SlideShare a Scribd company logo
Privacy & Security 
Law Report® 
VOL. 13, NO. 39 OCTOBER 6, 2014 
Cybercrime 
Arkady Bukh, Bukh & Associates PLLC 
V i e w s o n C y b e r c r i m e , H a c k e r s a n d V i r t u a l C u r r e n c y 
Recent high-profile hacking data breaches and international cybersecurity concerns have put cybercrime 
issues in the public spotlight and influenced data security risk analysis by corporations. 
Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of 
questions to criminal defense attorney Arkady Bukh, of Bukh & Associates PLLC 
(http://www.nyccriminallawyer.com/) in New York. 
Among his other criminal defense work, Bukh has 
represented high-profile alleged hackers. 
BLOOMBERG BNA: It’s not unusual for corporate and 
government cybersecurity analysts to say that it is nearly impossible 
to stay ahead of hackers in trying to protect sensitive data. You have 
represented several high-profile alleged hackers facing criminal 
prosecution. What have you learned from that experience that might 
assist companies looking to be more effective in their data security 
efforts? 
The companies cannot protect against human error. In some 
instances, I’ve seen cases where the hackers send someone to 
corporate offices just to get someone inside. The answer is of 
course it’s hard, but the hackers anticipate what’s forthcoming 
and are ready. 
They are looking for an easy target. A company that is easy to 
penetrate. The small companies can’t afford a high-tech security 
system, and hackers know that. It is nearly impossible for them to 
stay ahead of the hackers. They can barely afford to do 
compliance. 
Bukh: This is true. It’s very hard to fool-proof the sys-tem. The 
hackers and Russian military are very bright people with doctorates in 
math. 
COPYRIGHT 2014 BY THE BUREAU OF NATIONAL AFFAIRS, INC. ISSN 1538-3423
2 
BLOOMBERG BNA: The level of interest in data 
breaches—which seems to be routinely followed by a kind of breach 
notification fatigue and declining attention—is at the higher end at the 
moment in light of breaches at Target Corp. (12 PVLR 2133, 
12/23/13), Home Depot Inc. (13 PVLR 1641, 9/22/14) and alleged 
hacking attacks of banks. Are we seeing anything new in how these 
data breach incidents occurred or in how companies are responding to 
them? 
Bukh: The efforts are focused around the idea of tracking the 
activities of local protest groups and even extend the control to 
‘‘general public.’’ This is a very good time for the Russian 
government to issue a PA-TRIOT Act of their own to put tight 
controls on the Internet. 
The hackers will still be able to bypass any sort of regulation 
unless Russia opts to completely disconnect from the Internet, an 
idea which Russian Prime Minister Dmitry Medvedev has been 
shopping around Bukh: Companies like Home Depot try to figure out how the as an ‘‘emergency’’ tool. 
data breach came about, how the hackers got access. However, the 
same type of attack will unlikely happen again, so preparing for an 
identical data breach isn’t a smart move. 
BLOOMBERG BNA: Do you think it is accurate, or fair, that 
Russian hackers are cited as the source of so many cyberattacks, for 
example in August when a data security consulting firm pointed the 
finger at a ‘‘gang’’ of Russian hackers that allegedly stole 1.3 billion 
pass-words or more recently when Russian hackers were suspected as 
the source for attacks on JPMorgan Chase & Co. and four other banks 
(13 PVLR 1549, 9/8/14)? 
The hackers try to find any ‘‘hole’’ in the payment system in 
order to obtain data. It’s enough for a hacker to find any weak 
spot in the whole process. It’s not just Home Depot; it’s the other 
third-party companies that can put them at risk, such as the 
wireless Internet ser-vice providers they use. 
There are hundreds and hundreds of attacks launched against 
companies. The problem becomes ap-parent only when the 
attacks are successful. 
Bukh: When the authorities busted some major underground 
criminal forums, they were able to retrieve the Internet protocol 
addresses of most users. Although this data was partially biased by the 
fact the hackers sometimes use proxies to access the forums, it still 
con-firms the statistics that Russia, along with Ukraine, Ro-mania and 
Indonesia, hold the lead as bases for hack-ers. As a matter of fact, the 
vast majority of these online cybercrime boards are localized for a 
Russian audience. 
BLOOMBERG BNA: You have said that the recent cy-bercrime 
report from the Center for Strategic and Inter-national 
Studies—which concluded cybercrime was rampant on an 
international level and predicted that trade theft due to computer 
hackers would worsen (13 PVLR 1065, 6/16/14)—is noteworthy as 
the first such re-port to ‘‘use precise economic modeling to find the 
fig-ures for losses attributed to malicious cyber activity.’’ Would you 
explain why you think this modeling distinc-tion is so important and 
what the chief takeaway from the report is for companies? 
Russia, along with Ukraine, Romania and 
Indonesia, hold the lead as bases for hackers. 
As a matter of fact, the vast majority of these 
online cybercrime boards are localized for a 
Russian audience. 
Bukh: Previously, economic modeling has not taken into 
account the rapid rise of cybercrime in territories within the former 
Soviet Union. Some of the greatest economic minds have made best 
guesses, but at the end of the day, they were just guesses. 
The distinction in the new modeling is important be-cause it 
provides real-world, quantifiable figures based on real-world, 
quantifiable data. 
While the outcome is too early to see with any degree of 
certainty, it could be a game changer. 
When I browse through new cybercrime indictments, I can see 
a Russian name on literally any of them. 
As a side note, I spoke to a few hackers back in Rus-sia about 
stolen passwords. The way the hacker thinks, e-mail addresses 
and passwords can later be traded. On the online forums, you can 
sell an e-mail address for $100 or more. 
BLOOMBERG BNA: Given your strong ties to Russia— 
having been born in Moscow, having continuing ties to the Russian 
ex-patriot community and representing criminal defendants from that 
part of the world—do you have any insights into Russia’s recent 
server localization effort, its steps to require that companies keep 
certain personal data collected there on computer servers actually 
located in the country (184 Privacy Law Watch, 9/23/14)(13 PVLR 
1693, 9/29/14), allegedly undertaken in retaliation for international 
sanctions related to Russia’s activities in the Ukraine? 
If you have information on the person, you can sell that, too. 
This is a huge market after the initial theft. They will be able to 
sell stolen information for millions and millions of dollars for 
years to come. 
BLOOMBERG BNA: You accept bitcoin as a form of 
compensation for your legal services. Does that practice raise any data 
security or regulatory concerns for you, 
To request permission to reuse or share this document, please contact permissions@bna.com. In your request, be sure to include the following in-formation: 
(1) your name, company, mailing address, email and telephone number; (2) name of the document and/or a link to the document PDF; (3) 
reason for request (what you want to do with the document); and (4) the approximate number of copies to be made or URL address (if posting to a 
website). 
10-6-14 COPYRIGHT 2014 BY THE BUREAU OF NATIONAL AFFAIRS, INC. PVLR ISSN 1538-3423
3 
particularly since you are in New York where the state 
Department of Financial Services has taken a stronger interest in 
such matters, at least as far as virtual currency businesses are 
concerned (13 PVLR 1327, 7/28/14)? 
The American Average Joe has yet to grasp the idea of bitcoin. 
I was involved in the Egold case, so I am aware of le-gal points 
accepting a virtual currency. Egold was the first successful digital 
currency system to gain a wide-spread user base and merchant 
adoption but was put out of business in 2008 after money 
Bukh: Accepting bitcoin is more a marketing trick showing we laundering criminal charges.] 
are open and willing to work with bitcoin clientele. This sends a 
strong message to that specific community. However, with certain due 
presents a rather safe choice. O 
diligence and disclaimers, it 
PRIVACY & SECURITY LAW REPORT ISSN 1538-3423 BNA 10-6-14

More Related Content

Recently uploaded

快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
aypxuyw
 
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
pdeehy
 
suture removal ppt.pptx medical surgical
suture removal ppt.pptx medical surgicalsuture removal ppt.pptx medical surgical
suture removal ppt.pptx medical surgical
AlanSudhan
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
qevye
 
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
cadyzeo
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
RoseZubler1
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
devaki57
 
一比一原版英国伦敦商学院毕业证(lbs毕业证书)如何办理
一比一原版英国伦敦商学院毕业证(lbs毕业证书)如何办理一比一原版英国伦敦商学院毕业证(lbs毕业证书)如何办理
一比一原版英国伦敦商学院毕业证(lbs毕业证书)如何办理
gedsuu
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
uhsox
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Capital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptxCapital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptx
OmGod1
 
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
ubype
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
seoglobal20
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
woywevt
 
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
hedonxu
 

Recently uploaded (20)

快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
 
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
 
suture removal ppt.pptx medical surgical
suture removal ppt.pptx medical surgicalsuture removal ppt.pptx medical surgical
suture removal ppt.pptx medical surgical
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
一比一原版(uwlc毕业证书)美国威斯康星大学拉克罗斯分校毕业证如何办理
 
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
 
一比一原版英国伦敦商学院毕业证(lbs毕业证书)如何办理
一比一原版英国伦敦商学院毕业证(lbs毕业证书)如何办理一比一原版英国伦敦商学院毕业证(lbs毕业证书)如何办理
一比一原版英国伦敦商学院毕业证(lbs毕业证书)如何办理
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
一比一原版(uottawa毕业证书)加拿大渥太华大学毕业证如何办理
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Capital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptxCapital Punishment by Saif Javed (LLM)ppt.pptx
Capital Punishment by Saif Javed (LLM)ppt.pptx
 
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
 
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
 

Featured

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
Alireza Esmikhani
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
Project for Public Spaces & National Center for Biking and Walking
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
Erica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
Simplilearn
 

Featured (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

Views on Cybercrime, Hackers, and Virtual Currency

  • 1. Privacy & Security Law Report® VOL. 13, NO. 39 OCTOBER 6, 2014 Cybercrime Arkady Bukh, Bukh & Associates PLLC V i e w s o n C y b e r c r i m e , H a c k e r s a n d V i r t u a l C u r r e n c y Recent high-profile hacking data breaches and international cybersecurity concerns have put cybercrime issues in the public spotlight and influenced data security risk analysis by corporations. Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of questions to criminal defense attorney Arkady Bukh, of Bukh & Associates PLLC (http://www.nyccriminallawyer.com/) in New York. Among his other criminal defense work, Bukh has represented high-profile alleged hackers. BLOOMBERG BNA: It’s not unusual for corporate and government cybersecurity analysts to say that it is nearly impossible to stay ahead of hackers in trying to protect sensitive data. You have represented several high-profile alleged hackers facing criminal prosecution. What have you learned from that experience that might assist companies looking to be more effective in their data security efforts? The companies cannot protect against human error. In some instances, I’ve seen cases where the hackers send someone to corporate offices just to get someone inside. The answer is of course it’s hard, but the hackers anticipate what’s forthcoming and are ready. They are looking for an easy target. A company that is easy to penetrate. The small companies can’t afford a high-tech security system, and hackers know that. It is nearly impossible for them to stay ahead of the hackers. They can barely afford to do compliance. Bukh: This is true. It’s very hard to fool-proof the sys-tem. The hackers and Russian military are very bright people with doctorates in math. COPYRIGHT 2014 BY THE BUREAU OF NATIONAL AFFAIRS, INC. ISSN 1538-3423
  • 2. 2 BLOOMBERG BNA: The level of interest in data breaches—which seems to be routinely followed by a kind of breach notification fatigue and declining attention—is at the higher end at the moment in light of breaches at Target Corp. (12 PVLR 2133, 12/23/13), Home Depot Inc. (13 PVLR 1641, 9/22/14) and alleged hacking attacks of banks. Are we seeing anything new in how these data breach incidents occurred or in how companies are responding to them? Bukh: The efforts are focused around the idea of tracking the activities of local protest groups and even extend the control to ‘‘general public.’’ This is a very good time for the Russian government to issue a PA-TRIOT Act of their own to put tight controls on the Internet. The hackers will still be able to bypass any sort of regulation unless Russia opts to completely disconnect from the Internet, an idea which Russian Prime Minister Dmitry Medvedev has been shopping around Bukh: Companies like Home Depot try to figure out how the as an ‘‘emergency’’ tool. data breach came about, how the hackers got access. However, the same type of attack will unlikely happen again, so preparing for an identical data breach isn’t a smart move. BLOOMBERG BNA: Do you think it is accurate, or fair, that Russian hackers are cited as the source of so many cyberattacks, for example in August when a data security consulting firm pointed the finger at a ‘‘gang’’ of Russian hackers that allegedly stole 1.3 billion pass-words or more recently when Russian hackers were suspected as the source for attacks on JPMorgan Chase & Co. and four other banks (13 PVLR 1549, 9/8/14)? The hackers try to find any ‘‘hole’’ in the payment system in order to obtain data. It’s enough for a hacker to find any weak spot in the whole process. It’s not just Home Depot; it’s the other third-party companies that can put them at risk, such as the wireless Internet ser-vice providers they use. There are hundreds and hundreds of attacks launched against companies. The problem becomes ap-parent only when the attacks are successful. Bukh: When the authorities busted some major underground criminal forums, they were able to retrieve the Internet protocol addresses of most users. Although this data was partially biased by the fact the hackers sometimes use proxies to access the forums, it still con-firms the statistics that Russia, along with Ukraine, Ro-mania and Indonesia, hold the lead as bases for hack-ers. As a matter of fact, the vast majority of these online cybercrime boards are localized for a Russian audience. BLOOMBERG BNA: You have said that the recent cy-bercrime report from the Center for Strategic and Inter-national Studies—which concluded cybercrime was rampant on an international level and predicted that trade theft due to computer hackers would worsen (13 PVLR 1065, 6/16/14)—is noteworthy as the first such re-port to ‘‘use precise economic modeling to find the fig-ures for losses attributed to malicious cyber activity.’’ Would you explain why you think this modeling distinc-tion is so important and what the chief takeaway from the report is for companies? Russia, along with Ukraine, Romania and Indonesia, hold the lead as bases for hackers. As a matter of fact, the vast majority of these online cybercrime boards are localized for a Russian audience. Bukh: Previously, economic modeling has not taken into account the rapid rise of cybercrime in territories within the former Soviet Union. Some of the greatest economic minds have made best guesses, but at the end of the day, they were just guesses. The distinction in the new modeling is important be-cause it provides real-world, quantifiable figures based on real-world, quantifiable data. While the outcome is too early to see with any degree of certainty, it could be a game changer. When I browse through new cybercrime indictments, I can see a Russian name on literally any of them. As a side note, I spoke to a few hackers back in Rus-sia about stolen passwords. The way the hacker thinks, e-mail addresses and passwords can later be traded. On the online forums, you can sell an e-mail address for $100 or more. BLOOMBERG BNA: Given your strong ties to Russia— having been born in Moscow, having continuing ties to the Russian ex-patriot community and representing criminal defendants from that part of the world—do you have any insights into Russia’s recent server localization effort, its steps to require that companies keep certain personal data collected there on computer servers actually located in the country (184 Privacy Law Watch, 9/23/14)(13 PVLR 1693, 9/29/14), allegedly undertaken in retaliation for international sanctions related to Russia’s activities in the Ukraine? If you have information on the person, you can sell that, too. This is a huge market after the initial theft. They will be able to sell stolen information for millions and millions of dollars for years to come. BLOOMBERG BNA: You accept bitcoin as a form of compensation for your legal services. Does that practice raise any data security or regulatory concerns for you, To request permission to reuse or share this document, please contact permissions@bna.com. In your request, be sure to include the following in-formation: (1) your name, company, mailing address, email and telephone number; (2) name of the document and/or a link to the document PDF; (3) reason for request (what you want to do with the document); and (4) the approximate number of copies to be made or URL address (if posting to a website). 10-6-14 COPYRIGHT 2014 BY THE BUREAU OF NATIONAL AFFAIRS, INC. PVLR ISSN 1538-3423
  • 3. 3 particularly since you are in New York where the state Department of Financial Services has taken a stronger interest in such matters, at least as far as virtual currency businesses are concerned (13 PVLR 1327, 7/28/14)? The American Average Joe has yet to grasp the idea of bitcoin. I was involved in the Egold case, so I am aware of le-gal points accepting a virtual currency. Egold was the first successful digital currency system to gain a wide-spread user base and merchant adoption but was put out of business in 2008 after money Bukh: Accepting bitcoin is more a marketing trick showing we laundering criminal charges.] are open and willing to work with bitcoin clientele. This sends a strong message to that specific community. However, with certain due presents a rather safe choice. O diligence and disclaimers, it PRIVACY & SECURITY LAW REPORT ISSN 1538-3423 BNA 10-6-14