Retaliatory Hacking: The Hack Back: The Legality of
Retaliatory Hacking: The Hack Back: The Legality of
Retaliatory Hacking: The Hack Back: The Legality of
Retaliatory Hacking
Valeska Bloch, Sophie Peach and Lachlan Peake consider whether organisations in Australia
and abroad have a right to ‘hack back’ in response to a cyber attack.
Today, the cyber battlefield is just breaking into a target’s servers Dr Alana Maurushat advocates for
as important as the physical one. and wiping any data including legislation that permits hacking back
However, in circumstances where stolen information or intellectual provided it meets certain conditions
government departments and law property.8 – in particular, that a party can
enforcement agencies are unable sufficiently attribute the source
or unwilling to effectively respond Developments in Australia of the hacking to minimise the
to cybercrime, organisations are The legal position likelihood of retaliatory measures
increasingly questioning whether being taken against the wrong
or not they have (or ought to have) The Cybercrime Act prohibits target, and that the counter-hacking
a right to ‘hack back’ as an offensive the unauthorised access to, or is reasonable, proportionate and
retaliatory measure. This article modification or impairment of, necessary when considered against
looks at how this debate is evolving data held on a computer.9 Although the harm sustained by the victim.14
at home and abroad. these laws do not draw a distinction
between hacking and hacking While the position in Australia
What does it mean to ‘hack back, ‘depending how it is done, might seem slightly more opaque
back’? [hacking back] may not be illegal.’10 than elsewhere, it is likely that
Hacking back generally refers to the One possible legal argument is that hacking back is an offence under
proactive steps taken by the victim of ‘computerised counter attack’ is Commonwealth law. Speaking to the
a cyberattack to turn the tables on its an example of self-defence.11 Some Australian Strategic Policy Institute
assailant in order to:6 academics believe self-defence on 29 October 2018, ASD Chief Mike
should permit hacking back in Burgess issued a strong warning to
• identify the source of an particular circumstances. The law Australian businesses contemplating
attack, including by probing a recognises a right to engage in active ‘hacking back’.15 Burgess unequivocally
cybercriminal’s infrastructure ‘self-help’ in certain circumstances, stated hacking back is illegal in
for weaknesses or snippets of for example, ‘the right of restraint Australia and should not form part of
information that could reveal and self-help eviction remedies in any organisation’s cyber strategy.16
who is behind an attack; landlord-tenant relations’ and the He expressed particular concern that
• thwart or stop the crime, right of self-defence in criminal cyber attacks launched by Australian
including by disabling the law to protect personal safety or businesses, or at their behest, ‘risk
hacker’s malware, or launching property.12 This is the basis on which misattribution and an escalation in
distributed-denial-of-service some argue that, in principle, the malicious activity’.17 Further, privately
(DDoS) attacks;7 or law could similarly allow active initiated attacks risk that attack being
self-help against cybercrime, misinterpreted as a state sanctioned
• destroy or steal back what was subject to certain limitations such attack, which could have significant
taken, including by remotely as necessity and proportionality.13 negative consequences.18
1 Nicholas Schmidle, The digital vigilantes who hack back, The New Yorker (7 May 2018).
2 Ibid.
3 Melissa Riofrio, Hacking back: digital revenge is sweet but risky, PC World (9 May 2013).
4 Tom Kulik, Why the Active Defense Certainty Act is a bad idea, Above the Law (29 January 2018).
5 TimeBase, The legality of defensive hacking (30 September 2013).
6 Dan Lohrmann, Can ‘hacking back’ be an effective cyber answer? Government Technology (13 February 2016).
7 Joseph Cox, Revenge hacking is hitting the big time, Daily Beast (19 September 2017).
8 Liam Tung, Is hacking in self-defence legal? Sydney Morning Herald (27 September 2013).
9 Cybercrime Act 2001 (Cth) ss 477.1 – 477.
10 Alana Maurushat, senior lecturer at UNSW Faculty of Law (see Liam Tung, Is hacking in self-defence legal? Sydney Morning Herald (27 September 2013)).
11 Ibid.
12 Jay P Kesan and Ruperto P Majuca, ‘Hacking Back: Optimal Use of Self-Defense in Cyberspace’, Oxford Research Paper, p1.
13 Ibid pp 20–24.
14 Alana Maurushat, senior lecturer at UNSW Faculty of Law (see Liam Tung, Is hacking in self-defence legal? Sydney Morning Herald (27 September 2013)).
15 Mike Burgess, Director-General ASD, Speech to ASPI National Security Dinner (29 October 2018).
16 Ibid.
17 Julian Bajkowski, Australia’s cyber spy chief slams corporates contemplating ‘hacking back’, IT News (30 October 2018).
18 Ibid.
30 Tom Kulik, ‘Why the Active Defense Certainty Act is a bad idea,’ Above the Law (29 January 2018).
31 Nicholas Schmidle, ‘The digital vigilantes who hack back,’ The New Yorker (7 May 2018).
32 Josephine Wolff, ‘When companies get hacked, should they be allowed to hack back?’ The Atlantic (14 July 2017).
33 ACDC Bill 2017 s2.
34 Andrea Shalal, ‘German spy agencies want right to destroy stolen data and ‘hack back’,’ Thompson Reuters (6 October 2017).
35 Janosch Delcker, ‘A hacked-off Germany hacks back,’ Politico (28 January 2018).
enforcement agencies, provides an 38 Admiral Michael S Rogers, Commander: United States Cyber Command, Statement before the Senate
Committee on Armed Services (27 February 2018) p4.
interesting contrast to the ACDC 39 Ibid.
Bill in the US. The sponsors of 40 Ibid p 12
the proposed German legislation 41 Sean Gallagher, ‘Why US “cyber-warriors” can’t do anything about Russian “cyber-meddling”’, ars
clearly do not share the view of Technica, 1 March 2018.
42 Ibid.
their American counterparts that
it is overly difficult to guarantee
timely and effective responses by a
nation’s agencies to the dynamic and
fast moving problem of malicious
hacking.
The CAMLA Board for 2019
President: Martyn Taylor (Norton Rose Fulbright)
The US Military View
Vice President: Gillian Clyde (Beyond International)
Nevertheless, the view that defence
and intelligence capabilities must Vice President: Debra Richards (Ausfilm)
be reorganised and augmented to Treasurer: Katherine Giles (MinterEllison)
deal with the threat of cyberwarfare
is stirring in the US. In testimony
Secretary: Rebecca Dunn (Gilbert + Tobin)
before the Senate Armed Services Julie Cheeseman (Ashurst)
Committee, outgoing head of US Chris Chow (Chris Chow Creative Lawyers)
Cyber Command (USCYBERCOM)
and the NSA, Admiral Michael Sophie Dawson (Bird & Bird)
Rogers, identified his ‘greatest Jennifer Dean (Corrs Chambers Westgarth)
concern’ to be ‘state-sponsored
Ashleigh Fehrenbach (MinterEllison)
malicious cyber actors and the
states behind them’, as ‘many states Eli Fisher (HWL Ebsworth)
now seek to integrate cyberspace Ryan Grant (Baker McKenzie)
operations with … their traditional
military capabilities.’38 Indeed, Emma Johnsen (Marque Lawyers)
several have mounted sustained Rebecca Lindhout (HWL Ebsworth)
campaigns to scout and access [the Marlia Saunders (News Corp)
US’s] key enabling technologies,
capabilities, platforms and systems’.39 Raeshell Staltare-Tang (Bird & Bird)
Admiral Rogers explained that Tim Webb (Clayton Utz)
the problem in defending against
cyberattacks on US infrastructure