The Ethics of Tracing Hacker Attacks through the Machines of Innocent Persons

International Review of Information Ethics 2 (2004)
  Copy   BIBTEX

Abstract

Victims of hacker attacks are increasingly responding with a variety of “active defense” measures, including “invasive tracebacks” that are intended to identify the parties responsible for the attack by tracing its path back to its original source. The use of invasive tracebacks raise ethical issues because, in most cases, they involve trespassing upon the machines of innocent owners. Sophisticated hackers attempt to conceal their identities by routing their attacks through layers of innocent agent machines and networks that are compromised without the knowledge of the owners. The use of invasive traceback technologies in such cases, then, involves an act is presumptively problematic from an ethical standpoint: intentionally entering upon the property of an innocent person without her consent constitutes a prima facie trespass. I argue that there is no ethical principle that would justify the use of invasive tracebacks by private persons or entities. First, I argue that invasive tracebacks cannot be justified under the Defense Principle, which allows one person to use proportional force to defend herself or other innocent persons from attacks. Second, I argue that, in ordinary cases, the use of an invasive traceback impacting innocent persons cannot be justified under the Necessity Principle, which permits the infringement of an innocent person’s rights when necessary to achieve a significantly greater good. Since these are the only applicable principles, I conclude that, in the absence of special circumstances, it is not ethically permissible for private parties and entities to implement invasive traceback technologies.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,674

External links

  • This entry has no external links. Add one.
Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Targeting the innocent: Active defense and the moral immunity of innocent persons from aggression.Kenneth Einar Himma - 2004 - Journal of Information, Communication and Ethics in Society 2 (1):31-40.
Self-Defence among Innocent People.Gerhard Øverland - 2005 - Journal of Moral Philosophy 2 (2):127-146.
Pacifism and Moral Theory.Jeff McMahan - 2010 - Diametros 23:44-68.
Dividing Harm.Gerhard Øverland - 2011 - Journal of Moral Philosophy 8 (4):547-566.
Equating innocent threats and bystanders.Helen Frowe - 2008 - Journal of Applied Philosophy 25 (4):277-290.
Punishing the Guilty, Not Punishing the Innocent.Richard Lippke - 2010 - Journal of Moral Philosophy 7 (4):462-488.

Analytics

Added to PP
2015-02-05

Downloads
0

6 months
0

Historical graph of downloads

Sorry, there are not enough data points to plot this chart.
How can I increase my downloads?

Author's Profile

References found in this work

No references found.

Add more references