SlideShare una empresa de Scribd logo
1 de 65
FRAUD 2.0
Helping Businesses Prepare for
Computer Fraud and
Data Breaches
The Association ofAccountants and Financial
Professionals in Business
May 16, 2013
2
#fraud20
www.brittontuma.com
3
have you ever
heard of …
www.brittontuma.com #fraud20
4
Aaron Swartz?
www.brittontuma.com #fraud20
5
SandraTeague?
www.brittontuma.com #fraud20
6
Bradley Manning?
www.brittontuma.com #fraud20
7
Hacking?
www.brittontuma.com #fraud20
8
Data Breach?
www.brittontuma.com #fraud20
9
IdentityTheft?
www.brittontuma.com #fraud20
10
Stuxnet?
www.brittontuma.com #fraud20
11
Active Defense?
www.brittontuma.com #fraud20
12
NON COMPUTER
RELATED FRAUD?
www.brittontuma.com #fraud20
13
As of September 2012, cybercrime
• costs $110 billion annually
• 18 adults every second are victims
• 556,000,000 adults every year are victims
• 46% of online adults are victims
• mobile devices are trending
2012 Norton Cybercrime Report
www.brittontuma.com
14
What is fraud?
• Fraud is, in its simplest form, deception
• Black’s Law Dictionary
• all multifarious means which human ingenuity
can devise, and which are resorted to by one
individual to get advantage over another by
false suggestions or suppression of the truth
www.brittontuma.com #fraud20
15
Traditional vehicles for fraud?
• verbal communication
• written communication
• in person
• through mail
• via wire
www.brittontuma.com #fraud20
16
What do computers do?
EFFICIENCY!
www.brittontuma.com #fraud20
17
FRAUD 2.0
www.brittontuma.com #fraud20
18
Computer Fraud = Fraud 2.0
• Deception, through the use of a computer
• “old crimes committed in new ways … using computers
and the Internet to make the task[s] easier”
• computer hacking, data theft, theft of money, breaches
of data security, corporate espionage, privacy
breaches, computer worms,Trojan
horses, viruses, malware, denial of service attacks
• mouse and keyboard = modern fraudster tools of choice
www.brittontuma.com #fraud20
19
Who knows the percentage of
businesses that suffered at least one act
of computer fraud in last year?
90%
(Ponemon Institute Study)
www.brittontuma.com #fraud20
20
BRIEF HISTORY OF
THE COMPUTER FRAUD
AND ABUSE ACT
(CFAA)
#fraud20
21
Computer Fraud and Abuse Act
Federal Law – 18 U.S.C § 1030
www.brittontuma.com #fraud20
22www.brittontuma.com #fraud20
23www.brittontuma.com #fraud20
24
 Primary Law for Misuse of Computers
 Computers …
Why is the Computer Fraud
and Abuse Act important?
www.brittontuma.com #fraud20
25www.brittontuma.com
“Everything has a
computer in it nowadays.”
-Steve Jobs
#fraud20
26
WHAT IS A COMPUTER?
#fraud20
27www.brittontuma.com
has a processor or stores data
“the term ‘computer’ means an
electronic, magnetic, optical, electrochemical, or other high
speed data processing device performing logical, arithmetic, or
storage functions, and includes any data storage facility or
communications facility directly related to or operating in
conjunction with such device, but …”
IMPORTANT! “such term does not include an automated
typewriter or typesetter, a portable hand held calculator, or other
similar device;”
The CFAA says
#fraud20
28www.brittontuma.com
What about . . .
#fraud20
29www.brittontuma.com
“’That category can include coffeemakers, microwave
ovens, watches, telephones, children’s toys, MP3
players, refrigerators, heating and air-conditioning
units, radios, alarm clocks, televisions, and DVD
players, . . . .”
-UnitedStates v. Kramer
The Fourth Circuit says
#fraud20
30www.brittontuma.com
This may limit the problem of applying it to alarm
clocks, toasters, and coffee makers – for now?
The CFAA applies only to “protected” computers
Protected = connected to the Internet
Any situations where these devices are connected?
#fraud20
31www.brittontuma.com
seriously . . .
#fraud20
32www.brittontuma.com
• TI-99
• 3.3 MHz Processor
• 16 KB of RAM
• Leap Frog Leapster
• 96 MHz Processor
• 128 MB of RAM
• iPhone 5
• 1.02GHz Processer
• 1 GB of RAM
#fraud20
33www.brittontuma.com
66 MHz =
fastest
desktop in 80s
96 MHz = child’s
toy today
250 MHz =
fastest super
computer in 80s
1.02 GHz =
telephone today
#fraud20
34
WHAT DOES THE CFAA
PROHIBIT?
#fraud20
35
CFAA prohibits the access of a protected
computer that is
 Without authorization, or
 Exceeds authorized access
www.brittontuma.com #fraud20
36
Where the person accessing
 Obtains information
 Commits a fraud
 Obtains something of value
 Transmits damaging information
 Causes damage
 Traffics in passwords
 Commits extortion
www.brittontuma.com #fraud20
37
 Overly simplistic list
 Very complex statute
 Appears deceptively straightforward
 Many pitfalls
www.brittontuma.com
“I am the wisest man
alive, for I know one
thing, and that is that I know
nothing.”
-Socrates
#fraud20
38
Two Most Problematic Issues
 “Loss” Requirement
• Confuses lawyers and judges alike
 Unauthorized / Exceeding Authorized Access
• Evolving jurisprudence
• Interpreted by many Circuits
• New conflict on April 10, 2012
www.brittontuma.com #fraud20
39
Limited civil remedy
 Procedurally complex with many cross-
references
 “damage” ≠ “damages”
 Must have $5,000 “loss” (i.e., cost)
 Loss requirement is jurisdictional threshold
www.brittontuma.com #fraud20
40
What is a “loss”?
“any reasonable cost to any victim, including the cost of
responding to an offense, conducting a damage assessment, and
restoring the data, program, system, or information to its
condition prior to the offense, and any revenue lost, cost
incurred, or other consequential damages incurred because of
interruption of service.”
Loss = cost (unless interruption of service)
www.brittontuma.com #fraud20
41
Remedies
 Available
• Economic damages
• Loss damage
• Injunctive relief
 Not Available
• Exemplary damages
• Attorneys’ fees
www.brittontuma.com #fraud20
42
Elements of broadest CFAA Claim
1. Intentionally access computer;
2. Without authorization or exceeding authorized
access;
3. Obtained information from any protected
computer; and
4. Victim incurred a loss to one or more persons
during any 1-year period of at least $5,000.
www.brittontuma.com #fraud20
43
Elements of CFAA Fraud Claim
1. Knowingly and with intent to defraud;
2. Accesses a protected computer;
3. Without authorization or exceeding authorized
access;
4. By doing so, furthers the intended fraud and
obtains anything of value; and
5. Victim incurred a loss to one or more persons
during any 1-year period of at least $5,000.
www.brittontuma.com #fraud20
44
WRONGFUL ACCESS
#fraud20
45
General Access Principles
 Access by informational / data use
 ≠ technician
 Must be knowing or intentional access
 ≠ accidental access
www.brittontuma.com #fraud20
“without authorization”
 Outsiders
 No rights
 Not defined
 Only requires intent to
access, not harm
 Hacker!
“exceeds authorized”
 Insiders
 Some rights
 CFAA defines: access in
a way not entitled
 Necessarily requires
limits of authorization
 Employees, web
users, etc.
46www.brittontuma.com
TwoTypes of Wrongful Access
#fraud20
47
When does authorization terminate?
Trilogy of AccessTheories
• AgencyTheory
• Intended-Use Theory
• Strict AccessTheory
www.brittontuma.com #fraud20
48
Ways to establish limits for Intended-Use
 Contractual
• Policies: computer use, employment & manuals
• WebsiteTerms of Service
 Technological
• Login and access restrictions
• System warnings
 Training and other evidence of notification
 Notices of intent to use CFAA
www.brittontuma.com #fraud20
49
Employment Situations
Most common scenario is employment
• Employee access and take customer account information
• Employee accesses and takes or emails confidential information
to competitor
• Employee improperly deletes data and email
• Employee deletes browser history 
• Employee accessing their Facebook, Gmail,Chase accounts at
work 
www.brittontuma.com #fraud20
50
Family Law Situations
Have you ever logged into your significant other’s email or Facebook
to see what they’re saying to others?
DON’TANSWERTHAT!
• Estranged spouse inArkansas did after separation
• NTTA account?
• Bank account?
• Cancelling services via online accounts?
www.brittontuma.com #fraud20
51
SharingWebsite Logins
Have you ever borrowed or shared website login credentials and
passwords for limited access sites (i.e., online accounts)?
DON’TANSWERTHAT!
• Recent case held that permitting others to use login credentials
for paid website was viable CFAA claim
• The key factor here was the conduct was prohibited by the
website’s agreed toTerms of Service
www.brittontuma.com #fraud20
52
Misuse ofWebsites
Ever created a fake profile or used a website for
something other than its intended purpose?
DON’T ANSWERTHAT!
• Myspace Mom case – United States v. Drew
• Fake login to disrupt legitimate website sales
• Accessing website to gain competitive information when
prohibited byTOS
• Creating fake Facebook to research opposing parties
www.brittontuma.com #fraud20
53www.brittontuma.com
Have you ever heard of?
• Aaron Swartz – information liberator!
• SandraTeague – Obama’s academic records
• Bradley Manning –released classified info
• Stuxnet – variations for corporate espionage
• Active Defense – fun stuff – call me!
#fraud20
54
DATA BREACH
WHAT DO YOU DO?
#fraud20
55
Data Breach
• product of computer fraud
• on the rise
• major risk to virtually all businesses
• PII, PHI, financial data, cardholder data
• disruption and data loss
• claims from data subjects
• fines and penalties from govts, agencies, indust. groups
• impossible to prevent
• plan ahead to reduce harm
www.brittontuma.com #fraud20
56
4 Phases of Data Breach
• Preparation
• Prevention
• Understanding
• Laws, Rules & Regulations
• Responding
www.brittontuma.com #fraud20
57
Preparation
• Breach Response Plan
• Goal  Execute!
• Who,What,When, How
• Attorney – privilege
• Adopted Notification Form
• EducateTeam
• IT Security Audit / PenetrationTesting
• Compliance Audit
• HIPAA, ERISA, OSHA, PCI, FINRA
• Cyber Insurance
www.brittontuma.com #fraud20
58
Prevention
• Software and Systems Updates
• RemediateVulnerabilities
• Encrypt, Encrypt, Encrypt
• Data Surveillence & IT Alerts
• Cyber CounterIntelligence / CounterEspionage
• ITAlerts
www.brittontuma.com #fraud20
59
Understanding Laws, Rules & Regulations
• No Federal Breach Notification Law (yet)
• 46 States’ Have Laws
• ≠Alabama, Kentucky, New Mexico, South Dakota
• Massachusetts is an oddball
• 45 days (FL, OH,VT,WI) otherwise expeditious without
unreasonable delay
• Consumers + State Attorney General
• Agencies (FTC, HHS, OCR, DOL, SEC)
• Industries (FINRA, PCI)
• International
www.brittontuma.com #fraud20
60
Responding to a Breach – Just Execute the Plan!
• ContactAttorney
• Assemble ResponseTeam
• Contact Forensics
• ContactVendor for Notification
• Investigate Breach
• Remediate ResponsibleVulnerabilities
• Reporting & Notification
• Law Enforcement First
• AGs,Admin. Agencies, Industries, Cred. Rpt, Consumers
www.brittontuma.com #fraud20
61
OTHER LAWS FOR
COMBATING FRAUD 2.0
#fraud20
62
Federal Laws for Combating Fraud 2.0
• Electronic Communications Privacy Act - 18 U.S.C. § 2510
• Wiretap Act ≠ intercept communications
• Stored CommunicationsAct ≠ comm. at rest
• Fraud with Access Devices - 18 U.S.C. § 1029
• devices to obtain passwords, phishing, counterfeit
devices, scanning receivers, drive through swipe cards
• IdentityTheft – 18 U.S.C. § 1028
www.brittontuma.com #fraud20
63
Texas Laws for Combating Fraud 2.0
• Breach of Computer Security Act (Tx. Penal Code § 33.02)
• knowingly access a computer without effective consent of owner
• Fraudulent Use or Possession of Identifying Info (TPC § 32.51
• Unlawful Interception, Use, or Disclosure ofWire, Oral or Electronic
Communications (TPC § 16.02)
• UnlawfulAccess to Stored Communications (TPC § 16.04)
• IdentityTheft Enforcement and ProtectionAct (BCC § 48.001)
• Consumer ProtectionAgainstComputer Spyware Act (BCC § 48.051)
• Anti-PhishingAct (BCC § 48.003)
www.brittontuma.com #fraud20
64
• Welcome to the world of Fraud 2.0!
• Why? Remember what Jobs said
• CFAA is very broad and covers all kinds of
computer fraud (sometimes) – evolving!
• Data Breaches – be prepared – it will happen!
• Many other Federal andTexas laws also available
for combating computer fraud
• Cyber Insurance
www.brittontuma.com #fraud20
65www.brittontuma.com

Más contenido relacionado

La actualidad más candente

How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]Queue-it
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...VogelDenise
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009scottsicle
 
Secrets to successful hoa websites
Secrets to successful hoa websitesSecrets to successful hoa websites
Secrets to successful hoa websitesrinaldo acri
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Nicole Fucile-Borsian
 
Office 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainOffice 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainEdge Pereira
 
Data Privacy as a Competitive Advantage
Data Privacy as a Competitive AdvantageData Privacy as a Competitive Advantage
Data Privacy as a Competitive Advantagecpeterc
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentationSreejith Nair
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 

La actualidad más candente (19)

How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Staying Secure Electronically
Staying Secure ElectronicallyStaying Secure Electronically
Staying Secure Electronically
 
How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]How bots impact major onsales [Webinar]
How bots impact major onsales [Webinar]
 
June NOW 2014
June NOW 2014June NOW 2014
June NOW 2014
 
Digital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic CrimeDigital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic Crime
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
 
How to protect yourself from identity theft
How to protect yourself from identity theftHow to protect yourself from identity theft
How to protect yourself from identity theft
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009
 
Secrets to successful hoa websites
Secrets to successful hoa websitesSecrets to successful hoa websites
Secrets to successful hoa websites
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021
 
Office 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainOffice 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool Again
 
Data Privacy as a Competitive Advantage
Data Privacy as a Competitive AdvantageData Privacy as a Competitive Advantage
Data Privacy as a Competitive Advantage
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Online Reputation Clean-up
Online Reputation Clean-upOnline Reputation Clean-up
Online Reputation Clean-up
 

Similar a 2013.05.16 cfaa powerpoint for ima.v1

Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Narayan Makaram
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
Cyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could HappenCyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could HappenRob Stevenson
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyIFLP
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charitiesBlake Morgan LLP
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentationmisecho
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachUlf Mattsson
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCigniti Technologies Ltd
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33Felipe Prado
 

Similar a 2013.05.16 cfaa powerpoint for ima.v1 (20)

Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could HappenCyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could Happen
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
Cyber - Dark Web, Deep Web and More
Cyber - Dark Web, Deep Web and MoreCyber - Dark Web, Deep Web and More
Cyber - Dark Web, Deep Web and More
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentation
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33
 

Más de Shawn Tuma

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital EngagementShawn Tuma
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Shawn Tuma
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Shawn Tuma
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene ChecklistShawn Tuma
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response ChecklistShawn Tuma
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemShawn Tuma
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Shawn Tuma
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500Shawn Tuma
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity UpdateShawn Tuma
 

Más de Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

2013.05.16 cfaa powerpoint for ima.v1

  • 1. FRAUD 2.0 Helping Businesses Prepare for Computer Fraud and Data Breaches The Association ofAccountants and Financial Professionals in Business May 16, 2013
  • 3. 3 have you ever heard of … www.brittontuma.com #fraud20
  • 13. 13 As of September 2012, cybercrime • costs $110 billion annually • 18 adults every second are victims • 556,000,000 adults every year are victims • 46% of online adults are victims • mobile devices are trending 2012 Norton Cybercrime Report www.brittontuma.com
  • 14. 14 What is fraud? • Fraud is, in its simplest form, deception • Black’s Law Dictionary • all multifarious means which human ingenuity can devise, and which are resorted to by one individual to get advantage over another by false suggestions or suppression of the truth www.brittontuma.com #fraud20
  • 15. 15 Traditional vehicles for fraud? • verbal communication • written communication • in person • through mail • via wire www.brittontuma.com #fraud20
  • 16. 16 What do computers do? EFFICIENCY! www.brittontuma.com #fraud20
  • 18. 18 Computer Fraud = Fraud 2.0 • Deception, through the use of a computer • “old crimes committed in new ways … using computers and the Internet to make the task[s] easier” • computer hacking, data theft, theft of money, breaches of data security, corporate espionage, privacy breaches, computer worms,Trojan horses, viruses, malware, denial of service attacks • mouse and keyboard = modern fraudster tools of choice www.brittontuma.com #fraud20
  • 19. 19 Who knows the percentage of businesses that suffered at least one act of computer fraud in last year? 90% (Ponemon Institute Study) www.brittontuma.com #fraud20
  • 20. 20 BRIEF HISTORY OF THE COMPUTER FRAUD AND ABUSE ACT (CFAA) #fraud20
  • 21. 21 Computer Fraud and Abuse Act Federal Law – 18 U.S.C § 1030 www.brittontuma.com #fraud20
  • 24. 24  Primary Law for Misuse of Computers  Computers … Why is the Computer Fraud and Abuse Act important? www.brittontuma.com #fraud20
  • 25. 25www.brittontuma.com “Everything has a computer in it nowadays.” -Steve Jobs #fraud20
  • 26. 26 WHAT IS A COMPUTER? #fraud20
  • 27. 27www.brittontuma.com has a processor or stores data “the term ‘computer’ means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but …” IMPORTANT! “such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device;” The CFAA says #fraud20
  • 29. 29www.brittontuma.com “’That category can include coffeemakers, microwave ovens, watches, telephones, children’s toys, MP3 players, refrigerators, heating and air-conditioning units, radios, alarm clocks, televisions, and DVD players, . . . .” -UnitedStates v. Kramer The Fourth Circuit says #fraud20
  • 30. 30www.brittontuma.com This may limit the problem of applying it to alarm clocks, toasters, and coffee makers – for now? The CFAA applies only to “protected” computers Protected = connected to the Internet Any situations where these devices are connected? #fraud20
  • 32. 32www.brittontuma.com • TI-99 • 3.3 MHz Processor • 16 KB of RAM • Leap Frog Leapster • 96 MHz Processor • 128 MB of RAM • iPhone 5 • 1.02GHz Processer • 1 GB of RAM #fraud20
  • 33. 33www.brittontuma.com 66 MHz = fastest desktop in 80s 96 MHz = child’s toy today 250 MHz = fastest super computer in 80s 1.02 GHz = telephone today #fraud20
  • 34. 34 WHAT DOES THE CFAA PROHIBIT? #fraud20
  • 35. 35 CFAA prohibits the access of a protected computer that is  Without authorization, or  Exceeds authorized access www.brittontuma.com #fraud20
  • 36. 36 Where the person accessing  Obtains information  Commits a fraud  Obtains something of value  Transmits damaging information  Causes damage  Traffics in passwords  Commits extortion www.brittontuma.com #fraud20
  • 37. 37  Overly simplistic list  Very complex statute  Appears deceptively straightforward  Many pitfalls www.brittontuma.com “I am the wisest man alive, for I know one thing, and that is that I know nothing.” -Socrates #fraud20
  • 38. 38 Two Most Problematic Issues  “Loss” Requirement • Confuses lawyers and judges alike  Unauthorized / Exceeding Authorized Access • Evolving jurisprudence • Interpreted by many Circuits • New conflict on April 10, 2012 www.brittontuma.com #fraud20
  • 39. 39 Limited civil remedy  Procedurally complex with many cross- references  “damage” ≠ “damages”  Must have $5,000 “loss” (i.e., cost)  Loss requirement is jurisdictional threshold www.brittontuma.com #fraud20
  • 40. 40 What is a “loss”? “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.” Loss = cost (unless interruption of service) www.brittontuma.com #fraud20
  • 41. 41 Remedies  Available • Economic damages • Loss damage • Injunctive relief  Not Available • Exemplary damages • Attorneys’ fees www.brittontuma.com #fraud20
  • 42. 42 Elements of broadest CFAA Claim 1. Intentionally access computer; 2. Without authorization or exceeding authorized access; 3. Obtained information from any protected computer; and 4. Victim incurred a loss to one or more persons during any 1-year period of at least $5,000. www.brittontuma.com #fraud20
  • 43. 43 Elements of CFAA Fraud Claim 1. Knowingly and with intent to defraud; 2. Accesses a protected computer; 3. Without authorization or exceeding authorized access; 4. By doing so, furthers the intended fraud and obtains anything of value; and 5. Victim incurred a loss to one or more persons during any 1-year period of at least $5,000. www.brittontuma.com #fraud20
  • 45. 45 General Access Principles  Access by informational / data use  ≠ technician  Must be knowing or intentional access  ≠ accidental access www.brittontuma.com #fraud20
  • 46. “without authorization”  Outsiders  No rights  Not defined  Only requires intent to access, not harm  Hacker! “exceeds authorized”  Insiders  Some rights  CFAA defines: access in a way not entitled  Necessarily requires limits of authorization  Employees, web users, etc. 46www.brittontuma.com TwoTypes of Wrongful Access #fraud20
  • 47. 47 When does authorization terminate? Trilogy of AccessTheories • AgencyTheory • Intended-Use Theory • Strict AccessTheory www.brittontuma.com #fraud20
  • 48. 48 Ways to establish limits for Intended-Use  Contractual • Policies: computer use, employment & manuals • WebsiteTerms of Service  Technological • Login and access restrictions • System warnings  Training and other evidence of notification  Notices of intent to use CFAA www.brittontuma.com #fraud20
  • 49. 49 Employment Situations Most common scenario is employment • Employee access and take customer account information • Employee accesses and takes or emails confidential information to competitor • Employee improperly deletes data and email • Employee deletes browser history  • Employee accessing their Facebook, Gmail,Chase accounts at work  www.brittontuma.com #fraud20
  • 50. 50 Family Law Situations Have you ever logged into your significant other’s email or Facebook to see what they’re saying to others? DON’TANSWERTHAT! • Estranged spouse inArkansas did after separation • NTTA account? • Bank account? • Cancelling services via online accounts? www.brittontuma.com #fraud20
  • 51. 51 SharingWebsite Logins Have you ever borrowed or shared website login credentials and passwords for limited access sites (i.e., online accounts)? DON’TANSWERTHAT! • Recent case held that permitting others to use login credentials for paid website was viable CFAA claim • The key factor here was the conduct was prohibited by the website’s agreed toTerms of Service www.brittontuma.com #fraud20
  • 52. 52 Misuse ofWebsites Ever created a fake profile or used a website for something other than its intended purpose? DON’T ANSWERTHAT! • Myspace Mom case – United States v. Drew • Fake login to disrupt legitimate website sales • Accessing website to gain competitive information when prohibited byTOS • Creating fake Facebook to research opposing parties www.brittontuma.com #fraud20
  • 53. 53www.brittontuma.com Have you ever heard of? • Aaron Swartz – information liberator! • SandraTeague – Obama’s academic records • Bradley Manning –released classified info • Stuxnet – variations for corporate espionage • Active Defense – fun stuff – call me! #fraud20
  • 54. 54 DATA BREACH WHAT DO YOU DO? #fraud20
  • 55. 55 Data Breach • product of computer fraud • on the rise • major risk to virtually all businesses • PII, PHI, financial data, cardholder data • disruption and data loss • claims from data subjects • fines and penalties from govts, agencies, indust. groups • impossible to prevent • plan ahead to reduce harm www.brittontuma.com #fraud20
  • 56. 56 4 Phases of Data Breach • Preparation • Prevention • Understanding • Laws, Rules & Regulations • Responding www.brittontuma.com #fraud20
  • 57. 57 Preparation • Breach Response Plan • Goal  Execute! • Who,What,When, How • Attorney – privilege • Adopted Notification Form • EducateTeam • IT Security Audit / PenetrationTesting • Compliance Audit • HIPAA, ERISA, OSHA, PCI, FINRA • Cyber Insurance www.brittontuma.com #fraud20
  • 58. 58 Prevention • Software and Systems Updates • RemediateVulnerabilities • Encrypt, Encrypt, Encrypt • Data Surveillence & IT Alerts • Cyber CounterIntelligence / CounterEspionage • ITAlerts www.brittontuma.com #fraud20
  • 59. 59 Understanding Laws, Rules & Regulations • No Federal Breach Notification Law (yet) • 46 States’ Have Laws • ≠Alabama, Kentucky, New Mexico, South Dakota • Massachusetts is an oddball • 45 days (FL, OH,VT,WI) otherwise expeditious without unreasonable delay • Consumers + State Attorney General • Agencies (FTC, HHS, OCR, DOL, SEC) • Industries (FINRA, PCI) • International www.brittontuma.com #fraud20
  • 60. 60 Responding to a Breach – Just Execute the Plan! • ContactAttorney • Assemble ResponseTeam • Contact Forensics • ContactVendor for Notification • Investigate Breach • Remediate ResponsibleVulnerabilities • Reporting & Notification • Law Enforcement First • AGs,Admin. Agencies, Industries, Cred. Rpt, Consumers www.brittontuma.com #fraud20
  • 61. 61 OTHER LAWS FOR COMBATING FRAUD 2.0 #fraud20
  • 62. 62 Federal Laws for Combating Fraud 2.0 • Electronic Communications Privacy Act - 18 U.S.C. § 2510 • Wiretap Act ≠ intercept communications • Stored CommunicationsAct ≠ comm. at rest • Fraud with Access Devices - 18 U.S.C. § 1029 • devices to obtain passwords, phishing, counterfeit devices, scanning receivers, drive through swipe cards • IdentityTheft – 18 U.S.C. § 1028 www.brittontuma.com #fraud20
  • 63. 63 Texas Laws for Combating Fraud 2.0 • Breach of Computer Security Act (Tx. Penal Code § 33.02) • knowingly access a computer without effective consent of owner • Fraudulent Use or Possession of Identifying Info (TPC § 32.51 • Unlawful Interception, Use, or Disclosure ofWire, Oral or Electronic Communications (TPC § 16.02) • UnlawfulAccess to Stored Communications (TPC § 16.04) • IdentityTheft Enforcement and ProtectionAct (BCC § 48.001) • Consumer ProtectionAgainstComputer Spyware Act (BCC § 48.051) • Anti-PhishingAct (BCC § 48.003) www.brittontuma.com #fraud20
  • 64. 64 • Welcome to the world of Fraud 2.0! • Why? Remember what Jobs said • CFAA is very broad and covers all kinds of computer fraud (sometimes) – evolving! • Data Breaches – be prepared – it will happen! • Many other Federal andTexas laws also available for combating computer fraud • Cyber Insurance www.brittontuma.com #fraud20