Uber ex-CSO verdict raises thorny issues of cyber governance and transparency

The former chief security officer of Uber was convicted in a historic federal trial earlier this month, after the defendant was charged with covering up a ransomware attack while his firm was under investigation by the Federal Trade Commission for prior lapses in data protection. 

The jury found that Joseph Sullivan obstructed justice by paying off a pair of hackers who gained access to 57 million customer records and 600,000 license numbers of Uber drivers. 

Sullivan paid the two hackers $100,000 in bitcoin and made them sign non-disclosure agreements to keep the attack a secret, despite not knowing their real names — their identity was later discovered. 

Many critics of the verdict have raised questions about why an executive doing his job could be held criminally liable for negotiating a deal to protect his company’s reputation. While private sector companies and federal officials have officially frowned upon ransomware payments, officials have said more than two-thirds of ransom attacks have never been reported to federal authorities.

Another key question raised by this case is, if Sullivan could be convicted on these charges, why are other senior executives, C-suite officials and corporate board members allowed to walk away without any culpability?

“When a major security incident hits, there is a collective effort between executives and the security team to address, mitigate and contain it,” Christian Vezina, CISO at OneSpan, said via email after the verdict.

If a decision was made to limit the information disclosed about the incident, Vezina argues the CISO was not acting alone. 

Sullivan never told the FTC about the deal and later misled Uber’s newly installed upper management about the scope of the 2016 attack. 

He did however notify a limited number of Uber executives about the ransomware incident, including Uber’s then CEO Travis Kalanick as well as a member of Uber’s legal team, according to court documents.

Application of law

Sullivan was convicted of obstructing a Federal Trade Commission probe, which had been investigating a prior breach at Uber. He was also convicted of a rarely charged crime called misprision, which involves knowing concealment of a crime.

Following the verdict, U.S. Attorney Stephanie Hinds said federal authorities expect companies to promptly alert customers and appropriate authorities when such data is stolen by hackers. 

“Sullivan affirmatively worked to hide the data breach from the Federal Trade Commission and took steps to prevent the hackers from being caught,” Hinds said in the announcement of the verdict by the Department of Justice. “We will not tolerate concealment of important information from the public by corporate executives more interested in protecting their reputation and that of their employers, than in protecting users.”

Sullivan faces up to five years in prison for obstruction and up to three years in prison for misprision of a felony. 

The punishment could be his alone to bear. Uber in July entered a non-prosecution agreement with the DOJ, which allowed upper management to avoid charges, but accepted responsibility for the role of its senior executives and board of directors in the coverup.

While many experts in the cybersecurity and legal professions are outraged by the prosecution and the verdict, other experts caution that restructuring any future corporate governance will not serve as protection from some unique evidence of deliberate obstruction. 

“It’s important to keep in perspective that the breach was not the reason Joe Sullivan was convicted — it was the coverup of that breach,” Jon Amato, senior director analyst at Gartner, said via email. “Outsourcing the coverup of a breach is still participating in it.”

Amato questioned whether future CISO candidates would try to negotiate some sort of language into future employment contracts that would protect them from liability. 

Due to the historic nature of the CISO position in corporate governance, the addition of creative contractual language may not be enough to shield them from potential legal exposure. 

Leave a Reply

Your email address will not be published. Required fields are marked *