Hacking Back Without Cracking Up by Jeremy Rabkin, Ariel Rabkin,
Aegis Paper Series No.1606, Hoover Institution, June 28, 2016
The authors examine the risks and rewards of hacking back and conclude
that it is worth conducting experiments to determine its effectiveness. It
also refers to some interesting sources.
The Digital Vigilantes Who Hack Back:
American companies that fall victim to data breaches want to retaliate
against the culprits. But can they do so without breaking the law?
by Nicholas Schmidle, The New Yorker, May 7, 2018
This article provides an excellent introduction to hacking back. It
cites CFAA, provides analogies for hacking back such as use of dye packs
by banks, and discusses nascent effortsB to legalize some types of
hackback, which some call vigilantism. It also highlights the difficulty
of attributing hackers, calls attention to "escalation dominance," and
notes that hackers do make serious personal threats against those
hacking back. Several experts warn that hacking back can be very
dangerous and could lead to cyberwar.
The Limits of Deterrence Theory in Cyberspace by Mariarosaria
Taddeo, Philos. Technol. (2018) 31: 339.
I ... argue that ... applicability [of deterrence] to cyberspace is
limited and that these limits are not trivial.