In-House Counsel Guidebook: How to Handle Internet Defamation and Online Reputation Attacks August 2014 | Page 10

8 information could spread at some point in the future and, if not dealt with, it could leave the harmed party without legal recourse. Identifying Anonymous Persons Many online reputation attacks are executed anonymously, so the first step that must be undertaken is identifying the source of the attack. Some attackers go to great lengths to try to mask their identities and, if you to Some attackers go cannot figure out who to great lengths to try is behind an attack, it es and, becomes very difficult mask their identiti out to stop the attack or if you cannot figure remove the damaging ttack, it who is behind an a content. In many cases cult to we have handled, there becomes very diffi move is no question that the stop the attack or re attack was illegal, so the nt. the damaging conte real issue – rather than proving the person(s) violated the law – was to identify who is behind the attack. Of course, many anonymous attackers assume their identities have been shielded, but are ignorant of the fact that through the subpoena process or with the aid of a cyber investigator, it is typically possible to identify attackers. A. Cyber investigators can successfully obtain the Internet Protocol (IP) addresses of anonymous posters which, in © Copyright 2014, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved.