DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

DOJ sends evidence preservation request to Domains by Proxy for details of CyberWarNews.info blogger

Posted on April 17, 2014 by Dissent

Some days, it’s not easy being a data breach researcher and citizen journalist. In time, you somewhat get used to  legal threats because you published something a company took exception to, and you shrug when your site gets  DDoSed by those who don’t like your criticism of their hacking activities. But when the U.S. Department of Justice gets involved, that’s a whole other level of worry. And that’s what has happened to the researcher/breach blogger who publishes cyberwarnews.info.

Lee, who’s in Australia, registered cyberwarnews.info using Domains By Proxy (DBP). Yesterday, they forwarded a 2703(f) evidence preservation request they received as his agent from the U.S. Department of Justice.

The request, signed by Albert Rees, Jr. , Senior Counsel at the DOJ, asks DBP to preserve evidence relating to a post Lee made in February: #OpIndependence. Confidential e-mails of Klitschko leaked.

The request asks DPB to

not disclose the existence of this request to the subscriber or any other person, other than as necessary to comply with this request. If compliance with this request might result in a permanent or temporary termination of service to the Account, or otherwise alert any user of the Account as to your actions to preserve the information described below, please contact me as soon as possible and before taking action.

I do not know whether DBP contacted Mr. Rees or not, but they did forward the request the very same day (yesterday) to Cyberwarnews.info, who tweeted:

seems the DOJ is looking for me? pic.twitter.com/VoV4TTRtvr

— CWN (@Cyber_War_News) April 17, 2014

seems the DOJ is looking for me?

CWN sent a copy of DOJ’s request letter to DataBreaches.net, and I’ve uploaded it here.

The request asks DBP to preserve, for 90 days, “pending further legal process:”

  1.  The contents of any communication or file stored by or for the Account and any associated accounts, and any information associated with those communications or files, such as the source and destination email addresses or IP addresses.
  2. All records and other information relating to the Account and any associated accounts including the following:

a. Names (including subscriber names, user names, and screen names);
b. Addresses (including mailing addresses, residential addresses, business addresses, and e-mail addresses);
c. Local and long distance telephone connection records;
d. Records of session times and durations, and the temporarily assigned network addresses (such as Internet Protocol (“IP”) addresses) associated with those sessions;
e. Length of service (including start date) and types of service utilized;
f. Telephone or instrument numbers (including MAC addresses);
g. Other subscriber numbers or identities (including temporarily assigned network addresses and registration Internet Protocol (“IP”) addresses (including carrier grade natting addresses or ports)); and
h. Means and source of payment for such service (including any credit card or bank account number) and billing records.

So why is DOJ seeking Lee’s information over that post? Does it have something to do with the fact that Lee noted that the statement had been “submitted anonymously” to his site?  Even if it was submitted anonymously, it appears to be the same content publicly viewable on Pastebin.  Anyone could have sent the material or link to Lee – including someone who was not involved in the data leak but just thought he might be interested in it.

And even if it was sent by the leaker – who may or may not have been involved in any hack – why is DOJ getting involved in an #OpIndependence or Anonymous Ukraine action?

And can the DOJ do anything to Lee? Should they even have access to his details if he’s merely investigating and reporting? Is this a matter for those concerned about press freedom?

I suggested Lee contact EFF to see if they might give him some advice as to whether to try to challenge this request or not. I hope someone advises him, because if the DOJ can just go after us breach bloggers and get our details for further action, I fear many of us are at risk.

 

Related posts:

  • Victims of W-2 phishing scams (2017 list)
Category: Commentaries and AnalysesOf Note

Post navigation

← FL: Former National Fast Food Restaurant Chain Employee And Co-Defendant Plead Guilty In Identity Theft Tax Fraud Scheme
Michaels Stores (finally) confirms breach affecting 2.6M cards at Michaels, 400K at Aaron Brothers →

2 thoughts on “DOJ sends evidence preservation request to Domains by Proxy for details of CyberWarNews.info blogger”

  1. Amazed Canuck says:
    April 17, 2014 at 1:13 pm

    Amazing, eh?

    Makes me wonder if databreaches.net got served this type of thing before w/o you knowing?

    To me this is obviously, quite obviously, a fishing expedition. And for what? Copying/pasting something of interest (to do with foreign interests) that already exists elsewhere on the net? It’s not much of anything. They’re going fishing.

    Wonder if an explanation will ever come of this?

    All the power to you Lee. You are now a person of interest who will have his digital trail followed by spooks for copying/pasting something.

    Domains by Proxy… +1 to you.

    Someone please give this guy a hand. At the same time, force an explanation of this fishing expedition.

    1. Dissent says:
      April 17, 2014 at 2:15 pm

      Domains by Proxy… +1 to you.

      Indeed. Last night I tweeted my kudos to them:

      Kudos to Domains by Proxy for notifying @Cyber_War_News of DOJ 2703(f) order even tho DOJ asked them not to notify him. @EFF @csoghoian

      — Dissent Doe (@PogoWasRight) April 17, 2014

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.