Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Security Expert Jailed For Reporting Vulnerabilities In Lee County, FL Elections (theregister.co.uk) 307

rootmon writes: Information Security Professional David Levin was arrested 3 months after reporting un-patched SQL injection vulnerabilities in the Lee County, Florida Elections Office run by Sharon Harrington, the Lee County Supervisor of Elections. Harrington's office has been in the news before for voting systems problems (for example in during the 2012 election, 35 districts in Lee County had to remain open 3 hours past the closing of polls due to long lines and equipment issues, wasting $800,000 to $1.6 million of taxpayer money on incompatible iPads for which her office is facing an audit. Rather than fixing the issues in their systems, they chose to charge the whistleblower with three third-degree felonies. The News Press also has several related interviews.
This discussion has been archived. No new comments can be posted.

Security Expert Jailed For Reporting Vulnerabilities In Lee County, FL Elections

Comments Filter:
  • White Hat (Score:5, Interesting)

    by Anonymous Coward on Monday May 09, 2016 @01:17PM (#52077435)

    I hope the courts recognize that white hats are the good guys. I hope that paves the way for Levin (and EFF) to sue Lee County and Harrington for damages. And I hope that discourages other politicians from lashing out at the good guys.

    • Re:White Hat (Score:5, Insightful)

      by Martin Blank ( 154261 ) on Monday May 09, 2016 @01:34PM (#52077579) Homepage Journal

      Breaking into or executing code on a system without permission is a criminal offense. Even if he was doing it ostensibly for the greater good, Levin should know better (and a tweet from him suggests that he knows he should have known better). The courts aren't going to let this slide just because he's a "good guy," because that sets a bad precedent.

      If you're going to try to break into a system, get permission. If you absolutely must do it without permission, use a burner name and address to make the notification, or go through an attorney to make the notification.

      • by MightyMartian ( 840721 ) on Monday May 09, 2016 @01:43PM (#52077685) Journal

        Or, in the future, sell it to the Russian mob for big bucks and retire.

        • Or, in the future, sell it to the Russian mob for big bucks and retire.

          Someone good at writing Russian gangster dialog should write that scene. It would include the Russian mobster trying to figure out why Levin thinks he'd care about hacking Lee Country elections.

        • Re:White Hat (Score:4, Insightful)

          by Kernel Kurtz ( 182424 ) on Monday May 09, 2016 @03:05PM (#52078459)

          Or, in the future, sell it to the Russian mob for big bucks and retire.

          Should be marked insightful, not funny.

          If government is going to be douchey towards people who point out vulnerabilities, then best not to disclose anything to government. They completely deserve whatever comes next.

          Let them fail all by themselves.

      • It is the law, and you can't just ignore it. I'm not sure how you could change the law to accommodate such "good intentions" hacking. That would give just about any hacker an excuse. Best get permission first, in writing.
        • Re:White Hat (Score:5, Insightful)

          by amiga3D ( 567632 ) on Monday May 09, 2016 @02:36PM (#52078199)

          There will be no permission. The real reason he's in jail is they're pissed off everyone knows how fucked up their system is. He outed them and they popped his ass in the slammer for it. If they were actually interested in providing a secure system they would have rewarded him instead. The way he was treated says everything about Sharon Harrington's professionalism. She's a typical CYA type interested only in her own continuance of incompetence at her job. I'd say the people in that county should see that she's sacked if they ever want an improvement. Wonder how many of those Ipads walked off on her watch? Maybe they could find a cell for her too.

          • If they were actually interested in providing a secure system they would have rewarded him instead.

            Permission can't come in hindsight. Maybe there are pissed off people who reported him, but he still broke the law and MUST be prosecuted if there is evidence, which there clearly is. It not like there is a choice in the matter.

            • Re: (Score:3, Informative)

              by Anonymous Coward

              There is no MUST - prosecutors have discretion. Judges have discretion, and Juries (though they don;t want you to know it!) have discretion.

              • It is a shame you are downvoted to zero, you are correct.

                And this STUPID SLOW DOWN COWBOY message, WTF Slashdot. No wonder why everyone went to Reddit.

            • "...but he still broke the law and MUST be prosecuted if there is evidence, which there clearly is. It not like there is a choice in the matter."

              Actually there is, the prosecutor has discretion.
            • Re:White Hat (Score:5, Insightful)

              by Chas ( 5144 ) on Monday May 09, 2016 @03:46PM (#52078819) Homepage Journal

              The thing is, if a security researcher asked for a unit to do security testing on, no permission would be forthcoming.

              The security researcher, being a voter, has a legitimate interest in the safety and security of the voting system.
              Also, as a voter, this person is ALREADY supposed to be able to access the system. It's the fault of the people setting up this system that his ability to access the system is that broad.
              And, since the equipment is being purchased with taxpayer funds, there's a legitimate school of thought that permission for access is already implicit.

              Criminals bent on subverting the voting system are NEVER going to ask permission.

          • Re:White Hat (Score:4, Interesting)

            by raymorris ( 2726007 ) on Monday May 09, 2016 @03:08PM (#52078485) Journal

            Imagine if someone found the key to a government building under the door mat. That's clearly a major security lapse.

            Imagine if they next USED that key to enter the building on a weekend and rummaged through the offices inside. That's second-degree burglary.

            This guy found a way to retrieve the admin password (key), and should have stopped there. Instead, he USED the admin password to log in and rummage around. I've been doing network security for twenty years. I've never seen any reason to do that.

            • by amiga3D ( 567632 )

              I agree. Still they should take into account that he did no damage and did report the flaw. Those are mitigating factors. How much you bet those missing Ipads are glossed over? Isn't that theft? Nope, not for the right people it isn't.

            • What if he inserted the key into the lock, verified that it opened the door, locked the door again, and dropped the key off at the police station? That seems to be a better analogy. Of course if he got caught testing the key, he'd have a tough time pleading his case that he was going to turn it over to the police.
        • by jandrese ( 485 )
          Oh yeah, I'm sure they would have been totally on board with being hacked if he had asked.

          This is democracy at stake here, we can't afford to let some incompetent and potentially corrupt officials dictate the terms. Nothing less than the next President of the US is at stake here. It is absolutely in the countries best interest for these sorts of vulnerabilities to be discovered and patched before the election, otherwise you can never trust the election. I don't care that it hurt their feelings that th
        • "It is the law, and you can't just ignore it."

          You can in fact ignore it. If you are doing something to prevent a worse evil than the one you committed you can attempt to present an affirmative defense. Civil disobedience is another case where you break the law as a form of first amendment protest and can trump lesser laws.
      • Re:White Hat (Score:5, Insightful)

        by ArhcAngel ( 247594 ) on Monday May 09, 2016 @02:27PM (#52078109)
        When exposing the vulnerability you simply run it through the legally ambiguous filter.

        I was able to penetrate your system using an injection attack vector

        becomes

        Based on your code I surmised it was likely susceptible to an injection attack vector and wanted to make you aware of it before someone actually tries it.
      • Re: White Hat (Score:4, Insightful)

        by jxander ( 2605655 ) on Monday May 09, 2016 @03:20PM (#52078609)

        You are absolutely correct: the way he handled this is a crime. But that just highlights a massive deficiency. How are we supposed to catch security flaws like this?

        I can't imagine that asking permission would end well. The target has nothing to gain, and everything to lose. We need someone (or some group) sanctioned to pen test government assets.

        From election offices, to the ACA databases, to the DMV, and on and on, we have a LOT of personal data floating around. I would certainly prefer that someone is allowed to make sure these repositories are being kept up to standards.

      • "Breaking into or executing code on a system without permission is a criminal offense. Even if he was doing it ostensibly for the greater good"

        You actually can make an argument that you committed a crime in order to prevent a greater evil. It is a valid defense.

        https://www.google.com/search?q=affirmative+defense&ie=utf-8&oe=utf-8
      • Had he actually used the information to alter the outcome of the election, the same government office would be on public record denying that any breach had occurred and, therefore, would have to forego charging him. You shouldn't attack production systems. If you do, bad things will happen. Unfortunately, valid test targets are often not provided creating a moral dilemma. Those caught up in such a situation at least deserve or sympathy.
    • Re: (Score:3, Insightful)

      I hope the court realizes that the State officials are incompetent retards who created a serious security situation, not to mention wasting huge sums of money, and that all they're trying to do is use the courts to bury their severe intellectual and technical inadequacies. Courts shouldn't be used to protect the fundamentally moronic.

      • Re:White Hat (Score:4, Insightful)

        by StatureOfLiberty ( 1333335 ) on Monday May 09, 2016 @02:14PM (#52077995)

        I hope the court realizes that the State officials are incompetent retards who created a serious security situation.

        Of course they may have just purchased or licensed a serious security situation. There are a lot of poorly written applications created by the private sector and sold to the public sector.

        There should be no excuse for a State though. They should have the resources to check out software and services they purchase (especially elections related software or services). When it comes to the County and City level though, many don't have the resources to do this kind of evaluation whether it is available skill sets or money to pay an expert. This is a significant problem that really needs addressing in many localities.

        Florida really should drop this one. All they are doing is making themselves look worse (hey!, why just look stupid when you can also look corrupt).

      • Re:White Hat (Score:5, Interesting)

        by dgatwood ( 11270 ) on Monday May 09, 2016 @02:15PM (#52078001) Homepage Journal

        Ha, ha. You still think those vulnerabilities were accidents.

        IMO, it seems far more likely that the SQL injection holes were deliberate. After all, parameterized SQL queries have been the norm for at least eight or ten years, which means that for this to be accidental, either the software would have to be as old as Windows Vista or the developers would have to be so grossly incompetent that they would never be able to hold down a job writing database software for more than a week or two.

        The whole "never attribute to malice" thing applies only when it can be plausibly attributed to incompetence. SQL injections in an election system in 2016 fall so far on the other side of that line that you can't even see the line from there.

        With that said, in the unlikely event that I'm wrong, and that it really was caused by a grossly incompetent vendor, I expect to see that vendor added to a government blacklist and become immediately ineligible for any government contracts going forward. I also expect to see the software in question thrown away and paper ballots used until such time as a suitable replacement can be found. There's no excuse for allowing software that doesn't even meet 2010-era standards to be used for running elections in 2016. None whatsoever.

        • Re:White Hat (Score:5, Insightful)

          by Hulfs ( 588819 ) on Monday May 09, 2016 @03:22PM (#52078641)

          In this case, the saying definitely applies...there are a LOT of people who have no business creating code for important production systems doing so.

          As scary as it is, there's a non-insignificant portion of workers actively creating software, often connected directly to the web, who have no idea what a SQL Injection is, nor why you need to worry about one.

          Asking about what a SQL Injection is is one of my standard interview questions, you'd be shocked at the number of people who don't have a clue, even those who are interviewing for a senior position. Not really related, but I'm also shocked by the number of people who don't understand what an Outer Join is.

        • "With that said, in the unlikely event that I'm wrong, and that it really was caused by a grossly incompetent vendor, I expect to see that vendor added to a government blacklist and become immediately ineligible for any government contracts going forward. I also expect to see the software in question thrown away and paper ballots used until such time as a suitable replacement can be found. There's no excuse for allowing software that doesn't even meet 2010-era standards to be used for running elections in 2
        • Voting software as *old* as Windows Vista? Quick, to my fainting couch!

          Frankly, I'd be surprised if they were using something as *new* as Windows Vista. Windows XP seems more likely. 2000, 98 or even 95 wouldn't be surprising to me. Windows for Workgroups 3.11 wouldn't seem entirely out of the question.

          Note that I'm not in any way claiming this to be a good thing, just a sad fact of life.
        • After all, parameterized SQL queries have been the norm for at least eight or ten years, which means that for this to be accidental, either the software would have to be as old as Windows Vista or the developers would have to be so grossly incompetent that they would never be able to hold down a job writing database software for more than a week or two.

          Oh, I don't know. Plenty of software is written by people who don't know what parameterized queries are, or who think "it's behind a firewall" is adequate

        • by rsborg ( 111459 )

          After all, parameterized SQL queries have been the norm for at least eight or ten years,

          I failed an interview at Cisco for not knowing about prepared SQL statements... back in 1998. Was a big learning experience for inexperienced me. So parameterized queries have been around (and highly recommended) even way back in the golden 90's "Perl is all you need" days.

  • No he wasn't (Score:3, Informative)

    by 110010001000 ( 697113 ) on Monday May 09, 2016 @01:17PM (#52077437) Homepage Journal
    He was arrested for actually hacking the website. Stop it with the clickbait headlines. This isn't the Star.
    • Re: (Score:2, Troll)

      That was my first thought. Why does the submitter feel the need to tell a lie in the headline?
    • by iCEBaLM ( 34905 )

      How do you find a vulnerability without actually testing it?

      • Re:No he wasn't (Score:4, Insightful)

        by Luthair ( 847766 ) on Monday May 09, 2016 @01:24PM (#52077491)
        For a running service 'testing' hacks is still hacking.
        • Re:No he wasn't (Score:4, Interesting)

          by iCEBaLM ( 34905 ) on Monday May 09, 2016 @01:32PM (#52077557)

          So what you're saying is that nobody should ever try to discover vulnerabilities and report them?

          What I'm getting at here is yes, in this instance, he went a little too far by using the credentials he found after the injection was done to login to other parts of their system, but if he had stopped after the initial injection worked, and then disclosed that vulnerability to the owners, is that technically still hacking? And if so, doesn't that create a rather terrible precedent?

          • Technically, you should never be checking a third party service for vulnerabilities without their explicit consent. As a third party, no you aren't supposed to test sites for vulnerabilities.
      • by SeattleLawGuy ( 4561077 ) on Monday May 09, 2016 @01:39PM (#52077635)

        How do you find a vulnerability without actually testing it?

        It almost shouldn't matter in this case. It does, but it shouldn't. When you bring felony charges for basic pen testing, people who find a system is vulnerable are not going to report it. Even if they shouldn't have been snooping around in the first place, isn't it better if they're willing to report the vulnerability before someone does real damage?

        Basic SQL injection vulnerabilities are so trivial to guard against these days that it is the person who spec'd or coded the system who should be facing severe punishment, not the person who ran a penetration test. It is very much like leaving a ballot box unguarded and unlocked at a polling place, and then arresting the person who lifts up the lid and says "hey, someone left this unlocked!" Sure, he shouldn't have been checking, but he's not the one who dropped the ball and you don't arrest him for it.

        In a worse case, this could have been done easily by a random tech guy barely out of high school, a malicious government, a ransomware operator, or anyone who wanted to steal the election. Many people love this kind of soft target. The local government should be thanking their lucky stars it was done by someone who reported it instead of using it to elect the candidate slate of their choice.

        • Actually, everyone involved in the procurement, installation and use of these machines should be at least fired, and quite honestly, should be charged with negligence of their duty. The company that provided these machines should be sued, and the machines returned as being "unfit" and full and complete refund sought.

          The fact that they are going after the wrong guy, is all the evidence I need to show once again, government is the problem, not the solution. We need to take back our country from the statist el

        • by iCEBaLM ( 34905 ) on Monday May 09, 2016 @02:10PM (#52077961)

          It is very much like leaving a ballot box unguarded and unlocked at a polling place, and then arresting the person who lifts up the lid and says "hey, someone left this unlocked!" Sure, he shouldn't have been checking, but he's not the one who dropped the ball and you don't arrest him for it.

          I agree, somewhat. The analogy breaks down slightly because in the "physical world" you can sense that something may be open, such as a door, by looking at it and not necessarily walking through. Then the question is, is it illegal to try to open a locked door? Is it illegal to try to open a door that isn't yours but is easily accessible? (no barriers, no signage, etc)

          However when it comes to networks, the only way to "see" a vulnerability is to actually use it and test if it works. Is that hacking? Should it be illegal?

          • If that is as far as you go, no it shouldn't be illegal. If there are no damages (including potential damages from unauthorized review of the contents of the server) and any vulnerability found is reported it should not be illegal.

            Especially when you are talking about a server with a public function and he is part of the community serviced by that server.
        • It is very much like leaving a ballot box unguarded and unlocked at a polling place, and then arresting the person who lifts up the lid and says "hey, someone left this unlocked!"

          It is trivial to detect an unlocked ballot box. It has no lock on it! You don't need to open it up to know that. And unguarded likewise, does not require opening it up to demonstrate.

          In this case, knowing that an SQL injection attack can get the elections supervisor login credentials may take an actual SQL injection attack. But it doesn't take any deep insight to know that having the supervisor's credentials will give someone access to other parts of the system, which is what this guy proceeded to do after

          • "I'm sorry, but how does there being a number of people who could have broken the law mean the law should be ignored?"

            His actions prevented future defrauding of the people which is a far greater crime than unauthorized systems access. It's akin to kicking you in the balls to stop you from shooting a nun. It's called an affirmative defense.

            In Florida, the state in question, for instance, medical marijuana was illegal last I checked but medical necessity is considered valid as an affirmative defense if charge
      • by DarkOx ( 621550 )

        You get permission to test BEFORE you do the testing!

      • Imagine if someone found the key to a government building under the door mat. That's clearly a major security lapse.

        Imagine if they next USED that key to enter the building on a weekend and rummaged through the offices inside. That's second-degree burglary.

        This guy found a way to retrieve the admin password (key), and should have stopped there. He could have just said "hey look, the admin password is exposed". Instead, he USED the admin password to log in and rummage around. I've been doing network securit

    • Re:No he wasn't (Score:5, Informative)

      by hesiod ( 111176 ) on Monday May 09, 2016 @01:23PM (#52077489)

      He was "hacking" it on a video demonstrating it directly to THE ELECTIONS SUPERVISOR, who agree he should not have been arrested.

      • Re:No he wasn't (Score:4, Interesting)

        by 110010001000 ( 697113 ) on Monday May 09, 2016 @01:30PM (#52077531) Homepage Journal
        No he wasn't. He "hacked" it previously before the demonstration. Stop lying. I agree he shouldn't have been arrested but there is no reason to lie for clicks.
        • by hesiod ( 111176 )

          If that is the case, the article was not clear on that point. I went back and reread it and still am not entirely sure, but I am not intimately familiar with the details so I will accept that I could have been incorrect in my assessment.

          • Does it make sense to you that he'd schedule a video demonstration of how to hack the system if he hadn't already done it?
            • by DRJlaw ( 946416 )

              He already blew by the fact that Dan Sinclair was not the head of the "Lee County, Florida Elections Office run by Sharon Harrington, the Lee County Supervisor of Elections."

              We're not making sense. We're demagoguing our preferred narrative, facts be damned.

      • by DRJlaw ( 946416 )

        He was "hacking" it on a video demonstrating it directly to THE ELECTIONS SUPERVISOR, who agree he should not have been arrested.

        No, he was not. A candidate for elections supervisor for a county is not the active elections supervisor for the county.

        Levin told the elections office what he did under the auspices of helping its cybersecurity and explained how he hacked into the databases in a YouTube video also featuring Dan Sinclair, who is one of the candidates running for the supervisor position against i

        • by hesiod ( 111176 )

          A candidate for elections supervisor for a county is not the active elections supervisor for the county.

          From the article: "Levin detailed the SQL injection in a YouTube video shot with elections supervisor Dan Sinclair". It does not say "candidate" anywhere in the text.

    • He was arrested for actually hacking the website.

      Correct. He is being charged with gray hatting.

  • I wish best for this guy. He did what was right and now faces several felonies. I hope this gets thrown out and he can files a big fat civil lawsuit at the count. He has his felony charges published all over the news and in postings. He'll never be able to get top secret clearance. Any potential employer will Google this guy and may consider him to be too hot to handle.
  • Lesson be learned (Score:2, Insightful)

    by Anonymous Coward

    Next time don't report it to them, report it to the media.

    • Re:Lesson be learned (Score:5, Interesting)

      by HornWumpus ( 783565 ) on Monday May 09, 2016 @01:31PM (#52077539)

      Next time make the reported results so preposterous it's obvious that shenanigans are involved.

      Make 'Vermin Supreme' get 110% of the votes. Give the mainstream candidates large enough negative vote counts to give the national popular vote to 'Vermin Supreme'.

      Until someone does this, to a system directly feeding data to the news networks, the system will continue to be reported as 'secure and working as designed'.

      • by tsqr ( 808554 )

        He hacked a website, not a voting machine.

      • Make 'Vermin Supreme' get 110% of the votes. Give the mainstream candidates large enough negative vote counts to give the national popular vote to 'Vermin Supreme'.

        We here at Pizza Hut respect and value our customer's opinions, but we do not consider the results of that online vote binding. Our new flavor of pizza will instead be called The Murine Lover's pizza.

    • by SumDog ( 466607 )

      He should have done responsible disclosure via a lawyer, with a 30 day notice, before posting the video. If he owns a security firm, he should have a god damn lawyer.

  • If he had only reported that he was able to get in the front door it would be one thing, but tfa says that he also used what he found to log in and explore, seems to me that is where the legality line was crossed, not the exposure of the vulnerability itself.
  • Yay police state!

    Fuck you, pleb, that's why.

  • Close that parentheses, you're killing me!!
  • by SuperKendall ( 25149 ) on Monday May 09, 2016 @01:43PM (#52077683)

    The correct approach for fixing security issues in a voting system are to elect yourself, then appoint a team of people to correct the issue while funneling you money.

    • by amiga3D ( 567632 )

      Don't forget to order a huge batch of Ipads and "lose" a bunch of them in the process.

    • Re: (Score:2, Interesting)

      by Anonymous Coward

      Just change the winners name to "You have an SQL injection vulnerability".
      And be done with it.

    • by zlives ( 2009072 )

      you'll continue to win elections, so might have to leave the issue uncorrected and arrest anyone who points the finger... o wait!!!

  • Close those parentheses, you're killing me!!

    )
  • by TranceThrust ( 1391831 ) on Monday May 09, 2016 @01:57PM (#52077829)
    Security professionals and tech enthusiasts should take note of this technique and apply it in reverse: instead of reporting vulnerabilities to the government institutes who caused them, bring those guys to court. Sue them for unsafely handling the information you entrust them with. Things are not going to get better unless this kind of incompetence can cost someone's head.
  • It's a government agency, so it is kind of redundant to quantify the term money with "tax payer". All it does is push people away from government programs that could improve quality of life.

    It is this kind of attitude that pushes bean counting and attempted cost savings to such an extreme level that it is detrimental. This is why the government is so bad at finding the right organizations to do work for them; they just keep giving out contracts to the lowest bidder. This is why there are so many inefficienc

    • so it is kind of redundant to quantify the term money with "tax payer"

      No, it's not. Because a LOT of people seem to think that there actually is something called "government money." Nearly half the country pays no income tax at all, and a large percentage of those get a "tax refund" on the income taxes they don't pay. That flow of money is rarely referred to as "other people's money" - just as tax credit, as earned income credit ... as anything other than a portion of the money that other people pay as taxes. Politicians, especially on the left, talk routinely about how they

      • "taxpayer money" == "government money". Just because they got it (mostly) from the taxpayers, or that they are expected to use it responsibility, doesn't mean it isn't theirs.

        All I want is to keep it neutral. No qualifiers, just let people make their own judgement. Just because some people might think of it as "government money" vs "taxpayer money" doesn't mean your opinion needs to be hammered in every time the subject is brought up.

  • by John.Banister ( 1291556 ) * on Monday May 09, 2016 @02:28PM (#52078121) Homepage
    When I was thinking about who could pass on this sort of useful information without exposing the source to prosecution, Wikileaks came to mind.
  • By that standard, shouldn't this guy be jailed for telling the bank they left their front door unlocked? http://www.foxnews.com/us/2015... [foxnews.com]
    • No. The guy walking into the bank did so innocently, not in a way deliberately trying to bypass any security. Further, when he found nobody there, he called to report it. He didn't start rifling through the manager's desk looking for interesting stuff, and didn't try opening the safe to access any money.

      The main difference is intent, and the secondary difference is what happened once access was gained.

  • by Verdatum ( 1257828 ) on Monday May 09, 2016 @03:02PM (#52078427)
    manishs, did you investigate this one before pushing it up? The more I read about it, the more this all looks like a stunt by Sinclaire. Instead of going through proper channels, this guy went through an opposing candidate, and actively goes above and beyond privately reporting a security flaw; instead publically exposing it on YouTube and going on to actually explore the system once gaining access. All this with no time for the government to fix it. That's not how security evaluators should _ever_ behave. So then he goes to jail, allowing crummy summaries like this one, to effectively say "RAWR, HARRINGTON BAD!!". Harrington did not appear to pursue the arrest. It looks like Sinclair hoped to get an arrest to increase negative exposure on Harrington to help get her voted out. Publishing a summary like this on Slashdot means that these people are effectively playing the editors. The only good thing is that the summary feels so incredibly slanted that it sets off some people's bullshit detectors.

Avoid strange women and temporary variables.

Working...