DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

DOJ sends evidence preservation request to Domains by Proxy for details of CyberWarNews.info blogger

Posted on April 17, 2014 by Dissent

Some days, it’s not easy being a data breach researcher and citizen journalist. In time, you somewhat get used to  legal threats because you published something a company took exception to, and you shrug when your site gets  DDoSed by those who don’t like your criticism of their hacking activities. But when the U.S. Department of Justice gets involved, that’s a whole other level of worry. And that’s what has happened to the researcher/breach blogger who publishes cyberwarnews.info.

Lee, who’s in Australia, registered cyberwarnews.info using Domains By Proxy (DBP). Yesterday, they forwarded a 2703(f) evidence preservation request they received as his agent from the U.S. Department of Justice.

The request, signed by Albert Rees, Jr. , Senior Counsel at the DOJ, asks DBP to preserve evidence relating to a post Lee made in February: #OpIndependence. Confidential e-mails of Klitschko leaked.

The request asks DPB to

not disclose the existence of this request to the subscriber or any other person, other than as necessary to comply with this request. If compliance with this request might result in a permanent or temporary termination of service to the Account, or otherwise alert any user of the Account as to your actions to preserve the information described below, please contact me as soon as possible and before taking action.

I do not know whether DBP contacted Mr. Rees or not, but they did forward the request the very same day (yesterday) to Cyberwarnews.info, who tweeted:

seems the DOJ is looking for me? pic.twitter.com/VoV4TTRtvr

— CWN (@Cyber_War_News) April 17, 2014

seems the DOJ is looking for me?

CWN sent a copy of DOJ’s request letter to DataBreaches.net, and I’ve uploaded it here.

The request asks DBP to preserve, for 90 days, “pending further legal process:”

  1.  The contents of any communication or file stored by or for the Account and any associated accounts, and any information associated with those communications or files, such as the source and destination email addresses or IP addresses.
  2. All records and other information relating to the Account and any associated accounts including the following:

a. Names (including subscriber names, user names, and screen names);
b. Addresses (including mailing addresses, residential addresses, business addresses, and e-mail addresses);
c. Local and long distance telephone connection records;
d. Records of session times and durations, and the temporarily assigned network addresses (such as Internet Protocol (“IP”) addresses) associated with those sessions;
e. Length of service (including start date) and types of service utilized;
f. Telephone or instrument numbers (including MAC addresses);
g. Other subscriber numbers or identities (including temporarily assigned network addresses and registration Internet Protocol (“IP”) addresses (including carrier grade natting addresses or ports)); and
h. Means and source of payment for such service (including any credit card or bank account number) and billing records.

So why is DOJ seeking Lee’s information over that post? Does it have something to do with the fact that Lee noted that the statement had been “submitted anonymously” to his site?  Even if it was submitted anonymously, it appears to be the same content publicly viewable on Pastebin.  Anyone could have sent the material or link to Lee – including someone who was not involved in the data leak but just thought he might be interested in it.

And even if it was sent by the leaker – who may or may not have been involved in any hack – why is DOJ getting involved in an #OpIndependence or Anonymous Ukraine action?

And can the DOJ do anything to Lee? Should they even have access to his details if he’s merely investigating and reporting? Is this a matter for those concerned about press freedom?

I suggested Lee contact EFF to see if they might give him some advice as to whether to try to challenge this request or not. I hope someone advises him, because if the DOJ can just go after us breach bloggers and get our details for further action, I fear many of us are at risk.

 

Category: Commentaries and AnalysesOf Note

Post navigation

← FL: Former National Fast Food Restaurant Chain Employee And Co-Defendant Plead Guilty In Identity Theft Tax Fraud Scheme
Michaels Stores (finally) confirms breach affecting 2.6M cards at Michaels, 400K at Aaron Brothers →

2 thoughts on “DOJ sends evidence preservation request to Domains by Proxy for details of CyberWarNews.info blogger”

  1. Amazed Canuck says:
    April 17, 2014 at 1:13 pm

    Amazing, eh?

    Makes me wonder if databreaches.net got served this type of thing before w/o you knowing?

    To me this is obviously, quite obviously, a fishing expedition. And for what? Copying/pasting something of interest (to do with foreign interests) that already exists elsewhere on the net? It’s not much of anything. They’re going fishing.

    Wonder if an explanation will ever come of this?

    All the power to you Lee. You are now a person of interest who will have his digital trail followed by spooks for copying/pasting something.

    Domains by Proxy… +1 to you.

    Someone please give this guy a hand. At the same time, force an explanation of this fishing expedition.

    1. Dissent says:
      April 17, 2014 at 2:15 pm

      Domains by Proxy… +1 to you.

      Indeed. Last night I tweeted my kudos to them:

      Kudos to Domains by Proxy for notifying @Cyber_War_News of DOJ 2703(f) order even tho DOJ asked them not to notify him. @EFF @csoghoian

      — Dissent Doe (@PogoWasRight) April 17, 2014

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.