congress March, Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Criminal No.:

Cyber-insurance: Understanding Your Risks

Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know

ESTABLISHING POLICY AND PROCEDURES FOR COMPLIACE WITH 42 USC 139a(a)(68), False Claims and Whistle Blower Protections

VNSNY CORPORATE. DRA Policy

Cybercrime: A Sketch of 18 U.S.C and Related Federal Criminal Laws

HB By Representative Hall. RFD: Judiciary. First Read: 23-APR-13. Page 0

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

Cybersecurity Issues for Community Banks

SUBSCRIBER PRIVACY NOTICE

Fraud, Waste and Abuse Prevention and Education Policy

Computer Forensics US-CERT

Joe A. Ramirez Catherine Crane

Communications and Privacy: The Impact of Changing Regulations and Technology on an Organization s Privacy and Data Protection Policies

Cyber Risks in the Boardroom

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum

U. S. Attorney Office Northern District of Texas March 2013

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

EXECUTIVE SUMMARY Compliance Program and False Claims Recovery

Social Media In the Workplace

VILLAGECARE CORPORATE COMPLIANCE POLICY AND PROCEDURE MANUAL ORIGINAL EFFECTIVE DATE: JANUARY 1, 2007

What are you trying to secure against Cyber Attack?

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline Information Security Incident Response

COURT ORDERS FOR TELEPHONE RECORDS

The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide

Fraud-Related Compliance

technical factsheet 176

2. "Consumer" means an individual. (same as 15 U.S.C. 1681a(c))

CYBERCRIME LAWS OF THE UNITED STATES

Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

FEDERAL & NEW YORK STATUTES RELATING TO FILING FALSE CLAIMS

Department of Justice Revises Policies Regarding Waiver of Privilege. Gabriel L. Imperato, Esq.*

Privacy Law Basics and Best Practices

North Shore LIJ Health System, Inc.

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

SOUTH NASSAU COMMUNITIES HOSPITAL One Healthy Way, Oceanside, NY 11572

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

S. ll IN THE SENATE OF THE UNITED STATES A BILL

Employers Guide to Best Practices. For Use of Background Checks in Employment Decisions. Copyright 2010 Lawyers Committee for Civil Rights Under Law

THE AMERICAN LAW INSTITUTE Continuing Legal Education. Estate Planning for the Family Business Owner

requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.

Digital Evidence Collection and Use. CS 585 Fall 2009

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Electronic Communications: , Voic , Telephones, Internet and Computers

SUMMARY OF PUBLIC LAW THE CAN-SPAM ACT OF 2003

Law Firm Cyber Security & Compliance Risks

Accountability Report Card Summary 2013 New Mexico

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

COUNTY OF ORANGE. False Claims Act and Whistleblower Provisions Policy and Procedures

ISBA Advisory Opinion on Professional Conduct

Chicago-Kent College of Law: Career Services Office Public Interest Career Plan

The DMA s Analysis of Can Spam Act of 2003

Data Breach and Senior Living Communities May 29, 2015

OKLAHOMA LAWS RELATING TO IDENTITY THEFT

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

Transcription:

Retaliatory Hacking: Risky Business or Legitimate Corporate Security? 1

Presenter: Sean L. Harrington Cybersecurity Partnership Manager and information security risk assessor in the banking industry; Digital forensics examiner in private practice; Graduate with honors from Taft Law School, and holds the MCSE, CISSP, CHFI, CCFP, and CSOXP certifications; Has served on the board of the Minnesota Chapter of the High Technology Crime Investigation Association; Current member of Infragard, FS-ISAC, the Financial Services Roundtable s legislative and regulatory working groups, Chamber of Commerce Cyber Working Group, among others; Teaches digital forensics for Century College in Minnesota; An instructor for the new CCFP certification. 2

Not Legal Advice This presentation is based upon a scholarly work, and is intended to promote discussion and innovation. This presentation is not intended to convey legal advice. Readers should not act or refrain from acting based upon the presenter s oral or written statements 3

Resources The CIP Report, George Mason University Center for Infrastructure Protection and Homeland Security, Volume 12, No. 4 (Oct., 2013) http://cip.gmu.edu/wp-content/uploads/2013/06/october-2013_financial- Services.pdf, pp. 11-15 Cyber Security Active Defense: Playing with Fire or Sound Risk Management? 20 RICH. J.L. & TECH. 1 (2014) (draft copy available at http://works.bepress.com/sl_harrington/) 4

Preview 1.Key terms & concepts 2.Key statutes 3.Active Defense Approaches & associated legal, regulatory, ethical, and practical considerations 4.theories rationalizing active defense 5.Promising alternatives 5

TRIVIA When was the last time any substantive cyber security federal legislation was passed, and what was it? 6

TRIVIA The Computer Fraud and Abuse Act (CFAA) and Electronic Communications Privacy Act (ECPA) make reference to the Internet how many times? 7

Who cares? Lawyers Plaintiff & Defense In-house & outside counsel Compliance Attorneys CISO/ISO Boards and Organizational Leadership Information Security Professionals 8

Active Defense Hack Back Offensive Counter Measures ( OCM ) Retaliatory Hacking Protecting and defending 9 electronic information

Federal Statutory Prohibitions Computer Fraud and Abuse Act of 1986 Provides both civil and criminal penalties for violation Electronic Communications and Privacy Act of 1986 Provides both civil and criminal penalties for violation Title I: Wiretap Act Title II: Stored Communications Act Title III: pen register and trap and trace devices 18 U.S.C. 2252; 18 U.S.C. 2252A* Many states have counterpart statutes, some of which contain more specific language and are less antiquated. 10

CFAA Directed at criminal computer hacking Prohibits computer intrusions accessing computers without authorization, or exceed[ing] authorize[d] access, which statutory phrases have been the continuing subject of appellate review. Private parties who can show damage or loss in excess of $5,000, which can include the cost of hiring a forensic examiner plus his or her assessment of the damage caused to the victim s computer or business, can sue. The Government can pursue felony charges if damages are in excess of $5,000 House Judiciary Committee considering augmenting the Act all offenses would be felonies 11

ECPA Title I Update of the original wiretap law of 1968 Prohibits interception, disclosure, or use of wire, oral, and electronic communications in transit must be contemporaneous with transmission examples: e-mail, text/video messaging, keystrokes (some courts) Prohibits public Internet carriers from disclosing content of in-transit e-mail 12

Privacy CA and MN Data handling Data Breach Notification PCI DSS Gramm-Leach-Bliley Act: requires financial institutions to protect information collected about individuals, and prohibits disclosure of their customers' account numbers 13

ECPA Title II (Stored Communications Act) Applies to ISPs. Inapplicable to private companies internal e-mail systems. Restricts Government access to customer and subscriber information and records Providers may disclose protected information if: Consent is given by the sender, an addressee, or the recipient Content was inadvertently obtained and appears to contain evidence of the commission of a crime 14

Ethics Codes of Conduct describes the expected behavior of members of an association or practitioners of a profession, and generally seek to protect the organization or profession from the consequences of bad behavior of its members. ABA Model Rules 1.2, 5.3, 8.4(c) (ISC) 2 Code of Ethics Preamble* (ISC) 2 Code of Ethics Cannons** Model Rules 15

Active Defense Approaches Approaches Risks Beaconing Threat Intelligence Gathering Sinkholing Honeypots Retaliatory Hacking Legal Ethical Escalation Misattribution and collateral damage Goodwill & reputation 16

Active Defense Hack Back Theories advanced for justified retaliatory hacking: Recapture of chattels private necessity Castle doctrine private security guard doctrine 17

Promising Alternatives to Hack Back Preventive: Private companies collaboration with ISPs and industry partnerships to combat; Intelligence sharing and gathering (ISACs); Harden the perimeter Detective: tools; know your network traffic; Corrective: collaboration with government and other private corporations: (e.g., takedowns of Citadel, Zeus) Corrective: cyber legislation Risk transfer: outsourcing, cyber insurance 18

Common Sense Thoughts Develop and enforce sound initial security hardening practices Develop and enforce incident handling policies and procedures consistent with company position Develop and implement and participate in collaborative task forces among governmental and private companies with similar problems Caution and prudence before attempting to respond to a hack with affirmative defense approaches 19

Questions? Comments? 20

Thank You! Sean L. Harrington sharrington@attyclientpriv.com 21