Skip to Content
  • Home
  • About the Bar
  • Mission
  • Forms
  • Sitemap
    • Licensee Directory
      Last Name:
      First Name:
      Bar Number:
      City:


    • Login
OSB Logo

Oregon State Bar Bulletin — FEBRUARY/MARCH 2014







The Chinese are the villains, engaged in a pervasive course of state-sponsored cyberattacks.

Unless you’ve been living the life of a hermit, you’ve heard that a lot in the course of the last year.

But now we’ve learned that the cybersecurity of law firms is at risk from a newly discovered source — the National Security Agency. After 9/11, many Americans embraced the Patriot Act, numb from the tragedy and justifiably concerned about terrorist plots on American soil. After a time, most folks became complacent and more or less bought the government’s reassurance that federal surveillance involved primarily foreigners and that it was not snooping on the activities of ordinary Americans.

That proved wrong in a big way. Courtesy of Edward Snowden (like him or hate him, he exposed a lot of illegal and unconstitutional activities), we have learned that we are closer to the “Big Brother” state of George Orwell’s 1984 than we ever thought possible. So let’s take a look at what we now know and then we’ll turn to the implications for lawyers.

The NSA’s Bag of Tricks — and its Targets

We got up as we wrote this to news that the NSA had hacked into the video conferencing system of the United Nations and was listening in on various colleagues, reputedly focusing in on the European Union. Terrific, that ought to shore up our strained relations with our European allies.

Thanks again to Edward Snowden, theWashington Post published a story based on an internal National Security Agency audit and other top secret documents. The story indicates that the NSA has broken privacy rules or overstepped its legal authority thousands of times each year since it was granted broad new powers in 2008.

And just last month (as this issue of the Bulletin was going to press), the New York Times reported that an American law firm was monitored while representing a foreign government in trade diisputes with the United States. (See http://ridethelightning.senseient.com for details and commentary.)

Most of the violations involved unauthorized surveillance of Americans or foreign intelligence agents in the United States, surveillance that is restricted under statute and executive order. They resulted in the interception of U.S. emails and telephone calls.

How do they do that? Recent reports have indicated that the NSA is even intercepting shipments of computers purchased online in order to infect them with spyware or replace components with its own malware-installed hardware. That’s pretty gutsy. Of course you need to be specifically targeted by the NSA before you’ll get a little “something extra” arriving along with the shiny new computer.

Suppose you didn’t order a new computer. How could the NSA intercept your data? Additional revelations were disclosed at the recent Chaos Communications Congress. Apparently, there is a whole catalog of equipment and software that the NSA is willing to sell to other agencies. One such device is called the NIGHTSTAND. It is designed to hack Wi-Fi devices from eight miles away. It is a standalone tool and can exploit targets including Win2K, WinXP, WinXP SP1 and Win XP SP2 systems running Internet Explorer version 5.0-6.0. There is no report that they have hardware for the more modern operating systems or browsers. Yet another reason to make sure you are up to date with patches and versions.

What is XKeyscore?

Again by way of a Snowden leak, The Guardian revealed new details on a very powerful, secret program run by the U.S. government called XKeyscore. With the program, NSA employees can obtain everything from phone numbers to email addresses. The NSA can also see email content, Internet activity, browser history and an IP address. According to the files and to Snowden, no warrant is needed.

Has the NSA been using this capability on U.S. citizens? With the information currently available, we’re not sure. If there is any cold, cold comfort in the new revelations, it is that the sheer volume of data means that content is only available for three to five days and metadata for 30 days. Each day, 1 to 2 billion records are added, necessitating deleting or transferring data. To solve that problem, it appears that the NSA has created other databases where “interesting” information can be stored for later analysis.

Microsoft Helps the NSA View Its Encrypted Data

According to yet another article from The Guardian, citing top secret documents from you-know-who, Microsoft has:

Helped the NSA circumvent its encryption so that it can intercept web chats on the Outlook.com portal.

Given pre-encryption stage access to email on Outlook.com, including Hotmail.

Allowed the NSA easier access to SkyDrive.

Helped to triple the amount of Skype video calls being collected through Prism.

FISA Court Becoming a Parallel Supreme Court

The Foreign Intelligence Surveillance Act (FISA) created the Foreign Intelligence Surveillance Court (FISC), often referred to as the FISA Court. Commentators have said it is now almost a parallel Supreme Court. They are particularly troubled by a recent decision of the court creating a “special needs” doctrine.

The special needs doctrine was established in 1989 by the Supreme Court in a ruling allowing the drug testing of railway workers, finding that a minimal intrusion on privacy was justified by the government’s need to combat an overriding public danger. The FISC judges have expanded that doctrine by ruling that the NSA’s collection and examination of Americans’ communications data to track possible terrorists does not run afoul of the Fourth Amendment. A once narrow doctrine is now very broadly used to collect communications.

It appears that a central concept of recent decisions is that collecting “metadata” — the times of phone calls, numbers dialed, length of call etc. — is fine if the government establishes a valid reason under national security regulations. Content is protected. As one official said, “The basic idea is that it’s okay to create this huge pond of data but you have to establish a reason to stick your pole in the water and start fishing.” We’re not even sure we believe that official — our mental image is of a dragnet being pulled through many bodies of water.

To close with one of the most disquieting facts recently revealed, the NSA can now reach roughly 75 percent of all Internet traffic in the United States And while the NSA’s purported mission is to target foreigners, the NSA sometimes retains the written content of emails sent between citizens within the United States How often is sometimes? We don’t know and don’t believe there is any reliable answer to the question. But it disturbs us even more that the United States has almost completed construction of a datacenter in Utah that would, some reports say, hold five years of the communications of U.S. citizens. Of course, that’s not what the government says it will be doing with this top-secret datacenter. “Trust Me, I’m From the Government?” That just isn’t working out lately, folks. Reassuring words from the president notwithstanding, the process has not been at ALL transparent. And it took a whistleblower to learn the truth.

Even the ABA, at its August meeting of the House of Delegates, passed a cybersecurity resolution. The original resolution only talked about stopping intrusions into lawyers’ networks by foreign governments — it was changed to simply “governments” in light of our new knowledge of what our own government is doing.

Quantum Computers

Edward Snowden has released additional documents revealing NSA’s effort to build “a cryptologically useful quantum computer” as part of a $79.7 million research program. Quantum computers have long been a goal of many in the scientific community. If the NSA is successful in building a quantum computer, all current forms of public key encryption would be broken. The common belief is that the NSA is no further along with their quantum computer development than anybody else in the world. We’re probably safe for the time being.

So, How is a Law Firm to Keep its Data Confidential?

The NSA revelations have serious implications for lawyers. We used to tell lawyers that Skype was secure — but then Microsoft bought it and began changing the network architecture by running the calls through its servers — and now, apparently, unlocking data for the NSA from time to time. And what about the lawyers who are storing their data in SkyDrive? Or the solos who are using Hotmail?

Frankly, the NSA revelations have given us a lot of pause. It is one thing to protect against foreign governments who have to perform cyberattacks to get your data and quite another to protect against your own government when it is given the keys to your data. How can you be ethically compliant in light of the potential threat from our own government?

Battening Down the Hatches

Cloud Computing

Roughly half of all law firms are now holding at least some data in the cloud. The recent news has shaken them, as well it should. But we are not preaching a mass exodus from the cloud. Two major points here:

If you are fundamentally storing all your data in a datacenter, your biggest problem is whether the datacenter personnel can gain access to your data. For this reason, we do not recommend putting law firm data on servers owned by the datacenter. It doesn’t matter whether there is a master decryption key or whether a “back door” is built in. The safest way to store data in a datacenter is to use a hybrid solution — where you own the equipment and the access to your equipment and data is restricted to yourself and your own I.T. folks in locked racks. Any emergency access to the data, by contract, should require immediate reporting to you and, again by contract, you should receive notice of any law enforcement request for the data right away so you can file a motion to quash. Major players in the market may not give you these terms but the smaller ones will. One caveat: If a request is made under the Patriot Act, you’re toast — your data will be handed over on a silver platter. But the vast majority of law enforcement requests are not made pursuant to the Patriot Act.

If you are using specific clouds to store data, encrypt your data before sending it. A great example is Dropbox, now utilized by so many litigators. If you encrypt your Word or PDF documents before putting them in Dropbox, it doesn’t matter that Dropbox holds a master decryption key (and it does). Even if it attempts to decrypt for the federal agents at the door, Dropbox can only provide them with garbage. What the feds can do with the data is apparently changing. News reports indicate increasing success in breaking encryption, but we have yet to see proof. And yes, encryption will work for SkyDrive, the iCloud (depending on the data type and device used), etc. And no, this is not hard. Stop being afraid of the word encryption. If you password protect a Word or PDF document (which you can do natively within the program — just search “Help”), it is encrypted. Just promise us you won’t send it as an attachment with the decrypt key in the text of the email.

Encryption

You should also be taking a hard look at encryption on your smartphones — iPhones are encrypted when configured with their PINs, poorly with a 4-digit pin — you need a complex password. BlackBerrys are natively encrypted when “Content Protection” is enabled. Android encryption must be turned on in Settings, but it is there.

No lawyer should be performing work on a personal machine. In today’s world, every lawyer should be issued a firm laptop and smartphone so that security can be controlled and monitored. This means no BYOD unless you are prepared to implement a MDM (Mobile Device Manager) solution to the tune of several thousands of dollars. All laptops, like smartphones, should have whole disk encryption.

Bottom line: You should be encrypting data on all devices. The one disclaimer is the recent news concerning the capabilities of the NSA. As noted security commentator, Bruce Schneier, has stated, “The NSA is breaking most encryption on the Internet.” This is accomplished by intercepting the data and compromising the secure certificate provider infrastructure or using intentional weaknesses inserted in encryption products. As an example, RSA Security released an advisory to stop using the Dual Elliptic Curve Deterministic Random Bit Generation (Dual EC DRBG) because of weaknesses in the algorithm. Apparently, the NSA had their fingers in the design of Dual EC DRBG. Some have even suggested using encryption and security products from vendors that are not based in the United States to minimize any potential NSA back doors. The good news is that a large number of products do not use the flawed Dual EC DRBG.

Should You Move Your Data Out of the Country?

Trust us, this is being done. But our answer, for the moment, is no. First, having data in foreign countries means you are subject to their laws — and cross-border data privacy issues are a nightmare. Second, don’t assume that NSA hasn’t gotten its hooks into foreign carriers. There has been a lot of evidence suggesting that it has. Personally, we would rather shore up our defenses at home. There are companies in the United States pledging that they will not cooperate with the government and lots of new customers for those companies.

Passwords

The government has already displayed an appetite for hacking. Don’t make it easy for them. Have strong passwords that are regularly changed. Enforce your password policies. Make sure passwords are not being shared — still a lamentably common practice.

Security Audits

We used to say that you needed security audits every six to 12 months to keep the Chinese and the cybercriminals out of your networks. Now we add that you need to protect your networks against our own government — sad, but true. By in large, big firms will go to big companies to perform these audits. Solos and small will head to smaller firms where the price tag isn’t so high. Get a referral from trusted friends, check out credentials, etc., but don’t fail to do these audits.

Training

We can never say it often enough. Human beings are the greatest security threat. Train them — over and over again — and remember that things change very quickly in the information security world. Even in a small firm, there should at least be annual training sessions by someone well versed in information security.

Parting Words

Lest we seem overly paranoid, we’ll give the parting words to George Washington — who better than the father of our country? “Government is not reason; it is not eloquent; it is force. Like fire, it is a dangerous servant and a fearful master.”

 

ABOUT THE AUTHOR
The authors are the president and vice president of Sensei Enterprises, Inc., a legal technology, information security and digital forensics firm based in Fairfax, Va. They can be reached by phone at (703) 359-0700 or through their website, www.senseient.com, or blog, ridethelightning.sensient.com.

© 2014 Sensei Enterprises Inc


— return to top
— return to Table of Contents



  • For The Public

      Public Legal Information

    • Public Information Home
    • Legal Information Topics
    • Oregon Juror Guide
    • Submit Ethics Complaint

    • Getting Legal Help

    • Finding The Right Lawyer
    • Hiring A Lawyer
    • Lawyers Fees

    • Client Services

    • Client Assistance Office
    • Client Security Fund
    • Fee Dispute Resolution
    • Public Records Request
    • Locating Attorney Files

    • Unlawful Practice of Law

    • UPL Information
    • UPL FAQ

    • Volunteer Opportunities

    • Public Volunteer Application
  • For Licensees

    OSB Login

    • Log In To OSB Site
    • Licensee Account Setup
    • Non-Licensee Account Setup
    • Reset Password

    OSB Resources

    • Career Center
    • Events
    • Forms Library
    • Marketplace
    • Online Resources
    • OSB Group Listings
    • Performance Standards
    • Rules Regulations and Policies
    • Surveys and Research Reports
    • Unclaimed Client Funds
    • Voting Regions and By-City
      County Information

    Benefits for Licensees

    • Log in to Decisis
    • – Decisis Information
    • – Decisis FAQ
    • – Inactive Licensee Subscriptions
    • No Cost Trust & Billing Software

    Legal Ethics

    • Legal Ethics Home
    • Find an Ethics Opinion
    • Bulletin Bar Counsel Archive

    Company Administrator

    • Company Administrator Home
    • Company Administrator FAQ
    • Authorization Form

    State Lawyers
    Assistance Committee

    • SLAC Info

    Volunteering

    • Volunteer Opportunities

    Court Information

    • Judicial Vacancies
    • Court Info | Calendars | Jury Info
    • Oregon Attorneys
      in Federal Court
    • Tribal Courts of Oregon

    OSB Publications

    • Bar Bulletin Magazine
    • – Bulletin Archive
    • – Legal Writer Archive
    • Capitol Insider
    • Disciplinary Board Reporter

    PLF Programs

    • (OAAP) Oregon Attorney
      Assistance Program
    • Practice Management Attorneys
    • Malpractice Coverage
  • CLE/Legal Publications

    CLE Seminars

    • CLE Seminars Home
    • Online Seminar Registration
    • General Info/FAQ

    My Account

    • My Content
    • My Events
    • Order History

    Legal Publications

    • Legal Publications Home
    • Log in to BarBooksTM
    • BarBooksTM FAQ
    • Online Bookstore
    • Legal Pubs Blog
  • Bar Programs

    Diversity & Inclusion

    • Diversity & Inclusion Home
    • Diversity Story Wall
    • D&I Programs
    • ACDI Roster
    • D&I Staff Contacts
    • D&I Links

    Legislative/Public Affairs

    • Legislative Home
    • Committee Contacts
    • Legislative Sessions
    • Staff Contacts
    • Useful Links

    Legal Services Program

    • LSP Home

    Oregon Law Foundation

    • OLF Home
    • Partners in Justice

    Fee Dispute Resolution

    • Fee Dispute Resolution Home

    Pro Bono

    • Pro Bono Home
    • Pro Bono Reporting
    • Volunteer Opportunities

    Lawyer Referral and Information Services

    • RIS Login
    • Summary of Referral and Information Services Programs
    • Lawyer Referral Service Info and Registration
    • Modest Means Program Registration Forms
    • Military Assistance Panel Training Info and Registration Form
    • Problem Solvers Registration Form
    • Lawyer To Lawyer Registration Form

    (LRAP) Loan Repayment Assistance Program

    • LRAP Home
    • LRAP FAQ
    • LRAP Policies
  • Licensee Groups

    Sections

    • Section Info/Websites
    • Joining Sections
    • CLE Registration Services
    • Standard Section Bylaws (PDF)
    • Leadership Resources
    • Treasurers Tools

    Committees

    • Home
    • Leadership Resources
    • Professionalism Commission
    • Volunteer Opportunities

    House of Delegates

    • HOD Home
    • HOD Resources
    • Meetings
    • Rules (PDF)
    • Roster (PDF)
    • Staff Contacts

    Board of Governors

    • BOG Home
    • Meetings & Agendas
    • Members
    • Liaisons
    • Committees
    • Resources
    • Task Forces

    Oregon New Lawyers Division

    • ONLD Home
    • Law Students
    • Student Loan Repayment
    • Committees
    • Upcoming Events

    Task Forces and Special Committees

    • Task Forces Home

    Volunteer Bars

    • List/Contacts
    • Leadership Resources

    Volunteering

    • Volunteer Opportunities
  • Licensing/Compliance

    Admissions

    • Admissions Home
    • Alternative Admittance
    • Applicants for Admission
    • Admissions Forms
    • Past Bar Exam Results

    Supervised Practice Portfolio Examination

    • SPPE Home

    Licensed Paralegal Program

    • LP Home

    Lawyer Discipline

    • Discipline Home
    • Disciplinary Board Reporter
    • Disciplinary Boards
    • Client Assistance Office
    • (SPRB) State Professional Responsibility Board

    Licensee Records

    • Address Changes
    • Good Standing Certificate
    • Request Discipline File Review

    MCLE

    • MCLE Home
    • Program Database
    • Forms
    • Rules (PDF)

    IOLTA Reporting

    • IOLTA Home
    • IOLTA FAQ
    • No Cost Trust & Billing Software

    Licensing Fees

    • Licensing Fee FAQ
    • Licensing Fee Payment

    Status Changes

    • Status Changes FAQ
    • Inactive Status Form
    • Retired Status Form
    • Active Pro Bono Status Form
    • Reinstatement Forms
    • Resignation Form A
    • Pending Reinstatements

    Unlawful Practice of Law

    • UPL Information
    • UPL FAQ

    Pro Hac Vice/Arbitration

    • Pro Hac Vice
    • Arbitration

    New Lawyer Mentoring Program

    • New Lawyer Mentoring Program Home

    Professional Liability Fund

    • Professional Liability
      Fund Website
For The Public

Public Information Home
Legal Information Topics
Oregon Juror Guide
Finding The Right Lawyer
Hiring A Lawyer
Lawyers Fees
Client Assistance Office
Public Records Request
Unlawful Practice of Law
Fee Dispute Resolution
Client Security Fund
Volunteer Opportunities
for the Public

For Licensees

BarBooksTM
Bulletin Archive
Career Center
Decisis
Judicial Vacancies
Legal Ethics Opinions
OSB Group Listings
OSB Login
OSB Rules & Regs
SLAC Info
Surveys and Reports
Volunteer Opportunities

CLE/Legal Pubs

CLE Seminars Home
Legal Publications Home

Bar Programs

Diversity & Inclusion
Fee Arbitration/Mediation
Legal Services Program
Legislative/Public Affairs
Loan Repayment
Assistance Program

Oregon Law Foundation
Pro Bono

Licensee Groups

Board of Governors
Committees
House of Delegates
Volunteer Bars
Oregon New
Lawyers Division

OSB Sections
Professionalism
Commission

Volunteer Opportunities

About The Bar

About the Bar
ADA Notice
Contact Info
Copyright Notice
Directions to the Bar
Meeting Room Rentals
Mission Statement
OSB Job Opportunities
Privacy Policy
Staff Directory
Terms of Use

Licensing/Compliance

Admissions
Client Assistance Office
Client Security Fund
IOLTA Reporting
Lawyer Discipline
MCLE
Licensee Fee FAQ
New Lawyer
Mentoring Program

Professional Liability Fund
Status Changes

Oregon State Bar Center

Phone: (503) 620-0222
Toll-free in Oregon: (800) 452-8260
Facsimile: (503) 684-1366

Building Location:
16037 SW Upper Boones Ferry Road
Tigard, OR 97224

Mailing Address:
PO Box 231935
Tigard, OR 97281

Oregon State Bar location Map

Copyright ©1997 Oregon State Bar  ®All rights reserved | ADA Notice | Mission Statement | Privacy Policy | Terms of Use