Cyber Security - the Laws that Govern Incident Response Joel Michael Schwarz Department of Justice Computer Crime and Intellectual Property Section Criminal.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

Protect Our Students Protect Ourselves
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
HIPAA Privacy Rule Training
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
INDIANA UNIVERSITY OFFICE OF THE VICE PRESIDENT AND GENERAL COUNSEL Indiana Access to Public Records Act (APRA) Training.
Week Duty to keep quiet, not talk about cases By product of Fiduciary Duty 2. Right not to be forced to testify about communications --Statutory.
Legal Considerations in Obtaining Electronic Evidence in Online Investigations CSC 486/586 1.
NC State University - March David Drooz1 USA PATRIOT Federal anti- terrorism law Effective October 26, 2001 December 31, 2005, sunset for some of.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Cyber Security - the laws that protect your systems and govern incident response Joel Michael Schwarz Department of Justice Computer Crime and Intellectual.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
1 ISPs and Federal Privacy Law: Everything You Need to Know About the Electronic Communications Privacy Act (ECPA) Mark Eckenwiler Computer Crime and Intellectual.
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
2/16/2010 The Family Educational Records and Privacy Act.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
1 Disclosing Student Personal Information to the Queensland Police Service 1-2 July 2008 RED/EDS Business Meeting.
INTERNET and CODE OF CONDUCT
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Network security policy: best practices
Class 7 Internet Privacy Law Your Digital Afterlife.
Sunshine Laws Sunshine laws Open Meetings law Public Records Law.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Security Services Constitutional Issues in Private Security.
FERPA at The Catholic University of America Presented by Laura Jacobs Anderson Associate Registrar Office of Enrollment Services.
Federal Bureau of Investigation
Class 11 Internet Privacy Law Government Surveillance.
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
HIPAA PRIVACY AND SECURITY AWARENESS.
Use Policies Deputy Attorney General Robert Morgester
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Confidentiality and Public Information Act LISD Special Education Department Training SY
Working Effectively with Law Enforcement: How to Protect the Privacy of Your University Community Without Going to Jail Michael Corn Director, Security.
Discovery III Expert Witness Disclosure And Discovery Motions & Sanctions.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Session Title: FERPA: What You Need To Know Presented By: Jeffery Loggins Institution: Mississippi Valley State University September 15, 2015.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
WELCOME BACK! ADMIN. LAW UNIT 6 ANN SANOK. THIS WEEK We look at an agency’s power to conduct inspections or to compel acts by individuals or companies.
Adult Protective Services Basic Skills Training Presented by: Rajeev Premakumar Assistant Attorney General Public Assistance Section N.C. Department of.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
HIPAA Privacy Rule Training
Courts System Search Warrants.
Indiana Access to Public Records Act (APRA) Training
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Tomball Independent School District Annual Confidentiality Training
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Welcome to the FERPA training for Faculty and Staff.
Laws Governing Police Surveillance
Texas Search and Seizure
Presentation transcript:

Cyber Security - the Laws that Govern Incident Response Joel Michael Schwarz Department of Justice Computer Crime and Intellectual Property Section Criminal Division (202) / Indiana University of Pennsylvania April 7, 2006

Today’s goals: 1. An introduction to DOJ’s Computer Crime & Intellectual Property Section 2. Incident Response – Monitoring Communications and Traffic Data During an Incident 3. Disclosing Stored Communications and Documents (“ECPA”) 4. Interesting New Legal Developments – Using Programs or Commands to Cause Injury or Death

1. U.S. Department of Justice’s Computer Crime & Intellectual Property Section (“CCIPS”) CCIPS attorneys: approximately 40 attorneys many have received degrees in computer science, engineering, or other technical fields (many are former prosecutors) advise federal prosecutors and law enforcement agents investigate and litigate cases primary prosecutors in cyber-crime cases (ex. hacking) assist AUSAs in real-world crime investigations (ex. securing content of account to trace a kidnapper) offer comments/advise on legislation & policy pertaining to technical/legal issues, computer crime and CIP train law enforcement on cyber-investigation and other technical issues

Today’s goals: 1. An introduction to DOJ’s Computer Crime & Intellectual Property Section 2. Incident Response – Monitoring Communications and Traffic Data During an Incident 3. Disclosing Stored Communications and Documents (“ECPA”) 4. Interesting New Legal Developments – Using Programs or Commands to Cause Injury or Death

2. Incident Response – Monitoring Communications During an Incident Contents of communications Headers, logs, and other information Real-time interception Wiretap Act (18 USC §§ ) Pen Register Statute (18 USC §§ ) Access to stored communications ECPA (18 USC §§ ) ECPA

2a. Monitoring During an Incident ; Law Enforcement ’ s Role Procedural laws in the U.S. are designed to assist law enforcement in conducting investigations, securing evidence and tracking criminals These laws are set up using a type of hierarchy requiring different types of approvals depending upon the intrusiveness of the information being sought for example reading the content of someone’s is more invasive than merely looking at the path the took to be delivered to that person therefore securing the right to read content requires greater legal process, and a higher burden of proof on the part of a prosecutor, than securing the right to read the path that an took

2b. Monitoring Communications During an Incident; The Tools Part I. Obtaining Content of Communications - Wiretap Involves reading the content of communications in real-timeInvolves reading the content of communications in real-time Phone – install a device to listen in on the linePhone – install a device to listen in on the line Ex. listen in on a phone conversation planning a bank jobEx. listen in on a phone conversation planning a bank job Computer – install a snifferComputer – install a sniffer Ex. read and IM of a kidnapper to learn where he is at the moment and what his plans areEx. read and IM of a kidnapper to learn where he is at the moment and what his plans are If law enforcement wishes to do thisIf law enforcement wishes to do this Must secure a court order – this is a choice of last resortMust secure a court order – this is a choice of last resort high burden of proofhigh burden of proof

2c. Monitoring Communications During an Incident; Generally Without a court order - cannot intercept contents unless an exception applies; it’s a wiretap. Three key exceptions (no REP): Provider Exception, 18 U.S.C. § 2511(2)(a)(i) To protect the rights and property of the system under attack Consent, 18 U.S.C. § 2511(2)(c) Consent from one of the parties to the communication Computer Trespasser Exception, 18 U.S.C. § 2511(2)(i) Trespasser – accesses computer w/o authorization Can intercept information “transmitted to, through or from the protected computer”

2d. Monitoring Communications During an Incident; Provider Exception Allows system administrator to conduct reasonable monitoring: To protect provider’s “rights or property”; Must be “substantial nexus” between the monitoring and the threat – cannot indiscriminately monitor (w/o consent) When done in normal course of employment, while engaged in any activity which is a “necessary incident to the rendition of... service” by provider Is a limited exception. Not a criminal investigator’s privilege (cannot delegate to LE). Provider may monitor the network to protect rights, and then disclose to law enforcement Provider may monitor the network to protect rights, and then disclose to law enforcement

2e. Monitoring Communications During an Incident; Consent Exception Banner the network You have no reasonable expectation of privacy on this network. your activities are monitored; your activities are monitored; results of monitoring may be disclosed to law enforcement; and results of monitoring may be disclosed to law enforcement; and your continued use of the network consents to such monitoring and disclosure your continued use of the network consents to such monitoring and disclosure Obtain the written consent of authorized users. through a click-through terms and conditions agreement or some type of written agreement (consult legal counsel) through a click-through terms and conditions agreement or some type of written agreement (consult legal counsel)

Allows law enforcement to intercept communications to or from “computer trespassers” 18 U.S.C. 2510(21) Pre-PATRIOT ACT, system owners could monitor systems to “protect property,” was unclear whether they could use/disclose information to LE would be as counterintuitive as requiring a warrant to assist a burglary victim PATRIOT Act created the trespasser exception Even if trespasser is using system as a pass-through to other down- stream victims A “computer trespasser” Is a person who accesses network “without authorization” and “thus has no reasonable expectation of privacy…” Excludes a person known by the provider to have an existing contractual relationship with the provider for use of the system (even if contract is to access a different part of the system) 2f. Monitoring Communications During an Incident; Trespasser Exception

2g. Tracing Traffic Data During an Incident; The Tools Part II. Tracing Source/Destination of Communications Pen/Trap The Pen Register, Trap and Trace Statute governs real- time monitoring of traffic data (e.g. most header information, source and destination IP address and port) The Pen Register, Trap and Trace Statute governs real- time monitoring of traffic data (e.g. most header information, source and destination IP address and port) Pen Register: outgoing connection data Trap and Trace: incoming connection data Does not include content of communications (e.g. e- mail subject line or content of a downloaded file). If law enforcement wishes to get a court order – the burden of proof is lower than for reading content If law enforcement wishes to get a court order – the burden of proof is lower than for reading content

2h. Tracing Traffic Data During an Incident; Header Information (2) Akin to the Wiretap Act, Pen/Trap also grants providers exceptions to the general restrictions on intercepting header info. Exceptions: Provider exception is broad: can intercept if “relating to the “operation, maintenance, and testing,” of the service, or to protect the rights or property of the provider, or to protect users of that service from abuse of service or unlawful use of service Consent of user to record the fact that a wire or electronic communication was initiated or completed

Today’s goals: 1. An introduction to DOJ’s Computer Crime & Intellectual Property Section 2. Incident Response – Monitoring Communications and Traffic Data During an Incident 3. Disclosing Stored Communications and Documents (“ECPA”) 4. Interesting New Legal Developments – Using Programs or Commands to Cause Injury or Death

3a. Disclosing Stored Communications and Documents Part III. Access To/Disclosure of Stored Communications ECPA (18 U.S.C ) governs access to and disclosure of stored files. ECPA (18 U.S.C ) governs access to and disclosure of stored files. Provider/Customer/Government roles Provider/Customer/Government roles Cannot necessarily share stored files with others, including government Cannot necessarily share stored files with others, including government Three main categories are covered Three main categories are covered Communications/content (e.g., , voic , other files) Communications/content (e.g., , voic , other files) Transactional Data (e.g., logs reflecting with whom users communicated) Transactional Data (e.g., logs reflecting with whom users communicated) Subscriber/Session Information Subscriber/Session Information

What stored communications records can network operators voluntarily disclose? First ask whether provider offers communications services to the public generally, or if it is a private provider public provider - if services may be accessed by any user who complies with required procedure and pays any fees If not a public provider – ECPA doesn’t preclude from voluntarily disclosing to law enforcement or others Examples: AOL is a public provider, A company that provides and voice mail services to employees is a private provider 3b.Disclosing Stored Communications and Documents

When providing services, or other stored communication services (such as letting a student store files, web pages, etc.) what records can network operators voluntarily disclose? If you are a private provider (i.e. non-public) may voluntarily disclose all without violating ECPA Content (e.g., the stored or voice mail) Transactional data User information Private providers may voluntarily disclose to government and non-government alike 3c.Disclosing Stored Communications and Documents

Distinguish between “public” and “private” providers in the University/Educational Institution Context: Universities that provide services to only students, faculty and alumni are probably not considered “public” providers Universities that make their services available to others, such as selling services or accounts to others (other than students, faculty and alumni), may begin to cross the line into the realm of being considered “public” for ECPA purposes 3d.Disclosing Stored Communications and Documents

3e.Disclosing Stored Communications and Documents Educational Institutions – Special Considerations: Keep in mind: although voluntary disclosure of this information (i.e. subscriber, transactional and content records) by private providers is not prohibited by ECPA this information may be covered under other laws that pertain to educational institutions for example - laws pertaining to student records under the Family Educational Rights and Privacy Act (“FERPA”) may apply

A public provider must look to statutory exceptions before disclosing a user’s content or non-content to government Public provider may voluntarily disclose the content of communications when: Consent to do so exists (e.g., via banner or TOS) Necessarily incident to the rendition of the service or to the protection of the rights or property of the provider of that service Contents inadvertently obtained & pertain to commission of a crime (to law enforcement) Provider has “good faith” belief that an emergency involving immediate danger of death or serious physical injury requires disclosure (to governmental entity) 3f.Disclosing Stored Communications and Documents

3g.Disclosing Stored Communications and Documents Public provider may voluntarily disclose non-content records concerning a customer or subscriber (i.e. transactional or subscriber information): When consent to do so exists (e.g., via banner or TOS) To protect provider’s rights and property To the government if provider reasonably believes an emergency involving immediate danger of death or serious physical injury requires disclosure To any person other than a governmental entity

3h. Overview: What stored communications records can non-public providers be c 3h. Overview: What stored communications records can non-public providers be compelled to disclose to the government (and how can this be compelled)? Content - Unread (<= 180 days) Search Warrant Content – Unread (>180 days) Subpoena (with notice to the subscriber) Stored Content/Files and Read Subpoena (ECPA doesn’t apply) Transactional Records (sites visited, etc.) Court Order (potentially, with notice) Subscriber Information Subpoena NOTE: The process indicated in each of the above cases is the simplest form of process that may be used (ex. where a subpoena is required, a court order, a process with more procedural protections, will also satisfy ECPA)

3i. Notice to Subscriber When “notice” to subscriber is required May delay notice 90 days to avoid: flight from prosecution destruction of or tampering with evidence intimidation of potential witnesses seriously jeopardizing an investigation May extend delay an additional 90 days (if court order, notice may be delayed until judge/court orders otherwise)

3j. Compelling Production Basic Subscriber Information Can be obtained through subpoena (18 U.S.C. § 2703(c)(2)) Gives you Name & address Local and LD telephone toll billing records Telephone number or other account identifier (such as username or “screen name”) Length & type of service provided Session times and duration Temporarily assigned network address Means and source of payment

3k. Provider Preservation of Data 2703(f) Request requires provider to preserve records for 90 days while you seek appropriate paper Duty extends only to records in provider’s possession at time of request, not future information Can extend No duty of confidentiality Be aware of limitations of provider in preserving (i.e. system requirements may cause a change to an account and alert the subscriber – ask the provider about any limitations);

3l.Disclosing Stored Communications and Documents A provider’s good faith on legal process and statutory authorization in preserving and/or disclosing information confers complete immunity to any civil or criminal action against the provider.

Today’s goals: 1. An introduction to DOJ’s Computer Crime & Intellectual Property Section 2. Incident Response – Monitoring Communications and Traffic Data During an Incident 3. Disclosing Stored Communications and Documents (“ECPA”) 4. Interesting New Legal Developments – Using Programs or Commands to Cause Injury or Death

 United States  causing or attempting to cause serious bodily injury by the transmission of a “program, information, code, or command,” raises the potential penalty up to 20 years  causing or attempting to cause death by the transmission of a “program, information, code, or command,” raises the potential penalty up to life in prison 4a. Punishment Issues Some countries have increased penalties when harm leads to serious injury or death

SoBig virus/worm shut down train signaling systems throughout the East of the US, covering 23 states (transportation CIP) Slammer worm disabled a safety monitoring system in a nuclear power plant in Ohio for nearly 5 hours, which, luckily posed no safety hazard since the plant had been offline since an earlier date (energy CIP) LovSan/Blaster worm knocked out a dispatching system used by state police troopers in Illinois – even though the system was not connected to the ‘Net (emergency services CIP) 4b. Punishment Issues How can someone cause serious injury or death with a computer code or command?

A quote from an MSNBC news article on a Romanian hacker case handled by an FBI Special Agent: “It was nearly 70 degrees below zero outside, but the e- mail on a computer at the South Pole Research Center sent a different kind of chill through the scientists inside. `I’ve hacked into the server. Pay me off or I’ll sell the station’s data to another country and tell the world how vulnerable you are,’ the message warned. Proving it was no hoax, the message included scientific data showing the extortionist had roamed freely around the server, which controlled the 50 researchers’ life-support systems” 4c. Punishment Issues

Joel Michael Schwarz - Computer Crime Section : (202) Joel Michael Schwarz - Computer Crime Section : (202) Web site: Web site: THE END