+1(978)310-4246 credencewriters@gmail.com
  

Description

I need someone to read the pdf file then write two to three paragraphs about (What are the top 5 lessons learned from the FBI Guidance reading?)

Cybersecurity Unit
Computer Crime & Intellectual Property Section
Criminal Division
U.S. Department of Justice
1301 New York Avenue, N.W., 6th Floor, Washington, D.C. 20530 – CYBERSECURITY.CCIPS@USDOJ.GOV – (202)514-1026
Legal Considerations when Gathering Online
Cyber Threat Intelligence and Purchasing Data
from Illicit Sources1
Version 1.0 (February 2020)
I. Introduction
The Cybersecurity Unit (CsU) prepared this document in response to questions posed by
private organizations about the legality of specific cybersecurity measures. 2 It includes
contributions from other components of the Department of Justice, such as the National Security
Division, and other federal agencies. 3 Consistent with the CsU’s mission, this document is
intended to help organizations adopt effective cybersecurity practices and to conduct them in a
lawful manner.
This document focuses on information security practitioners’ cyber threat intelligencegathering efforts that involve online forums in which computer crimes are discussed and planned
and stolen data is bought and sold. It also contemplates situations in which private actors attempt
to purchase malware, security vulnerabilities, or their own stolen data—or stolen data belonging
to others with the data owners’ authorization—in Dark Markets. 4 It is not, however, intended to
1
This document confers no rights or remedies and does not have the force of law. See United States v. Caceres, 440
U.S. 741, 752-753 (1979). This document is also not intended to have any regulatory effect.
2
This document focuses on activities conducted by private actors. Additional legal and policy issues not addressed
in this document may arise when government actors engage in the activities discussed herein. Government actors
should consult agency or department counsel or contact the CsU for advice regarding their activities.
3
The Department of Justice’s Federal Bureau of Investigation (FBI), the Department of Homeland Security’s
United States Secret Service (U.S. Secret Service), and the Treasury Department’s Office of Foreign Asset Control
(OFAC) provided valuable input to this paper.
4
Dark Markets are found on the TOR (“the Onion Router”) network, which is a collection of computers designed to
obfuscate the origin of online communications. The TOR network encrypts and routes communications through a
series of relays around the world to thwart efforts to trace their origin. TOR hidden services, also called the “Dark
Web,” are sites that may only be accessed using a TOR browser. Because the location of sites operating as TOR
hidden services is concealed and difficult to trace, TOR hidden services are a preferred technique for hosting sites
associated with illegal activities.
1
cover intelligence or evidence gathering involving other types of criminal forums, such as
forums that traffic in child pornography5 or illicit drugs.
The scenarios referenced in this document are derived from practices that the CsU’s
private sector outreach and engagement suggest are commonly used by the cybersecurity
community to gather intelligence, retrieve stolen data, and obtain malware samples and security
vulnerabilities. The legal concerns discussed herein are likely to arise when information security
practitioners engage in those activities. While this document is intended to provide assistance in
identifying potential legal issues, it does not—and cannot—comprehensively address all the legal
issues that practitioners may face in every
circumstance, particularly because minor changes
Two Rules to Always Follow
in facts can substantially alter the legal analysis.
Accordingly, we strongly recommend that
1. Don’t Become a Perpetrator: Some of the
activities discussed in this document
consumers of this document consult with legal
implicate federal criminal law and may
counsel to make proper use of its
violate State law and/or create civil
recommendations and analysis. 6
liability. Organizations anticipating they
will engage in those activities should
consult with their legal counsel to assess
the legality of planned activities. It may
also be beneficial in some circumstances
to cultivate a relationship with local FBI
and U.S. Secret Service field offices if
contemplating these types of operations.
Contact information is provided at the
end of this document.
2. Don’t Become a Victim: The
cybersecurity activities discussed in this
document may involve interacting with
sophisticated criminal actors. They
should not be undertaken without a
deliberate assessment of risk. An
organization planning to engage in these
activities should remain vigilant, institute
appropriate security safeguards, and
adhere to cybersecurity practices that will
minimize the risk that it will be
victimized.
The legal discussion in this document is
limited to U.S. federal criminal law. It does not
focus on civil liability, state law, or the law of
countries other than the United States, nor does it
cover potential regulatory restrictions.
II. Scenario Assumptions
The scenarios discussed below are
premised on the activities of private sector
information security practitioners who gather
information from Dark Market forums as part of
their cybersecurity activities. They are based
upon legally significant assumptions about the
way practitioners conduct their activities and the
practitioners’ intent.
5
The legal analysis for gathering information from forums that traffic in child pornography or related illegal
activities would likely differ from the analysis provided here, because it is illegal to use the Internet or cell phones to
knowingly advertise, distribute, receive, or possess child pornography, or to access it intentionally. See 18 U.S.C.
§§ 2251, 2252, and 2252A. Therefore, conducting intelligence gathering and other operations on those forums
would involve different legal considerations.
6
This document can serve as a starting point for a security practitioner’s discussion with his or her organization’s
legal counsel. Fact-specific application of the considerations highlighted in this document will allow an
organization to tailor its plans to fit its individualized assessments of legal benefits and risks before proceeding.
2
Tips on Lawfully Collecting
Intelligence in Online Forums
•
Passively Collecting Intelligence
Typically Is Not Illegal: Doing nothing
more than passively gathering
information from an online forum, even
one on which criminal conduct related to
computer crime is conducted, is unlikely
to constitute a federal crime, particularly
when done without any criminal intent.
However, accessing such a forum
without authorization or surreptitiously
intercepting communications occurring
on that forum could raise legal concerns
under the Computer Fraud and Abuse
Act (18 U.S.C. §1030) (CFAA) and the
Wiretap Act (18 U.S.C. § 2511).
•
Access Forums Lawfully: Accessing a
forum in an unauthorized manner, such
as by exploiting a vulnerability or by
using stolen credentials, can implicate
the CFAA and statutes like the Access
Device Fraud statute (18 U.S.C. § 1029).
•
Do Not Assume Someone Else’s Identity
without Consent: Using a fake online
identity to gain access to or participate in
a forum where criminal conduct is
occurring, standing alone, is typically
not a violation of federal criminal law.
However, assuming the identity of an
actual person without his or her
permission rather than manufacturing a
false persona can cause legal problems.
A. Security Practitioners
This document focuses on private sector
information security practitioners who obtain
information (i.e., cyber threat intelligence, stolen
data, security vulnerabilities, and malware) from
Dark Markets where tools and services associated
with the commission of computer crimes are
bought and sold and stolen data is available for
purchase. It assumes these activities are
conducted within the jurisdiction of United States
and in a manner that renders them subject to U.S.
federal criminal law. 7 It also assumes the
practitioners obtain information solely so that it
can be used and shared for legitimate
cybersecurity purposes (e.g., to help others
identify and defend against cybersecurity threats)
and with no criminal or malicious intent or
motive.
Practitioners engaged in these types of
online activities frequently use pseudonyms and
fabricated identities while operating on forums for
security and personal safety reasons. As discussed
below, fake identities should be entirely fabricated
and not involve assuming the identity of actual
people without their authorization. Fabricated
online identities should also not involve falsely
7
The application of federal criminal law to activities occurring online can be complicated. Some cybercrime
statutes have broad jurisdictional reach: for example, the Computer Fraud and Abuse Act (CFAA) covers cyber
attacks and intrusions against computers that are used in or affect interstate or foreign commerce and
communications, even when the targeted computers are outside the United States. See 18 U.S.C. § 1030(e)(2)(B).
Other criminal prohibitions have more limited reach and many have no extraterritorial application at all. See, e.g.,
European Cmty. v. RJR Nabisco, Inc., 764 F.3d 129, 141 (2d Cir. 2014), rev’d on other grounds, 136 S.Ct. 2090
(quoting Morrison v. Nat’l Austl. Bank Ltd., 561 U.S. 247, 264 (2010)) (Second Circuit holding that 18 U.S. § 1343
(the wire fraud statute) does not apply to wholly extraterritorial activity). The issue of applicability of federal
criminal law to online conduct is unavoidably fact-dependent and requires a statute-specific analysis. For the most
part, the scenarios in this document presume federal jurisdiction and that the federal criminal law being discussed
extends itself to the facts being considered. It does not, however, address whether the activity may implicate the law
of other countries, such as locations where forums may be hosted, which may be implicated by the activities.
3
claiming to be someone with any special status, such as a government official. 8
B. The Forums
The forums on which cybersecurity practitioners gather cyber threat intelligence vary.
Most are found on the Dark Web on sites accessible through the TOR network as hidden
services. 9 Some of these Dark Market forums are invitation-only sites known in information
security circles for being used to obtain illegal services and purchase stolen financial and
personal data. Others are openly accessible on the Dark Web, relying on the anonymity
furnished by TOR to shield their operators. The discussion threads in some of these forums
include topics of general interest related to coding and malware; however, the sites of greatest
interest to security practitioners openly advertise illegal services and the sale of stolen credit card
numbers, compromised passwords, and other sensitive information. 10
C. Accessing the Forums
The manner in which a forum is accessed can be legally material. Accessing forums
using legitimate credentials provided by forum operators is the best way of avoiding legal issues
concerning the means of access. Gaining access to forums using unauthorized means could
violate federal criminal law. For instance, using stolen credentials to access the forum could
constitute a violation of, inter alia, the CFAA. 11 Also, using an exploit or other technique to
access and gather information from a server or system on which the forum operates rather than
through intended (and therefore authorized) means could violate the CFAA and possibly other
federal criminal statutes that govern electronic surveillance. 12 Accessing forums contrary to a
forum’s policies may likewise raise legal issues about lawful access under the CFAA. 13
Forums operated by criminal actors may require proof that someone seeking access to the
forum has bona fide criminal intent. For instance, the forum operator may require the purchase
8
See infra p. 6 and note 17.
See supra p. 1 and note 4.
10
As noted at the outset, this paper does not address sites that traffic in or otherwise involve child pornography.
See supra p. 2.
11
See United States v. Nosal, 930 F.Supp.2d 1051, 1061 (N.D.Ca 2013) (unauthorized use of other employee’s
passwords supported charges under 18 U.S.C. § 1030(a)(4)); Global Policy Partners, LLC v. Yessin, 686 F.Supp.2d
631 (E.D.Va 2009) (a husband’s access to wife’s email account using her password without permission was a
violation of section 1030). Also, the CFAA may be implicated if the forum administrators levy specific
requirements that must be met for authorized access to the forum.
12
For instance, if electronic communications were intercepted without the communicants’ consent using a
surreptitiously installed “sniffer” or similar program installed on the host server, the Wiretap Act (18 U.S.C. § 2511
et seq.) could apply. Such activities could also violate other laws and the privacy of innocent parties whose web
sites share space on the same server.
13
Accessing an online site contrary to its access policies can raise questions about the lawfulness of such access.
Compare hiQ Labs, Inc. v. LinkedIn Corp., 938 F.3d 985 (9th Cir. 2019) (holding web scraping of publicly
accessible web site was not violation of CFAA where there was no circumvention of access permissions) with
Konop v. Hawaiian Airline, Inc., 302 F.3d 868, 876 (9th Cir. 2002) (discussing in dicta potential for web site access
restrictions to affect lawful access).
9
4
Best Practices I
•
•
•
Create “Rules of Engagement”: If your
organization conducts activities described
in this document, or is planning to do so, it
should prepare “rules of engagement” or a
“compliance program” with protocols that
outline acceptable conduct for its personnel
and contractors who interact with criminals
and criminal organizations. Following
deliberately crafted protocols that weigh
legal, security, and operational
considerations beforehand will discourage
rash decisions that could put an
organization, its employees, and its data in
jeopardy. Having documented rules may
also prove useful if the organization ever
faces criminal, civil, or regulatory action.
Be Prepared To Be Investigated: In
situations covered by this document,
federal investigators may be unable to
readily distinguish between criminals and
innocent parties engaged in intelligence
gathering. Consequently, it is possible that
individuals engaged in legitimate
cybersecurity may become the subject of a
criminal investigation. Therefore, it may
be beneficial to build an ongoing
relationship with the local FBI field office
or Cyber Task Force and the local U.S.
Secret Service Electronic Crimes Task
Force. Having trusted lines of
communication established in advance can
avoid misunderstandings about
intelligence-gathering activities.
Practice Good Cybersecurity: In the
situations discussed in this document,
information is exchanged with cyber
criminals. There is no such thing as being
“too suspicious” in those circumstances.
Practice good cybersecurity at all times and
use systems that are not connected to your
company network and are properly secured
when communicating with cyber criminals.
or delivery of malware or stolen personal
information. As explained below, complying
with such requests may place a practitioner in
legal jeopardy. 14
The way intelligence is gathered after
accessing a forum can also raise legal questions.
As discussed further below, collecting
information using screen captures and other
commonly used methods of memorializing
online information that do not bypass security
features of the site or access information in an
unauthorized manner may avoid potential
violations of law.
III. Cyber Threat Intelligence
Gathering
Using cyber threat intelligence to prepare
for or respond to cyber incidents can mitigate the
impact of malicious cyber incidents, or in some
cases even prevent them altogether. Timely,
accurate threat intelligence can protect an
organization and its customers from known
cybersecurity threats and vulnerabilities. As the
CsU has learned during its outreach about active
defense to industry, many cybersecurity
organizations consider gathering cyber threat
intelligence to be among the most fruitful of
cybersecurity activities. 15
Private sector organizations that
disseminate cyber threat intelligence gather it
from multiple sources, including in some cases
from online forums and other communication
channels where illegal activities are planned and
malware used to commit illegal acts and stolen
data are sold. Information gleaned from those
sources can be a rich source of cyber threat
intelligence and network defense information
14
See infra pp. 7-9.
See CSIS/DOJ Active Cyber Defense Experts Roundtable (March 10, 2015), available at
https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/05/18/CSIS%20Roundtable%205-18-15.pdf
15
5
about past, current, or future cyber attacks or intrusions; malware samples; criminals’ tactics,
tools, and procedures that are in current use or under development; and aliases and identities of
individuals engaged in attacks and intrusions. But when private parties join or participate in
these online forums to collect information for lawful purposes, the line between gathering threat
intelligence and engaging in criminal activity can be hard to discern. The following discussion
of different scenarios are intended to help organizations plan to conduct their intelligence
gathering activities in a manner that reduces the potential of violating federal criminal law.
A. Scenario 1: “Lurking” in Forums to Gather Cyber Threat Intelligence
If a practitioner reads and collects communications posted openly on the forums but does
not respond to forum communications or otherwise communicate with others on or through the
forums, there is practically no risk of federal criminal liability. Standing alone, posing as a
fictitious person or using a pseudonym to gain entry to and communicate on the forums does not
violate federal criminal law, so long as that conduct is not a means of committing fraud or other
crimes and access is gained in an authorized manner. 16 That said, assuming the identity of an
actual person without permission could prove legally problematic. Depending upon the actual
person being impersonated and the actions taken under the assumed identity, a practitioner could
face criminal and civil legal action. 17
B. Scenario 2: Posing Questions on Criminal Forums
If a practitioner decides to more aggressively gather intelligence by posting inquiries on
the forum seeking information about illegal activities, the practitioner’s actions will increase the
risk of becoming the subject of a criminal investigation. While asking general questions poses
only marginal legal risk, that risk increases substantially if a practitioner’s postings appear to
solicit the commission of a crime. Soliciting or inducing the commission of a computer crime
can expose a practitioner to criminal liability. 18
If a practitioner does not intend to use information obtained on a forum to commit a
federal criminal violation, asking questions and soliciting advice on the forum is unlikely to
constitute a crime. However, law enforcement investigates forums where criminal activity is
taking place and asking questions and soliciting advice about criminal conduct is an indication
that a crime may be occurring. Consequently, there is a possibility that the practitioner’s
inquiries and exchanges with others on the forum that appear to involve discussions of criminal
conduct could implicate the practitioner in a criminal investigation of the forum or its members.
16
See supra Section II.C.
For example, the impersonation of an officer or employee of the United States is a violation of federal criminal
law. See 18 U.S.C. § 912. Some states have also created civil causes of action for online impersonation. See, e.g.,
WA ST 4.24.790 (June 7, 2012) (Washington State statute for “electronic impersonation—Action for invasion of
privacy).
18
The crime of solicitation involves seeking another person to engage in a specified criminal act. See, e.g., Cal.
Penal Code § 653(f) (West 2016). There are few federal solicitation statutes that could apply to solicitation of
activity that could constitute a computer crime. See, e.g., 18 U.S.C. § 2512(1)(c) (advertising of unlawful electronic
interception device). There are, however, many state solicitation statutes that might apply if the relevant conduct
occurs within the jurisdiction of that state. In addition, a solicitation could lead to aiding and abetting a federal
crime or conspiracy to commit a federal crime. See, e,g., 18 U.S,C. §§ 2(a), 371.
17
6
This could subject the practitioner to investigative scrutiny. Practitioners and organizations can
take steps to mitigate that risk, though.
For instance, they can document their operational plans for conducting cyber threat
intelligence gathering and keep records of their online activities and how information was
gathered and used. In the event of a criminal investigation, such records may help establish that
their conduct was legitimate cybersecurity activity and help law enforcement determine that a
practitioner’s actions were executed in furtherance of the company’s legitimate cybersecurity
operations, as opposed to the actions of a rogue employee engaged in illegal conduct.
An organization should also establish policies and protocols that have been vetted with its
legal counsel to guide its employees’ and contractors’ activities on forums (and anywhere else). 19
Having vetted “rules of engagement” or a “compliance program” can help prevent personnel
from accidentally or unintentionally put their organization and its employees in legal jeopardy or
risk compromising its security. It may also be beneficial to inform law enforcement before
engaging in these intelligence-gathering activities by building an ongoing relationship with the
local FBI field office or Cyber Task Force and the local U.S. Secret Service field office or
Electronic Crimes Task Force. Early engagement with law enforcement may also help ensure
that a practitioner’s activities do not unintentionally interfere with an ongoing or anticipated
investigation by law enforcement. Contact information is provided at the end of this document.
C. Scenario 3: Exchanging Information with Others on the Forum
If a practitioner becomes an active member of a forum and exchanges information and
communicates directly with other forum members, the practitioner can quickly become
enmeshed in illegal conduct, if not careful. It may be easier for an undercover practitioner to
extract information from sources on the forum who have learned to trust the practitioner’s
persona, but developing trust and establishing bona fides as a fellow criminal may involve
offering useful information, services, or tools that can be used to commit crimes. Engaging in
such activities may well result in violating federal criminal law.
Whether a crime has occurred usually hinges on an individual’s actions and intent. A
practitioner must avoid doing anything that furthers the criminal objectives of others on the
forums. Even though the practitioner has no intention of committing a crime, assisting others
engaged in criminal conduct can constitute the federal offense of aiding and abetting. 20 An
individual may be found liable for aiding and abetting a federal offense if her or she takes an
affirmative act—even an act that is lawful on its own—that is in furtherance of the crime and
conducted with the intent of facilitating the crime’s commission. 21 Actively participating in a
19
Such policies and procedures—sometimes called rules of engagement or a compliance program—may give
direction on topics like gaining access to online forums, creating an online persona, and engaging in potentially
criminal conduct.
20
Under the federal aiding and abetting statute, one who “aids, abets, counsels, commands, induces or procures its
commission” or “willfully causes an act to be done which if directly performed by him or another would be an
offense against the United States” may be guilty of aiding and abetting and is punishable as the principal. See 18
U.S.C. § 2.
21
Rosemond v. United States, 572 U.S. 65, 71 (2014).
7
criminal venture with full knowledge of the circumstances involved—even if the actor does not
agree with all aspects of that criminal venture—is sufficient to establish aiding and abetting
liability. 22
For instance, a practitioner who provides members of the forum with technical assistance
regarding malware knowing the advice will help them breach a network could violate the federal
criminal aiding and abetting statute, if the forum members execute their plan–even if the
practitioner did not intend to help commit that particular crime. Moreover, even if the
practitioner does not intend to aid the commission of a crime and ultimately is not charged with
committing a crime, such assistance might bring
unwanted and costly investigative scrutiny.
Best Practices II
•
Information about an ongoing or
impending computer crime uncovered
during intelligence gathering activities
should be promptly reported to law
enforcement through contacts—ideally
already established— at the local FBI
field office or Cyber Task Force and the
local U.S. Secret Service field office or
Electronic Crimes Task Force (ECTFs).
•
In some criminal forums, participants
may be required to establish their
criminal bona fides by assisting in a
criminal act or furnishing proof that they
have committed a prior offense. Do not
provide any valid, useful information
that can be used to facilitate a crime.
Doing so could result in civil or criminal
liability.
•
Involve your legal department in
operational planning. They may be able
to spot legal issues and provide guidance
that can avoid legal problems.
A practitioner must also avoid violating the
federal conspiracy statutes. 23 The conspiracy
statutes apply when an individual enters into an
agreement with at least one other person to commit
a federal crime; some statutes also have as an
element that someone make any overt act in
furtherance of that crime. 24 So, even if providing
information to an individual on a forum is not
itself a federal criminal offense, the practitioner
could still have engaged in a criminal conspiracy,
if the practitioner agreed that a crime would occur,
regardless of whether it actually happens or not. 25
The general federal conspiracy statute requires
some member of the conspiracy to act in
furtherance of the conspiracy, but that act need not
itself be a crime, nor must the act be performed by
the person charged. 26 The CFAA has its own
conspiracy provision that only requires an
agreement to commit a violation of the CFAA
without the commission of any overt acts in
furtherance of the conspiracy. 27 Even so, if the
practitioner does not intend to commit an offense
22
See id. at 78.
18 U.S.C. § 371. The federal conspiracy statute makes it a crime for “two or more persons [to] conspire either to
commit any offense against the United States, or to defraud the United States, or any agency thereof in any manner
or for any purpose, and one or more of such persons do any act to effect the object of the conspiracy….” Id.
24
Braverman v. United States, 317 U.S. 49, 53 (1942).
25
See Ocasio v. United States, 136 S. Ct. 1423, 1432 (2016) (“It is sufficient to prove that the conspirators agreed
that the underlying crime be committed by a member of the conspiracy who was capable of committing it. In other
words, each conspirator must have specifically intended that some conspirator commit each element of the
substantive offense.”).
26
See Braverman, 317 U.S. at 53 (“The overt act, without proof of which a charge of conspiracy cannot be
submitted to the jury, may be that of only a single one of the conspirators and need not be itself a crime.”).
27
See 18 U.S.C. § 1030(b).
23
8
and has not in fact agreed with another party to achieve a criminal objective, the practitioner has
not participated in a criminal conspiracy under federal law. 28
In sum, a security practitioner should take care to avoid taking any action that would
assist others in the commission of a crime or agreeing that a crime should occur. Practitioners
engaged in these sorts of intelligence gathering activities should remain mindful that their
communications and actions are occurring in the context of an online site that exists to facilitate
criminal conduct and with individuals who may be planning to commit crimes. The practitioner
should avoid providing any true, accurate, or useful information that could advance such crimes.
In the event the practitioner becomes the target of a federal criminal investigation,
investigators will likely attempt to determine intent, in part, using extrinsic and circumstantial
evidence. Consequently, as suggested above, a practitioner and his or her employer should
maintain records that document the practitioner’s actions on the forums and the legitimate
business purpose for the practitioner’s activities so they can establish a legitimate motive and the
steps taken to avoid furthering illegal activities.
IV. Purchasing Stolen Data and Vulnerabilities for Cybersecurity Purposes
Some cybersecurity firms monitor Dark Markets for specific types of information as a
service to their customers. They may search for customer records or other types of sensitive
customer data being offered for sale, because the sale of such information in Dark Markets can
be a sign of a previously undetected data breach. They may also search for malware or security
vulnerabilities that target their customers’ networks or products, which may indicate that a
customer’s data and assets are ripe for exploitation. When these types of information are
discovered for sale online, a cybersecurity organization may attempt to purchase them or broker
a deal with the seller for their removal from a Dark Market.
Negotiating with anonymous parties engaged in selling stolen property or security
vulnerabilities on the Dark Web creates substantial risk of producing an array of undesirable
outcomes: the seller may take the purchaser’s payment without producing the promised data;
may breach the agreement by selling copies of the data to others; may not have possession or
control of all copies of the stolen data and, therefore, be unable to stop it from being further
disseminated; may use the proceeds to fund more crimes; or may even produce a trojanized
version of the data or vulnerability intended to compromise the purchaser’s systems. These risks
are compounded by the fact that a merchant selling illicit goods may anticipate that an
organization cheated out of its money after striking a deal with a Dark Market merchant will be
reluctant to report the incident to the authorities.
An organization that is swindled out of its money by a Dark Market merchant is also
likely to have little legal recourse because the seller will often be anonymous; located in a
country beyond the reach of U.S. courts; and/or was paid using an untraceable, irrevocable
28
United States v. Mahkimetas, 991 F.2d 379, 383 (7th Cir.1993) (A federal conspiracy requires an agreement
among individuals who intend to carry out the agreed-upon criminal act).
9
payment method. For all of these reasons, organizations should be wary of attempting to obtain
stolen data and security vulnerabilities in this manner.
Still, some organizations may be willing to assume these risks because, on balance, they
anticipate that there will be commensurate benefits. For instance, they may only seek to obtain a
copy of their stolen data so they can assess the nature and scope of a previously undetected data
breach and patch their networks to avoid further loss. Also, cybersecurity firms may be able to
use the stolen information to create intelligence reporting that others can use to protect their
networks better.
Setting aside questions about effectiveness and practicality, purchasing one’s own stolen
data—or, in the case of a cybersecurity firm, the data of a party that authorizes the purchase of its
stolen data—raises legal concerns that warrant consideration. At the outset, federal prosecutors
have not typically brought charges against parties who merely attempt to purchase their own
stolen data or buy a security vulnerability. However, a party engaged in those activities faces
legal risks discussed below that should be considered.
A. Scenario 1: Purchasing Stolen Data
The scenarios in this section focus on different aspects of purchasing stolen data, each of
which can have an impact on the legal analysis:
•
•
•
Whether the purchaser is the legitimate owner of the data: Is the stolen data being
purchased by the data owner or the data owner’s authorized agent?
The type of data being sold: Is the stolen data the type of information whose transfer or
possession is prohibited by federal law (e.g., stolen credit card information or trade
secrets)?
The identity of the seller: Is the seller someone with whom federal law prohibits the data
owner from transacting business?
Each of the scenarios below uses the same assumptions discussed in the intelligence
gathering scenarios discussed above: i.e., assumptions about the security practitioners, the nature
of the forums accessed, and the means of accessing such forums. 29 However, the discussion here
focuses on practitioners who discover data for sale that appears to belong to their cybersecurity
company’s customers. In these hypothetical cases, the practitioners contact the seller as
instructed on the Dark Web site and, with the customer’s authorization, offers to purchase the
data. These hypotheticals also assume that payment is made and the seller produces the data as
agreed. 30
1. The Ownership of the Data
As mentioned above, purchasing one’s own stolen data typically poses little risk of
federal prosecution. However, while reviewing the stolen data, the purchaser discovers that the
29
See infra pp. 2-4.
For the sake of this legal analysis, it is necessary to presume that the transaction is successful. For the reasons
outlined above, there are no guarantees that an effort to purchase stolen goods online will produce the desired
outcome.
30
10
tranche of data produced by the Dark Market seller includes data that belongs to other
companies. It turns out, the purchaser’s stolen data is commingled with data that was likely
stolen from other data breach victims.
If the purchaser did not know, and had no reason to know, that the stolen data being
bought belonged to others, there is little chance of facing criminal prosecution for purchasing it.
Subject to the exceptions discussed below, criminal liability for possessing or handling stolen
data generally requires the intent to use the data in an unlawful manner, which this document
presumes the practitioner lacks. For instance, the access device fraud statute requires an intent to
defraud and the theft of trade secrets statute requires an intent to convert the information to the
economic benefit of anyone other than its owner. 31
But purchasing another party’s stolen information without permission or authority can
raise questions about the purchaser’s intent that invite investigative scrutiny to determine the
purchaser’s motive. To manage this risk, upon recognizing that the purchased data contains
information that it does not have the right to possess, the purchaser should promptly sequester it
and not further access, review, or use it. The purchaser should then either immediately contact
law enforcement and provide it with the data and/or inform the actual data owner, to the extent it
can be determined, that it is in possession of its data. These steps will help demonstrate the lack
of any criminal intent that would merit criminal prosecution. When contacting someone whose
stolen data has ended up in your possession, avoid communicating in a manner that could be
misconstrued to be an extortionate demand. 32
2. The Nature of the Data
The type of stolen data being sold will also determine whether any criminal statutes
prohibit it from being purchased. As noted above, many of the federal criminal statutes
associated with the type of stolen data that tends to be sold in Dark Markets—e.g., passwords,
account numbers, and other personally identifiable information—only apply if there is intent to
further another crime: for instance, an intent to use the information to defraud. 33 For this reason,
a purchaser of the stolen data who lacks a criminal motive is unlikely to face prosecution under
those statutes.
While unwittingly purchasing another party’s stolen information is also typically unlikely
to pose a risk of criminal liability, knowingly purchasing another party’s stolen data without that
party’s authorization can pose some legal risk. It is much more likely to raise questions about
the purchaser’s motives and result in scrutiny from law enforcement and the legitimate data
owner, particularly if a trade secret is involved. 34
31
See 18 U.S.C. §§ 1029(a)(1)-(8), (10); 18 U.S.C. § 1832(a).
A party whose stolen data has ended up in the possession of a cybersecurity practitioner could interpret a
practitioner’s effort to impose conditions on the return of the stolen data to be an extortionate demand. Practitioners
should avoid making the return of stolen data dependent on purchasing the practitioner’s services or satisfying a
demand for anything else of value.
33
See 18 U.S.C. §§ 1029(a)(1)-(8), (10).
34
“[T]he term “trade secret” means all forms and types of financial, business, scientific, technical, economic, or
engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes,
32
11
Accidentally purchasing a trade secret would not violate the Theft of Trade Secrets Act
(the Act), but receiving, buying, or possessing a trade secret 35 knowing that it was stolen or
obtained without authorization can violate it, if other elements of the statute are met. The Act
prohibits the transfer or other handling of a trade secret that is converted to the benefit of anyone
other than the rightful trade secret owner, intending or knowing that doing so would injure the
owner of the trade secret. 36 So, any use of that information would merit examination by the
authorities or the trade secret owner. The Act includes a civil cause of action, so a trade secret
owner could pursue civil action, even if a criminal prosecution is declined.
As recommended above, the best means of mitigating the risk of being investigated and
prosecuted for unintentionally purchasing stolen data that belongs to others—other than by
ensuring the seller does not produce material that does not belong to the purchaser—is by
promptly contacting and surrendering such extraneous data to law enforcement and/or the
rightful data owner. Doing so will minimize the risk that a purchaser’s unintended possession of
such data will be misinterpreted as a criminal act and could help mitigate civil liability.
3. The Nature of the Seller
Engaging in a financial transaction with certain individuals or organizations can violate
the law. For instance, 18 U.S.C. § 2339B prohibits providing material support, or attempting or
conspiring to provide material support, to a group that has been designated a foreign terrorist
organization. 37 A violation of section 2339B requires a subject to know about the organization’s
connection to terrorism. It does not, however, require that the subject have the specific intent to
further the organization’s terrorist activities. 38 Therefore, if a practitioner bought the stolen data
knowing the seller was a member of such a foreign terrorism group, the practitioner would
violate section 2339B.
Under the International Emergency Economic Powers Act (IEEPA), 39 a similar
prohibition would bar the purchaser from buying the stolen data from certain individuals or
methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how
stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing if—
(A) the owner thereof has taken reasonable measures to keep such information secret; and
(B) the information derives independent economic value, actual or potential, from not being generally
known to, and not being readily ascertainable through proper means by, another person who can obtain
economic value from the disclosure or use of the information.”
18 U.S.C. § 1839(3).
35
18 U.S.C. § 1832(a)(3).
36
Section 1832(a)(2) prohibits unauthorized copying, duplication, sketching, drawing, uploading, altering,
destroying, photocopying, replication, transmission, delivery, sending, mailing, communicating, or conveying a
trade secret to the economic benefit of anyone other than the owner thereof, and intending or knowing that the doing
so will injure any owner of that trade secret.
37
Liability under section 2339B attaches when a person has knowledge that an organization has been designated a
terrorist organization under section 219 of the Immigration and Nationality Act, that the organization has engaged or
engages in terrorist activity as defined in section 212(a)(3)(B) of the Immigration and Nationality Act, or that the
organization has engaged or engages in terrorism as defined in section 140(d)(2) of the Foreign Relations
Authorization Act.
38
Holder v. Humanitarian Law Proj., 561 US 1, 17 (2010).
39
50 U.S.C. § 1705.
12
entities designated by the U.S. Government. In the last several years, the U.S. Government has
issued executive orders sanctioning Iranian, North Korean, and Russian individuals and entities
for national security reasons, including cyber-related misconduct. 40 These executive orders and
regulations, among other things, prohibit any trade or economic transaction with designated
targets. Among other things, IEEPA criminalizes willful violations of these executive orders and
regulations and their prohibitions on economic and trade transactions.
The Department of Justice’s National Security Division prosecutes criminal violations of
IEEPA. IEEPA’s willfulness standard would pose significant barriers for criminally prosecuting
a practitioner under IEEPA based on the facts of the scenario. Because the identity of anyone
selling stolen data in a Dark Market is likely to be masked by a pseudonymous online persona, it
is unlikely that the true identity of the seller of stolen data will be known or knowable to a buyer.
Where a buyer does not know the identity of the seller and, therefore, does not know the buyer is
the subject of economic or trade sanctions, a criminal prosecution requiring proof of willful
intent might not be possible to bring. The National Security Division’s Counterintelligence and
Export Control Section can be reached at (202) 233-0986.
Civil liability, however, can also be imposed under IEEPA. The U.S. Department of the
Treasury’s Office of Foreign Assets Control (OFAC) is responsible for civil enforcement of U.S.
economic and trade sanctions regimes. OFAC administers and enforces economic and trade
sanctions based on U.S. foreign policy and national security goals. Civil enforcement of IEEPA
may be imposed on the basis of “strict liability,” meaning a party could be civilly liable even if it
did not know it was engaging in a transaction with an individual or entity that was the subject of
trade or economic sanctions. Unauthorized transactions under OFAC’s IEEPA-administered
regulations may result in a civil monetary penalty. The statutory maximum civil penalties are
adjusted annually for inflation. 41
Companies should make every effort to ensure they are not dealing with an individual or
entity subject to economic or trade sanctions. OFAC encourages companies to implement a riskbased compliance program to mitigate the risks of dealing with persons, regions, or countries
subject to economic or trade sanctions prohibitions. To assist the public, OFAC published on its
website a document, A Framework for OFAC Compliance Commitments, intended to provide
organizations with a framework for the five essential components of a risk-based sanctions
compliance program.
Having a reasonable compliance program (or “rules of engagement”) in place that
includes measures for checking whether foreign parties with whom business is transacted are
subject to economic and trade sanctions is a prudent way of avoiding criminal liability under
IEEPA and may mitigate the likelihood of civil liability as well. OFAC also furnishes tools to
help identify Specially Designated Nationals and Blocked Persons who are subject to U.S.
40
See, e.g., Blocking the Property of Certain Persons Engaged in Significant Malicious Cyber-Enabled Activities,
Exec. Order No. 13694, 80 Fed. Reg. 18077 (April 1, 2015).
41
The statutory maximum is set by the Federal Civil Penalties Inflation Adjustment Act Improvements Act of 2015,
Sec. 701 of Public Law 114-74.
13
sanctions, such as the Sanctions List Search 42 and the Resource Center web pages for Sanctions
Programs and Country Information. 43 These resources may be consulted to mitigate exposure to
civil or criminal liability under IEEPA and other sanctions-related statutes. The public is also
encouraged to review the Economic Sanctions Enforcement Guidelines, 31 C.F.R. part 501
Appendix A, for more information regarding OFAC’s enforcement of U.S. economic sanctions,
including OFAC’s voluntary self-disclosure program and the factors OFAC generally considers
when determining an appropriate response to apparent violations. 44
The public can contact OFAC directly by calling the OFAC Hotline toll free at 1(800)
540-6322 or locally at (202) 622-2490 or by sending an email to ofac_feedback@treasury.gov.
Additionally, requests for specific licenses may be submitted online at OFAC’s website at
www.treasury.gov/ofac. Inquiries regarding pending license requests may be made at (202) 6222480.
Scenario 2: Purchasing Vulnerabilities
If, while gathering cyber threat intelligence in Dark Markets, a practitioner discovers
security vulnerabilities being offered for sale, the practitioner may decide to purchase them so
that they may be disclosed to the relevant vendor or develop a patch to prevent the vulnerabilities
from being exploited, particularly if the vulnerabilities target a practitioner’s customers. Some
practitioners also search for new variants of malware being sold in Dark Markets so they can be
analyzed and signatures can be developed for use in virus scanning products.
While security vulnerabilities and malware are frequently used to commit computer
crimes and it is a federal crime when they are sold in support of criminal conduct, the mere
purchase of security vulnerabilities or malware is not generally illegal, standing alone and
without any criminal intent. There are, however, two exceptions that warrant mention. First, the
possession or sale of software designed to intercept electronic communications surreptitiously
may violate the Wiretap Act, which prohibits the intentional possession of any “electronic,
mechanical, or other device knowing or having reason to know that the design of such device
renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or
electronic communications.” 45 Certain malware designed to intercept electronic communications
may fall within this definition and, therefore, be unlawful to possess. 46 The best way of
minimizing legal risk if purchasing malware that may fall under section 2512 is to coordinate
with law enforcement before any transaction occurs.
42
Available at https://sanctionssearch.ofac.treas.gov/
Available at https://www.treasury.gov/resource-center/sanctions/Programs/Pages/Programs.aspx and
https://www.treasury.gov/resource-center/sanctions/Programs/Pages/Programs.aspx.
44
Available at https://www.ecfr.gov/cgi-bin/textidx?SID=093f4d5ea37955ea6a767ad337f4f75d&mc=true&tpl=/ecfrbrowse/Title31/31cfr501_main_02.tpl
45
18 U.S.C. § 2512(1)(b)
46
See, e.g., Luis v. Zang, 833 F.3d 619, 635 (6th Cir. 2016) (Upholding civil claim under section 2512 against
manufacturer of software used to intercept online communications surreptitiously and husband who used the
software to capture wife’s communications). For more information about the application of the Wiretap Act, consult
prior CCIPS publications on computer crime. See, e.g., U.S. Department of Justice Office of Legal Education,
Prosecuting Computer Crimes 59-72 (2009).
43
14
The second exception is when the purchase is prohibited because the seller is a
designated foreign terrorist organization or an individual or entity that is subject to economic or
trade sanctions under IEEPA. These concerns are the same ones that arise when purchasing
stolen data. See the discussion above explaining legal liability under an authority such as IEEPA
and how best to address it.
V. Conclusion
This paper is intended to help private sector cybersecurity practitioners by identifying
steps they can take and issues they should consider to avoid violating federal criminal law while
conducting cybersecurity activities involving criminal forums. When properly conducted, such
activities can improve organizations’ cybersecurity readiness and help prepare them to respond
to cybersecurity threats effectively and lawfully.
How to Contact Law Enforcement
•
•
•
If you have a pre-established relationship with your local FBI or U.S. Secret Service field
office, notify your usual point of contact of your plans to conduct intelligence gathering
and recovery of stolen data or report any information concerning an impending, ongoing,
or past crime.
Find your local FBI or U.S. Secret Service field office by visiting:
https://www.fbi.gov/contact-us/field-offices
https://www.secretservice.gov/contact/
For additional information and resources, please visit:
https://www.justice.gov/criminal-ccips
15

Purchase answer to see full
attachment

error: Content is protected !!