Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

The War on Cybercrime Heats Up

By Gabrielle T. Kelly, Mark Mermelstein and James Hsiao
May 02, 2013

Cybercrime is neither rare nor isolated these days. You no longer need to be a major bank, retailer, credit card company, social media site or government to become a target. Every company with an online presence, or even a connection to the Internet, has become fair game.

Symantec has reported that, year over year, malicious Internet attacks are steadily increasing. Its most recent report (April 2013) showed that in 2012, targeted attacks had increased by 42%, and unique malicious Web domains increased to 74,000, compared with 55,000 in 2012. And the increasing use of mobile devices brought with it an increase in mobile malware ' a 58% increase in 2012 over 2011. See, 2013 Internet Security Threat Report, Volume 18.

It is no longer a question of whether a company will be hacked, but when. Attacks are also increasingly 'targeted.' For example, in January, The New York Times was targeted through a technique called 'spear-phishing,' where innocuous-looking e-mail or social media messages were tailored to individual employees and designed to install code that could access, monitor or steal information.

Obvious targets, such as financial institutions, credit card companies and defense contractors, have often already 'hardened' their defenses. Thus, cyberattacks have steadily increased against other targets, such as cloud services providers ' where reams of data can be accessed through a single attack ' less obvious commercial targets holding valuable information, and companies in the supply chain with access to a primary target's systems through authenticated connections. Becoming an attack vector against a primary target can be extraordinarily costly, with significant reputational implications.

Given the potential loss of the most sensitive assets, information and trade secrets, and the collateral risks of such an incident, companies must develop an integrated, proactive strategy involving technological features, law enforcement partnerships and private legal enforcement to prevent, respond to, and deter the massive and growing problem of cybercrime.

Integrated Defenses

Network security historically consisted of a firewall between the Internet and internal networks. Like a proverbial Great Wall, the 'crunchy' exterior protected the 'soft' interior from the marauding horde. As the chief security officer of the Times recognized in the attack on the newspaper, attackers 'no longer go after [the] firewall,' but instead 'go after individuals.' With targeted techniques, companies must assume that computers will become compromised and cannot rely on security software and hardware to stop attackers. For example, in the Times attack, the attackers installed 45 pieces of custom malware, but antivirus software was only able to detect a single instance. Therefore, companies must implement multi-tiered security throughout their networks, not simply border checkpoints, and educate employees to create a security-aware culture. Companies should widely deploy the strongest commercially viable encryption to protect their data.

But security technology and awareness alone are not enough. Companies must build investigative capabilities into their technological presence, rather than trying to 'bolt them on' as an afterthought. Proper investigation can provide intelligence about methodology, techniques and attack patterns, provide guidance as to potential future attacks, or lead to the identities of the attackers. Evidence-gathering protocols established on the front end can pay dividends on the back end. For example, monitoring intrusions may involve 'honeypots' ' traps that appear to be legitimate network nodes ' which isolate attackers and afford time to investigate attacks as they occur.

Built-in data markers, extensive logging, and methods of parsing this mountain of information are also important. Breach response plans should include securing compromised systems without alerting the attacker, cloning compromised machines to maintain forensics, and tracing connections to determine the true origins of attacks. Given the sophistication and motivation of the adversaries, security firms have responded to this need by offering sophisticated proactive monitoring, investigation and intelligence services, and also offensive techniques such as surveillance and reconnaissance, counter-espionage and denial-and-deception.

Whether handled in-house or outsourced, these strategies raise legal implications that potential cybercrime victims need to understand if they are going to seriously consider the more aggressive of these approaches.

Proactive Engagement

What can a company do with information about an attack or an attacker?

Collaborate with the Government

Companies can opt to collaborate with law enforcement. The U.S. Attorney's Office, for example, created a National Security Cyber Specialist Network, with a designated assistant U.S. attorney in every U.S. Attorney's office to act as a centralized resource to deal with
cybercriminals, especially when there may be national security concerns. Criminal prosecution via referral to the government is just one law enforcement option. Other agencies, such as state attorneys general or public consumer protection agencies, may bring civil enforcement actions that have the advantage of a lower burden of proof and can rely upon flexible state consumer protection laws.

Successful partnerships with law enforcement maximize the relative strengths of the private and public sectors. They rely heavily upon a company's ability to diligently collect and present technical information about the cybercrime event and the government's ability to investigate and track down the perpetrators. For example, law enforcement has the ability to use subterfuge and enlist the aid of foreign law enforcement to track down the perpetrators, use extradition treaties to get them to the United States, and then use threats of incarceration and promises of leniency to convince them to identify others. In addition, law enforcement can use asset forfeiture laws to seize criminal instrumentalities and proceeds for the benefit of victims.

A successful law enforcement referral program takes advanced planning and development. If they work out their strategy in advance, victims can not only benefit from the attackers being criminally prosecuted, but also position themselves for monetary restitution arising out of government actions. However, there are challenges as well. Some are manageable, such as potential privacy issues regarding data sharing. Others are thornier, such as maintaining control in any situation where government enforcement is involved. Those who invite the government into their lives had better be sure their own house is in order. Certainly, understanding when to refer matters to law enforcement and having a vast array of relationships with law enforcement is an invaluable tool to have in the cybercrime-fighting toolbelt.

Investigate and Enforce Through Civil Litigation

Cybercrimes also violate civil laws; laws such as the Computer Fraud and Abuse Act (CFAA), Electronic Communications Privacy Act (ECPA). State malware and hacking statutes may also be enforced. Litigants may use intellectual property regimes such as trade secret, copyright or trademark law to address data theft or misleading activities. Even the oldest common law regimes such as trespass, conversion, unjust enrichment or nuisance can be valuable in combating cybercrime. Civil enforcement may have advantages of control, flexibility, and speed that the government may not have, along with a lower burden of proof and a more focused goal of protecting a particular victim (rather than the public at large).

A private investigation and civil litigation program may also allow more focused development of information about threats targeting a particular company. An effective civil litigation program requires a team that is steeped in the cybercrime ecosystem, understands both the legal and technical issues (including the limits on so-called 'cyber-sleuthing'), and that understands risk management techniques. The team must have strong relationships in the private and public sectors and understand how to navigate a complex international environment that may involve issues of sovereignty and competing policies and laws.

In the simplest form, armed with technical data and leads, a victim can initiate civil 'John Doe' cases to avail itself of discovery mechanisms and the leverage that a legal proceeding can bring to better develop identification of perpetrators. This may result in more robust law enforcement referrals. However, even sophisticated cybercriminals can be found. With some investment, it is certainly possible to identify perpetrators and pursue them for damages, injunctions, deterrence, or even with the goal of very loud and very public attribution. Civil litigation can also be used to dismantle the technical infrastructure used to carry out attacks, even if the actual perpetrators cannot be identified. In recent years, Microsoft has dismantled a number of malicious 'botnets' through this means.

'Hacking Back'

While some cybercrime victims pay ransom or protection money to cybercriminals that have already infiltrated their system ' ostensibly to avoid further harm ' other frustrated companies are starting to explore the idea of going on the offensive against cybercriminals with a so-called 'hacking back' or 'active defense.' This strategy can be employed either to deter cybercriminals or to further investigations. The 'offensive,' however, implicates technological, legal and ethical issues. Indeed, active countermeasures may be vulnerable under the same laws used to pursue cybercriminals. It is a rare organization that has the technical expertise necessary to go toe-to-toe with cybercriminals who can carry out advanced targeted attacks. Without the right technical resources, the right partnerships, and a firm understanding of the law, such efforts may be risky as well as difficult. Nonetheless, the mere fact that there is widespread and serious debate on this topic signals a shift in the discourse about dealing with malicious actors, protecting valuable assets in the information economy, and preserving the integrity of the Internet.

Conclusion

Cybercrime is a massive and growing problem. The stakes are high, and the problem is not going away. Companies cannot ignore the threats, not least because the regulatory and litigation environment ' from Securities and Exchange Commission rules and Federal Trade Commission regulations to breach notification laws and class action lawsuits ' now require increased attention. Potential victims must be aware of the threats and proactively organize and implement an affirmative strategy. To do otherwise risks substantial exposure and substantial loss and will embolden the adversaries. No one can afford that outcome.


Gabriel Ramsey and Mark Mermelstein are partners at Orrick, Herrington & Sutcliffe. James Hsiao is an associate at Orrick. Ramsey has significant experience combating cybercrime, trade secret misappropriation, and technical abuses and threats. Mermelstein, a former L.A. County public defender, focuses his practice on the representation of white-collar criminal defendants and victims of crimes such as cybercrime. Hsiao, a former technology professional who has dealt with information security issues, focuses on litigation matters involving a myriad of areas such as securities, white-collar, and Internet issues.

'

Cybercrime is neither rare nor isolated these days. You no longer need to be a major bank, retailer, credit card company, social media site or government to become a target. Every company with an online presence, or even a connection to the Internet, has become fair game.

Symantec has reported that, year over year, malicious Internet attacks are steadily increasing. Its most recent report (April 2013) showed that in 2012, targeted attacks had increased by 42%, and unique malicious Web domains increased to 74,000, compared with 55,000 in 2012. And the increasing use of mobile devices brought with it an increase in mobile malware ' a 58% increase in 2012 over 2011. See, 2013 Internet Security Threat Report, Volume 18.

It is no longer a question of whether a company will be hacked, but when. Attacks are also increasingly 'targeted.' For example, in January, The New York Times was targeted through a technique called 'spear-phishing,' where innocuous-looking e-mail or social media messages were tailored to individual employees and designed to install code that could access, monitor or steal information.

Obvious targets, such as financial institutions, credit card companies and defense contractors, have often already 'hardened' their defenses. Thus, cyberattacks have steadily increased against other targets, such as cloud services providers ' where reams of data can be accessed through a single attack ' less obvious commercial targets holding valuable information, and companies in the supply chain with access to a primary target's systems through authenticated connections. Becoming an attack vector against a primary target can be extraordinarily costly, with significant reputational implications.

Given the potential loss of the most sensitive assets, information and trade secrets, and the collateral risks of such an incident, companies must develop an integrated, proactive strategy involving technological features, law enforcement partnerships and private legal enforcement to prevent, respond to, and deter the massive and growing problem of cybercrime.

Integrated Defenses

Network security historically consisted of a firewall between the Internet and internal networks. Like a proverbial Great Wall, the 'crunchy' exterior protected the 'soft' interior from the marauding horde. As the chief security officer of the Times recognized in the attack on the newspaper, attackers 'no longer go after [the] firewall,' but instead 'go after individuals.' With targeted techniques, companies must assume that computers will become compromised and cannot rely on security software and hardware to stop attackers. For example, in the Times attack, the attackers installed 45 pieces of custom malware, but antivirus software was only able to detect a single instance. Therefore, companies must implement multi-tiered security throughout their networks, not simply border checkpoints, and educate employees to create a security-aware culture. Companies should widely deploy the strongest commercially viable encryption to protect their data.

But security technology and awareness alone are not enough. Companies must build investigative capabilities into their technological presence, rather than trying to 'bolt them on' as an afterthought. Proper investigation can provide intelligence about methodology, techniques and attack patterns, provide guidance as to potential future attacks, or lead to the identities of the attackers. Evidence-gathering protocols established on the front end can pay dividends on the back end. For example, monitoring intrusions may involve 'honeypots' ' traps that appear to be legitimate network nodes ' which isolate attackers and afford time to investigate attacks as they occur.

Built-in data markers, extensive logging, and methods of parsing this mountain of information are also important. Breach response plans should include securing compromised systems without alerting the attacker, cloning compromised machines to maintain forensics, and tracing connections to determine the true origins of attacks. Given the sophistication and motivation of the adversaries, security firms have responded to this need by offering sophisticated proactive monitoring, investigation and intelligence services, and also offensive techniques such as surveillance and reconnaissance, counter-espionage and denial-and-deception.

Whether handled in-house or outsourced, these strategies raise legal implications that potential cybercrime victims need to understand if they are going to seriously consider the more aggressive of these approaches.

Proactive Engagement

What can a company do with information about an attack or an attacker?

Collaborate with the Government

Companies can opt to collaborate with law enforcement. The U.S. Attorney's Office, for example, created a National Security Cyber Specialist Network, with a designated assistant U.S. attorney in every U.S. Attorney's office to act as a centralized resource to deal with
cybercriminals, especially when there may be national security concerns. Criminal prosecution via referral to the government is just one law enforcement option. Other agencies, such as state attorneys general or public consumer protection agencies, may bring civil enforcement actions that have the advantage of a lower burden of proof and can rely upon flexible state consumer protection laws.

Successful partnerships with law enforcement maximize the relative strengths of the private and public sectors. They rely heavily upon a company's ability to diligently collect and present technical information about the cybercrime event and the government's ability to investigate and track down the perpetrators. For example, law enforcement has the ability to use subterfuge and enlist the aid of foreign law enforcement to track down the perpetrators, use extradition treaties to get them to the United States, and then use threats of incarceration and promises of leniency to convince them to identify others. In addition, law enforcement can use asset forfeiture laws to seize criminal instrumentalities and proceeds for the benefit of victims.

A successful law enforcement referral program takes advanced planning and development. If they work out their strategy in advance, victims can not only benefit from the attackers being criminally prosecuted, but also position themselves for monetary restitution arising out of government actions. However, there are challenges as well. Some are manageable, such as potential privacy issues regarding data sharing. Others are thornier, such as maintaining control in any situation where government enforcement is involved. Those who invite the government into their lives had better be sure their own house is in order. Certainly, understanding when to refer matters to law enforcement and having a vast array of relationships with law enforcement is an invaluable tool to have in the cybercrime-fighting toolbelt.

Investigate and Enforce Through Civil Litigation

Cybercrimes also violate civil laws; laws such as the Computer Fraud and Abuse Act (CFAA), Electronic Communications Privacy Act (ECPA). State malware and hacking statutes may also be enforced. Litigants may use intellectual property regimes such as trade secret, copyright or trademark law to address data theft or misleading activities. Even the oldest common law regimes such as trespass, conversion, unjust enrichment or nuisance can be valuable in combating cybercrime. Civil enforcement may have advantages of control, flexibility, and speed that the government may not have, along with a lower burden of proof and a more focused goal of protecting a particular victim (rather than the public at large).

A private investigation and civil litigation program may also allow more focused development of information about threats targeting a particular company. An effective civil litigation program requires a team that is steeped in the cybercrime ecosystem, understands both the legal and technical issues (including the limits on so-called 'cyber-sleuthing'), and that understands risk management techniques. The team must have strong relationships in the private and public sectors and understand how to navigate a complex international environment that may involve issues of sovereignty and competing policies and laws.

In the simplest form, armed with technical data and leads, a victim can initiate civil 'John Doe' cases to avail itself of discovery mechanisms and the leverage that a legal proceeding can bring to better develop identification of perpetrators. This may result in more robust law enforcement referrals. However, even sophisticated cybercriminals can be found. With some investment, it is certainly possible to identify perpetrators and pursue them for damages, injunctions, deterrence, or even with the goal of very loud and very public attribution. Civil litigation can also be used to dismantle the technical infrastructure used to carry out attacks, even if the actual perpetrators cannot be identified. In recent years, Microsoft has dismantled a number of malicious 'botnets' through this means.

'Hacking Back'

While some cybercrime victims pay ransom or protection money to cybercriminals that have already infiltrated their system ' ostensibly to avoid further harm ' other frustrated companies are starting to explore the idea of going on the offensive against cybercriminals with a so-called 'hacking back' or 'active defense.' This strategy can be employed either to deter cybercriminals or to further investigations. The 'offensive,' however, implicates technological, legal and ethical issues. Indeed, active countermeasures may be vulnerable under the same laws used to pursue cybercriminals. It is a rare organization that has the technical expertise necessary to go toe-to-toe with cybercriminals who can carry out advanced targeted attacks. Without the right technical resources, the right partnerships, and a firm understanding of the law, such efforts may be risky as well as difficult. Nonetheless, the mere fact that there is widespread and serious debate on this topic signals a shift in the discourse about dealing with malicious actors, protecting valuable assets in the information economy, and preserving the integrity of the Internet.

Conclusion

Cybercrime is a massive and growing problem. The stakes are high, and the problem is not going away. Companies cannot ignore the threats, not least because the regulatory and litigation environment ' from Securities and Exchange Commission rules and Federal Trade Commission regulations to breach notification laws and class action lawsuits ' now require increased attention. Potential victims must be aware of the threats and proactively organize and implement an affirmative strategy. To do otherwise risks substantial exposure and substantial loss and will embolden the adversaries. No one can afford that outcome.


Gabriel Ramsey and Mark Mermelstein are partners at Orrick, Herrington & Sutcliffe. James Hsiao is an associate at Orrick. Ramsey has significant experience combating cybercrime, trade secret misappropriation, and technical abuses and threats. Mermelstein, a former L.A. County public defender, focuses his practice on the representation of white-collar criminal defendants and victims of crimes such as cybercrime. Hsiao, a former technology professional who has dealt with information security issues, focuses on litigation matters involving a myriad of areas such as securities, white-collar, and Internet issues.

'

Read These Next
COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

How Secure Is the AI System Your Law Firm Is Using? Image

What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

Generative AI and the 2024 Elections: Risks, Realities, and Lessons for Businesses Image

GenAI's ability to produce highly sophisticated and convincing content at a fraction of the previous cost has raised fears that it could amplify misinformation. The dissemination of fake audio, images and text could reshape how voters perceive candidates and parties. Businesses, too, face challenges in managing their reputations and navigating this new terrain of manipulated content.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.