Student Charged With Three Felonies For Finding Security Flaw — and Report 547
Well, yet another teenage hacker who "did the right thing" by reporting a security flaw is being punished for his actions. Although it definitely sounds like the whole story may not be in the clear yet, a 15-year-old New York high school student has been charged with three felonies claiming that he accessed a file containing social security numbers, driver's license numbers, and home addresses of past and present employees ... and then sent an anonymous email to the principal alerting him to the security flaw. "All that was needed to access the information was a district password. School officials have admitted that thousands of students, faculty and employees could have accessed the same file for up to two weeks."
Improper disclosure? (Score:5, Insightful)
Was there any bit of responsible disclosure, because it sounds a bit like "killing the messenger". While there may be discipline in order, this seems to be overkill if he was really intending to do the right thing.
Re:Improper disclosure? (Score:5, Insightful)
I guess part of me wants to know how he found out. If he found out by accident, then yeah, this is a case of "No good deed goes unpunished"....but if he was looking around for something to hack and found more than he was expecting, then there should be some punishment (though probably not three felony charges).....
Layne
Re:Improper disclosure? (Score:5, Insightful)
Even if he was looking for something to hack, he didn't do any damage. Instead, he performed a public service. Punishing a person for something he maybe was wanting to do is just stupid.
On the other hand, if he didn't phrase his message carefully, it could have been taken as a threat. If he said something along the lines of "Please use a more secure password on $SERVER -- I guessed it easily", then it's hard to sympathize with the administration. If he said "I accessed your server and now have the social security numbers for every faculty member", then it's much more ambiguous, and I'd expect the student to be investigated. Just investigated, not arrested.
Re:Improper disclosure? (Score:5, Informative)
Opening a closed but not locked door and entering a building without permission is still against the law. It is called breaking and entering.
He is not being punished for "wanting to do" something, he has not been punished for anything yet. He has been charged with a crime for something he did, namely "computer trespass" for accessing a system without permission.
Re:Improper disclosure? (Score:5, Interesting)
Opening a closed but not locked door and entering a building without permission is still against the law. It is called breaking and entering.
IANAL, and I'm just guessing, but wouldn't that be tresspassing? I mean, if you're breaking and entering, I would assume that requires the breaking of something, right?
He has been charged with a crime for something he did, namely "computer trespass" for accessing a system without permission.
There you go.
I would also like to know more about the circumstances. I don't think curiosity should be a crime, and I do think there should be a much more rigid definition of what constitutes "unauthorized access" -- in particular, I think the burden should be to show that the access was, in fact, unauthorized, rather than requiring everyone to keep a clear record of authorization from every site we've ever accessed.
Having read TFA, it looks very much like, by any technological definition, he was authorized. There would have to be pretty clear indications that he wasn't supposed to be there.
And even if he was entirely at fault, this is also entirely the wrong way to go about it. The lesson to be learned here, from any other student who's paying attention, is simply to not tell anyone what you know.
Re:Improper disclosure? (Score:4, Informative)
Your analogy is flawed. Seeing that the elder's fly is open would be equivalent to somebody telling you the password. Logging in and poking around is like seeing the open fly and reaching in to see what you can find on the other side.
Simple rules, kids. If it's not yours, stay out. Most people have enough common sense to know that if my door isn't locked, or is even open, that does not constitute an invitation to come in. If discovered, you may be yelled at, soundly beaten, or arrested. Computer systems are the same way. If you access one against the wishes of the owner, they're going to be pissed and will do mean things to you for a multitude of fairly good reasons.
Re: (Score:3, Funny)
Logging in and poking around is like seeing the open fly and reaching in to see what you can find on the other side.
Maybe we should just stick to car analogies. This one is starting to become quite weirdly uncomfortable.
Re:Improper disclosure? (Score:5, Insightful)
I hate this line of "reasoning." Entering a computer network is not the same as entering a house or other physical place. Since the beginning of the internet, systems have been presumed open. Only after more and more time has gone by, is this idea changing. Hell, most systems at the beginning didn't even have passwords. And they were considered open. Now all of a sudden, because manufacturers are lazy and most users/administrators are ignorant, do we hear people make analogies to physical spaces. Guess what? Networks and computer systems are not physical spaces! They have their own history and organic rule sets that have grown over the last 30+ years.
If anything, a better analogy is to compare systems to stores. Both provide public services and are accessible through public thoroughfares. So, if I leave my store open and unattended, that does not mean you should not come in unless I specifically leave a sign saying "the door is unlocked but don't come in." That's ridiculous. Instead, if you went in, while certainly raising suspicion and probably causing the owner to become irate and the police to investigate you, you haven't done anything wrong or illegal. Same if you have a key to said store and the owner has not asked you to not come in after hours. You haven't done anything illegal. Now, if you're in there looking at unsecured credit card numbers (left out in a file cabinet), you still haven't done anything illegal. You might tell your friend the owner that he might want to be more careful with where he puts others' private information. Still nothing illegal. Only until you take those CC#'s and/or use them fraudulently have you committed a crime.
Re: (Score:3, Insightful)
And apparently the correct punishment is hanging by the neck until dead?
In the RTFA department: No where does it say that he guessed a password or used a stolen password.
And apparently you must not have comprehended what you read. No where does it say that he will be punished by hanging. In fact, he is charged with felonies, but has NOT been convicted or sentenced. So before you fly off the handle, let's see how things go, M'Kay? Chances are that he will get off with a $250 fine and community service. Probably not a bad thing with some kid with too much time on his hands that he goes hacking around in shit he shouldn't be.
Re: (Score:3, Interesting)
A kid with too much time on his hands? Take it easy grandpa! Those damn kids. When i was a kid we had to walk 5 miles uphill in the snow each way to get time on our hands.
By hacking you mean logging into a system with the password they gave you?
Re: (Score:3, Interesting)
The poster above (below?) me with the law.com link is correct. And in case you think it's legalese or unenforced:
I opened a unlocked door once and entered a room I shouldn't have. I got arrested, and was never acquitted of, breaking and entering.
I was also facing felony trespass because they thought I was intending to commit a crime (I clearly wasn't). When pressed, they said the crime was trespassing. So, trespassing with intent to trespass. Thankfully, my lawyer was competent and the charge was dropped
Re:Improper disclosure? (Score:4, Interesting)
Am I the only one who finds this crazy? Are we to go around scared of opening doors? Is there any implied consent (i.e. should I call up the gas station attendant to open their store door so I'm not B&E when I go in to pay the bill?)
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
Your belief is irrelevant. What matters is what the law actually defines as breaking and entering.
breaking and entering [law.com]
n. 1) the criminal act of entering a residence or other enclosed property through the slightest amount of force (even pushing open a door), without authorization. If there is intent to commit a crime, this is burglary. If there is no such intent, the breaking and entering alone is probably at least illegal trespass, which is a misdemeanor crime. 2) the criminal charge for the above.
No. Havi
Re: (Score:3, Insightful)
There was no physical space involved. The best this could relate to your analogy is that he knocked on the door and told the guy inside the password, asked for a listing of what was inside, asked for a specific item from the list and was handed the item without ever entering the premises.
This is in no way breaking and e
Re: (Score:3, Insightful)
Wow. No, I don't think it's ok to do something because you *can* do something. I do think that it's not wrong to explore a little however... I don't mean wandering into people's houses, but you sound like wandering around a University is stupid and wrong... Browsing the stacks at a library is stupid and wrong. Only go where someone explicitly leads you... What a great life that must be.
Do you never just click around the Internet at random? Check out random links on Wikipedia? I'm not specifically talking ab
Re: (Score:3, Interesting)
The statement still stands that he has been punished
Yes, and hopefully this will teach him a valuable lesson: When you find things like this, you shouldn't be so stupid as to report them to the people who might be able to fix the problem. You should keep the information to yourself, until you find someone who is willing to pay you for the information. Then, instead of giving your knowledge away for free like a fool, you are acting like a true entrepreneur and looking for ways to profit from your hard-ear
Re:Improper disclosure? (Score:4, Insightful)
"copied" the files... (Score:5, Insightful)
In discussions like this, it might merely mean that the kid accessed a protected area by accident, and his web browser "copied the file to his computer". Law Enforcement sometimes misuses the mere presence of data on the suspect's computer as the standard for proof of guilt, which is sometimes only the browser cache or even the cache for a filesharing program, when the user may not even know what the heck was in it.
The file name undoubtedly was not "click here to get 3 felony charges file against you and seriously fuck up the rest of your life" . The kid appears to have been doing the right thing. Now, if he tried to sell any of the data that he saw, sure, charges might be appropriate. Based on what little public information is available, this appears to be a case of shooting the messenger.
Re:Improper disclosure? (Score:5, Insightful)
He copied people's private info to his personal computer. Who knows where it could end up from there?
Yes, and who knows where it might end up being accessible to "thousands of students, faculty and employees" if nobody ever reported the problem?
Fair enough, the law is the law. If you use someone else's password you've accessed a system in an unauthorized manner whether you copy a file or not. In fact if there is any doubt that you *were* authorized to use that password then you could argue whoever made the file accessible inherently granted you authorization to access it. But let's have some common sense here: by shooting the messenger they're essentially making fear/obscurity their main security measure, and that's exactly what landed them in this situation in the first place.
Does anyone know if the school is facing charges or a suit for breaking data protection laws btw?
Re:"Using someone else's password" (Score:5, Insightful)
What, exactly, do they mean by that? Remember, we're talking about governmental entities that have a long history of not understanding much about computer security. For example:
$ ftp ftp.myschool.edu
Connected to ftp.myschool.edu
User (none): guest
331 Enter email address for anonymous login password
Password: myusername@yahoo.com
230 User guest logged in.
FTP>
Law Enforcement: "Clearly he was trying to impersonate Mr. Guest!"
You: !@#@#$
You think that's too silly? It's no worse than any number of other things I've heard about from such people. Or consider this:
You: "Let's see if that cute girl Angela in my English class has put up a home page on the school computer system. Let's see, use Firefox to browse to www.myschool.edu/~angela/ ... That's odd, doesn't look like what she'd have on her home page. What's this file?"
Cops: "Clearly he was trying to break into the Assistant Principal Angela H's computer work area!"
I don't think these examples are unrepresentative of the typical computer security understanding of law enforcement, unfortunately.
Re:Password use (Score:4, Insightful)
At least a couple of the articles say that the password he used (whatever that means, see my other comments on the subject) belonged to "another student." Oh, really?! Why did that other student have access to the data?! And why isn't he being charged?!
Clearly what we have been told about this incident is highly misleading. Either
(1) The file was in a location that could be accessed by ANYONE on the school network, or
(2) it had already been hacked by another student, who for some reason is not being charged, or
(3) He hacked into an administrative area, where the file may have been inadequately secured. Comments by the administration and law enforcement to the effect that the password he used belonged to another student are either incorrect or misleading.
Something is clearly rotten about this story, unfortunately it is difficult to tell if he did anything wrong or not, or whether he is a criminal or a scapegoat. Not only do we have to get information filtered through the administration and law enforcement (for whom computer security is usually at best an arcane art that they understand only poorly if at all), but all the primary sources are articles written by local news journalists rather than technical journalists, who are generally not much better at understanding the technical details.
It would appear however that unless he needed to hack into a reasonably well protected account in order to obtain the data, the school is clearly facing a serious HIPAA breach. That alone could be making them overreact, by trying to find some way - any way - to pin the blame on someone else.
Re: (Score:3, Informative)
This quote from the news article is especially telling:
All that was needed to access the information was a district password. School officials have admitted that thousands of students, faculty and employees could have accessed the same file for up to two weeks.
"A district password" in this quote sounds a lot like "a student or faculty account" to me. Doesn't sound like any hacking occurred at all.
Re: (Score:3, Interesting)
Depending on the system you're accessing and the facilities available to that type of connection and system, it may not be possible to determine the contents of a file without obtaining a copy.
If I've compromised a password and access a remote system using SSH, I have full control of the facilities available on that system. I can view the contents of files without transferring the files to my own system.
On the other hand, if I'm accessing a remote system via Windows networking, I have few options. I can m
Re:Improper disclosure? (Score:5, Insightful)
So, thousands of people have had access to this file, and the one person who tried to report it (and was tracked down) is being charged with felony counts of computer access and identity theft? And they're not checking to see if anybody else has tried to access this file, to indict them, as well? Definitely seems like a case of shoot the messenger. According to a state trooper interviewed in TFA,
I didn't see anything about him trying to profit, though... He sent an email to the principal (contents unknown), from an anonymous email address, signed 'A Student'. Without more info, I'm inclined to speculate that he didn't really appear to be attempting to profit. (Wouldn't it be better to keep this a secret and profit from the information, if that was really his intent?)
Re:Improper disclosure? (Score:5, Insightful)
I didn't see anything about him trying to profit, though... He sent an email to the principal (contents unknown), from an anonymous email address, signed 'A Student'. Without more info, I'm inclined to speculate that he didn't really appear to be attempting to profit. (Wouldn't it be better to keep this a secret and profit from the information, if that was really his intent?)
All they're doing is making an example out of him. A company did the same thing a few years back with a white hat (Whos name I can't remember, and I can't find my copy of The Art of Deception/Intrustion to look up his name). He produced the error, sent them a paper on it, then they claimed that in the span of 6 months he used their service illegitimately for his own benefit.
I guarantee whoever designed their security infrastructure had their ego shattered by this and in a fit of nerd rage decided to strike back with everything he could.
Re:Improper disclosure? (Score:5, Insightful)
A sniper rifle aimed at the head of the principal and/or prosecutor also works: "Don't try to 'make examples' of good, decent people trying to do the right thing. Else YOU will be made an example of how Liberty-loving people deal with out-of-control Tyrants."
Okay, I joke.
But any politician hearing about this unfair prosecution ought to update the "Good Samaritan Law" so it not only protects people trying to save injured persons, but also protects people trying to help schools/companies by revealing security flaws in their system.
Re:Improper disclosure? (Score:5, Insightful)
But any politician hearing about this unfair prosecution ought to update the "Good Samaritan Law" so it not only protects people trying to save injured persons, but also protects people trying to help schools/companies by revealing security flaws in their system.
That's one of the best ideas I've heard all day. Unfortunately, because politicians are about as dumb as a bag of bricks when it comes to computers, all they'll see is what the media shows them i.e. "Bad hacker got caught!"
Re:Improper disclosure? (Score:5, Insightful)
Using your post as an example:
Let's see here... you could be charged with
- a criminal death threat
- possession with intent (if you own a rifle)
- conspiracy to commit murder (since you discussed with all of us and presumably none of us called the police)
- making a terrorist threat
- material support for terrorism (if you donate to a charity the DA doesn't like)
- and a whole bunch of "minor" crimes.
So... have fun in prison... we'll see you in 150 years or so.
This started out as a "+1 funny"... but now I just feel "-1 WTH is happening to your country?" :-(
When the shoe is on the other foot (Score:3, Interesting)
.
You are the administrator of a system that an alleged "Good Samaritan" has been trying to hack.
The successful hack would, of course, substantially increase your employer's legal and financial exposure.
But - as a fellow geek, and the trusting soul
We need better whistleblower law that don't force (Score:3, Interesting)
We need better whistle blower laws that don't force you to use your own name. Just look at the guy who uncovered voter fraud and got hit with a few felonies.
Re: (Score:3, Insightful)
U.S. Law requires, when a citizen makes a request, that organizations must assign a NEW number separate from their Social security number.
I don't do that myself, but I think maybe I should start, since the SSN makes me vulnerable to identity theft. I would be wise to demand new account numbers that are NOT tied to my SSN from my bank, school, credit company, et cetera. A thief acquiring my SSN now has access to every single account I own. ----- It would be inconvenient, but I should have a different numb
Re:Improper disclosure? (Score:5, Insightful)
Re:Improper disclosure? (Score:5, Insightful)
Anyone who's ever administered a server knows they are probed ALL the time.
Anybody who's ever administrated a school network should know that every kid is a potential "hacker," and you should be always keeping all the security up to date and patched regularly.
Re:Improper disclosure? (Score:4, Informative)
Anybody who's ever administrated a school network should know that every kid is a potential "hacker," and you should be always keeping all the security up to date and patched regularly.
Not only that, but there should be an air-gap between the network students have access to and the faculty network that contains sensitive information.
And even faculty access to internal enterprise information fairly limited when logging into a student workstation.
Student-accessible computer nodes and network ports should be treated about as secure as unencrypted WiFi.
To access confidential materials from such a workstation, the teacher must connect to a VPN, preferably using 2-factor authentication with a token such as SecurID.
Re: (Score:3, Insightful)
He deceitfully used someone else's name and password so he would not get caught
Kinda sounds like unauthorized access to a computer system to me.
kind of like being an eyewitness (Score:5, Interesting)
Or simply, "Who ever smelt it, dealt it."
Forget that this kid was doing a service to report the flaw, they are more concerned with why the kid was trying to access the site in the first place.
Re: (Score:2)
The person who reports the crime is often the first suspect or person of interest.
Which is why you do it anonymously, with cutouts from magazine headlines [oh noes, teh police can identify your cut-and-paste gluing style]. If you want to send email, use tor and a one-time account.
There, done. Next problem... Or not?
--Jonas K
But being an eye witness is not an active choice (Score:4, Insightful)
Forget that this kid was doing a service to report the flaw, they are more concerned with why the kid was trying to access the site in the first place.
OK, I know Slashdot is collectively in holier-than-thou rage over this poor, "innocent" kid, but why was the kid trying to access the site in the first place?
It seems to me that he's not being punished for reporting something, he'd being dealt with because he probably broke the law.
Of course, the officials responsible for the shoddy security and data protection should also be dealt with under whatever laws apply in that jurisdiction. But that doesn't excuse a kid who actively went on a fishing expedition. The end cannot be allowed to justify the means in cases like this, or you undermine the basic principle of the laws: you give carte blanche to crackers to have a go at whatever they like, since if they get in, they can just report it and pretend they were doing the world a favour.
Comment removed (Score:4, Interesting)
Once again kids: (Score:5, Insightful)
Re: (Score:2)
As sad as it is, the smart thing to do is pump your fist in the air for a job well done and move along.
There should be a law against stupid people.
Re:Once again kids: (Score:5, Insightful)
How did it ever come to this anyway?
Seriously, what the fuck happened to common sense? Where and when did society decide that a problem is only a problem if it is found?
At this rate, I'll be surprised if people even call the cops or the fire department to report a crime/fire.
Re:Once again kids: (Score:5, Insightful)
Think about it, if I report a problem I'll be the main suspect for a while, I'll have to be interogated and I don't think they're ever nice about it, I'll potentionally have to appear at court and it's just overall too much of a mess. I have my own shit to deal with.
Re: (Score:2)
Then thank god there are so many of us who are maladapted.
Re:Once again kids: (Score:5, Informative)
496 - 406 B.C. [bartleby.com]?
Re:Once again kids: (Score:5, Insightful)
A man approaches a stranger and says, "Hey, I noticed your shed is unlocked." The stranger responds, "What were you doing in my backyard?"
It's not that the unlocked shed isn't a problem. It's that there is also the issue of what the person was doing there in the first place and is anything missing.
With a shed, it's not much of a problem. Check to make sure nothing is missing. Charge them with trespassing if you are so inclined.
With a computer, especially a government or business computer, it's more complicated. You can't just take a peek and make sure nothing happened. Insurance issues alone probably require that they press charges to the full extent the law allows. Doing so also keeps the ball squarely in the court of the alleged victim.
If the person had a legitimate reason for being where he was, no charges are going to stick. If he didn't, he might be in some trouble.
In ANY case, the GP is right. Just don't do it.
While we're on the subject, don't talk to cops without a lawyer, either.
Re:Once again kids: (Score:5, Interesting)
My dad made a point of teaching me that if I see a car with the headlights left on, and unlocked, and the owner's not around, to reach in and turn them off. If I see something that looks like a neighbor's made a mistake, to take the risk of being accused and do the right thing. To even take the risk of being wrong and do what I think is the right thing. The older I get, the smarter he seems.
One of the benefits of getting older is the increased willingness to be counter to a trend.
Re: (Score:3, Insightful)
To the AC above, "anything in the view of the public is public domain" comes to mind. There's plenty of cases where cops search cars (at schools) without warrants, claiming this. Trespassing is never even brought up as a concern.
Although strang
Re:Once again kids: (Score:5, Interesting)
Re: (Score:3, Interesting)
A rather nastier way:
Get the file and take it home. Load it in a VM and do your stuff in there. Cut to all the juicy parts (like all the rich people's kids and such). Now, print about 50 of these, using yellow-dot hackers to obfuscate your printer.
Now take these papers and litter them around at a PTO meeting. Heads Will Roll. Just make sure to make yourself scarce so yours wont.
Re: (Score:3, Insightful)
I found plenty of holes.
The sys admins were smart enough to realize that I could be a asset to them.
I meant no harm so they gave me free reign basically.
All I needed to do was report back to them any flaws.
Mind you this was in Australia, not the US so less knee jerk and more common sense.
Re: (Score:3, Informative)
Watch this video, it's somewhat related to this:
http://video.google.com/videoplay?docid=8167533318153586646 [google.com]
It's probably the best video you will ever find if you're on the hot seat, worth 1,000,000 CSI episodes.
This helps too:)
http://www.youtube.com/watch?v=uj0mtxXEGE8 [youtube.com]
Re:Once again kids: (Score:4, Interesting)
Reporting a security hole is not noble, it's stupid.
I can't help but wonder how much the slashdot perception of the stupidity of reporting security holes to your sysadmins is due to selective reporting.
Ever noticed all the stories that say "User thanked for quietly reporting a subsequently fixed security problem"? Not exciting.
But it happens. I've reported a security issue to root, with three user names (!= my own) that I'd found the password to and the method I used. They said it was okay and they'd changed them, and later enabled /etc/shadow.
Trying-to-balance-out-the-selective-reporting'ly yours --Jonas K
Re:Once again kids: (Score:5, Insightful)
Reading the Register article, and both linked Daily Gazette articles, only two things are certain: The kid saw the information, and he communicated with the school principal regarding it. We don't know the tone of the communication, we don't know how he acquired the password, we don't know whether he kept a copy of the data, only that he saw it. The district representative saying the kid said "Look what I got" to the principal is hearsay at best, bravado at worst. The articles all read like trying to make the best case possible that the kid is the "villain", yet there is no statement that he did, or intended to do, anything malicious to the effect of blackmail. There is no information that he did anything illegal to acquire the login details themselves. I would think that, if there had been any attempt at foul play, they would've jumped at the opportunity to post them.
Personally, and because of the rather damning tone of the (sparse in details) articles, I'm going with "knee-jerk reaction" myself, as my optimistic approach. The other reasonable alternative is "vilify the kid so people won't notice we cocked up". The kid having actually done anything wrong (as opposed to, eventually, illegal) comes as a distant third.
Re:Once again kids: (Score:5, Informative)
RTFA, not TFS...
"He deceitfully used someone else's name and password so he would not get caught and was looking to profit from his criminal act."
Now that's the State Troopers words, and may not be true, but it's right there in the article itself. I suppose you could infer that he wanted to use the information he obtained for something other than blackmail (eg fraud), but if he wanted to do that he wouldn't have emailed the principal giving the game away, so blackmail is the obvious conclusion.
Re:Once again kids: (Score:4, Insightful)
I think the general rule of thumb is that you can only trust a cop if you're under the age of 10. Assuming that this trooper a) knows what he's talking about and b) isn't lying to make the arrest look significant is quite a stretch.
read more (Score:4, Informative)
http://www.youtube.com/watch?v=O_lwGWfO_Mk [youtube.com]
10 year old canada
http://www.youtube.com/watch?v=xakaLeLecvo&feature=related [youtube.com]
10 year old florida
http://www.nydailynews.com/news/ny_crime/2008/08/07/2008-08-07_cop_cuffed_me_on_bus_kid_says_in_suit.html [nydailynews.com]
10 year old girl NY
http://www.examiner.com/a-619947~Busted__7_year_old_cuffed__fingerprinted.html [examiner.com]
7-- in baltimore
Re:Once again kids: (Score:5, Informative)
Re:Once again kids: (Score:5, Insightful)
And this fiber right here is exactly why it doesn't make sense to jump to conclusions. What sparse information we have is conflicting. Where does the profit motive come into play? Where's the profit in alerting the authorities when you find a hole like this? What do they mean by "used someone else's username and password?"
We don't know if the kid's being hung out to dry, or if this is an appropriate response to the actions taken. Yet all throughout the comments, you see people immediately assuming that the kid is being martyred.
I'm not even saying that the kid isn't. I'm just saying that we don't have any clue based upon the presented facts, so taking one side or the other is a bit like American politics--pick a side and pretend you're at a football match.
Blackmail (Score:5, Interesting)
If you read the whole article, it sounds a bit like he might have been trying to blackmail the school with the details of the hack. As theregister notes, the email contents aren't available, and the quote "He ... was looking to profit from his criminal act." also suggests that he may have been blackmailing the school.
I'd like to hope so, at least, because otherwise the school is going WAY overboard...
Re:Blackmail (Score:4, Interesting)
No!
If anyone would have taken a minute to actually think about this, the claims do not make sense.
If the kid was trying to blackmail the school, why sign as 'a student'?
How will 'a student' profit from this?
Fix the grades of 'a student' in the database?
Blackmail is 'give me something or else'.
As there is no *me* involved, it is not blackmail.
Claiming that it is blackmail because the kids had reviled the security flaw and thus could repeat it is just wrong.
This smells of BS all the way. The school comes up with false allegations to cover their asses and make the kids look like criminals.
Sure, the kids were doing something they should not but their actions after that should null the previous offense.
Re: (Score:2)
Well, another victim of "the book" (Score:5, Insightful)
As in, being hit with the law book.
I RTFA but see no sign of this. At best is this bit from a followup link in TFA:
But for fuck's sake, three felonies at 15? For a fucking non-violent, non-destructive "offense"?
Poor kid is screwed for life.
Re: (Score:2)
That is what he is being charged with. Not sentenced to. I'm sure that will change as long as he has a decent lawyer. A felony is a felony. Write your elected official and request to have the laws changed.
Re:Well, another victim of "the book" (Score:5, Insightful)
Where do you want someone to start with an answer to that?
Seriously though, this is what happens when you create a police state. This is no different to any other dictatorship where non-violent crimes (anti-government, anti-religion, etc) are punished with prolonged sentences or even death.
Seriously, wake up America, all this horseshit about peace, freedom, and democracy isn't even upheld in your own country. Do you really think the rest of the world are stupid enough to believe you can "bring freedom to the world"?
Re:Well, another victim of "the book" (Score:4, Interesting)
There are a few possible scenarios by this statement - all of them conjecture. At this time, the article is very light on detail.
Conjecture #1) He was indeed using it for blackmail or other nefarious means.
If this is the case, nail his behind to the wall.
Conjecture #2) He simply reported the problem and the typical knee-jerk reaction ensues.
If this is the case, let him pay off his transgression by working with the people on the IT Team so he can be mentored and more easily monitored. Mentoring is the key element to his natural progression toward becoming a productive citizen.
Conjecture #3) He was showing off his leet h4x0r 5k1llz by attempting to embarrass the admins at that facility.
This is a tough one. I don't want to see some kids life completely ruined because he didn't understand the ramifications of his actions. Certainly, he should be punished but lets not lose our minds. Again, mentoring would probably go a long way in waking this kid up.
Re: (Score:3, Insightful)
He's not going to be tried for those crimes (Score:5, Interesting)
If he maintained his innocence and demanded a jury trial he'd have a good chance of being found innocent and if not the penalty would probably be minor. His behaviour just isn't that of a criminal. The whole system is broken. It's a game of bluff, but the stakes are the liberty of innocent people.
where's the intent? (Score:3, Insightful)
This is like Boston freaking out over Lite-Brites. I hope the kid not only calls their bluff and asks for a jury trial, but finds some way to counter-sue.
news flash (Score:5, Insightful)
stupid people fear smart people
Re:news flash (Score:5, Insightful)
Re: (Score:3, Insightful)
Only when they get together in large groups. Then they've got numbers on their side.], and become dangerous.
Re:news flash (Score:5, Insightful)
And they vote.
Foolish, but a lesson learned (Score:2, Interesting)
He did the equivalent of finding a hole in someone's fence, breaking through the fence into the person's property, and then having a look around before telling the owner "hey, your fence has a hole in it". The kid was foolish here, assuming he had the best of intentions.
But hey, at least the kid learned a valuable (and sad) lesson in life:
No good deed goes unpunished.
Re: (Score:3, Insightful)
Also, it may look like you have accessed the first fence of several concentric fence. Before reporting this hole as a problem, it sounds reasonable to assess if anything is put at risk first. Once you see that there are many valuable things accessible, you go away and go knock on the door "Hey do you know that all these valuables of yours are easily
Re: (Score:2)
Ok, I'll bite. Lets say I want to test the schools security without actually breaking in. I'd have a look and see what kind of set up they have (from an external view) and go mimic it on my own machine. Then I can poke around legally. Ok, I find that a service they're running has a security issue, I tell them so and viola! No prosecution for me!
Sure, I can't see any internal problems but why should I? Unless I break in (illegal) and poke around (illegal) it shouldn't worry me anyway since the outside fence
Assuming he is convicted... (Score:3, Insightful)
Re: (Score:2)
I can see the bumper sticker now: "I'm a drunken, thieving rapist, and I vote!"
The felonous emperor has no clothes. (Score:5, Insightful)
And one who breaks security is like the one who alerts the king about wearing no clothes. You WILL get punished. You WILL be dealt with.
I saw this all the time at schools, jobs and like. People dont like smart people. People who intentionally find broken ideas and mechanisms will be dealt with, not glorified and congratulated. Highlighting a security problem means they have to put in the effort to fix what you brought to their attention, or threaten you to STFU.
If you are smart about security, keep your mouth shut. There's not much you can do, except yourself be a target.
Next time try wardriving (Score:3, Funny)
Well (Score:5, Interesting)
My only comfort was that I had reported the findings anonymously.
And yes - they municipality were charged. The period for prosecution for my 'crime' has expired.
wtf (Score:3, Insightful)
This is bullshit - I am really tired of hearing these scenarios where ignorant fascist assholes are doing serious damage to the reputation and future of kids who are doing the right thing.
The message being sent is that rather than being honest, helpful and productive member of networked society we're teaching kids that it's better to be deceptive and not expose dangerous security flaws. ...and FELONIES? What the fuck?!
I feel that there is a message that both the powers that be (and irresponsible sys admins who have been professionally shamed by these revelations) want to send - the sysadmins don't want to be embarrassed by kids - the feds or police either don't understand and are hearing sys admins tell them that "these meddling kids broke into our system, it's certainly not MY fault for not securing it" or people who should know better thinking that it's better to send the message that killing the messenger is the appropriate way to handle security, EG what people don't know won't hurt them and what we don't see we wont have to deal with.
I believe that this should be explained to those who aren't very computer/network literate with the following analogy: Let's say you live in one of those multifloor apartment buildings where there is an area in the lobby with many mailboxes which all lock. Each resident gets a key for their own box. This kid either accidentally (or just to see if his and other mailboxes are secure) plugs the key into the wrong box or a box that isn't his and finds that his key (and by logic every other resident's key) opens every mailbox in the building. The mailbox he tests the key on contains an envelope with a ton of cash sticking out of it. He goes to the landlord and says "hey, these keys provide no security because any key can open all mailboxes, and by the way, this mailbox had a ton of cash in it - here's the cash, I didn't want it to get stolen" and he is then arrested and charged with breaking and entering, grand larceny, and other such offenses.
I hope that if any high profile tech people get a chance to comment on this in the press or end up assisting the defense (if it was to go to trial) that they can send a message that criminalizing someone who is doing the right thing is just wrong...
Re: (Score:3, Insightful)
Someone wouldn't have been able to do this to me, because I don't leave sensitive files on the network in public folders.
Therefore, I would not have been furious.
And if somebody did find a security flaw and told me about it, yes, I'd be embarrassed, as I like to think I understand security significantly better than the next guy.
But I'd sure as hell fix it, rather than calling the cops. Which may be why I think I understand security better than the next guy.....
More info and name (Score:3, Informative)
Film rights? (Score:3, Funny)
Oh, wait, too late... [imdb.com]
The RL equivalent is Breaking and Entering (Score:3, Insightful)
It doesn't matter that the server was misconfigured, or used a default password. What matters is what he did.
He didn't accidentally find this something. He went looking for security hole, found one, used it to look around where he was not supposed to have access, then reported it anonymously. Then, an investigation followed and they found him.
That is the equivalent of him walking down a street and trying each door and window to see if it was open, finding one, going in to the house and looking around, then anonymously reporting what he had done to the police. In the real world it is breaking and entering (look up the law before you say "no breaking occurred").
Re: (Score:3, Informative)
The lock does not have to be "a super huge complex lock", merely a locking mechanism. You do not have the right to open or circumvent a lock just because the lock is flawed or flimsy.
If a piece of tape is placed over a door to keep it shut and you remove or break the tape, you are guilty of breaking and entering. [law.com]
I wonder.... (Score:3, Interesting)
I wonder if any of those 'whistleblower' protection statutes would apply in this case.
Why wasn't the "peer" charged? (Score:3, Informative)
do the right thing... (Score:3, Interesting)
Say nothing.
Human nature is to "shoot the messenger." So don't tell.
Once upon a time in university I noted a file in the temporary directory on one of computer science's machines with read access to all on the entire student name/id list. This was a byproduct of registration, and the ids were used as the passwords for first log in. But student ids were used for much more, and this list was also bigger than computer science... I complained to the comp sci sys admins; who said "gee thanks, we'll change that." But the file kept appearing. So I contacted the computing services admins; who said "gee thanks, we'll talk to the comp sci guys." The result of which was "this doesn't happen any more". So I sent a current directory list. No response. Then I posted the file (two months after it was supposedly fixed) to the internal security newsgroup. [I lost my access privs and was almost expelled.]
The moral of the story... don't tell people they f*cked up and sure as heck don't show them, because you just make them look bad, and there is a fine line between ethical behavior and questionable judgement.
The lesson here (Score:4, Insightful)
The lesson here is to get better at sending "anonymous" e-mail to report this stuff.
Re:Anonymous (Score:5, Funny)
The astounding part is that the same IT department that left the security hole open succeeded in tracking the kid down. I don't think anyone would have seen that coming.
Re: (Score:2)
Re: (Score:2)
Ah, but then it wouldn't have been anonymous. Besides, from this article [dailygazette.com]:
As bad with computers as teachers are (in my experience, anyway), looking at the "From" field would have taken about two seconds. Then again, it's plausible that it really did take the IT people nearly two hours to find it...
Re: (Score:2)
Re: (Score:3, Informative)
The article I linked to explains exactly how they found him: they looked at the originating IP, which led them back to their own computer lab, and from there it was trivial to determine who was logged on to that machine at that time. He could have created a new email account just for this, but it would still be traceable without an anonymous proxy.
Re: (Score:2)
Honeypot.
Re:Anonymous (Score:4, Insightful)
If you're baiting your honeypot with real data, you're doing it wrong.
Re: (Score:2)