Hacking back across third partysystems is more self help than self defense (rarely is the command and control computer linked directly to the system being attacked).
The communications path of an attack can be convoluted and involve numerous parties, such as ISPs, telephone companies, and third partysystems used as proxies by the attacker.
This patent-pending feature makes it possible for the first time to stay in sync with specific people without having to sync every personal contact with cumbersome, third-party systems.