SSRN Id3107123
SSRN Id3107123
SSRN Id3107123
*
We thank Jack Coffee, Jeff Gordon, Alexander Guembel, Laurie Hodrick, Colleen Honigsberg, Gur
Huberman, Mark Lemley, Jusin McCrary, Mitch Polinsky, Fernan Restrepo, and workshop
participants at Columbia Law School, the Santa Fe Institute, Stanford Law School, the Toulouse
School of Economics, and the University of Toronto for helpful comments and discussions. Kailey
Flanagan and Hanna K. Song provided excellent research assistance. This draft is a companion piece
to an eponymous technical manuscript offering a more detailed theoretical analysis. All errors,
regrettably, are ours.
†
First Version: December 2, 2017. © 2018 by Joshua Mitts and Eric Talley. For the most recent
version of this paper, please visit https://ssrn.com/abstract=3107123.
Table of Contents
1. INTRODUCTION ........................................................................................................................1
2. EMPIRICAL EVIDENCE OF INFORMED CYBER-TRADING...................................6
DATA SOURCES ............................................................................................................................................ 6
EMPIRICAL DESIGN ..................................................................................................................................... 9
CROSS-SECTIONAL ANALYSIS .............................................................................................................. 13
DIFFERENCE-IN-DIFFERENCES ANALYSIS ........................................................................................ 18
3. NORMATIVE IMPLICATIONS: IS CYBER-TRADING SPECIAL? ....................... 23
PRICE DISCOVERY .................................................................................................................................... 24
DISTRIBUTIONAL FAIRNESS .................................................................................................................. 25
MARKET LIQUIDITY ................................................................................................................................. 26
ALLOCATIVE EFFICIENCY ...................................................................................................................... 27
4. PRESCRIPTIVE CHALLENGES ........................................................................................ 28
SECURITIES FRAUD LIABILITY ............................................................................................................. 33
LIABILITY UNDER THE CFAA .............................................................................................................. 42
SYNOPSIS ..................................................................................................................................................... 45
5. CONCLUSION........................................................................................................................... 47
1. Introduction
The ascendancy and impact of the information economy during the last
quarter century have been dramatic and unprecedented. Fully one fifth of the
preeminent Dow Jones Industrial Index in the mid-1990s was composed of Eastman
Kodak, Bethlehem Steel, F.W. Woolworth, International Paper, Sears Roebuck and
Union Carbide. Amazon and Google were little-known startups. Apple Computer—
which didn’t make this cut—was a moribund upstart from the 1980s; Facebook and
Bitcoin were still a decade away from inception. How times have ever changed.
The digitization of the world's economy has hastened profound changes in
commerce, record-keeping, law enforcement, personnel policy, banking, insurance,
securities markets, and virtually all aspects of services and manufacturing sectors.
And yet, a key pillar of the digital economy—the ease of accessing/copying/
distributing information at scale—is also frequently its Achilles Heel, in the form of
cybersecurity risk. The massive and cataclysmic data breach of Equifax in
September 2017, for example, which compromised highly confidential information
of tens of millions of clients (including Social Security numbers), was hardly the first
of its kind—nor will it be the last. For more than a decade, firms and organizations
that store confidential data digitally have been targets (potential or actual) of similar
types of attacks often with analogously cataclysmic implications for victims.
Within securities-market settings, of course, one person’s catastrophe can be
another’s arbitrage opportunity. And so it came to be in the late summer of 2016,
when Muddy Waters Capital—a well-known short hedge fund—opened a
confidential line of communication with MedSec, a start-up cybersecurity firm
claiming to have discovered a serious security software flaw in the pacemakers
produced by St. Jude Medical, a then-public medical device company (knee-deep in
the process of being acquired by Abbot Laboratories). Only after taking a substantial
short position in St. Jude did Muddy Waters publicly disclose the device’s
vulnerability,1 causing an immediate fall in St. Jude's stock price in excess of eight
percent. 2 Similar patterns of material changes in value after disclosure of a
cybersecurity event are now commonplace.3
Muddy Waters' securities-market play around St. Jude’s data breach
disclosure is perhaps unsurprising—particularly when (a) cybersecurity breaches can
have material price effects in capital markets; and (b) the underlying vulnerability
1
See http://www.muddywatersresearch.com/research/stj/mw-is-short-stj/ (August 2015).
2
See Goldstein, Matthew, Stevenson, Alexandra and Picker, Leslie, 2016. “Unusual Pairing Makes
Public Bet vs. Pacemakers.” New York Times (Sept. 8, 2016 at B1).
3
To take a current example, Uber's recent disclosure of a cybersecurity loss of client payment records
caused an outside investor (Softbank) to reduce its valuation assessment of Uber by nearly a third.
See Financial Times, "SoftBank share purchase discounts Uber by 30%" (Nov. 27, 2017).
5
See, e.g., SEC v. Masri, 523 F. Supp. 2d 361, 373 (S.D.N.Y. 2007).
6
U.S. v. O'Hagan, 521 U.S. 642 (1997). Several federal courts have recently contemplated an
extension to insider trading doctrine to reach (so-called) “outsider traders”— informed traders who
are neither corporate fiduciaries nor have breached a confidential relationship, but who use deceptive
means to hack into another’s computer system. See, e.g., S.E.C. v. Dorozhko, 574 F.3d 42, 51 (2nd
Cir. 2009) ("misrepresenting one's identity in order to gain access to information that is otherwise off
limits, and then stealing that information is plainly deceptive within the ordinary meaning of the
word…. [D]epending on how the hacker gained access, it…could be, by definition, a deceptive device
or contrivance that is prohibited by Section 10(b) and Rule 10b--5.") Nevertheless, no court to our
knowledge has firmly embraced this expansion to date. We discuss this nascent strand of case law
(sometimes referred to as “outsider trading”) in Section 4, infra.
6
See, e.g., Gordon, Lawrence A., & Martin P. Loeb. ”The economics of information security
investment.” ACM Trans. on Info. & Sys. Sec. (TISSEC) 5.4: 438-57 (2002) (reviewing literature).
7
See, e.g., Gordon, Lawrence A., and Martin P. Loeb. ”The economics of information security
investment.” ACM Transactions on Information and System Security (TISSEC) 5.4 (2002): 438-457
(reviewing literature).
8
See Lelarge, Marc. ”Coordination in network security games: a monotone comparative statics
approach.” IEEE Journal on Selected Areas in Communications 30.11 (2012): 2210-2219.
Kunreuther, Howard, & Geoffrey Heal. ”Interdependent security.” J. Risk & Uncertainty 26.2-3
(2003): 231-249. Making a similar point using a framework based on a terrorism scenario);
Lakdawalla, Darius N. and Talley, Eric L., Optimal Liability for Terrorism (October 2006). NBER
Working Paper No. w12578. Available at SSRN: https://ssrn.com/abstract=935571 (similarly
applying such arguments to terrorism scenarios, and arguing that overinvestment in strategic target
hardening by potential victims may justify allowing attacked parties to lodge a cause of action against
non-attacked entities for over-protection).
9
See Böhme, Rainer, and Tyler Moore. ”The “iterated weakest link” model of adaptive security
investment.” Journal of Information Security 7.02 (2016): 81.
10
See Kyle, Albert S. “Continuous Auctions and Insider Trading.” Econometrica 53:6 (1985), pp.
1315-1335; Milgrom, Paul & Stokey, Nancy, ”Information, trade and common knowledge”. J. Econ.
Th. 26(1): 17–27 (1982); L.R. Glosten and P.R. Milgrom. “Bid, Ask and Transaction Prices in a
Specialist Market with Heterogeneously Informed Traders,” Journal of Financial Economics, 14:71–
100, 1985.
11
See Liu, Yang, et al. ”Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents.”
USENIX Security Symposium 2015.
12
See Spanos, Georgios, and Lefteris Angelis. ”The impact of information security events to the stock
market: A systematic literature review.” Computers & Security 58 (2016): 216-229. Zhang, Jing, et
al., ”On the Mismanagement and Maliciousness of Networks.” NDSS. 2014.
breaches on public-company stock prices from 2003 to 2015. The authors find that
75.6% of the studies measure statistically significant stock-price reactions to the
disclosure of cybersecurity breaches. 20 out of 25 studies find negative and
significant stock-price reactions for victim firms, and none of these find significant
positive reactions for victim firms. Several other studies have found positive and
significant stock-price reactions for information security firms, plausibly reflecting
the additional demand for their services in the wake of security breaches. And,
consistent with our findings, at least one significant study finds evidence of pre-
announcement information leakages associated with cybersecurity vulnerabilities.13
That said, we are unaware of any prior study measuring trading patterns in the
months preceding the disclosure and the central legal implications of such patterns,
as we explore here.
An important caveat to our analysis warrants attention before proceeding.
Although our empirical results are strongly consistent with the type of informed
cyber-trading that occurred in the Muddy Waters / St. Jude episode, trading activity
by other market participants could produce similar results. If, for example,
employees or managers of the target firm discovered early evidence of a
cybersecurity breach or a vulnerability, they might also attempt to profit from that
information prior to disclosure, and their activity would similarly be observable in
our data. Although many of the policy considerations highlighted earlier would apply
to this type of trader too, existing law is already well equipped to deal with it – since
insiders at the firm typically owe duties of “trust and confidence,” the breach of
which will clearly trigger insider trading liability under current law. In many ways,
in fact, it is the curiously distinct legal treatment accorded insiders and outsiders in
this space that makes the topic an interesting one to ponder.
Our analysis proceeds as follows. Section 2 presents our core empirical
analysis of informed cyber-trading. Using a novel data set of publicly disclosed
cybersecurity incidents, we demonstrate unusual activity in the put-option market in
the weeks leading up to the disclosure, measured through “open interest” and trading
volume. Section 3 discusses the normative implications of our findings, arguing
that—relative to garden-variety informed trading—cyber-trading plausibly deserves
greater legal scrutiny under federal securities law. Section 4 delves further into
whether current legal institutions are equipped to take on the added threats of
informed cyber-trading. Here we argue that contemporary securities fraud and
computer fraud law appear, at least individually, unfit for the challenge, both
suffering from distinct forms of under-inclusiveness. While long-term statutory
reforms may provide a durable response, in the shorter term a more expedient elixir
13
See Arcuri, Maria C., Marina Brogi, and Gino Gandolfi. ”The effect of information security
breaches on stock returns: Is the cyber-crime a threat to firms?” Eur. Fin. Mgmt. Meeting, 2014
(finding find that the mean cumulative abnormal return to 128 cybersecurity disclosures is -.029 in the
(-20,+20) window, but shrinks to -0.003 in the (-1,1) window).
is likely to be maintaining the status quo, in which both doctrines play a supporting
role in concert with expert regulators (such as the SEC), who should remain
involved. Section 5 concludes.
Data Sources
Our analysis marshals a unique data set of announced corporate data breaches
provided by the Identity Theft Resource Center (ITRC). Since 2005, the ITRC has
collected and published an annual list of data breaches “confirmed by various media
sources and/or notification lists from state governmental agencies.” The ITRC's data
breach report includes both exposure of personally identifying information—i.e., any
incident “in which an individual name plus a Social Security number, driver's license
number, medical record or financial record (credit/debit cards included) is potentially
put at risk because of exposure”—as well as exposure of username and passwords
that are not necessarily tied to an identifiable individual. One example of an ITRC
data breach report—for a 2015 breach of Hyatt Hotels—is reproduced in Figure 1:
Figure 1: Specimen Identity Theft Resource Center Data Breach Report (Hyatt Hotels 2015).
The categories of information included in the report are: (1) internal ITRC identifier
of the breach, (2) the company which was attacked, (3) the state in which that
company is located, (4) the date the breach was published, (5) the type of the breach,
(6) the category of the breach, (7) whether personal records were exposed, (8) how
many records were exposed, and (9) a textual description of the breach. In addition,
the ITRC provides details on the source of information about the breach, e.g., a news
media report or disclosure by (or through) a governmental agency.15
14
Dispirited lawyerly types can nonetheless savor the opportunity to luxuriate in the palaverously
doctrinal denouement comprising Section 4, infra.
15
State privacy laws often require companies to notify individuals whose personal information may
have been compromised (see, e.g., N.H. Rev. Stat. § 359-C:19). Moreover, specific federal laws
The ITRC identified 4,580 data breaches from 2010 to 2016. While the vast
majority of these incidents involve private companies, nonprofits and governmental
actors, out of this group, we were able to match 145 breaches to publicly traded
companies. 16 To give a sense for the nature of the information contained in the
textual descriptions of these 145 events, Figure 2 presents a bi-gram word cloud,
which draws the most frequent consecutive word pairs in these descriptions with a
size proportional to the term’s frequency --- i.e., larger words appear more frequently
in the textual descriptions. As Figure 2 shows, the most popular terms in these
descriptions reflect information that would typically be the subject of a data breach,
i.e., personal information, email address, credit cards, addresses, social security
numbers, etc.
sometimes require disclosure, e.g., when health concerns are implicated (HIPPA), or if the breach is
sufficiently material to require disclosure by a publicly traded company under the securities laws.
Although there is no general duty to disclose all material information under the securities laws, but
cybersecurity vulnerabilities may fall into one of the enumerated categories of material event
disclosure required under Form 8-K.
16
For reasons detailed below, we end up using a smaller sample to ensure adequate comparability
between firms and industries.
claim that but for the hacker-trader activities, target firms and the baseline group are
similar in all other relevant ways, at least on average. If but-for causation in this
sense appears to hold, then we are justified in concluding that observed differences
attributable (at least in part) to hacker trading or tipping.
We examine two primary sources of data in order to measure possible hacker
trading and tipping. First, we consider approximately at-the-money (ATM) equity
put options written on the common stock of victim firms. An equity put option is
effectively a downside bet on a firm's stock: it gives its holder the right (but not the
obligation) to sell the firm’s stock at a specified price (the “strike price”) on a
specific expiration date (also known as the “maturity” date for the option). If one
denotes the strike price of a put option as 𝐾, its maturity date as 𝑇, and the firm’s
stock price on the maturity date as 𝑇 as 𝑆𝑇 , then the holder of a put option who acts
to maximize her payoff will receive the greater of (𝐾 − 𝑆𝑇 ) or zero at the time of
expiry.17 In other words, she receives the difference between the strike price and the
stock price at maturity if the former exceeds the latter. If the stock price at maturity
is higher than the strike price, she will rationally not exercise the put option because
that would cost her money; she is better off doing nothing. 18
Put options reflect a downside bet on the firm's stock because the value of a
put option increases as the firm's stock price at maturity decreases. Put simply, the
lower the stock price, the more the put option is worth: put options are thus
directionally negative bets on the value of the firm. Because the directional
implications of a data breach are unambiguously negative for a targeted firm --- that
is, one would be hard-pressed to find an example of a successful data breach that
should lead to an increase in the stock price of the victim firm --- put options are
likely to become more valuable upon revelation of a successful data breach. This
implies that market demand for put options may reflect at hackers or their “tippees”
may seek to exploit information, known only to them, about a successful data breach.
As noted above, we restrict our analysis to put options that are close to at the money
--- that is, they have a delta between 0.4 and 0.6.19 Within this range, the strike price
is likely to be relatively close to the current price of the firm's stock. We do so
because a put option that is out of the money is likely to be less responsive to
changes in the underlying price of the firm's stock.
17
For example, suppose the stock’s market price at maturity is $5 and one holds a put option with
strike price of $8. The holder can profit from this contract by (a) buying the stock at market price ($5)
and then exercising the option, delivering the stock to the option counterparty (for $8) and pocketing
the difference ($3).
18
The discussion in the text simplifies things a bit by presuming a “European” put option, which is
exercisable only on expiration. A similar (though slightly more complicated) analysis would attend
an “American” option, which is exercisable on any date up to (and including) the maturity date.
19
The delta of a put option refers to the sensitivity of the put’s value to changes in the underlying
stock price, or |𝜕𝑝𝑡 /𝜕𝑆𝑡 |.
We measure market demand for put options in two ways. The first is open
interest, which refers simply to the number of outstanding put-option contracts on the
stock of a particular underlying firm. The second is volume, which refers to the
quantity of put-option contracts that change hands between buyers and sellers over a
particular window of time. Both measure the extent to which traders in the market
are seeking to place downside bets on the prospects of victim firms.
In order to facilitate meaningful comparisons that are straightforward to
interpret, we aggregate our dataset to the firm-event level. That is, the unit of
analysis in our study is an average measure of trading in a given firm's put options
over a time window relative to a data breach event. For example, we refer below to
average open interest of put options for a particular firm over the two months prior to
disclosure of the data breach. If, hypothetically, there were two events and two firms
for each event, there would be four observations, each reflecting the average open
interest for each firm in the two months prior to each event. In the following
subsection, we describe how we design our empirical study to maximize the
reliability of inferences as to the link between corporate data breaches and the
demand for put option.
Empirical Design
We wish to evaluate empirically whether there is heightened trading in put
options prior to the announcement of corporate data breaches. To do so, we rely on
the well-developed literature on causal inference in empirical economics. To be sure,
our hypothesis is inherently descriptive in nature---we do not suppose that data
breaches causally increase put option trading, but rather that individuals who are
aware of data breaches prior to the rest of the market may be directly trading or
tipping others as to the presence of these vulnerabilities prior to disclosure. Formally
speaking, this thesis requires only a correlation between the execution of corporate
data breaches and market demand for put options.
Nonetheless, we are aware that an analysis of this sort is vulnerable to
spurious correlations. The problem of forming a valid counterfactual—what level of
put option trading would have emerged even in the absence of a data breach—is a
vexing challenge that applies to our study just as much as with a classical causal
inference project. For this reason, we employ methods to estimate the average
treatment effect of data breaches, keeping in mind the importance of forming a valid
counterfactual to evaluate whether observed put option demand can actually be
attributed to data breaches.
We thus estimate two basic kinds of empirical designs, each of which relies
on a different dataset. The first is a cross-sectional estimation, which simply asks: is
there a heightened level of open interest and trading volume in the put options of
data breach targets, prior to revelation of the data breach by the victim firm? To
minimize the likelihood that this simple comparison between firms for each event is
contaminated by other events that may give rise to put option trading, this estimation
focuses on the two months immediately preceding announcement of the data breach.
In this specification, we ask whether the average level of open interest and trading
volume during this two-month is higher for firms who are the victims of data
breaches. As described below, we employ propensity-score matching20 to ensure that
treatment and control firms are as similar as possible.
This cross-sectional specification, however, is vulnerable to the critique that
firms may differ for unobserved reasons that can lead to greater overall demand for
put options. To address this concern, we consider an alternative difference-in-
differences design, which allows each firm-event in our dataset to have a baseline
level of open interest and trading volume of put options. In this difference-in-
differences specification, we compare the change in open interest and volume of put
options from a baseline period --- eight to sixteen months prior to announcement of
the data breach --- to the period of interest --- eight months prior to the day of
announcement.
In our difference-in-differences design, we use this eight-month cutoff for
two reasons. First, this corresponds roughly to the average period of time during
which a hacker is aware of a successful data breach.21 Moreover, a visual inspection
of the data shows that this is also approximately the time when time trends begin to
diverge between treatment and control firms---prior to this point, they are roughly
parallel, as we show below.
We aggregate pre-post differences to the firm-event level and compare these
differences between treatment and control firms. As with the cross-sectional design,
we employ propensity score matching on observable firm-level covariates, measured
as of the year prior to the attack, to ensure that similar firms are compared to each
other. This heightens the plausibility of the counterfactual inference that treatment
and control firms would have similar counterfactual outcomes. Along with showing
that the parallel trends assumption is satisfied, this evidence suggests that observed
differences in put option trading are likely to be linked to corporate data breaches
and not spuriously arising as a result of other differences between firms.
As noted previously, both of our specifications employ propensity-score
matching, 22 which matches each treatment observation to one or more control
observations which are similar along several covariates. We generate a propensity
score and thus matching observations by estimating a logistic regression on the
following covariates: (1) 4-digit SIC industry code (i.e., an indicator for each), (2)
log of market capitalization, (3) log of total assets, (4) log of net income, and (5) log
20
See Abadie, A. and Imbens, G. W. (2006), Large sample properties of matching estimators for
average treatment effects. Econometrica, 74(1):235–267.
21
Research by Symantec has shown that hackers tend to exploit security vulnerabilities for an average
of ten months prior to discovery by the affected firm (Bilge and Dumitras, 2012).
22
See Abadie & Imbens, supra n. __
For these reasons, we are forced to drop those firms in industries which are too small
to allow for obtaining a meaningful matched control group. Indeed, while many of
these smaller industries contain several firms, many small-cap firms are too illiquid
to have frequent options trading. Limiting the sample to those firms for which we
have sufficient information over the relevant time periods yields 46 treatment firm-
event pairs and 3,319 control firm-event pairs in the difference-in-differences dataset
and 51 treatment firm-event pairs and 3,425 control firm-event pairs in the
difference-in-differences dataset. 23 Tables 1 and 2 present summary statistics on
these datasets.
The validity of our propensity-score matching method to estimate causal
effects turns on the extent to which the treatment and control groups are balanced,
that is, likely to exhibit the same counterfactual outcomes even in the absence of
treatment. Of course, there are a relatively small number of public companies with
liquid options in each 4-digit SIC code industry, so any matching procedure will fall
short of achieving perfect balance. Nonetheless, we perform a series of tests to verify
balance in the distribution of treatment and control firms.
We begin by visually comparing the distribution of the propensity score for
both the cross-sectional and difference-in-difference datasets when estimated using
the full set of covariates. Figure 3 shows this distribution before and after matching
for the cross-sectional and difference-in-difference datasets, respectively. 24 The
similarity in the density of the two propensity scores suggests that the two groups are
balanced on the propensity score.
Figure 3: Propensity Score Balance Tests for Cross Sectional (Left Panel) and Difference-in-
Differences Data Sets (Right Panel). In both left and right panels, the density of propensity scores is
plotted for treatment groups (solid lines) and control groups (dashed lines), comparing the raw
controls with the propensity-score matched observations.
Due to the relatively small number of public firms with liquid equity options
in each SIC code, achieving greater balance on one covariate inevitably involves a
loss of balance on another (to some extent). For this reason, in a later subsection, we
present results using propensity-score matching on individual covariates, as well as
all of the covariates together, to illustrate that the results do not depend on which
23
The latter contains more firms than the former because it covers a longer time period.
24
In these figures, the propensity score is estimated on the subsample which contains nonzero open
interest, but the results are virtually identical when estimating on the subsample that contains nonzero
trading volume.
Table 3: Balance Test on Individual Covariates for Cross Sectional (upper panel) and Difference-in-
Differences (lower panel) matched-sample specifications. The raw mean in the largest possible
subsample for each covariate is given in the first column. While the matching is unable to achieve
perfect balance across all of the covariates simultaneously, this table shows that each specification
leads to near-perfect balance on a different covariate.
Cross-Sectional Analysis
We begin by estimating the average treatment effect (“ATE”) for the targeted
firms by propensity score matching 25 them with non-targeted comparators over a
variety of economic indicia. Normalizing the disclosure date to 0 for all breached
firms, we compare (logged) open interest and (logged) volume of targeted firms to
their matched counterparts over the interval [-60,0], corresponding to approximately
the two-month period that precedes the first disclosure of the data breach.26 Here, our
identification strategy is based on the assumption that this interval is likely to be
unknown to anyone other than the hacker (and its tippees) and corporate officers who
25
See Abadie & Imbens, supra n. __
26
We show below that the results are not driven by the choice of this interval.
may have become aware of the data breach. First, we estimate the difference in log
open interest on outstanding put options between treatment and control firms for a
variety of matching covariates. The results are shown in the following Table:
As the first row of Table 4 illustrates, there is an average increase of between .36 and
.75 log points in the open interest of the put options written on target firms, and the
result is consistent and statistically significant across specifications. To get an
intuition behind the economic significance of the coefficients reported above, recall
from Table 1 that the mean log open interest was around 4.60. Thus, an open-interest
coefficient estimate of 0.7 in the full model (see Column 4) corresponds to roughly
0.70/4.60 = 15% of the mean logged open interest.
Next, we estimate differences in log trading volume of outstanding put
options between treatment and control firms. The results are shown in Table 5. As
the Table shows, there is an average increase of between .53 and 1.28 log points in
trading volume of put options written on target firms. The result grows in both
magnitude and significance as additional covariates are included in the propensity
score matching, indicating that initial statistical insignificance may embody
estimation noise driven by over-weighting of firms that are dissimilar.
As to the economic significance of these coefficients, recall from Table 1 that the
mean log volume was 1.62. Thus, the point estimate of 1.28 in the full model
corresponds to roughly 79% additional trading volume of put options in the targets of
corporate data breaches relative to the control group. All told, in addition to their
statistical significance, our cross-sectional estimates for both open interest and
volume appear to represent relatively large economic effects as well.
Although Tables 4 and 5 already perform some robustness analysis as to our
matching covariates, we also conducted a robustness check on our propensity score
method. Specifically, we re-estimated the treatment effect with all covariates across
three other matching schemes for identifying treatment effects: inverse-probability
weighting, 27 inverse-probability weighting with regression adjustment, 28 and
regression adjustment.29 The results are shown in the panels of the following Table,
which demonstrates significant consistency across scoring methodologies.
27
See Imbens, G. W. (2000). The role of the propensity score in estimating dose-response functions.
Biometrika, 87(3):706–710.
28
See Wooldridge, J. M. (2007). Inverse probability weighted estimation for general missing data
problems. Journal of Econometrics, 141(2):1281–1301.
29
See Lane, P. W. and Nelder, J. A. (1982). Analysis of covariance and standardization as instances
of prediction. Biometrics, pages 613–621.
Log Volume
Table 6: Alternative Matching Methods; Cross-Sectional Analysis; Log Open Interest (upper
panel) and Log Volume (lower panel)
We also explored whether our results are an artifact of the two-month interval
[-60,0], re-estimating the models matching on the full set of covariates using a
variety of time event windows. The results for open interest and volume are shown in
the following Table.
Log Open Interest
Log Volume
Table 7: Alternative Time Horizons; Cross-Sectional Analysis; Log Open Interest (upper panel)
and Log Volume (lower panel)
While it is clear from Table 7 that some subsamples yield higher t-statistics
than others, the point estimates are consistent in sign and magnitude regardless of the
time window.
Difference-in-Differences Analysis
One potential concern with the results in the prior Section is that no matter
how careful we are in matching treatment with control firms, our treatment firms
could still differ from our controls on some durable, unobserved dimension(s). To
address this concern, we estimate a difference-in-differences specification which
estimates a baseline level of open interest and volume on outstanding put options of
target firms over the interval [-480, -240], i.e., approximately sixteen months to eight
months prior to disclosure of the data breach. 30 Our D-in-D design compares
treatment-control differences during this baseline period to the analogous differences
the interval [-240, 0], i.e., approximately eight months prior to disclosure up to the
date of announcement. As explained previously, we aggregate the change in the log
average open interest and log volume of put options between the two periods by
firm-event, so there is one observation per firm-event. We then employ propensity
score matching with robust standard errors to ensure that treatment and control firms
are as balanced as possible on observable covariates and proceed to estimate the
ATE on this outcome (i.e., the difference in log open interest and log volume).
Figure 4: This figure plots time trends for log average open interest (left panel) and trading volume
(right panel) on put options between treatment and control firms in the matched sample. The pre-
treatment period (in days) is the interval [- 480, -240), and the post-treatment period is the interval [-
240; 0].
30
We show below that the results are not driven by the choice of this specific interval.
31
Comparing to the summary statistics in Table 2, the economic significance of the estimated
coefficients is somewhat smaller than in the cross-sectional analysis; but it is still appreciable.
Log Volume
Table 8: Difference in Differences Estimation; Log Open Interest (upper panel); Log Volume (lower
panel)
Log Volume
Table 9: Alternative Matching Techniques; Diff-in-Diff; Log Open Interest (upper panel) and Log
Volume (lower panel)
Finally, as above, we consider whether the results are robust to our choice of
the interval in the Difference-in-Differences approach, altering the “pre” / “post”
treatment specifications. The re-estimated results using a variety of different time
horizons for open interest and volume are shown in the following Table:
Log Open Interest
Log Volume
Table 10: Alternative Time Horizons; Difference-in-Differences Analysis; Log Open Interest (upper
panel) and Log Volume (lower panel)
While some subsamples yield higher t-statistics than others, all point estimates are
consistent in sign and magnitude regardless of the time window.
All told, our empirical analysis uncovers relatively pronounced evidence of
market trading abnormalities in the options market prior to the public disclosure of a
cybersecurity threat. While the magnitude of the effect varies (as it invariably does)
on the precise estimation methodology, our results appear to be robust across the
conventional alternative candidates. Although we are tempted at this stage simply
to call it a day—relegating the practical details of policy responses to some unnamed
future commentator—our professional duty (or our authorial zeal) impels us further
to ask (a) whether the findings above pose a normative problem that securities law
should address; and (b) if so, whether the tools already exist and/or are being
developed for the task at hand. It is to these questions we now turn.
32
See, e.g., Jonathan R. Macey, Insider Trading: Economics, Politics, and Policy 21-47 (AEI Press
1991). Another relevant policy dimension concerns strategic incentives of corporate insiders
themselves (such as whether to delay disclosure of information in order to permit informed trading).
Id. We exclude these considerations here, since the predominant set of issues concerns non-statutory
insiders.
Price Discovery
Consider first the desideratum of pricing efficiency: i.e., the proposition that
capital markets should be structured to facilitate the systematic adjustment of prices
to incorporate relevant information about the “fundamentals” underlying traded
securities. When satisfied (at least roughly), pricing efficiency assists market
participants in making sound portfolio choices, and it helps firms to finance value-
enhancing projects. Indeed, as has long been known (and celebrated) by economists,
market prices are often an excellent mechanism to summarize and convey
information about the underlying economic attributes of an asset (e.g., its scarcity,
riskiness, etc.), a benefit that frees many market participants (though perhaps not all)
from the costly task of having to investigate and verify such matters directly.33 A
closely related corollary to pricing efficiency follows immediately: that it is
preferable for securities prices to adjust rapidly as market and company
fundamentals change, rather than on a delayed or attenuated basis (where pricing
inaccuracies persist). Such rapid price “discovery” ensures that relevant information
about market fundamentals flows to individuals as quickly as possible, further
enabling them to make sound portfolio choices.
To the extent one views price discovery as important (and most economists
do), it typically counsels for a permissive stance on informed trading. Although most
securities markets are thought to reflect relevant publicly available information
(sometimes called “semi-strong” efficient), informed trading can sharpen that
accuracy by hastening the incorporation of new information into market price. If
informed traders to are permitted to trade freely on the basis of their information, the
argument goes, their own trading activity will systematically drive up (or down) the
price of a financial asset whenever it is under- (or over-) priced based on the newly-
arrived information. 34 Indeed, not only will the prospect of arbitraging the
information be attractive to such traders, but it will also motivate at least some of
them to monitor new information in the first place. The ensuing price change
effectively transmits the import of that new information to other market participants,
providing a public good that enhances overall pricing efficiency.
Informed cyber-trading shares many of these traits. Given a known
vulnerability that will soon be disclosed, informed trading induces market prices to
approach fundamentals. Moreover, one might argue, the ability to profit from that
information helps induce aspiring arbitrageurs to discover information about
vulnerabilities. Thus, in our view, the relative merits of informed trading for price
33
See, e.g., F.A. Hayek, The Use of Knowledge in Society, 35 Am. Econ. Rev. 519,528 (1945). It is
worth noting, of course, that when the set of underlying economic attributes at stake is sufficiently
varied and rich, price—a unidimensional piece of information—may become a less reliable
embodiment of such attributes. See, e.g., A. Chakraborty & Bilge Yılmaz, “Manipulation in Market
Order Models.” Journal of Financial Markets, 7(2): 187–206 (2004).
34
See, e.g., Manne, Henry, Insider Trading and the Stock Market (1966); Macey, supra note __.
discovery remain relatively consistent (at least on first approximation) when one
compares informed cyber-trading to garden variety information trading. There does
not seem to be much of a compelling argument—at least on the basis of this
desideratum—that counsels for more rigorous relative scrutiny.
Distributional Fairness
The desideratum of pricing efficiency just discussed consciously accepts the
reality that the price discovery process will—by definition—produce (informed)
winners and (uninformed) losers in individual trades, and that their interaction
through the market will provide a public good of price discovery. From a pure
Kaldor-Hicks efficiency perspective, this outcome seems eminently defensible, since
winners and losers in the trading market are largely engaged in making / receiving
transfer payments from one another—activities that play a neutral role in efficiency
calculus. At the same time, to the extent that one’s measure of economic welfare also
places weight on distributional equity, 35 the transfer payments that facilitate price
discovery may matter too—particularly if the identity of the winners and losers in
this process is highly correlated across trades and over time, permitting certain
traders to make systematic arbitrage rents at the expense of others. To the extent that
winning and losing is systematic in information trading, the prospect of a
consistently unlevel playing field in securities markets might well be a significant
welfare cost of price discovery—one that attenuates the case for pursuing perfect (or
near perfect) pricing efficiency.36
Although economic-minded commentators vary in the extent to which they
value distributive equity concerns in the context of informed trading, 37 resolving this
longstanding disagreement proves unnecessary here: for distributive fairness
concerns—while plausibly relevant—shed little additional light on the problem in
the context of informed cyber-trading. To be sure, given the scarcity of
programming/hacking talent and access to large trading platforms, it is plausible that
35
See, e.g., Hal R. Varian, “Distributive Justice, Welfare Economics, and a Theory of Fairness,” 4
Philosophy and Public Affairs 223-47 (1975) (advancing such a theory).
36
It should be noted that the “level playing field” rationale for securities law—a rough proxy for
distributive fairness—has largely been rejected as a formal statutory goal by courts. See, e.g.,
Chiarella v. United States, 445 U.S. 222 (1980) (rejecting the “level playing field” desideratum
advanced by the SEC). Remaining mindful of the difference between “is” and “ought,” however, it is
worthwhile pondering fairness anyway, since it remains a relevant normative criterion from a policy
perspective.
37
See generally Michael J. Fishman; Kathleen M. Hagerty, “Insider Trading and the Efficiency of
Stock Prices,” 23 RAND J. Econ. 106-122 (1992); Kim Krawiec, “Fairness, Efficiency, and Insider
Trading: Deconstructing the Coin of the Realm in the Information Age,” 94 N’Western L. Rev. 443
(2001). There is also a longstanding debate about whether distributional fairness concerns—even if
relevant from a welfare perspective—should enter into liability standards at all, or rather should be
capitalized into tax-and-transfer systems. See Louis Kaplow & Steven Shavell, Fairness Versus
Welfare (Harvard Press 2002). This argument is particularly unhelpful here, however, since securities
markets are global and many participants are beyond the taxing authority of any single governmental
actor.
informed cyber-traders may enjoy systematic rents across firms, across transactions
and over time. It is also plausible that their informed trades bring information of
tremendous value to the market through the pricing mechanism, tipping off not only
uninformed traders but also the firms themselves about the risk of a hack. That said,
a similar (if not identical) set of tradeoffs appears manifest in virtually any informed
trading context. Consequently, there does not appear to be a compelling reason to
accord greater (or lesser) scrutiny to informed cyber-trading than any other type of
informed trading activity.
Market Liquidity
A third consideration that often attends the insider trading debate—and one
that combines the two aforementioned concerns—concerns market liquidity. To the
extent that informed parties are allowed to participate in market trading, they will
typically transact their business alongside or with uninformed market participants,
who know that they stand a large chance of being taken advantage through their
trades. In markets known to be populated with information traders, however,
uninformed market participants can become understandably reluctant to trade.
Indeed, the very fact that a (possibly) informed trader wishes to buy/sell a financial
asset may itself constitute a strong signal that one stands to lose by serving as
counterparty to the proposed transaction. In fact, in the extreme case where the
predominant driver of trade private information, trading among uninformed
counterparties can shut down completely, leading to the near collapse of a market38 –
a consequence that is, ironically enough, deeply antithetical to price discovery.
Informed traders, therefore, play simultaneously heroic and parasitic roles in their
relationship with other traders: They heroically contribute to price discovery; but
they parasitically require liquidity-trader participation order to make information
arbitrage profitable, since their very presence can systematically deter such
participation. 39 Consequently, even when pricing efficiency is of vital importance
and distributive equity concerns are assumed away, it may be efficiency enhancing
for market regulators to embrace a compromise where information trading is
permitted, yet limited in magnitude to a level that does not engender market
dysfunction or illiquidity.40
As above, however, the importance of depth and liquidity in capital markets
in the context of informed cyber-trading does not seem systematically distinct from
its importance in the general context of informed trading. In both cases, extreme
prevalence of private information can cause markets to seize up, thereby justifying
(at least potentially) some outer limits on ability of participants to exploit
information advantages. Though the precise boundary that such limits should demark
38
Milgrom & Stokey, supra n. __
39
See Kyle, supra n. __
40
See Stoll, supra n. __; Glosten & Milgrom, supra n. __.
is far from clear, there is also little reason to think that its location is dramatically
different in the context of informed cyber-trading.
Allocative Efficiency
Finally, informed trading in securities markets can foment a host of different
issues related to allocative efficiency, in which market participants may incur costly
expenditures in order to facilitate and/or prevent the transfer payments that attend
information arbitrage. Aspiring informed traders, for example, may overinvest in
acquiring inside information about existing (but as-yet-undisclosed) risks, or in
keeping such information proprietary, hoping to exploit it maximally for personal
advantage. Potential market counterparties, in turn, may respond by overinvesting
themselves, suspicious that their counterparty is an informed trader attempting to
exploit their ignorance. The issuers, too, might get into the mix, attempting to avoid
the costs and embarrassment of having a third party expose a latent problem or risk.
In the end, prices would no doubt be exceedingly accurate, reflecting (and quickly
adjusting) to each new change in information. But such pricing efficiency provides
little if anything in the way of public goods, since market participants have little to
learn, having already incurred substantial costs to acquire that information directly. 41
As with the analysis above, informed cyber-trading shares several of the
same allocative efficiency concerns as those that apply to the more general
information-trading scenario: Traders and firms may have similar sorts of incentives
to invest “too much” (from a social perspective) in divining latent facts. We submit,
however, that at least two additional considerations make informed cyber-trading
different—and in many respects more worrisome—than the general case. They are as
follows:
First, unlike the garden-variety case of informed trading—where the underlying
new information happens independently—with informed cyber-trading the new
information is, in a meaningful respect, an endogenous harm that is substantially
“created” by the hacker to be visited on the firm. Where the hacker actively steals
proprietary data (such as employee social security numbers), this endogeneity is
obvious. But even when the hacker merely exposes an existing vulnerability, the
hacker’s actions are still akin to imposing a harm on the target. For example, the
underlying vulnerability exposed might have gone undetected for the foreseeable
future, had it not been for the prospect of extracting cyber-trading rents.
Moreover, the cybersecurity vulnerability—once exposed—can easily
compound, furnishing a digital roadmap for countless nefarious actors seeking to
exploit the target’s likely vulnerabilities. 42 (Even if the target is able to conjure
41
See Zohar Goshen & Gideon Parchomovsky, “On Insider Trading, Markets, and ‘Negative’
Property Rights in Information,” 87 U. Va. L. Rev. 1230 (2001).
42
Muddy Waters’ research report on St. Jude, for example, contained a detailed 34-page description
of how to exploit two different vulnerabilities in the St. Jude pace-makers, including step-by-step
up a quick fix for the specific hack disclosed, its software vulnerability may be
far more systematic, and in any event the exposed firm often becomes target
practice for other hackers in the wake of the initial disclosure, driving the cyber-
trader’s profits higher still.) In many respects, then, hacker creates and then
imposes a unique harm on the targeted company—one that is qualitatively
different from garden-variety “exogenous” information shocks serendipitously
observed by an information trader. Allowing a coordinated hacker-trader team to
capture these arbitrage gains, then, would implicitly subsidize the very harm-
creating activity that is being “discovered” in the first instance.
Second, and relatedly, when hackers have an enhanced incentive to create such
harms, targets also have an enhanced incentive to undertake costly precautionary
measures meant to deter (or divert) hacker activity. In many situations, such
undertakings can be considerable, such as investing in added internal cyber-
hacking squads, or offering attractive third-party “bounties” to those who detect
and bring forward unknown vulnerabilities. These incentives are perhaps
maximal in instances where a target’s risk of hacking increases when it is
identified as the “weakest link” among potential targets. For in such settings, a
type of “arms race” to self-protect can ensue among potential targets, whereby
each effectively “doubles down” on the equilibrium influence costs borne by
hackers and targets alike.43
Informed cyber-trading therefore raises unique allocative efficiency
considerations relative to garden-variety information trading. Consequently, policy-
minded legal actors might do well at least to consider whether—in the light of these
sui-generis costs—informed cyber-trading warrants heightened scrutiny by courts. In
the next section, we consider whether legal institutions under the status quo are up to
the task.
4. Prescriptive Challenges
The previous sections have established (a) that informed cyber-trading in the
securities markets occurs at a statistically and economically significant scale, and (b)
that the practice raises certain idiosyncratic policy concerns that are not generically
present in canonical cases of informed. In the light of these observations, we now
turn to the prescriptive question of how legal institutions might address informed
cyber-trading in those circumstances where policy concerns justify special scrutiny.
More concretely, our approach here is to inform the pragmatic discussion as to (a)
whether current law acts to deter informed cyber-trading trading, and (b) if not, how
instructions detailing even what type of equipment to purchase on internet shopping sites (such as e-
Bay) to consummate the hack. See Muddy Waters Research Report, supra note 1, at 2-9.
43 We consider these incentives in detail in a technical companion piece. See Mitts & Talley,
Informed Trading and Cybersecurity Breaches: Technical Companion (unpublished manuscript 2017)
(available from authors upon request).
one might adapt current legal institutions to address more effectively informed
cyber-trading activity. We will advance the thesis that—outside of certain special
contexts—under current law the prospects for trader liability is a surprisingly
tenuous fit with normative policy concerns, and is more frequently either ineffectual
or. The two most promising ways to adapt current law to address informed cyber-
trading—extending insider-trading liability to “outsiders,” or expanding the reach of
the Computer Fraud and Abuse Act (CFAA)—both fall short (in different ways) in
addressing the distinct normative quandaries raised by the practice.44
To frame and situate our prescriptive discussion, consider Table 11 below,
which subdivides the legal policy question by positing the possibility that the hacker
and the trader may be different persons with different individual interests:
The columns of the Table posit that the objectives of the “hacker” (a term we use
broadly, to include both “white hat” and “black hat” hackers) can be motivated either
by a desire (i) to exploit the target’s vulnerabilities in order to steal data; or (ii)
merely to detect and publicize such the target’s vulnerabilities. The rows, in contrast,
denote the trader’s interaction with the hacker, distinguishing contexts where the
trading entity is either (i) independent from the hacker (e.g., it learns of the hack
through independent means) or (ii) directs, coordinates or transacts with the hacker
in pursuit of a common aim. 45 (While intermediate interests / degrees of
coordination are no doubt possible, Table 11 represents an adequate as a first
approximation for our analytic task.)
44
The discussion below seems particularly timely in the light of the recent high-profile cybersecurity
breaches, including the attack on the SEC's EDGAR website, a database of draft corporate filings – a
natural goldmine for hackers seeking material nonpublic information ("MNPI") prior to public
disclosure. Hannah Kuchler, Hackers Target Weakest Links for Insider Trading Gain, FINANCIAL
TIMES (Oct. 3, 2017), https://www.ft.com/content/13a317ce-a561-11e7-9e4f-7f5e6a7c98a2;
Alexandra Stevenson & Carlos Tejada, S.E.C. Says It Was a Victim of Computer Hacking Last Year,
N.Y. TIMES (Sept. 20, 2017), https://www.nytimes.com/2017/09/20/business/sec-hacking-attack.html.
45
In cases where the hacker and trader are the same person, of course, the degree of coordination
between the two is complete, so that such situations would fit easily into the top row of Table 11.
46
This is not to say that one would have no concerns in these permutations. For example, one could
argue that when an unaffiliated trader learns of an active theft of data (Scenario III), the trader should
be under a “Good Samaritan” – like duty to disclose the information. That said, such considerations
do not appear to raise sui-generis normative concerns in the case of data breach when compared to
other possible latent harms discovered by a trader.
47
See Vollmer, Andrew N., Computer Hacking and Securities Fraud (September 24, 2015). 47 Sec.
Reg. & L. Rep. 1985 (October 19, 2015); Virginia Law and Economics Research Paper No. 26.
Available at SSRN: https://ssrn.com/abstract=2679092
risk on such actors—while admirably creative—are still an awkward fit with the type
of legal oversight one might design from a blank slate to deal with informed cyber-
trading.
Our analysis of these considerations need not be confined to abstract
hypotheticals, however: For the legal dimensions of Scenario I are evolving even as
of this writing—in the form governmental complaints in an interrelated cluster of
high-profile actions (the “Dubovoy case”).48 These cases constitute in many ways a
virtually perfect case study of Scenario I. In its civil complaints filed in 2015 and
2016, the SEC charged more than 40 defendants with securities fraud and related
charges stemming from an alleged international hacking-and-trading scheme
organized by Ukrainian nationals Ivan Turchynov and Aleksandr Ieremenko (the
“Dubovoy Hackers”).49 The U.S. Attorney’s Offices for the District of New Jersey
and the Eastern District of New York followed with criminal actions against a subset
of the named defendants in the SEC case, including the Dubovoy Hackers and traders
(including hedge fund managers and their investment firms 50) located both in the
U.S. and abroad (“Dubovoy Traders”).51
According to government documents, the Dubovoy Hackers repeatedly “used
deceptive means”52 over a five-year period to breach computer networks at several
U.S. business newswire services (e.g., Marketwired, PR Newswire, and Business
Wire) 53 extracting material non-public information (MNPI) in the form of
“confidential earnings information for numerous publicly-traded companies from
press releases that had not yet been released to the public.” The Hackers then sold
the purloined data to the Dubovoy Traders, 54 as part of an orchestrated and
coordinated plan. Indeed, the government asserts that the Dubuvoy Traders even
provided the Hackers with “shopping lists” of desired press releases, accessed the
48
Complaint, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed August 10,
2015). Indictment, U.S. v. Korchevsky et al., No. 15-cr-00381 (E.D.N.Y., filed Aug. 5, 2015).
Indictment, U.S. v. Turchynov et al., No. 15-cr-00390 (D.N.J., filed Aug. 6, 2015). A subsequent
complaint named additional defendants. See Complaint, SEC v. Zavodchiko et al, No. 2:16-cv-00845
(D.N.J., filed Feb. 17, 2016).
49
Jonathan Stempel, SEC Brings New Charges Over Global Press Release Hacking Scheme,
REUTERS (Feb. 18, 2016), https://www.reuters.com/article/us-trading-cyber-sec/sec-brings-new-
charges-over-global-press-release-hacking-scheme-idUSKCN0VR25N.
50
Cory Bennett, Hackers Cash in with Insider Trading, The Hill (Aug. 16, 2015),
http://thehill.com/policy/cybersecurity/251174-hackers-cash-in-with-insider-trading; Nate Raymond,
Russia Investor, Funds Pay $18 Million to Settle U.S. Press Release Hacking Case, Reuters (Mar. 25,
2016), https://www.reuters.com/article/us-insidertrading-cyber-sec/russia-investor-funds-pay-18-
million-to-settle-u-s-press-release-hacking-case-idUSKCN0WR1A4.
51
SEC, SEC Charges 32 Defendants in Scheme to Trade on Hacked News Releases, Press Release
2015-163 (Aug. 11, 2015), https://www.sec.gov/news/pressrelease/2015-163.html.
52
Complaint ¶ 71, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed August 10,
2015).
53
Indictment ¶ 14, U.S. v. Turchynov et al., No. 15-cr-00390 (D.N.J., filed Aug. 6, 2015).
54
Complaint ¶¶ 1-3, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed August
10, 2015).
stolen MNPI through secured overseas computer servers,55 and then “used that stolen
[MNPI] to trade securities and reap over $100 million in unlawful profits.”56 The
Dubovoy Traders are further alleged to have used “deceptive means,” including the
use of multiple fictitious accounts and entities, to conceal their trading activities.57
In its criminal indictment of the Traders, the government alleged a series of
transgressions under federal criminal law, including:58
Securities Fraud under Rule 10b-5, in violation of 15 U.S.C. §§ 78j(b)
(Manipulative and Deceptive Devices) and 78ff (Penalties), 17 CFR 240.10b-
5 (Employment of Manipulative and Deceptive Devices), and 18 U.S.C. §2
(Principals).
Fraud and Related Activity in Connection with Computers, in violation of 18
U.S.C. § 1830 (a.k.a., the Computer Fraud and Abuse Act, or “CFAA,”
discussed below).
Wire Fraud, in violation of 18 U.S.C. §§ 1343 and 1349 (Attempt and
Conspiracy).
Money Laundering Conspiracy, in violation of 18 U.S.C. § 1956(h)
(Laundering of Monetary Instruments).
The securities fraud and CFAA charges play prominent roles here, since (a) they
embody the most general-purpose charges in the informed cyber-trading context; and
(b) they constitute critical predicate offenses for criminal liability under wire fraud
and money laundering statutes. The majority of individuals indicted by the DOJ
reached plea agreements with federal prosecutors between December 2015 and
August 2016, pleading guilty to the wire fraud conspiracy counts, with the DOJ
dropping most of the predicate criminal charges.59 Such criminal settlements are not
uncommon, and—in a sense—they provide a measure of deterrence to others who
would attempt similar conduct in the future. And yet, the Dubuvoy plea agreements
55
U.S. Dept. of Justice, Hacker Sentenced To 30 Months In Prison For Role In Largest Known
Computer Hacking And Securities Fraud Scheme, Press Release (May 22, 2017),
https://www.justice.gov/usao-nj/pr/hacker-sentenced-30-months-prison-role-largest-known-computer-
hacking-and-securities.
56
Complaint ¶ 1, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed August 10,
2015).
57
Id. ¶ 7.
58
Indictment ¶¶ 112-145, U.S. v. Turchynov et al., No. 15-cr-00390 (D.N.J., filed Aug. 6, 2015). In
addition to the offenses listed in association with the Dubovoy Traders, it may be of interest that the
Dubovoy Hackers were also charged with crimes such as conspiracy to commit fraud and related
activity in connection with computers, fraud and related activity in connection with computers, and
aggravated identity theft. The Eastern District of New York charged the defendants with an
overlapping set of crimes: Conspiracy to Commit Wire Fraud, Conspiracy to Commit Securities
Fraud, Securities Fraud, and Money Laundering Conspiracy. Indictment ¶¶ 45-55, U.S. v.
Korchevsky et al., No. 15-cr-00381 (E.D.N.Y., filed Aug. 5, 2015).
59
U.S. Dept. of Justice, Hacker Sentenced To 30 Months In Prison For Role In Largest Known
Computer Hacking And Securities Fraud Scheme, Press Release (May 22, 2017),
https://www.justice.gov/usao-nj/pr/hacker-sentenced-30-months-prison-role-largest-known-computer-
hacking-and-securities.
also leave open the interesting question of whether the predicate securities fraud
and/or CFAA charges themselves would have had traction had they been pursued to
trial.60 We thus consider each below, in turn.
Securities Fraud Liability
Consider first the allegations of securities fraud. Here, in pursuing its
criminal claims, the government had the benefit of additional enforcement expertise:
As frequently happens in securities fraud contexts, 61 the Securities and Exchange
Commission (SEC) coordinated with federal prosecutors, and it also filed a series of
independent civil claims alleging securities fraud by the Dubuvoy traders. These
allegations62 include:
Section 10(b) of the Securities Act of 1934 (“‘34 Act”) and Rule 10b-5
thereunder63.
Section 17(a) of the Securities Act of 1933 (“‘33 Act”)64.
Sections 20(b)65 and (e)66 of the ‘34 Act.
60
It bears noting that the defendants were also charged with identity theft under federal law, which
might also have carried weight as a predicate offense for wire fraud / money laundering.
61
See Mary Jo White, “All-Encompassing Enforcement: The Robust Use of Civil and Criminal
Actions to Police the Markets,” (March 31, 2014).
62
Complaint ¶¶ 222-234, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed
August 10, 2015).
63
Complaint ¶¶ 225-227, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed
August 10, 2015) (“By engaging in the conduct described above, defendants knowingly or recklessly,
in connection with the purchase or sale of securities, directly or indirectly, by use the means or
instrumentalities of interstate commerce, or the mails, or the facilities of a national securities
exchange: (a) employed devices, schemes or artifices to defraud; (b) made untrue statements of
material facts or omitted to state material facts necessary in order to make the statements made, in
light of the circumstances under which they were made, not misleading; and/or (c) engaged in acts,
practices, or courses of business which operated or would operate as a fraud or deceit upon any person
in connection with the purchase or sale of any security…By engaging in the foregoing conduct
defendants violated, and unless enjoined will continue to violate, Section 10(b) of the Exchange
Act.”).
64
Complaint ¶¶ 222-224, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed
August 10, 2015) (“Defendants, by engaging in the conduct described above, knowingly or recklessly,
in connection with the offer or sale of securities, by the use of the means or instruments of
transportation, or communication in interstate commerce or by use of the mails, directly or indirectly:
(a) employed devices, schemes or artifices to defraud; (b) obtained money or property by means of
untrue statements of material facts, or omissions to state material facts necessary in order to make the
statements made, in light of the circumstances under which they were made, not misleading; and/or
(c) engaged in transactions, practices or courses of business which operated or would operate as a
fraud or deceit upon the purchaser…By engaging in the foregoing conduct, defendants violated, and
unless enjoined will continue to violate, Section 17(a) of the Securities Act.”).
65
Section 20(b) of the ’34 Act “broadly prohibits violating federal securities law through the means of
another person.” William D. Roth, The Role of Section 20(b) in Securities Litigation, Harvard Bus.
Law Rev. Online (Dec. 9, 2015), http://www.hblr.org/2015/12/the-role-of-section-20b-in-securities-
litigation/. Complaint ¶¶ 232-234, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J.,
filed August 10, 2015) (“By engaging in the foregoing conduct, the trader defendants violated Section
10(b) of the Exchange Act [15 U.S.C. § 78j(b)] and Rule lOb-5 [17 C.F.R. § 240.10b-5], thereunder
through or by means of the hacker defendants. By engaging in the foregoing conduct, pursuant to
Section 20(b) of the Exchange Act [15 U.S.C. § 78t(b)], defendants, except Ieremenko and
As with the criminal case, Rule 10b-5 plays a starring—and indeed central—role
here, as several of the other charges effectively “bootstrap” to the 10b-5 allegations.
Note, however, that CFAA claims are wholly absent in the SEC’s complaint (since
CFAA enforcement is not part of the Commission’s regulatory mandate).
Several of the SEC’s parallel cases remain pending as of this writing, and it
appears most have been stayed pending the resolution of remaining criminal
actions. 67 That said, at least two opinions have already emanated from the civil
actions, both relevant to our inquiry here. First, shortly after the SEC complaint was
filed, the District Court in New Jersey entered a temporary restraining order freezing
defendants’ assets and an order to show cause why a preliminary injunction should
not enter.68 A subset of the Dubovoy Traders (the “Amaryan Defendants”) appealed
this order. 69 On October 16, 2015, the court issued an opinion (the “Amaryan
Opinion”) granting the SEC’s motion for a preliminary injunction because it had
“raise[d] a strong inference that the Amaryan Defendants violated federal securities
laws . . . .” 70 On February 12, 2016, hedge fund Memelland Investments Ltd.
(“Memelland”), another of the Dubovoy Traders, filed a motion to dismiss under
FRCP 12(b)(6). On September 29, 2016, the court issued a second opinion (the
“Memelland Opinion”) denying Memelland’s motion because “the SEC particularly
pled its fraud and aiding and abetting claims,” giving rise to a strong inference that
Memelland acted with scienter to “deceive, manipulate or defraud.”71 As of February
2018, the Amaryan and Memelland Opinions appear to be the only two opinions
released in this matter, though the SEC has reached settlements with several of the
Dubovoy Traders.72
Turchynov, violated, an unless enjoined will continue to violate Section 10(b) of the Exchange Act
[15 U.S.C. § 78j(b)] and Rule 1 Ob-5 [17 C.F .R. § 240.1 Ob-5], thereunder.”).
66
Complaint ¶¶ 228-231, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed
August 10, 2015) (“Through their illicit trading, payments to the hacker defendants, instruction about
which releases to obtain, and other means alleged in this Complaint, the trader defendants knowingly
provided substantial assistance to, and thereby aided and abetted~ the hacker defendants in connection
with the hacker defendants' violations of the securities laws. By engaging in the foregoing conduct,
pursuant to Section 15(b) of the Securities Act and Section 20(e) of the Exchange Act, defendants,
except Ieremenko and Turchynov, violated, an unless enjoined will continue to violate Section 17(a)
of the Securities Act [15 U.S.C. § 77q(a)] and Section 10(b) of the Exchange Act [15 U.S.C. § 78j(b)]
and Rule 10b-5 [17 C.F.R. § 240.10b-5], thereunder.”)
67
John Reed Stark, Think the SEC EDGAR Data Breach Involved Insider Trading? Think Again.,
D&O DIARY (Oct. 2, 2017), https://www.dandodiary.com/2017/10/articles/cyber-liability/guest-post-
think-sec-edgar-data-breach-involved-insider-trading-think/.
68
SEC v. Dubovoy, No. CV 15-6076, 2016 WL 5745099, at *2 (D.N.J. Sept. 29, 2016).
69
Id.
70
SEC v. Dubovoy, No. CV 15-6076, 2015 WL 6122261, at *4 (D.N.J. Oct. 16, 2015).
71
SEC v. Dubovoy, No. CV 15-6076, 2016 WL 5745099, at *1, 5 (D.N.J. Sept. 29, 2016).
72
SEC, Trader Agrees to Settle Claims Relating to Hacked News Release Scheme; SEC's Recovery to
Date in Connection with the Scheme Exceeds $52 Million, Litigation Release No. 23530 (May 4,
2016), https://www.sec.gov/litigation/litreleases/2016/lr23530.htm (For example, “Without admitting
or denying the allegations in the SEC's complaint, Makarov agreed to be permanently enjoined from
violating Section 10(b) of the Securities Exchange Act of 1934 and Rule 10b-5 thereunder and
Section 17(a) of the Securities Act of 1933 and pay disgorgement of $100,000.”).
But what about the underlying merit of the securities fraud allegation
(whether criminal or civil)? Here, things become surprisingly opaque. The familiar
10b-5 claim for securities fraud charges turns on the showing—in connection with
the purchase or sale of any security—of the use a device, scheme, or artifice to
defraud; an act, practice, or course of business which operates or would operate as a
fraud or deceit; or, the making of any untrue statement (and in certain cases,
omission) of a material fact. 73 As noted above, Rule 10b-5 is extremely general,
covering both conventional fraud and “insider trading” claims; and both are at least
theoretically in play in the case of informed cyber-trading. At the same time, both
prove to be awkward fits in many plausible factual scenarios.
The offense of “insider trading” is not explicitly codified in Rule 10b-5, but
instead emerged as a judicial construction of the Rule that effectively equates an
informed trader’s silence (in appropriate circumstances) with an affirmative
misstatement of material fact. In this respect, the doctrine is a bit of catch-all,
broadening the application of the Rule beyond a strict construction of its text. 74
Nevertheless, even when read in this broad fashion, insider trading has time-honored
boundaries that make it a difficult fit, even in Scenario I.
There are two predominant pathways to prove insider trading under Rule
10b-5, frequently referred to as the “classical” and “misappropriation” theories. The
classical theory—developed first—teaches that “a corporate insider 75 (with a
fiduciary duty to the corporation’s shareholders) may not trade in the securities of his
or her corporation on the basis of material information not generally known to the
investing public, and which, if made public, would substantially affect the judgment
of a reasonable investor.” 76 The classical theory was easily expanded to cover
73
The specific text of Rule 10b-5 reads as follows:
It shall be unlawful for any person, directly or indirectly, by the use of any means
or instrumentality of interstate commerce, or of the mails or of any facility of
any national securities exchange,
(a) To employ any device, scheme, or artifice to defraud,
(b) To make any untrue statement of a material fact or to omit to state
a material fact necessary in order to make the statements made, in the light
of the circumstances under which they were made, not misleading, or
(c) To engage in any act, practice, or course of business which operates or
would operate as a fraud or deceit upon any person, in connection with the
purchase or sale of any security.”
17 C.F.R. § 240.10b–5.
74
Stark, supra note __.This judicial construction has a long pedigree: the U.S. Supreme Court held in
Superintendent v. Bankers Life that the antifraud provisions should be applied broadly, such that
“Rule 10b-5 prohibit[s] all fraudulent schemes in connection with the purchase or sale of securities,
whether the artifices employed involve a garden type variety of fraud, or present a unique form of
deception.” Superintendent of Ins. of State of N. Y. v. Bankers Life & Cas. Co., 404 U.S. 6, 10 n.7
(1971); Robert Steinbuch, Mere Thieves, 67 MD. L. REV. 570, 574 (2008).
75
These include statutory insiders under Section 16A, as well as certain “constructive” insiders who
are in a relationship of trust and confidence with the issuer. See Dirks, at note 14.
76
Hagar Cohen, Cracking Hacking: Expanding Insider Trading Liability in the Digital Age, 17 Sw. J.
Int'l L. 259, 265 (2011). See generally Chiarella v. United States, 445 U.S. 222 (1980).
“tippee” outsiders who receive MNPI from “tipper” insiders (who themselves
receive a personal benefit from tipping) and trade with knowledge (actual or
reasonable) that the insider(s) breached their duties by tipping for personal benefit.77
Misappropriation theory—developed later—further expanded insider trading
liability such that “a person violates Rule 10b-5 when he misappropriates
confidential information for the purpose of securities trading, in breach of a duty
owed to the source of the information, rather than to the shareholders of the [issuing]
corporation.”78 The misappropriation theory thus reached certain types of corporate
outsiders who nonetheless “deal in deception” against a third-party owner of
information by ““pretend[ing] loyalty to the principal while secretly converting the
principal's information for personal gain.”79
Under either classical or misappropriation theory, then, the insider-trading
prohibition has come to be understood to mean that “individuals may not purchase or
sell securities based on knowledge of nonpublic information that they legally
obtained or possessed as a consequence of their employment or similar
circumstances.” 80 That is, the linchpin for deducing whether actionable insider
trading has occurred under the Rule is by “equating a breach of fiduciary or
fiduciary-like duty [toward the information’s rightful owner] with the fraud
requirement.”81
And therein lies the rub: As capacious as insider trading theories have
become, the accepted doctrinal framework squares poorly with the canonical case of
informed cyber-trading (as well as the facts of Dubuvoy), where the hacker and
trader are neither fiduciaries of the target nor of a third party information “owner”.82
Indeed, it is hard to see how Scenario I would trigger any liability under the received
insider trading framework, since no fiduciary relationship is breached when a hacker
targets an unrelated company’s MNPI, and then passes such information in a
coordinated fashion to a trader. Simply (if ironically) pier, “mere thieves” of
MNPI—even those who profit from it through market transactions—are not insiders
according to Rule 10b-5.83
That said, a series of recent cases have experimented with an alternative
application of Rule 10b-5 to informed cyber-trading—one that characterizes the
77
Cohen, supra note 76 at 266-67. See, e.g., Dirks v. SEC, 463 U.S. 646 (1983); Salman v. United
States, 137 S. Ct. 420 (2016). Even after Salman, it remains somewhat unclear what knowledge the
trading tippee(s) must have about the original tipper’s motives.
78
Cohen, supra note 76 at 267. See generally United States v. O'Hagan, 521 U.S. 642 (1997).
79
O'Hagan, 521 U.S. at 653.
80
Id. at 575 (emphasis added).
81
Id.
82
See Stark, supra n. __.
83
Steinbuch, supra note 74 at 589 (“Conventional wisdom had held that mere thieves cannot be liable
for trading on stolen confidential information because they lack a fiduciary relationship to the source
of the information and, therefore, do not deceive that source”).
conduct not strictly as a species of insider trading per se, but rather as a hybrid with
conventional securities fraud, in which the cyber-traders make use of a “deceptive
device” in relation to securities transactions. Because it leans on a conventional
fraud claim, this extension dispenses with the burden of demonstrating the breach (or
even the existence) of any fiduciary relationship. That said, it is a “[f]ar more
complex and challenging” theory of liability for government regulators to pursue.84
Under several accountings, the government’s theory represents a new paradigm of
unlawful “outsider trading” under Rule 10b-5 to reach “a third and new category of
securities miscreant — ‘outsiders’ — who do not work for (or with) the company,
and who do not owe a duty to anyone.”85 This new category aims to capture trading
on the basis of MNPI obtained via computer hacking in situations (like Scenario I),
lacking the fiduciary relationship required by insider trading law, but still reflecting
the requisite degree of deception. Should courts prove receptive to this theory, it
could certainly represent a bona fide threat of securities fraud exposure against a
trader in Scenario I who coordinates with a hacker to detect / trade on stolen data.
But what would a new theory of outsider trading look like? While still in
nascent stages of development, the SEC has advanced the idea that cyber-trading
“outsiders” can nonetheless be culpable under 10b-5 when, as part of the hack, they
“are masquerading as company insiders….”86 In other words, under this theory, the
deception element mandated by Rule 10b-5 relates “directly to the hacking or
unauthorized computer access and is a bit more attenuated from the securities
transaction.”87 Note that coordination between the hacker and trader envisaged by
Scenario I (in the form of a common plan, scheme, or transaction) appears to be
critical to this theory as well; for without such coordinated efforts (i.e., the hacker
and trader act independently), it would be difficult to say that the deceptive hack was
also “in connection with the purchase or sale of any security” requirement, another
critical requirement of Rule 10b-5.
The emerging theory of outsider trading bears a strong resemblance to
Donald Langevoort’s development of the idea of “intentional deception” should
serve as a trigger of fraud liability, arguing that “[s]o long as an element of
intentional deception was present in the action, the resulting trading would seem to
satisfy the ‘in connection with’ requirement and lead to liability under Rule 10b-5.”88
84
Id.
85
Stark, supra note __.
86
Id.
87
Id.
88
Donald C. Langevoort, Insider Trading Regulation, Enforcement, and Prevention § 6:14. See also
United States v. Falcone, 257 F.3d 226, 233–34 (2d Cir. 2001) (“O'Hagan 's [sic] requirement that the
misappropriated information ‘ordinarily’ be valuable due to ‘its utility in securities trading,’…appears
to be a more generally applicable factor in determining whether section 10(b)'s ‘in connection with”
requirement is satisfied. That requirement is met in a case where, as here, the misappropriated
information is a magazine column that has a known effect on the prices of the securities of the
companies it discusses.”)
89
Id.
90
See e.g., SEC v. Lemus, Havel & Viiseman, et al. (2005), SEC v. Blue Bottle (2007), and SEC v.
Stummer (2008), which were never contested in court. Stark, supra note 82.
91
SEC v. Dorozhko, 574 F.3d 42, 43, 44 (2d Cir. 2009).
92
SEC v. Dorozhko, 574 F.3d 42, 43, 44 (2d Cir. 2009).
93
Id. at 44.
94
Id. at 45.
95
Id. at 43, 51.
96
Id. at 45.
97
Id. at 49.
98
Id. at 48, 49.
dealings not to mislead” is “a distinct species of fraud,” the Second Circuit held that
he could be liable under the antifraud rules despite the absence of a fiduciary
relationship.99
Having made the general point that a fiduciary relationship is not necessarily
required under Section 10(b), the Second Circuit remanded the case to decide the
fact-specific question of “whether the computer hacking in this case…as opposed to
computer hacking in general…involved a fraudulent misrepresentation that was
‘deceptive’ within the ordinary meaning of Section 10(b)”. 100 In doing so, the Court
gave guidance regarding the ordinary meaning of “deceptive,” which “covers a wide
spectrum of conduct involving cheating or trading in falsehoods” and “irreducibly
entails some act that gives the victim a false impression.” 101 The Court infused
ambiguity into its (otherwise clear) opinion by stating, “In our view, misrepresenting
one’s identity in order to gain access to information that is otherwise off limits, and
then stealing that information is plainly ‘deceptive’ within the ordinary meaning of
the word. It is unclear, however, that exploiting a weakness in an electronic code to
gain unauthorized access is ‘deceptive,’ rather than being mere theft.”102 Thus, the
Second Circuit asked the District Court to take a deeper dive into “how the hacker
gained access” in order to determine whether the actions constituted “a ‘deceptive
device or contrivance’ that is prohibited by Section 10(b) and Rule 10b– 5.” 103
Unfortunately (at least for us), Second Circuit panel’s invitation in Dorozhko was
never formally taken up by the District Court on remand: Dorozhko’s attorney lost
touch with his client and the trial court later granted summary judgment for the SEC.
104
99
Id. at 49.
100
Id. at 51.
101
Id. at 50.
102
Id. at 51 (emphasis added).
103
Id.
104
Stark, supra note 82.
105
Id.
106
Id.
107
Complaint ¶ 71, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed August 10,
2015). Stark, supra note 82.
108
Complaint ¶ 84, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed August 10,
2015) (“The Dubovoy Group defendants attempted to conceal the illegal payments by sending them
from Tanigold Assets, one of Arkadiy Dubovoy's companies, and mislabeling them as payments for
‘technological equipment’ and ‘building equipment.’”).
109
Complaint ¶ 91, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed August 10,
2015) (“The Dubovoy Group defendants tried to conceal their fraud by deceptively spreading their
illicit trading across numerous accounts at more than 10 brokerage firms in the names of various
individuals and entities. Through this strategy, they hoped to avoid detection by brokers, regulators,
and law enforcement.”).
110
Complaint ¶ 85, SEC v. Dubovoy, et al., No. 2:15-cv-06076-MCA-MAH (D.N.J., filed August 10,
2015) (“Pavel Dubovoy provided instructions, which informed the reader how to log in to the server
and download files and advised users to conceal the identity of the computer they used to access the
server.”).
111
See, e.g., SEC v. Dubovoy, No. CV 15-6076, 2016 WL 5745099, at *4, 5 (D.N.J. Sept. 29, 2016)
(Suggesting that: (i) “The scheme alleged in the Amended Complaint is a complex one, involving a
number of individuals, entities, and straw owners who worked together to perpetrate a complex, high-
tech fraud.”; (ii )“These circumstances also support a strong inference that Memelland acted with
scienter,” where “’[s]cienter is a mental state embracing intent to deceive, manipulate or defraud, and
can be established by showing recklessness.”; and (iii) “Memelland's sophistication, the temporal
proximity of its trades to the publication of the press releases, the similarity of its trading pattern to
other Trader Defendants with conspicuous ties to the Hacker Defendants, its shared IP channels with
the Dubovoy Group, and the fact that the stolen press releases contained financial information that
had not yet been reported in the news all strongly support an inference that Memelland intended to
participate in the fraud.”
securities laws.”112 And, even more recently, the SEC obtained a default judgment
against several trading defendants on highly similar facts. In SEC v Iat Hong, et al.,
several traders were charged with hacking into a law firm (by installing malware and
compromising accounts that enabled access to law firm email accounts) and
fraudulently trading on MNPI. In the default judgment, the judge concluded that the
evidence “sufficiently demonstrates that Defendants directly, indirectly, or through
or by means of others, hacked into the nonpublic networks of two New York-
headquartered law firms and stole, through deception, confidential information
covering several publicly-traded companies” and then “reaped illegal profits by
trading on the stolen [MNPI]” in violation of Sections 10(b) and 20(b) of the ’34 Act
and Rule 10b-5 thereunder, among other securities laws.113 While this was a default
judgment rather than a litigated case, the SEC no doubt welcomes the judge’s
description of this hacking as deceptive.
Notwithstanding its evident traction in judicial opinions, outsider-trading
theory has attracted a chorus of critics decrying its many alleged infirmities. Many of
them have been wary of a significant expansion of insider trading based an
amorphous concept of “deception,” and have instead argued that misappropriation
theory can capture many of the most concerning hacker-trader conspiracies. 114
Others have lodged even stronger opposition to the concept of liability for outsiders
under the antifraud provisions, arguing that the new theory opens an unwieldy and
unnecessary Pandora ’s Box. 115 Andrew Vollmer, for example, has argued that
“[t]he government had the ability to charge one or more reasonable and appropriate
crimes against the hacker and trader defendants but reached out too far to include
securities fraud.” 116 And, even sympathetic judicial opinions (such as Dorozhko)
have held that computer hackers do not typically commit insider trading, and do so
only if they employ deception in their hack and such deception ultimately gives rise
to trading. When either is absent, a hacker’s actions are too far removed from the
trading to be considered “in connection with” the purchase or sale of securities. 117
Backing up to the broader perspective, the overall “fit” of securities fraud law
to informed cyber-trading appears far from perfect. It is all but obvious that
conventional insider trading models (classical and misappropriation) are ill-equipped
to deal with cyber-traders. By requiring a fiduciary-like relationship with either the
112
SEC v. Dubovoy, No. CV 15-6076, 2015 WL 6122261, at *4 (D.N.J. Oct. 16, 2015).
113
Default Judgment ¶ 11, SEC v. Hong et al., No. 16-cv-9947 (S.D.N.Y. filed May 5, 2017),
https://regmedia.co.uk/2017/05/10/china_sec.pdf.
114
Steinbuch, supra note 74 at 594-95 (“O'Hagan and its progeny should not be read as requiring a
fiduciary relationship under the misappropriation theory. Both the underlying purpose of the
misappropriation theory and courts' interpretation of it demonstrate that the theory encompasses the
acts of nonfiduciaries.”).
115
Vollmer, supra note 47 (“The recent computer hacking cases are important because they create
dangers from over-zealous pursuit of securities law violations…Some bad acts are not securities
fraud.”).
116
Id.
117
Id.
by/for the federal government, (ii) by/for a financial institution, or (iii) in or affecting
interstate commerce.122 These categories have been interpreted broadly: for example,
courts have read the “interstate commerce” flag to be triggered by the use of any
computer connected to the Internet—regardless of whether located inside or outside
the United States—as affecting interstate commerce.123
The elements of the CFAA that concern “authorization” tend to subdivide
defendants into two groups. “Outsiders”—third parties with no affiliation with the
target and enjoying no authorization to access the protected content; and
“Insiders”—parties (such as employees, customers, and contractors) who, pursuant
to some relationship with the target, have (or previously had) some limited
authorization to access data, but transgressed that authorization on the date of the
breach. Interestingly, the Act tends to treat insiders who exceed their authorization
with some degree of deference, requiring actual intent by the insider to damage the
computer for liability to follow. Outsiders are subject to less accommodation, and
may be found liable for intentional, reckless or other damage caused by their digital
trespass.124 In recent years, moreover, some courts have been willing to “convert”
insiders into outsiders—stripping them of their more protected status—when the
insider breaches its duty of loyalty to the target (such as when the insider pursues
interests antithetical to the interests of the target).125
The CFAA insider/outsider distinction—particularly as augmented by the
aforementioned fiduciary breach conversion—stands in stark contrast with insider
trading doctrine under Rule 10b-5 (as discussed above 126 ). There, the liability
standard aggressively envelops insiders who breach a fiduciary duty to access data,
while developing alligator arms vis-à-vis outsiders, even under the nascent “outsider
trading” theory (which still hinges awkwardly on deception by the hacker). Thus, at
122
18 U.S.C. § 1030(e)(2).
123
See, e.g., US v. Drew, 259 F.R.D. 449, 457 (C.D. Cal. 2009) (“[T]he latter two elements of the
section 1030(a)(2)(C) crime [obtaining information from a protected computer] will always be met
when an individual using a computer contacts or communicates with an Internet website.”); US v.
Trotter, 478 F.3d 918, 921 (8th Cir. 2007) (“No additional interstate nexus is required when
instrumentalities or channels of interstate commerce are regulated”); Paradigm Alliance, Inc. v.
Celeritas Technologies, LLC, 248 F.R.D. 598, 602 (D. Kan. 2008) (“As a practical matter, a computer
providing a ‘web-based’ application accessible through the internet would satisfy the ‘interstate
communication’ requirement.”); 18 U.S.C. § 1030(e)(2)(B) (2001) (amending the CFAA to include
Internet-connected computers outside the US).
124
US v. Phillips, 477 F.3d 215, 219 (5th Cir. 2007) (discussing legislative history).
125
See, e.g., Int’l Airport Ctrs., LLC v. Citrin, 440 F.3d 418, 420-21 (7th Cir. 2006); Shurgard Storage
Ctrs., Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121, 1125 (W.D. Wash. 2000); Ervin &
Smith Advertising and Public Relations, Inc. v. Ervin, 2009 WL 249998 (D. Neb. 2009); ViChip
Corp. v. Lee, 438 F. Supp. 2d 1087, 1100 (N.D. Cal. 2006) (same); NCMIC Finance Corp. v. Artino,
638 F. Supp. 2d 1042, 1057 (S.D. Iowa 2009) (“[T]he determinative question is whether Artino
breached his duty of loyalty to NCMIC when Artino obtained information from NCMIC’s
computers.”).
126
See TAN __-__, supra.
least on this critical dimension, the CFAA seems to be a better “fit” for addressing
informed cyber-trading.
On the other hand, CFAA liability is far clunkier than securities law in
engaging other facets of the policy challenge, such as the degree of coordination
between the hacker and trader (the rows of Table 11). Recall that securities fraud
exposure tends to “scale down” when the hacker and trader are completely
independent from one another, since the deceptive hack is remote from and thus
arguably not “in connection with” the purchase and sale of securities. This
retrenchment seems normatively justified, since the lack of coordination
substantially reduces the danger that cyber-trading activity subsidizes hacking and
defensive activity. Under the CFAA, in contrast, the relevance of coordinated
activity fades. Although a trader who operates independent of the hacker can
probably avoid CFAA liability, the hacker’s exposure appears not to change.
A second area of misfit concerns the civil provisions of the CFAA, and in
particular the measure of damages available to private parties. Although the Act
provides civil remedies (both injunctive and in damages) for persons injured by
unauthorized access or computer fraud, the level of monetary damages available has
historically been quite limited. Under the Act, monetary relief is explicitly limited to
economic damages.127 Moreover, most courts interpreting the statute have measured
economic damages against the Act’s definition of a “loss,” which equates to “any
reasonable cost to any victim, including the cost of responding to an offense,
conducting a damage assessment, and restoring the data, program, system, or
information to its condition prior to the offense, and any revenue lost, cost incurred,
or other consequential damages incurred because of interruption of service.”128 An
obvious limitation to this provision is that the consequential damages (including
stock price fall) associated with the breach must be related to an interruption of
service. In cases where a data breach simply results in the unauthorized access or
downloading of data with no “service interruption,” such consequential losses may
well be unavailable. 129 In the absence of significant broadening of this
interpretation, it seems unlikely that private parties will tend pursue civil CFAA
127
18 U.S.C. § 1030(g).
128
18 U.S.C. § 1030(e)(11).
129
John DiGiacomo, Civil Actions Under the Computer Fraud and Abuse Act, Revision Legal (Feb.
4, 2015), https://revisionlegal.com/internet-lawyer/civil-actions-computer-fraud-abuse-act/#_ftnref23.
See also Nexans Wires S.A. v. Sark-USA, Inc., 166 F. App'x 559, 562–63 (2nd Cir. 2006) (holding
that plaintiff’s claim for lost revenue due to defendant’s misappropriation of its confidential data did
not constitute a cognizable loss under the CFAA “[b]ecause it is undisputed that no interruption of
service occurred in this case”). But c.f. EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577, 585
(1st Cir. 2001) (observing that—in an “increasingly electronic world”—the CFAA covers more than
just the cost of physical damage and may also include “the value to the victim of what has been stolen
and the victim’s costs in shoring up its security features”). In contrast, private actions under securities
law generally give a plaintiff (here target stockholders who traded during the fraud) a full measure of
loss, which—given the nature of the transaction—tends to coincides with the informed trader’s gain
from the trade.
litigation vigorously against informed cyber-traders; most of the work will be left to
criminal enforcement.
This last observation raises a final shortcoming of CFAA liability: the
relative absence of regulatory expertise for the DOJ to draw upon in pursuing CFAA
claims against informed cyber-traders. As noted above,130 federal prosecutors have
long enjoyed a secret weapon in their securities fraud prosecutions (including insider
trading): a sophisticated and motivated regulator in the SEC, possessing an ample
budget, years of expertise, and well-trained staff and attorneys capable of unpacking
often dense and complicated transactions. Indeed, the SEC and DOJ actively tout
their cooperation and the latter’s reliance on the former’s expertise in many
complicated fraud prosecutions. CFAA claims, in contrast, are outside of the SEC’s
remit and do not come with a built-in regulator to assist with uncovering the key
facts.
Synopsis
Given the discussion above, the battle of the bands between Rule 10b-5 and
the CFAA as a legal theory for pursuing informed cyber-traders evidently yields no
clear-cut victor. On the one hand, the CFAA is far more flexible and less statutorily
ossified than Rule 10b-5—where fiduciary-duty/deception requirements severely
hamper and distort enforcement. That said, the CFAA appears less able to tailor itself
to coordinated hacker-trader schemes; it has stingy civil damages provisions; and it
has no built-in regulator to lend expertise to criminal prosecutors in investigating and
pursuing claims.
In short, both approaches fall short, and it appears that neither lends itself to
an obvious and simple fix. Certain forms of tinkering around the edges might be
possible, of course. Proponents of “outsider trading” theory, for example, may
attempt to push for an even more capacious definition of deceptive—one that
includes (say) willful and deliberate access to data that the hacker knows or has
reason to know is unauthorized (“digital trespassing”). Given the tenuous state of
flux that outsider-trading theory finds itself in, however, this strategy carries obvious
risks. Alternatively, proponents of SCAA enforcement might push courts to expand
their construction of consequential damages, granting private claimants greater
license to recover economic losses (including those capitalized through lower equity
prices). Here too, however, the statutory definitions in the SCAA (e.g., defining
“loss”) make such a construction a heavy lift in the absence of statutory amendment.
To the extent that one considers systematic statutory reform, it will also be
necessary to remain mindful of the fact that information trading is a complex
normative landscape. Simply because there are idiosyncratic dangers associated with
informed cyber-trading, it does not follow that all such trading is bad. As with any
130
See White, supra note ___.
other type of informed trading, cyber-trading can convey information through price,
not only to market participants but also to the targets of hacking themselves. Any
substantive reform to either securities law or the CFAA must remain mindful of this
tension. One intriguing possibility—which we develop in a technical companion to
this paper 131 —would broadly prohibit informed cyber-trading (along the CFAA
model), but would simultaneously exempt initial arbitrage “allowance” (e.g., a
monetary cap or a fraction of the firm’s economic heft) shielded from both criminal
fines and civil recovery. This allowance would serve as a type of “bounty” for
bringing the information to light. Once the exemption level is met, however, the
trader would be required to adhere to a “disclose or abstain” duty, refraining from
trading on the information until it has disclosed the information to the targeted issuer
and the market. If the size of the exemption is calibrated reasonably, this alternative
approach would have the benefits of (a) preserving price discovery (at least within
the limits of the exemption); (b) preserving limited incentives to uncover information
about vulnerability; and (c) catalyzing communication to the issuer about the nature
of the vulnerability, so as to streamline both hacker’s offensive efforts and the
issuer’s precautionary measures. Although we see much to commend this
prescriptive course from an economic policy perspective, we confess that it would be
a difficult change to effect under current law (in the absence of a statutory reform).132
Short of such systematic statutory reforms, however, perhaps the most
expedient strategy would be to continue some version of the status quo, where the
DOJ has nominal authority to bring enforcement actions under either 10b-5 or
SCAA, but can enlist the SEC’s investigatory assistance to help develop and focus
its claims. No doubt some investigations will prove to come up dry in uncovering
actionable securities fraud claims; but such cases will usually not announce
themselves ex ante, effectively rationalizing the SEC’s coordinated involvement (at
least early on). Where a securities fraud claim proves viable (such as in an “outsider
trading” case involving hacker deception), the SEC and DOJ can continue to pursue
a strategy much like today. Where it does not, the SEC will have to back away,
leaving the government to pursue a criminal SCAA claim should it choose, but with
the benefit in hindsight of the SEC’s factual investigation to assist them.
131
See Mitts & Talley, supra note __.
132
Difficult, but perhaps not impossible. The requirement of deception could be met by equating
cooperation between hackers and traders as deceptive; and, much of the damages jurisprudence in
insider-trading law is (and always has been) the product of precedential evolution. Our analysis
excludes the possibility of common law tort claims against an informed cyber-trader, since such
claims would have a difficulty establishing a duty by either the hacker or trader, and may well be
preempted by federal securities law anyway.
5. Conclusion
In this paper, we have considered the phenomenon of informed cyber-
hacking, whereby market arbitrageurs learn of material, yet-to-be-disclosed
cybersecurity breaches, executing trades in advance of the public disclosure. We
have demonstrated empirically that such practices appear manifest in the derivatives
market trading, where breach-disclosing firms appear to have significantly larger
open interest and trading volume in put options (relative to a variety of control
groups) in advance of the disclosure. Our results, moreover, are robust to a variety
of alternative specifications and identification strategies. We have also argued that
such market activity raises certain idiosyncratic normative concerns, potentially
justifying more capacious exposure to liability for hacker/traders in response to such
concerns. Under current law, however, it seems unlikely that such an expansion is
possible without a substantial legal and statutory reform. Recent endeavors to
expand insider trading to outsiders (including hacker-traders) who use deception to
breach a firm’s cybersecurity system may be warranted, though not a perfect fit for
the policy concerns in play. Similarly, liability under the CFAA—while not requiring
deception or fraud—still suffer from deficits in investigatory expertise, monetary
damages provisions, and appropriate tailoring for securities market harms. In the
short term, it will likely prove difficult to nudge doctrine in a way that does not run
the risk of being severely over- or under-inclusive. In the absence of a more
systematic reform (which could be years away at best), the current status quo
(including a more developed and mature doctrine of outsider trading) may be the
most expedient—even if flawed—response to informed cyber-trading.