Sunday 20 October 2013

0

COMPUTER HACKING


Hai friends today im posting a 39 pages book for you to understand hacking .this helped me a lot to understand when iam at starting stage.Here you go

          COMPUTER HACKING: MAKING THE CASE FOR A NATIONAL REPORTING REQUIREMENT
I. INTRODUCTION
Computer hackings have grown at an alarming rate and the effects are widespread and costly. Each year hackers steal millions of dollars worth of proprietary information from companies and organizations. A survey by the Computer Security Institute indicated that for the year 2002, theft of proprietary information by hackers cost companies and organizations over $70 million.1 The cost to insure against these hackers is staggering— the market for hacker insurance is expected to increase from $100 million in 2003 to $900 million by 2005.2 In addition, hackers can cause severe damage to computer systems by altering or deleting data files and disabling software.
In addition to proprietary information, hackers also steal personal information from these organizations and corporations including their customers’ credit card numbers, account numbers, and social security numbers. For example, in 2000, hackers stole 55,000 credit card numbers from creditcards.com and 300,000 credit card numbers from CDUniverse.com.3 The theft of personal information such as credit card numbers raises serious concerns relating to both identity theft and privacy.
** Permission is granted to use this work under the Creative Commons Attribution License, available at http://creativecommons.org/licenses/by/1.0/.
1COMPUTER SECURITY INSTITUTE, CSI/FBI COMPUTER CRIME AND SECURITY SURVEY 20 (2003), available at http://www.security.fsu.edu/docs/FBI2003.pdf. The respondents to this survey included 17% from high-tech companies, 15% from the financial sector, and 15% from government agencies. Id. at 2. Further, more than half of the organizations taking part in the survey had more than 1,000 employees while approximately 28% had more than 10,000 employees. Id. at 3.
2 Jon Swartz, Firms’ hacking-related insurance costs soar, USA TODAY, Feb. 9, 2003, available at http://www.usatoday.com/money/industries/technology/2003-02-09-hacker_x.htm. Worse yet, many general-liability policies have now eliminated the hacking-related portion of the coverage because of the number of claims filed within the last two years. See id. Thus, companies are being forced to choose between paying $5,000 to $30,000 a year for $1 million in stand-alone hacking coverage or not being insured against hackers at all. See id.
3 Associated Press, Extortionist Puts Credit Card Data on Web, CBSNEWS.COM, Dec. 14, 2000, at http://www.cbsnews.com/stories/2000/12/14/archive/technology/main257200.shtml. In the creditcard.com incident, the hackers who stole the credit card numbers demanded $100,000 ransom. Id. When the extortion payment was not made, the hackers retaliated by posting the stolen credit card numbers on a public webpage. Id.
1
Even more disconcerting than the theft of proprietary and personal information is the fact that most companies and organizations are not reporting hacking incidents to law enforcement.4 According to surveys from 1999 to 2003, only about 30% of hacking intrusions are ever reported.5 Further, Internet technology presents high hurdles for law enforcement to trace the hacking intrusions back to the hacker. This means that the vast majority of hackers have very little chance of being caught and prosecuted.
Because tackling the area of computer hacking requires an understanding of the technical issues involved, an Appendix is included, which will introduce the numerous tools that hackers use to accomplish their intrusive hacking attacks. Knowledge of this is necessary to appreciate the applicability of the current laws to these tools. Some readers may find it helpful to reference the Appendix before beginning Part II of the paper, which covers the scope of several federal laws commonly used against hackers.
Part III of the paper will evaluate the technical, societal, and legal failures that result in hackers not being caught or prosecuted. Against this background, Part IV of this paper proposes a national reporting requirement to tackle the problem of computer intrusions with respect to the computer networks of organizations and corporations. The national reporting requirement framework will propose one set of reporting requirements when privacy is at stake and another set of reporting requirements aimed at deterring property damage by hackers. Part V will then illustrate how such a framework for a national reporting requirement could help bridge the current technical, societal, and legal shortcomings discussed in Part III and thus reduce the number of computer intrusions in business and organizational computer networks as a whole. Finally, Part VI anticipates and responds to several major arguments against a reporting requirement.
While there is also the problem of hacking into personal computers, this paper does not intend to address that problem. However, as will be discussed in Part III of the paper, many hackers take control of personal computers for the purpose of launching hacking attacks on corporate computers. Accordingly, it is conceivable that reducing the number of corporate and organizational hacking intrusions will result in a proportionate decline in the number of personal computers attacked.
4 See COMPUTER SECURITY INSTITUTE, supra note 1, at 17.
5 See id.
2
II. CURRENT FEDERAL LAWS AGAINST COMPUTER HACKING
This section covers the federal approaches applicable to computer crimes that may be relevant to the problem of computer hacking. The author realizes that some states may have their own laws tailored toward various computer crimes, like the variations of the proposed Federal Computer Systems Protection Act.6 Further, many practitioners have been creative in applying common law approaches along with other state laws (such as trade secrets law) to the area of cybercrime.7 However, because of the numerous jurisdictional limitations of state laws8 and because computer hacking is not limited by state borders, this paper focuses on the two main federal laws relevant to computer hacking—the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act.
A. Electronic Communications Privacy Act
The Electronic Communications Privacy Act of 1986 (“ECPA”) was Congress’s patchwork attempt to fit new crimes into the existing laws.9 Title I of the ECPA amended the Federal Wiretap Act, 18 U.S.C. §§ 2510 et al., to include not only wire or oral communications, but also electronic communications.10 Title II of the ECPA created the Stored Communications Act.11 The coverage of both the Federal Wiretap Act and the Stored Communications Act is described below.
1. Federal Wiretap Act, 18 U.S.C. §§ 2510 et al.
Title I of the ECPA amended the Federal Wiretap Act to cover not only wire and oral communications, but also electronic communications.12 The current
6 See, e.g., the Georgia Computer Systems Protection Act at O.C.G.A. § 16-9-90 (2002).
7 As an example, in Ebay, Inc. v. Bidder’s Edge, Inc., Bidder’s Edge, an auction aggregation site, used an unauthorized robot to collect auction listings from eBay’s site. See 100 F. Supp. 2d 1058, 1062-63 (N.D. Cal. 2000). Based on eBay’s claim that Bidder’s Edge’s activities constituted trespass to chattels, the court granted a preliminary injunction against Bidder’s Edge’s use of robots to collect information from eBay’s site. See id. at 1072.
8 The author also realizes that computer hackings often originate from foreign countries—China is one such example. See, e.g., Daniel M. Creekman, Comment, A Helpless America? An Examination of the Legal Options Available to the United States in Response to Varying Types of Cyber-Attacks from China, 17 Am. U. Int’l Rev. 641, 675 (2002) (stating that the “lack of an agreement with China, whether a bilateral extradition treaty or a multilateral international agreement, prevents an action to seek legal redress from a lone Chinese citizen-hacker, regardless of the importance of the victimized computer system.”). This raises international jurisdictional issues that, while important in certain circumstances, are beyond the scope of this undertaking.
9 See Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 874 (stating that the “existing statutory framework is ill-suited to address modern forms of communications”).
10 See id. (reviewing S. Rep. No. 99-541, at 3 (1986)).
11 See id.
12 See id. (stating that the Wiretap Act was amended to “address[] the interception of . . . electronic communications”). Congress gave “electronic communications” an expansive definition. An electronic communication is “any transfer of signs, signals, writing, images,
3
version of the Wiretap Act prohibits intentionally intercepting (or endeavoring to intercept) any wire, oral, or electronic communication.13 In addition, the Wiretap Act punishes disclosing or using the contents of any wire, oral, or electronic communication with knowledge that the information was obtained through the prohibited interception of a wire, oral, or electronic communication.14
sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system that affects interstate or foreign commerce, but does not include-- (A) any wire or oral communication . . . .” 18 U.S.C. § 2510(12).
A large blow to the effectiveness of the Wiretap Act against computer hackers was the judicially-interpreted requirement of an “acquisition contemporaneous with transmission.”15 This means that hackers that obtain information through their intrusive attacks do not violate the Wiretap Act unless they capture the information while it is being transmitted from one computer to another.16 Presumably, the Wiretap Act applies to hackers who install network packet sniffers (“sniffers”) to intercept real-time communications. This is because sniffers capture network data packets while they are in transmission, and thus the acquisitions of the data packets by the sniffers are contemporaneous with their transmission from one computer to another. Unfortunately, the case law is absolutely devoid of examples of prosecutions in such cases.
13 See 18 U.S.C. § 2511(1)(a) (prohibiting “intentionally intercept[ing], endeavor[ing] to intercept, or procur[ing] any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication”). A violation of 18 U.S.C. § 2511(1) may result in a fine or imprisonment for not more than five years, or both. See 18 U.S.C. § 2511(4). Notwithstanding possible criminal punishment, the Wiretap Act generally authorizes recovery of civil damages. See 18 U.S.C. § 2520(a) (stating that “any person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of this chapter . . . may in a civil action recover from the person or entity . . . which engaged in that violation such relief as may be appropriate”).
14 See 18 U.S.C. § 2511(1)(c) (prohibiting “intentionally disclos[ing], or endeavor[ing] to disclose, to any other person the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection”); 18 U.S.C. § 2511(1)(d) (prohibiting “intentionally us[ing], or endeavor[ing] to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection”).
15 The word “intercept” as used in the Wiretap Act has been interpreted to mean an “acquisition contemporaneous with transmission.” See U.S. v. Steiger, 318 F.3d 1039, 1048 (11th Cir. 2003), cert. denied, 123 S. Ct. 2120 (2003). The Fifth, Ninth, and Eleventh Circuit have all required such an interpretation of the word “intercept.” See Theofel v. Farey-Jones, 341 F.3d 978, 986 (9th Cir. 2003); Steiger, 318 F.3d at 1048; Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878-89 (9th Cir. 2002) (withdrawing contrary panel opinion at 236 F.3d 1035 (9th Cir. 2001)); Steve Jackson Games, Inc. v. U.S. Secret Serv., 36 F.3d 457, 460 (5th Cir. 1994).
16 See id.
4
2. Stored Communications Act, 18 U.S.C. §§ 2701 et al.
The Stored Communications Act (“SCA”) was created by Title II of the ECPA.17 Title 18 U.S.C. § 2701(a) of the SCA punishes “whoever—(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to wire or electronic communication while it is in electronic storage in such system . . . .”18
The SCA only applies if the target of the attack is an “electronic communication service.”19 An electronic communication service is defined as “any service which provides to users thereof the ability to send or receive wire communications.”20 An email server would clearly fit this definition as would Internet Service Providers.21 However, courts have determined that personal computers are not electronic communication services within the purview of the SCA.22 Unfortunately, this means that if the hacker breaks into a computer that is not a qualifying electronic communication service, then the SCA does not apply. This limitation has curbed the effectiveness of the SCA against computer hackers.
B. Computer Fraud and Abuse Act (18 U.S.C. § 1030)
1. Overview
Title 18 U.S.C. § 1030, otherwise known as the Computer Fraud and Abuse Act (“CFAA”), is currently the most targeted and comprehensive federal law directed towards computer-related criminal conduct. The premise behind the enactment of the CFAA was to “deter and punish those who intentionally access
17 See supra note 11.
18 18 U.S.C. § 2701(a). Violations of the SCA may result both fines and imprisonment (if offense was for commercial advantage, malicious destruction or damage, or private commercial gain, or in furtherance of any criminal or tortuous act, then imprisonment for not more than 5 years for first offenses or not more than 10 years for a subsequent offense). See 18 U.S.C. § 2701(b). In addition, in certain circumstances, civil causes of action are authorized. See 18 U.S.C. § 2707 (stating that “any provider of electronic communication service, subscriber, or other person aggrieved by any violation of the [Stored Communications Act] in which the conduct constituting the violation is engaged in with a knowing or intentional state of mind may, in a devil action, recover from the person or entity . . . which engaged in that violation such relief as may be appropriate”).
19 See 18 U.S.C. § 2701(a).
20 18 U.S.C. § 2510(15) incorporated by 18 U.S.C. § 2711(1) (stating that “the terms defined in section 2510 of this title have, respectively, the definitions given such terms in that section”).
21 See Theofel, 341 F.3d at 984-85 (finding that email stored at an Internet Service Provider is within the scope of the SCA); Steiger, 318 F.3d at 1049 (noting that “the SCA may apply to the extent the source accessed and retrieved any information stored with [the] Internet service provider”).
22 See Steiger, 318 F.3d at 1049 (stating that ordinarily a personal computer does not meet the requirements of an electronic communication service).
5
computer files and systems without authority and cause harm.”23 The CFAA contains seven substantive provisions. Each of the seven provisions will be introduced according to its statutory order.
First, section 1030(a)(1) prohibits knowingly accessing a computer without authorization or exceeding authorization, thereby obtaining and subsequently transferring classified government information.24
Next, section 1030(a)(2), which is highly applicable to intrusive computer hackers, proscribes intentionally accessing a computer without authorization or exceeding authorization and obtaining information from a financial institution, any department or agency of the United States, or any protected computer25 involved in interstate or foreign communication.26
Section 1030(a)(3) makes it a crime to intentionally, without authorization, access a nonpublic computer of a department or agency of the United States.27
Section 1030(a)(4) prohibits knowingly and with intent to defraud, accessing a protected computer without authorization (or in excess of authorization) and thereby obtaining anything of value greater than $5,000 within any 1-year period.28
Section 1030(a)(5)(A) is the main anti-hacking provision and contains three types of offenses. Subsection 1030(a)(5)(A)(i) proscribes knowingly causing the transmission of a program, information, code, or command, and as a result, intentionally causing damage without authorization to a protected computer.29 Prior to the amendment by the USA PATRIOT Act of 2001 (“PATRIOT Act”), the CFAA defined damage as “any impairment to the integrity or availability of data, a program, a system, or information that-- (A) causes loss
23 Doe v. Dartmouth-Hitchcock Med. Ctr., 2001 DNH 132 (D. N.H. 2001) (reviewing S. Rep. no. 104-357 (1996), pts. II, III).
24 See 18 U.S.C. § 1030(a)(1).
25 The definition of a “protected computer” is very inclusive. “[T]he term ‘protected computer’ means a computer—(A) exclusively for the use of a financial institution or the United States Government, or in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or (B) which is used in interstate or foreign commence or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.” 18 U.S.C. § 1030(e)(2). It is not difficult to imagine that most computers connected to the Internet are involved in interstate commerce. Indeed, over 50 million American computers that are connected to the Internet can be classified as “protected computers.” See Mary M. Calkins, They Shoot Trojan Horses, Don’t They? An Economic Analysis of Anti-Hacking Regulatory Models, 89 Geo. L.J. 171, 172 (2000).
26 See 18 U.S.C. § 1030(a)(2).
27 See id. § 1030(a)(3).
28 See id. § 1030(a)(4).
29 See id. § 1030(a)(5)(A)(i).
6
aggregating at least $5,000 in value during any 1-year period to one or more individuals.”30 Following the amendments by the PATRIOT Act, the CFAA eliminated the $5,000 jurisdictional requirement in criminal cases and damage is now broadly defined as “any impairment to the integrity or availability of data, a program, a system or information.”31 While subsection 1030(a)(5)(A)(i) focuses more on intentionally causing damage (without regard to authorization), subsection 1030(a)(5)(A)(ii) focuses on intentionally accessing a protected computer without authorization.32 Subsection 1030(a)(5)(A)(ii) proscribes intentionally accessing a protected computer without authorization and thereby recklessly causing damage. Finally, subsection 1030(a)(5)(A)(iii) proscribes intentionally accessing a protected computer without authorization and thereby causing damage.33
Section 1030(a)(6) prohibits the trafficking of passwords through which a computer may be accessed without authorization.34
Finally, section 1030(a)(7) makes it a crime for someone to transmit a communication in interstate or foreign commerce that threatens damage to a protected computer for the intent of extorting money or other things of value.35
2. The CFAA as applied to intrusive computer hackers
Of the seven prohibitions listed in the CFAA, two of these are particularly important to the prosecution of intrusive computer hackers—namely sections 1030(a)(2) and 1030(a)(5).
As stated above, section 1030(a)(2) applies to a hacker who intentionally accesses a computer without authorization or exceeds authorization and obtains information from a protected computer involved in interstate communication.36 For example, a hacker may violate section 1030(a)(2) by obtaining unauthorized access to an Internet computer through war dialing or through a Trojan horse37 and then obtaining sensitive personal information such as social security numbers or credit card numbers from the hijacked computer.
In addition, section 1030(a)(5) applies to a hacker that causes damage to a protected computer. If the damage was caused by the transmission of a program, information, code, or command, then subsection 1030(a)(5)(A)(i) is applicable.38
30 Id. § 1030(e)(8) (1994& Supp. IV 1998).
31 Id. § 1030(e)(8).
32 See id. § 1030(a)(5)(A)(ii).
33 See id. § 1030(a)(5)(A)(iii).
34 See id. § 1030(a)(6).
35 See id. § 1030(a)(7).
36 See supra note 26 and accompanying text.
37 See parts C and E in the Appendix for discussions regarding war dialing and Trojan horses.
38 See 18 U.S.C. § 1030(a)(5)(A)(i).
7
Therefore, a Trojan horse (and also other viruses and worms) would be such a “program, information, code, or command” invoking the prohibition of subsection 1030(a)(5)(A)(i). Alternatively, if the damage was caused from unauthorized access, then either subsection 1030(a)(5)(A)(ii) or subsection 1030(a)(5)(A)(iii) would apply.39 Once the hacker obtains access to the computer, either through a Trojan horse or other unauthorized means such as war dialing or buffer overflow attacks,40 damage can result from altering or deleting existing files or otherwise impairing “the integrity or availability of data, a program, a system or information.”41
A violation of any of the seven prohibitions of the CFAA can result in criminal sanctions.42 However, for civil damages, a violation of the CFAA must include at least one of the five factors listed in section 1030(a)(5)(B).43 The most relevant of these five factors is the requirement of a “loss to 1 or more persons during any 1-year period . . . aggregating at least $5,000 in value.”44 This often presents a hurdle for victims who sometimes find it difficult to prove a loss of $5,000 in value.
III. FAILURES PREVENTING REDUCTION IN INTRUSIVE COMPUTER HACKING
As described in the Appendix, intrusive computer hackers have a variety of tools available for them to breach the security of computer systems. Indeed, many hackers themselves freely share the tools and methods they have developed or acquired.45 Hackers, in addition, also utilize several additional tools to help conceal their tracks. It is estimated that at most, only ten percent of successful intrusions are ever detected.46 Even if an intrusion is successfully detected, a rough estimate is that only between one and seventeen percent of these detected intrusions are ever reported to law enforcement.47 Finally, of the successful intrusions reported to law enforcement, only a small percentage of these cases are
39 See id. § 1030(a)(5)(A)(ii) and (iii).
40 See part D of the Appendix for a discussion regarding buffer overflow attacks.
41 18 U.S.C. § 1030(e)(8).
42 See id. § 1030(c) (describing the punishments for violations of § 1030(a) or § 1030(b)).
43 See 18 U.S.C. § 1030(g) (stating that “[a] civil action for a violation of this section may be brought only if the conduct involves 1 of the factors set forth in clause (i), (ii), (iii), (iv), or (v) of subsection (a)(5)(B)”).
44 See 18 U.S.C. § 1030(a)(5)(B)(i).
45 There is actually a hacker code of ethics that is generally followed by some in the hacking underground. Among these rules are to “always be willing to freely share and teach your gained knowledge and methods” and to “respect knowledge and freedom of information.” See Brian Matheis, Hacker Ethics: Part II, Nov. 25, 2003, at http://www.geocities.com/brian_matheis/hacker_ethics/part2.html (last visited Mar. 26, 2004).
46 See Jamila Harrison Vincent, Cyberterrorism, at http://gsulaw.gsu.edu/lawand/papers/fa01/harrisonvincent/ (last visited Mar. 26, 2004).
47 See id. However, these numbers are not beyond dispute. Surveys by the Computer Security Institute have found that approximately 30% of its respondents have reported their incidents to law enforcement. See supra note 5.
8
successfully prosecuted.48 A 1999 study by David Banisar (“Banisar”), who was involved with the Electronic Privacy Information Center, found that in 1998, of the 419 cases of computer fraud referred to federal prosecutors, only 83 cases were prosecuted.49 Moreover, of these 83 cases, only 57 cases reached disposition— with 47 ending in convictions and the remaining 10 ending unsuccessfully for prosecutors.50 Surprisingly, the average sentence was only five months and half of the defendants who were convicted received no jail time at all.51 Against this background, this paper will now discuss the technical, societal, and legal failures that contribute to the unsuccessful prosecution of computer hackers.
A. Technical Failures
The federal laws discussed in Part II— the ECPA and CFAA— are only effective against computer hackers if they are apprehended. In this section, the various tools and methods that computer hackers use to conceal their activities and evade law enforcement will be discussed.
1. Tracing difficulties
All computers communicating on the Internet are assigned an Internet Protocol (“IP”) address.52 This IP address uniquely identifies a computer and is similar to how a street address identifies a particular home.53 Because malicious hackers want to make it more difficult for law enforcement to find them, they will oftentimes mask their activities. These hackers may utilize intermediate computers, delete log files, or utilize anonymous proxy servers as described below.
a. Utilization of intermediate computers
If a hacker has compromised a computer, the hacker may utilize this compromised computer as a “launching pad” for attacks on other computers.54 By launching their attacks from intermediate computers, computer hackers can make it more difficult for law enforcement to trace their attacks.
48 See Kevin Poulsen, Study: Cybercime cases up 43 percent, ZDNET NEWS, Aug. 4, 1999, at http://zdnet.com.com/2100-11-515355.html?legacy=zdnn.
49 See id.
50 See id.
51 See id.
52 For a short and simple introduction on IP addresses, see Russ Smith, The IP Address: Your Internet Identity, CONSUMER.NET, Mar. 29, 1998, at http://consumer.net/IPpaper.asp.
53 See id.
54 See VERISIGN, INC., HACKING AND NETWORK DEFENSE 10 (2002), available at http://www.securitytechnet.com/resource/rsc-center/vendor-wp/verisign/hacking.pdf (last visited Mar. 26, 2004) (stating that “[r]ather than use his or her own system to launch an attack, the hacker decides to use [the compromised computer]”).
9
For example, the hacker can utilize compromised Computer A to connect to compromised Computer B, which is then used to attack the target computer. In this example, this means that law enforcement must penetrate two additional layers of anonymity (Computers A and B) before discovering the hacker’s computer.55
As a first step, law enforcement will investigate the log file of the target computer (and its Internet Service Provide (“ISP”)). The log file of the target computer (or its ISP) will indicate the IP address of Computer B. Investigators must then travel to Computer B and obtain its log file. The log file of Computer B (or its ISP) may point to the IP address of Computer A. Investigators must then go to Computer A (or its ISP) to obtain its log file, and, if lucky enough, will obtain the IP address of the hacker’s own personal computer. Further, law enforcement will likely have to obtain subpoenas and court orders to obtain access to Computers A and B (or the ISP’s of Computers A and B).56
b. Problems with log files

In the above example, tracking a computer hacker from the target computer to the hacker’s personal computer requires that the log files at intermediate Computers A and B (or their respective ISP’s) be intact. Several problems may occur with respect to these log files: (1) some victim computers do not keep log files; (2) the hackers sometimes alter or delete log files upon gaining entry into the compromised computer; (3) or the ISP’s log files have been routinely cleared before law enforcement sends the retention letter to the ISP.57 If any of these three events occur, then the chain from the target computer to the hacker has been broken and law enforcement will have to turn to traditional investigative techniques.58 Unfortunately, these traditional investigative techniques are oftentimes inadequate to identify the hacker.59
2. Existence of anonymous proxy servers
Most users access the Internet through legitimate proxy servers provided by reputable companies such as AOL or Earthlink. These legitimate proxy servers keep logs of the activities of their users. However, the existence of
55 Sometimes these compromised computers are misconfigured proxy servers. When a hacker connects to target computer through a proxy server, the proxy’s IP address, rather than the hacker’s IP address, is recorded on the target computer’s logs. See Chris Prosise and Saumil Shah, Hackers’ Tricks to Avoid Detection, SECINF.NET NETWORK SECURITY LIBRARY, Oct. 16, 2002, at http://secinf.net/info/misc/tricks.html.
56 See DANIEL A.MORRIS, US ATTORNEYS’ BULLETIN: TRACKING A COMPUTER HACKER (2001), at http://www.cybercrime.gov/usamay2001_2.htm (last updated July 10, 2001) (stating that “[s]ubpoenas and court orders to each bounce point may be necessary to identify the hacker”).
57 See id. (discussing that a victim that has no record of the IP address of the attacking computer may leave investigators to traditional investigation techniques that may be inadequate).
58 See id.
59 See id.
10
anonymous proxy servers60 make it much more difficult for law enforcement to find hackers because anonymous proxy servers intentionally do not keep any log files at all. Utilizing the same example above, this means that at best, the log file of Computer A (or its ISP) will give the IP address of the anonymous proxy server, which is insufficient to uniquely identify a hacker out of the perhaps thousands of people who connect to the Internet through the anonymous proxy server.
B. Societal Failures
Sometimes hackers are never caught because companies never alert law enforcement to the hacker’s intrusive activity. At other times, even cases that are referred to law enforcement and prosecutors (assuming the hacker-defendant can be identified) result in relatively low prosecution rates. This subsection explains why companies fail to report and why prosecutors fail to prosecute.
1. Failure to report
The 2003 CSI/FBI Computer Crime and Security Survey (“2003 CSI/FBI Survey”) found that in 2002, only thirty percent of the companies and organizations surveyed reported computer intrusions to law enforcement.61 Some of their reasons for not reporting include competitive advantage concerns, negative publicity concerns, and lack of knowledge that anything could be done.62 a. Competitive advantage concerns
When asked why their organization did not report intrusions to law enforcement, sixty-one percent of the respondents to the 2003 CSI/FBI Survey indicated that they feared that their competitors would use this information advantageously.63 For example, competitors may advertise that they are not subject to the same security loopholes as the hacked company. These competitors may then be able to divert customers from the hacked company.
In addition, once federal law enforcement gets involved, they oftentimes move at a painfully slow rate.64 Further, federal agents may freeze, and thus make unavailable for an extended period of time, the resources that were
60 For an example of an anonymous proxy server, see http://www.multiproxy.org or http://www.anonymizer.com.
61 See COMPUTER SECURITY INSTITUTE, supra note 1, at 18. Previously, the 2002, 2001, 2000, and 1999 surveys indicated reporting rates of 34%, 36%, 25%, and 32% respectively. See id.
62 See id. at 19.
63 See id. (only 45% of the total respondents answered this question).
64 See Thomas C. Greene, Is prosecuting hackers worth the bother?, THE REGISTER, Aug. 21, 2001, at http://www.theregister.co.uk/content/6/21184.html (discussing how deliberately the Feds conduct their investigation).
11
compromised by the hacker.65 The company may also have to expend additional resources in providing Federal agents with information about its business, in attending interviews, and in making employees available as witnesses for trial.66 Thus, many companies are concerned that if a substantial amount of their resources are diverted towards the investigation, their competitors may gain the competitive advantage and manage to outmaneuver them in the marketplace.
Perhaps a good example of this occurred after hackers penetrated the systems of Egghead.com67 (“Egghead”) in December 2000. Immediately after the intrusion, Egghead spent substantial resources hiring the “world’s leading computer security experts” to investigate the extent of the security breach and to analyze the current security measures.68 While Egghead had expected to learn the extent of the security breach within 5 days, the investigation required 20 days, perhaps because a full forensics investigation had to be done.69 Further, law enforcement was simultaneously pursuing a criminal investigation.70 Shortly after the hacking incident, Egghead’s business took a turn for the worse.71 Egghead blamed the shortfall in expected sales in the following fourth quarter (February 2001) on “softening of consumer demand for personal computers and related technology products.”72 Perhaps Egghead, consumed with dealing with the hacking incident, was not able to recognize and respond quickly enough to the intense competition within the computer and software marketplace. Egghead’s inability to respond quickly enough to the marketplace was permanently marked on October 15, 2001.73 On that day, Egghead filed for bankruptcy, citing an unexpected sharp drop in sales during the preceding several weeks.74 Egghead’s fate was sealed when Amazon.com successfully purchased the assets of Egghead through a bankruptcy auction.75
65 Once the Federal agents get involved, many restrictions on what information can be collected and how it is to be collected will kick in. See id.
66 See id.
67 Egghead.com previously sold computers, software, and consumer electronics on its web site.
68 See Lori Enos, Egghead Hacked and Cracked, E-COMMERCE TIMES, Dec. 22, 2000, at http://www.ecommercetimes.com/perl/story/6286.html.
69 See Robert Lemos, Lengthy Egghead investigation costs banks millions, CNET NEWS.COM, Jan. 9, 2001, at http://news.com.com/2009-1017-250745.html?legacy=cnet (discussing the steps Egghead took after the hacking incident was discovered).
70 See id.
71 See Carol King, EGGHEAD.COM SALES SOFT IN Q4, INTERNETNEWS.COM, Jan. 26, 2001, at http://www.internetnews.com/ec-news/article.php/571601 (reporting that Egghead’s sales revenue in the fourth quarter would not meet analysts’ expectations).
72 See id.
73 See Michael Mahoney, Egghead Files for Bankruptcy, Sells Assets, E-COMMERCE TIMES, Aug. 16, 2001, at http://www.ecommercetimes.com/perl/story/12841.html (discussing Egghead’s bankruptcy proceedings).
74 See id. (discussing that the initial plan under bankruptcy was to sell most of its assets to Fry’s Electronics, a California brick-and-mortar retail chain).
75 Amazon.com purchased Egghead’s Web address, customer data, trademarks, and other related intellectual property for $6.1 million in cash. See Ana Letícia Sigvartsen, Egghead reborn
12
b. Negative publicity concerns
through Amazon, Nov. 5, 2001, INFOSATELLITE.COM, at http://www.infosatellite.com/news/2001/12/a051201egghead_amazon.html.
The potential negative publicity that may come from reporting computer intrusions can be quite damaging and therefore can also be a contributing factor to the non-reporting of intrusive computer attacks.76 For example, the CDUniverse.com (“CDUniverse”) hacking incident in 2000, where 300,000 credit card numbers were stolen by a hacker, was widely publicized by the media.77 Undoubtedly, CDUniverse lost many sales during the time that its web site was unavailable to potential customers. More importantly, however, many potential customers declined making purchases from CDUniverse for fear that their own credit card numbers would be stolen by hackers.78
Indeed, “most companies believe that the public relations (‘PR’) costs of being identified with weak security are far greater than the damage most malicious hackers can inflict.”79 Seventy percent of the respondents in the 2003 CSI/FBI indicated that negative publicity was a factor in not reporting intrusions to law enforcement.80 Accordingly, most large companies tend to handle the problem in-house rather than risk the potential costs of negative publicity.81
c. Lack of knowledge by victims that anything can be done
Fifty-three percent of respondents in the 2003 CSI/FBI Survey indicated that they did not know they could report these incidents.82 The survey narrates a highly probable explanation about the low rates of reporting:
While [the lack of reporting] may seem strange, . . . it makes more sense in that it isn’t always obvious who to turn to when someone has been hacking, say, your Web storefront’s customer database. Should you turn to the local police? By and large, you won’t get much help there. Should you turn to the FBI? In some cases they can help you and in others, they
76 See COMPUTER SECURITY INSTITUTE, supra note 1, at 19 (indicating that in 2003, 70% of respondents cited negative publicity concerns as a reason for not reporting intrusions).
77 See Extortionist Puts Credit Card Data on Web, supra note 3.
78 See Maria Atanasov, The truth about Internet Fraud: Merchants Pay the Price, ZDNET AUSTRALIA, Mar. 13, 2001, at http://www.zdnet.com.au/news/business/0,39023166,20208623,00.htm (“As CDUniverse . . . can attest, fraud's most devastating effects are not the material costs associated with chargebacks or bank fees. What's often worse is the resulting damage to a merchant's reputation, erosion of consumer trust, and, ultimately, lost sales.”).
79 See Greene, supra note 64.
80 See COMPUTER SECURITY INSTITUTE, supra note 1, at 19 (only 45% of the total respondents answered this question).
81 San Diego Supercomputer Center Security Manager Tom Perrine, speaking at the tenth annual (2001) USENIX security Symposium in Washington, indicated that “[i]f you’re a Fortune 500, there’s about a 99.995 percent chance that you’re going to cover up and go on.” See id.
82 See id. (reporting that only 45 percent of the total survey respondents indicated why they didn’t report the intrusions, and of these 45 percent, 53 percent stated that they did not know that they could report these incidents).
13
can’t (but it sure doesn’t hurt to call).83
This lack of knowledge that anything can be done is not surprising given the low number of prosecutions of other hackers. Thus, the result is that many hackers that could be prosecuted if only reported are not being held accountable for their intrusive attacks.
2. Failure to prosecute
Notwithstanding the failure in reporting hackers, the failure in prosecuting hackers also creates a situation in which hackers are not being held accountable for their intrusive attacks. In this subsection, two factors for why hackers are not being prosecuted will be explored—a lack of understanding by law enforcement and the fact that computer crimes are difficult to prove.
a. A lack of understanding in hacking cases
Law enforcement has struggled with prosecuting hackers because the technology is complex and difficult to understand.84 The result is that the vast amount of evidence presented along with the lack of understanding by police and prosecutors oftentimes leads to unnecessary searches, arrests, and court delays.85 Thus, it is not surprising that in 1998, just under twenty percent of referred cases were prosecuted.86 Moreover, this twenty percent is slim compared to the overall federal prosecution rate in 1998, which was approximately sixty-one percent.87
b. “Computer crime is terribly hard to prove”88
In the 1999 Banisar study discussed above, of the 419 cybercrime cases referred to prosecutors, 336 were dismissed.89 The majority of these cases were dismissed for lack of supporting evidence.90
The lack of supporting evidence can result from either concealment by the hackers themselves (as discussed in Part III.A) or by delayed or improper actions by others. For example, as discussed above, Internet Service Providers may have routinely cleared their log files before receiving the retention order by law
83 See id. at 17.
84 Rob Apgood, The Difficulty of Prosecuting High Tech Crimes, WASHINGTON STATE BAR ASSOCIATION, Nov. 1999, at http://www.wsba.org/media/publications/barnews/archives/1999/nov-99-crimes.htm (stating that “the world of high-tech crime is frequently too complex for police and prosecutors to handle properly”).
85 See id.
86 The actual percentage was 19.8% (83 of 419 referred cases). See Poulsen, supra note 48.
87 In 1998, of the 132,772 referred cases, 82,071 of these were prosecuted. See id.
88 This statement was made in 1999 by then FBI spokesperson Debbie Weierman. See id.
89 See Apgood, supra note 84.
90 See id.
14
enforcement.
All too often, companies that have been hacked into have not taken the proper steps to preserve evidence. Sometimes the hijacked computers remain in use, thereby overwriting all traces of the hacker’s footprints.91 Or at other times, companies may inadvertently destroy the traces of the hacker as they try to ascertain the damage to the hijacked computer system. Indeed, proper preservation of evidence requires that deliberate and laborious steps be taken, including making a byte-stream copy of the hijacked computer’s hard-drive and employing forensic software to uncover changes on the hijacked computer.92
C. Failures in the ECPA and CFAA

Finally, there are some failures in the current federal laws that allow the problem of intrusive computer hacking to continue. This includes loopholes in the ECPA and the lack of deterrence by the CFAA.93 Moreover, the CFAA fails to hold software manufacturers liable for the negligent design of software.94
1. Judicial exceptions to the ECPA
The courts themselves have conceded the shortcomings of the ECPA, which includes the Wiretap Act and the Stored Communications Act (“SCA”) as described above in Part II.A. For example, in United States v. Steiger, the 11th Circuit stated that “our reading of the Wiretap Act to cover only real-time interception of electronic communications, together with the apparent non-applicability of the SCA to hacking into personal computers to retrieve information stored therein, reveals a legislative hiatus in the current laws purporting to protect privacy in electronic communications.”95
As previously explained, the Wiretap Act applies only to acquisitions contemporaneous with transmission and, thus, typically would only apply to the hacker’s use of network packet sniffers.96 However, other hacking tools described in the Appendix such as buffer overflow attacks and Trojan horses are not prohibited by the Wiretap Act (although may be prohibited by other federal and state laws).
In addition, the SCA mainly applies against intrusive hackers whose
91 For example, some of the evidence may be contained in a computer’s temporary swap file. If the computer is rebooted, this temporary swap file is cleared.
92 See Scott Grace, Computer Incident Response and Computer Forensics Overview, SANS INSTITUTE, at http://www.giac.org/practical/gsec/Scott_Grace_GSEC.pdf (last visited Mar. 26, 2004) (discussing how the computer expert will use forensic software to discover, to the extent possible, affected files and any attempts to hide, delete, protect, or encrypt information).
93 See infra Part III.C.2.a.
94 See 18 U.S.C. § 1030(g) (discussed infra in Part III.C.2.b)
95 318 F.3d 1039, 1049 (11th Cir. 2003) (emphasis added).
96 For a discussion on network packet sniffers, see part F of the Appendix.
15
attacks are against Internet Service Providers, email servers, and other electronic communication services.97 But, many computers that contain highly sensitive information would be more akin to a personal computer and not be considered an electronic service within the purview of the SCA.98 Hackers could obtain access to these non-electronic communication service computers by either using a launch-pad style attack99 (by utilizing a company’s computer that is visible on the Internet to access a company’s internal computer that is not accessible on the Internet) or through war dialing as described in Part C of the Appendix.
2. Failures in the CFAA
While the ECPA provides only limited assistance to the problem of intrusive computer hacking, the current version of the Computer Fraud and Abuse Act (including changes made by the PATRIOT Act) has covered many of the deficiencies of the ECPA.100 Despite overcoming the deficiencies of the ECPA, the main problem with the CFAA is that it does not appear to be deterring intrusive computer hackers.101 In addition, the CFAA does not hold software manufacturers liable for the negligent design of their software.102
a. Lack of deterrent effect of the CFAA
Twenty years have passed since the enactment of the first version of the CFAA in 1984, and the incidences of intrusive computer hacking have not declined but rather increased.103 The 2003 CSI/FBI survey indicated that system penetrations for respondents increased from fifty-two in 1999 to one hundred thirteen in 2002 and eighty-eight in 2003.104
A possibility is that computer hackers may not know of the seriousness of penalties for certain violations of the CFAA. There is some support for this proposition. Some of the broadening amendments, including the definitions of damage and protected computers have only occurred recently.105 Other provisions such as the strong protection of government computers have stood the test of time. Indeed, the CFAA was initially enacted in 1984 to protect government computers (and financial computers) from hackers. In 2002, a modern day hacker named HeX compiled a revised code of ethics for the hacking
97 See supra Part II.A.2
98 See Steiger, supra note 22.
99 See Part III.A.1.a for how intermediate computers may be used to access the target computer.
100 See 18 U.S.C. § 1030(a)(2) and (a)(5).
101 See infra note 104.
102 See supra note 94.
103 See COMPUTER SECURITY INSTITUTE, CSI/FBI COMPUTER CRIME AND SECURITY SURVEY 11 (2003), available at http://www.security.fsu.edu/docs/FBI2003.pdf.
104 From 1999 to 2003, respondents reported 52, 68, 70, 113, and 88 system penetrations, respectively. See id.
105 See supra Part II.B.1 for a discussion about how the PATRIOT Act broadened the definition of damage.
16
underground.106 Included among his revised code of ethics was to never take “stupid” risks such as trying to connect to a government computer.107 Undoubtedly, this was a recognition of the strong protection for government computers that has endured every revision of the CFAA.108 Not surprisingly, this revised code of ethics did not include a prohibition against hacking into personal or corporate computers.109
Another possibility is that these hackers are overly optimistic about their chances of not being caught or prosecuted. Some experts have indicated that a significant number of hackings are committed by young people who believe that “they are untouchable.”110 Given the statistics compiled by Banisar regarding the actual number of prosecutions in 1998, these computer hackers may be justified in being overly optimistic.
b. Software manufacturers explicitly excepted from liability under the CFAA
Prior to the 2001 PATRIOT Act amendment of 18 U.S.C. § 1030(g), several courts had expanded the reach of CFAA to include not only damages resulting from unauthorized computer use, but also damages resulting from software manufacturers who distributed faulty software.111 However, the last part of 18 U.S.C. § 1030(g) now explicitly states that “[n]o action may be brought under this subsection for the negligent design or manufacture of computer hardware, computer software, or firmware.”112 This means that software manufacturers will not be held accountable for creating the security holes that allow computer hackers to hijack computer systems.
IV. MOVING TOWARDS A NATIONAL REPORTING REQUIREMENT FOR
COMPUTER INTRUSIONS
Having established the technical, societal, and legal problems that contribute to the escalating problem of intrusive computer hacking, this paper now proposes a solution in the form of a national reporting requirement. First, as background, California’s reporting requirement will be introduced. California is
106 See Matheis, supra note 45 (discussing the evolution of hacker ethics).
107 See id.
108 See 18 U.S.C. § 1030(a) (protecting computers of the United States government); 18 U.S.C. § 1030(c)(1) (imprisonment up to 10 years for first offense or 20 years if existing prior conviction).
109 See Matheis, supra note 45.
110 See Raju Chebium, Experts say more laws won’t stop computer hackers, CNN.COM, May 8, 2000, at http://www.cnn.com/2000/LAW/05/05/love.bug/.
111 See, e.g., Shaw v. Toshiba Am. Info. Sys., Inc., 91 F. Supp. 2d 926, 941 (E.D. Tex. 1999) (holding in a class action lawsuit that defendant-manufacturers use of faulty microcode in floppy diskette controllers that eventually were incorporated into computer systems fell into the prohibition of 18 U.S.C. § 1030(a)(5) (for a transmission of a program, information, code, or command that intentionally causes damage)).
112 See 18 U.S.C. § 1030(g).
17
the first and only state with a reporting requirement. Next, a description of the proposed national reporting requirement and the interests to be protected will be presented. An argument will be made that such a proposed national reporting requirement is not only beneficial, but also necessary to tackle the problem of intrusive computer hacking. More specifically, this paper will argue that inaction by the national government could lead to an unworkable situation with piecemeal state-by-state legislation. Further, this paper will explain how such a proposed national reporting requirement can overcome the technical, social, and legal failures described in Part III.
A. California’s Reporting Requirement (2002 Cal SB 1386)
California’s reporting requirement (2002 Cal SB 1386, which amended the California Civil Code and took effect on July 1, 2003) was the first of its kind in the nation.113 In short, the reporting requirement means that businesses that store their customers’ personal information in the form of computerized data must warn their customers when their personal information is stolen (or suspected of being stolen) by computer hackers or other criminals.114 Such a law is an attempt to extend and protect the privacy of individuals that transact with such businesses.
1. Impetus behind the Reporting Requirement
The birth of the California reporting requirement was the result of a hacking intrusion that affected thousands of California’s employees. On April 5, 2002, a hacker broke into a computer database housed at California’s Stephen P. Teale Data Center in Rancho Cordova.115 The computer database, a personnel database, housed the personal information of the state’s 265,000 employees.116 The personnel database included the names, Social Security numbers, and payroll information of the employees.117 Among the information included in the personnel database was the personal information of then-Governor Gray Davis.118 While the intrusion was discovered a month later on May 7, 2002, public disclosure of the intrusion did not occur until May 24, 2002.119 This delay in the public reporting provoked criticism from the California Union of Safety Employees (“CAUSE”).120 The public outcry from this incident was the main
113 See Associated Press, Bill would require customer notification of hacks, CNN.COM, June 30, 2003, at http://www.cnn.com/2003/TECH/biztech/06/30/hacker.bill.ap/.
114 See infra Part IV.A.2.
115 See Jaikumar Vijayan, Recent breaches raise specter of liability risks, COMPUTERWORLD, May 31, 2002, at http://www.computerworld.com/securitytopics/security/privacy/story/0,10801,71609,00.html.
116 See id.
117 See id. (the employees affected ranged from office workers to judges).
118 See id.
119 See id.
120 CAUSE President Alan Barcelona criticized the state controller’s handling of the incident stating that “It is an outrage that the controller herself has been negligent in recognizing the peril posed by this high-tech invasion of privacy.” See id.
18
impetus behind the enactment of California’s reporting requirement.121
On a broader level, the enactment of California’s reporting requirement recognizes the growing problem of identity theft in California. For instance, in 2000, the Los Angeles County Sheriff’s department reported 1,932 identity theft cases, representing a 108 percent increase over the prior year.122 The California law attempts to thwart the growth of such identity theft arising from personal information that is obtained from breaches into computer systems.123
2. Applicability
California’s reporting requirement became effective on July 1, 2003. Section 1798.29 of the California Civil Code, applicable to agencies, requires that:
(a) Any agency that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person.124
Similarly, Section 1798.82 has a reporting requirement for businesses:
(a) Any person or business that conducts business in California, and that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person.125
Both provisions require that “[t]he disclosure shall be made in the most expedient time possible and without an unreasonable delay, consistent with the legitimate needs of law enforcement . . . or any measures necessary to determine the scope of the breach and restore reasonable integrity of the data system.”126
In addition, for purposes of both Section 1798.29 and 1798.82, the Civil
121 See Patrick Thibodeau, California leads way on ID theft legislation, COMPUTERWORLD, Dec. 13, 2002, at http://www.computerworld.com/securitytopics/security/privacy/story/0,10801,71609,00.html (stating that the new California law was prompted by the breach where hackers gained access to the state’s Stephen P. Teale Data Center).
122 See SECTION 1 of 2002 Cal SB 1386.
123 See id.
124 CAL. CIV. CODE § 1798.29(a) (Deering 2003).
125 CAL. CIV. CODE § 1798.82(a).
126 See CAL. CIV. CODE § 1798.29(a); CAL. CIV. CODE § 1798.82(a).
19
Code defines “personal information” as:
an individual’s first name or first initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted: (1) Social Security number. (2) Driver’s license number or California Identification Card number. (3) Account number, credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual’s financial account.127
The required notice under both of these provisions can be satisfied with written or electronic notification.128 In the event that providing written or electronic notification would be too burdensome (because such notice would cost more than $250,000 or more than 500,000 persons would have to be notified), then substitute notice may be utilized instead.129 Substitute notice includes email notice, conspicuous notice on the web site page of the person or business, if the person or business maintains one, or notification to major statewide media.130 Through the allowance of substitute notice, California’s law recognizes the potential heavy burden that individual notification places on agencies and businesses.
3. Remedies

Section 1798.84 of the California Civil Code expressly provides for damages for customers injured by violations of California’s reporting requirement. More specifically, Section 1798.84 states that “[a]ny customer injured by a violation of this title may institute a civil action to recover damages.”131
B. A National Problem Requiring Congressional Response
After California’s reporting requirement went into effect on July 1, 2003, other states may be considering similar measures as well. If other states were to pass similar laws, an untenable piecemeal state-by-state regulatory scheme would result.132 For example, consider a hypothetical Internet company, Ames Corp. (“Ames”), that sells products throughout all fifty states133 and assume that each state has passed a modified version of California’s reporting requirement. If
127 See CAL. CIV. CODE § 1798.29(e); CAL. CIV. CODE § 1798.82(e).
128 See CAL. CIV. CODE § 1798.29(g)(1); CAL. CIV. CODE § 1798.82(g)(1).
129 See CAL. CIV. CODE § 1798.29(g)(3); CAL. CIV. CODE § 1798.82(g)(3).
130 See id.
131 See CAL. CIV. CODE § 1798.84(a).
132 The Information Technology Association of America (ITAA) opposed the California reporting requirement because of the concern about piecemeal state-by-state regulation of the issue and because the ITAA believed it is best left to the purview of the federal government. See Hearing on S.B. 1386 Before the Assembly Comm. on Appropriations, 2002 Senate 2 (Cal. 2002).
133 Amazon.com, Buy.com, and Ebay.com are examples of such companies.
20
hackers obtained access to one of Ames’s customer databases, Ames would have fifty different reporting requirements to comply with. Not only would this result be burdensome and costly to Ames, but Ames could never be sure that it has fully complied with all of the requirements of each state. For example, while many states may have similarly-worded statutes, each state may have a slightly different interpretation of its own statutes.
As an initial matter, because Congress has not yet enacted a reporting requirement, California’s reporting requirement does not conflict with any federal statute and thus is not preempted under the Supremacy Clause134 of the U.S. Constitution. Further, while the positive aspects of the commerce clause135 permits Congress to regulate in this area (as will be discussed immediately below), the negative aspect of it, the dormant commerce clause, does not nullify California’s reporting requirement (and perhaps the reporting requirements of other states, if enacted) even though it imposes limitations on interstate commerce. The dormant commerce clause, operating under the balancing test under Pike v. Bruce Church, Inc.,136 requires that California’s interest in a reporting requirement outweigh the burden the law imposes on interstate commerce. Based on the discussion above regarding California’s interest in stopping identity theft, the Pike test is likely to be met and California’s reporting requirement most likely survives dormant commerce clause considerations.
On the other hand, Congress has the power to solve this piecemeal state-by-state regulatory scheme by adopting a unifying approach under the commerce clause. In United States v. Lopez, Chief Justice Rehnquist, in delivering the opinion of the Court, indicated three categories of activity that Congress may regulate under the commerce power: (1) the use of the channels of interstate commerce, (2) the instrumentalities of interstate commerce or persons or things in interstate commerce, even though the threat may come only from certain intrastate activities, or (3) those activities having a substantial relation to interstate commerce.137 A computer connected to the Internet would be using a channel of interstate commerce or an instrumentality of interstate commerce. The result is that Congress would indeed have the power to regulate this area.
Thus, if Congress does not enact a reporting requirement similar to
134 Article VI, paragraph 2 of the United States Constitution states that “This Constitution, and the Laws of the United States which shall be made in Pursuance thereof; and all Treaties made, or which shall be made, under the Authority of the United States, shall be the supreme Law of the Land; and the Judges in every State shall be bound thereby, any Thing in the Constitution or Laws of any State to the contrary notwithstanding.”
135 Article I, Section 8, clause 3 of the United States Constitution states that Congress shall have the power “[t]o regulate Commerce with foreign Nations, and among the several States, and with Indian Tribes.”
136 See 397 U.S. 137, 142 (1970) (stating that “[w]here the statute regulates even-handedly to effectuate a legitimate local public interest, and its effects on interstate commerce are only incidental, it will be upheld unless the burden imposed on such commerce is clearly excessive in relation to the putative local benefits”).
137 See 514 U.S. 549, 558-59 (1995).
21
California’s, then an unworkable state-by-state solution may evolve. As will be described below, the benefits of a single unified approach greatly outweigh such a state-by-state solution.
C. A National Reporting Requirement Should Be Adopted
In 2003, U.S. Senator Dianne Feinstein (D-California) proposed a national reporting requirement modeled after California’s reporting requirement known as the Notification of Risk to Personal Data Act (“Feinstein proposal”).138 The Feinstein proposal would have required a business or government entity to notify an individual whenever there is a reasonable basis to conclude that a hacker has obtained unencrypted personal information.139 Personal information would have included an individual’s Social Security number, driver’s license number, state identification number, bank account number, or credit card number.140 Fines by the Federal Trade Commission for non-compliance with the Feinstein proposal would have been $5,000 per violation or up to $25,000 per day for continuing violations.141 Unfortunately, the Feinstein proposal has been stalled in committee.142
1. The proposed reporting requirement

This paper now proposes a national reporting requirement (“proposed reporting requirement”) for the problem of intrusive computer hacking. Two interests will be recognized here—first, the interest of each individual in his or her privacy and secondly, the interest in protecting property against damage by computer hackers. In short, this proposed reporting requirement recognizes not only that hackers should be deterred, but also that the ripple effect of their hacking attacks be minimized by allowing victims to take proactive action after receiving timely notice.
a. Interest in preserving privacy
In one aspect, the proposed reporting requirement recognizes the privacy of individuals in their personal information. This interest in privacy means that the affected individuals should have an opportunity to reduce and minimize the risks and effects of identity theft. Because this goal is similar to that of
138 See Roy Mark, Feinstein Seeks Hacker Notification Law, INTERNETNEWS.COM, June 30, 2003, at http://www.internetnews.com/bus-news/article.php/2229261.
139 See id.; Berkley D. Sells, California’s New Hacker Disclosure Law and its Potential Impact on Canadian Businesses, THE LAWYERS’WEEKLY, Aug. 15, 2003, available at http://www.fasken.com/Web/fmdwebsite.nsf/0/ EEADB6E2707588B585256D87005103E2/ $File/HACKERDISCLOSURELAW.PDF?OpenElement.
140 See id.
141 See id.
142 See Kevin Poulsen, No effect seen in US hack disclosure law, THE REGISTER, Oct. 28, 2003, at http://www.theregister.co.uk/content/55/33622.html (discussing how California’s disclosure requirement has not yet seen enforcement action).
22
California’s reporting requirement, the proposed reporting requirement largely follows from the California reporting requirement.
i. Applicability

The proposed reporting requirements would apply to all agencies, businesses, companies, and organizations that store unencrypted computer data containing personal information as defined below. Like the California reporting requirement discussed above, any agency, business, company, or organization that discovers a breach or is notified of such a breach shall report the breach to the affected individuals within a reasonable time. Further, a reasonable basis for belief of a breach should also result in notification to the potentially affected individuals.
Note that the proposed reporting requirement does not apply to agencies, businesses, companies, and organizations that encrypt the personal information using at least 128-bit encryption. By not making this proposed reporting requirement applicable to encrypted personal information, this gives agencies, companies, and organizations an incentive to secure the stored personal information and thus avoid the reporting requirement. Moreover, the customers greatly benefit from the 128-bit encryption, which would take hackers no less than a quintillion (10^18) years to decode using a single computer.143
ii. Definition of personal information
Like the California reporting requirement, personal information will be defined to include a name (either first and last name or first initial and last name) in conjunction with at least one of the following unencrypted data: (1) social security numbers, (2) state identification numbers such as drivers’ license numbers, or (3) deposit account numbers, credit card numbers, or debit card numbers if obtained with any required security code, access code, or password that would permit access to an individual’s financial account.
In addition, personal information will also include email addresses, whether or not stolen in conjunction with the corresponding name. However, as will be discussed below, the notice requirement for email addresses will be less burdensome than for the other personal information described above.
iii. Means of notice
The affected individuals would receive notice within a reasonable time after the personal information is found to be or suspected of being stolen. A reasonable time cannot be exactly specified, but will depend on factors such as the nature and scope of the hacking incident and whether the hacking incident is
143 See Richard E. Smith, Are Web Transactions Safe?, NOVA, at http://www.pbs.org/wgbh/nova/decoding/web.html (last updated Nov. 2000).
23
isolated or continuing.
If the stolen personal information includes social security numbers, state identification numbers, deposit account numbers, credit card numbers, or debit card numbers, then notice should be given either in written or electronic form. If the number of people to be notified exceeds 50,000, then constructive notice can be given by alerting the media or by providing a notice on the business or organization web site. This is because giving notice to each individual may often be very costly to the agency, business, company, or organization. For example, under the California reporting requirement, written or electronic notice must be given unless the number of individuals to be contacted exceeds 500,000. At thirty seven cents per letter, the postage alone for contacting 500,000 individuals would cost a company $185,000.144 Under the proposed reporting requirement, the postage for contacting 50,000 individuals would be $18,500, an amount believed to be more reasonable and less likely to cause ruinous liability for smaller agencies, businesses, companies, and organizations.
Further, if an email address is stolen, whether or not in conjunction with a name, then notice shall be given to those affected through an email notice (at the same email address that was stolen by the hacker). Only one email notification need be sent so long as the sender is not responsible for a returned email. For instance, if the email is returned for any reason not in control of the sender of the email (i.e. mailbox full or mailbox address not found), then no second notice need be sent. If the number of people to be notified exceeds 100,000, then constructive notice can be given by alerting the media or by providing a notice on the agency, company, business, or organization web site. This requirement does not seem to be unduly burdensome to companies. For instance, on October 27, 2003, Orbitz.com (“Orbitz”), a web-based travel pricing and reservation company, detected a security breach that allowed spammers to obtain access to its customers’ email addresses, which could have been as many as 18 million email addresses.145 Three days later, on October 30, 2003, an Orbitz spokesperson had made a statement to the media that an unknown party had used unauthorized and/or illegal means to obtain the email addresses maintained with Orbitz.146 If this proposed reporting requirement had been in effect, Orbitz would have complied with it because with over 18 million users to notify, this substitute notice through the media would have been sufficient as constructive notice to the affected users.
144 This amount is below California’s ceiling of $250,000. See Cal. Civ. Code §§ 1798.29(g)(3) and 1798.82(g)(3). If the agency or business can demonstrate that the cost of providing notice would exceed $250,000, then it is entitled to use substitute notice (e-mail notification, a conspicuous web site posting, or notification to major statewide media).
145 Associated Press, Spammers steal e-mail addresses from Orbitz, CNN.COM, Oct. 30, 2003, at http://www.cnn.com/2003/TECH/internet/10/30/orbitz.security.ap/index.html.
146 See id. (Orbitz spokeswoman Carol Jouzaitis stated that a “small number of customers have informed us that they have received spam or junk e-mail from an unknown party that apparently used unauthorized and/or illegal means to obtain their e-mail addresses used with Orbitz.”).
24
b. Interest in protecting property against damage by hackers
In addition, this proposed reporting requirement recognizes an interest in protecting property against computer hackers. Accordingly, this proposed reporting requirement seeks to maximize the likelihood that the responsible parties will be subject to investigation and prosecutions. Presumably, the increased numbers of investigations and prosecutions should deter other potential computer hackers from causing property damage through their intrusive attacks.
i. Applicability
The second aspect of the proposed reporting requirement requires agencies, businesses, companies, and organizations that experience damage (as defined below) from a computer intrusion to report the intrusion to federal law enforcement. The intrusion would be reported to federal law enforcement within a reasonable time after the agency, business, company, or organization either discovers or has a reasonable basis for believing that a computer intrusion has occurred.
A good example of how this proposed reporting requirement is designed to operate can be illustrated by the hacking intrusion that happened to VoteHere, Inc. (“VoteHere”) in late 2003.147 VoteHere is involved in creating the highly-controversial electronic voting technology. Sometime in late 2003, a hacker broke into VoteHere’s internal computer systems and may have copied the sensitive software source code.148 Shortly after the intrusion was detected, VoteHere contacted the FBI and Secret Service and assisted in their investigation by providing the FBI and Secret Service with megabytes of evidence relating to the intrusion.149 By contacting law enforcement shortly after the incident, VoteHere would have complied with the proposed reporting requirement.
147 A similar hacking incident occurred to Diebold Election Systems (“Diebold”) earlier in 2003. In the Diebold incident, a hacker broke into a private Web server and obtained internal discussion-list archives, a software bug database, and sensitive software. Prior to this incident, unauthorized outsiders had been able to copy the source code and documentation for the proprietary voting software from an insecure Diebold FTP site. See Brian McWilliams, New Security Woes for E-Vote Firm, WIRED NEWS, Aug. 7, 2003, at http://www.wired.com/news/privacy/0,1848,59925,00.html. Both of these Diebold incidents open the possibility that hackers may obtain the information and opportunity to breach the security of Diebold’s electronic voting software. See Paul Krugman, Hack the Vote, NEW YORK TIMES, Dec. 2, 2003, available at http://www.commondreams.org/views03/1202-02.htm.
148 A hacker that has obtained a software’s source code would be able to examine how the software was written and possibly determine vulnerabilities in the software. This source code is different than the final product that is sold to consumers in a “run-time” or “compiled” form. When compiled, the source code is transformed to machine code and is typically incomprehensible.
149 See Associated Press, Site of electronic voting firm hacked, CNN.COM, Dec. 29, 2003, at http://www.cnn.com/2003/TECH/biztech/12/29/voting.hack.ap/index.html. Executives at VoteHere believe the hacker break-in was related to the rancorous debate over the security of casting ballots online. See id.
25
ii. Definition of Damage
Damage under this second aspect of the proposed reporting requirement is the monetary loss that arises from the computerized data, code, software, or other program that is obtained, altered, or deleted through unauthorized means. Some consideration should be given to direct economic effects flowing from computerized data, code, software, or other program that is obtained, altered, or deleted through unauthorized means.
In that regard, damage includes the cost of repairing or restoring the affected data, code, software, or other program. Damage also includes any costs necessary to ensure the security of copies of the proprietary program that have already been sold. In another instance, if hackers were to shut down the normal operation of a commercial web site by deleting, modifying, or altering data on the web servers, then damage could include the loss of expected sales for the amount of time that the web site was not operational. On the other hand, damage does not include the cost of investigating or tracking the hacker.
iii. Jurisdictional Amount
The second aspect of the proposed reporting requirement does not apply to all damage amounts. Indeed, every hacking incident results in some kind of monetary loss, however slight. However, this proposed reporting requirement recognizes that reporting all damages may be burdensome and costly150 to businesses. Accordingly, only damage that results in at least $20,000 in monetary damages should be reported. This recognizes that while many smaller computer intrusions will go unreported, those intrusions that exceed $20,000 in damages will likely result in more successful prosecutions, because the amount of the damage will likely justify a company’s efforts to investigate, to preserve evidence, and to cooperate with law enforcement. In addition, companies may also be willing to seek civil remedies under the CFAA because they are likely to be above the $5,000 CFAA jurisdictional amount.
c. Enforcement of both aspects of the proposed reporting requirement
Unlike the California reporting requirement, no private right of action would be available against agencies, businesses, companies, and organizations that fail to comply with the proposed reporting requirement. An important purpose of the proposed reporting requirement is to give the affected individuals notice so that they can protect themselves from the ripple effect of a hacking intrusion. However, because hundreds of thousands of people may be affected by a single hacking incident, a business, company, or organization that fails to comply with the reporting requirement may be presented with ruinous liability.
150 For a discussion on why many companies are unwilling to report hacking incidents, see Part IV.B.1.
26
Such a result would be much too harsh. Accordingly, the alternative enforcement mechanism would be a statutory fine to be decided on a case-by-case basis. The same result would be true in the case of non-compliance of the second aspect of the proposed requirement (where significant property damage had been received).
In addition, companies should not be allowed to bypass the reporting requirement by not monitoring for intrusions or performing intrusion audits. Thus, the statutory fine should be reduced in cases where companies have implemented a monitoring or auditing plan. This would make it more worthwhile for companies and organizations to continue to monitor against computer hackers.
d. Exception to the proposed reporting requirement
In some circumstances, giving public notice, either to the affected individuals or to the public, would hinder investigation by law enforcement. For example, in 1995, the infamous Kevin Mitnick (“Mitnick”) breached the security of a popular bulletin board.151 The bulletin board could have shut down, which would have tipped off Mitnick (as well as the general public).152 However, by not shutting down the bulletin board, law enforcement was able to track Mitnick’s moves online.153 The result was that Mitnick was caught in possession of 20,000 stolen credit card records.154 Accordingly, in a situation such as this, agencies, businesses, corporations, and organizations should be given some latitude to delay giving public notice when working with law enforcement. This delay is usually reasonable because the interest in apprehending the hacker outweighs the slight delay in giving public notice.
V. BENEFITS OF THE PROPOSED REPORTING REQUIREMENT
In Part III, the contributing factors to the problem of intrusive computer hacking were presented. In the first instance, hackers can be difficult to track down.155 At other times, hackers are not tracked down because the victims do not report the intrusions to law enforcement.156 Even if the hackers are tracked down by law enforcement, there is a tendency not to prosecute them or to prosecute
151 See ROBERT B. GELMAN & STANTON MCCANDLISH, PROTECTING YOURSELF ONLINE: THE DEFINITIVE RESOURCE ON SAFETY, FREEDOM, AND PRIVACY IN CYBERSPACE 141-45 (1st ed. 1998). The investigation into Mitnick began when he hacked into Netcom Internet Services and compromised the confidentiality of several thousand credit-card numbers. Within the same time frame, Mitnick stole some sensitive files from security expert Tsutomu Shimomura of the San Diego Supercomputer Center. After breaching the security of bulletin board Whole Earth ’Lectronic Link (WELL), Mitnick had hidden some the sensitive files on WELL’s systems. See id.
152 See id.
153 See id.
154 See id. at 144 (discussing how law enforcement used cellular frequency scanners to track down Mitnick, who was using a computer modem connected to a cellular telephone for his online activities).
155 See Part III.A.1 supra for difficulties in tracing hackers.
156 See Part III.B.1 supra for reasons why companies do not reporting intrusions.
27
them with minimal sentencing.157 Moreover, the judicial exceptions to the ECPA tend to make it inapplicable to the problem of intrusive computer hackings.158 Further, although the recently-amended CFAA may compensate for the shortcomings of the ECPA, the CFAA does not tend to deter computer hackers.159 Finally, the CFAA fails to hold software manufacturers liable for the negligent design of software that is compromised by hackers.160 This section now illustrates how the proposed reporting requirement tackles many of the technical, societal, and legal problems presented in Part IV.
A. Removing Traditional Societal Barriers to Reporting
Businesses have previously been reluctant to report computer intrusions because of competitive advantage concerns, because of negative publicity concerns, and because of lack of knowledge that anything can be done.161 This means that given the choice, businesses overwhelmingly choose to forgo reporting computer intrusions. However, a mandatory reporting requirement levels the playing field for the following reasons.
First, a mandatory reporting requirement would mean that regardless of whether an agency or business believes that anything can be done, they will have to report computer intrusions. Secondly, a mandatory reporting requirement lessens negative publicity and competitive advantage concerns. If all businesses have to report when they have experienced a computer intrusion, then no single business will have to bear the entire burden of reporting an intrusion because its competitors are also likely to be experiencing intrusions as well.
For instance, consider two companies in similar markets that are both experiencing intrusions from hackers. If a mandatory reporting requirement were not in place, then the first company that reported the intrusion (or perhaps was leaked to the media) could lose its competitive advantage to the competing company. For example, the other company might advertise that it is not experiencing intrusions like that of its competitor (even though it actually is). However, if a mandatory reporting requirement were in effect, both companies would have to report the intrusions and neither would receive a competitive advantage could be obtained by either. In addition, the effect of negative publicity would likely be lessened because a company’s reporting would be included with the multitude of other reportings.
In other words, because there is no present mandatory reporting requirement, the current reportings of intrusion carry with them a large amount of
157 See Part III.B.2 supra regarding the low prosecution rates.
158 See Part III.C.1 supra regarding judicial exceptions to the ECPA.
159 See Part III.C.2.a supra regarding lack of deterrence of the CFAA.
160 See Part III.C.2.b supra for information about the CFAA exceptions for software manufacturers.
161 See supra Part III.B.
28
backlash because the general public views computer intrusions as an anomaly rather than a daily battle. This is because such a small percentage of the current intrusions are reported, and when they are reported, they are typically very large in scope and damage. However, if a mandatory reporting requirement were in effect, then the larger number of reportings and the regularity of the reportings would mean the general public would begin to see the scope of the problem and would shift away from blaming any single company or business for having weak security. Instead, the focus would shift to “what can we do about this hacking problem?”
B. Public Notice and Awareness of the Problem
“Software consumers . . . fail to prevent security-related software failure because of imperfect information. Some customers misjudge the threat [because] intrusions are for the most part largely undetected and unreported. Others exhibit an ‘it can't happen to me’ mentality.”162
As stated above, one of the hurdles to reducing the number of computer intrusions is the imperfect information that software consumers often have. However, the problem is not limited to imperfect information by software consumers, but also imperfect information by software manufacturers, the general public, and even law enforcement.
On a broader level, the problem is that we cannot tackle the problem of intrusive computer hacking until we actually understand the problem in the first place. Take for instance a House subcommittee hearing in September 2003 where IT vendors generally recommended more money in lieu of new laws to tackle the problem of cybercrime.163 A troubled conversation evolved as the subcommittee’s chairman, Representative Adam Putnam (R-Florida), questioned John Malcom, assistant attorney general at the Criminal Division of the U.S. Department of Justice: [Putnam] questioned why John Malcolm, deputy assistant attorney general at the Criminal Division of the U.S. Department of Justice could only name a handful of cyber criminals who've been caught.…‘There are hundreds of viruses released every year ... but you can recall two arrests, two convictions,’ Putnam said to Malcolm. ‘I asked what was the source of the threat. “We really don't know.” Was it foreign or domestic? “We
162 Kevin Pinkney, Article, Putting blame where blame is due: software manufacturers and customer liability for security-related software failure, 13 Alb. L.J. Sci. & Tech. 43, 67 (2002).
163 See Grant Gross, Feds Search for Cybersecurity Solutions: More money, not new laws, are the key to security, most experts agree, PCWORLD.COM, Sept. 11, 2003, at http://pcworld.shopping.yahoo.com/yahoo/article/0,aid,112419,00.asp (stating that only 3 of the 12 experts hinted at new legislation). Putnam is also considering legislation that would require companies to fill out a cybersecurity checklist in their reports to the Securities Exchange Commission (“SEC”). See id.
29
really don't know.” That seems to re-enforce a premise that cybercrime is treated vastly different than some other crimes that caused significant damage.’164
Increasing the number and frequency of reportings will increase the knowledge base of the problem of computer hacking. This knowledge will assist software consumers in taking proactive actions to secure their systems. Moreover, software manufacturers will be able to respond to the problem by: (1) developing anti-hacking software, (2) fixing existing security holes, and (3) improving the security of future software. Further, the additional information gained from the reported hackings will provide evidence of the adequacy or inadequacies of the current laws such as the CFAA. Without this data, the discussion about the adequacy of the current laws is moot because these laws have largely remained untested in the case of intrusive computer hackers. The conclusion to be drawn is that we just do not know enough about the problem to tackle it efficiently and effectively. However, a reporting requirement will help provide the necessary information required to effectively tackle the computer hacking problem. C. Deterrence Some experts have posited that more laws will not deter hackers. These experts point to the public awareness of high-profile hacking cases (such as the prosecution of Kevin Mitnick) and yet the number of computer hackings has not decreased, but rather increased. Other experts have argued that “most hacking is committed by young people seeking attention and believing themselves to be mere high-tech pranksters . . . and laws will do little to deter them.”165 Still another expert has argued that “[he doesn’t] know what good more laws can do. The fix to this is technical.”166 Despite the scattered high-profile cases, the problem continues because the law at this stage not made a statement about the act of computer hacking itself but only about the possibility of being caught. Indeed, most computer hackers have always realized, whether consciously or not, that law enforcement tracking down a skilled hacker is not the norm. A mandatory reporting requirement should increase the number of reported computer intrusions. Increasing the number of reported computer intrusions will also result in a higher number of computer hackers being tracked down by law enforcement (and thus being prosecuted). As more hacking cases become reported and as more hackers are prosecuted, the number of hackers willing to take the risk of a being prosecuted should also decrease. Thus, this proposed reporting requirement would provide an enhanced level of deterrence
164 See id. (emphasis added).
165 See Chebium, supra note 110.
166 See id.
30
against computer hacking. Consider for example when the Recording Industry Association of America (“RIAA”) began cracking down on MP3167 file-sharing in 2003. In early 2003, the RIAA began targeting individuals who maintained servers that allowed users to download MP3’s.168 Four university students were sued by the RIAA, thereby resulting in a substantial amount of publicity. These four students eventually settled with the RIAA in May 2003, with each student agreeing to pay between $12,000 and $17,000 each.169 The RIAA also announced that it would go after individual file traders utilizing file-sharing tools such as Kazaa and Grokster.170 Shortly after the announcement, online file swapping of MP3’s began to drop sharply.171 According to a 2003 report by The NPD Group (“NPD”), the number of households acquiring music fell from 14.5 million in April to 12.7 million in May to 10.4 million in June.172 NPD stated “[w]hile we can't say categorically that the RIAA's legal efforts are the sole cause for the reduction in file acquisition, it appears to be more than just a natural seasonal decline.”173 Even more recently, a telephone survey indicated that the percentage of Americans downloading music from the Internet fell to 14% over the four week period ending December 14, 2003.174 Previous telephone surveys in March, April, and May 2003 had indicated that approximately 29% of Americans were downloading music during that time frame.175 Thus, preliminary evidence indicates that the RIAA’s targeting of individuals who participate in file-swapping is deterring others from participating in online file-swapping. Similarly, a mandatory reporting requirement should increase the number of prosecuted hackers, and thus deter potential computer hackers. The result should be a reduction in hacking intrusions over time.
D. Market Correction As previously discussed in Part III.C.2.b, the CFAA fails to hold software manufacturers liable for creating software that contains security vulnerabilities.
167 An MP3 is a highly compressed file-format that usually contains audio. The MP3 format can generally be used to covert uncompressed audio files into MP3 data files that are less than 1/10th the size of the original.
168 See Lisa M. Bowman, Labels aim big guns at small file swappers, CNET NEWS.COM, June 25, 2003, at http://zdnet.com.com/2100-1105_2-1020876.html.
169 See id.
170 See id.
171 See Lisa M. Bowman, File-swappers put off by lawsuits, CNET NEWS.COM, Aug. 22, 2003, at http://news.zdnet.co.uk/internet/0,39020369,39115873,00.htm.
172 Music acquisition included obtaining songs from paid sites, ripping CDs, and through file-swapping tools. During the 3 month study, file-swapping accounted for 2/3’s of the total amount of music acquisition. See id.
173 See id.
174 The telephone survey was conducted by the Pew Internet & American Life Project. See Lisa Baertlein, Music downloads fall after RIAA lawsuits-study, FORBES.COM, Jan. 4, 2004, at http://www.forbes.com/personalfinance/retirement/newswire/2004/01/04/rtr1197410.html
175 See id.
31
Although software manufacturers are likely to be in the best position to reduce the risk of computer intrusions, the CFAA exception ensures that they shoulder little of the hacking damage resulting from their faulty software.176 One might expect that if the law refuses to hold software manufacturers liable for their faulty software, then the market may punish these manufacturers for producing faulty software. Yet, the market response has been inefficient due to imperfect information. In other words, the market cannot correct for a problem that it does not know about. If computer intrusions are being substantially underreported, then the market does not realize which software programs are faulty. In addition, competitors will be hesitant to enter into a competing area without having knowledge of a specific need or demand (because the assumption is that the current software is adequately protected). A mandatory reporting requirement should be able to correct for these market deficiencies. First, consumers will be less likely to purchase software that is known to be faulty. Accordingly, if the law refuses to punish manufacturers for faulty software, then the market surely will. Secondly, in order to maintain their competitiveness, software manufacturers will have to create more secure software or risk the negative publicity. Finally, where the reported intrusions indicate a need, the market will quickly fill that need. In essence, the mandatory reporting requirement is a catalyst for what the market would have done given enough time and information.
VI. CRITIQUE OF THE PROPOSED REPORTING REQUIREMENT

Critics of a national reporting requirement have stated several concerns about a national reporting requirement. First, critics state that a reporting requirement reduces incentives of companies to monitor in the first place. Indeed, why would a company implement a plan to increase the probability that they will have to report an intrusion (and therefore suffer the resulting damage to its reputation)? Further, if companies are not diligent in monitoring intrusions, this may only exacerbate the problem. Secondly, even if companies detect an intrusion, many critics believe that most large companies would rather risk the possibility of statutory fines of not reporting rather than risk negative publicity. These companies believe that the public disclosure of an intrusion may mean near-certain death for the company. However, the proposed national reporting does have the ability to induce the companies to comply with the reporting requirement. The reporting requirement does this by allowing enough flexibility and variance in the statutory fines to make it rational for companies to monitor.
176 See Pinkney, supra note 162, at 46. “Software manufacturers rush to market with products full of foreseeable vulnerabilities. Due to the market power possessed by some manufacturers, software manufacturers directly affect how much hacker risk enters the system. Software manufacturers are the least cost avoiders for many types of hack-prevention, yet they shoulder almost none of the harm that results from hacking.” See id.
32
For example, consider a company with a multi-billion dollar market capitalization that must decide whether it will implement a monitoring system or not. If the company does not monitor, it is likely that if an intrusion were detected, the damage (both actual and reputational) would be more severe than if they had detected the intrusion during routine monitoring (assume $30 million versus $10 million in damage). This might be the case because a company that does no monitoring is likely to discover the intrusion only after significant damage had already been done for an extended period of time, at which point the intrusion becomes obvious. In contrast, a company that has a periodic monitoring plan is more likely to be able to stop intruders before any significant damage is done. Therefore, a company that monitors is more likely to have less security vulnerabilities because it likely takes preventative action in updating its software and hardware. This difference alone may induce a company to monitor. However, remember that monitoring increases the probability that reporting will have to be done under the proposed reporting requirement (and therefore some reputational damage will be done). In order to equalize the difference between reporting and not reporting (and tilt the decision in favor of reporting), a discount in the statutory fine can be made for companies that monitor. Furthermore, the overall magnitude of the statutory fines can be varied to make it more expensive not to report (whether or not a company decides to monitor). The main benefit of a flexible statutory fine is that proper tailoring of the fine can incentivize a company to monitor and report intrusions. The proposed reporting requirement also reduces the cost that each company bears through reporting by removing the prisoner’s dilemma problem as illustrated in Table I. Removing the prisoner’s dilemma problem should reduce the possibility that any company would suffer near-certain death from reporting an intrusion. This is because the overall damage would be spread among the companies such that no company alone bears the burden. Further, as will be illustrated below, the overall damage level should decrease because more reportings will result in increased prosecutions of hackers, which should deter other hackers from committing similar crimes.
Table I
Game Table: Prisoner’s Dilemma for Reporting Intrusions Company B
Company A
Report
Don’t Report

Report
$1X, $1X
$0, $12X

Don’t Report
$12X, $0
$7X, $7X


According to Table I, if Company A reports and Company B does not, then Company A suffers damage of $12X while Company B only suffers nominal damage in comparison (and vice versa). This is because Company B can gain the competitive advantage over Company A when Company A reports and Company B does not. However, if neither Company A nor Company B reports, then neither
33
company can gain the competitive advantage, but the intrusion problem remains and continues to cause $7X worth of damage to each company. On the other hand, if both Company A and B report their intrusions, both would suffer less damage than either of the schemes above ($1X each because more computer hackers will be tracked down, prosecuted, and deterred; in addition, software manufacturers will release better software and more security update patches). However, notice that without a reporting requirement, each company would decide not to report because the possibility of losing $12X (if their competitor does not report) would keep each company in a defensive mode. Thus, a mandatory reporting requirement means that if each company reports, then the overall damage to either company is reduced. This is indeed the most desirable and least costly solution.
VII. CONCLUSION
Hackers utilize a variety of tools to compromise the security of computer systems. More importantly, hackers do not usually limit their intrusive activities to any single business or organization. A single hacker may target multiple businesses or organizations. Moreover, these hackers have not been deterred because only a handful of hackers have been prosecuted in the twenty years since the enactment of the Computer Fraud and Abuse Act. These problems contribute to the growing problem of computer intrusions.
In addition, the damage caused by a computer intrusion is not limited to the target of the intrusion. In the case of a stolen database of credit card numbers, banks may spend hundreds of thousands, if not millions of dollars, just to replace the credit cards in the hands of their customers.177 Additional costs include the customers’ temporary loss of use of their credit cards and the costs resulting from actual identity theft.178
Currently, many businesses and organizations fail to internalize the externalities described above. A mandatory reporting requirement, as proposed in this paper, will motivate businesses and organizations to internalize these external costs. In addition, the benefits of the proposed reporting requirement as described above in Part V may be achieved. These benefits include minimizing competitive advantage concerns, increasing public awareness of the problem, deterring other hackers, and allowing market forces to correct for negligent software design.
The Feinstein proposal for a national reporting requirement has been considered and was stalled in committee. A less intrusive approach is being considered by Representative Adam Putnam (R-Florida), chairman of the House Government Reform Committee's Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, that may require public
177 See Robert Lemos, supra note 69 (noting that it costs a credit card issuer between $2 and $5 to cancel and issue a new credit card).
178 See id.
34
companies to report their cybersecurity efforts to the Securities Exchange Commission (SEC).179 With several reporting proposals being considered by Congress, it is possible that a national reporting requirement may soon be adopted in some form. No matter what approach is taken, the law needs to make a statement that computer hacking is indeed a crime. This proposed reporting requirement is an effective way for the law to make that statement loud and clear.
APPENDIX
Computer hackers have a variety of tools for breaching the security of computer systems. Some of these tools such as social engineering are non-technical in nature. In addition, there are a wide array of technical tools available to hackers who want to break into computer systems. These technical tools include password cracking, war dialing, buffer overflow attacks, Trojan horses, and network packet sniffing.180
A. Social Engineering
The most commonly overlooked form of hacking is social engineering because of the lack of technical sophistication needed to employ this technique.181 Social engineering has been defined to mean “an outside hacker’s use of psychological tricks on legitimate users of a computer system, in order to obtain information [. . .] he needs to gain access to the system.”182
For example, social engineering entails a hacker posing as an employee and utilizing a sense of urgency to coerce a corporate IT helpdesk into giving up a username or password. A hacker may pose as a company executive, out of town,
179 See Grant Gross, Cybersecurity legislation may go to Congress, COMPUTERWORLD, Sept. 4, 2003, at http://www.computerworld.com/governmenttopics/government/legislation/story/ 0,10801,84586,00.html (The proposed legislation that would require public companies to file a cybersecurity checklist with the SEC, which would then be available for inspection by stockholders. The cybersecurity checklist would ask questions such as “Do you have an up-to-date IT assets list?”).
180 The author recognizes that the above list of technical tools available to hackers is not all-inclusive. As technology continuously changes, hackers will find new and innovative ways to breach computer systems. For example, when wireless systems were first introduced, hackers could access some wireless computer systems from their car, thus coining the term “war driving.” For a good article about how war driving is accomplished, see Kevin Poulsen, War driving by the Bay, SECURITYFOCUS, Apr. 12, 2001, at http://www.securityfocus.com/news/192.
181 For example, the Bush administration’s September 18, 2002 draft of the “National Strategy to Secure Cyberspace” did not address social engineering. See Michelle Delio, The Book on Mitnick is by Mitnick, WIRED NEWS, Oct. 3, 2002, at http://www.wired.com/news/culture/0,1284,55516,00.html.
182 Sarah Granger, Social Engineering Fundamentals, Part I: Hacker Tactics, SECURITYFOCUS, at http://www.securityfocus.com/infocus/1527 (last updated Dec. 18, 2001) (quoting John Palumbo, Social Engineering: What is it, why is so little said about it, and what can be done about it?, SANS INSTITUTE, July 26, 2000, at http://www.giac.org/practical/GSEC/John_Palumbo_GSEC.pdf).
35
in a rush, and in desperate need of his network password.183
Yet another form of social engineering involves a hacker tricking a user into downloading an illicit program that allows the hacker back-door access to the computer system.184 A good example of this type of social engineering occurred in September 2000 when unsuspecting AOL employees opened up a malicious email attachment that gave the hackers back-door access into the employees’ computers.185 Once the hackers were connected to AOL’s computers, they had the ability to bump customers off of their AOL accounts, reset passwords, and access personal and billing information.186
B. Password Cracking
Most computer networks use some combination of usernames and passwords as a form of security to prevent unauthorized access into their computer systems. Hackers will oftentimes use password crackers to systematically guess these passwords for them.
There are three well-known types of password crackers. First, there are password crackers that use dictionary files, which contain an exhaustive list of all words listed in a dictionary.187 Second, some password crackers are hybrids of dictionary password crackers, and use combinations of numbers or symbols with the dictionary files.188 For example, these hybrids may try “cat,” “cat1,” “cat2,” and so on.189 Third, there are password crackers that utilize brute force, which iteratively try all combinations of numbers, alphabetic, and special characters
183 In this true example, the hackers had actually studied the CFO’s voice before impersonating the CFO. See id. In another example, the hackers determined the corporate director of IT’s identity from a public domain name registry. By posing as the corporate director traveling on business and with a heavy deadline to obtain some PowerPoint slides, the hacker was able to pressure the help desk into revealing to the hacker the required software and appropriate credentials needed to obtain remote access to the corporate network. See JOEL SCAMBRAY ET. AL., HACKING EXPOSED: NETWORK SECURITY SECRETS & SOLUTIONS 561-62 (2d ed. 2001).
184 See Sarah Granger, Social Engineering Fundamentals, Part I: Hacker Tactics, SECURITYFOCUS, at http://www.securityfocus.com/infocus/1527 (last updated Dec. 18, 2001) (discussing how a hacker convinced an AOL employee to open by email what was supposed to be a picture of a car for sale but instead turned out to be a email exploit). See infra part E of the Appendix for a discussion regarding Trojan horses.
185 See Jim Hu, AOL boosts email security after attack, CNET NEWS.COM, Sept. 21, 2000, at http://news.com.com/2102-1023_3-242092.html.
186 See id. Although the hacker’s attack could have been more malicious, the main effect of this attack was that some users found their AOL screen names were already being used when they tried to log in. See id.
187 See Rob Shimonski, Hacking techniques: Introduction to password cracking, IBM DEVELOPERWORKS, July 2002, at http://www-106.ibm.com/developerworks/security/library/s-crack/.
188 See id. (explaining that hybrid attacks are often successful because many people change their passwords by simply adding a number to the end of their current password)
189 See id. Some hybrid password crackers add numbers or symbols to the end of the words in the dictionary list. Others will substitute symbols for letters—for example, “@” for the letter “a”.
36
until a successful password is found-- no matter how long it takes.190
C. War Dialing
Most organizations protect their network computers from hackers through the use of an intrusion detection system or a firewall, which is something akin to having a big guard at the front door that stops intruders. These instruction detection systems or firewalls are installed on “gateway computers,” which are the first point of contact (i.e. the front door) for outside computers attempting to gain access an organization’s private network. While much time and money is spent on protecting the front door, many organizations fail to expend the same effort in protecting the back door—the modems that provide remote access for the organization’s employees.
Because many organizations fail to adequately protect these modems, “war dialing” has developed as a way for hackers to exploit this vulnerability. A hacker would use a software program to dial a large block of the organization’s telephone numbers (usually very late at night), and then examine the program logs191 to determine which numbers were answered by modems that allow remote control access.192 The hacker can then call back those modems and attempt to connect to them through remote control software.193
D. Buffer Overflow Attacks
Buffer overflow attacks are one of the most common methods used to remotely exploit target machines.194 To understand buffer overflow attacks, one must understand how a software program allocates inputted data into memory.195 When a software program receives an input by a user, it must store the user-inputted data somewhere. That somewhere is an allocated portion of the buffer (a
190 See Harold W. Lockhart et. al., How are brute force password cracking routines so successful, ITSECURITY.COM SECURITY CLINIC, at http://www.itsecurity.com/asktecs/jul101.htm (last visited Mar. 26, 2004) (stating that given enough time, a brute force cracker will eventually discover the correct password).
191 Software programs often keep track of data in files known as “computer logs.” The computer logs are often utilized in modem communications to keep track of information that is sent and received during the initial authentication.
192 See Michael Gunn, War Dialing, SANS INSTITUTE, Oct. 5, 2002, at http://www.sans.org/rr/papers/index.php?id=268. As an example, if a company’s main telephone number were 555-1000, the hacker may dial the block of telephone numbers from 555-1000 to 555-1999, which would represent a block of one thousand telephone numbers. See id.
193 See id.
194 See Gary McGraw & John Viega, Making your software behave: Learning the basics of buffer overflows, IBM DEVELOPERWORKS, Mar. 1, 2000, at
http://www-106.ibm.com/developerworks/library/s-overflows/ (stating that buffer overflows accounted for over 50% of CERT/CC advisories of major security bugs in 1999).
195 The most common programs to have buffer overflow problems are those written in some version of C (C, C++, etc.). C/C++ is inherently unsafe because C/C++ does not automatically check the bounds of array and pointer references. See id.
37
memory region).196 When a faulty program writes more information into the buffer than it has been allocated, a “buffer overflow” has occurred. The extra information that could not fit into the allocated portion of the buffer gets written into another unallocated portion of the buffer (the “spilled over” portion).197 Hackers take advantage of this buffer overflow condition by realizing that they can intentionally overwrite the “spilled over” portion of the buffer with their own malicious code. The result is that the faulty program may execute the hacker’s malicious code, thereby giving the hacker control over the computer running the faulty program.198
E. Trojan Horses
A Trojan horse is a program that masks itself as a legitimate program, but actually contains malicious code embedded within.199 Sometimes the malicious code allows a hacker to gain control of the computer running the Trojan horse.200 This type of Trojan horse operates by controlling free ports201 on infected computers, thereby allowing the hacker access to the computer through the free port.
An innocent user may be tricked into opening an email attachment containing (or by otherwise downloading and installing) the Trojan horse, thinking that the program is legitimate.202 Other times, hackers who have hacked into computer systems may not want to go through the trouble of hacking in again every time they want access to the infected computer. Instead, these hackers would install a Trojan horse that gives them at-will access to the infected computer.203
196 Contiguous chunks of the same data types are allocated to a buffer. See id.
197 See id. The example that the authors use for a buffer overflow is a cup. A cup can hold only so much water. If you overfill the cup, the spilled over water must go somewhere. In programming terms, the spilled-over water will find its way to another portion of the buffer and cause a buffer overflow. See id.
198 See id. Buffer overflow attacks usually only result in the hacker obtaining the same level of access that the faulty program had. However, some buffer overflow attacks can result in the hacker obtaining the highest level of access possible (even though the faulty program previously didn’t already have that access). See id.
199 See Mathias Thurman, On the Trail of an Elusive Trojan Horse, COMPUTERWORLD, May 7, 2001, available at http://www.computerworld.com/printthis/2001/0,4814,60206,00.html (discussing that Trojan horses, “when launched, could destroy data, steal account information and allow a hacker to remotely control a system to launch attacks on other systems – all without the user’s knowledge”).
200 See id. (explaining that a Trojan horse can let a hacker gain full control over an infected machine at a later date).
201 A port is an external communication point on a computer operating system.
202 Another example of social engineering in conjunction with Trojan horses is emails directing users to install false upgrades of Internet Explorer. See CERT, CERT ADVISORY CA-1999-02 TROJAN HORSES (1999), available at http://www.cert.org/advisories/CA-1999-02.html.
203 See id. (explaining that once a hacker has compromised a system, the hacker may install Trojan horse versions of system utilities).
38
F. Network Packet Sniffers
Hackers often employ network packet sniffers (“sniffers”) after they have successfully hacked into the target computer on a network. Once a hacker has hacked into the target computer, the hacker may need to gather passwords for other computer systems on the network, to obtain sensitive information, or to profile other computers on the same network. By installing a sniffer, the hacker can listen to (i.e. to capture) traffic transmitted between computers in the network on which the sniffer is installed.204 By analyzing any unencrypted traffic captured by the sniffer, the hacker can reveal usernames, passwords, messages, and other personal or sensitive information that was transmitted along the network segment.
204See Matthew Tanase, Sniffers: What They Are and How to Protect Yourself, SECURITYFOCUS, at http://www.securityfocus.com/infocus/1549 (last updated Feb. 26, 2002) (discussing how a sniffer program switches a computer’s network card to “promiscuous mode,” and thus allowing a hacker to read all information being transmitted on the network that the network card is connected to).

39

0 comments: