Fox News Exclusive: WikiLeaks

Many interesting issues are raised in the scenario contemplated in a recent Fox News Exclusive titled, “WikiLeaks to move servers offshore, sources say.”  I am interested since I am quoted numerous times about international law issues; but regardless, this topic could raise some interesting discussion.

The issue is similar to the concept of Sealand, the man-made platform off the coast of England whose owners claim it belongs to no nation and they are their own sovereign territory.  At one time Havenco placed a server farm on Sealand and offered server space.  The only restriction in the terms of service was no child porn.  Anyone could rent server space and keep anything, other than child porn, on the servers regardless of the data’s legality, e.g. copyrighted material, terrorist info, data related to various criminal activity such as stolen info, money laundering, etc.  It seems the server farm went out of business at some point in the early 2000’s, but that is not confirmed.

Placing servers in international territory, let’s say on a ship in international waters, raises some interesting legal questions, especially international law, when a nation feels it needs to seize or prevent whatever activity is occurring on those servers.  In some regards this situation may be easier, legally speaking.  If the server owners claim no law controls their actions, well then, what law can they cite to that would prevent a nation from taking action, especially if the nation believes their national security is threatened?  If the server owners claim to be citizens of a particular nation then that nation’s laws apply to them and they may potentially be captured and extradited, or just snatched up out of international waters by the offended nation.  It gets trickier when you have a nation that has no laws to criminalize the activity.  This was the case with the creator of the “I Love You” virus.  The Philippines could not prosecute since they had no law criminalizing the activity.

Many very interesting issues to consider and discuss.  Anyway, here is a link to the Fox News article:   “WikiLeaks to move servers offshore, sources say”.  Enjoy and I would love to hear your comments.

Courts and Lawyers: Gauging the Level of Technical Knowledge

Like many people, I make a lot of assumptions.  Lately, I have made a lot of assumptions about people’s level of knowledge when it comes to cyber security and technology.  This is likely due to my background and training.  If you work in the IT or cyber security or related areas chances are you also make a lot of these assumptions as well.

Recently I learned that the level of knowledge regarding cyber security and technology amongst the legal profession is not as high as I had assumed.  This is not a knock on my colleagues in the law profession, but my failure to avoid making assumptions.  For instance, when emails are offered into evidence their authenticity must be established, but does this include whether the email address is genuine and was not spoofed, the content is original and was not altered, the date and time was not altered, the location of where the mail was accessed if webmail; how webmail works, where the servers are located, the meta data of messages, etc.  Example: if one party offers emails to prove a point about their opponent and the offering party had not been given access to the email account, the question should be raised as to where the emails came from and whether they constitute evidence of a crime; e.g. was the email account hacked?

This is not unique to email but would apply to social media accounts as well.  Many people today do not realize how easy it is to fake, alter and manipulate Online or E-accounts.  Certainly the legal profession must be provided the training and information to know the right questions to ask regarding the authenticity of evidence.

Hack Back Lecture @ the FBI and Fordham Univ. International Conference on Cyber Security (ICCS) 2012

In January the FBI & Fordham Univ. ICCS 2012 conference was held at Fordham Univ.  It was a great conference with more than 30 countries represented.  Most of the speakers were excellent.  This was truly a great collaboration between private industry and law enforcement from all over the world.

I was somewhat apprehensive about speaking on my topic, “Hacking Back In Self-Defense: Is It Legal; Should It Be?,” since I was not sure how it would be received, especially by law enforcement.  To my surprise the response was excellent.  First impression from many when they read the title is that all hack back is illegal, vigilantism, unethical; but, after the lecture numerous people to include many law enforcement personnel approached me to express their interest in the topic and were happy to see an attorney trying to push the envelope and move the discussion forward.

Let’s face it, here in the US the cyber laws have not kept pace with the technology and now we find ourselves inadequately prepared to defend our networks and information primarily due to our antiquated cyber laws.  I am a proponent of updating our laws but in doing so, finding the proper mix of privacy protection and enabling clear and robust defense.

Hacking-back, or aggressive cyber defense should be incorporated but with parameters and acknowledgement, by those seeking this alternative, that they are strictly liable for their actions and are prepared to make amends to innocent third parties caught in the crossfire.  Obviously this is a simplification of a mission or operation that must consider many many variables and factors, to include legal issues from a multitude of jurisdictions, numerous options regarding the particular options to pursue, evidence of a clear attempt to identify the attacker through various forms of traceback, a memo outlining all of the actions pursued or contemplated prior to seeking hackback along with an analysis of why those actions either failed or were not viable options, and a very robust risk assessment weighing all of the options and comparing the amount of  damage presently being sustained by the company because of the attacks with the potential for damage to others.  These and many more factors must be considered and analyzed when building a case for and a plan to implement hackback.

Gates’ Pledge to Fight Virus

Here’s some hopeful news from Bill Gates. Viral illness is in decline thanks to his focused attention and heaps of money spent on the reduction of suffering.

…the Microsoft founder has become the people’s plutocrat. Although some diseases, such as malaria, remain rife, his charitable foundation and his lobbying have borne results. In the past year, not a single citizen in India contracted polio.

“People think aid is abstract and thousands of miles away. I go there and see it. I’m intent on making sure that my money gets to people who need it, and I come back and say it’s working.”

Hey Bill, what about all those people using your operating system that need your help to reduce their viruses?

Unlike polio, it looks like users in India seem to have a problem with Microsoft Windows infections, according to the Microsoft Worldwide Threat Assessment.

MSFT Threat

What would he do if malware infections of Windows systems raised the cost of the distribution or management of anti-virus aid? Ironic, no?

Note the infection rate explosion in France, Russia and Italy over the first half of 2011.

MSFT Malware Rates