CISIncidentResponseGuide
Brand7ReputationDestroyed8 2o$$#at9
%earning t#at someone is attacking your #ard earned reputation on t#e internet is &ike a kick in t#e gut' Customers) e"-emp&oyees) competitors) and e"-significant ot#ers are no$ uti&i:ing every means possib&e to #arass you and ruin your reputation' C&ear&y t#is is a #uge concern to you' ;ou mig#t fee& vio&ated and maybe even an"ious about doing somet#ing RIG3- 2.1' Rest assured t#atyouarenott#efirstort#e&astpersonto e"periencet#isgro$ingon&ineissue'CIS#as investigated #undreds of t#ese cases and #e&ped c&ients find reso&ution and stop t#eir antagonist' .ur Cyber Investigation -eam is #ere to #e&p'
US RGUID ! CISIncidentResponseGuide
1#en defamation victims read a &itt&e on t#e internet and t#en se&f-diagnose) it is t#e e,uiva&ent of deciding t#at you need a #eart surgeon because of a fe$ pains' It takes true e"pertise to craft t#e best so&ution based on your specific situation & needs'
/a&se defamatory revie$s p&aced against your company? "-emp&oyee) disgrunt&ed emp&oyee) past business partner attacks? " significant ot#ers destroying persona& reputation? B&oggers or ot#er groups destroying your reputation for a cause? Damaging emai&s sent to distribution &ists? Damaging $ebsites set up t#roug# domains by pro"y or simi&ar services? /a&se information distributed t#roug# t#e press? -ota&&y anonymous attacks for no apparent reason? Remova& of embarrassing materia& t#at #as arrived on t#e internet' Given t#e vo&ume) $e can a&most guarantee you t#at $e #ave seen and $orked your e,uiva&ent case many times before'
Common @uestion AE0 I Fust 2eed -#e Identity .f Someone Doing -#is8
Identity is one of t#e most common re,uests t#at $e receive and $e perform t#is repeated&y' 3o$ever) it is often one of t#e most difficu&t aspects of a case because of privacy &a$s t#at e"ist' /urt#ermore) un&ike t#e magic seen on -G s#o$s) no databases e"ist t#at a&&o$ us) or anyone e&se for t#at matter) to pus# a fe$ buttons and ID your attacker' If your case is serious and you must get to ID) $e can certain&y #e&p' If you are &ooking for a simp&e) &o$ cost magic so&ution) you may $ant to continue your searc# for t#e #o&y
US RGUID ! CISIncidentResponseGuide
grai& e&se$#ere'
Common@uestionA*0 1#yAreI6AddressesABigDea&9
Internet investigators) bot# private and Government a&ike) getting to a rea& I6 address for an antagonist is a very big dea&' 3o$ever many victims of internet issues cannot ,uite grasp $#y t#is important' -#e s#ort ans$er is t#at $#en an I6 address is captured) $e essentia&&y #ave t#e e&ectronic fingerprint of t#e person A2D I- CA2 B -RAC D' 1#i&e tracing may re,uire subpoenas to get) you kno$ in advance t#at =you #ave t#e bad guy>' /urt#ermore) t#ere is a number of tec#ni,ues to t#en use t#e I6 address to stop a bad situation from getting any $orse'
Common @uestion AH0 Do ;ou) .r -#e Attorneys ;ou 1ork 1it# Accept Contingency9
Rare&y #o$ever it does #appen' /irst) as a non-&a$ firm) $e are not a&&o$ed to accept payments based on outcomes of &ega& actions' Attorneys t#at $e $ork $it# $i&& consider it if t#e case meets specific criterion' As a ru&e-of-t#umb) if t#e person t#at is causing you #arm is not a company) t#en t#e odds are s&im' 6&ease understand t#at $#en somet#ing about you s#o$s up in =Goog&e> for e"amp&e) t#e &a$yers $i&& not
vie$ Goog&e as t#e one causing you #arm but instead t#e person or group t#at provided t#e materia&' .ne common type of contingency case t#at $e see is $#en business competitor<s attack eac# ot#er on t#e internet' If you #ave t#is type of case) $e encourage you to submit it to us to eva&uate furt#er'
US RGUID ! CISIncidentResponseGuide
C' C5 Internet Brand & Reputation Impacts B' @uick impact assessment of damage J S#ou&d you $orry about it9 C' S#ort term versus &ong term considerations (' Casua& versus professiona& background searc#es E' 1i&& on&ine reputation management $ork in your case9 *' "pert testimony on brand7reputation attacks H' "pert reports on c&ean up costs & economic damages (5 Stopping Kno$n & Unkno$n Antagonists B' Uti&i:ing %a$ nforcement0 1#at $i&& and $i&& not $ork' C' Restrictive orders and t#eir c#a&&enges on t#e internet (' Investigative stopping tec#ni,ues E' Attorney cease & desist *' Using I6 addresses to s#ut do$n parties H' Uti&i:ing comp&aints pre-&itigation L' Attorney agreed orders & inIunctions E5 Investigative & %itigation Strategies /or Unkno$n Antagonists B' Cost effective tec#ni,ues for bui&ding a&& circumstantia& cases C' Uti&i:ing $eb) emai&) te"t) and p#one traps (' Rea&istic use of nationa& database searc#es E' I6 address geo-&ocation & strategies *' Discovery tactics for identification H' Computer) 6DA) & 6#one forensics0 1#at to use7not use' L' =Doe In -#e Bo"> Strategies M' Assessment of odds of catc#ing *5 fficient Uti&i:ation .f Attorneys B' %oca& Gersus 2ationa& Attorneys0 ac# #ave t#eir p&ace C' Attorney consu&ting to rapid&y imp&ement identification (' 1i&& attorneys take my case on contingency 4yes) if t#e rig#t type5 E' Attorney screening0 Does your attorney =get it9> *' Cost & bi&&ing oversig#t0 1e understand $#at it s#ou&d cost' H' 2o cost consu&t $it# nations top attorneys $#en appropriate L' -ec#nica&) investigative) & damages consu&ting $it# attorney
('
E'
*'
H'
M' Consu&ting on efficient tec#ni,ues to subpoena internet sites & domestication issues' H5 3ig# 6rofi&e Cases B' 1#en you) or your attorney<s action may substantia& damage you' C' 3o$ to #and&e $#en press) b&oggers) or socia& media are $atc#ing' (' Access to our team of top internationa& attorneys N internet crisis specia&ists'
US RGUID ! CISIncidentResponseGuide
(5 6rovide &inks to #armfu& materia&' Don<t Iust te&& us it is on some $ebsite but give us t#e &ink to t#e page4s5' E' E5 Give us a brief background suc# as $#en issue started) do you kno$ $#o is be#ind t#is' *' *5 1#at $ou&d you &ike CIS to accomp&is# for you9 Be specific #ere since t#is $i&& rea&&y impact our budget estimates' H' H5 If you are on&y $i&&ing to accept a contingency type re&ations#ip) p&ease indicate t#is c&ear&y' 1e $i&& emai& you back $it# eit#er a yes) $e can #e&p $it# a fe$ detai&s or no) $e cannot #e&p and #ere is $#y' If $e can #e&p) $e $i&& send you instructions on #o$ to set up an initia& consu&tation' ('