Litigation Options For Post-Cyberattack 'Active Defense'

Similar documents
Gottschlich & Portune, LLP

Damages and Remedies in Civil IP Cases An U.S. Perspective

Preliminary Injunctive Relief to Protect Trade Secrets and Enforce Non-Competes:

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION

UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION. v. Case No. 8:19-cv-582-T-36AEP ORDER

Title 10: COMMERCE AND TRADE

Trade Secrets Acts Compared to the UTSA

9th Circ.'s Expansive Standard For Standing In Breach Case

Changing Landscape, US and Abroad 2017 In House Counsel Conference

Escobar Provides New Grounds For Seeking Gov't Discovery

Calif. Privacy Act Will Increase Data Breach Liability

Move or Destroy Provision Is Key To Ex Parte Relief In Trademark Counterfeiting Cases

Case: 1:18-cv Document #: 24 Filed: 05/16/18 Page 1 of 11 PageID #:499

Preemptive Use Of Post-Grant Review Vs. Inter Partes Review

Case 1:12-cv HB Document 7 Filed 06/12/12 Page 1 of 6

PTAB Approaches To Accessibility Of Printed Publication

Considerations When Invoking The Recently Enacted DTSA

When Trade Secrets Cases Go Criminal: Part 1

'Injury In Fact' Standing After Cambridge Analytica

Protecting Your Trade Secrets Under the DTSA

Examining The Statute Of Limitations In CFPB Cases: Part 2

Case: 1:12-cv Document #: 27 Filed: 10/02/12 Page 1 of 5 PageID #:752

Bristol-Myers Squibb: A Dangerous Sword

Litigation Webinar Series. Trade Secret Protection and the Defend Trade Secrets Act: What s New, What s Different? Olga May Principal San Diego, CA

Defend Trade Secrets Act: What You Need to Know. May 31, 2016

In 5th Circ., Time Is Not On SEC s Side

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA. Plaintiff, ORDER DENYING MOTION FOR v.

1. If you have not already done so, please join the conference call.

Case 1:17-cv CMH-JFA Document 1 Filed 11/22/17 Page 1 of 13 PageID# 1 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA

RECOVERING THE PROCEEDS OF FRAUD

Post-EBay: Permanent Injunctions, Future Damages

Benefits And Dangers Of An SEC Wells Submission

How Courts Approach Trade Secret Identification: Part 2

Viewing Class Settlements Through A New Lens: Part 2

Revisiting Affiliated Ute: Back In Vogue In The 9th Circ.

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA

Case 1:18-cv LO-TCB Document 1 Filed 10/26/18 Page 1 of 15 PageID# 1 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA

Case 3:15-cv BTM-BLM Document 6 Filed 02/16/16 Page 1 of 7

How Courts Treat USPTO Subject Matter Eligibility Guidelines

Case 1:17-cv FB-CLP Document 77 Filed 06/07/18 Page 1 of 6 PageID #: 1513

Case 0:17-cv RNS Document 32 Entered on FLSD Docket 07/11/2017 Page 1 of 5. United States District Court for the Southern District of Florida

Trade Secret Misappropriation and Remedies. (including a look at the new federal Defend Trade Secrets Act of 2016)

Trade Secrets Act? Prof. Eric Goldman Santa Clara University School of Law

Case 1:18-cv NLH-KMW Document 1 Filed 06/22/18 Page 1 of 18 PageID: 1

Case 1:12-cv JMF Document 6 Filed 06/06/12 Page 1 of 10. : : Plaintiff, : : Defendants.

INTRODUCTION. Plaintiff Crazy Dog T-Shirts, Inc. ( Plaintiff ) initiated this action on December 11,

Case 1:13-cv LGS Document 20 Filed 06/26/13 Page 1 of 8. : Plaintiffs, : : : Defendants. :

Winning at the Outset: Improving Chances of Success on a Preliminary Injunction Motion. AIPLA Presentation October 2010 Lynda Zadra-Symes

Calculating Contract Damages In A Volatile Market

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA

Case 2:16-cv APG-GWF Document 3 Filed 04/24/16 Page 1 of 7

What High Court's Expansion Of FCA Time Limits Would Mean

Case 2:11-mc JAM -DAD Document 24 Filed 03/21/12 Page 1 of 12

716 West Ave Austin, TX USA

BARTKO ZANKEL BUNZEL ALERT!

Case 0:18-cv KMM Document 20 Entered on FLSD Docket 07/03/2018 Page 1 of 22 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF TEXAS SAN ANTONIO DIVISION

DEFENDING DATA PRIVACY AND BEHAVIORAL ADVERTISING PUTATIVE CLASS ACTION SUITS

The Latest On Fee-Shifting In Patent Cases

2:13-cv VAR-RSW Doc # 32 Filed 11/20/14 Pg 1 of 8 Pg ID 586 UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF MICHIGAN

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF PENNSYLVANIA

Corporate Litigation: Standing to Bring Consumer Data Breach Claims

Strike all after the enacting clause and insert the

Case: 1:17-cv Document #: 1 Filed: 11/28/17 Page 1 of 17 PageID #:1 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS

Case 1:07-cv CKK Document 26 Filed 04/28/2008 Page 1 of 17 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 2:11-cv Document 1 Filed 11/23/11 Page 1 of 14 UNITED STATES DISTRICT COURT DISTRICT OF NEVADA ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) )

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF PENNSYLVANIA ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) INTRODUCTION

COMPLAINT FOR IN REM RELIEF. Plaintiffs CostaRica.com, Inc. Sociedad Anonima ( CostaRica.com ) and

Case: 1:12-cv Document #: 22 Filed: 09/25/12 Page 1 of 7 PageID #:619

2:14-cv GCS-MKM Doc # 24 Filed 03/09/15 Pg 1 of 6 Pg ID 388 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION

Case 1:17-cv WYD-MEH Document 9 Filed 09/22/17 USDC Colorado Page 1 of 9 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

The Where, When And What Of DTSA Appeals: Part 2

In recent years, criminals have launched cyberattacks

New Obstacles For VPPA Plaintiffs At 9th Circ.

Computer Search and Seizure

Case: 1:18-cv Document #: 1 Filed: 06/08/18 Page 1 of 15 PageID #:1

Trade Secrets. Alternative to Patent Protection. Paul F. Neils Jean C. Edwards. Copyright 2010, Paul F. Neils, Esq. All rights reserved

Chapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses

Case 1:08-cv Document 14 Filed 07/16/2008 Page 1 of 12

Case 4:17-cv Document 3-6 Filed in TXSD on 05/30/17 Page 1 of 86 EXHIBIT 1

Reject The Mistaken Qui Tam FCA Resealing Doctrine

How Cos. Can Take Advantage Of DOJ False Claims Act Memo

TC Heartland s Restraints On ANDA Litigation Jurisdiction

The Post-Alice Blend Of Eligibility And Patentability

Case 3:19-cv GPC-LL Document 4 Filed 03/22/19 PageID.16 Page 1 of 10

CARDSERVICE INTERNATIONAL, INC., Plaintiff, v. WEBSTER R. McGEE, and WRM & ASSOCIATES, d/b/a/ EMS - Card Service on the Caprock, Defendants.

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE ORDER. THIS MATTER comes before the Court on Defendant s Motion to Dismiss

Enforcing Exculpatory Provisions Against Meritless Claims

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF NORTH CAROLINA Civil Action No. 5:08-CV D

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA. Plaintiff,

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF CALIFORNIA CIV. NO. S KJM CKD

2 New Decisions Clarify Chapter 15 Requirements

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF OHIO WESTERN DIVISION

The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA ALEXANDRIA DIVISION

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION COMPLAINT

Enforceability of Online Terms and Conditions Incorporated into a Written Contract

Case 3:18-cv M Document 62 Filed 03/09/18 Page 1 of 10 PageID 1084

Case 3:10-cv N Document 2-2 Filed 09/30/10 Page 1 of 6 PageID 29

Transcription:

Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Litigation Options For Post-Cyberattack 'Active Defense' By Alexander Berengaut and Tarek Austin (October 29, 2018, 2:03 PM EDT) In March 2017, Rep. Tom Graves, R-Ga., introduced a draft bill titled the Active Cyber Defense Certainty Act. The bill would amend the Computer Fraud and Abuse Act to enable victims of cyberattacks to employ limited defensive measures that exceed the boundaries of one s network in order to monitor, identify and stop attackers. [1] More specifically, the ACDC would empower individuals and companies to leave their own network to ascertain the perpetrator (i.e., establish attribution), disrupt cyberattacks without damaging others computers, retrieve and destroy stolen files, monitor the behavior of an attacker, and utilize beaconing technology.[2] An updated, bipartisan version of the bill was introduced by Rep. Graves and Rep. Kyrsten Sinema, D-Ariz., in October 2017.[3] There has been significant debate on whether the types of self-help measures that the ACDC expressly authorizes sometimes referred to as active defense are currently prohibited by the CFAA. While no court has yet ruled on the issue, several commentators (and the U.S. Department of Justice) have long argued that because the CFAA prohibits accessing computers without authorization, cyberattack victims expose themselves to criminal liability if they venture outside their network to unmask an attacker and disrupt, disable or destroy the attacker s system.[4] The purpose of the ACDC is to reduce legal uncertainty by, in effect, providing a statutory safe harbor for victims of cyberattacks to hack back under the right circumstances, and subject to limitations. Alexander Berengaut Tarek Austin In addition to the legal question of whether active defense is currently barred by the CFAA, the desirability of active defense as a policy matter has also been debated. Advocates of the ACDC have argued that companies, no matter how sophisticated their preventive cyber defenses, continue to suffer major breaches, and that the number of cyberattacks far exceeds the government s ability to identify and prosecute criminals. They argue that in a lopsided cyber battlefield, victims need additional tools to actively respond to ongoing attacks. In critics view, however, the bill will promote cyber-vigilantism by victims who are overeager to aggressively strike back at cyber intruders and thieves thereby creating tit-for-tat patterns of retribution and a significant risk of collateral damage to innocent third-party computer systems.

While the legal and policy debates raised by the ACDC are important, they often overlook the fact that victims of hostile cyber activity may already be able to avail themselves of the judicial process to lawfully engage in the types of active defense measures that the ACDC would expressly authorize. Several such techniques of active defense through litigation are relatively well-established; others are untested. Because active defense through litigation necessarily involves the judicial process, moreover, it can be relatively time-consuming (particularly in comparison with the more immediate responsive measures contemplated by the ACDC). Although courts can provide certain forms of expedited relief in a matter of days or even less, this time frame may be prohibitive in some cases. Nevertheless, for victims of cyberattacks that are weighing an active response, it may be worth considering one or more of these options. The most established and typical form of active defense through litigation is using third-party discovery to obtain information about the perpetrators of a cyber-intrusion and, potentially, establishing attribution of the culprit. In Liberty Media Holdings LLC v. Does 1-59, for example, hackers unlawfully accessed copyrighted materials on a company s protected website.[5] The company brought suit against the unknown culprits named John Does in the complaint for violating the CFAA, the Electronic Communications Privacy Act and the Copyright Act.[6] It then provided the court with the internet protocol addresses of each defendant.[7] The court granted the company s motion that it be allowed to serve subpoenas on the defendants internet service providers and cable providers to compel them to produce all documents and/or information sufficient to identify the users of the IP addresses. [8] A more sophisticated form of active defense through litigation involves victims obtaining injunctions and restraining orders to combat ongoing cyberthreats. In Luxottica Group SpA. v. The Partnerships and Unincorporated Associations Identified on Schedule A, an owner of eyewear brands brought a Lanham Act action against hundreds of defendants alleged to infringe on its trademarks via a thousand domains and 50 online marketplaces.[9] Just over a week later, Luxottica obtained from the court an order mandating that domain-name registries transfer the defendants domain names to Luxottica.[10] The order further instructed a host of third parties who serviced defendants marketplaces, web hosts, search engines, banks, third-party processors, etc. to immediately cease all interactions with them and provide Luxottica expedited discovery as to the defendant s identities, locations and operations.[11] Through similar mechanisms, technology companies have invoked the courts equitable powers to craft injunctive relief enabling them to disrupt large-scale cybercrime. In 2010, for example, Microsoft Corp. brought suit in federal court in the Eastern District of Virginia against 27 John Doe defendants registered as the owners of domain names used for botnet communications.[12] Charging that defendants utilized a global illegal network of millions of computers infected with malware a botnet named Waledac to send spam email and steal information, account credentials, and funds, the complaint asserted violations of the CFAA, the CAN-SPAM Act, the ECPA, false designation of origin and trademark dilution under the Lanham Act, trespass to chattels, conversion, and unjust enrichment.[13] Microsoft obtained from the court a sealed temporary restraining order that ordered the defendants domain registry, VeriSign, to lock their domains, hold them in escrow, and preserve evidence of misconduct.[14] In subsequent years, Microsoft pursued similar actions against other botnets and malicious actors.[15] Because both Microsoft and the Luxottica plaintiffs alleged trademark infringement, they were able to take advantage of a powerful tool in the Lanham Act: a provision that empowers courts to grant ex parte orders for the seizure of equipment involved in the production of counterfeit trademarks.[16] The Lanham Act is not the only statute that contains this remedy, however. Notably, the recently enacted Defend Trade Secrets Act permits a party to seek, on an ex parte basis, an order providing for the seizure

of property necessary to prevent the propagation or dissemination of the trade secret that is the subject of the action. [17] The DTSA s ex parte seizure procedure sets a high bar for obtaining the remedy, and few motions for ex parte seizure thus far have been successful.[18] But for cyber-victims that have lost trade secrets as part of a cyber-intrusion, the DTSA is an additional potential tool to consider as part of an active defense strategy. Even outside the statutory contexts of the Lanham Act and the DTSA, there are potential vehicles to enlist the courts assistance in undertaking an active defense strategy. Courts have broad powers to grant equitable relief in connection with other statutory or common-law causes of action. As the U.S. Supreme Court has explained, once a right and a violation have been shown, the scope of a district court s equitable powers to remedy past wrongs is broad, for breadth and flexibility are inherent in equitable remedies. [19] Indeed, the CFAA in play whenever a computer has been accessed without authorization expressly contemplates injunctive relief or other equitable relief. [20] Such relief is also available to plaintiffs who assert claims under state computer-crime laws or common law claims for computer trespass and conversion. One such equitable remedy is the writ of replevin, a traditional prejudgment process involving the seizure by U.S. marshals of property alleged to have been illegally taken or wrongfully withheld. This historic common-law writ, now often governed by state statutes, has been commonly used to take property from an individual wrongfully in possession of it and return it to its rightful owner. Subject to variations in state statutory law, plaintiffs invoking the writ generally must establish that they are the owner of the property, that they have a right to immediate possession of it, and that the defendant wrongfully took or detained the property.[21] In some states, a plaintiff who can show an urgent risk that the defendant will destroy or conceal the property is eligible to obtain an ex parte seizure order without prior notice to the defendant.[22] Although historically the writ of replevin has been used to recover only tangible goods and chattels, some courts have recently held that plaintiffs can invoke replevin statutes to recover stolen or wrongfully withheld electronic data. For instance, in SEIU Healthcare v. Evergreen, the court held that a nonprofit organization could obtain seizure via replevin of electronic spreadsheets that it alleged another nonprofit had illegally purchased from a former employee.[23] The court reasoned that Washington s replevin statute does not distinguish between tangible and intangible property, and that what matters instead is whether the property can be taken back from the defendant and returned to the plaintiff. [24] To be sure, in many cases of cyber theft the replevin remedy would likely be unavailable, insofar as data stolen via a cyberattack may be difficult to trace and locate and may not qualify as a specific, identifiable item of personal property, as required by some replevin statutes.[25] But even then, this traditional, well-established mechanism for seizure of wrongfully taken property could still prove a useful reference point for courts assessing the scope and types of injunctive relief that they have authority to issue pursuant to their broad equitable powers. Ultimately, the writ of replevin, like the ex parte seizure provisions of the Lanham Act and DTSA, illustrate the diversity of mechanisms through which plaintiffs may enlist the assistance of the courts in engaging in the type of active defense measures contemplated by the ACDC.

Alexander A. Berengaut is a partner and Tarek J. Austin is an associate at Covington & Burling LLP. The opinions expressed are those of the author(s) and do not necessarily reflect the views of the firm, its clients, or Portfolio Media Inc., or any of its or their respective affiliates. This article is for general info rmation purposes and is not intended to be and should not be taken as legal advice. [1] Active Cyber Defense Certainty Act: Bipartisan Bill Empowers Americans to Develop New Defenses Against Cyber Attacks, https://tomgraves.house.gov/uploadedfiles/acdc_expaliner.pdf [2] Id. [3] H.R. 4036, 115th Cong. (2017), https://www.congress.gov/bill/115th-congress/house-bill/4036 [4] Office of Legal Education, Department of Justice, Prosecuting Computer Crimes (2010), https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf [5] Liberty Media Holdings, LLC v. Does 1-59, No. 10-1823, 2011 WL 292128 (S.D. Cal. 2011). [6] Id. at *1. [7] Id. at *2. [8] Id. at *1. [9] Amended Complaint, Luxottica Grp. S.p.A. v. The Partnerships and Unincorporated Associations Identified on Schedule A, No. 1:16-cv-08322 (N.D. Ill. Aug. 25, 2016), 2016 WL 8577031. [10] Sealed Temporary Restraining Order, Luxottica Grp. S.p.A. v. The Partnerships and Unincorporated Associations Identified on Schedule A, No. 1:16-cv-08322, at 12 (N.D. Ill. Sept. 1, 2016), ECF No. 30. [11] Id. at 12-15. [12] Complaint, Microsoft Corp. v. John Does 1-27, No. 1:10-CV-00156 (E.D. Va. Feb. 22, 2010), ECF No. 1. [13] Id. at 1, 7-10, 14. [14] Ex Parte Temporary Restraining Order and Order to Show Cause re Preliminary Injunction, Microsoft Corp. v. John Does 1-27, No. 1:10-CV-00156, at 5 (E.D. Va. Feb. 22, 2010), ECF No. 13. [15] E.g., Complaint, Microsoft Corp v. John Does 1-11, No. 2:11-cv-00222 (W.D. Wash. Feb. 9, 2011) (Rustock botnet); Complaint, Microsoft Corp. v. John Does 1-39, 1:12-cv-01335 (E.D.N.Y. March 19, 2012) (Zeus botnet); Complaint, Microsoft Corp. v. John Does 1-18, 1:13-cv-00139 (E.D. Va. Jan. 31, 2013) (Bamital botnet). [16] 15 U.S.C. 1116(d)(1)(A).

[17] 18 U.S.C. 1836(b)(2)(A)(i). [18] 18 U.S.C. 1836(b)(2)(A)(ii); Beusse Wolter Sanks & Maire, PLLC, How Has the Defend Trade Secrets Act Fared Two Years After Enactment? (July 9, 2018), http://www.bwsmiplaw.com/blog/2018/07/09/how-has-the-defend-trade-secrets-act-fared-twoyears-after-enactment/ [19] Hills v. Gautreaux, 425 U.S. 284, 297 (1976). [20] 18 U.S.C. 1030(g). [21] E.g., Cornelio v. Stamford Hosp., 717 A.2d 140, 143 (Conn. 1998). [22] E.g., Conn. Gen. Stat. Ann. 52-278e; Kan. Stat. Ann. 60-1005. [23] SEIU Healthcare Nw. Training P ship v. Evergreen Freedom Found., No. 76220-6-I, 2018 WL 4691593 (Wash. Ct. App. Oct. 1, 2018). [24] Id. at *7; see also Chefs Diet Acquisition Corp. v. Lean Chefs, LLC, No. 14-cv-8467, 2016 WL 5416498, at *7 (S.D.N.Y. Sept. 28, 2016) (replevin of electronic customer lists). [25] Chefs Diet, 2016 WL 5416498 at *7.