Chapter 4

Legal Considerations

Solutions in this chapter:

Framing the Issues

General Considerations

image The Legal Landscape

Sources of Investigative Authority

image Jurisdictional Authority

image Private Authority

image Statutory/Public Authority

Statutory Limits on Authority

image Stored Data

image Real-time Data

image Protected Data

Tools for Acquiring Data

image Business Use

image Investigative Use

image Dual Use

Acquiring Data Across Borders

image Workplace Data in Private or Civil Inquiries

image Workplace Data in Government or Criminal Inquiries

Involving Law Enforcement

image Victim Reluctance

image Victim Misperception

image The Law Enforcement Perspective

image Walking the Line

Improving Chances for Admissibility

image Documentation

image Preservation

image Chain of Custody

image Legal Considerations Appendix and Web Site

The image symbol references throughout this chapter denote the availability of additional related materials appearing in the Legal Considerations appendix at the end of this chapter. Further updates for this chapter can be found on the companion Malware Field Guides Web site, at http://www.malwarefieldguide.com/Chapter4.html.

Framing The Issues

This chapter endeavors to explore the legal and regulatory landscape when conducting malware analysis for investigative purposes, and to discuss some of the requirements or limitations that may govern the access, preservation, collection, and movement of data and digital artifacts uncovered during malware forensic investigations.

This discussion, particularly as presented here in abbreviated Field Guide format, does not constitute legal advice, permission, or authority, nor does this chapter or any of the book’s contents confer any right or remedy. The goal and purpose instead is to offer assistance in critically thinking about how best to gather malware forensic evidence in a way that is reliable, repeatable, and ultimately admissible. Because the legal and regulatory landscape surround-ing sound methodologies and best practices is admittedly complicated, evolving, and often unclear, do identify and consult with appropriate legal counsel and obtain necessary legal advice before conducting any malware forensic investigation.

General Considerations

image Think early about the type of evidence you may encounter.

Seek to identify, preserve, and collect affirmative evidence of responsibility or guilt that attributes knowledge, motive, and intent to a suspect, whether an unlikely insider or an external attacker from afar.

Often as important is evidence that exculpates or excludes from the realm of possible liability for the actions or behavior of a given subject or target.

The lack of digital artifacts suggesting that an incident stemmed from a malfunction, misconfiguration, or other non-human initiated systematic or automated process is often as important to identify, preserve, and collect as affirmative evidence.

image Be dynamic in your investigative approach.

Frame and re-frame investigative objectives and goals early and often.

Design a methodology ensuring that investigative steps will not alter, delete, or create evidence, tip off a suspect, or otherwise compromise the investigation.

Create and maintain at all times meticulous step-by-step analytical and chain of custody documentation.

Never lose control over the evidence.

The Legal Landscape

image Navigate the legal landscape by understanding legal permissions or restrictions as they relate to the investigator, the victim, the digital evidence, the investigatory tools, and the investigatory findings.

image The Investigator

The jurisdiction where investigation occurs may require special certification or licensing to conduct digital forensic analysis.

Authority to investigate must exist, and that authority is not without limit.

The scope of the authorized investigation will likely be defined and must be well understood.

image The Victim

Intruding on the privacy rights of relevant victim data custodians must be avoided.

Other concerns raised by the victim might limit access to digital evidence stored on stand-alone devices.

With respect to network devices, collection, preservation, and analysis of user-generated content (as compared to file or system metadata analysis) are typically handled pursuant to a methodology defined or approved by the victim.

It is important to work with the victim to best understand the circumstances under which live network traffic or electronic communications can be monitored.

image The Data

Encountered data, such as personal, payment card, health, financial, educational, insider, or privileged information, may be protected by state or federal law in some way.

Methods exist to obtain overseas evidence necessary to forensic analysis.

In certain jurisdictions, restrictions may exist that prohibit the movement or transportation of relevant data to another jurisdiction.

image The Tools

In certain jurisdictions, limitations relating to the types of investigative tools available to conduct relevant forensic analysis may exist.

The functionality and nature of the use of investigative tools implicate these limitations.

image The Findings

Understanding evidentiary requirements early on will improve chances for admissibility of relevant findings down the road.

Whether and when to involve law enforcement in the malware investigation is an important determination.

Sources of Investigative Authority

Jurisdictional Authority

image Because computer forensics, the discipline, its tools, and training, have grown exponentially in recent years, legislation has emerged in the United States that often requires digital investigators to obtain state-issued licensure before engaging in computer forensic analysis within a state’s borders.

image

Figure 4.1 Sources of investigative authority

image When Private Investigation Includes Digital Forensics

Approximately 45 states maintain private investigation laws that generally require the investigator to submit an application, pay a fee, possess certain experience requirements, pass an examination, and periodically renew the license once granted.1

Many state laws generally define private investigation to broadly include the “business of securing evidence to be used before investigating committees or boards of award or arbitration or in the trial of civil or criminal cases and the preparation therefore.”2

Although such laws do not appear to implicate digital forensics conducted for investigatory purposes by internal network administrators or IT departments on data residing within a corporate environment or domain,3 once the investigation expands beyond the enterprise environment (to other networks or an Internet service provider, or involves the preservation of evidence for the pursuit of some legal right or remedy), licensing regulation appears to kick in within several state jurisdictions.

image Where Digital Forensics Requires PI Licensure

Roughly 32 states’ statutes can be interpreted to include digital forensic investigators, like those in force in Florida, Georgia, Michigan, New York, Nevada, Oregon, Pennsylvania, South Carolina, Texas, Virginia, and Washington.

On the other hand, some states exempt “technical experts”4 or “any expert hired by an attorney at law for consultation or litigation purposes”5 from private investigation licensing requirements. Indeed, at least one state, Delaware, has specifically excluded from regulation “computer forensic specialists,” defined as “persons who interpret, evaluate, test, or analyze pre-existing data from computers, computer systems, networks, or other electronic media, provided to them by another person where that person owns, controls, or possesses said computer, computer systems, networks, or electronic media.”6 A subcommittee of the American Bar Association (ABA) has urged the same result.7

Given that most state licensing requirements vary and may change on a fairly regular basis, consult the appropriate state agency in the jurisdiction where you will perform digital forensic analysis early and often. Navigate to http://www.crimetime.com/licensing.htm or http://www.pimagazine.com/private_investigator_license_requirements.html to find relevant links pertaining to your jurisdiction and obtain qualified legal advice to be sure. image

image Potential Consequences of Unlicensed Digital Forensics

Some legislation contains specific language creating a private right of action for licensing violations.

Indirect penalties may include equitable relief stemming from unlawful business practice in the form of an injunction or restitution order, exclusion of any evidence gathered by the unlicensed investigator, or a client’s declaration of breach of contract and refusal to pay for the investigator’s services.

Private Authority

image Authorization to conduct digital forensic analysis, and the limits of that authority, depend not just on how and where the data to be analyzed lives, but also on the person conducting the analysis. The digital investigator derives authority to investigate from different sources with different constraints on the scope and methodology governing that investigation.

image Company Employee

Internal investigators assigned to work an investigative matter on behalf of their corporation often derive authority to investigate from well-defined job descriptions tied to the maintenance and security of the corporate computer network.

Written incident response policies may similarly inform the way in which a network administrator or corporate security department uses network permissions and other granted resources to launch and carry out corporate investigative objectives.

Chains of corporate command across information security, human resources, legal, and management teams will inform key investigative decisions about containment of ongoing network attacks, how best to correct damage to critical systems or data, whether and the extent to which alteration of network status data for investigative purposes is appropriate, or even the feasibility of shutting down critical network components or resources to facilitate the preservation of evidence.

image Retained Expert

Internal considerations also indirectly source the authority of the external investigator hired by corporate security or in-house counsel or outside counsel on behalf of the victim corporation.

More directly, the terms and conditions set forth in engagement letters, service agreements, or statements of work often specifically authorize and govern the external investigator’s access to and analysis of relevant digital evidence.

Non-disclosure provisions with respect to confidential or proprietary corporate information may not only obligate the digital investigator to certain confidentiality requirements, but also may proscribe the way in which relevant data can be permissibly transported (i.e., hand-carried not couriered or shipped) or stored for analysis (i.e., on a private network with no externally facing connectivity).

Service contracts may require special treatment of personal, payment card, health, insider, and other protected data that may be relevant to forensic investigation (a topic addressed later in the “Protected Data” section of this chapter).

A victim corporation’s obligations to users of the corporate network may further limit grants of authority to both the internal and external digital investigator.

image An employee’s claims of a reasonable expectation of privacy to data subject to digital forensic analysis may be defeated if the employer—through an employment manual, policy, or contract, a banner displayed at user login, or some other means—has provided notice to the employee otherwise.8

image Whether analysis may be conducted of a suspect file residing on a workstation dedicated for onsite use by the company’s third party auditors will depend on the written terms of a third-party service or user agreement.

Sanctions ranging from personnel or administrative actions, to civil breach of contract or privacy actions, to criminal penalties can be imposed against investigators who exceed appropriate authority.

Statutory/Public Authority

image Law enforcement conducted digital forensic investigations are authorized from public sources.

image The Special Case of Law Enforcement

Federal and state statutes authorize law enforcement to conduct malware forensic investigations with certain limitations.9

Public authority for digital investigators in law enforcement comes with legal process, most often in the form of grand jury subpoenas, search warrants, or court orders.

The type of process often dictates the scope of authorized investigation, both in terms of what, where, and the circumstances under which electronic data may be obtained and analyzed.

Attention to investigating within the scope of what has been authorized is particularly critical in law enforcement matters where evidence may be suppressed and charges dismissed otherwise.10

image Acting in Concert with Law Enforcement

Retained experts may be deemed to be acting in concert with law enforcement—and therefore similarly limited to the scope of the authorized investigation—if the retained expert’s investigation is conducted at the direction of, or with substantial input from, law enforcement.

For more information, refer to the discussion of whether, when, and how to involve law enforcement in conducting malware forensic investigations, appearing later in the “Involving Law Enforcement” section of this chapter.

Statutory Limits on Authority

In addition to sources and limits of authority tied to the person conducting the analysis, authority also comes from regulations that consider aspects of the relevant data itself; namely the type of data, the quality of the data, the location of the data, when the data will be used, and how the data will be shared.

Stored Data

image Stored data relevant to a malware-related investigation may not be available under some circumstances, depending on the type of data, the type of network, and to whom disclosure of the data is ultimately made. Authorization to access stored data depends on whether the data is stored by a private or public provider, and if by a public provider, whether the data sought to be accessed constitutes content or non-content information.11

image Private Provider

Authorized access to stored e-mail data on a private network that does not provide mail service to the public generally would not implicate Electronics Communications Privacy Act (ECPA) prohibitions against access and voluntary disclosure, even to law enforcement.12

E-mail content, transactional data relating to e-mail transmission, and information about the relevant user on the network can be accessed and voluntarily disclosed to anyone at will.

image Public Provider—Non-Content

If the network is a public provider of e-mail service, like AOL or Yahoo! for example, content of its subscribers’ e-mail, or even non-content subscriber or transactional data relating to such e-mails in certain circumstances, cannot be disclosed, unless certain exceptions apply.

A public provider can voluntarily disclose non-content customer subscriber and transactional information relating to a customer’s use of the public provider’s mail service:

1. To anyone other than law enforcement

2. To law enforcement:

a. With the customer’s lawful consent; or

b. When necessary to protect the public provider’s own rights and property; or

c. If the public provider reasonably believes an emergency involving immediate danger of death or serious bodily injury requires disclosure.13

image Public Provider—Content

With respect to the content of a customer subscriber’s e-mail, a public provider can voluntarily disclose to law enforcement:

a. With the customer’s lawful consent; or

b. When necessary to protect the public provider’s own rights and property; or

c. If the public provider inadvertently obtains content and learns that it pertains to the commission of a crime; or

d. If the public provider reasonably believes an emergency involving immediate danger of death or serious bodily injury requires disclosure.14

Of course, if the public provider is served with a grand jury subpoena or other legal process compelling disclosure, that is a different story.

Otherwise, through the distinctions between content and non-content and disclosure to a person and disclosure to law enforcement, ECPA endeavors to balance private privacy with public safety.

Real-time Data

image For digital investigators who need to real-time monitor the content of Internet communications as they are happening, it is important to understand the requirements of and exceptions to the federal Wiretap Act, the model for most state statutes on interception as well.

image Content

The Wiretap Act, often referred to as “Title III,” protects the privacy of electronic communications by prohibiting any person from intentionally intercepting, or attempting to intercept, their contents by use of a device.15

In most jurisdictions, electronic communications are “intercepted” within the meaning of the Wiretap Act only when such communications are acquired contemporaneously with their transmission, as opposed to stored after transmittal.16

There are three exceptions to the Wiretap Act relevant to the digital investigator: the provider exception; consent of a party; and the computer trespasser exception.

image Content—The Provider Exception

The provider exception affords victim corporations and their retained digital investigators investigating the unauthorized use of the corporate network fairly broad authority to monitor and disclose to others (including law enforcement) evidence of unauthorized access and use, so long as that effort is tailored to both minimize interception and avoid disclosure of private communications unrelated to the investigation.17

In practical terms, while the installation of a sniffer to record the intruder’s communication with the victim network in an effort to combat ongoing fraudulent, harmful, or invasive activity affecting the victim entity’s rights or property may not violate the Wiretap Act, the provider exception does not authorize the more aggressive effort to “hack back” or otherwise intrude on an intruder by gaining unauthorized access to the attacking system (likely an innocent compromised machine anyway).

Do not design an investigative plan to capture all traffic to the victimized network; instead avoid intercepting traffic communications known to be innocuous.

image Content—The Consent Exception

The consent exception authorizes interception of electronic communications where one of the parties to the communication18 gives explicit consent or is deemed upon actual notice to have given implied consent to the interception.19

Guidance from the Department of Justice recommends that “organizations should consider deploying written warnings, or “banners,” on the ports through which an intruder is likely to access the organization’s system and on which the organization may attempt to monitor an intruder’s communications and traffic.

If a banner is already in place, it should be reviewed periodically to ensure that it is appropriate for the type of potential monitoring that could be used in response to a cyber attack.20

If banners are not in place at the victim company, consider whether the obvious notice of such banners would make monitoring of the ongoing activities of the intruder more difficult (and unnecessarily so where the provider exception remains available) before consulting with counsel to tailor banner content best suited to the type of monitoring proposed.

Solid warnings often advise users that their access to the system is being monitored, that monitoring data may be disclosed to law enforcement, and that use of the system constitutes consent to surveillance.

Keep in mind that while the more common network ports are bannerable, the less common (the choice of the nimble hacker) often are not.

image Content—The Computer Trespasser Exception—Acting in Concert with Law Enforcement

The computer trespasser exception gives law enforcement the ability with the victim provider’s consent to intercept communications exclusively between the provider and an intruder who has gained unauthorized access to the provider’s network.21

This exception is not available to digital investigators retained by the provider, but only to those acting in concert with law enforcement.

Do not forget the interplay of other limits of authority discussed elsewhere in this chapter, bearing in mind that such limitations may trump exceptions otherwise available under the Wiretap Act to digital investigators planning to conduct network surveillance on a victim’s network.

image Non-Content

For digital investigators who need only collect real-time the non-content portion of Internet communications—the source and destination IP address associated with a network user’s activity, the header and “hop” information associated with an e-mail sent to or received by a network user, the port that handled the network user’s communication a network user uses to communicate—be mindful that an exception to the federal Pen Registers and Trap and Trace Devices statute22 nonetheless must apply for the collection to be legal.

Although the statute generally prohibits the real-time capture of traffic data relating to electronic communications, provider and consent exceptions similar and broader to those found in the Wiretap Act are available.

Specifically, corporate network administrators and the digital investigators they retain to assist have fairly broad authority to use a pen/trap device on the corporate network without court order so long as the collection of non-content:

image Relates to the operation, maintenance, and testing of the network

image Protects the rights or property of the network provider

image Protects network users from abuse of or unlawful use of service

image Is based on consent

Remember that surveillance of the content of any communication would implicate the separate provisions and exceptions of the Wiretap Act.

Protected Data

image For the digital investigator tasked with performing forensic analysis on malicious code designed to access, copy, or otherwise remove valuable sensitive, confidential, or proprietary information, understanding the nature of federal and state protections of this data will help inform necessary investigative and evidentiary determinations along the way.

image Federal Protection of Financial Information

Responding to an incident at a financial institution that compromises customer accounts may implicate the provisions of the Gramm Leach Bliley Act, also known as the Financial Services Modernization Act of 1999, which protects the privacy and security of consumer financial information that financial institutions collect, hold, and process.23

The Act generally defines a “financial institution” as any institution that is significantly engaged in financial activities.”24

The regulation only protects consumers who obtain financial products and services primarily for person, family, or household purposes.

The regulation:

image Requires a financial institution in specified circumstances to provide notice to customers about its privacy policies and practices;

image Describes the conditions under which a financial institution may disclose non-public personal information about consumers to non-affiliated third parties; and

image Provides a method for consumers to prevent a financial institution from disclosing that information to most non-affiliated third parties by “opting out” of that disclosure, subject to certain limited exceptions.

In addition to these requirements, the regulations set forth standards for how financial institutions must maintain information security programs to protect the security, confidentiality, and integrity of customer information. Specifically, financial institutions must maintain adequate administrative, technical, and physical safeguards reasonably designed to:

image Ensure the security and confidentiality of customer information;

image Protect against any anticipated threats or hazards to the security or integrity of such information; and

image Protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer.

Be careful when working with financial institution data to obtain and document the scope of authorization to access, transport, or disclose such data to others.25

image Federal Protection of Health Information

The Health Insurance Portability and Accountability Act (HIPAA)26 applies generally to covered entities (health plans, health-care clearinghouses, and health-care providers who transmit any health information in electronic form),27 and provides rules designed to ensure the privacy and security of individually identifiable health information (“protected health information”), including such information transmitted or maintained in electronic media (“electronic protected health information”).

HIPAA specifically sets forth security standards for the protection of electronic protected health information.

image The regulation describes the circumstances in which protected health information may be used and/or disclosed, as well as the circumstances in which such information must be used and/or disclosed.

image The regulation also requires covered entities to establish and maintain administrative, physical, and technical safeguards to:

image Ensure the confidentiality, integrity, and availability of all electronic protected health information the covered entity creates, receives, maintains, or transmits;

image Protect against any reasonably anticipated threats or hazards to the security or integrity of such information;

image Protect against any reasonably anticipated uses or disclosures of such information that are not otherwise permitted or required by the regulation; and

image Ensure compliance with the regulation by the covered entity’s workforce.

In February 2009, the American Recovery and Reinvestment Act (ARRA) became law, subjecting business associates—vendors, professional service providers, and others that perform functions or activities involving protected health information for or on behalf of covered entities—to many of the health information protection obligations that HIPAA imposes on covered entities.28

Given these stringent requirements, investigative steps involving the need to access, review, analyze, or otherwise handle electronic protected health information should be thoroughly vetted with counsel to ensure compliance with the HIPAA and ARRA security rules and obligations.29

image Federal Protection of Public Company Information

The Sarbanes-Oxley Act (SOX)30 broadly requires public companies to institute corporate governance policies designed to facilitate the prevention, detection, and handling of fraudulent acts or other instances of corporate malfeasance committed by insiders.

Other provisions of SOX were clearly designed to deter and punish the intentional destruction of corporate records.

In the wake of SOX, many public companies overhauled all kinds of corporate policies that may also implicate more robust mechanisms for the way in which financial and other digital corporate data is handled and stored.

During the early assessment of the scope and limits of authority to conduct any internal investigation at a public company, be mindful that a SOX-compliant policy may dictate or limit investigative steps.

image Other Federally Protected Information

Information About Children: The Child Online Privacy Protection Act (COPPA)31 prohibits unfair or deceptive acts or practices in connection with the collection, use, and/or disclosure of personal information from and about children on the Internet. The Juvenile Justice and Delinquency Prevention Act,32 governing both the criminal prosecution and the delinquent adjudication of minors in federal court, protects the juvenile defendant’s identity from public disclosure.33 If digital investigation leads to a child, consult counsel for guidance on the restrictions imposed by these federal laws.

Child Pornography: 18 U.S.C. § 1466A proscribes among other things the possession of obscene visual representations of the sexual abuse of children. Consider including in any digital forensic services contract language that reserves the right to report as contraband to appropriate authorities any digital evidence encountered that may constitute child pornography.

Student Educational Records: The Family Education Rights and Privacy Act34 prevents certain educational institutions from disclosing a student’s “personally identifiable education information,” including grades and student loan information, without the student’s written permission. Again, authority to access and disclose this type of information should be properly vetted with the covered educational institution or its counsel.

Payment Card Information: The Payment Card Industry Data Security Standards (PCI DSS) established common industry security standards for storing, transmitting, and using credit card data, as well as managing computer systems, network devices, and the software used to store, process, and transmit credit card data. According to these established guidelines, merchants who store, process, or transmit credit card information, in the event of a security incident, must take immediate action to investigate the incident, limit the exposure of cardholder data, make certain disclosures, and report investigation findings. When handling PCI data during the course of digital investigation, be sure to understand these heightened security standards and requirements for disclosure and reporting.

Privileged Information: Data relevant to the digital investigator’s analysis may constitute or be commingled with information that is protected by the attorney–client privilege or the attorney work product doctrine. Digital investigator access to or disclosing of that data, if not performed at the direction of counsel, may be alleged to constitute a waiver of these special protections.

image State Law Protections

Forty-four states have passed a data breach notification law requiring owners of computerized data that include consumer personal information to notify any affected consumer following a data breach that compromises the security, confidentiality, or integrity of that personal information.

The statutes generally share the same key elements, but vary in how those elements are defined, including the definitions of “personal information,” the entities covered by the statute, the kind of breach triggering notification obligations, and the notification procedures required.35

Personal information has been defined across these statutes to include some or all of the following:

image Social Security, Alien Registration, tribal, and other federal and state government issued identification numbers

image Drivers’ license and non-operating license identification numbers

image Date of birth

image Individuals’ mothers’ maiden names

image Passport number

image Credit card and debit card numbers

image Financial account numbers (checking, savings, other demand deposit accounts)

image Account passwords or personal identification numbers (PINs)

image Routing codes, unique identifiers, and any other number or information that can be used to access financial resources

image Medical information or health insurance information

image Insurance policy numbers

image Individual taxpayer identification numbers (TINs), employer taxpayer identification number (EINs), or other tax information

image Biometric data (fingerprints, voice print, retina or iris image)

image Individual DNA profile data

image Digital signature or other electronic signature

image Employee identification number

image Voter identification numbers

image Work-related evaluations

Most statutes exempt reporting if the compromised information is “encrypted,” although the statues do not always set forth the standards for such encryption. Some states exempt reporting if, under all circumstances, there is no reasonable likelihood of harm, injury, or fraud to customers. At least one state requires a “reasonable investigation” before concluding no reasonable likelihood of harm.

Notification to the affected customers are ordinarily made in writing, electronically, telephonically, or, in the case of large-scale breaches, through publication. Under most state statutes, Illinois being an exception, notification can be delayed if it is determined that the disclosure will impede or compromise a criminal investigation.

Understanding the breach notification requirements of the state jurisdiction in which the investigation is conducted is important to the integrity of the digital examiner’s work, as the scope and extent of permissible authority to handle relevant personal information may be different than expected. Consult counsel for clear guidance on how to navigate determinations of encryption exemption and assess whether applicable notice requirements will alter the course of what otherwise would have been a more covert operation designed to avoid tipping the subject or target. image

Tools for Acquiring Data

The digital investigator’s selection of a particular tool often has legal implications. Nascent judicial precedent in matters involving digital evidence has yielded no requirement that a particular tool be used for a particular purpose. Instead, reliability, a theme interwoven throughout this chapter and this entire Field Guide, often informs whether and the extent to which the digital investigator’s findings are considered.

Business Use

image Output from tools used during the ordinary course of business is commonly admitted as evidence absent some showing of alteration or inaccuracy.

image Ordinary Course

Intrusion detection systems

Firewalls, routers, VPN appliances

Web, mail, and file servers

image Business Purpose

Output from ordinary course systems, devices, and servers constitutes a record generated for a business—a class of evidence for which there exists recognized indicia of reliability.

Documentation and custodial testimony will support admissibility of such output.

Investigative Use

image Output from tools deployed for an investigatory purpose is evaluated differently. Which tool was deployed, whether the tool was deployed properly, and how and across what media the tool was deployed are important considerations to determinations of reliability.

image Tool

Simple traceroutes

WHOIS lookups

Other network-based tools

image Deployment

Inside the victim network

image Was deployment in furtherance of maintaining the integrity and safety of the victim network environment?

image Was deployment consistent with documented internal policies and procedures?

Outside the victim network

image Did deployment avoid the possibility of unauthorized access or damage to other systems?

image Did deployment avoid violating other limits of authority discussed earlier in this chapter?

image Findings

Repeatable

Supported by meticulous note taking

Investigative steps were taken consistent with corporate policy and personal, customary, and best practice.

Investigative use of tools was consistent without sound legal advice.

Dual Use

image Hacker tools and tools to affect security or conduct necessary investigation are often one in the same. The proliferation of readily downloadable “hacker tools” packaged for wide dispersion has resulted in legal precedent in some jurisdictions that inadequately addresses this “dual use,” causing public confusion about where the line is between the two and what the liabilities are when that line is crossed.

image Multiple Countries—Council of Europe Convention of Cybercrime36

What It Is:

image Legally binding multilateral instrument that addresses computer-related crime.

image Forty-three countries have signed or ratified it, including the United States.37

image Each participating country agrees to ensure that its domestic laws criminalize several categories of computer-related conduct.

image One such category, titled “Misuse of Devices,” intends to criminalize the intentional possession of or trafficking in “hacker tools” designed to facilitate the commission of a crime.

The Problem:

image Software providers, research and security analysts, and digital investigators might get unintentionally but nonetheless technically swept up in less than carefully worded national laws implemented by participating countries.

image The official Commentary on the substantive provisions of the Convention that include Article 6 provides little further illumination,38 but it does seem to exclude application to tools that might have both legitimate and illegitimate purposes.

image United Kingdom—Computer Misuse Act/Police and Justice Act

What It Is:

image Proposed amendments to the Computer Misuse Act of 1990 to be implemented through the Police and Justice Act of 2006.39

image Designed to criminalize the distribution of hacker tools.

The Problem:

image No dual-use exclusion.

image Simple sharing of common security tools with someone other than a known and trusted colleague could violate the law.

image “Believed likely to be misused” standard of liability is vague.

image Prosecution guidance40 is similarly vague.

image Germany—Amendments to Section 202c

What It Is

image Amendments to the German Code41 broadly prohibiting unauthorized users from disabling or circumventing computer security measures in order to access secure data.

image The amendments also proscribe the manufacturing, programming, installing, or spreading of software that has the primary goal of circumventing security measures.

The Problem

image Security analysts throughout the globe have criticized the law as vague, overbroad, and impossible to comply with.

image German security researchers have pulled code and other tools offline for fear of prosecution.

image United States—Computer Fraud and Abuse Act

The Issue

image Despite the United States’ participation in the Council of Europe Convention on Cybercrime, Congress has not amended the Computer Fraud and Abuse Act (CFAA) to include “devices.”

image The CFAA does create misdemeanor criminal liability for “knowingly and with intent to defraud traffic[king] in any password or similar information through which a computer may be accessed without authorization.”42

The Problem

image What does “similar information” mean? Does it include the software and tools commonly used by digital investigators to respond to a security incident? Is the statute really no different than the British and German statutes?

image Here is the party line, appearing in a document titled “Frequently Asked Questions about the Council of Europe Convention on Cybercrime,”43 released by the U.S. Department of Justice when ratification of the Convention was announced:

image

Figure 4.2 U.S. Department of Justice, “Frequently asked questions about the Council of Europe Convention on Cybercrime”

imageThe Lesson

Pay close attention to the emerging laws on misuse of devices, particularly when conducting forensic analysis in the 43 countries that have committed to implement the Convention and its provisions.

When in doubt, obtain appropriate legal advice.

Acquiring Data across Borders

In the United States, subject to the sources and limitations of authority discussed earlier in this chapter, digital investigators are often tasked early in the course of internal investigations to thoroughly preserve, collect, and analyze electronic data residing across corporate networks. At times, however, discovery and other data preservation obligations reach outside domestic borders to, for example, a foreign subsidiary’s corporate network, and may conflict with foreign data protection laws that treat employee data residing on company computers, servers, and equipment as the personal property of the individual employee and not the corporation.

Workplace Data in Private or Civil Inquiries

image Handling of workplace data depends on the context of the inquiry. Although more formal mechanisms exist for the collection of digital evidence pursuant to government or criminal inquiries, country-specific data privacy laws will govern private or civil inquiries.

image Europe

Although inapplicable to data efforts made in the context of criminal law enforcement or government security matters, the 1995 European Union Data Protection Directive,44 a starting point for the enactment of country-specific privacy laws within the 27 member countries that subscribe to it,45 sets forth 8 general restrictions on the handling of workplace data46:

image Limited Purpose: Data should be processed for a specific purpose and subsequently used or communicated only in ways consistent with that purpose.

image Integrity: Data should be kept accurate, up to date, and no longer than necessary for the purposes for which collected.

image Notice: Data subjects should be informed of the purpose of any data processing and the identity of the person or entity determining the purposes and means of processing the data.

image Access/Consent: Data subjects have the right to obtain copies of personal data related to them, rectify inaccurate data, and potentially object to the processing.

image Security: Appropriate measures to protect the data must be taken.

image Onward Transfer: Data may not be sent to countries that do not afford “adequate” levels of protection for personal data.

image Sensitive Data: Additional protections must be applied to special categories of data revealing the data subject’s racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, or sex life.

image Enforcement: Data subjects must have a remedy to redress violations.

With respect to the restriction on onward transfer, no definition of “adequate” privacy protection is provided in the European (EU) Directive. Absent unambiguous consent obtained from former or current employee data subjects that affords the digital investigator the ability to transport the data back to the lab,47 none of the other exceptions to the “onward transfer” prohibition in the EU Directive appear to apply to internal investigations voluntarily conducted by a victim corporation responding to an incident of computer fraud or abuse. As such, the inability to establish the legal necessity for data transfers for fact finding in an internal inquiry may require the digital investigator to preserve, collect, and analyze relevant data in the European country where it is found.

image Data Transfers from Europe to the United States

When the EU questioned whether “adequate” legal protection for personal data potentially blocked all data transfers from Europe to the United States, the U.S. Department of Commerce responded by setting up a Safe Harbor framework imposing safeguards on the handling of personal data by certified individuals and entities.48

In 2000, the EU approved the Safe Harbor framework as “adequate” legal protection for personal data, approval that binds all the member states to the Directive.49

A Safe Harbor certification by the certified entity amounts to a representation to European regulators and individuals working in the EU that “adequate” privacy protection exists to permit the transfer of personal data to that U.S. entity.50

Safe Harbor certification may nonetheless conflict with the onward transfer restrictions of member state legislation implemented under the Directive, as well as “blocking statutes,” such as the one in France that prohibits French companies and their employees, agents, or officers from disclosing to foreign litigants or public authorities information of an “economic, commercial, industrial, financial, or technical nature.”51

Workplace Data in Government or Criminal Inquiries

image Other formal and informal mechanisms to obtain overseas digital evidence may be useful in the context of an internal investigation, to comply with U.S. regulatory requirements, or when a victim company makes a criminal referral to law enforcement.

image Mutual Legal Assistance Request (MLAT)

Parties to a bilateral treaty that places an unambiguous obligation on each signatory to provide assistance in connection with criminal and in some instances regulatory matters may make requests between central authorities for the preservation and collection of computer media and digital evidence residing in their respective countries.52

The requesting authority screens and forwards requests from its own local, state, or national law enforcement entities, and the receiving authority then has the ability to delegate execution of the request to one of its entities.

For foreign authorities seeking to gather evidence in the United States, the U.S. Department of Justice is the central authority, working through its Office of International Affairs.

The central authority at the receiving end of an MLAT request may be very reluctant to exercise any discretion to comply. That being said, most central authorities are incentivized to fulfill MLAT requests so that similar accommodation will accompany requests in the other direction.

image Letter Rogatory

A less reliable, more time-consuming mechanism of the MLAT is the letter rogatory or “letter of request,” which is a formal request from a court in one country to “the appropriate judicial authorities” in another country requesting the production of relevant digital evidence.53

The country receiving the request, however, has no obligation to assist.

The process can take a year or more.

image Informal Assistance

In addition to the widely known Council of Europe and G8, a number of international organizations are attempting to address the difficulties digital investigators face in conducting network investigations that so often involve the need to preserve and analyze overseas evidence.

Informal assistance and support through the following organizations may prove helpful in understanding a complicated international landscape:

image Council of Europe Convention of Cybercrime
http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM=1&CL=ENG (and more generally) http://www.coe.int/t/dc/files/themes/cybercrime/default_EN.asp?

image G8 High-Tech Crime Subgroup
(Data Preservation Checklists)
http://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/Documents/Points%20of%20Contact/24%208%20DataPreservationChecklists_en.pdf

image Interpol
Information Technology Crime—Regional Working Parties
http://www.interpol.int/public/TechnologyCrime/Default.asp

image European Network of Forensic Science Institutes
(Memorandum signed for International Cooperation in Forensic Science)
http://www.enfsi.eu/page.php?uid=1&nom=153

image Asia-Pacific Economic Cooperation
Electronic Commerce Steering Group
http://www.apec.org/apec/apec_groups/committee_on_trade/electronic_commerce.html

image Organization for Economic Cooperation & Development
Working Party on Information Security & Privacy
(APEC-OECD Workshop on Malware—Summary Record—April 2007)
http://www.oecd.org/dataoecd/37/60/38738890.pdf

image Organization of American States
Inter-American Cooperation Portal on Cyber-Crime
http://www.oas.org/juridico/english/cyber.htm

Involving Law Enforcement

Whether a victim company chooses to do nothing, pursue civil remedies, or report an incident to law enforcement affects the scope and nature of the work of the digital investigator. Analysis of identified malware might become purely academic once the intrusion is contained and the network secured. Malware functionality might be the subject of written or oral testimony presented in a civil action when the victim company seeks to obtain monetary relief for the damage done. The possibility of criminal referral adjusts the investigative landscape as well. Understanding the process victim corporations go through to decide about whether and when to involve law enforcement will help realize relevant consequences for the digital investigator.

Victim Reluctance

image Victim companies are often reluctant to report incidents of computer crime.54

The threat of public attention and embarrassment, particularly to shareholders, often casts its cloud over management.

Nervous network administrators, fearful of losing their jobs, perceive themselves as having failed to adequately protect and monitor relevant systems and instead focus on post-containment and prevention.

Legal departments, having determined that little or no breach notification to corporate customers was required in the jurisdictions where the business operates, would rather not rock the boat.

Audit committees and boards often would rather pay the cyber extortionist’s ransom demand in exchange for a “promise” to destroy the stolen sensitive data, however unlikely, and even when counseled otherwise, rather than involve law enforcement.

Victim Misperception

image Many companies misperceive that involving law enforcement is simply not worth it.

Victims are confused about which federal, state, or local agency to contact. image

Victims are concerned about law enforcement agent technical inexperience, agency inattention, delay, business interference, and damage to network equipment and data.

Victims fear the need to dedicate personnel resources to support the referral.

Victims exaggerate the unlikelihood that a hacker kid living in a foreign country will ever see the inside of a courtroom.

The Law Enforcement Perspective

image Cybercrime prosecution and enforcement have never been of higher priority among federal, state, and local government.

Because the present proliferation of computer fraud and abuse is unparalleled,55 domestic and foreign governments alike have invested significant resources in the development and training of technical officers, agents, and prosecutors to combat cybercrime in a nascent legal environment.

Law enforcement understands that internal and external digital investigators are the first line of defense and in the best positions to detect, initially investigate, and neatly package some of the best evidence necessary for law enforcement to successfully seek and obtain real deterrence in the form of jail time, fines, and restitution.

Evidence collected by internal and external digital investigators is only enhanced by the legal process (grand jury subpoena, search warrants) and data preservation authority (pen registers, trap and traces, wiretaps) available to law enforcement and not available to any private party.

International cooperation among law enforcement in the fight against cybercrime has never been better, as even juveniles are being hauled into federal court for their cyber misdeeds.56

Walking the Line

image Often the investigative goals of the victim company and law enforcement diverge, leaving the digital investigator at times in the middle. Stay out of it.

The victim company may be more interested in protecting its network or securing its information than, for example, avoiding containment to allow law enforcement to obtain necessary legal process to real-time monitor future network events caused by the intruder.

Despite misimpressions to the contrary, victim companies rarely lose control over the investigation once a referral is made; rather, law enforcement often requires early face time and continued cooperation with the administrators and investigators who are most intimate with and knowledgeable of the affected systems and relevant discovered data. Constant consultation is the norm.

Although law enforcement will be careful not to direct any future actions by the digital investigator, thereby creating the possibility that a future court deems and suppresses the investigator’s work as the work of the government conducted in violation of the heightened legal standards of process required of law enforcement, the digital investigator may be required to testify before a grand jury impaneled to determine if probable cause that a crime was committed exists, or even to testify before a trial jury on returned and filed charges.

Remember the scope and limitations of authority that apply, and let the victim company and law enforcement reach a resolution that is mutually beneficial.

Staying apprised of the direction of the investigation, whether it stays private, becomes public, or proceeds on parallel tracks (an option less favored by law enforcement once involved), will help the digital investigator focus on what matters most—repeatable, reliable, and admissible findings under any circumstance.

Improving Chances for Admissibility

Thorough and meticulous recordkeeping, an impeccably supportable and uninterrupted chain of custody, and a fundamental understanding of basic notions governing the reliability and integrity of evidence will secure best consideration of the work of the digital investigator in any context, in any forum, before any audience. Urgency tied to pulling off a quick, efficient response to an emerging attack often makes seem less important at the outset of any investigation the implementation of these guiding principles. However, waiting until the attack is under control and until the potentially exposed systems are secured often makes it too difficult to recreate events from memory with the same assurance of integrity and reliability as an ongoing written record of every step taken.

Documentation

image Concerns that recordkeeping creates potentially discoverable work product, impeachment material, or preliminary statements that may prove inconsistent with ultimate findings are far outweighed by the future utility to be in the best position to well evidence the objectivity, completeness, reasonableness of those opinions.

Document in sufficient technical detail each early effort to identify and confirm the nature and scope of the incident.

Keep, for example, a list of the specific systems affected, the users logged on, the number of live connections, and the processes running.

Note when, how, and the substance of observations made about the origin of attack; the number of files or logs that were created, deleted, last accessed, modified, or written to; user accounts or permissions that have been added or altered; machines to which data may have been sent; and the identity of other potential victims.

Record observations about the lack of evidence—ones that may be inconsistent with what was expected to be found based on similar incident handling experiences.

Keep a record of the methodology employed to avoid altering, deleting, or modifying existing data on the network.

Track measures taken to block harmful access to, or stop continuing damage on the affected network, including filtered or isolated areas.

Remember early on to begin identifying and recording the extent of damage to systems and the remediative costs incurred—running notations that will make future recovery from responsible parties and for any subsequent criminal investigation that much easier.

Preservation

image Careful preservation of digital evidence further promotes repeatable, defensible, and reliable findings.

At the outset, create forensically sound redundant hashed images of original media, store one with the original evidence, and use the remaining image as a working copy for analysis. Do not simply logically copy data, even server level data, when avoidable.

Immediately preserve backup files and relevant logs.

When preserving data, hash, hash, hash. Hash early to correct potentially flawed evidence handling later.

During analysis, hash to find or exclude from examination known files.

Consider using Camatasia or other screen capture software to preserve live observations of illicit activity before containment. This is a way to supplement evidence obtained from enabled and extended network logging.

If legal counsel has approved the use of a “sniffer” or other monitoring device to record communications between the intruder and any server that is under attack, be careful to preserve and document relevant information about those recordings.

The key is to use available forensic tools to enhance the integrity, reliability, and repeatability of the work.

Chain of Custody

image Meticulous chain of custody practices can make or break the success of a digital forensic investigation.

Although chain of custody goes to the weight not the admissibility of the evidence in most court proceedings, the concept remains nonetheless crucial, particularly where evidence may be presented before grand juries, arbitrators, or in similar alternative settings where evidentiary rules are relaxed, and as such, inexplicable interruptions in the chain may leave the evidence more susceptible to simply being overlooked or ignored.

The ability to establish that data and the investigative records generated during the process are free from contamination, misidentification, or alteration between the time collected or generated and when offered as evidence goes not just to the integrity of evidence but its very relevance—no one will care about an item that cannot be established as being what it is characterized to be, or a record that cannot be placed in time or attributed to some specific action. image

For data, the chain of custody form need not be a treatise; simply record unique identifying information about the item (serial number), note the date and description of each action taken with respect to the item (placed in storage, removed from storage, mounted for examination, returned to storage), and identify the actor at each step (presumably a limited universe of those with access).

A single actor responsible for generated records and armed with a proper chain of custody form for data can lay sufficient evidentiary foundation without having to present every actor in the chain before the finder of fact.

image State Private Investigator and Breach Notification Statutes

State PI Licensing Statute State Breach Notification Statute
Alabama N/A N/A
Alaska N/A ALASKA STAT. § 45.48.010
Arizona ARIZ. REV. STAT. § 32-2401 ARIZ. REV. STAT. § 44-7501
Arkansas ARK. CODE § 17-40-350 ARK. CODE §§ 4-110-103-108
California CAL. BUS. & PROF. CODE § 7520 CAL. CIV. CODE §§ 1798.82
Colorado N/A COLO. REV. STAT. § 6-1-716
Connecticut CONN. GEN. STAT. § 29-154 CONN. GEN. STAT. § 36a-701b
Delaware 24 DEL. C. § 1303 6 DEL. C. § 12B-101
District of Columbia 17 DCMR § 2000.7 D.C. CODE § 28-3851–§28-3853
Florida FLA. STAT. § 493.6100 FLA. STAT. § 817.5681
Georgia GA. CODE § 43-38-6 GA. CODE § 10-1-912
Hawaii HRS § 463-5 HRS § 487N-2
Idaho N/A I.C. § 28-51-105
Illinois 225 ILCS § 447/10-5 815 ILCS § 530/10
Indiana IC § 25-30-1-3 IC § 24-4.9-3-1
Iowa I.C.A § 80A.3 I.C.A. § 715C.2
Kansas K.S.A. § 75-7b02 K.S.A. § 50-7a02
Kentucky KRS § 329A.015 N/A
Louisiana LSA-R.S. § 37:3501 LSA-R.S. § 51.3074
Maine 32 M.R.S.A § 8104 10 M.R.S.A § 1348
Maryland MD BUS OCCUP & PROF § 13-301 MD COML §14-3504
Massachusetts M.G.L.A. 147 § 23 M.G.L.A 93H § 3
Michigan M.C.L.A § 338.823 M.C.L.A § 445.72
Minnesota M.S.A. § 326.3381 M.S.A. § 325E.61
Mississippi N/A MS ST § 75-24-29
Missouri MO ST § 324.1104 MO ST § 407.1500
Montana MCA § 37-60-301 MCA § 30-14-1704
Nebraska NEB. REV. STAT. § 71-3202 NEB. REV. STAT. §§ 87-801
Nevada NEV. REV. STAT. § 648.060 NEV. REV. STAT. § 603A.220
New Hampshire N.H. REV. STAT. § 106-F:5 N.H. REV. STAT. § 359-C:19
New Jersey N.J. STAT. § 45:19-10 N.J. STAT. § 56:8-163
New Mexico 16.48.1.10 NMAC N/A
New York N.Y. GEN. BUS. LAW § 70.2 N.Y. GEN. BUS. LAW § 899-aa
North Carolina N.C. GEN. STAT. § 74C-2 N.C. GEN. STAT. § 75-65
North Dakota N.D. ADMIN. R. 93-02-01 N.D. CENT. CODE §§ 51-30-01 et seq
Ohio OHIO REV. CODE § 4749.13 OHIO REV. CODE § 1349.19
Oklahoma 59 OKLA. STAT. § 1750.4 74 OKLA. STAT. § 3113.1
Oregon OR. REV. STAT. § 703.405 OR. REV. STAT. §§ 646A.600, 646A.602, 646A.604, 646A.624, and 646A.626
Pennsylvania 22 PA. STAT. § 13 73 PA. STAT. §§ 2301–2308, 2329
Rhode Island R.I. GEN. LAWS § 5-5-21 R.I. GEN. LAWS §§ 11-49.2-1–11-49.2-7
South Carolina S.C. CODE § 40-18-70 S.C. CODE § 39-1-90
South Dakota N/A N/A
Tennessee 62 TENN. CODE § 1175-04-.06 (2) TENN. CODE § 47-18-2107
Texas TEX. OCC. CODE §1702.101 TEX. BUS. & COM. CODE § 521.053
Utah UTAH CODE §§ 53-9-107 2 (a) (i) and (ii) UTAH CODE §§ 13-44-101, 13-44-201, 13-44-202, and 13-44-301
Vermont 26 V.S.A. § 3179 9 V.S.A. § 2430 and 9 V.S.A. § 2435
Virginia VA CODE § 9.1-139 C VA CODE § 18.2-186.6
Washington WASH. REV. CODE § 18.165.150 WASH. REV. CODE § 19.255.010
West Virginia W. VA. CODE § 30-18-8 W. VA. CODE § 46A-2A-101–105
Wisconsin WIS. RL § 31.01 (2) WIS. STAT. § 134.98
Wyoming Regulated by local jurisdictions WYO. STAT. §§ 40-12-501 and 40-12-502

image International Resources

Cross-Border Investigations

Treaties in Force: A List of Treaties and Other International Agreements of the United States in Force

http://www.state.gov/documents/organization/89668.pdf

Preparation of Letters Rogatory

http://travel.state.gov/law/judicial/judicial_683.html

Organization of American States

Inter-American Cooperation Portal on Cyber-Crime

http://www.oas.org/juridico/english/cyber.htm

Council of Europe Convention of Cybercrime

http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM=1&CL=ENG (and more generally) http://www.coe.int/t/dc/files/themes/cybercrime/default_EN.asp?

European Commission 2010 Directive On Attacks Against Information Systems

http://ec.europa.eu/home-affairs/policies/crime/1_EN_ACT_part1_v101.pdf

European Network of Forensic Science Institutes

(Memorandum signed for International Cooperation in Forensic Science)

http://www.enfsi.eu/page.php?uid=1&nom=153

G8 High-Tech Crime Subgroup

(Data Preservation Checklists)

http://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/Documents/Points%20of%20Contact/24%208%20DataPreservationChecklists_en.pdf

Interpol

Information Technology Crime—Regional Working Parties

http://www.interpol.int/public/TechnologyCrime/Default.asp

Asia-Pacific Economic Cooperation

Electronic Commerce Steering Group

http://www.apec.org/Groups/Committee-on-Trade-and-Investment/Electronic-Commerce-Steering-Group.aspx

Organization for Economic Cooperation & Development

Working Party on Information Security & Privacy

(APEC-OECD Workshop on Malware—Summary Record—April 2007)

http://www.oecd.org/dataoecd/37/60/38738890.pdf

The Organisation for Economic Co-operation and Development (OECD) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data

http://www.oecd.org/document/18/0,3746,en_2649_34255_1815186_1_1_1_1,00.html

The International Cyber Security Protection Alliance (ICSPA) Cyber-Security News Feed

https://www.icspa.org/nc/media/cyber-security-news-feed/

Maurushat, A. (2010). Australia’s Accession to the Cybercrime Convention: Is the Convention Still Relevant in Combating Cybercrime in the Era of Botnets and Obfuscation Crime Tools?, University of New South Wales Law Journal, Vol. 33(2), pp. 431–473.

Available at http://www.austlii.edu.au/au/journals/UNSWLRS/2011/20.txt/cgi-bin/download.cgi/download/au/journals/UNSWLRS/2011/20.rtf.

image The Federal Rules: Evidence for Digital Investigators

Relevance

All relevant evidence is admissible.

“Relevant evidence” means evidence having any tendency to make the existence of any fact that is of consequence to the determination of the action more probable or less probable than it would be without the evidence.

Although relevant, evidence may be excluded if its probative value is substantially outweighed by the danger of unfair prejudice, confusion of the issues, misleading the jury, or by considerations of undue delay, waste of time, or needless presentation of cumulative evidence.

Authentication

The requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.

Best Evidence

A duplicate is admissible to the same extent as an original unless (1) a genuine question is raised as to the authenticity of the original or (2) in the circumstances it would be unfair to admit the duplicate in lieu of the original.

Expert Testimony

If scientific, technical, or other specialized knowledge will assist the trier of fact to understand the evidence or to determine a fact in issue, a witness qualified as an expert by knowledge, skill, experience, training, or education may testify thereto in the form of an opinion or otherwise, if (1) the testimony is based upon sufficient facts or data, (2) the testimony is the product of reliable principles and methods, and (3) the witness has applied the principles and methods reliably to the facts of the case.

The expert may testify in terms of opinion or inference and give reasons therefore without first testifying to the underlying facts or data, unless the court requires otherwise. The expert may in any event be required to disclose the underlying facts or data on cross-examination.

Limitations on Waiver of the Attorney—Client Privilege

Disclosure of attorney—client privilege or work product does not operate as a waiver in a Federal or State proceeding if the:

1. Disclosure is inadvertent;

2. Holder of the privilege or protection took reasonable steps to prevent disclosure; and

3. Holder promptly took reasonable steps to rectify the error.

1 See, e.g., California’s “Private Investigator Act,” codified at Cal. Bus. & Prof. Code § 7521 et seq.

2 See, e.g., Arizona Revised Statutes 32-2401-16. See also Cal. Bus. & Prof. Code 7521(e); Nev.Rev. Stat. Ann. § 648.012.

3 See, e.g., Michigan’s “Private Detective License Act,” MCLS 338.24(a) (specifically excluding a “person employed exclusively and regularly by an employer in connection with the affairs of the employer only and there exists a bona fide employer–employee relationship for which the employee is reimbursed on a salary basis”); Cal. Bus. & Prof. Code § 7522 (same).

4 See Louisiana’s “Private Investigators Law,” LA.R.S. 37:3503(8)(a)(iv). See also Kennard v. Rosenberg, 127 Cal.App.3d 340, 345-46 (1954) (interpreting California’s Private Investigator Act) (“it was the intent of the Legislature to require those who engage in business as private investigators and detectives to first procure a license so to do; that the statute was enacted to regulate and control this business in the public interest; that it was not intended to apply to persons who, as experts, were employed as here, to make tests, conduct experiments and act as consultants in a case requiring the use of technical knowledge”).

5 Ohio Revised Code § 4749.01(H)(2).

6 See Delaware’s “Private Investigators and Private Security Agencies Act,” codified at 24 Del. Code §§ 1301 et seq.

7 See American Bar Association, Section of Science & Technology Law, Resolution 301 (August 11–12, 2008), available at www.americanbar.org/content/dam/aba/migrated/scitech/301.doc (“RESOLVED, That the American Bar Association urges State, local and territorial legislatures, State regulatory agencies, and other relevant government agencies or entities, to refrain from requiring private investigator licenses for persons engaged in: computer or digital forensic services or in the acquisition, review, or analysis of digital or computer-based information, whether for purposes of obtaining or furnishing information for evidentiary or other purposes, or for providing expert testimony before a court; or network or system vulnerability testing, including network scans and risk assessment and analysis of computers connected to a network”).

8 See, e.g., TBG Insurance Services Corp. v. Superior Court, Cal.App.4th 443 (2002) (employee’s explicit consent to written corporate monitoring policy governing company home computer used for personal purposes defeated reasonable expectation of privacy claim).

9 See. e.g.. 18 U.S.C. § 2703.

10 See, e.g., United States v. Carey, 172 F.3d 1268 (10th Cir. 1999) (law enforcement may not expand the scope of a computer search beyond its original justification by opening files believed would constitute evidence beyond the scope of the warrant).

11 See Electronic Communications Privacy Act (“ECPA”), codified at 18 U.S.C. §§ 2701 et seq.

12 See 18 U.S.C. § 2701.

13 See 18 U.S.C. § 2702(c).

14 See 18 U.S.C. § 2702(b).

15 See 18 U.S.C. § 2511; in re Pharmatrak, Inc. Privacy Litigation, 329 F.3d 9, 18 (1st Cir. 2003).

16 Interception involving the acquisition of information stored in computer memory has in at least one jurisdiction been found to violate the Wiretap Act. See United States v. Councilman, 418 F.3d 67 (1st Cir. 2005) (en banc).

17 See 2511(2)(a)(i).

18 Note that some state surveillance statutes, like California’s, require two-party consent.

19 18 U.S.C. § 2511(2)(d); United States v. Amen, 831 F.2d 373, 378 (2d Cir. 1987) (consent may be explicit or implied); United States v. Workman, 80 F.3d 688, 693 (2d Cir. 1996) (proof that the consenting party received actual notice of monitoring but used the monitored system anyway established implied consent).

20 Appendix C, “Best Practices for Victim Response and Reporting,” to “Prosecuting Computer Crimes,” U.S. Department of Justice Computer Crime & Intellectual Property Section (February 2007), available at http://www.cybercrime.gov/ccmanual/appxc.html.

21 18 U.S.C. § 2511(2)(i).

22 18 U.S.C. §§ 3121–3127.

23 Public Law 106-12, 15 U.S.C. § 6801 et seq., hereinafter sometimes referred to as “GLB” or “the Act.” The names in the popular GLB title of this statute refer to three members of Congress who were its instrumental sponsors, Senator Phil Gramm (R-TX), Chairman of the Senate Banking Committee; Representative Jim Leach (R-IA), Chairman of the House Banking Committee; and Representative Thomas Bliley (R-VA), Chairman of the House Commerce Committee.

24 16 CFR § 313(k)(1). For a list of common examples, see 16 CFR § 313(k)(2) of the Act, available at http://edocket.access.gpo.gov/cfr_2003/16cfr313.3.htm.

25 In addition to GLB, the Fair Credit Reporting Act, the Internal Revenue Code, and a variety of state laws and regulations provide consumers with protection in the handling of their credit report and tax return information by financial service providers. Pay particular attention to the handling of this type of financial data. For a terrific summary of the consumer protection laws that apply to financial institutions, see http://www.dfi.wa.gov/cu/summary.htm.

26 42 USC §§ 1302, 1320d, 1395; 45 CFR §§ 160, 162, 154.

27 Retail pharmacies are another perhaps less obvious example of a “covered entity” required to comply with HIPAA requirements. Pharmacies regularly collect, handle, and store individually identifiable health information during the ordinary course of business.

28 Public Law 111–5 (February 2009), codified at 2 CFR § 176, available at http://www.gpo.gov/fdsys/pkg/PLAW-111publ5/content-detail.html.

29 An excellent summary of the detailed provisions of HIPAA is available at http://www.omh.state.ny.us/omhweb/hipaa/phi_protection.html. A thorough discussion of the ARRA extensions of HIPAA is available at http://www.cerner.com/uploadedFiles/Assessment_of_OCR_Proposed_HIPAA_Security_and_Privacy_ARRA_HITECH_Updates.pdf.

30 17 CFR §§ 210, 228-29, 240, 249, 270.

31 16 CFR § 312.

32 18 U.S.C. §§ 5031 to 5042.

33 See 18 U.S.C. § 5038 (provisions concerning sealing and safeguarding of records generated and maintained in juvenile proceedings).

34 20 U.S.C. § 1232g.

35 A helpful chart updated as of July 1, 2009, that summarizes existing state breach notification laws is available at http://www.digestiblelaw.com/files/upload/securitybreach.pdf.

36 The complete text of the Convention is available at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.

37 For a complete list of the party and signatory countries to the Convention, see the map available at http://www.coe.int/t/dc/files/themes/cybercrime/worldmap_en.pdf.

38 The complete text of the Convention Commentary is available at http://conventions.coe.int/Treaty/en/Reports/Html/185.htm.

39 The prospective version of the Police and Justice Act of 2006 is available at http://www.statutelaw.gov.uk/content.aspx?LegType=All+Legislation&title=Police+and+Justice+Act+2006&searchEnacted=0&extentMatchOnly=0&confersPower=0&blanketAmendment=0&sortAlpha=0&TYPE=QS&PageNumber=1&NavFrom=0&parentActiveTextDocId=2954345&ActiveTextDocId=2954404&filesize=24073.

40 That guidance is available at http://www.cps.gov.uk/legal/a_to_c/computer_misuse_act_1990/index.html.

41 The relevant provisions of the German Code can be found (in German) at http://www.bmj.bund.de/files/-/1317/RegE%20Computerkriminalit%C3%A4t.pdf.

42 See 18 U.S.C. §§ 1030(a)(6), (c)(2)(A).

43 See http://www.justice.gov/criminal/cybercrime/COEFAQs.htm#topicE.

44 Directive 95/46EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, available at http://europa.eu/legislation_summaries/information_society/data_protection/l14012_en.htm.

45 The following 27 countries of the EU are required to implement legislation under the Directive: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, and the United Kingdom. In addition, a number of other countries have data protection statutes that regulate access to employees’ data and cross-border data transfers, with ramifications for the conduct of internal investigations by U.S.-based digital investigators. For example, Iceland, Liechtenstein, and Norway (together comprising the European Economic Area); Albania, Andorra, Bosnia and Herzegovina, Croatia, Macedonia, and Switzerland (European Union neighboring countries); and the Russian Federation have laws similar to the EU Data Protection Directive. See Wugmeister, M., Retzer, K., and Rich, C. (2007). Global Solution for Cross-Border Data Transfers: Making the Case for Corporate Privacy Rules, Geo. J. Intl L., 449, 455.

46 Boyd, V. (2006). Financial Privacy in the United States and the European Union: A Path to Transatlantic Regulatory Harmonization, Berkeley J. Intl L., 939, 958–959.

47 Directive, Art. 26(1) (a) (transfer “may take place on condition that: (a) the data subject has given his consent unambiguously to the proposed transfer”).

48 The Safe Harbor framework is comprised of a collection of documents negotiated between the U.S. Department of Commerce and the EU, including 7 privacy principles http://export.gov/safeharbor/eu/eg_main_018475.asp and 15 FAQs http://export.gov/safeharbor/eu/eg_main_018493.asp.

49 See http://www.export.gov/static/SH_EU_Decision.pdf.

50 Over 1300 U.S. companies from over 100 industry sectors have registered and been certified under the Safe Harbor framework. See http://web.ita.doc.gov/safeharbor/SHList.nsf/WebPages/Search+by+Industry+ Sector.

51 See, e.g., Law No. 80-538 of July 16, 1980, Journal Officiel de la Republique Francaise. The United Kingdom, Canada, Australia, Sweden, the Netherlands, and Japan have less restrictive blocking statutes as well.

52 For a list of bilateral mutual legal assistance treaties in force, see http://travel.state.gov/law/info/judicial/judicial_690.html.

53 The U.S. State Department offers guidance on the procedural requirements for a letter rogatory at http://travel.state.gov/law/judicial/judicial_683.html.

54 Magee, B. (2008). Firms Fear Stigma of Reporting Cybercrime. business.scotsman.com (April 13, 2008), available at http://business.scotsman.com/ebusiness/Firms-fear-stigma-of-reporting.3976469.jp.

55 The “2007 Internet Crime Complaint Report,” available at www.ic3.gov/media/annualreports.aspx, suggests a $40 million year-end increase in reported losses from the 206,884 complaints of crimes perpetrated over the Internet reported to the FBI’s Internet Crime Complaint Center during 2007.

56 See United States Attorney’s Office for the Central District of California, Press Release No. 08-013, February 11, 2008, “Young ‘Botherder’ Pleads Guilty to Infecting Military Computers and Fraudulently Installing Adware,” available at http://www.usdoj.gov/usao/cac/pressroom/pr2008/013.html. For added color, see Goodin, D. (2008). “I Was A Teenage Bot Master: The Confessions of SoBe Owns,” The Register (May 8, 2008), available at http://www.theregister.co.uk/2008/05/08/downfall_of_botnet_master_sobe_owns/.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset