0% found this document useful (0 votes)
465 views22 pages

Criminal Complaint Against Joseph Sullivan

Joseph Sullivan is charged with obstruction of justice and misprision of a felony for acts committed between November 2016 and November 2017. The criminal complaint alleges Sullivan obstructed justice and committed misprision of a felony, which carry maximum penalties of 5 years in prison, 3 years in prison, respectively, as well as fines, supervised release, restitution and forfeiture. An FBI agent filed the criminal complaint supported by statements made in an attached affidavit.

Uploaded by

Jeff Elder
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
465 views22 pages

Criminal Complaint Against Joseph Sullivan

Joseph Sullivan is charged with obstruction of justice and misprision of a felony for acts committed between November 2016 and November 2017. The criminal complaint alleges Sullivan obstructed justice and committed misprision of a felony, which carry maximum penalties of 5 years in prison, 3 years in prison, respectively, as well as fines, supervised release, restitution and forfeiture. An FBI agent filed the criminal complaint supported by statements made in an attached affidavit.

Uploaded by

Jeff Elder
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
  • Summons in a Criminal Case: Details the summons issued to Joseph Sullivan for a criminal case, listing charges and court information.
  • Information for Service: Provides service details including defendant's information and proof of service form.
  • Criminal Complaint: Contains the formal criminal complaint stating the legal charges against Joseph Sullivan, including obstructing justice and misprision of a felony.
  • Affidavit of Special Agent Mario C. Scussel: Offers a detailed affidavit from the special agent supporting the criminal complaint with background and evidence.
  • Conclusion: Summarizes the affidavit's findings and provides a final statement by the special agent.

AO 83 (Rev.

06/09) Summons in a Criminal Case

UNITED STATES DISTRICT COURT


for the
Northern District
__________ DistrictofofCalifornia
__________

United States of America )


v. )
JOSEPH SULLIVAN )
) Case No. 3-20-71168 JCS
)
)
Defendant )

SUMMONS IN A CRIMINAL CASE

YOU ARE SUMMONED to appear before the United States district court at the time, date, and place set forth
below to answer to one or more offenses or violations based on the following document filed with the court:

’ Indictment ’ Superseding Indictment ’ Information ’ Superseding Information ✔ Complaint



’ Probation Violation Petition ’ Supervised Release Violation Petition ’ Violation Notice ’ Order of Court

U.S. Marshals Service, Northern District of California


Place: 450 Golden Gate Avenue, 20th Floor Courtroom No.: N/A
San Francisco, CA 94102
Date and Time: 08/27/2020 10:00 am

This offense is briefly described as follows:


Obstruction of Justice, in violation of 18 U.S.C. § 1505 (One Count)
Misprision of a Felony, in violation of 18 U.S.C. § 4 (One Count)

This summons directs you to U.S. Marshals Service for federal processing. The U.S. Marshals will provide you with
additional information regarding your initial (telephonic) appearance before the U.S. Magistrate Judge.

Date: 08/19/2020
Issuing officer’s signature

Hon. Joseph C. Spero, U.S. Magistrate Judge


Printed name and title

I declare under penalty of perjury that I have:

’ Executed and returned this summons ’ Returned this summons unexecuted

Date:
Server’s signature

Printed name and title


AO 83 (Rev. 06/09) Summons in a Criminal Case (Page 2)

Case No.
This second page contains personal identifiers and therefore should
not be filed in court with the summons unless under seal.
(Not for Public Disclosure)

INFORMATION FOR SERVICE


Name of defendant/offender: Joseph Sullivan
Last known residence:

Usual place of abode (if different from residence address):

If the defendant is an organization, name(s) and address(es) of officer(s) or agent(s) legally authorized to receive service of
process:

If the defendant is an organization, last known address within the district or principal place of business elsewhere in the
United States:

PROOF OF SERVICE
This summons was received by me on (date) .

’ I personally served the summons on this defendant at


(place) on (date) ; or
’ On (date) I left the summons at the individual’s residence or usual place of abode
with (name) , a person of suitable age and discretion who resides
there, and I mailed a copy to the individual’s last known address; or
’ I delivered a copy of the summons to (name of individual) ,
who is authorized to receive service of process on behalf of (name of organization)
on (date) and I mailed a copy to
the organizations’s last known address within the district or to its principal place of business elsewhere in the
United States; or
’ The summons was returned unexecuted because:
.

I declare under penalty of perjury that this information is true.

Date returned:
Server’s signature

Printed name and title

Remarks:

Print Save As... Reset


AO 91 (Rev. 11/11) Criminal Complaint

UNITED STATES DISTRICT COURT FILED


for the Aug 20 2020

Northern District
__________ DistrictofofCalifornia
__________ SUSANY. SOONG
CLERK, U.S. DISTRICT COURT
NORTHERN DISTRICT OF CALIFORNIA
United States of America ) SAN FRANCISCO

v. )
JOSEPH SULLIVAN
) Case No. 3-20-71168 JCS
)
)
)
)
Defendant(s)

CRIMINAL COMPLAINT
I, the complainant in this case, state that the following is true to the best of my knowledge and belief.
On or about the date(s) of Nov. 15, 2016 to Nov. 21, 2017 in the county of San Francisco and elsewhere in the
Northern District of California , the defendant(s) violated:

Code Section Offense Description


18 U.S.C. § 1505 Count One: Obstruction of Justice
Max. Penalties: 5 years in prison; $250,000 fine; 3 years of supervised
release; $100 special assessment; restitution; forfeiture

18 U.S.C. § 4
Count Two: Misprision of a Felony
Max. Penalties: 3 years in prison; $250,000 fine; 1 year of supervised
release; $100 special assessment; restitution; forfeiture

This criminal complaint is based on these facts:


The attached affidavit of FBI Special Agent Mario C. Scussel.

✔ Continued on the attached sheet.


s/
/s/
Approved as to form ____________________ Complainant’s signature

AUSA Andrew Dawson Mario C. Scussel, SA FBI


Printed name and title

Sworn to before me by telephone.

Date: 08/19/2020
Judge’s signature

City and state: San Francisco, California Hon. Joseph Spero, U.S. Magistrate Judge
Printed name and title

Print Save As... Attach Reset


AFFIDAVIT OF SPECIAL AGENT MARIO C. SCUSSEL IN SUPPORT OF
CRIMINAL COMPLAINT

I, Mario C. Scussel, a Special Agent of the Federal Bureau of Investigation, being duly

sworn, hereby declare as follows:

I. OVERVIEW AND AGENT BACKGROUND

1. I make this affidavit in support of a two-count Criminal Complaint against

JOSEPH SULLIVAN (hereinafter SULLIVAN):

a. Count One: Obstruction of Justice, in violation of 18 U.S.C. § 1505;

b. Count Two: Misprision of a Felony, in violation of 18 U.S.C. § 4.

For the reasons set forth below, I believe there is probable cause to believe SULLIVAN has

committed each of the foregoing violations of federal law.

2. The statements contained in this affidavit come from my personal observations,

my training and experience, information from records and databases, and information obtained

from other agents and witnesses. This affidavit summarizes such information in order to show

that there is probable cause to believe that SULLIVAN has committed the violations listed

above. This affidavit does not purport to set forth all of my knowledge about this matter, or to

name all of the persons who participated in these crimes.

3. I am a Special Agent of the Federal Bureau of Investigation (“FBI”) and have

been so employed for approximately 12 years. I am currently assigned to the Complex Financial

Crime Squad of FBI’s San Francisco Field Division. As part of my assigned duties, I investigate

possible violations of federal criminal law, specifically investigations involving white collar

crimes. I successfully completed 21 weeks of New Agent Training at the FBI Academy in

Quantico, Virginia in January 2009. During that time, I received training in legal statutes and

procedures, financial investigations, money laundering techniques, asset identification, forfeiture

1
and seizure, physical surveillance, confidential source management, and electronic surveillance

techniques.

4. During my employment with the FBI, I have conducted interviews of witnesses,

victims, and subjects; conducted physical surveillance, executed search warrants and arrests;

reviewed evidence and documents; transported evidence, and prisoners. Prior to my employment

as a Special Agent, I also worked for the FBI, as an Investigative Specialist conducting

surveillance operations for Counterintelligence and Counterterrorism investigations. I earned a

Master’s Degree in Business Administration from the University of California at Berkeley –


Haas Business School as well as Master of Arts and a Bachelor of Arts Degrees in Psychology

from Stanford University.

II. APPLICABLE LAW

5. Title 18, United States Code, Section 1505 provides: “Whoever corruptly, or by

threats or force, or by any threatening letter or communication influences, obstructs, or impedes

or endeavors to influence, obstruct, or impede the due and proper administration of the law under

which any pending proceeding is being had before any department or agency of the United

States, or the due and proper exercise of the power of inquiry under which any inquiry or

investigation is being had by either House, or any committee of either House or any joint
committee of the Congress—Shall be fined under this title, imprisoned not more than 5 years or,

if the offense involves international or domestic terrorism (as defined in section 2331),

imprisoned not more than 8 years, or both.”

6. Title 18, United States Code, Section 1515(b) provides: “As used in section 1505,

the term ‘corruptly’ means acting with an improper purpose, personally or by influencing

another, including making a false or misleading statement, or withholding, concealing, altering,

or destroying a document or other information.”

7. Title 18, United States Code, Section 4 provides: “Whoever, having knowledge of
2
the actual commission of a felony cognizable by a court of the United States, conceals and does

not as soon as possible make known the same to some judge or other person in civil or military

authority under the United States, shall be fined under this title or imprisoned not more than

three years, or both.”

III. FACTS SUPPORTING PROBABLE CAUSE

A. Summary

8. SULLIVAN is a 52-year-old male, living in Palo Alto, CA. Between

approximately April 2015 and November 2017, SULLIVAN served as Chief Security Officer for

Uber Technologies Inc. (“Uber”). During his tenure, SULLIVAN assisted in overseeing Uber’s

response to a Federal Trade Commission (“FTC”) investigation into Uber’s data security

practices. That investigation had been triggered, in part, by a data breach suffered by Uber in

approximately 2014.

9. In the course of Uber’s response to the FTC’s investigation, SULLIVAN

participated in conference calls with FTC attorneys; reviewed Uber’s submissions to the FTC;

gave a presentation to FTC staff in Washington, D.C.; and sat for a sworn investigative hearing

similar to a deposition. SULLIVAN was therefore intimately familiar with the nature and scope

of the FTC’s investigation, and he held himself out as familiar with that investigation.

Nevertheless, when SULLIVAN learned that Uber’s systems had been hacked in approximately

November 2016—approximately ten days after SULLIVAN had provided sworn testimony to

the FTC—SULLIVAN engaged in a scheme to withhold and conceal from the FTC both the

hack itself and the fact that the data breach had resulted in the hackers obtaining millions of

records associated with Uber’s users and drivers. When Uber brought in a new CEO in 2017,

SULLIVAN lied to him about the circumstances surrounding that data breach. Uber’s new

management ultimately disclosed the breach to the FTC in November 2017, explaining that the

hackers had obtained the names and driver’s license numbers of approximately 600,000 Uber
3
drivers and some personal information associated with 57 million Uber users and drivers.

SULLIVAN’s employment was terminated by Uber at approximately the same time.

10. In sum, business records generated in the course of the response to the breach

reflect that SULLIVAN instructed his team to keep knowledge of the 2016 Breach tightly

controlled. Witnesses reported SULLIVAN was visibly shaken by the events. A witness also

reported that SULLIVAN stated in a private conversation that he could not believe they had let

another breach happen and that the team had to make sure word of the breach did not get out.

SULLIVAN instructed the team that knowledge of the breach was to be disclosed outside the
security team only on a need-to-know basis and the company was going to treat the incident

under its “bug bounty” program. Bug bounty programs are designed to incentivize white-hat

hackers, or “researchers,” to identify security vulnerabilities by offering a monetary reward in

exchange for such efforts. However, the terms and conditions of Uber’s bug bounty program

did not authorize rewarding a hacker who had accessed and obtained personally identifiable

information of users and drivers from Uber-controlled systems. Nevertheless, Uber arranged for

its bug bounty vendor to pay the hackers $100,000, which at the time was by far the largest

bounty that Uber had ever paid through the program.

11. SULLIVAN further insisted that the hackers agree to sign non-disclosure

agreements (“NDAs”) in exchange for the $100,000 bounty payment that would supplement the

standard terms of Uber’s bug bounty program. Such a supplemental NDA was not a typical

component of a bug bounty claim, and witnesses I have interviewed do not recall Uber requiring

a supplemental NDA in any other bug bounty claim. Moreover, the NDA SULLIVAN

authorized falsely represented that the hackers had not obtained or stored any data during their

intrusion. Both the hackers and SULLIVAN knew at the time that this representation in the

NDA was false. This misrepresentation concealed the fact that the hackers had, in fact, stolen

data, thereby falsely giving the incident the appearance of a typical bug bounty claim rather than
4
a data breach. The hackers’ ransom was paid in December 2016 via bitcoin, even though the

hackers by that time had refused to sign the NDAs in their true names and had not yet been

identified by Uber. Uber’s staff continued to work on identifying the hackers and were able to

eventually identify them in January 2017, at which point SULLIVAN dispatched security staff to

interview both hackers and obtain signed NDAs from them in their true names. The true-identity

NDAs continued to include the claim that SULLIVAN, Uber, and the hackers knew to be false:

that the hackers had not taken data from Uber.

12. Records further indicate Uber’s management team, with the sole exception of
Uber’s C.E.O. at the time, had no contemporaneous knowledge of the details of the data breach

and had no role in the decision to treat the breach under the Bug Bounty program.

13. In the months following the data breach, Uber and SULLIVAN continued to

respond to the FTC’s inquiries. For example, in December 2016, SULLIVAN was aware that

Uber was preparing to provide an update to the FTC about employee access to personally

identifying information. Nevertheless, SULLIVAN never informed the FTC of the 2016 data

breach, even though he was aware that the FTC’s investigation focused on data security, data

breaches, and protection of PII. In addition, witness interviews indicate that SULLIVAN did not

inform the Uber attorneys working on the FTC investigation—either in-house or outside

counsel—that the breach had occurred.

14. In approximately August 2017, Uber named a new Chief Executive Officer. Two

months later, Uber disclosed the 2016 data breach publicly, apologizing for the failure to do so

promptly. Uber fired SULLIVAN and a security attorney assigned to his team.

B. The Federal Trade Commission Investigation

15. In February 2015, Uber informed the FTC that it had suffered a data breach in

September 2014 (“the 2014 Breach”). The FTC subsequently began investigating the

circumstances of the 2014 Breach, gathering information via document requests and
5
interrogatories contained in Civil Investigative Demands. Uber was in frequent contact with the

FTC via outside counsel, sharing information on a proactive basis and in response to both formal

and informal inquiries from FTC staff.

a. 2014 Data Breach

16. According to Uber’s disclosures to the FTC, the 2014 Breach occurred when an

outsider was able to gain access to data Uber stored on an Amazon Web Services (“AWS”)

platform known as S3. The outsider located an AWS access ID and secret key in software code

posted to GitHub, which is a web-based platform used by software developers to store and share
code. The outsider then used that access ID and secret key to gain access to Uber’s data. Uber

later determined the file accessed by the outsider contained enough information to allow a user to

match names and drivers’ license numbers of approximately 50,000 drivers. According to

Uber’s disclosures, the database was not encrypted.

b. First Civil Investigative Demand

17. On May 21, 2015, the FTC issued a Civil Investigative Demand (“CID”).

Included in the CID were four interrogatories, each with various subparts. The fourth

interrogatory required Uber to provide, “[w]ith respect to any Breach or suspected breach,” a

variety of information including:

• “When and how the Company learned of the breach,”

• “The location, type(s), and amount(s) of Personal Information that unauthorized


person(s) could have accessed or viewed,”

• “The location, type(s), and amount(s) of Personal Information that the


unauthorized person(s) did copy, download, or remove”; and

• “[W]hen and . . . how the Company notified Consumers, law enforcement, and
other third parties about the Breach.”

6
18. The CID defined “breach” as “unauthorized access into the Company’s systems

or to Personal Information in the Company’s file(s), including but not limited to the unauthorized

access to the Company’s database(s) that took place on or around May 12, 2014 [the 2014 Data

Breach].” “Personal Information” was defined broadly as “individually identifiable information

from or about an individual Consumer,” specifically including “a driver’s license . . . or other

personal identification number.” The applicable time period was defined as “from January 1,

2014, until the date of full and complete compliance with this CID.”

c. SULLIVAN’s Role in the FTC Investigation


19. On September 25, 2015, Uber provided a set of interrogatory responses which

explained its use of Amazon’s S3 platform. The responses disclosed that SULLIVAN and one of

his direct reports “supervised the preparation of Uber’s response to this CID.” The response

explained that “Uber’s Amazon S3 datastore is divided into 101 buckets,” and these buckets

could be divided into three types: (1) application logs; (2) static files; and (3) other buckets,

which included “storage of database backups and database prunes . . . .” As to the storage of

“database backups and database prunes,” Uber explained that a “complete database backup” is

“retained to allow service restoration in the event of system failure,” while a “database prune” is

a “snapshot containing limited data used to realistically simulate the production environment for

purposes of development and testing . . . .” Uber further stated that beginning in August 2014,

all new database backup files were encrypted.

d. SULLIVAN’s FTC Testimony

20. On June 10, 2016, the FTC issued a second CID, which required Uber to

designate an officer to provide sworn testimony on a variety of topics. As a focus among these

topics, the FTC compelled testimony on a variety of issues related to S3, Uber’s use of

encryption, and Uber’s retention of personally identifying information (“PII”). Uber designated

SULLIVAN as its witness, and he was prepared extensively for the hearing by both in-house and
7
outside counsel, over the course of approximately four days which spanned several weeks, with

meetings ranging from an hour to an entire day.

21. The hearing took place on November 4, 2016. By this time, the FTC’s

investigation was focused in large part on Uber’s use of S3 and its implications for data privacy.

SULLIVAN testified that he understood that the 2014 Breach, which predated SULLIVAN’s

employment at Uber, involved an Amazon Web Services access ID that had been inadvertently

posted publicly on GitHub. That ID gave an outsider access to Uber’s data. SULLIVAN

elaborated that it was common at the time to write access IDs and other secrets directly into code
when that code needed to call for information from another service. This practice had

implications when code was exposed to outsiders, because the code itself would give them

access to Uber’s data. SULLIVAN explained that “key management”—that is, ensuring secret

keys are not exposed to bad actors—“is always an important part of an overall security program

for any company.”

22. SULLIVAN also testified about Uber’s storage of database backups in AWS. He

was asked about Uber’s statement in an interrogatory response that all new database backup files

had been encrypted as of August 2014, and he testified in detail about the weaknesses in

Amazon’s native encryption functions and the fact that encryption became much more important

as companies began moving to cloud-based infrastructure. SULLIVAN never contested that the

2014 Breach was a data breach and, in fact, acknowledged that.

C. The 2016 Breach and Cover-Up

23. Approximately ten days after SULLIVAN’s testimony, he learned that Uber’s

AWS S3 datastore had been breached again. On November 14, 2016, SULLIVAN received an

email from “johndoughs@[Link]” claiming to have found a “major vulnerability in

uber,” and that “I was able to dump uber database and many other things.”

8
24. At SULLIVAN’s direction, Uber’s security team began an investigation. Within

approximately a day, the security team realized an unauthorized person or persons had accessed

AWS and obtained, among other things, a copy of a database containing approximately 600,000

drivers’ license numbers for Uber drivers. Based on documents I have reviewed and witness

interviews I have conducted, within approximately the same time period SULLIVAN became

aware the attackers had accessed AWS in almost the identical manner the 2014 attacker had

used. That is, the attackers were able to access Uber’s source code on GitHub (this time by using

stolen credentials), locate an AWS credential, and use that credential to download Uber’s data.
25. Contemporaneous documentation reflects SULLIVAN understood the sensitivity

of this information. The response team generated a shared document referred to as the Preacher

Central Tracker (“the Tracker”), which was used to record progress in the investigation and tasks

assigned to various team members. In an update dated November 14, the Tracker stated:

access key has not be rotated [sic] since [it was created in 2013]. None of the people are
at the company any longer. Task was to rotate keys within S3 to ensure this could not
happen in the future but there are thousands of tasks. Joe was just deposed on this
specific topic and what the best or minimum practices that any company should follow in
this area.
26. Based on the context within the Tracker and my review of the transcript of

SULLIVAN’s testimony, I believe the reference to “Joe was just deposed” refers to

SULLIVAN’s testimony to the FTC. The comment demonstrates that the similarity and

connection between the 2014 Breach and the 2016 Breach was apparent to the response team at

an early phase.

27. A later update recorded in the Tracker reflected the need to keep news of the

breach confidential:

Information is extremely sensitive and we need to keep this tightly controlled.


Discussion with other Engineers must be tightly controlled. Joe is communicating
directly to the A-Team.

9
28. Based on my investigation, I believe the term “A-Team” refers to the executive

management team within Uber, representing the C.E.O.’s direct reports. SULLIVAN was a

member of the A-Team. Based on my investigation and interviews with other management team

members, I believe that contrary to the representation in the Tracker, only the C.E.O. and

SULLIVAN had contemporaneous knowledge of the details of the 2016 Breach, including that

drivers’ license numbers had been stolen.

29. Uber’s response to the breach, as reflected in the Tracker and other business

records, required that engineers within the company take a variety of steps to lock down Uber’s
data and prevent further access by the hackers. The Tracker contained the following guidance on

how to justify such broad action without disclosing the nature of the 2016 Breach more widely

within the company:

What is our position to the company to talk about what we are doing? We had a data
breach in 2014, we learned our lesson and we need to get our house in order. Hundred
service centers must rotate their secrets. Our common story has to be:
- This investigation does not exist.
- We are doing this in order to better protect our information.

D. Bug Bounty and Non-Disclosure Agreements

30. The hackers made clear early in their email correspondence with Uber that they

expected a six-figure payout. Email and text correspondence demonstrate that SULLIVAN and

others considered using Uber’s bug bounty program to pay the hackers, even though that

program had never awarded a bounty even close to $100,000 and had a nominal cap of $10,000.

Moreover, Uber’s Hacker One policy terms contained language specifying that dumping user

data from AWS did not comply with Uber’s policy:

If you get access to an Uber server please report it us [sic] and we will reward you with
an appropriate bounty taking into full consideration the severity of what could be done. . .
. Using AWS access key to dump user info? Not cool.

10
31. Soon after learning drivers’ license numbers had potentially been exposed (at

approximately 1:00am Pacific time on November 15, 2016), SULLIVAN reached out to Uber’s

then-CEO via text message. At approximately 1:28am on November 15, SULLIVAN sent the

following text:

32. Call records reflect that SULLIVAN and Uber’s then-CEO had a series of

conversations via phone and/or FaceTime lasting approximately five minutes. At approximately

1:38am, the CEO responded:

33. Based on the timing and content of the text messages, compared with the

timestamps visible in the Tracker, I believe SULLIVAN was informing the CEO that outside

hackers had potentially accessed Uber’s data, specifically approximately 600,000 drivers’ license

numbers. The CEO’s response reflects that the prospect of treating the incident under the bug

bounty program was already being discussed.

34. SULLIVAN advised certain members of his team that the hackers would need to

sign non-disclosure agreements (“NDAs”). To the best of my knowledge, Uber had not

previously required a supplemental NDA in order to pay out a bug bounty claim, and

SULLIVAN’s team began drafting a new contract. The primary author of the NDA was an

attorney assigned to SULLIVAN’s group, but multiple individuals, including SULLIVAN, made

edits over the course of the drafting process. The NDA forbade the hackers from disclosing

“anything about the vulnerabilities or your dialogue with us to anyone for any purpose without
our written permission. This includes any analysis or postmortem in any medium or forum.”

11
That gag provision stands in stark contrast with the standard terms of Uber’s bug bounty

program at that time. Uber’s policy at that time contained a Frequently Asked Questions

provision. One listed question was “Can I blog about my bug?” The answer:
Yes, but we ask that you wait until the issue is both fixed and paid out before you
publish the blog post. We also prefer that you request disclosure through
HackerOne so that readers of your blog post can get the full background on the
issue.

35. The NDA also contained the following “promise,” under the “Your promises”

section, which applied to the hackers: “You promise that you did not take or store any data

during or through your research and that you have delivered to us or forensically destroyed all

information about and/or analyses of the vulnerabilities.” Notwithstanding this “promise,”

SULLIVAN and the hackers all knew that hackers had, in fact, already taken Uber’s data. In

fact, the stolen data, and the risk that it could be publicly exposed or sold on the black market, is

what gave the hackers leverage in demanding an unprecedented six-figure payout. But the

language created the false impression to third parties, in the event the NDAs were ever publicly

disclosed, that the hackers had complied with the terms of Uber’s bug bounty program and had

never obtained copies of user or driver data.

36. Prior to sending the NDAs to the hackers for signature, SULLIVAN was advised

of the false language in the NDA, and he responded that the language would stay in the

agreements. 1 Based on my experience in this investigation, I believe this false and misleading

provision reflects SULLIVAN’s intent to conceal the truth of the 2016 Breach—namely, the

theft of vast quantities of PII—the from the public, from law enforcement, and from the FTC.

1
The witness who recalls this conversation initially asserted his rights under the Fifth Amendment and declined to
be interviewed. He ultimately agreed to be interviewed pursuant to an agreement with the United States Attorney’s
Office for the Northern District of California (“USAO”). In summary, the USAO agreed not to use any of the
witness’s statements against him in exchange for his cooperation with the investigation.
12
37. The hackers initially signed the NDAs using pseudonyms. Despite their refusal to

provide their real names, Uber arranged to have Hacker One pay the agreed-upon bounty.

Payment was made on December 8, 2016. The next month, Uber personnel were able to identify

two individuals responsible for the breach. Uber approached them, interviewed them, and

arranged for them to sign fresh copies of the NDAs in true name.

E. Resolving the FTC Investigation

38. In the months following the breach, Uber and SULLIVAN continued to respond

to the FTC’s investigation, but SULLIVAN never disclosed the 2016 Breach to the Uber
personnel working on that response. For example, on December 20, 2016, SULLIVAN received

by email a copy of a draft set of supplemental interrogatory responses, sent by the in-house

attorney responsible for managing the FTC investigation. Language in those responses claimed

once again that “all new database backup files” had been encrypted since August 2014.

SULLIVAN responded “I think for FTC we can could present a pretty compelling narrative

given how much we have done.” He did not disclose in the email, or in any other

communications with the in-house attorney of which I am aware, that Uber had suffered another

data breach in the weeks preceding the interrogatory responses.

39. In or about April 2017, SULLIVAN received a draft letter Uber planned to send

to the FTC requesting that the FTC close its investigation into Uber. The cover email, to which

the draft of the letter was attached, contained the following summary of the letter:
we argue (1) Uber’s record of cooperation and engagement with FTC staff over the last
28 months has been exemplary; (2) even before the receipt of compulsory process, Uber
came forward to provide information on a voluntary basis and has provided exhaustive
information to staff; and (3) the data security incidents at issue reflect no misdirected
priorities, no failure to appreciate risks, and no lack of security knowledge or care.

13
The cover email again made no mention of the 2016 data breach. SULLIVAN responded:

“Letter looks ok to me. Thanks.” 2

40. Uber sent the finalized letter to the FTC on April 19, 2017. The letter argued that

Uber:
has cooperatively provided information and has also prepared exhaustive interrogatory
responses, produced documents, conducted telephonic and in-person briefings through
inside and outside counsel on myriad topics, conducted an in-person briefing by senior
members of its data security team, sat for an investigational hearing, repeated
explanations of processes and systems when staff handing the investigation changed, and
responded to follow-up questions from DPIP staff on multiple occasions. No request to
Uber from staff is open or unanswered.

41. In addition, Uber highlighted what it claimed were significant new protections it

had deployed to the S3 datastore:

Since the time of the [2014 data breach], now almost three years ago, Uber has
put in place numerous and extensive additional protections for the data it stores in
the S3 datastore, as well as company-wide improvements in credential protection
and management and other aspects of data security. . . . Uber described these
improved and updated practices extensively in the course of this investigation.
42. Uber relied on these supposed improvements in arguing that the FTC should not

bring a claim against the company, arguing that Uber had become a more sophisticated company

since 2014. Similarly, Uber argued that the industry at large had become more adept since 2014

at protecting private data in the cloud, and that Uber should not be judged for “what a company

did then (back when the company was much smaller and the technology at issue was evolving)

according to the standards that the agency thinks are appropriate now (given the current

sophistication of the company and current industry best practices).” Uber made these arguments

via letter in April 2017, approximately five months after the 2016 Breach.

2
While I have been able to review portions of the cover email, as quoted above, Uber has asserted the attorney-
client privilege over most of the contents of the draft letter itself. As noted in subsequent paragraphs, I have
reviewed the letter that Uber ultimately sent to the FTC requesting that the investigation be closed.
14
43. Based on my investigation, I do not believe that any of the individuals responsible

for drafting the April 19 letter to the FTC had been made aware of the 2016 data breach. 3

SULLIVAN was consulted on the letter in its draft form, but he withheld knowledge of the

breach from others within Uber who were in a position to disclose that information to the FTC.

F. Scrutiny from New Management

44. In September 2017, SULLIVAN was asked to brief Uber’s new CEO on the 2016

incident. SULLIVAN asked his team to prepare a summary, which they did. After receiving

that summary, however, SULLIVAN removed certain details from the summary that would have

illustrated the true scope of the breach. SULLIVAN’s changes resulted in both affirmative

misrepresentations and misleading omissions of fact. In my training and experience, these

changes demonstrate SULLIVAN’s ongoing intent to obstruct the FTC (which had not yet fully

resolved its investigation) and his consciousness of guilt regarding his actions.

45. For example, the summary SULLIVAN received from his staff accurately

disclosed that the hackers had gained access to “AWS buckets that contained potentially all rider

and driver data in plaintext,” and that the hackers “still had possession of our data” when they

reached out to Uber in November 2016. The summary that SULLIVAN subsequently provided

to the new CEO via email, however, disclosed only that the hackers had gained access to “some

rider and driver data” and removed any admission that the hackers actually took the data.

46. In addition, the summary provided to the new CEO falsely stated that the bug

bounty payment had been made only after the hackers had been identified. SULLIVAN falsely

stated that his team told the hacker(s) that “we would only pay the bounty if he signed

documents in his real identity,” and further that the hacker “fully cooperated” with this condition.

In reality, SULLIVAN authorized paying the $100,000 bounty in December 2016 even though

3
While there is some evidence that Uber’s general counsel was aware by this time of a security incident, I have
seen no evidence that the general counsel was aware of the details, such as the nature of the attack or the PII that
was stolen.
15
the hackers had not yet been identified, and even though the hackers refused to identify

themselves. Uber was only able to identify them in January 2017, weeks after the payment had

been made.

47. The misrepresentations in SULLIVAN’s summary are consistent with the false

language in the NDA, as both sets of statements create the false impression that the hackers had

not stolen data from Uber. I believe the misrepresentations in SULLIVAN’s summary further

reflect SULLIVAN’s intent to withhold the details of the 2016 Breach even from the company’s

new CEO.
G. The Breach Is Disclosed to the FTC

48. On November 21, 2017, Uber’s new CEO issued a press release stating that he

had recently become aware of the details of the 2016 Breach. At approximately the same time,

the 2016 Breach was disclosed to the FTC. By November 2017, Uber and the FTC had reached

a tentative agreement resolving the FTC’s investigation, which included a draft complaint and

consent order with various provisions Uber was required to comply with. The agreement was

not yet final, and after the FTC learned of the 2016 Breach, it effectively withdrew from that

tentative agreement.

49. In light of the new information regarding the 2016 Breach, the FTC effectively

withdrew its previous settlement terms and added further requirements to the resolution with

Uber. The revised draft complaint included a recitation of facts related to the 2016 Breach, and

the revised draft consent order withdrew certain concessions it had made to Uber and added a

new, affirmative notification provision regarding any future breaches. The FTC gave final

approval to the revised Complaint and Consent Order on October 26, 2018.

H. The Hackers Pleaded Guilty to Federal Crimes.

50. On August 2, 2018, a Grand Jury in the Northern District of California returned

an indictment charging Brandon Charles GLOVER and Vasile MEREACRE with crimes related
16
to extortion involving computers under 18 U.S.C. § 1030(a)(7)(B) and 1030(c)(3)(A). The

indictment alleged that GLOVER and MEREACRE, between December 2016 and January 2017,

conspired to extort a online employment-oriented service (“COMPANY ONE”) by obtaining

over 90,000 confidential user accounts and using those accounts as a means to obtain money.

51. On October 30, 2019, GLOVER pleaded guilty to a single count in a Superseding

Information charging a conspiracy to commit crimes under 18 U.S.C. § 1030. GLOVER

admitted that he and MEREACRE agreed to extort COMPANY ONE, and further that a separate

object of the conspiracy was the scheme to extort Uber in connection with the 2016 data breach.
GLOVER further admitted that he and MEREACRE enlisted the help of a third party to identify

valuable information in Uber’s S3 datastore. GLOVER has admitted in interviews that while he

and MEREACRE requested that the third party delete his copy of the data after Uber made the

payment, he does not know if the third party actually did so. GLOVER and MEREACRE agreed

to pay the third party a portion of the overall bounty, but they did not disclose to Uber that a third

individual had been involved. GLOVER stated in an interview that he was surprised that Uber

had paid the full amount that he and MEREACRE had requested. He explained that he learned

only later that Uber had suffered a different data breach in 2014, and that this revelation

explained in his mind why Uber was willing to pay so much to keep the breach quiet.

52. On October 30, 2019, MEREACRE pleaded guilty to a single count in a

Superseding Information charging a conspiracy to commit crimes under 18 U.S.C. § 1030.

MEREACRE admitted that he and GLOVER agreed to extort COMPANY ONE, and further that

a separate object of the conspiracy was the scheme to extort Uber in connection with the 2016

data breach. MEREACRE has also admitted, as did GLOVER, that he and GLOVER enlisted

the help of a third party in identifying particularly valuable data in Uber’s S3 datastore, and that

this third party had his own copy of data downloaded from Uber’s S3 datastore. MEREACRE

has admitted that when he initially attempted to open a HackerOne account in order to receive
17
the $100,000 bounty from Uber, his application was rejected because he had used a fake name

and fake social security number. MEREACRE was surprised when Uber was ultimately able to

bypass those requirements and to accomplish the payment, and this bypassing convinced

MEREACRE that Uber was going to great lengths to keep the breach quiet

53. Based upon the evidence I have reviewed and the statements of GLOVER and

MEREACRE, GLOVER and MEREACRE chose to target and successfully hack other

technology companies and their users’ data—including but not limited to COMPANY ONE—

after they successfully extorted Uber for $100,000. Those hacks occurred after SULLIVAN
failed to bring the Uber data breach to the attention of law enforcement and after SULLIVAN

and Uber created and signed the false NDAs with GLOVER and MEREACRE.

IV. CONCLUSION

54. In summary, based on the evidence gathered through this investigation, I believe

that there is probable cause to believe that the defendant engaged in a cover-up intended to

obstruct the lawful functions and official proceedings of the Federal Trade Commission.

SULLIVAN intended that the cover-up would obscure from the proceedings before the FTC that

Uber had been breached again in 2016 during the FTC’s pending proceedings. SULLIVAN

further intended that the cover-up would obscure from the FTC’s proceedings that millions of
additional individuals had their personal data—kept by Uber—accessed and downloaded by

hackers. It is my belief that SULLIVAN further intended to spare Uber and SULLIVAN

negative publicity and loss of users and drivers that would have stemmed from disclosure of the

hack and data breach.

55. I further believe that there is probable cause to believe that SULLIVAN was

aware of the illegal hack of Uber in 2016. Despite that knowledge, SULLIVAN did not report

the illegal hack to law enforcement. Additionally, SULLIVAN took it upon himself and Uber to

conceal and disguise the hack from law enforcement and from the public. In so doing,
18
SULLIVAN and Uber prevented law enforcement from apprehending the hackers. Had

SULLIVAN and Uber promptly reported the illegal hack to law enforcement, the hacks of

multiple additional large tech companies and the theft of the personal data of millions of

additional customers and users may have been prevented. The illegal hack was not disclosed to

the FTC, to law enforcement, and to the public until new management took over these decisions

at Uber.

56. Thus, it is my opinion that there is probable cause to believe that Joseph

SULLIVAN has committed the following violations of federal law:


a. Count One: Obstruction of Justice, in violation of 18 U.S.C. § 1505;

b. Count Two: Misprision of a felony, in violation of 18 U.S.C. § 4.

I declare under penalty of perjury that the above is true and correct to the best of my

knowledge.

s/
______________________________
MARIO C. SCUSSEL
Special Agent
Federal Bureau of Investigation

19th day of August, 2020.


Sworn to before me over the telephone and signed by me this ____

_____________________________________
xxxxxxxxxxxxxxxxx
HON. LAUREL BEELER Joseph Spero
United States Magistrate Judge

19

AO 83 (Rev. 06/09)  Summons in a Criminal Case
UNITED STATES DISTRICT COURT
for the
__________ District of __________
United
AO 83 (Rev. 06/09)  Summons in a Criminal Case (Page 2)
Case No.
This second page contains personal identifiers and therefore
AO 91 (Rev. 11/11)   Criminal Complaint
UNITED STATES DISTRICT COURT
for the
__________ District of __________
United States
1 
 
 AFFIDAVIT OF SPECIAL AGENT MARIO C. SCUSSEL IN SUPPORT OF 
CRIMINAL COMPLAINT 
 
 
I, Mario C. Scussel, a Special Agent
2 
 
and seizure, physical surveillance, confidential source management, and electronic surveillance 
techniques. 
4. 
During
3 
 
the actual commission of a felony cognizable by a court of the United States, conceals and does 
not as soon as possible
4 
 
drivers and some personal information associated with 57 million Uber users and drivers.  
SULLIVAN’s employment was ter
5 
 
a data breach.  The hackers’ ransom was paid in December 2016 via bitcoin, even though the 
hackers by that time had ref
6 
 
interrogatories contained in Civil Investigative Demands.  Uber was in frequent contact with the 
FTC via outside counse
7 
 
18. 
The CID defined “breach” as “unauthorized access into the Company’s systems 
or to Personal Information in the Comp

You might also like