7

This question regarding legal complexity versus simplicity in modern law got me talking about the relatively simple structure of Jewish tort law. It also had me wondering:

What sort of categorization would Jewish law apply to computer/internet crimes?

Doxxing might be rechilut (tale-bearing) or hezek re'iyah (~ invasion of privacy), for instance, but what about hacking/hijacking a computer? No obvious act of kinyan (transfer of ownership) is performed even when the hacker takes control of ("p0wns") the system. Do we treat it as misappropriating someone else's property to do damage via botnet? Is there a penalty of double compensation for stolen information?

Yes, this is a serious question. I would love some sources...

Isaac Kotlicky
  • 5,124
  • 13
  • 34
  • 2
    I assume you mean besides for dina d'malchuta dina. – Scimonster Mar 19 '15 at 13:22
  • Why Hezek reiah? Are you taking away their hishtamshus on the computer? – Shoel U'Meishiv Mar 19 '15 at 13:32
  • @Mefaresh R' Asher Meir says that doxing is likely forbidden based on lo teleich rachil and possibly also hezek re-iyah. See http://judaism.stackexchange.com/a/52833/2 and the article linked there for the H"R argument. – Isaac Moses Mar 19 '15 at 13:47
  • @mefaresh hezek re'iyah = damage to their privacy. It's a real halachic category. – Isaac Kotlicky Mar 19 '15 at 13:47
  • @Scimonster Correct. I'm looking for an all Jewish legal treatment of modern computer crimes. – Isaac Kotlicky Mar 19 '15 at 13:49
  • @IsaacKotlicky I would expect the same H"R argument, at least, to apply to any digging into private files. – Isaac Moses Mar 19 '15 at 13:50
  • @isaacKotlicky I know its a real halachic category. But Acc. To many meforshim the isur is a lout hishtamshus. Thus I asked if you are taking away hishtamshus – Shoel U'Meishiv Mar 19 '15 at 13:51
  • 2
    I wonder if this question ought to be split up into separate questions about invading, damaging, and stealing, which are distinct hacking activities and, in the real world at least, distinct Halachic torts. – Isaac Moses Mar 19 '15 at 13:51
  • @IsaacMoses That would be a valid answer - that there are three applicable concepts. The question is WHETHER there are sources for them to fall under existing rubrics. – Isaac Kotlicky Mar 19 '15 at 14:01
  • @Mefaresh Specifically, it's about affecting histamshus by people curtailing their activities due to being more public (i.e.: avoiding parts of their house due to being in the public view). By doxxing, that is inherently what happens if you read any first hand accounts. – Isaac Kotlicky Mar 19 '15 at 14:03
  • @isaacKotlicky so interesting I have no idea what doxxing is – Shoel U'Meishiv Mar 19 '15 at 14:05
  • 1
    @IsaacKotlicky My point is that before you even try to fit them into rubrics, it might make sense to ask separately about digging into someone's system to read stuff, breaking or DoSing someone's system, stealing and copying someone's data, and stealing and deleting someone's data. – Isaac Moses Mar 19 '15 at 14:05
  • @Mefaresh, see the question I linked. Its topic is "doxxing." – Isaac Moses Mar 19 '15 at 14:06
  • @isaacKotlicky are people aware that they are being doxxed? The articles tech jargon flies over my head – Shoel U'Meishiv Mar 19 '15 at 14:06
  • @Mefaresh doxxing is about digging to completely unmask an online identity so as to open them up to harassment. Things like real name, address, phone number, email, possibly SS#, etc. so that people can do things like "swatting" (calling the police to batter down your door), mail threats, order food to be delivered at your house, etc. People generally are targeted for retribution for a "reason," and tend to find out quickly what's happening once the abuse starts flying. – Isaac Kotlicky Mar 19 '15 at 14:07
  • @IsaacMoses awww... I like the hacking lingo because it illustrates that they consider technical control to be equivalent to ownership. Though that might still be true halachically for computers... hmmmmn... – Isaac Kotlicky Mar 19 '15 at 14:12
  • @IsaacKotlicky I added "p0wns" back in. :) – Isaac Moses Mar 19 '15 at 14:13
  • Note: If you look at the JA article linked in the my answer linked above and want to look at the Rema he cites about H"R, the reference is a typo and should be to Ch"M 154:3. I just wrote to JA with the correction. – Isaac Moses Mar 19 '15 at 14:14

1 Answers1

7

Point number one, you are invading his privacy for which the cheirem of Rabbeinu Gershom would apparently apply. This article discusses similar modern inventions as far as this cheirem goes. http://www.torah.org/advanced/business-halacha/5757/vol2no17.html

Second, while it seems the damage done by hacking is not 'real' in the sense that no property was taken just bits and bytes of information being manipulated, in truth this is considered real damage halachicaly see Shulchan Aruch Choshen Mishpa siman 386.

Some of the cases there analogous to your explenation of hacking are burning someone's document which causes him a financial loss, or pushing (without lifting) his coin into the sea.

I hate to make a condensed mishmash of the long explenations of the Sma and Shach there, but to be brief any indirect action which could have theoretically been called Gramma and be pattur from tashlumin, will be called Garmi and chayav when the action was done with the express intention of damaging the other party, and it is a common action which necessitates this chiyuv tashlumin dirabanan.

There are of course opinions in the Rishonim that Garmi is chayav mideoraisa, I'm just mentioning these two gedolei achronim in their explenation of Shulchan Aruch as their opinions are usually considered halachicaly binding.

Scimonster
  • 23,124
  • 4
  • 55
  • 127
user6591
  • 33,638
  • 2
  • 39
  • 81
  • nice! I missed the grama/burning a shtar connection you pointed out. Very good point. I'm wondering if there are any modern poskim discussing the dinei mamanos aspect of this rather than the takana derabbeinu gershom... – Isaac Kotlicky Mar 19 '15 at 14:50
  • I'm awarding you the answer, but I was really hoping for something more modern explicitly addressing computer crimes... – Isaac Kotlicky Apr 26 '15 at 13:10