In-House Counsel Guidebook: How to Handle Internet Defamation and Online Reputation Attacks August 2014 | Page 11
9
turn, can be used to subpoena the internet service provider
for subscriber information associated with the IP address.
However, an attorney must ensure the cyber investigator is
not creating ethical problems. A primary technique cyber
investigators often use is “pre-texting,” which involves
misrepresenting his or her identity to attempt to get the
author of a harmful post to take some action in order to
obtain the author’s IP address. In most states, if an attorney
hires a cyber investigator to do pre-texting, the attorney can
be found to have violated that states’ ethical rules.
B. Through a subpoena to a third-party website hosting the
damaging content, in-house counsel can obtain personally
identifying information pertaining to the poster of the
harmful content. The full process is fleshed out more in our
Subpoena Guide for Identifying Anonymous Internet
Posters, but, in short, the objective is to obtain personally
identifying information from the website and internet
service provider (ISP). Once the identity of the attacker is
known, the company and attorney can decide how they wish
to proceed.
Many times, since anonymous posters often know better
than to disclose any personal information (such as name and
personal email address) when registering with a website, the
only helpful information received in response to a subpoena
is the IP address. Once an IP address is obtained, an attorney
can identify the associated internet service provider, such as
AT&T or Comcast, through a simple internet search such as
on the website: http://whatismyipaddress.com/ip-lookup.
Once the ISP is identified, an attorney can issue a subpoena
defamationremovalattorneys.com