As hacking hits the headlines, steps can be taken to prosecute over stolen emails
"The passwords to the claimant's email accounts had been obtained in July 2008 through the services of a group based in China called (remarkably) 'The Invisible Hacking Group'..." - Skadden on what English law can offer hacking victims
December 07, 2011 at 07:03 PM
6 minute read
Skadden litigation and international arbitration duo on the support that English law can offer hacking victims
There is no doubt that email hacking poses a very real threat both to individuals and to corporations. The recent case of Bassam Alghanim v Steven McIntyre & Ors [2011] is a useful reminder of the ease with which email hacking can occur, but also the steps that a hacking victim can take to uncover the unlawful activity and secure relief.
In August 2009, a routine Google search by one of the claimant's employees identified a file transfer protocol (FTP) website that contained a large number of private and confidential emails (arranged in PDF batches), which had been stolen from two of the claimant's private AOL email accounts. The specific emails that had been targeted were those that included legal advice from the claimant's lawyers regarding ongoing disputes (among other things), confidential information relating to the claimant's personal finances and confidential medical information.
The process of uncovering precisely what had happened required close co-operation between the claimant's lawyers and an IT forensics firm. On the basis of the stolen email batches discovered on the FTP site (and additional batches found in the Google cache for the site), we obtained a third-party disclosure order for disclosure of the site's data logs against the English Internet Service Provider (ISP) responsible for hosting the FTP site. In addition, with the claimant's consent, AOL provided the access logs for both email accounts. A forensic review of this material identified a number of IP addresses in the UK, which, in turn, led to further third-party disclosure orders against additional English ISPs to reveal who was behind those IP addresses.
Within a matter of weeks the IT firm had tracked the timeline for each batch of stolen emails, starting from the time the emails were unlawfully accessed up until the time that they were downloaded from the FTP site and viewed. As a result, it was possible to pinpoint which IP addresses were involved and responsible for each step of the hacking scheme.
Responsibility for the hacking and uploading was ultimately traced back to certain individuals and companies in England, and the forensic evidence was sufficiently clear (as was the risk that relevant evidence might be destroyed) that the court agreed to grant search and seizure orders in relation to three separate properties (two commercial and one domestic).
As the details of the story were gradually pieced together, the full scale of the hacking operation became clear. The passwords to the claimant's email accounts had been obtained in July 2008 through the services of a group based in China called (remarkably) 'The Invisible Hacking Group' (a fee of £265 had been paid for each password). Between July 2008 and August 2009, approximately 20 pages of stolen emails had been posted to the FTP site every two to three days. The site had been deliberately set up so as to ensure that it would not appear on any Google searches; in fact, the only reason why the site was discovered in August 2009 was because the defendants had accidentally activated the Google Analytics function in the site's control panel.
The evidence also indicated that the hacking scheme had been done on the instructions of the claimant's nephew acting on behalf of the claimant's brother, Kutayba Alghanim (with whom the claimant was involved in a dispute). Indeed, as Mr Justice Smith concluded, "the evidence shows that the whole operation was done at the behest of the Kutayba camp… who orchestrated the campaign and I do not accept that there is any realistic possibility of them establishing, on the material before me, that they were innocent as to the modus operandi of the people who got the emails on their behalf. One cannot see this material, read it and use it and have any credible belief that it is being obtained honestly".
The claim itself comprised three causes of action: breach of confidence, unlawful means conspiracy and infringement of copyright (in respect of the emails authored by the claimant and those authored on his behalf). On the facts, there was little doubt that the claim for breach of confidence fell squarely within the approach taken by the Court of Appeal in Imerman v Tchenguiz [2010]. Namely, that it is a breach of confidence for a person intentionally to obtain another person's information secretly and without authorisation, knowing that he reasonably expected it to be private, and, without that other person's authority, to examine or copy a document the contents of which were or ought to have been appreciated by the person who obtained it to be confidential to that other person.
The significance of the additional claim for copyright infringement was twofold: (i) the privilege against self-incrimination does not apply to proceedings for "infringement of rights pertaining to any intellectual property" (section 72 of the Senior Courts Act 1981); and (ii) the Courts have discretion to award additional damages for flagrancy (section 97(2) of the Copyright, Designs and Patents Act 1988).
In conclusion, if suspicious email activity is discovered, there are effective steps and remedies that are available under English law and the courts will fully support the victim with mechanisms and processes to detect who is responsible, preserve evidence and secure relief. In terms of relief, the Alghanim case is also an important reminder that in these types of claims it may be possible to quantify damages not on the usual compensatory measure, but on the basis of the defendant's gain; the claimant may ultimately elect for an account of the defendant's profits in lieu of compensatory damages.
Bruce Macaulay (pictured) is a partner and Ben Lasserson an associate at Skadden Arps Slate Meagher & Flom.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllX-odus: Why Germany’s Federal Court of Justice and Others Are Leaving X
Mexican Lawyers On Speed-Dial as Trump Floats ‘Day One’ Tariffs
Threat of Trump Tariffs Is Sign Canada Needs to Wean Off Reliance on Trade with U.S., Trade Lawyers Say
5 minute readTrending Stories
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250