Its Time Is Here David G. Ries John W. Simek David G. Ries - - PowerPoint PPT Presentation

its time is here
SMART_READER_LITE
LIVE PREVIEW

Its Time Is Here David G. Ries John W. Simek David G. Ries - - PowerPoint PPT Presentation

Encryption for Lawyers : Its Time Is Here David G. Ries John W. Simek David G. Ries dries@clarkhill.com 412.394.7787 John W. Simek jsimek@senseient.com 703.359.0700 2 A-orneys Avoid Encryp6on Encryptio n 10 FT 3 A-orneys Avoid Encryp6on


slide-1
SLIDE 1

Encryption for Lawyers: Its Time Is Here

David G. Ries John W. Simek

slide-2
SLIDE 2

John W. Simek

jsimek@senseient.com 703.359.0700

David G. Ries

dries@clarkhill.com 412.394.7787

2

slide-3
SLIDE 3

A-orneys Avoid Encryp6on

10 FT

Encryption

3

slide-4
SLIDE 4

A-orneys Avoid Encryp6on

  • Encryp6on is too difficult.
  • Encryp6on is too expensive.
  • “I don’t need encryp6on!”

4

slide-5
SLIDE 5

Is Encryp6on Ethically Required? Always Some6mes Never

5

slide-6
SLIDE 6

Duty to Safeguard

Ethics Rules Common Law Contracts Laws & Regula6ons

6

slide-7
SLIDE 7

Duty to Safeguard

Rule 1.1 Competence Rule 1.6 Confiden6ality Rule 1.4 Communica6on Rules 5.1, Supervision 5.2, 5.3

7

slide-8
SLIDE 8
  • Aug. 2012 Amendments

Maintaining Competence “…a lawyer should keep abreast of changes in the law and its prac6ce, including the benefits and risks associated with relevant technology…”

Adopted by 26 states as of Jan 2017

Model Rule 1.1 Competence Amendment to Comment [8]

8

slide-9
SLIDE 9
  • Aug. 2012 Amendments

“(c) A lawyer shall make reasonable efforts to prevent the unintended disclosure of, or unauthorized access to, informa6on rela6ng to the representa6on of a client.” Model Rule 1.6 ConfidenCality of InformaCon AddiCon to rule

9

slide-10
SLIDE 10

Reasonable Safeguards (Rule 1.6, Comment [18]):

  • 1. the sensi6vity of the informa6on
  • 2. the likelihood of disclosure if addi6onal

safeguards are not employed

  • 3. the cost of employing addi6onal safeguards
  • 4. the difficulty of implemen6ng the safeguards
  • 5. adverse effect on the lawyer’s ability to represent

clients

10

Risk-Based

slide-11
SLIDE 11

Electronic Communica6ons

“When transmieng a communica6on that includes informa6on rela6ng to the representa6on of a client, the lawyer must take reasonable precau6ons to prevent the informa6on from coming into the hands of unintended recipients. …”

11

Model Rule 1.6 Comment [19]

slide-12
SLIDE 12

Electronic Communica6ons

“…does not require that the lawyer use special security measures if the method of communica6on affords a reasonable expecta6on of privacy. Special circumstances, however, may warrant special precau6ons….”

12

Model Rule 1.6 Comment [19]

if

“reasonable expecta6on of privacy”

slide-13
SLIDE 13

New Jersey Opinion 701 (2006) California Formal Opinion No. 2010-179 Pennsylvania Formal Opinion 2011-200 Texas Opinion No. 648 (2015)

Ethics Opinions - Encryp6on

13

slide-14
SLIDE 14

Is Encryp6on Ethically Required?

“The poten6al for unauthorized receipt of electronic data has caused some experts to revisit the topic and issue [ethics] opinions sugges6ng that in some circumstances, encryp6on or

  • ther safeguards for certain email

communica6ons may be required.” ABA, Eye on Ethics (July 2015)

14

slide-15
SLIDE 15

Lost and Stolen Devices:

“Considering the high frequency of lost assets, encryp6on is as close to a no-brainer solu6on as it gets for this incident pa-ern. Sure, the asset is s6ll missing, but at least it will save a lot of worry, embarrassment, and poten6al lawsuits by simply being able to say the informa6on within it was protected.” “Competent and Reasonable Efforts”

15

slide-16
SLIDE 16

Why A-orneys Need Encryp6on

Up to 70% of data breaches involve laptops & portable media. About 10% of laptops are stolen during their useful lives. 1.4 million smartphones were lost during 2013. 3.1 million smartphones were stolen during 2013.

16

slide-17
SLIDE 17

Why A-orneys Need Encryp6on

8/11 Bal6more law firm

(external hard drive – backup – lep on light rail)

8/14 Law firm with GA opera6ons center

(external hard drive – backup - stolen from employee’s trunk)

1/15 San Francisco a-orney

(laptop stolen)

4/15 San Diego law firm

(laptop stolen on trolley)

17

slide-18
SLIDE 18

Why A-orneys Need Encryp6on

2007: 18 laptops were stolen from the offices

  • f a law firm in Orlando.
  • Protected by encryp6on
  • SANS Ins6tute:

“(laptop stolen, but the data was protected) shouldn’t be newsworthy...” Encryp6on protects data!

18

slide-19
SLIDE 19

Why A-orneys Need Encryp6on

Electronic communica6ons can be intercepted. Wired and wireless network traffic can be intercepted. Cyberspace is a dangerous place!

19

slide-20
SLIDE 20

Unencrypted Email = “A Postcard”

20

"The common metaphor for Internet e-mail is postcards: Anyone – le-er carriers, mail sorters, nosy delivery truck drivers - who can touch the postcard can read what's on the back." Bruce Schneier 1995

Why A-orneys Need Encryp6on

slide-21
SLIDE 21

Unencrypted Email = “A Postcard”

21

Email – A Postcard Wri5en in Pencil Larry Rogers 2001 SEI - Carnegie Mellon University

Why A-orneys Need Encryp6on

slide-22
SLIDE 22

Unencrypted Email = “A Postcard”

22

“Emails that are encrypted as they’re routed from sender to receiver are like sealed envelopes, and less vulnerable to snooping—whether by bad actors or through government surveillance—than postcards.” Google Official Blog June 2014

Why A-orneys Need Encryp6on

slide-23
SLIDE 23

Unencrypted Email = “A Postcard”

23

"Security experts say email is a lot more like a postcard than a le-er inside an envelope, and almost anyone can read it while the note is in transit.” New York Times July 2014

Why A-orneys Need Encryp6on

slide-24
SLIDE 24

24

Why A-orneys Need Encryp6on

slide-25
SLIDE 25

25

slide-26
SLIDE 26

Bo-om Line – Ethical Du6es

Encryp6on is increasingly required in areas like banking and health care, by the FTC, and by new state data protec6on laws. As these requirements con6nue to increase, it will become more and more difficult for a-orneys to jus6fy avoidance of encryp6on. It has now reached the point where all a-orneys should generally understand encryp6on, have it available for use when appropriate, and make informed decisions about when encryp6on should be used and when it is acceptable to avoid it.

26

slide-27
SLIDE 27

Encryp6on

= An electronic process to protect data = Transforms readable data into unreadable data Requires a key to make data readable again

27

slide-28
SLIDE 28

Encryp6on

Readable Plaintext Unreadable Ciphertext Encryption Key Readable Plaintext Decryption Key

28

slide-29
SLIDE 29

29

slide-30
SLIDE 30

Encryp6on Key

+30NbBBMy7+1BumpfmN8QPHrwQr36/vBvaFLgQM561Q=

Example AES-256 Key

30

slide-31
SLIDE 31

Encryp6on Key

  • ----BEGIN PGP PRIVATE KEY BLOCK-----

Version: BCPG C# v1.6.1.0

lQOsBFIOnHgBCACwAhCyBG5X52IkbIKpeN21wEa3kR+eLvqRkdjD1oL1o4kmy3hh Zz1l/DH7RcZX+efCP3RfEvi7Mu3a9KIEq0D0KxLQbhaWvVDzJ8yUCR8kRepFDKtj pj1G/049DJGM4AYHqhmTPSnwRnPBtv5Ci2k9cWgZSnH/4NnkAGYudsgReoxOsUt pfYTyMeoGBg2DkNG4yZ6uG86v5k641lgH9qABajjFfXoe2aMwbYPMWQDahJlCZfH U2q05GJt/2zThnky/D//savhrshpNxr1ddEa1QwgGSR/EDPkflv1b4yWH05DbRST dR9B136kh+2YMDtqaJ75hhU/H9Q6WmhBAIlXABEBAAH/ AwMCoZz7ekYu0YZgXUod EoYlOwJmlu/ZLx2GSFtZO2RNyvblG+O3ZeKukG1xbSvzBS0Z5OjQOYnD+X5arvNM DmpyilKpb5DueaN1osxPOkunqQ6cJlOWdROvUQkgLCD7Y7jfu4/coeK+HZuoIHSq txEQaICTDcEnFYjDJNYNGWKj6WfT3LGjDhCreck6MZcGGJHjmCN8VF+yEmsUIkM+ 9D/US/rl/lWnINlfgmhiN1NxpAhg9Xo43Mpwex3hZLXLrbhdTkRMVgHLEH5h3xxo /UyNGCn3T9CTa4/vNdmZmMlAAHQk6F0ZhqFLS8x3sR2hxwkaNGmGHRr/ihklv15U RrggHzH89zxc3RDC8al/wcieM1vXx9hK195r9NPJ/hET1EIqs3wLu8rmZDPazIVT j8bQdhH3X964Q70ciiREVXbY29uwSXKHU6Q8agmCDdeGoZ/bhtLaYSs6Q53dgW97 U2IN6QIxHDTa+eZU5t1RVR5ugHph6yhTk6rCQF+FTsiaezwHkXqS5SfyNJ2JgOCi 6l4HpA2gLOy3raV4MoSpsEwIpquTccu/B8Aiucy6UL7IELOAMT2s7c2R7qVoBvew 5e2gDid0CWNqN03Zvg4USKq3lYskMUWUtaaexDWNALB210OKixm6mGN4Vzelmq MK w6drwWbfuo+Xt540wlGOOuCjZoEM+qxKofnDZicDQ9Lns/eswvLZS2L/ei3kF4du B0wexeG7R5eNlOlDfReyz5qWXOLgS47In6OLBXlUfuuNsI0m64DM3Z9LBXev2TuG YHGG26j1FRwgOdSDynjITA2xZrIJQ7rBjJhiMedH1bLlUau75EU/qQVAV1jZ+qD/ CbD/vxVW237NaAPPlctGXrvWMyZh/PSjb/wC56veYrQAiQEcBBABAgAGBQJSDpx4 AAoJEKJQRE9Opr2dRb8H/A67kPkY8fwCY8JxF6tV46rmXIyPOsVzVHb+TG9p+0ep 1js13t1MGJuMS7CXaDdtPdahD9IKwKRO3z2Jxsg2ADYditkR7QUknGUnrJsQOkKx 8gXinRihRNjM2JzsqWkBEOauIlnO5+Y01g7KTo93N1F+pNrPNzRko8gAPWIozJMd 5wLT9NvtdJLRumJjTjQ9ydyLa41uOq8EZvYELwyq0USO5AzlOu5XAduduRv9qhIm CmN8RLgShJzCGhu2E08hgU2kZZtY1g3VyGnikkn4Vtr6wREh5SyvMlzirWAMb1G LvaFZWAYAPLlCtCZQU3pL8mjFTFAxsKS1CcRLUrOkLM= =9Ry2

  • ----END PGP PRIVATE KEY BLOCK-----

31

slide-32
SLIDE 32

A Simplified Overview

Encryp6on Program Algorithm Key

32

slide-33
SLIDE 33

Protect

Data at Rest – Servers, Desktops, Laptops, Tablets, Portable Media, Smartphones, etc. Data in Mo6on – Wired Networks, Wireless Networks, Internet, Cell Networks, etc.

33

slide-34
SLIDE 34

Is Encryp6on Too Difficult?

A-orneys will open need assistance in seeng up encryp6on. There are now many easy to use op6ons for encryp6on (par6cularly aper setup).

34

slide-35
SLIDE 35

Protect Decryp6on Key!

Generally requires password/passphrase to access key. Use a strong password/phrase

  • 14 characters or more.

Use a password manager for mul6ple encryp6on instances. New NIST recommenda6ons.

35

slide-36
SLIDE 36

Passphrases

Iluvmy2005BMW! IluvmXy2005B3MW!

Stronger: Break dic6onary words with random le-ers, numbers, or symbols.

36

slide-37
SLIDE 37

Safeguards

Backup Data Backup Recovery Key Enterprise Management

Data

37

slide-38
SLIDE 38

Smartphones and Tablets

iPhones and iPads Android BlackBerry

  • 1. Follow manufacturer’s instruc6ons.
  • 2. Use strong PIN or passcode.
  • 3. Enable encryp6on.
  • 4. Enable wipe aper X failed log-on a-empts.
  • 5. Set auto 6meout.

38

slide-39
SLIDE 39

39

Open Whisper Systems

Private Messaging Private Calling

slide-40
SLIDE 40

40

WhatsApp

Private Messaging Private Calling

slide-41
SLIDE 41

41

Silent Circle

Voice, Video, Conference Calling, File Transfer, Messaging

Blackphone 2

slide-42
SLIDE 42

Laptops and Desktops

Full Disk Encryp6on Limited Encryp6on – Par66on, Folder or File

Secure

42

slide-43
SLIDE 43

Hardware Full Disk Encryp6on

  • Automa6cally encrypts en6re disk
  • Decrypted access when an authorized user

logs in

  • Examples:

– Seagate Momentus (SED) – Samsung SSD – Hitachi Self-Encryp6ng Drive

Seagate

43

slide-44
SLIDE 44

Opera6ng System Encryp6on

Microsop Windows

  • Bitlocker

(business versions: Vista, 7, 8, 10) – [Encrypted File System (EFS)] – Device Encryp6on (8.1, 10 with specific tech specs)

Apple OS X

– FileVault – FileVault 2

44

slide-45
SLIDE 45

Encryp6on Sopware

Full Disk & Limited Examples:

– Check Point – Dell Data Protec6on – McAfee Endpoint – Sophos – Symantec (PGP and Endpoint) – WinMagic – TrueCrypt (open source)

Encryption

45

slide-46
SLIDE 46

Encrypted Portable Media

Seagate Go-Flex CMS Secure Vault SanDisk Bitlocker to Go

46

Kingston DataTraveller Aegis Secure Key

slide-47
SLIDE 47

E-mail

Proceed With Cau6on!

47

slide-48
SLIDE 48

More Secure (Examples)

Business Enterprise

Dell

Data Protection Cloud Edition Sookasa

HP

48

slide-49
SLIDE 49

Cloud Encryp6on

Who has the key?

End User

Internet

Cloud Service Provider

49

slide-50
SLIDE 50

Dropbox - MFA

Dropbox Security Code

Codes sent by text to phones.

50

slide-51
SLIDE 51

Dropbox - MFA

Dropbox Security Code

Codes sent by text to phones.

51

slide-52
SLIDE 52

Google - MFA

Google Verification Code

Codes sent by text to phones.

52

slide-53
SLIDE 53

Podesta Phishing

53

slide-54
SLIDE 54

Wireless Networks

  • [Wired Equivalent Privacy (WEP)] – weak!
  • Wi-Fi Protected Access (WPA) – cracked !
  • Wi-Fi Protected Access, second genera6on (WPA2)
  • Sniffer programs
  • War driving
  • Pineapple
  • Evil twin

Source: Wikipedia.org

54

slide-55
SLIDE 55

Wireless Networks

55

slide-56
SLIDE 56

“Let’s Be Careful Out There!”

Risky if open (no need for username and password) Be sure you have a secure connec6on (h-ps: or VPN) Be sure you have a properly configured firewall Warnings from security professionals / US-CERT

  • Sgt. Phillip Freemason Esterhouse

Hill Street Blues

56

slide-57
SLIDE 57

VPN

Remote User

VPN Concentrator

Virtual Private Network

Internal Network

Internet

57

slide-58
SLIDE 58

Encrypted Tunnel

Remote User

Web Server

Secure Connec6on (h-ps:)

Internal Network

https:

(SSL / TLS)

Internet

58

slide-59
SLIDE 59

Email Encryp6on

Private Public

59

PKI

slide-60
SLIDE 60

60

slide-61
SLIDE 61

Digitally Signed Email

61

  • 2. Hash

+ Hash

slide-62
SLIDE 62

Signed and Encrypted Email

Public

62

+ Hash

slide-63
SLIDE 63

Outlook - Aper Cer6ficate Installed

63

slide-64
SLIDE 64

Email Server

Gateway to Gateway (TLS)

Email Server Clear Clear Encrypted 1 2 3

64

slide-65
SLIDE 65

Secure Portal (Pull)

Secure Portal

Notice

  • f

Message

1 2 3

65

slide-66
SLIDE 66

Secure A-achment (Push)

Internet Encrypted Attachment Clear Email

Attachment

66

slide-67
SLIDE 67

Secure Email (Examples)

AppRiver DataMo6on Google Apps (GAME) HP SecureMail (Voltage) Mimecast Office 365 Proton Mail ZixCorp

67

slide-68
SLIDE 68

ZixCorp

68

slide-69
SLIDE 69

Encryp6on of Documents

Microsop Office Adobe Acrobat WinZip Limited Protection!

69

slide-70
SLIDE 70

Adobe Acrobat

‹›

1

70

slide-71
SLIDE 71

Adobe Acrobat

‹› 71

slide-72
SLIDE 72

Adobe Acrobat

‹› 72

slide-73
SLIDE 73

John W. Simek

jsimek@senseient.com 703.359.0700

David G. Ries

dries@clarkhill.com 412.394.7787

Ques6ons

73