ISBA Development Site
This website is for ISBA staff use only. All visitors should return to the main ISBA website.
This website is for ISBA staff use only. All visitors should return to the main ISBA website.
August 2014 • Volume 102 • Number 8 • Page 404
Thank you for viewing this Illinois Bar Journal article. Please join the ISBA to access all of our IBJ articles and archives.
Ever use a public computer to print a document from the office or access you work email? Read on to learn just how risky that is.
When you can't drive, have to go to school, are subject to a curfew, and fund your fun with whatever allowance, couch scroungings, and baby-sitting money you can scrape together, the idea of being a kid detective has obvious appeal. The desire to succeed where adults fail, outwit the bad guys, and make something happen rather than have everything happen to you gives rise to generation after generation of youthful sleuths, from Nancy Drew and the Hardy Boys to Encyclopedia Brown to Lemony Snicket.
My detective avatar was and is tousle-haired Trixie Belden,1 tomboy heroine of a series of mystery stories set in the Hudson River Valley in what must have been the fifties or early sixties, judging both by the pageboys and bobby sox in the illustrations and the use of words like "dungarees" for jeans and "Gleeps!" for [expletive deleted]. Sporting red jackets bearing the cross-stitched initials of their secret club - "Bob-Whites of the Glen" - Trixie and the B.W.G. gang had all sorts of wholesome outdoor fun while unmasking impostors, foiling con-artists, and stopping thieves in their tracks. As a shy, nerdish city kid, the back covers of the books spoke to me directly with a siren song I couldn't resist:
Would you like to -
• solve mysteries?
• belong to a secret club?
• ride, swim, travel, go to parties with the best friends in the world?
Then the wonderful adventures of Trixie Belden are written just for you. Don't miss a single one!
I have spent most of my adult life trying to make the "ride, swim, go to parties with the best friends in the world" thing come true. But I never thought I'd be actually solving mysteries more complicated than "Where did I leave the car keys?" - until last month, when, with a little help from my fellow shamus Todd Flaming, I cracked the Case of the Missing Miles, and learned a valuable lesson about how not to keep client confidences and secrets.
A mysterious disappearance
I first noticed the mysterious disappearance as I was contorting myself into seat 24K in Economy Plus2 on a flight from London to Chicago. I checked the United app on my iPhone one last time to see if somehow, miraculously, all five people ahead of me in line for an upgrade had missed the flight, enabling me to ascend to the lofty, lay-flat heaven of Business Class.
I was not surprised to find that Business Class had checked in full, but I was a bit startled to see that my frequent-flyer mileage balance, which stood at over 200,000 miles the last time I looked, had somehow dwindled to a little more than 1,000 miles. I checked to see if there was any activity in my account, didn't find any, and figured it was just a glitch in United's system.
It wasn't. I'd been hacked.
Trouble in Tacoma
When I got back to Iowa, I discovered that evildoers had gotten into my Mileage Plus3 account and changed my email address to a dummy account and my home address to someplace in Tacoma, Washington. The cyber-crooks then ordered some loot out of the United Merchandise Awards catalog, using almost all of my miles to pay for it. While I don't know exactly what goodies they were trying to grab, here are just a few of the possibilities:
By the time I got in touch with United, the goods had been shipped, but not yet delivered to "my" address in Washington. The delivery was intercepted, so there will be no big TV party, swingin' BBQ, flashy watch wearing, or ultra-light laptop computing in Tacoma. Not on my tab, anyway.
But even though this particular criminal scheme had been foiled, the fact remained that some nasty, greedy fiends had laid their greasy hands not only on my miles, but on my personal information. What other electronic mayhem might they be plotting in their secret lair? I spent the better part of a day changing passwords and trying to restock my cyber-security moat with piranhas.
(Not) As easy as 1-2-3-4
How did this heist happen in the first place? Someone had gotten hold of my four-digit PIN, but how? My PIN isn't one of those obvious ones - my birthday or the ever-popular "1234."4 I don't share PINs or passcodes with anyone. I don't write them on a big yellow Post-It stuck to my computer. I hadn't fallen for a "phishing" scheme - one of those scams in which an email that appears to be legitimate is actually a trick to get you to provide your personal information to cyber-crooks.
But while I was traveling, I had accessed my United account from the computer in the lobby of my hotel. I did it twice, actually - once to see if my upgrade had come through, and another time to print my boarding pass. And both times, I logged out of my account when I was done, and went in to delete all of the browsing history before I stepped away from the computer.
Although I didn't see anyone looking over my shoulder in the hotel lobby, an unseen someone may well have been watching my every move. It turns out that it is possible to install keystroke logging devices or software that tracks the keys pressed by computer users, and even captures screen shots. Todd Flaming, the well-known cyber-sleuth, explained the technology and confirmed that this might well be the perps' M.O.5 With keylogging software, the crooks could capture my PIN, go into my account, change my email and home address, and set off on a shopping spree using my frequent flyer miles.6
United returned the miles to my account,7 but, as so often happens in kid detective fiction, I learned a valuable lesson, too.
Trixie learns a lesson
Gleeps! This could have been so much worse. Have you ever used a hotel computer to print some last-minute document for a meeting or presentation, accessing your email account in the process? With keylogging software, cyber bandits could harvest your passwords and help themselves to all sorts of critically sensitive information.
For lawyers, public computers pose both a personal and professional risk. We have a duty to keep client confidences and secrets, and must "act competently to safeguard information relating to the representation of a client against inadvertent or unauthorized disclosure…."8 That, of course, includes electronic information.
In the words of one expert, public computers are "good for checking the latest news or weather forecast" - but not for anything that could put your private information at risk.9 And that goes double for your clients' private information. So channel your own "meddling kid"10 - and don't let the bad guys get away with their cyber-criminal schemes.
Karen Erger is vice president and director of practice risk management at Lockton Companies.