SlideShare una empresa de Scribd logo
1 de 58
FRAUD 2.0
An Overview of the Laws that Help
Businesses and Individuals Combat
        Computer Fraud

        Association of Certified
           Fraud Examiners
          November 8, 2012
THINK ABOUT THIS …



www.brittontuma.com              2
[SEE FOLLOING VIDEO]
                      https://vimeo.com/2030361




www.brittontuma.com                               3
WHAT DOES THAT MEAN
             TO YOU?


www.brittontuma.com          4
STUXNET?

www.brittontuma.com              5
NON COMPUTER
                RELATED FRAUD?



www.brittontuma.com              6
As of September 2012, cybercrime
      • costs $110 billion annually
      • 18 adults every second are victims
      • 556,000,000 adults every year are victims
      • 46% of online adults are victims
      • mobile devices are trending
                             2012 Norton Cybercrime Report
www.brittontuma.com                                          7
What is fraud?
      • Fraud is, in its simplest form, deception
      • Black’s Law Dictionary
          • all multifarious means which human ingenuity
            can devise, and which are resorted to by one
            individual to get advantage over another by
            false suggestions or suppression of the truth

www.brittontuma.com                                         8
Traditional vehicles for fraud?
      • verbal communication
      • written communication
      • in person
      • through mail
      • over wire

www.brittontuma.com                     9
What do computers do?

           EFFICIENCY!
www.brittontuma.com           10
FRAUD 2.0

www.brittontuma.com         11
Computer Fraud = Fraud 2.0
      •   Deception, through the use of a computer
      •   “old crimes committed in new ways … using computers
          and the Internet to make the task[s] easier”
      •   computer hacking, data theft, theft of money, breaches
          of data security, privacy breaches, computer worms,
          Trojan horses, viruses, malware, denial of service attacks
      •   mouse and keyboard = modern fraudster tools of choice

www.brittontuma.com                                                    12
Who knows the percentage of
       businesses that suffered at least one act
           of computer fraud in last year?


                           90%
                      (Ponemon Institute Study)


www.brittontuma.com                                13
Computer Fraud and Abuse Act
                  Federal Law – 18 U.S.C § 1030




www.brittontuma.com                               14
BRIEF HISTORY OF
    THE CFAA



                   15
www.brittontuma.com   16
www.brittontuma.com   17
Why is the Computer Fraud
                      and Abuse Act important?


       Primary Law for Misuse of Computers
       Computers …



www.brittontuma.com                               18
“Everything has a
          computer in it nowadays.”
                            -Steve Jobs




www.brittontuma.com                       19
WHAT IS A COMPUTER?




                      20
The CFAA says
          has a processor or stores data

              “the term ‘computer’ means an electronic, magnetic, optical,
              electrochemical, or other high speed data processing device
              performing logical, arithmetic, or storage functions, and
              includes any data storage facility or communications facility
              directly related to or operating in conjunction with such device,
              but …”

          IMPORTANT! “such term does not include an automated
          typewriter or typesetter, a portable hand held calculator, or other
          similar device;”

www.brittontuma.com                                                               21
What about




www.brittontuma.com   22
The Fourth Circuit says
         “’Just think of the common household items that
         include microchips and electronic storage devices, and
         thus will satisfy the statutory definition of “computer.”’

         “’That category can include coffeemakers, microwave
         ovens, watches, telephones, children’s toys, MP3
         players, refrigerators, heating and air-conditioning
         units, radios, alarm clocks, televisions, and DVD
         players, . . . .”
                                          -United States v. Kramer

www.brittontuma.com                                                   23
The CFAA applies only to “protected” computers

         This may limit the problem of applying it to alarm
         clocks, toasters, and coffee makers

         Protected = connected to the Internet

        Any situations where these devices are connected?



www.brittontuma.com                                           24
• TI-99               • Leap Frog Leapster   • iPhone 5
    • 3.3 MHz Processor   • 96 MHz Processor     • 1.02 GHz Processer
    • 16 KB of RAM        • 128 MB of RAM        • 1 GB of RAM



www.brittontuma.com                                                     25
66 MHz =
        fastest
        desktop in 80s


        96 MHz = child’s
        toy today


        250 MHz =
        fastest super
        computer in 80s


        1.02 GHz =
        telephone today

www.brittontuma.com        26
WHAT DOES THE CFAA
     PROHIBIT?



                     27
CFAA prohibits the access of a protected
     computer that is

          Without authorization, or
          Exceeds authorized access


www.brittontuma.com                             28
Where the person accessing
          Obtains information
          Commits a fraud
          Obtains something of value
          Transmits damaging information
          Causes damage
          Traffics in passwords
          Commits extortion

www.brittontuma.com                         29
“I am the wisest man alive,
              for I know one thing, and that
              is that I know nothing.”
                                                 -Socrates
     Overly simplistic list

     Very complex statute

     Superficially it appears deceptively straightforward

     Many pitfalls
www.brittontuma.com                                          30
Two Most Problematic Issues
           “Loss” Requirement
              • Confuses lawyers and judges alike
           Unauthorized / Exceeding Authorized Access
              • Evolving jurisprudence
              • Interpreted by many Circuits
              • New conflict on April 10, 2012
www.brittontuma.com                                      31
Limited civil remedy
          Procedurally complex with many cross-
           references
          “damage” ≠ “damages”
          Must have $5,000 “loss”
          Loss requirement is jurisdictional threshold



www.brittontuma.com                                       32
What is a “loss”?
         “any reasonable cost to any victim, including the cost of
         responding to an offense, conducting a damage assessment, and
         restoring the data, program, system, or information to its
         condition prior to the offense, and any revenue lost, cost
         incurred, or other consequential damages incurred because of
         interruption of service.”



     Loss = cost          (unless interruption of service)


www.brittontuma.com                                                      33
What can qualify as a “loss”?
           Investigation and response costs
              •   Forensics analysis and investigation
              •   Diagnostic measures
              •   Restoration of system
              •   Bartered services for investigation / restoration
           Value of employees’ time
           Attorneys’ fees if leading investigation


www.brittontuma.com                                                   34
What is not a “loss”?
          Lost revenue (unless interruption of service)
          Value of trade secrets
          Lost profits
          Lost customers
          Lost business opportunities
          Privacy and Personally Identifiable Information

www.brittontuma.com                                          35
Privacy and Personally Identifiable Information
          iTracking
          Hacking / data breach
          Browser cookies


     REMEMBER: Loss is only required for civil remedy –
     not criminal violation


www.brittontuma.com                                       36
What would you advise?
          Wrongful access of your client’s
           computer
          Considering a CFAA claim
          Your advice would be to ________?



www.brittontuma.com                            37
Remedies
          Available
                 •    Economic damages
                 •    Loss damage
                 •    Injunctive relief

          Not Available
                 •    Exemplary damages
                 •    Attorneys’ fees



www.brittontuma.com                       38
Elements of broadest CFAA Claim
         1. Intentionally access computer;
         2. Without authorization or exceeding authorized
            access;
         3. Obtained information from any protected
            computer; and
         4. Victim incurred a loss to one or more persons
            during any 1-year period of at least $5,000.

www.brittontuma.com                                         39
Elements of CFAA Fraud Claim
         1. Knowingly and with intent to defraud;
         2. Accesses a protected computer;
         3. Without authorization or exceeding authorized
            access;
         4. By doing so, furthers the intended fraud and
            obtains anything of value; and
         5. Victim incurred a loss to one or more persons
            during any 1-year period of at least $5,000.
www.brittontuma.com                                         40
WRONGFUL ACCESS




                  41
General Access Principles
          Access by informational / data use
          ≠ technician
          Must be knowing or intentional access
          ≠ accidental access




www.brittontuma.com                                42
Two Types of Wrongful Access
    “without authorization”        “exceeds authorized”
        Outsiders                    Insiders
        No rights                    Some rights
        Not defined                  CFAA defines: access in
        Only requires intent to       a way not entitled
         access, not harm             Necessarily requires
        Hacker!                       limits of authorization
                                      Employees, web users,
                                       etc.
www.brittontuma.com                                              43
When does authorization terminate?
         As of April 10, 2012, there are (once again) three
         general lines of cases: Trilogy of Access Theories
             • Agency Theory
             • Intended-Use Analysis
             • Access Means Access


www.brittontuma.com                                           44
Ways to establish limits for Intended-Use
          Contractual
             •   Policies: computer use, employment & manuals
             •   Website Terms of Service

          Technological
             •   Login and access restrictions
             •   System warnings

          Training and other evidence of notification
          Notices of intent to use CFAA
www.brittontuma.com                                             45
Contractual limits should
          Clearly notify of limits
          Limit authorization to access information
          Limit use of information accessed
          Terminate access rights upon violation
          Indicate intent to enforce by CFAA
     Goal: limit or terminate authorization
www.brittontuma.com                                    46
Employment Situations
           Most common scenario is employment
           •   Employee access and take customer account information
           •   Employee accesses and takes or emails confidential information
               to competitor
           •   Employee improperly deletes data and email
           •   Employee deletes browser history 
           •   Employee accessing their Facebook, Gmail, Chase accounts at
               work 



www.brittontuma.com                                                             47
Family Law Situations
           Have you ever logged into your significant other’s email or Facebook
           to see what they’re saying to others?
           DON’T ANSWER THAT!
           •   Estranged spouse in Arkansas did after separation
           •   NTTA account?
           •   Bank account?
           •   Cancelling services via online accounts?




www.brittontuma.com                                                               48
Sharing Website Logins
           Have you ever borrowed or shared website login credentials and
           passwords for limited access sites (i.e., online accounts)?
           DON’T ANSWER THAT!
           •   Recent case held that permitting others to use login credentials
               for paid website was viable CFAA claim
           •   The key factor here was the conduct was prohibited by the
               website’s agreed to Terms of Service




www.brittontuma.com                                                               49
Misuse of Websites
           Ever created a fake profile or used a website for
           something other than its intended purpose?
           DON’T ANSWER THAT!
           •   Myspace Mom case
           •   Fake login to disrupt legitimate website sales
           •   Accessing website to gain competitive information when
               prohibited by TOS
           •   Creating fake Facebook to research opposing parties


www.brittontuma.com                                                     50
Hacking & Private Information
           Hacking was original purpose for CFAA
           •   Hacking and obtaining private information
               •      (president’s educational records)
           •   Tracking individuals through geo-tagging
           •   Website collection of private information
           •   All fit within the prohibitions of the CFAA
           •   Loss is the problem, from a civil standpoint

www.brittontuma.com                                           51
What about …
           • Hacking a car?
           • Hacking a person?
           • What else?




www.brittontuma.com              52
What about …
           • Denial of Service Attacks
           • Password Trafficking




www.brittontuma.com                      53
OTHER LAWS FOR
COMBATING FRAUD 2.0




                      54
Federal Laws for Combating Fraud 2.0
        •   Electronic Communications Privacy Act - 18 U.S.C. § 2510
            •   Wiretap Act ≠ intercept communications
            •   Stored Communications Act ≠ comm. at rest
        •   Fraud with Access Devices - 18 U.S.C. § 1029
            •   devices to obtain passwords, phishing, counterfeit
                devices, scanning receivers, drive through swipe cards
        •   Identity Theft – 18 U.S.C. § 1028

www.brittontuma.com                                                    55
Texas Laws for Combating Fraud 2.0
        •   Breach of Computer Security Act (Tx. Penal Code § 33.02)
            •   knowingly access a computer without effective consent of owner
        •   Fraudulent Use or Possession of Identifying Info (TPC § 32.51
        •   Unlawful Interception, Use, or Disclosure of Wire, Oral or Electronic
            Communications (TPC § 16.02)
        •   Unlawful Access to Stored Communications (TPC § 16.04)
        •   Identity Theft Enforcement and Protection Act (BCC § 48.001)
        •   Consumer Protection Against Computer Spyware Act (BCC § 48.051)
        •   Anti-Phishing Act (BCC § 48.003)
www.brittontuma.com                                                                 56
• Welcome to the world of Fraud 2.0!
        • Why? Remember what Jobs said
        • CFAA is very broad and covers all kinds of
          computer fraud (sometimes)
        • Courts’ interpretation of the CFAA is changing all
          the time – you must stay updated!
        • Many other Federal and Texas laws also available
          for combating computer fraud

www.brittontuma.com                                            57
www.brittontuma.com   58

Más contenido relacionado

Similar a Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud

The Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse ActThe Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse ActShawn Tuma
 
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...Shawn Tuma
 
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Shawn Tuma
 
Combating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate EspionageCombating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate EspionageShawn Tuma
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
 
Cyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could HappenCyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could HappenRob Stevenson
 
Power Points from Keynote Address at the 30th Annual International Training C...
Power Points from Keynote Address at the 30th Annual International Training C...Power Points from Keynote Address at the 30th Annual International Training C...
Power Points from Keynote Address at the 30th Annual International Training C...The Anti-Corruption Digest
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 

Similar a Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud (20)

The Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse ActThe Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse Act
 
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
 
Lecture5
Lecture5Lecture5
Lecture5
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Combating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate EspionageCombating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate Espionage
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
A6704d01
A6704d01A6704d01
A6704d01
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
Cyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could HappenCyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could Happen
 
Power Points from Keynote Address at the 30th Annual International Training C...
Power Points from Keynote Address at the 30th Annual International Training C...Power Points from Keynote Address at the 30th Annual International Training C...
Power Points from Keynote Address at the 30th Annual International Training C...
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 

Más de Shawn Tuma

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital EngagementShawn Tuma
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Shawn Tuma
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Shawn Tuma
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene ChecklistShawn Tuma
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response ChecklistShawn Tuma
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemShawn Tuma
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Shawn Tuma
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500Shawn Tuma
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity UpdateShawn Tuma
 

Más de Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Último

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud

  • 1. FRAUD 2.0 An Overview of the Laws that Help Businesses and Individuals Combat Computer Fraud Association of Certified Fraud Examiners November 8, 2012
  • 2. THINK ABOUT THIS … www.brittontuma.com 2
  • 3. [SEE FOLLOING VIDEO] https://vimeo.com/2030361 www.brittontuma.com 3
  • 4. WHAT DOES THAT MEAN TO YOU? www.brittontuma.com 4
  • 6. NON COMPUTER RELATED FRAUD? www.brittontuma.com 6
  • 7. As of September 2012, cybercrime • costs $110 billion annually • 18 adults every second are victims • 556,000,000 adults every year are victims • 46% of online adults are victims • mobile devices are trending 2012 Norton Cybercrime Report www.brittontuma.com 7
  • 8. What is fraud? • Fraud is, in its simplest form, deception • Black’s Law Dictionary • all multifarious means which human ingenuity can devise, and which are resorted to by one individual to get advantage over another by false suggestions or suppression of the truth www.brittontuma.com 8
  • 9. Traditional vehicles for fraud? • verbal communication • written communication • in person • through mail • over wire www.brittontuma.com 9
  • 10. What do computers do? EFFICIENCY! www.brittontuma.com 10
  • 12. Computer Fraud = Fraud 2.0 • Deception, through the use of a computer • “old crimes committed in new ways … using computers and the Internet to make the task[s] easier” • computer hacking, data theft, theft of money, breaches of data security, privacy breaches, computer worms, Trojan horses, viruses, malware, denial of service attacks • mouse and keyboard = modern fraudster tools of choice www.brittontuma.com 12
  • 13. Who knows the percentage of businesses that suffered at least one act of computer fraud in last year? 90% (Ponemon Institute Study) www.brittontuma.com 13
  • 14. Computer Fraud and Abuse Act Federal Law – 18 U.S.C § 1030 www.brittontuma.com 14
  • 15. BRIEF HISTORY OF THE CFAA 15
  • 18. Why is the Computer Fraud and Abuse Act important?  Primary Law for Misuse of Computers  Computers … www.brittontuma.com 18
  • 19. “Everything has a computer in it nowadays.” -Steve Jobs www.brittontuma.com 19
  • 20. WHAT IS A COMPUTER? 20
  • 21. The CFAA says has a processor or stores data “the term ‘computer’ means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but …” IMPORTANT! “such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device;” www.brittontuma.com 21
  • 23. The Fourth Circuit says “’Just think of the common household items that include microchips and electronic storage devices, and thus will satisfy the statutory definition of “computer.”’ “’That category can include coffeemakers, microwave ovens, watches, telephones, children’s toys, MP3 players, refrigerators, heating and air-conditioning units, radios, alarm clocks, televisions, and DVD players, . . . .” -United States v. Kramer www.brittontuma.com 23
  • 24. The CFAA applies only to “protected” computers This may limit the problem of applying it to alarm clocks, toasters, and coffee makers Protected = connected to the Internet Any situations where these devices are connected? www.brittontuma.com 24
  • 25. • TI-99 • Leap Frog Leapster • iPhone 5 • 3.3 MHz Processor • 96 MHz Processor • 1.02 GHz Processer • 16 KB of RAM • 128 MB of RAM • 1 GB of RAM www.brittontuma.com 25
  • 26. 66 MHz = fastest desktop in 80s 96 MHz = child’s toy today 250 MHz = fastest super computer in 80s 1.02 GHz = telephone today www.brittontuma.com 26
  • 27. WHAT DOES THE CFAA PROHIBIT? 27
  • 28. CFAA prohibits the access of a protected computer that is  Without authorization, or  Exceeds authorized access www.brittontuma.com 28
  • 29. Where the person accessing  Obtains information  Commits a fraud  Obtains something of value  Transmits damaging information  Causes damage  Traffics in passwords  Commits extortion www.brittontuma.com 29
  • 30. “I am the wisest man alive, for I know one thing, and that is that I know nothing.” -Socrates  Overly simplistic list  Very complex statute  Superficially it appears deceptively straightforward  Many pitfalls www.brittontuma.com 30
  • 31. Two Most Problematic Issues  “Loss” Requirement • Confuses lawyers and judges alike  Unauthorized / Exceeding Authorized Access • Evolving jurisprudence • Interpreted by many Circuits • New conflict on April 10, 2012 www.brittontuma.com 31
  • 32. Limited civil remedy  Procedurally complex with many cross- references  “damage” ≠ “damages”  Must have $5,000 “loss”  Loss requirement is jurisdictional threshold www.brittontuma.com 32
  • 33. What is a “loss”? “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.” Loss = cost (unless interruption of service) www.brittontuma.com 33
  • 34. What can qualify as a “loss”?  Investigation and response costs • Forensics analysis and investigation • Diagnostic measures • Restoration of system • Bartered services for investigation / restoration  Value of employees’ time  Attorneys’ fees if leading investigation www.brittontuma.com 34
  • 35. What is not a “loss”?  Lost revenue (unless interruption of service)  Value of trade secrets  Lost profits  Lost customers  Lost business opportunities  Privacy and Personally Identifiable Information www.brittontuma.com 35
  • 36. Privacy and Personally Identifiable Information  iTracking  Hacking / data breach  Browser cookies REMEMBER: Loss is only required for civil remedy – not criminal violation www.brittontuma.com 36
  • 37. What would you advise?  Wrongful access of your client’s computer  Considering a CFAA claim  Your advice would be to ________? www.brittontuma.com 37
  • 38. Remedies  Available • Economic damages • Loss damage • Injunctive relief  Not Available • Exemplary damages • Attorneys’ fees www.brittontuma.com 38
  • 39. Elements of broadest CFAA Claim 1. Intentionally access computer; 2. Without authorization or exceeding authorized access; 3. Obtained information from any protected computer; and 4. Victim incurred a loss to one or more persons during any 1-year period of at least $5,000. www.brittontuma.com 39
  • 40. Elements of CFAA Fraud Claim 1. Knowingly and with intent to defraud; 2. Accesses a protected computer; 3. Without authorization or exceeding authorized access; 4. By doing so, furthers the intended fraud and obtains anything of value; and 5. Victim incurred a loss to one or more persons during any 1-year period of at least $5,000. www.brittontuma.com 40
  • 42. General Access Principles  Access by informational / data use  ≠ technician  Must be knowing or intentional access  ≠ accidental access www.brittontuma.com 42
  • 43. Two Types of Wrongful Access “without authorization” “exceeds authorized”  Outsiders  Insiders  No rights  Some rights  Not defined  CFAA defines: access in  Only requires intent to a way not entitled access, not harm  Necessarily requires  Hacker! limits of authorization  Employees, web users, etc. www.brittontuma.com 43
  • 44. When does authorization terminate? As of April 10, 2012, there are (once again) three general lines of cases: Trilogy of Access Theories • Agency Theory • Intended-Use Analysis • Access Means Access www.brittontuma.com 44
  • 45. Ways to establish limits for Intended-Use  Contractual • Policies: computer use, employment & manuals • Website Terms of Service  Technological • Login and access restrictions • System warnings  Training and other evidence of notification  Notices of intent to use CFAA www.brittontuma.com 45
  • 46. Contractual limits should  Clearly notify of limits  Limit authorization to access information  Limit use of information accessed  Terminate access rights upon violation  Indicate intent to enforce by CFAA Goal: limit or terminate authorization www.brittontuma.com 46
  • 47. Employment Situations Most common scenario is employment • Employee access and take customer account information • Employee accesses and takes or emails confidential information to competitor • Employee improperly deletes data and email • Employee deletes browser history  • Employee accessing their Facebook, Gmail, Chase accounts at work  www.brittontuma.com 47
  • 48. Family Law Situations Have you ever logged into your significant other’s email or Facebook to see what they’re saying to others? DON’T ANSWER THAT! • Estranged spouse in Arkansas did after separation • NTTA account? • Bank account? • Cancelling services via online accounts? www.brittontuma.com 48
  • 49. Sharing Website Logins Have you ever borrowed or shared website login credentials and passwords for limited access sites (i.e., online accounts)? DON’T ANSWER THAT! • Recent case held that permitting others to use login credentials for paid website was viable CFAA claim • The key factor here was the conduct was prohibited by the website’s agreed to Terms of Service www.brittontuma.com 49
  • 50. Misuse of Websites Ever created a fake profile or used a website for something other than its intended purpose? DON’T ANSWER THAT! • Myspace Mom case • Fake login to disrupt legitimate website sales • Accessing website to gain competitive information when prohibited by TOS • Creating fake Facebook to research opposing parties www.brittontuma.com 50
  • 51. Hacking & Private Information Hacking was original purpose for CFAA • Hacking and obtaining private information • (president’s educational records) • Tracking individuals through geo-tagging • Website collection of private information • All fit within the prohibitions of the CFAA • Loss is the problem, from a civil standpoint www.brittontuma.com 51
  • 52. What about … • Hacking a car? • Hacking a person? • What else? www.brittontuma.com 52
  • 53. What about … • Denial of Service Attacks • Password Trafficking www.brittontuma.com 53
  • 54. OTHER LAWS FOR COMBATING FRAUD 2.0 54
  • 55. Federal Laws for Combating Fraud 2.0 • Electronic Communications Privacy Act - 18 U.S.C. § 2510 • Wiretap Act ≠ intercept communications • Stored Communications Act ≠ comm. at rest • Fraud with Access Devices - 18 U.S.C. § 1029 • devices to obtain passwords, phishing, counterfeit devices, scanning receivers, drive through swipe cards • Identity Theft – 18 U.S.C. § 1028 www.brittontuma.com 55
  • 56. Texas Laws for Combating Fraud 2.0 • Breach of Computer Security Act (Tx. Penal Code § 33.02) • knowingly access a computer without effective consent of owner • Fraudulent Use or Possession of Identifying Info (TPC § 32.51 • Unlawful Interception, Use, or Disclosure of Wire, Oral or Electronic Communications (TPC § 16.02) • Unlawful Access to Stored Communications (TPC § 16.04) • Identity Theft Enforcement and Protection Act (BCC § 48.001) • Consumer Protection Against Computer Spyware Act (BCC § 48.051) • Anti-Phishing Act (BCC § 48.003) www.brittontuma.com 56
  • 57. • Welcome to the world of Fraud 2.0! • Why? Remember what Jobs said • CFAA is very broad and covers all kinds of computer fraud (sometimes) • Courts’ interpretation of the CFAA is changing all the time – you must stay updated! • Many other Federal and Texas laws also available for combating computer fraud www.brittontuma.com 57

Notas del editor

  1. Who knows what movie this was from?Anyone remember?Early 80s – 1983
  2. Movie War Games!
  3. Why? Because this is the primary law that is used to pursue those who misuse a computer to commit crimes, defraud, etc. Computers are everywhere and are involved in virtually everything!
  4. CFAA’s definition of computer:Remember the “But”!!!
  5. Now that we know what it applies to, let’s take about what the CFAA prohibits.
  6. Not too long ago I was talking with someone about a case they had involving criminal indictment for the CFAA.I offered help but was rebuffed – told: “I’ve read the statute, I’ve got it”Ok – best of luck to you (and your clients!)!
  7. What would your advice, as a lawyer, be in this situation?
  8. Why? (Remember what Steve Jobs said last December – everything has a computer in it nowadays!)The CFAA is what is most commonly used to deal with misuse of computers.
  9. Why? (Remember what Steve Jobs said last December – everything has a computer in it nowadays!)The CFAA is what is most commonly used to deal with misuse of computers.