Optimal hackback
College
School of Economics
Document Type
Archival Material/Manuscript
Source Title
Chicago-Kent Law Review
Volume
84
Issue
3
Publication Date
2010
Abstract
Professor Jay Kesan from the University of Illinois College of Law, in joint work with Ruperto Majuca of the University of Illinois Department of Economics, argue in favor of legal rules that allow “hacking
[data] back" in certain business circumstances. They analyze the strategic interaction between the hack
and the attacked company or individual and conclude that neither total prohibition nor unrestrained
permission of hack-back is optimal. Instead, they argue that when other alternatives such as criminal
enforcement and litigation are ineffective, self-defense is the best response to cybercrime because there is, a high likelihood of correctly attacking the criminal, and the mitigation of damages to the hacked victim’s systems may outweigh the potential damages to third parties during the hack-back. In addition, the law should require that counterstrikers use only the requisite measures that arc necessary to avoid damages of third parties in their decision-making. Finally, better and ever-improving intrusion detection systems (IDS) and traceback technology improve the deterrent effect and efficiency of hack-bad.
html
Recommended Citation
Kesana, J. P., & Majuca, R. P. (2010). Optimal hackback. Chicago-Kent Law Review, 84 (3) Retrieved from https://animorepository.dlsu.edu.ph/faculty_research/8000
Disciplines
Computer Law
Keywords
Hacking; Computer security—Law and legislation
Upload File
wf_no