University Brings Charges Against White Hat Hacker 540
aqui writes "A university student at Carleton is learning that no good deed goes unpunished. After hacking into what was probably a not-so-secure university network, this guy took the time to write a 16-page paper on his methods and sent it to the system admins. Sounds like White Hat behavior to me. Yes, he should have asked permission before trying, but throwing the book at the guy and wrecking his life with criminal charges (which stick for a long time) seems a little excessive. The university should spend money on hiring some admins with better computer skills and teaching skills rather than paying lawyers. In the Engineering department at my old university, the unofficial policy was that when you broke in, didn't damage anything, and reported the problem and how you broke in, they didn't charge you (if you maliciously caused damage, you usually faced academic sanctions). In some cases, the students were hired or they 'volunteered' for the summer to help secure the servers or fix the hole they found. The result was that Engineering ended up with one of the most secure systems in the university."
Read on for the rest of aqui's comments.
aqui continues:
"The truth is, some university students are going to have the desire to hack something, and not all of them have the judgment to stay out of trouble. If you acknowledge that and catch them inside the university, you can straighten them out before they wreck their lives, and teach them to be white hats. Rather than creating a hostile environment where people may become black hats, you create an environment where you guide them in the right direction to being good computer security professionals. For every hacker they catch, there's probably at least one that they don't know about. I can imagine that a number of those hackers at Carleton are now seeing the university as the enemy for burning 'one of their own,' and some of them may become malicious to get even. If the student's intentions were good - which they appear to be - I can't help but feel sorry for the guy."
The Politics (Score:5, Insightful)
this guy took the time to write a 16-page paper on his methods and sent it to the system admins. Sounds like White Hat behavior to me. Yes, he should have asked permission before trying, but throwing the book at the guy and wrecking his life with criminal charges (which stick for a long time) seems a little excessive.
So, I agree with you. Someone who took the time to show flaws in the system should not be punished (at least not to this extent).
However, here's probably what happened.
1. Someone received the 16 page write-up. They took it to the sys admins.
2. The system administrators, WHO WANT TO KEEP THEIR JOB, are going to go into a tirade of how he subverted their systems and purposely used "nefarious methods" to break system security, etc, etc. Basically, it's politics here - they don't want to look bad and/or lose their job so they will do everything in their power to make him look like a bad guy (which, to some extent, he is).
3. So, sys admins may have suggested some legal action to protect the school and make an example of him. (Or someone higher up may have.) The reason someone higher up may have done this is because they want to protect the school's image. Knowing that their system was weak could really hurt a school which is a business.
Basically, all of this is politics. All of it. Technically, the kid did the right thing by reporting what he found (although, quite honestly, he probably shouldn't have been there in the first place without asking permission). But, he didn't think through how other people were going to see his actions. You *always* have to think about the politics.
Re:The Politics (Score:4, Insightful)
Computers are not houses (Score:5, Insightful)
and found a 16 page write-up about how a guy broke into your house, disabled the motion detector
I agree this would be disturbing, but I hear these analogies to people's homes all the time and I've always been a little uncomfortable with them, and I think I've figured out why.
One of the key problems with a home invasion is that it's pretty reasonable to assume it threatens your personal safety. There are other places to threaten someone's personal safety, but it's one of the few places where just by dint of being there, it's reasonable to assume someone constitutes some kind of threat to you.
I think a better analogy would be some kind of storage unit or a locker. If you had stuff in this protected by a certain kind of lock, and somebody broke into your place and left a note that said "Dude. These locks are defective. They're easy to open by using this technique. Your stuff will be safer if you get something else!" and didn't take anything, that'd be closer to what happens when a system is compromised. You might be likely to be a bit surprised and perhaps wary, but it's not the place where you sleep.
Re:The Politics (Score:5, Interesting)
There was a similar situation awhile ago where I work (in my outfit's Computer Center.)
I found a password ripper on the net, and tried it on our password file. Seemingly, the password rules that used to be applied had been lost during a recent system change; and now passwords like 'password' and 'letmein' were not rejected when the user tried to set their password. I was able to crack >1,000 passwords within 30 minutes.
I reported the problem to my supervisor, and he got me to discuss it with the Technical Director. They decided that the new Identity Management system that they were looking for funding for, would fix the problem. The budget bid failed, and the IDM system still hasn't been built. The hole remained for 2 to 3 more years.
I read a case online where a NASA sysadmin would email users to warn them to strengthen their passwords, so I started doing that myself. "Hullo [user], your password is your favourite football team. That's a dictionary word, and easy to crack. Please choose a stronger password, using one of these methods." This did reduce the scale of the problem somewhat, but new accounts would appear with weak passwords, so the hole was still open.
Around 2 to 3 years after I originally reported the problem, a user reported exactly the same thing to his boss, who told the Computer Centre. He was hauled over the coals, reprimanded and nearly got disciplined for his trouble. Password creation rules were instituted, and the hole was closed in short order.
Since those days my outfit has started filtering our Web access using http://www.websense.com/ [websense.com]. I recently found a way around the filter, but don't want to report this hole in case the management decide to punish me for it.
Re:The Politics (Score:4, Insightful)
Since those days my outfit has started filtering our Web access using http://www.websense.com/ [websense.com] [websense.com]. I recently found a way around the filter, but don't want to report this hole in case the management decide to stop me using this way around the filter.
There! Fixed that for ya.
Re: (Score:2)
2. The system administrators, WHO WANT TO KEEP THEIR JOB, are going to go into a tirade of how he subverted their systems and purposely used "nefarious methods" to break system security, etc, etc. Basically, it's politics here - they don't want to look bad and/or lose their job so they will do everything in their power to make him look like a bad guy (which, to some extent, he is).
To clarify, in a publicly funded school, it's not just keeping their job, but keeping it for 25 years so they get that nice retirement.
People should have relatively little faith in most sysadmins who work at schools.
At one school, a group of us were trying to set up a wireless AP, but got it killed because of IT.
I'm not even talking about being on the "network", but getting a DSL line in, paying for it with student government funds, a banner page clearly identifying the AP as nothing to do with the school,
Re:Wake up please. (Score:5, Insightful)
Whether it's wrong is up for debate. I can see how someone could think it was wrong, or morally neutral but stupid, or perfectly fine.
Re:Wake up please. (Score:5, Informative)
No, technically, he did the illegal thing, and thus is getting punished. Whether it's wrong is up for debate. I can see how someone could think it was wrong, or morally neutral but stupid, or perfectly fine.
Whether it's wrong and if the punishment was extremely excessive is up to debate. Premeditated murder, manslaughter by negligence, and Murder in the name of self defense can warrant totally different outcomes. It looks to me in this case intent is being totally ignored.
Re:Wake up please. (Score:5, Informative)
Premeditated murder, manslaughter by negligence, and Murder in the name of self defense can warrant totally different outcomes.
Murder is the illegal killing of another human being.
If it's legal for you to defend yourself with deadly force then it is, by definition, not murder.
If you are in a jurisdiction where it isn't legal to defend yourself then the fact that you were defending yourself is irrelevant.
Re:Wake up please. (Score:4, Insightful)
If you are in a jurisdiction where it isn't legal to defend yourself then the fact that you were defending yourself is irrelevant.
Not necessarily true. The law doesn't treat all acts with the same outcome as being indistinguishable.
Here in the UK, there is a somewhat limited scope for self-defence as a defence from a murder charge. It wouldn't work in the case where my response was disproportionate to the threat. For instance, if an unarmed man attempts to mug me and I pull a gun and shoot him, even though I can reasonably say I feared for my life, I would probably still be convicted of murder.
Consider as a contrast, though, a case where I'm walking down the street, see somebody I don't like, pull a gun and shoot them.
In the latter case, I could expect to spend 20-30 years in prison for my offence. In the former case, I'd be unlikely to be inside for 10.
Re:Wake up please. (Score:4, Interesting)
You are so right about intent. Ignoring the kid's intent is part of what makes this repugnant.
In my workplace, I get technical people to work for me by honouring their expertise and sometimes cracking just a bit dumb. IT managers especially do not respond well to any hint that you know they are doing a second rate job. But academics and students should thrive on give-and-take. This kid acted in an academic sort of way at a university, and that should be fine. University is not the place where you should have to learn how to deal nicely with incompetent people. So I find it quite awful that this university is discouraging take free learning process.
Sucks to be the IT guy, but the best IT managers I ever saw at UNO were bored academics. Not always entirely technically competent, but they understood where we were coming from and knew how to keep us in line. And quite happy for us to point out security holes.
Re: (Score:2)
In a democratic country, whether its illegal or not should also be up for debate.
Re: (Score:2)
It was up for debate and our elected officials decided that it was in our interests to outlaw breaking into computer systems without express permission from the rightful owners. Revisiting the laws should have no impact on this persons case. We can't have it both ways. We here say that it is not okay to make a new law to make a person guilty of a crime that wasn't on the books. We can't then turn around and say that we can ignore the laws to make a person not guilty.
This person knew, without a doubt, that w
Re:Wake up please. (Score:5, Insightful)
We can't then turn around and say that we can ignore the laws to make a person not guilty.
Two words: "Telecoms" and "Wiretapping".
Try again.
Re:Wake up please. (Score:5, Insightful)
Your desire for vengeance will only serve to drive the next guy underground. I certainly would know better than to come forward in a world with an attitude such as yours. You all are so quick with your "lock 'em up" bullcrap.
Re:Wake up please. (Score:5, Insightful)
If some asshat broke into one of my servers then told me how, I'd send his ass to jail too. If he contacted me and said "I would like to break into your server then I'll tell you how", I'd pay him to do it under controlled circumstances. However, if he just up and did it one day, it would cost me tens of thousands of dollars in cleanup.
So just because someone asks beforehand means you can trust them to not require a cleanup afterwards? What kind of arbitrary logic is that? If you don't trust them and that's why you want it done under controlled conditions such that everything they do is recorded then you may as well do it yourself. Someone who doesn't ask isn't necessarily malicious as in this case but someone who does ask can still be malicious. You just have a better chance of the person(s) not being malicious if they do ask but there are exceptions on both sides of the situation.
Re:Wake up please. (Score:5, Interesting)
1. As was said in the story, you have an opportunity there to pull a potential fence-sitter over to the white-hat side of things, and you can only do that if you don't send them to prison on the spot. To not understand this is to be missing a fundamental requirement of anyone on the payroll -- "don't be a jerk!"
2. They're not very good at their job if some pinhead waltzes into the network and screws around like that.
But maybe that's why some engineers and administrators get so hot headed about this sort of thing. When it happens it draws unwanted attention to their own potential incompetence, and any rational human being would be pretty threatened by that.
Still, Don't be a jerk.
Re:Wake up please. (Score:5, Insightful)
2. They're not very good at their job if some pinhead waltzes into the network and screws around like that.
It's not just that. If they responded this way, then it means that they don't want to learn. If you plan to employ them for the long-term, that's just as important as their current skill set.
Re:Wake up please. (Score:5, Insightful)
Besides having been that kid 15 years ago, when I was a teenager, and the IT department and CS staff chose to point me in the right direction. Now I don't do any hacking, or any other illegal, scandalous, shady or immoral activity other then wasting time on Slashdot. I am, on the other hand, a practicing engineer and making the world a better place. If I were treated like this kid, I'd still be in nowhereville. Is the university doing what's legal? Yes. Are they doing what's moral? Fuck no.
Re: (Score:2)
Re:Wake up please. (Score:4, Interesting)
Robin Hood stole from the rich and gave to the poor. In this situation, he could have only stole from the poor, but stole from nobody and told the rich that stealing from them was feasible if somebody else wanted to be a true anti-Robin Hood.
It's a shame people think most hacking involves breaking down hex codes. I've had my debit card number and pin stolen twice from the nearby grocery store, and I'd love nothing more than for somebody to do it again who would actually tell them how it was done and how to prevent it in the future.
Re:Wake up please. (Score:5, Interesting)
>Robin Hood stole from the rich and gave to the poor.
Just for the record, that's not true. The actual legend, which is at least in part based on facts, is that he led a revolt against a corrupt aristrocracy that overtaxed peasants (to the point of leaving them unable to eat). The revolt consisted of robbing said corrupt aristocrats (in particular the tax collectors) and then giving the money back to it's rightful owners.
The oldest version of the legend I could find in a book (published in the 1700's) explained their system as follows:
1/3 of the money the aristocrat had was left with him - (this was deemed a fair amount, even in taxes)
1/3 was given to the peasants it came from - (that was deemed fair by said peasants)
the last 1/3 was kept by Robin Hood and his men to buy their own food and weaponry.
Basically, an early form of guerilla warfare and civil disobedience rather than outright theft.
Most modern tellings do remember that Robin Hood was born a nobleman and a knight (Sir Robert of Locksley) but very few recall the end of the legend completely (as per said oldest book version). Most end with the return of Richard I from the crusades who punishes his corrupt brother and the aristocrats who scored from the system he set up. According to the older versions though, he didn't just punish them and pardon Robin Hood. He then rewarded Robert of Locksley for what he deemed exceptional service to the country, by greatly upgrading his title and making him the Earl of Huntingdon.
Said title is still extant, and I do believe it's carriers take some pride in being (probably) descended from Robin Hood.
Of course, with an almost 500 year old legend, a lot of facts are not known - especially when the oldest book about it I could find was written more than a 2 centuries after the fact, but the old 'steal from the rich, give to the poor' idea is really a rather massive oversimplification of what he said to have done. I think it would almost be more fair to think of Robin Hood as an early form of a welfare system in a taxed-state.
Re: (Score:3, Insightful)
Oh, sorry, you're in the camp of people who actually believe you won't go to jail for doing the right thing because our laws are perfect and the legal system has no flaws.
Innocent people do jail time, innocent people are further up on the 'got screwed over by the justice system' list than this guy, so don't go on about how he wouldn't be facing jail time if he'd technically done the right thing.
Re: (Score:2)
Uhuhuhuhuhuh you said pubic
Re:Wake up please. (Score:4, Insightful)
He broke in. He caused damage. If you know that a system has been under control of an unauthorised person, any competent system administrator will tell you that the only thing you can do is a) reinstall and b) treat the data on the system as potentially compromised from that point on. That takes work
Now, he has many potential arguments
but the argument that he didn't do damage isn't one of them
Re:Wake up please. (Score:5, Interesting)
The cost of which should fall on *you* since it was *your* job to configure the network to prevent such attacks, and *you* failed at it.
Yeah, it'd make the sysadmins' jobs a lot more hellish, but hey, as long as we're in this wanking hate session... plus it's only logical that if you're going to penalize somebody for the sysadmin's incompetence, that it should be the sysadmin himself.
Realism ahoy (Score:4, Insightful)
Yes, anyone should be able to break the law and then get off scot-free by claiming it was in the public best interest. Nevermind the cost of the sudden campus-wide security lockdown, nevermind that IT staff may have lost their jobs, nevermind the people now losing sleep because they don't know how to handle things. Nevermind the risk incurred in that if he caused outages he could have disrupted phenomenally expensive research projects. Nevermind that most whitehats leave doors open behind them.
He meant well.
He deserves what he got. Quit trying to make heroes out of everyone looking at jail time. Jesus.
Re: (Score:2, Insightful)
Re:Realism ahoy (Score:5, Insightful)
Looking at your response, then, there seems to be no reason what-so-ever to be a white-hat.
Honestly, if you're going to get the book thrown at you, fucking make it worth it. Destroy those phenomenally expensive research projects.
I mean, after all, if he's going to get punished for things like this, it's better off at least feeling the satisfaction of really dicking someone over. I mean, if they're going to fuck your life up for the end of all days, you may as well have done it to them first. At least then you have "an eye for an eye".
Right now you have "an eye for a paper showing precisely how I could have taken your eye".
I would never do it. (Score:2)
>Looking at your response, then, there seems to be no reason what-so-ever to be a white-hat.
Duh!
Would you? I wouldn't. Would I break the law and then hope people thank me for it instead of prosecute me for it, all to help my university? Fuck no.
Everyone knows no good deed goes unpunished. For good deeds done through illegal means the punishment is even more sure.
So yeah, if you're gonna hack, I hope you're getting something out of it - ass, money, personal satisfaction of dicking someone over, whatev
Re:I would never do it. (Score:4, Insightful)
Re: (Score:3, Interesting)
People like you create "fail upward" workforces. (Score:5, Insightful)
Someone equally or more competent than your own staff tested your infrastructure, found its flaws, and gave you a free report on it, and you're going to beat them over the head.
This "law uber alles" authoritarian streak is what causes most companies to become plagued with "upward failure". The truly competent don't dare to speak inconvenient truths, and the incompetent are given free reign to take advantage.
Re: (Score:2)
Nevermind the cost of the sudden campus-wide security lockdown, nevermind that IT staff may have lost their jobs, nevermind the people now losing sleep because they don't know how to handle things. Nevermind the risk incurred in that if he caused outages he could have disrupted phenomenally expensive research projects.
I was with you until that last sentence there. Are you going to give a "think of the children" statement next?
Re: (Score:3, Interesting)
But at least your ethics are intact.
Though perhaps there's some sort of happy medium where you could get your punishment rocks off while at the same time places like Carleton don't have to scare everyone into never reporting anything. You're never, ever going to stop a hacker who loves what they do from hacking. Ever.
Those of
Re: (Score:2)
"Yes, anyone should be able to break the law and then get off scot-free by claiming it was in the public best interest."
Your right. We should leave that to our government.
Re: (Score:2)
Let me follow this logic -- if HE caused the campus-wide lock-down, that's worse than leaving the campus insecure to more ill-intentioned persons?
I don't follow.
The security problem didn't exist because he hacked the system, the security problem allowed him to hack the system. The security problem should have required a lock-down before he ever hacked it, but the team at the University didn't realize it (or didn't care).
His actions changed nothing but awareness.
Re: (Score:2)
Well, I will try to make it simple for you...
If you murder a person who has an unsurvivable cancer you're still a murderer and you still deserve to be punished... Yes he was going to die anyhow but just because he was going to die doesn't give you the right to end his life without permission.
That's a rather extreme example of where your logic is fatally flawed. There are some situations where we are humanly entitled to violate the law. This isn't one of them in the eyes of the property owners and, it would
Bullshit (Score:5, Informative)
From the article: Det. Michel Villeneuve of the Ottawa Police high-tech crime unit said yesterday that a suspect used Keylogger software and magnetic stripe-card reader software to acquire students' information.
Using keylogger software is not White hat material sorry. You install a keylogger on a random machine and watch people come in and access their email / student accounts and then later go "me l33t haxor?"
Computing access in schools is a privilege and I see an abuse of privilege here by installing keyloggers. Sorry but physical access to machines means all security is out of the window. Sure the admins can install a variety of tools to detect keyloggers but there's always going to be one program that will escape detection.
Should I blame Soulskill? Such a verbose summary and no mention of keylogging software.
You've got some black on your white hat sir. (Score:4, Insightful)
What he did was gray hat and not white hat.
If he had gotten the permission of the school to do security testing first then he would be a white hat. He had good intentions, but by breaking into a system he didn't own without the owners permission he broke the law.
-Jim Bastard
Re: (Score:2)
Amen. A prudent whitehat never touches someone else's system or network without first obtaining written permission, using language that has been reviewed and approved by his own lawyer. And the lawyer had better be familiar with the various, and latest, federal and state computer intrusion statutes and appellate court decisions.
Fail to do this and you are in the category of Whining. IAAL.
P.S. (Score:3, Interesting)
Reporting a vuln using a lawyer as a go-between completely removes you from the possibility of criminal prosecution, unless you left a trail of bread crumbs. Attorney-client privilege beats any number of anonymized proxy servers.
I'd love to see them poll a jury on this (Score:2)
Re:I'd love to see them poll a jury on this (Score:5, Insightful)
No, breaking in via a keylogger and a magstripe reader is the same as stealing your neighbor's keys, making a copy, poking around his house while he's out, and then telling him that he needs better security.
Re: (Score:2)
I think the point is, what is the fucking point of putting somebody in jail if they had every opportunity to rape you, and didn't?
What exactly are we rehabilitating here? If it's a desire to watch some TV in your living room while you're not home, years in jail seems a little excessive to a tax payer like me.
If somebody did that to my place or my parents', I don't think I'd feel so violated as to think I'd feel safer if this one guy was locked up for 5 years.
Re:I'd love to see them poll a jury on this (Score:5, Insightful)
Except he didn't "alert his neighbor". He opened the door (which he has no business even trying to do in the first place), and then riffled through the neighbors desk, refrigerator, garage, and basement. Before leaving he made a copy of the front door key, installed taps on the phones, a webcam in the bathroom. Then he told the neighbor that his door was unlocked, his checkbook needed balancing, his taste in soda abominable, his garage was a mess, and the furnace filters needed cleaning.
Re: (Score:2)
Re: (Score:2)
Doing the right thing (Score:3, Interesting)
Your old school did, indeed, do the right thing. This one is not. The guy came forward with what he discovered, in good faith! It gives them the opportunity of preventing a malicious person from causing real damage... and they are going to punish him for this? That's just wrong.
In fact, it could theoretically turn many others into "black hats" that will go after them, just because they were so hard-nosed with this guy who was, let's be honest, doing them a favor!
Time for that school to get a clue. I'm really disappointed in their actions.
Re: (Score:3, Insightful)
If he was poking around in an area that made any student information not considered "directory information" (address, campus box, telephone, degree, or e-mail address) accessibl
Re: (Score:3, Informative)
It is quite likely that Canada has similar laws in effect.
Should have submitted it anonymously (Score:5, Insightful)
He should have just submitted the 16 page paper anonymously. If he was truly trying to do a purely good deed so there shouldn't have been any need for his name to appear on it for the purposes of fame or positive retribution.
Given the number of previous incidents similar to this, one would have thought he'd have been aware that this is almost always the outcome. Try entering into a store after hours (when closed) without due permission, without stealing anything and reporting how you did it. Compare the outcome.
terms of use (Score:5, Insightful)
Well said (Score:3, Insightful)
Not only did he break rules but he did it maliciously (no grey area here) when he used keyloggers. I can see what would happen if I did the same thing where I work - they'd fire me, throw my ass in a federal pound me in the ass prison and generally my life would be ruined
What we have here is a not a hacker, not a white hat or a black hat hacker. We have a script kiddie. Sadly most of the posters before you seem to have already started making a hero out of this "vigilante".
Re: (Score:2)
Re: (Score:2)
That is what due process is for. He will stand in front of a judge and be judged. If they feel that he did the "right thing" then they will levy no punishment. The school did the proper thing which was to uphold the law and not judge the student.
As a student of Carleton... (Score:5, Informative)
I can tell you firsthand that the administration did not take kindly to this.
With regards to the magnetic stripe thing, it's not surprising that those in charge reacted strongly and sharply. We had recurrent incidents on campus last year with sexual assault and they had to lock down all the residences and the labs, and as such, they took great pains to inform the students who had access cards for the suite residences that they would not, in fact, be in danger, be it financial or otherwise.
Ah, so administration ego safety! hurray! (Score:5, Insightful)
it's not surprising that those in charge reacted strongly and sharply. We had recurrent incidents on campus last year with sexual assault and they had to lock down all the residences and the labs, and as such, they took great pains to inform the students who had access cards for the suite residences that they would not, in fact, be in danger, be it financial or otherwise.
you have to love an administration which cares more about their ego than the rape targets they were trying to help.
Mag cards are worthless (Score:5, Interesting)
When I was a grad student, the lab in the education department asked me to implement a "fast, simple" method of pulling up student records. I bought them a cheap mag-strip reader and wrote a little script that would grab the Student ID from the card, then submit it to their campus information system. The lab manager (who was not a tech) was shocked that it worked. He assumed the information on the card would be encrypted or something.
That same year a buddy of mine who worked for IT services put together a demo of how easily the mag cards could be forged - with less than $100 + a cheap laptop. His bosses were impressed and asked him to demo it for one of the VPs. When he did, the VP told him, "You know, you're on thin ice here. You could get in a lot of trouble for this."
In essence, the administration (who purchased the card systems) didn't want to know if they were secure. They just wanted to give the impression of security.
Overreaction? (Score:4, Insightful)
We had recurrent incidents on campus last year with sexual assault and they had to lock down all the residences and the labs, and as such, they took great pains to inform the students who had access cards for the suite residences that they would not, in fact, be in danger, be it financial or otherwise.
If your school is locking everything down thanks to sexual assault, because of the nature of the crime, they're obviously not thinking straight. That is a reactive measure and only instills panic. In the case of a shooting however, that can be a proactive measure to ensure that more people aren't harmed.
Get real (Score:2, Insightful)
"The truth is, some university students are going to have the desire to hack something."
The truth is, some university students are going to have the desire to light things on fire, too. How many buildings do we let them practice on before we arrest him?
The truth is, the kid broke the law, and it is nearly inconceivable that he didn't know it at the time he did it. For every hacker they know about, there may well be at least one more they don't know about. But for every hacker they crucify, there will be doz
Tactless (Score:2)
When you disagree with someone's opinion and wish to offer a rebuttal; most times, saying "You're a moronic shithead and your logic is atrociously sophomoric" will not garner a positive response. On the same token, surreptitiously infiltrating your school/company/organization's systems and offering a similar statement in hacker-terms isn't likely to get much praise: no matter how right you might be.
Yes, to us humans, the approach is almost as important as the idea.
Re: (Score:2)
True, but pointing out the flaws without a real-world example would allow incompetent officials to plausibly spout off denial and claim the flaws are merely "hypothetical"
Is this white hat hacking? (Score:3, Interesting)
The subject of this story says White Hat Hacker. But it seems to me that the break-in was typical black hat hacking. The info to the system administrators may be a typical white hat hacker action, but this does not make the whole thing white hat.
Re: (Score:3, Insightful)
Typical black hat hacking? Like bringing all the servers down, or taking private information for criminal use? Seriously?
Student looks around in his universities network. Goes past poorly implemented safeguards, writes about how it can be improved.
Sounds like an extra credit assignment to me.
Re: (Score:2)
Are these actions necessary to consider it black hat hacking?
Most of the people convicted of hacking (or at least those I have heard of) actually did not do those things. They just broke in to prove that they could, looked around in the systems and used them as a base for hacking into more systems.
The student is stupid (Score:2)
Any system has some range of conditions that it is intended to tolerate, and there is always a possibility that something outside of that range will break it. As long as people who use and run those systems are aware of this, there is no point in reporting "vulnerabilities" of this kind, in 16-page papers or otherwise. I am sure, I can get a bulldozer, add some armor made of steel and concrete, drive it into a data center, and cause a massive denial of service for everything in it. And yet this is not a goo
In other news (Score:5, Insightful)
Mr. Johnson was recently arrested after finding Mr. Smith's front door unlocked.
Mr. Johnson snuck into Mr. Smith's home and watched Mr. Smith sleeping for several hours.
Afterwards Mr. Johnson provided a detailed account of how Mr. Smith had left his front door insecure and ways to better secure the front door.
Mr. Smith wasn't amused by the report and had Mr. Johnson arrested for tresspassing and breaking and entering.
Mr Johnson's defense is grounded in the fact he was helping Mr. Smith become a better home owner by sneaking into Mr. Smith's house.
-----
You now realize how stupid you sound when you defend someone under these circumstances. This whole White Hat nonsense is about as intelligent a the statement, "Well your honor his front door was unlocked, and obviously I should be allowed to go in there as long as I don't break anything, afterall if he didn't want people in there he should have locked his door at the very least..."
Put him in jail and maybe these adult children will grow up.
Re: (Score:3, Interesting)
I will choose my words carefully.
I'm calling you on that. I think you are being dishonest with us. In short, I don't believe you are telling the truth.
Even if you had left the keys in your car and had your car taken by someone on the street you would NOT be thanking them for teaching you the errors of your ways. You'd be screaming for justice. When they've violated the privacy of your home you'd be doing the same damned thing only louder. Please be honest with us if you're going to post. Thanks.
happened to me, twice... (Score:3, Insightful)
I've noticed that generally, if the admins are worth their salt, you don't need to detail every single step to produce an exploit. Just provide enough information to walk them up to the open door, and let THEM walk through it. In fact, writing 16 pages detailing every step of the way makes them question WHY you were so thorough. It also makes them look bad to their higher-ups because some "punk kid" figured out something they didn't.
I speak as someone who had a run-in with both high school admins and university network admins. Two distinct cases, but with very different results.
In HS, a friend installed a homebrew backdoor onto every computer in the HS computer lab. It permitted basic keylogging functions, as well as partial remote control (mostly just starting programs remotely). I just de-backdoored the computer I used for class and let others fend for themselves. When he reinstalled the backdoor on my computer the following week, I turned around and killed the backdoor on every system (it supported a room-wide purge in the event that it needed to be removed quickly). Unfortunately, stopping it also caused an error pop-up on every screen in the lab.. at which point everyone knew something was up (but no one knew it was me who stopped it).
After class, I went to the admins to report exactly how my friend performed the attack, how my friend installed the backdoor, how I stopped it, etc. I figured I was in the clear because I responded as soon as the problem became visible. The following day, I was called into the principles office and threatened with expulsion for "hacking the network". I couldn't convince him that I didn't "hack the network", and it didn't matter that I *STOPPED* the hack; I was in trouble because I drew lots of attention to the problem and proved the admin to be an incompetent moron (the backdoor only existed because the admin's password was his userid+1). My friend was never called into the office, nor given any punishment.
Fast-forward to college: Through a series of (individually) harmless actions, I discovered that one could elevate their user access from "student" to "full time employee" and gain access to a handful of otherwise inaccessible directories (including source for various university projects). As soon as I realized the problem, I went to the admins and e-mailed them personally with a much vaguer description of the problem. I also couched it with terminology that suggested that I didn't know what I was doing ("I think there might be a bug somewhere in X because when I did X a bunch of directories became accessible that weren't before. It also gave me access to what might be the source code for project Y, but I didn't touch it because I don't think I'm supposed to see it. But I think you guys should know that there might be a problem.")
The admins thanked me, said they'd look into it, and a day or two later the hole was patched. I never had any problems with them, and continued on my merry way through college.
Look, People, This is REALLY SIMPLE... (Score:5, Insightful)
Bottom line: it's only White Hat if the "target" asks you to perform the security audit. Pure and simple. Anything else is at best Grey Hat, and that gets you subject to prosecution at the target's discretion. Period.
This kind of stuff is in a completely different category than analyzing the theoretical weaknesses of a system. Or even cracking software/etc on your personal equipment. Or demonstrating faulty design in a [ahem] subway system WITHOUT HAVING TO SCREW WITH THE SYSTEM. Once you start abusing other people's stuff without permission, I couldn't care less if you were Mary Poppins. IT AIN'T YOURS, SO KEEP YOUR FINGERS OFF IT.
This isn't Investigative Journalism. Which at least has standards of ethics and conduct.
People, quit glorifying these idiots.
Re: (Score:2)
White hat hackers break lots of things without permission. Is DVD Jon a black hat for hacking the CSS system allowing us easier DVD access on Linux now? He'd certainly never have gotten permission to do that.
Nor would many researchers get permission to test the products they test for defects (physical hacking).
Seems to me it could have been made real easy if.. (Score:2)
he had sent the 16 page report as an anonymous coward.
The 2 page addendum should have read "if you'd like to talk about this, please sign this contract and return it to this po box, and I will store it in a safe place while I help you guys implement your patches/fixes/etc.
Acting like a child to protect ones own inadaquacy (Score:3, Insightful)
No amount of the blame game will change the fact that their system is insecure and securing it is in everybody's interest and is really the only thing that matters.
The submitters policy is exactly what should be used, it reflects real life -- look at the that Switzerland man that got hundreds millions and a new identity from the USA IRS and Germany for his supposedly black-hat acquired data that uncovered millions in tax fraud.
Not all black hat work is always bad, however it is on the black-hat himself to both make prove this in his case and minimize his damage. This is simply reality.
Today's black hats do not make noise. Their work does not show up. If you are hacked you probably do not know, and most certainly will not if these type of guys are in charge.
It is not long till people realize that their personal data has long been available on the market due to bad practices like this and organizations get back lashed against. Sadly for both consumers and these organizations, and even the IT guys they are going to take the childish way out and wait for this to come to them.
I kinda went off topic, but its a fundamental thing. **playing this blame game destroys everybody, can makes white-hats turn black in disgust with the politics, and will eventually hurt both the general public and the industry greatly**
Re: (Score:3, Interesting)
How would you feel? (Score:4, Interesting)
It's late at night. You're still up messing around on your computer. It is otherwise very quiet.
Suddenly, you hear weird noises at your door. It's not an animal... it's something working at the keyhole.
At this point, some of you are already reaching for a gun, a baseball bat, something. Others are calling 9-11. Whatever is going on, it isn't right.
If for some reason, you just go to the door and open it to see who is there, would you feel friendly to this guy if he smiles and says "I am doing you a favor!"
Okay, this isn't parallel enough...
How about you came home from work to find a note on the inside of your home explaining "Hi, I got into your home but I didn't take anything. Here is how I did it and what I saw." Come on! How creepy is that?!
What this guy did was a classic security breach... the kind everyone is already afraid of... the kind that always gets headlines when "personal information is exposed." In some stupid way, maybe he had some twisted idea that he was doing something noble or scholarly. But in the real world, we already know there is a balance between security and convenience. Once in a while, people need to be reminded that the balance is often set too far in favor of convenience, but this guy did too much. Stopping at "I was able to install a keylogger on this system, ran a test or two and disabled it. The log files are here for examination. The information on this computer and accessible through this computer is vulnerable." would have more than sufficed... but even then, it's a bit too much. Perhaps it would have been better to simply place an "Out of Order" sign on the computer to prevent anyone from using it.
There is a difference between noticing that someone left a door unlocked and telling someone and actually going in and rummaging about and writing up a big report on the topic.
He needs a slap on the wrist for this. No doubt about it. But nothing permanent... this time...maybe. Some people actually lack some impulse controls in their personalities and get giddy at the notion that they have some power or superiority over others. Some people are just broken that way.
Re: (Score:3, Informative)
How about if the analogy was a car? Or more directly, how about where you work?
The point I am driving home is that not only was "a computer network" broken into or entered without proper authority, but someone's very realm of personal interest and responsibility was also invaded.
My office was broken into one day not long ago. "Nothing was taken" but file cabinets of executive offices showed signs of being damaged and possibly entered. Every last person who works there was given lifelock service and every
Seriously? (Score:3, Interesting)
I'm honestly appalled by the response from some of you saying he deserved what he got.
This is a University, not a business. There's no damage, period. There's no cost, no down time. Wtf is wrong with you people?
This sends the wrong messages. Especially considering we want talented individuals in the IT field. I'm sick an tired of seeing these cookie cutter CIS & IST majors graduating having ZERO or less then one year of real world experience. I would much rather hire this guy. Even more so because even in the position of having the possibility to be malicious in his intent he didn't turn to the evil side. Now you're just gonna turn him into a pariah and ruin the life of a person who clearly would have been a more then productive member of society.
Breaking and entering to prove a point != Whitehat hacking
Stop pretending that it is.
Fuck the politics. This is the difference between right and wrong.
You people make me sick.
Yup - you nailed it (Score:2)
Here's your every day problem. Law and moral justice are drifting very far apart..
To the morons that are in the process of ruining someone's future, two questions:
- what did YOU do when you were at college?
- what would you do if this was your own kid? Sure, I'd give him hell but I wouldn't even remotely considering getting him a rap sheet.
Yes, I said morons. I meant it, too.
Re: (Score:3, Informative)
> Breaking and entering to prove a point != Whitehat hacking
How is it not? Because one's breaking into a computer and one's breaking into a house?
This guy could have written some software that popped up "keylogger!" after someone logged in, and found a member of staff to show. Or he could have found a member of staff, and demonstrated logging his own password and magstripe.
Instead, he accessed THIRTY TWO different student accounts. Really, how many do you need to test to be sure it works?
No damage? Really? (Score:4, Informative)
Actually, did you read the article? The bottom line is that he revealed account information on students to multiple people who were not in the position to fix any problems (including other students via e-mail).
White hat hacking, my ass.
He used a keylogger and magnetic card reader to capture the information to break into accounts. After that, he sent the 16-page paper (which WAS sent under a psudonym, since people keep suggesting that) not to a system administrator or someone who could deal with it quietly, but instead to a secretary, and eventually he e-mailed it to 37 other students. Fantastic move, that. Included in the paper was the personal account information of the students. So yes, he revealed the account information of his victims to other people.
Maybe he had good intentions, but that puts him pretty firmly in the "Please, prosecute me!" camp. If he'd revealed information on me that allowed someone to make campus purchases as me as well as check my school records and access my email, I'd be pressing charges too.
Maybe there was no damage to the university's infrastructure that we know about, but I'm pretty sure that those students would have been damn lucky if no one went into their accounts and took advantage of them, the way he handled it. And THAT, my friend, is why he's being charged.
good deed? (Score:2)
Pointing out people's security problems to them is usually about as "good a deed" as saying something like "Did you know you have a big, ugly, black mole on your nose? You should really have that removed."
Return the favor (Score:2)
If you act nice to someone and they are rude in return, they deserve no respect. Just mention how the sixteen page report will become public if they pursue the matter. Make sure the document is placed somewhere NOT UNDER YOUR CONTROL so that a restraining order will have no effect.
That's a nice network you have there. It would be shame if something were to happen to it.
Blackmail is a dirty word. I prefer extortion.
Let's play jeopardy!! (Score:2)
"Hacking, for 25,000 dollars."
Slashdot, University Brings Charges Against White Hat Hacker.
"What is the best way to turn a well-intentioned white hat into a revenge-motivated black hat"?
ABSOLUTELY CORRECT!
Punishment is a message for other hackers (Score:3, Insightful)
The real meaning of punishment here, from the University's perspective, is that "don't mess with our systems, or they'll be consequences". It's a punishment to discourage others, who may not be that good, to attempt hacking.
I have no sympathy for the guy. (Score:3, Informative)
He broke the law and stole 32 students' passwords. That's not "White Hat". White Hat would have been to publish his findings without actually stealing the passwords.
Re:No harm, no foul (Score:5, Insightful)
Exactly, if the law were balanced in this area the case will probably be thrown out (if it even reached court) and the student let-off. I bet he gets a prison sentence, or harsh fine and community service. Worst of all he'll have a criminal record, meaning he might not be able to get a job. Is one other person on the dole -- when their crime is nothing more than curiosity and a desire to help -- useful to society?
It's not just the university admins who have a bad attitude, it's all society that have been conditioned to believe the hacking == terrrism meme.
I would suggest that any prospective students reading this politely contact this university and explain why you will not be choosing them. Same for any parents who's kids might be thinking of going to Carleton.
Do have some pity for those admins though: they're probably just MCSE's.
Re:No harm, no foul (Score:5, Insightful)
Ya know, if he saw a flaw (and obviously there was something wrong since he installed a keylogger on at least one university computer) he should have reported it to the IT department. He decided to act and break the law so he should man up and face the consequences.
At the absolute most, he should have stopped after installing the keylogger and reported that to the IT department. He could have even reported it anonymously. The fact that he then took account information and accessed people's accounts goes way over the line.
Re:No harm, no foul (Score:5, Insightful)
Yes, but the difference is that it was the university's own department. It's not just any organization. Students, by definition, are going to make some bad decisions along the way, and one of a university's jobs is to minimize the damage of those decisions so that a student can benefit from learning from their mistakes.
It's one of the reasons colleges like to have "campus police" rather than real police: keep everything "in the family" and out of the "rap sheets" where possible.
Academic sanctions, sure. But involving law enforcement where no significant damages have occurred shows a serious lack of judgment somewhere in the administration. I would emphatically not recommend attending any school which prefers to make an example of someone over protecting their students from making life-altering mistakes.
Re:No harm, no foul (Score:5, Interesting)
Re:No harm, no foul (Score:4, Insightful)
University is for learning and documenting what you know for others to use, not for fearing that you might anger some incompetent sysadmin.
From TFA: This is the second time Carleton has dealt with hackers in recent months. In late July, a hacker broke into the e-mail system.
Let us agree on the incompetence. This is their second incident in 3 months.
Re: (Score:3, Insightful)
Do you know that no significant damages have occurred? If I were one of the 32 students whose personal information he e-mailed to 37 other students plus sent to a secretary and God knows who else, I would be pressing charges against him. Just because he didn't damage the infrastructure doesn't mean that no one else he shared the information with didn't abuse it to access educational records, email accounts, or to buy things on campus pretending to be a different student.
If a corporation, let's say a large
Great way to encourage white hats (Score:3, Insightful)
keyloggers on student laptops is not hacking ... (Score:5, Insightful)
At first I was sympathetic ... but a moments' thinking changed my mind. The guy deserves a criminal record, and to be expelled.
Thnk about it for a second. You don't install a keylogger on a server and then capture logins from students from remote machines ... the keyloggers were installed on the students' laptops. This is NOT "hacking" or "cracking" the university's computers. He installed keyloggers on up to 37 other students' laptops to capture their login info.
How would you react if someone installed a keylogger on YOUR laptop? And dozens of others? Whether he tookThis isn't Soviet Russia - laptops don't (or shouldn't) log YOU!
If he had physically assaulted 37 students, rather than compromising their laptops and account info, he'd be in jail. Ditto if he had vandalized their cars, instead of their laptops. But looking at the comments, it's okay to screw with other people's property if you want to look 1337 to your peers.
Expulsion is the least the university can (and should) do, as well as pursuing criminal charges.
Re:keyloggers on student laptops is not hacking .. (Score:4, Informative)
Thnk about it for a second. You don't install a keylogger on a server and then capture logins from students from remote machines ... the keyloggers were installed on the students' laptops. This is NOT "hacking" or "cracking" the university's computers. He installed keyloggers on up to 37 other students' laptops to capture their login info.
Not necessarily their laptops. A lot of universities have computers available for student use and that does not mean he set up a kelogger on a server. Contrary to popular belief, many students don't own or at least don't carry their laptop around campus with them.
Re:No harm, no foul (Score:4, Interesting)
Is it really that hard to get a job in some places if you have a criminal record? I have a record - for Phreaking of all things (actually, the charge was "Obtains other service credit by fraud"), and it has never had any effect on my ability to find work. Most employers don't ask, and the very few that have have just said, "well, you were young, and it shows technical aptitude" or something along those lines and then never mentioned it again.
Note: I don't live in the US, nor have I ever applied for a job in that country, so it might (or might not be) just a US thing.
Re: (Score:3, Informative)
Re:No harm, no foul (Score:5, Interesting)
No, some anger is justified. The Morris Worm was not written to ruin systems, it was written to probe them and report its results. Nevertheless, it brought down UNIX servers worldwide becuase it was badly written. Doing 'harmless' security cracks against a badly secured network can in fact trash that network, by accident, as you tweak local settings in 'harmless' ways.
As well meant as it was, this is why you don't put your name on that paper about the flaws. You send copies to the core administrators and money providing bureaucrats, from their own email accounts, and possibly to the staff of the school newspaper.
Re:No harm, no foul (Score:4, Interesting)
It is worth noting, that despite the pain caused by Robert T. Morris with the release of his worm and the criminal record that followed, he has managed to find productive work (currently a professor at MIT).
Perhaps it is a good reminder that while punishment may be appropriate, it is not necessarily good for society to punish people continuously for past misdeeds.
Re: (Score:2)
Well, you get the Most Off-The-Wall Post on the Internet Award.
I give you three internets and advice to see a doctor about that.