![]() |
< Day Day Up > |
![]() |
8.9. Domestic Legal IssuesLet us now revisit the earlier attack scenario, only this time it is a much larger attack. Our attacker now breaks into 100,000 computers and builds a series of large bot networks. The attacker now goes after a site that receives on the order of $1 million per day in advertising revenue. The attacker has taken her time and knows the available bandwidth to the victim site, and understands the network topology and response capabilities of the victim's upstream providers. She uses only sufficient numbers of DDoS agents at a time to take the site down, assuming it will be cleaned up over time by incident response teams and the attack capacity of the botnet will decrease over time. She brings in new attack networks at just the right time to keep the pain at a sufficiently high level. Using this tactic, the attacker can keep the attack going for more than a week. Legal counsel for any victim should consider the following issues when determining what advice and which course of action to take after an attack:
In an attacker liability suit, the person or persons responsible for the attack are sued. However, in a downstream liability suit, the plaintiff would be trying to prove negligence on the part of the owner of computers that were compromised and used to launch an attack against a third party. As previously mentioned, proving negligence involves showing, by a preponderance of the evidence, that four factors exist:
The key here is establishing a duty of care which is judged using a "reasonable person" standard (i.e., what would a reasonable person do to secure her computer, and did the defendant fail to do at least the same?). In other words, negligence cannot exist where there is no preexisting duty, or where a duty cannot be established. Laws that establish some form of requirement for computer security include the Gramm-Leach-Bliley Act [Ele], which suggests a number of security measures that banks, credit unions, and other financial institutions should implement to protect their computer databases (and institutes civil and criminal penalties for businesspeople who do not adequately protect personal or financial information from compromise due to computer intrusions). In the health care field, there is the Health Insurance Portability and Accountability Act (HIPAA) of 1996 [hip], which holds system administrators, information security officers, and administrators financially liable for disclosure of health-related information that could result from a computer intrusion. It is important to note that liability cases are usually brought in local courts. Thus, trial venue may become another important factor that comes into play (e.g., where did the "damage" actually occur?). |
![]() |
< Day Day Up > |
![]() |