1 JLEcon Poly 171
1 JLEcon Poly 171
Citations:
Please note: citations are provided as a general guideline. Users should consult their preferred
citation format's style manual for proper citation formatting.
-- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and
Conditions of the license agreement available at
https://heinonline.org/HOL/License
-- The search text of this PDF is generated from uncorrected OCR text.
-- To obtain permission to use this article beyond the scope of your license, please use:
Copyright Information
2005]
Bruce P. Smith*
For better or worse, self-help is alive and well in the realm of com-
puter security. Of the nearly 500 American corporations, governmental
agencies, financial entities, and academic institutions polled in the 2004
CSI/FBI Computer Crime and Security Survey, virtually all employed anti-
virus software (99%) and firewalls (98%). Over 80% conducted security
audits to identify network-related vulnerabilities. A substantial number
participated in collaborative information-sharing organizations designed to
collect and disseminate intelligence relating to online threats. And when
these defensive measures failed and computer security incidents occurred,
as they frequently did, over 90% of the respondents patched their security
holes themselves.'
Given the challenges associated with ensuring optimal investment in
network security - including "free rider" problems, barriers to information
sharing, and sheer indifference - such levels of institutional commitment to
network defense might appear, at first blush, to furnish grounds for opti-
mism.2 Yet a closer examination of the data compiled by the Computer
* Richard W. and Marie L. Corman Fellow; Co-Director, Illinois Legal History Program; Associ-
ate Professor of Law, University of Illinois College of Law. I am grateful to the editors of The Journal
of Law, Economics & Policy for inviting me to participate in the symposium on "Property Rights on the
Frontier: The Economics of Self-Help and Self-Defense in Cyberspace," to the Journaland the Critical
Infrastructure Protection Project (CIPP) for sponsoring the proceedings, and to the symposium's atten-
dees (especially Richard Epstein and Emily Frye) for their valuable comments. I have also benefited
from the suggestions of Tom Ginsburg, Pat Keenan, Jay Kesan, Richard McAdams, Elizabeth
Robischon, and Dan Vander Ploeg.
1 See LAWRENCE A. GORDON ET AL., COMPUTER SECURITY INSTITUTE, 2004 CSI/FBI COMPUTER
CRIME AND SECURITY SURVEY 11 fig. 16 (2004), at
http:H/i.cmpnet.com/gocsi/db-area/pdfs/fbi/FBI2004.pdf [hereinafter 2004 CSIIFBI SURVEY].
2 On the problems of computer security in networked environments, see, for example, Ross
Anderson, Why Information Security is Hard - An Economic Perspective, at
www.acsac.org/2001/papers/1 0.pdf (last visited Jan. 23, 2005) (originally presented at the 17th Annual
Computer Security Applications Conference, Dec. 10-14, 2001) (identifying various "incentive failures"
in achieving secure network environments); Amitai Aviram & Avishalom Tor, Information Sharing in
Critical InfrastructureIndustries: Understanding the Behavioral and Economic Impediments (George
Mason Law & Econ. Research Paper No. 03-30; Fla. St. U. College of Law Public Law Research Paper
No. 103), http://papers.ssrn.comlsol3/papers.cfm?abstractid=427540 (last revised Feb. 23, 2004) (dis-
cussing reasons for suboptimal investments in network security); Doug Lichtman & Eric Posner, Hold-
ing Internet Service ProvidersAccountable (U. Chicago Law & Econ., Olin Working Paper No. 217 (2d
Ser.)), http://papers.ssm.comlsol3/papers.cfm?abstractid=573502 (last revised Aug. 10, 2004) (focus-
JOURNAL OF LAW, ECONOMICS AND POLICY [VOL. 1: 1
Security Institute (CSI) and the Federal Bureau of Investigation (FBI) calls
for a more sober assessment. Although the respondents reported fewer suc-
cessful attacks on their computer systems than in previous years, over half
of them admitted that they had experienced at least one incident of "unau-
thorized use" within the past year.' The variety of security incidents and
the average losses associated with them provide some sense of the gravity
of the situation: sabotage ($871,000); system penetration ($901,500); Web
site defacement ($958,100); telecom fraud ($3,997,500); financial fraud
($7,670,500); theft of proprietary information ($11,460,000); denial of ser-
vice attacks ($26,064,050); and, most seriously of all, viruses
($55,053,900).4
Even more striking than the frequency, variety, and severity of these
incidents was the relatively low rate at which they were reported to law
enforcement officials: In four out of five cases, the compromised organiza-
tions declined even to report such incidents to law enforcement.' This dis-
closure rate of 20% was the lowest since the CSI and FBI began compiling
such information in 1999.6 The rate at which compromised entities reported
incidents of computer intrusions compares unfavorably to reporting rates
for robbery (60.5%), burglary (54.1%), simple assault (42.1%), and even
rape and sexual assault (38.5%). 7 Indeed, similarly low rates of reporting
criminal offenses are to be found among the most vulnerable and marginal-
ized members of American society: immigrants on temporary visas who
have suffered from domestic violence (20.8%) and battered, undocumented
immigrants (18.8%).'
What explains the profound reluctance of compromised corporations
to report computer security incidents to law enforcement officials? In ex-
plaining their unwillingness to report, roughly half of the respondents in the
ing on the role of ISP immunity in contributing to network insecurity); and Douglas A. Barnes, Note,
Deworming the Internet, 83 TEx. L. REV. 279 (2005) (addressing obstacles to producing software resis-
tant to computer "worms").
3 2004 CSI/FBI SURVEY, supra note 1, at 8 fig.l 1. In 2003, the CERT Coordination Center, a
federally funded research and development institute specializing in Internet security, received reports of
over 130,000 incidents - a six-fold increase since 2000. See CERT/CC Statistics 1988-2004,
http://www.cert.org/stats/cert-stats.html#incidents (last updated Oct. 19, 2004) (reporting 21,756 inci-
dents in 2000 and 137,529 incidents in 2003). Several factors make it difficult to analyze these figures,
including the possibility of shifts over time in the willingness of entities to report such events to the
organizations conducting the surveys.
4 2004 CSIIFBI SURVEY, supra note 1, at 10 fig.15.
5 Id. at 13 fig.20.
6 Rates of reporting to law enforcement for the period 1999-2003 were as follows: 1999 (32%);
2000 (25%); 2001 (36%); 2002 (34%); and 2003 (30%). Id.
7 See SHANNAN M. CATALANO, BUREAU OF JUSTICE STATISTICS, U.S. DEP'T OF JUSTICE,
CRIMINAL VICrIMIZATION, 2003, at 10 (2004), available at
http:/www.ojp.usdoj.gov/bjslpub/pdf/cvO3.pdf.
8 See, e.g., Lesley E. Orloff et al., Recent Development, Battered Immigrant Women's Willing-
ness to Callfor Help and Police Response, 13 UCLA WOMEN'S L.J. 43, 68 (2003).
2005] HACKING, POACHING, AND COUNTERATTACKING
9 Recent research supports the perception that public disclosure of computer security incidents
negatively affects stock price. See Katherine Campbell et al., The Economic Cost of Publicly An-
nounced Security Breaches: Empirical Evidence from the Stock Market, 11 J. COMPUTER SEC. 431
(2003) (cited in 2004 CSI/FBI SURVEY, supranote 1, at 16 n.4).
10 2004 CSI/FBI SURVEY, supra note 1, at 14 fig.21.
11 "Viruses" and "worms" are self-replicating computer programs that can be designed to damage
the computers that they "infect." See Wikipedia.org, Computer Virus, at
http://en.wikipedia.org/wiki/Computer-virus (last visited Jan. 23, 2005) and Computer Worm, at
http://en.wikipedia.org/wiki/Computer-worm (last visited Jan. 23, 2005). "Malware" refers "to any
software designed to cause damage to a single computer, server, or computer network." Microsoft
TechNet, Defining Malware: FA Q, at
http://www.microsoft.com/technet/security/topics/virus/malware.mspx (last visited Jan. 23, 2005).
Following Doug Lichtman and Eric Posner, I use the terms "virus. "worm," and "malware" to refer
generally to "any category of malicious computer code that is propagated on the Internet, using or inter-
fering with privately owned computer equipment, and done in a way such that the relevant private party
has not given informed consent to that use or interference." Lichtman & Posner, supra note 2 (manu-
script at 8).
12 A 2003 study by PricewaterhouseCoopers concluded that, although businesses in North Amer-
ica spent roughly 50% more per capita on information security than companies elsewhere in the world,
the investment "didn't make them any safer per se." Scott Berinato, The State of Information Security
2003, CSO MAG., Oct. 2003, available at http://www.csoonline.com/read/l00l03/survey.html. For
discussions of the "cost-effectiveness" of network security, see, for example, Lawrence A. Gordon &
Robert Richardson, The New Economics of Information Security: Information-Security Managers Must
Grasp the Economics of Security to Protect Their Companies, INFORMATIONWEEK, Mar. 29, 2004, at
http://www.informationweek.com/story/showArticle.jhtml?articlelD=18402633 and Lawrence A.
Gordon & Martin P. Loeb, The Economics of Information Security Investment, 5 ACM TRANS. ON INFO.
& Sys. SEC. 438 (2002).
JOURNAL OF LAW, ECONOMICS AND POLICY [VOL. 1: 1
13 See, e.g., Orin S. Kerr, Essay, DigitalEvidence and the New Criminal Procedure, 105 COLUM.
L. REv. 279 (2005); Jason V. Chang, Computer Hacking: Making the Case for a National Reporting
Requirement (Berkman Center for Internet & Society at Harvard Law School, Research Pub. No. 2004-
07), http://papers.ssm.com/sol3/papers.cfm?abstract id=530825 (last revised June 2, 2004); Curtis E.A.
Karnow, Launch on Warning: Aggressive Defense of Computer Systems,
http://islandia.law.yale.edu/isp/digital%20cops/papers/karnow-newcops.pdf (last visited Jan. 23, 2005)
(unpublished paper presented at the CyberCrime and Digital Law Enforcement Conference sponsored
by the Yale Law School Information Society Project, Mar. 26-28, 2004); and Stevan D. Mitchell &
Elizabeth A. Banker, Private Intrusion Response, 11 HARv. J. L. & TECH. 699, 707-10 (1998), available
at http://jolt.law.harvard.edu/articles/pdf/vl 1/1 1HarvJLTech699.pdf.
14 Symbiot Security Announces World's First Solution to Strike Back Against Network-Based
Attackers; Aggressive New Rules of Engagement Established in "Information Warfare," BUS. WIRE,
Mar. 4, 2004, at http://www.findarticles.com/p/articles/mimOEIN/is_2004_March_4/ail 13905129.
See also Symbiot Announces General Availability of iSIMS, Bus. WIRE, Apr. 1, 2004, at
http://www.findarticles.com/p/articles/mi-mOEIN/is_2004-April1/ai_114800004.
15 Symbiot, Inc., Graduated Response TM , at http://symbiot.comgraduatedres.html#CYCLE (last
visited Aug. 3, 2004) (on file with author).
16 The company has products in various stages of development. See, e.g., Symbiot, Inc., Symbiot
7200: Solutions / Symbiot 7200, at http://www.symbiot.com/7200riskmetricssolutions.html (last visited
Jan. 23, 2005) and Symbiot 9600: Solutions I Symbiot 9600, at
http://www.symbiot.com/9600riskmetricssolutions.html (last visited Jan. 23, 2005).
20051 HACKING, POACHING, AND COUNTERATTACKING
17 Distributed denial of service (DDoS) attacks typically "involve unauthorized intruders com-
mandeering the computers of unsuspecting users and using these distributed systems, referred to as
Izombies,' to flood a particular website or service provider with junk messages." Jacqueline Upton,
Mixed Metaphors in Cyberspace: Property in Information and Information Systems, 35 LoY. U. CHI.
L.J. 235, 245 n.41 (2003).
18 Paco Nathan, What "Countermeasures" Really Means, O'REILLY.coM, Aug. 3, 2004, at
http://www.onlamp.com/pub/a/security/2004/08/03/symbiot.html. In the context of information tech-
nology, a "tiger team" traditionally refers to a group of experts hired to expose vulnerabilities in the
security of one's own network, not necessarily that of an adversary. See Whatis.com, Tiger Team. at
http://whatis.techtarget.com/definition/0,,sid9_gci213146,00.html (last visited Jan. 23, 2005). For a
recent glimpse of military cyberwarfare strategy, see Norman R. Howes, Michael Mezzino & John
Sarkesain, On Cyber Warfare Command and Control Systems, at
www.dodccrp.org/events/2004/ICCRTSDenmark/CD/papers/I 18.pdf (last visited Jan. 23, 2005) (un-
published paper presented at the 9th International Command and Control Research and Technology
Symposium in Copenhagen, Denmark, Sept. 14-16, 2004).
JOURNAL OF LAW, ECONOMICS AND POLICY [VOL. 1]:I1
fragmentary evidence suggests that such efforts are not unknown. In De-
cember 1999, for example, Conxion, the company providing the Web-
hosting service for the World Trade Organization, responded to a denial-of-
service attack launched by a group of "electro-hippies" by reflecting the
attack onto the e-hippies' server. 9 At times, cruder techniques have proved
no less effective: An unnamed "senior security manager" at "one of the
country's largest financial institutions" has reported visiting "the physical
location" where a series of hacker attacks had originated, breaking in, steal-
ing the offending computers, and leaving a note reading "See how it feels?"
for the suspected wrongdoers. °
Nonetheless, Symbiot has claimed to offer the first commercially
available technology specifically designed to permit its users to "strike
back" against network intruders.' As such, it provides a particularly useful
case study through which to examine both the possibilities and problems of
digital counterstrike technologies.
A. Symbiot's Technology
19 See Pia Landergren, Hacker Vigilantes Strike Back, CNN.cOM, June 20, 2001, at
http:llwww.cnn.com/2001/TECH/intemetlO6/20/hacker.vigilantes.idg/ (discussing efforts of Conxion,
the Department of Defense, and other entities to strike back at hackers). In Fall 1998, the Pentagon
reportedly responded to an attack on one of its Web sites by "flood[ing] the browsers used to launch the
attack with graphics and messages, causing them to crash." Winn Schwartau, Striking Back: Corporate
Vigilantes Go On the Offensive to Hunt Down Hackers, NETWORKWORLDFUSION, Jan. 11, 1999, at
http://www.nwfusion.con/archive/1999/54697_01-11-1999.html.
20 Schwartau, supra note 19, at H 6-9. The unnamed source also admitted to having resorted, on
one occasion, "to baseball bats" on the theory that "[t]hat's what these punks will understand." Id. at
9.
21 Symbiot Security Announces, supra note 14.
22 Symbiot, Inc., Introducing the Symbiot 5600 - Featuring the Power of Risk Metrics, at
www.symbiot.com/pdf/5600.pdf (last visited Jan. 23, 2005).
23 id. See also Symbiot, Inc., Symbiot.NET: Solutions / Symbiot.NET, at
http://www.symbiot.com/symbiotnetriskmetricssolutions.html (last visited Jan. 23, 2005).
2005] HACKING, POACHING, AND COUNTERATrACKING
B. Symbiot's Philosophy
Does it mean that if your grandmother's PC gets a virus, it could be accidentally "neutral-
ized" and all her special cookie recipes obliterated? No. It does mean that if she neglects to
clean up a bunch of viruses on her hard drive, she might encounter difficulties shopping
online. Furthermore, if your grandmother chooses to go online through a cut-rate ISP with a
history of sheltering attacks,
3 she will probably have her bandwidth limited by web sites that
take security seriously. 1
Necessity is defined by the determination of hostile intent and the subsequent use of force in
self-defense, justified in situations that are "instant, overwhelming and leaving no choice of
means and no moment for deliberation." Proportionality is defined 33 by the limitation of re-
sponse by the intensity, duration, and realized effect of each attack.
How well have Symbiot's technical, moral, and legal claims been re-
ceived? Most commentators who have reacted to Symbiot's iSIMS tech-
nology have expressed considerable concern about its possible use.35 This
caution appears consistent with the position taken by most corporate execu-
tives, who have been reluctant - at least publicly - to support digital coun-
terstrikes as a means of combating network-related intrusions.36 The De-
partment of Justice, for its part, has seemingly "taken a position unequivo-
cally opposed to the employment of active defenses," both because of per-
ceived challenges in "controlling" so-called "hack back" technologies and
because such measures might themselves violate existing laws prohibiting
unauthorized access to protected computers.37
Broadening our focus beyond Symbiot's proprietary technology, what
are the chief practical and legal pitfalls facing companies that wish to
launch digital counterstrikes?
A. PracticalPitfalls
[Z]ombies in a DDoS attack, may be operated by hospitals, governmental units, and tele-
communications entities such as Internet service providers that provide connectivity to mil-
lions of people: counterstrikes which are not very, very 4precisely targeted to the worm or vi-
rus could easily create a remedy worse than the disease. 0
In the worst case, as Orin Kerr has suggested, counterstrikes could re-
semble a "pifiata game" in which the counterattacker "hacks" blindly at an
unseen target.4'
Symbiot, for its part, has publicly addressed such concerns. In an in-
terview granted in March 2004, the company's chief officers noted that,
"when there is no positive identification of the attacker (that is, we cannot
positively attribute an attack back to its source), deploying defensive coun-
termeasures and reporting intelligence would be most appropriate. '42 But
the company has also acknowledged that "[t]here is always the possibility
of collateral damage." Indeed, Symbiot makes no apologies for the possi-
bility that counterstrikes might be launched against "zombies." According
to Symbiot's officers, "when a zombied host or an infected computer has
been clearly identified as the source of an attack, it is our responsibility to
empower customers to defend themselves." Put simply, "[a]n infected ma-
chine, one no43
longer under the control of its owner, is no longer an innocent
bystander.
39 See, e.g., Your Computer Could be a "Spain Zombie": New Loophole: Poorly Guarded Home
Computers, CNN.coM, Feb. 18, 2004, at
http://www.cnn.com/2004TECHIptech/02/17/spam.zombies.ap/ (estimating "that between one-third
and two-thirds of unwanted messages are relayed unwittingly by PC owners who set up software incor-
rectly or fail to secure their machines"); John Borland & John Pelline, Hack Leads Point to California
Universities, CNET NEWS.COM, Feb. 12, 2000, at http://news.com.com/2100-1023
236827.html?legacy=cnet (referring to attacks against Yahoo!, eBay, CNN, and other companies unin-
tentionally launched from computers at Stanford, UCLA, and the University of California at Santa
Barbara); and Jon Swartz, Hackers Hijack FederalComputers, USATODAY.COM, Aug. 30, 2004, at
http:llwww.usatoday.com/tech/news/computersecurity/2004-08-30-cyber-crime x.htm (discussing
recent discovery by officials at the Department of Justice of "[h]undreds of powerful computers at the
Defense Department and U.S. Senate... hijacked by hackers who used them to send spam").
40 Karnow, supra note 13 (manuscript at 4-5) (emphasis added).
41 "It's ...like, I think, a pifiata game. You know the pifiata game, where you blindfold some-
body and give them a baseball bat and tell them to hack at the pifiata." Orin S. Kerr, Symposium Tran-
script, supra note 37, at 231.
42 Oram, supra note 24.
43 id.
JOURNAL OF LAW, ECONOMICS AND POLICY [VOL. 1: 1
B. Legal Pitfalls
44 18 U.S.C. § 1030 (2002). Possible exposure to an action under the CFAA by no means ex-
hausts the sources of potential liability. For an overview, see Karnow, supra note 13 (manuscript at 5)
(noting that "a host of statutes on their face make it illegal to attack or disable computers").
45 18 U.S.C. § 1030(a)(5)(A)(i)-(ii).
46 "Insofar as private security experts may lack authorization to enter third-party systems, even for
investigative purposes, some of the law's prohibitions may impact attempts by private parties to trace
and identify unauthorized intruders." Mitchell & Banker, supra note 13, at 711. For discussions of the
CFAA's scope, see generally Orin S. Kerr, Cybercrime'sScope: Interpreting "Access" and "Authoriza-
tion" in Computer Misuse Statutes, 78 N.Y.U. L. REV. 1596 (2003) and Robert Ditzion, Elizabeth
Geddes & Mary Rhodes, Computer Crimes, 40 AM. CRIM. L.REV. 285 (2003).
47 Although Symbiot's officers have taken the position that "legal liability is borne by the at-
tacker" [i.e., their customer], they have acknowledged that "[t]he legal implications ...and liabilities
arising from the system's use are presently very important for us all to consider." Oram, supra note 24.
2005] HACKING, POACHING, AND COUNTERATTACKING
48 Civil actions in such cases might be brought for trespass. Criminal prosecutions might occur in
summary (i.e., non-jury) proceedings before justices of the peace or before juries under the notorious
Black Act, which defined various types of poaching-related acts as felonies punishable by death. See
generally PETER B. MUNSCHE, GENTLEMEN AND POACHERS: THE ENGLISH GAME LAWS, 1671-1831
(1981) and E.P. THOMPSON, WHIGS AND HUNTERS: THE ORIGIN OF THE BLACK ACT (1975).
49 Richard A, Posner, Killing or Wounding to Protect a Property Interest, 14 J.L. & ECON. 201,
202 (1971).
50 This is not to say, however, that they have always been chronicled accurately. For example, a
leading casebook on American tort law has placed the important case of Bird v. Holbrook (decided in
1828) in 1825 and the most important Parliamentary act regulating "spring guns" and "man traps"
(adopted in 1827) in 1826. See RICHARD A. EPSTEIN ET AL., CASES AND MATERIALS ON TORTS 40-43
(7th ed. 2000). The book also claims that the statute concerning spring guns and man traps adopted in
1827 was "repealed in its entirety in 1861" - which indeed it was - but it fails to note that the main
JOURNAL OF LAW, ECONOMICS AND POLICY [VOL. 1 :1
King's Bench took up the question of whether a trespasser who had been
warned that spring guns had been placed in a wooded tract could maintain
an action against the property owner for injuries sustained by entering the
property and activating a gun, one of "nine or ten" that had been placed on
the property by the owner.5 In deciding whether a cause of action by the
trespasser could lie, Chief Justice Abbott observed that the judges were "not
called upon.. . to decide the general question, whether a trespasser sustain-
ing an injury from a latent engine of mischief, placed in a wood or in
grounds where he had no reason to apprehend personal danger, may or
may not maintain an action."52 But in the case where actual notice did exist,
the Court of King's Bench determined that no action for injuries caused by
the gun could be maintained.53
After the decision in Ilott, debate concerning the regulation of spring
guns shifted to Parliament. Opponents of spring guns argued that the de-
vices had the tendency to harm innocent victims - including children, per-
sons who entered property "by accident," those who ventured in "with some
kind and friendly purpose," and even gamekeepers themselves.' Propo-
nents of spring guns claimed that the devices "not only acted as a great dis-
couragement to poaching, but tended to prevent the dreadful evils which
resulted from the affrays and fights between bodies of game-keepers and
provisions of the 1827 statute were included in a separate consolidated act passed in that same year. Id.
at 44 n. 1. For the consolidating measure, see Offenses Against the Person Act, 1861, 24 & 25 Vict., c.
100, § 31 (Eng.). These infelicities do little to detract from Professor Epstein's influential casebook,
which remains a "classic."
51 106 Eng. Rep. 674 (K.B. 1820). The defendant in llott owned a wooded tract of land that
contained "a right of way for all the king's subjects on foot." Id. at 675. He placed guns on the private
portions of the land and displayed several "boards" that contained "notice to the public that such instru-
ments were so placed." Id. The plaintiff and a companion "went out in the day time for the purpose of
gathering nuts," and the plaintiff "proposed to his companion to enter" the defendant's woods. Id. After
being warned by his companion, the plaintiff entered, whereupon he received the injury at issue in the
suit. Id.
52 Id. at 676 (emphasis added). That particular question, as the Chief Justice observed, "ha[d]
been the subject of much discussion in the Court of Common Pleas, and great difference of opinion
ha[d] prevailed in the minds of the learned judges, whose attention was there called to it." Id. See
Deane v. Clayton, 129 Eng. Rep. 196, 197 (C.P. 1817) (failing to reach decision on the issue of whether
an action could be brought by a plaintiff whose dog had been killed by dog spears).
53 llott, 106 Eng. Rep. at 676. Justice Bayley, for his part, agreed, noting that the action was
barred by the maxim of volenti non fit injuria and concluding that "the cause of the injury" was ulti-
mately the act of the plaintiff, not the defendant. Id. at 677-78 (Bayley, J.)
54 13 PARL. DEB. (2d. ser.) (1826) 1254-55 (Charles Tennyson). In 1818, the Bury and Norwich
Post reported a typical accident involving an injured gamekeeper:
On Saturday ... George Davex, gamekeeper to Miss Wenyeve of Brettenham Hall was in the act of
taking up a spring gun set by himself, from touching a wire too roughly, he sprang the lock and the
contents of the gun lodged in various parts of his body from head to foot.
Bury and Norwich Post (Mar. 25, 1818), available at http://www.foxearth.org.uk/1818-
1819BuryNorwichPost.html.
2005] HACKING, POACHING, AND COUNTERATTACKING
62 See Posner, Killing or Wounding, supra note 49. See also RICHARD A. POSNER, ECONOMIC
ANALYSIS OF LAW 225 (5th ed. 1998) and EPSTEIN Er AL., supra note 50, at 43-44.
63 POSNER, ECONOMIC ANALYSIS, supra note 62, at 225. For a particularly scathing indictment of
Posner's analysis of the Bird case, see Peter Read Teachout, Worlds Beyond Theory: Toward the Ex-
pression of an Integrative Ethic for Self and Culture, 83 MICH. L. REv. 849, 882 (1985) (reviewing
JAMES BOYD WHrrE, WHEN WORDS LOSE THEIR MEANING: CONSTITUTIONS AND RECONST1TUTIONS OF
LANGUAGE, CHARACTER, AND COMMUNITY (1984)) ("What is most striking about the vision of the
world expressed here is that it leaves out entirely the central fact of individual human suffering. What
the case 'involved,' Posner insists without apparent embarrassment, is simply the question of which of
two economic activities, tulip raising or peahen keeping, would be advantaged by drawing the liability
rules one way or another. In his utter preoccupation with the efficiency question... he virtually steps
over the body of the seriously maimed young man.").
64 Posner, Killing or Wounding, supra note 49, at 214-16.
2005] HACKING, POACHING, AND COUNTERATrACKING
But how should policy makers muddle through the issue of digital
countermeasures? And does the law-and-economics analysis of spring guns
provide any guidance as to the appropriate contours of digital self-help?
Part A examines the extent to which the things that English landown-
ers sought to protect from unauthorized access (i.e., land and game) can be
considered analogous to the things that modem-day computer security spe-
cialists seek to protect (i.e., computer systems). Part B takes up the ques-
tion of whether organizations whose computer systems have been attacked
should be permitted to strike back against hackers and third-party "zom-
bies."
65 Id. at 214.
66 Richard A. Epstein, Cybertrespass,70 U. CHi. L. REV. 73, 76 (2003).
67 id.
68 On these Parliamentary efforts, see Bruce P. Smith, The Presumption of Guilt and the English
Law of Theft, 1750-1850, 23 LAw & HIST. REV. 133 (2005).
69 Register.com, Inc. v. Verio, Inc., 356 F.3d 393,436 (2d Cir. 2004).
JOURNAL OF LAW, ECONOMICS AND POLICY [VOL. 1: 1
chattel - in this case, their computer system.70 The recent case of Regis-
ter.com, Inc. v. Verio, Inc. (2004), decided by the U.S. Court of Appeals for
the Second Circuit, is illustrative. 7 In Register.com, the defendant was
accused of accessing the plaintiff's database of domain names by means of
robotic searches. In considering Register.com's theory of trespass to chat-
tels, the appellate court first determined that the plaintiffs computer sys-
tems qualified as chattels. The appellate panel then concluded that Verio
had likely committed a trespass to chattels by using its robot "to access
Register.com's computer systems without authorization to do so, consum-
ing the computer systems' capacity." In concluding that the district court
had not abused its discretion in granting preliminary relief on the plaintiff's
trespass to chattels claim, the appellate court observed that Register.com's
computer systems were "valuable resources of finite capacity," that "unau-
thorized use of such systems deplete[d] the capacity available to authorized
end-users," that unauthorized use "create[d] risks of congestion and over-
load that may [have] disrupt[ed] Register.com's operations," and that the
district court had concluded that the plaintiff would suffer irreparable
72
harm.
On the whole, decisions that have imported property-related concepts
into cases involving unauthorized online intrusions have not sat well with
scholars of Internet law, who have contended that the "propertization" of
the Internet will stifle expression, create a digital "anti-commons," and cur-
tail the public domain.73 With that said, other scholars have recognized the
appeal of property-related metaphors to judges and even the desirability of
extending them further.74 Even Dan Burk, who, in influential article, has
70 RESTATEMENT (SECOND) OF TORTS § 217 (1965). For representative cases, see, for example,
Register.com, 356 F.3d 393 (affirnming preliminary injunction on trespass to chattels theory based on
defendant's use of search robots to access plaintiffs database); eBay, Inc. v. Bidder's Edge, Inc., 100 F.
Supp. 2d 1058 (N.D. Cal. 2000) (affirming preliminary injunction based on allegation of trespass to
chattels in case involving robotic copying of auction-related information); Oyster Software, Inc. v.
Forms Processing, Inc., No. C-00-0724, 2001 U.S. Dist. LEXIS 22520 (N.D. Cal. 2001) (refusing to
dismiss claim in case involving copying of metatag information by software robot); AOL, Inc. v.
LCGM, Inc., 46 F. Supp. 2d 444 (E.D. Va. 1998) (finding liability on trespass to chattels theory in case
of spam); and Thrifty-Tel, Inc. v. Bezenek, 54 Cal. Rptr. 2d 468 (Cal. Ct. App. 1996) (applying trespass
to chattels theory in case involving unauthorized "cracking" of telephone access codes).
71 356 F.3d 393.
72 Id. at 438.
73 See, e.g., Dan L. Burk, The Trouble with Trespass, 4 J. SMALL & EMERGING Bus. L. 27, 53
(2000); Dan Hunter, Cyberspace as Place and the Tragedy of the Digital Anticommons, 91 CALIF. L.
REV. 439 (2003); Mark A. Lemley, Place and Cyberspace, 91 CALIF. L. REV. 521 (2003); James Boyle,
The Public Domain: The Second Enclosure Movement and the Construction of the Public Domain, 66
LAW & CONTEMp. PROBS. 33 (2003); and Michael J. Madison, Rights of Access and the Shape of the
Internet, 44 B.C. L. REV. 433, 468 (2003).
74 See, e.g., David McGowan, The Trespass Trouble and the MetaphorMuddle, 1 J.L. ECON. &
POL'Y 109 (2005) (suggesting that property metaphors are more apt for the Internet than critics have
suggested) and Adam Mossoff, Spam - Oy, What a Nuisance!, 19 BERK. TECH. L.J. 625, 664 (2004)
20051 HACKING, POACHING, AND COUNTERATTACKING
(arguing for extension of nuisance law to problem of spam on the grounds that the common law can
both "protect legal entitlements, such as the right to use and enjoy one's property without substantial
interference, and... redress new forms of injury, such as the harmful effects of spain.").
75 Burk, supra note 73, at 28-29 (emphasis added).
76 RESTATEMENT (SECOND) OF TORTS § 218 (1965).
77 See, e.g., Intel Corp. v. Hamidi, 71 P.3d 296, 308 (Cal. 2003) ("Intel's theory would expand the
tort of trespass to chattels to cover virtually any unconsented-to communication that, solely because of
its content, is unwelcome to the recipient or intermediate transmitter.").
78 See, e.g., Ticketmaster, Corp. v. Tickets.com, Inc., 2003 U.S. Dist. LEXIS 6483, No. CV99-
7654-HLH(VBKx) (C.D. Cal. Mar. 7, 2003), at *12 ("Since the spider does not cause physical injury to
the chattel, there must be some evidence that the use or utility of the computer (or computer network)
being 'spiderized' is adversely affected by the use of the spider. No such evidence is presented here.").
79 See, e.g., Physicians Interactive v. Lathian Sys., 2003 U.S. Dist. LEXIS 22868, No. CA-03-
1193-A (E.D. Va. Dec. 5. 2003), at *26 (finding that alleged "attacks" by defendants on file servers
"were designed to intermeddle with personal property").
JOURNAL OF LAW, ECONOMICS AND POLICY [VOL. 1: 1
chattels. Viewed from one perspective, Section 218 seems to constrict the
options of property owners, since it suggests that a party seeking to estab-
lish the defendant's "intermeddling" for purposes of a civil suit must estab-
lish more than trivial damage. Yet, as David McGowan has observed,
comment e to Section 218 also makes clear that the possessors of chattels
retain the "privilege to use reasonable force" to protect their possessions -
even against those "harmless" interferences for which a formal legal action
would be unavailing."0 In declaring that property owners are privileged to
use "reasonable force" to protect their possessions, comment e also refers
its readers to Section 77 of the Restatement. Section 77 likewise permits
property owners to engage in forceful self-help - provided the intrusion is
not "privileged," the property owner "reasonably believes that the intrusion
can be prevented or terminated only by the force used," and the property
owner "has first requested the other to desist and the other has disregarded
the request, or the actor reasonably believes that a request will be useless or
that substantial harm will be done before it can be made."'" And, finally,
Section 84 authorizes the use of "mechanical devices not threatening death
or serious bodily harm" to protect land or chattels "from intrusion" if the
use of the device is "reasonably necessary to protect the ... chattels from
intrusion," the use is "reasonable under the circumstances," and "the device
is one customarily used for such a purpose, or reasonable care is taken to
make its use known to probable intruders." 2
Considered together, these provisions would appear to provide consid-
erable latitude to property owners to protect their property through various
forms of self-help. But do they provide any guidance concerning the per-
missible scope of electronic counterstrikes designed to protect computer
systems from intrusion?
80 RESTATEMENT (SECOND) OF TORTS § 218 cmt. e (1965). See also McGowan, supra note 74.
81 RESTATEMENT (SECOND) OF TORTS § 77 (1965).
82 Id. § 84.
20051 HACKING, POACHING, AND COUNTERATTACKING
tionally engaged in illegal access); and, second, where a party has counter-
attacked against a "zombie" (an unwitting third-party intermediary).83
A reasonably strong case can be made that counterstrikes against
"hackers" - at least when such measures are proportionate to the threat
posed - should be privileged. As we have seen, Section 77 of the Restate-
ment (Second) of Torts authorizes persons to use "reasonable force" to pro-
tect their property in instances where the intrusion is not "privileged," the
property owner "reasonably believes that the intrusion can be prevented or
terminated only by the force used," and the property owner "reasonably
believes that a request will be useless or that substantial harm will be done
before it can be made."84 And Section 84 permits the use of "devices" to
accomplish these ends - merely adding the requirement that "the device
[be] one customarily used for such a purpose, or reasonable care [be] taken
to make its use known to probable intruders."85 Although it might well be
the case that a party that "hacked back" against a network intruder might
fall within the language of the CFAA or other statutes, the party would
seem to possess a colorable claim - at least under traditional tort principles
- that a proportionate counterstrike against a hacker should not expose the
counterattacker to either criminal or civil liability.
But how should the law respond to the more difficult problem of coun-
terstrikes against third-party "zombies," who have not engaged in inten-
tional wrongs? As a normative matter, does it make sense for parties that
counterstrike against "zombies" to be subjected to criminal and civil liabil-
ity? With respect to potential criminal liability, a party engaged in digital
counterstrikes might seek to invoke the "choice of evils" defense, which
excuses certain apparently criminal acts if they are justified by the avoid-
ance of greater harm - though the doctrine's application outside the realm
83 Although my usage of the term "hacker" to refer to persons engaged in unauthorized access by
no means exhausts the term's varied meanings in the Internet context, it conforms with the conventions
of the popular press. See Wikipedia.org, Hacker,available at http://en.wikipedia.org/wiki/Hacker (last
visited Jan. 23, 2005).
84 See supra note 81 and accompanying text. Similarly, Section 3.06(1) of the Model Penal Code
("Use of Force Justifiable for Protection of Property") states that:
[T]he use of force upon or toward the person of another is justifiable when the actor believes
that such force is immediately necessary: (a) to prevent or terminate an unlawful entry or
other trespass upon land or a trespass against or the unlawful carrying away of tangible, mov-
able property, provided that such land or movable property is, or is believed by the actor to
be, in his possession or in the possession of another person for whose protection he acts...
86 Section 3.02 of the Model Penal Code ("Justification Generally: Choice of Evils") states as
follows:
Conduct that the actor believes to be necessary to avoid a harm or evil to himself or to an-
other is justifiable, provided that: (a) the harm or evil sought to be avoided by such conduct
is greater than that sought to be prevented by the law defining the offense charged; and (b)
neither the Code nor other law defining the offense provides exceptions or defenses dealing
with the specific situation involved; and (c) a legislative purpose to exclude the justification
claimed does not otherwise plainly appear.
MODEL PENAL CODE § 3.02 (1985).
87 Richard A. Epstein, Property and Necessity, 13 HARV. J. L. PUB. POL'Y 2, 13 (1990) (demon-
strating extent to which absolute property rights are qualified by necessity defense).
88 RESTATEMENT (SECOND) OF TORTS § 197 (1965).
89 See Ploof v. Putnam, 71 A. 188 (Vt. 1908) (remanding to trial court for determination of
whether plaintiff could establish necessity of docking during storm).
90 As Robert Cooter and Thomas Ulen have summarized, "the private-necessity doctrine allows
compensated trespass in an emergency" on the grounds that "transaction costs may preclude bargain-
ing." ROBERT COOTER & THOMAS ULEN, LAW AND ECONOMICS 161 (4th ed. 2002).
20051 HACKING, POACHING, AND COUNTERATTACKING
should be required to pay the costs of the damage.9 The rule, in short, re-
quires parties to internalize the costs of their actions. If digital counter-
strikers accurately calculate the likely damage to themselves and third par-
ties and rationally compare the estimates - assumptions that, admittedly,
may be rather heroic given the uncertainties and time pressures involved in
online attacks - the damages caused by digital countermeasures taken
against third-party "zombies" will presumably be less than the costs borne
by the party if it failed to counterstrike.92
How might the legal regime that has been outlined above affect the ac-
tual behavior of companies operating computer systems, persons interested
in spreading malware, and third-party "zombies"? Predicting behavior in
this area is perilous, but the following hypotheses seem plausible. The
many companies that are currently reluctant to invoke formal law might be
encouraged to take more active measures against hackers.93 Although a
hacker who encountered a computer system protected by a digital counter-
strike technology might be diverted to a "softer" target or, alternatively,
might be spurred to even more malicious ends, these consequences argua-
bly would not arise if the technology were undetectable to the potential
wrongdoer.94 Indeed, like the LoJack car security system, which uses a
series of hidden radio transceivers to permit law enforcement authorities to
track and recover stolen automobiles, counterattacks that occurred without
prior announcement to the hacker might actually reduce (and not simply
displace) criminal wrongdoing.95
How, in turn, might potential "zombies" act in a legal regime that
permitted, for example, counterattackers to limit their bandwidth or other-
wise temporarily impair their "zombied" computer systems? As it currently
stands, our legal regime provides virtually no incentives for vulnerable
"zombies" to take even the most modest and inexpensive measures to pre-
91 124 N.W.2d 221 (Minn. 1910) (awarding damages to defendant whose dock was damaged by
plaintiffs boat during storm). In the words of Judge Posner, "[siuch liability is appropriate to assure
that the rescue is really cost-justified, to encourage dock owners to cooperate with boats in distress, to
get the right amount of investment in docks .... and, in short, to simulate the market transaction that
would have occurred had transaction costs not been prohibitive." POSNER, ECONOMIC ANALYSIS, supra
note 62, at 90-91.
92 This also assumes that parties engaging in counterstrikes can be identified and can pay for the
damage they cause.
93 "[T]argets prefer self-help solutions in order to maintain a greater degree of confidentiality...
than law enforcement typically allows." Mary M. Calkins, They Shoot Trojan Horses, Don't They? An
Economic Analysis ofAnti-Hacking Regulatory Models, 89 GEO. L.J. 171, 197 (2000).
94 For a useful overview of the phenomenon of diversion, see Koo Hui-Wen & I.P.L. Prig, Private
Security: Deterrentor Diversion?, 14 INT'L REV. L. & ECON. 87 (1994).
95 See Ian Ayres & Steven D. Levitt, MeasuringPositive Externalitiesfrom Unobservable Victim
Precaution:An EmpiricalAnalysis of Lojack, 113 Q. J. ECON. 43 (Feb. 1998). Ayres and Levitt found
that car owners who install LoJack devices confer positive externalities by making auto theft "riskier
and less profitable" and thus reducing auto theft in the aggregate. I am grateful to Richard McAdams
for discussing this literature with me.
JOURNAL OF LAW, ECONOMICS AND POLICY [VOL. 1: 1
CONCLUSION
As this paper has suggested, self-help is alive and well in the Internet
age. 9 In this regard, the area of computer security resembles other areas of
American law - ranging from repossession, to bail enforcement, to self-
defense against threats of immediate bodily harm - where self-help meas-
ures remain important."t ° Indeed, our current legal climate in the area of
computer security bears certain resemblances to other contexts in which
self-help has historically proved appealing, including "frontier" settings
where formal legal systems were underdeveloped or non-existent,"0 ' in-
stances where formal law proved incapable of providing adequate or af-
96 As a leading English network security expert has noted, although "computer users might be
happy to spend $100 on anti-virus software to protect themselves against attack, they are unlikely to
spend even $1 on software to prevent their machines being used to attack Amazon or Microsoft."
Anderson, supra note 2 (manuscript at 1).
97 See supra note 91.
98 See supra note 64 and accompanying text.
99 See also Microsoft Corp., Q&A: Microsoft Establishes Anti-Virus Reward Program, Nov. 3,
2003, http://www.microsoft.com/presspass/features/2003/novO3/11-O5AntiVirusQA.asp and Robert
Lemos, Mozilla Puts Bounty on Bugs, CNET NEWS.coM, Aug. 2, 2004, at http://zdnet.com.com/2100-
1105-5293659.html.
100 For a useful survey of self-help in American law, see Douglas Ivor Brandon et al., Self-Help:
ExtrajudicialRights, Privileges and Remedies in Contemporary American Society, 37 VAND. L. REV.
845 (1984) (examining role of self-help in self-defense, recovery of property, summary abatement of
nuisance, resisting unlawful arrest and excessive force, liquidating damages, and repossessing property).
101 On vigilante justice in frontier settings, see ROBERT M. SENKEWICZ, VIGILANTES IN GOLD
RUSH SAN FRANCISCO (1985).
2005] HACKING, POACHING, AND COUNTERATrACKING
102 For example, American landlords in the nineteenth century availed themselves of their right to
evict tenants forcibly because civil actions for ejectment were costly, slow, and uncertain. Once Ameri-
can states adopted summary eviction statutes in the late-nineteenth century, the scope of a landlord's
permissible self-help against holdover tenants was diminished. See JESSE DUKEMINIER & JAMES KRIER,
PROPERTY 507-09 (5th ed. 2002).
103 Thus, John Lott has argued strenuously on behalf of gun ownership as a means of deterring
would-be killers from committing murderous acts on the grounds that certain persons who commit
homicidal acts seek to maximize the amount of damage they inflict and are indifferent to being punished
themselves. See JOHN R. LOTT, JR., MORE GUNS, LESS CRIME: UNDERSTANDING CRIME AND GUN
CONTROL LAWS (2d ed. 2000).
104 13 PARL. DEB. (2d ser.) 1257 (1826).