Anna Z. Saber

Associate | She/Her/Hers

Overview

Anna Z. Saber is an attorney in the San Francisco office of Crowell & Moring, where she is a member of the Litigation Group.

Anna has experience representing clients in state and federal courts in technology-related litigation involving trade secret and trademark misappropriation, copyright infringement and DMCA, cybersecurity and digital crimes, and complex commercial matters. Anna also has experience representing clients in employment disputes.

Using the insights gained through her litigation practice, Anna also has a counseling practice in which she helps clients establish sound licensing agreements to meet their business goals. She provides counsel on matters related to technology transactions, IP protection, and drafting and negotiating commercial and intellectual property agreements for companies ranging from start-ups to market leaders.

Anna’s pro bono practice includes voting rights and wrongful conviction matters.

While at SCU Law, she competed in trial team and moot court, including a second-place finish at the Clara Barton International Humanitarian Law Moot Court Competition. Anna was also a member of the Santa Clara Law Review board, where she served as senior managing editor. A Bay Area native, she enjoys giving back to her local community. Most recently, she has been a co-coach for a high school mock trial team competing in the Santa Clara County High School Mock Trial Program.

Career & Education

|
    • University of California, Santa Barbara, B.A., Phi Sigma Alpha, 2015
    • Santa Clara University School of Law, J.D., summa cum laude, 2018
    • University of California, Santa Barbara, B.A., Phi Sigma Alpha, 2015
    • Santa Clara University School of Law, J.D., summa cum laude, 2018
    • California
    • California

Anna's Insights

Firm News | 7 min read | 12.03.24

Crowell & Moring Represents Microsoft, LF Projects, Seize Illicit Websites and Combat Cybercrime

Washington — Dec. 3, 2024: Crowell & Moring represented Microsoft and LF Projects in seizing 240 fraudulent websites linked to an Egypt-based criminal organization. On November 21, 2024, the U.S. District Court for the Eastern District of Virginia unsealed a temporary restraining order against Abanoub Nady (known online as “MRxC0DER”) and John Doe Defendants (collectively the “Fake ONNX Defendants”), who developed, sold, and implemented “do it yourself” phishing kits under the predominant brand names “ONNX” and “Caffeine,” among several others. In selling these kits under the ONNX name, the cybercriminals misappropriated and misused the “ONNX” trademark, which is owned by LF Projects. LF Projects uses the ONNX name and logo in connection with the Open Neural Network Exchange, a platform that enables interoperability between AI models throughout the tech industry. Numerous cybercriminal and online threat actors purchased these kits and used them in widespread phishing campaigns to bypass additional security measures and break into Microsoft customer accounts....

Anna's Insights

Firm News | 7 min read | 12.03.24

Crowell & Moring Represents Microsoft, LF Projects, Seize Illicit Websites and Combat Cybercrime

Washington — Dec. 3, 2024: Crowell & Moring represented Microsoft and LF Projects in seizing 240 fraudulent websites linked to an Egypt-based criminal organization. On November 21, 2024, the U.S. District Court for the Eastern District of Virginia unsealed a temporary restraining order against Abanoub Nady (known online as “MRxC0DER”) and John Doe Defendants (collectively the “Fake ONNX Defendants”), who developed, sold, and implemented “do it yourself” phishing kits under the predominant brand names “ONNX” and “Caffeine,” among several others. In selling these kits under the ONNX name, the cybercriminals misappropriated and misused the “ONNX” trademark, which is owned by LF Projects. LF Projects uses the ONNX name and logo in connection with the Open Neural Network Exchange, a platform that enables interoperability between AI models throughout the tech industry. Numerous cybercriminal and online threat actors purchased these kits and used them in widespread phishing campaigns to bypass additional security measures and break into Microsoft customer accounts....