Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Your Rights Online News

Reporters Threatened, Labeled Hackers For Finding Security Hole 120

colinneagle writes "Scripps News reporters discovered 170,000 records online of customers of Lifeline, a government program offering affordable phone service for low-income citizens, that contained everything needed for identity theft . Last year, the FCC 'tightened' the rules for the program by requiring Lifeline phone carriers to document applicants' eligibility, which led to collecting more sensitive information from citizens. A Scripps News investigative team claims it 'Googled' the phone companies TerraCom Inc. and YourTel America Inc. to discover all of the files. A Scripps reporter asked for an on-camera interview with the COO of TerraCom and YourTel after explaining the files were freely available online. That did not happen, but shortly thereafter the customer records disappeared from the internet. Then, the blame-the-messenger hacker accusations and mudslinging began. Although the Scripps reporters videotaped the process showing how they found the documents, attorney Jonathon Lee for both telecoms threatened the 'Scripps Hackers' with violating the Computer Fraud and Abuse Act (CFAA)."
This discussion has been archived. No new comments can be posted.

Reporters Threatened, Labeled Hackers For Finding Security Hole

Comments Filter:
  • by Anonymous Coward on Monday May 20, 2013 @05:40PM (#43776767)
    That will teach you to use responsible disclosure.
    • Re: (Score:2, Insightful)

      by Anonymous Coward

      I'll beat the others to this.

      This is one of the reasons for why being anonymous is important. This lawsuit is stupid, and since they have a video showing the method, it should be easy to throw out the charge.

      Could the reporter have a rebuttal about them taking down the evidence, saying they destroyed evidence pending the lawsuit?

      • by Anonymous Coward on Monday May 20, 2013 @05:54PM (#43776879)

        But the reporter can't be anonymous and trustworthy. The press are as full of shit as every other profession, so a reporter needs to put her/his name to it or it's worth as much as an empty cup of coffee. By attaching their reputation (good or bad) to a story they can defend (rightly or wrongly) what the've published.

        • by kasperd ( 592156 ) on Monday May 20, 2013 @06:31PM (#43777101) Homepage Journal

          But the reporter can't be anonymous and trustworthy.

          Sometimes the evidence itself is more important than the source. In the particular case, it sounds like the evidence was strong enough that it wouldn't matter which source it came from.

          But the trend with threats and lawsuits against those, who discover security holes, must stop. That trend is a major threat against data security across the entire IT industry.

          People will keep finding security holes. Sometimes you just stumple upon them, without even looking. What are you going to do, once you have found a security hole? Report it and try to get it fixed? Ignore it? Abuse it? If those who do the right thing are going to be the target of threats and lawsuits, that certainly removes incentive to do the right thing. So fewer people will report security holes. And some of those who would have reported it, might instead decide to abuse it.

          If we ever get to the point where doing the right thing is more likely to get you into a lawsuit than abusing the security hole for personal gain is, then the industry is in big trouble.

          Luckily a few companies are taking steps in the opposite direction and are offering cash rewards to those who find security holes. At some point users will have to start taking that into account when deciding what software to trust. But it is a very real problem, when the systems you don't trust are those used by any branch of government. You can't just go somewhere else. And the lack of competition has lead to situations where security concerns are just ignored.

          • Or you know... people could start writing decent secure code to begin with... :)

            I mean SQL Injection attacks, and buffer overflows aren't exactly zero days at this point.

            • by Ungrounded Lightning ( 62228 ) on Monday May 20, 2013 @06:56PM (#43777257) Journal

              Or you know... people could start writing decent secure code to begin with... :)

              Did you ever write a program? Did it work the first time, doing exactly what it was supposed/specified to do?

              Took a lot of debugging and error correction, didn't it? Even if you are a programming expert.

              Now write a program where "what it's supposed to do" includes "not get cracked and used by any malware, known or unknown, past or future".

              Think you'll get THAT right the first time? Even if you are a security expert?

              • Things are rarely "right" the first time. That's why we test stuff before putting it live. Sounds like there wasn't much testing done if it was that easy and obvious to hack.
              • Re: (Score:2, Insightful)

                by Anonymous Coward

                if by "not get cracked and used by any malware, known or unknown, past or future" you mean
                "not list people's SSN addresses and financial data in a google search result"

                then yes i think i can get that right on the first try.

                • "not list people's SSN addresses and financial data in a google search result" then yes i think i can get that right on the first try.

                  And will that stop some fucktard fax monkey from uploading a spreadsheet full of this info to your DMZ where google & everyone else can read it? We don't even know if this was a software fault.

              • This is why a good QA team is always worth having. Sure it won't isolate you from every issue, but it should protect you from some of the obvious stuff.

                Sometimes the problem isn't even to do with software, but with information policy and what can be placed on a server that is on the outside of a firewall.

              • Think you'll get THAT right the first time? Even if you are a security expert?

                Well, yes, that's what makes me an expert. However, TFA is abiout a company putting all of its customer records online, unencrypted and searchable through a simple Google query. There is no excuse for that level of malfeasance.

              • Did you ever write a program? Did it work the first time, doing exactly what it was supposed/specified to do?

                Did you ever figure that was an adequate excuse?

                Not in what you say isn't the truth, because any software that hasn't been shaken down is usually pretty bad, but using the "first time" as an actual reason for insecure software? Completely unacceptable. If you worked for me with that attitude, you might end up in the mail department where you could have an easier job.

                • Did you ever write a program? Did it work the first time, doing exactly what it was supposed/specified to do?

                  Did you ever figure that was an adequate excuse?

                  Of course not.

                  Not in what you say isn't the truth, because any software that hasn't been shaken down is usually pretty bad, but using the "first time" as an actual reason for insecure software? Completely unacceptable. If you worked for me with that attitude, you might end up in the mail department where you could have an easier job.

                  You obviously both

              • by Sam H ( 3979 ) <sam@zoy.org> on Tuesday May 21, 2013 @03:10AM (#43779225) Homepage

                It might take a security expert to write code that works as specified the first time, but it takes a fantastic idiot to put any kind of code in production before it's been debugged and error-corrected.

          • "Sometimes the evidence itself is more important than the source. In the particular case, it sounds like the evidence was strong enough that it wouldn't matter which source it came from."

            Fortunately there have been a few judges lately who have an actual head on their shoulders, and who have ruled that simply telling somebody their fly is open is not the same as rape.

            But these B.S. laws, like CFAA and DMCA, need to disappear. They were ill-conceived and we KNOW that they cause problems. Not little problems, big ones.

            I would keep the safe-harbor provisions of DMCA, and scrap all the rest of it. Same with CFAA.

        • by kmoser ( 1469707 )

          But the reporter can't be anonymous and trustworthy.

          But how can we trust that this is true since you posted as AC?

    • and yet people keep falling for the same traps...

    • by flimflammer ( 956759 ) on Monday May 20, 2013 @07:15PM (#43777355)

      I want to agree with you here, but what the story simply calls "mudslinging" does give me room for pause. According to their legal representation, this access has happened over the period of several weeks, and they systematically downloaded all the records it could in this period of time while attempting to get into even more nooks and crannies of the servers.

      Why would they be sitting on this, continuously prodding the site for over a month while downloading all the records if they were simply practicing responsible disclosure with nothing more than journalistic intent?

      You would think accessing even one or a couple of these sensitive files would have been enough to judge that this content is facing the public and should be reported, rather than downloading all they could over the span of a month (and maybe even longer since these access records seemed to be pruned after 30 days).

    • by Bloem ( 528155 )
      A defense is easy: Does the so-called hacker have a handle? If not, it is not a hacker! Seriously most reporters spend more time recovering handles or other goes-by-the-name-of-references than describing the issue at hand.
    • by oreaq ( 817314 )

      The only responsible disclosure is full public disclosure.

    • How many anonymous 'hackers' are decent folks just pointing out glaring flaws while wisely protecting themselves from idiot lawers and lawmen?
  • by Anonymous Coward on Monday May 20, 2013 @05:40PM (#43776773)

    In America, two business principles apply:
    1. It is none of your business when shit hits the fan, and
    2. It is never our fault.

  • No good deed... (Score:3, Insightful)

    by Anonymous Coward on Monday May 20, 2013 @05:41PM (#43776779)

    goes unpunished.

  • by Black Parrot ( 19622 ) on Monday May 20, 2013 @05:42PM (#43776787)

    Company Spokesman: Surely you don't think it's our fault.

    Company Spokesman: Especially if it's going to cost us money.

    • by t0qer ( 230538 )

      Company Spokesman: Especially if it's going to cost us money, and don't call me Shirley.

    • by Frosty Piss ( 770223 ) * on Monday May 20, 2013 @06:24PM (#43777065)

      First of all, both these comapnies web sites are identical. Second of all, they look like some 14 year old put them together.

      Look, this is just some sweatshop lawyer who wrote q $200 threatening letter. The threat has no value, and should be ignored.

      • by Anonymous Coward

        The threat has no value, and should be ignored.

        No, it should be forwarded to the relevant authorities (and bar association), the lawyer disbarred, whoever ordered it sent to jail (even only a week actual locked up will do, as long as it also brings a lifetime criminal record) and the company fined an RIAA style figure (e.g. millions) for the threat. Then the company should be prosecuted for disclosing the information in the first place with another RIAA type figure ($10k/person's data leaked should do it).

        • No, it should be forwarded to the relevant authorities (and bar association), the lawyer disbarred, whoever ordered it sent to jail (even only a week actual locked up will do...

          It's nice to be "outraged", but connection to reality generally drives the actions that people who have something to spend and something to lose do.

          A lawyer sending a uppity letter alleging this and that is not illegal. Everyone is entitled to an opinion.

          But by all means, become "outraged", it's what the Internet is about these days, not rational clear thinking, apparently.

          • by sjames ( 1099 )

            Actually, if a lawyer letter is incorrect on it's face or with a cursory look at the evidence, it should be grounds for sanctioning. They are supposed to keep crap like that out of the court system. And if they argue they never actually intended to take it to court, they admit to serious ethics violations. Lawyers also aren't supposed to use intimidation to win when they know they couldn't win in court.

        • by AK Marc ( 707885 )
          That's not how threatening letters work. Threatening letters are there to scare, and I didn't read this specific one, but the sweatshop lawyers writing them generally have a better grasp of legal than some Internet A/C. It has no weight, and not a reason for action against the lawyer.
  • by Anonymous Coward

    Stephen Heymann and Carmen Ortiz to make sure these neferious cyber criminals get what they deserve!

  • by interkin3tic ( 1469267 ) on Monday May 20, 2013 @05:49PM (#43776839)
    I honestly can't understand the point of shooting the messenger here. Is it entirely to try to convince their customers (who are likely not very tech savvy) that they have nothing to worry about? I can understand the letter they sent out blaming the reporters for that, but to actually sue them doesn't make sense. Do they actually believe they can spin this to the FCC as the reporters going all James Bond to access files that were reasonably secured? Or is this just a lawyer who is racking up more billable hours, and his clients are too stupid to realize what a waste it is? Is this actually a roomful of executives saying "FUCK THOSE GUYS! Send the lawyers after them! That'll learn the press to google us!"

    I realize these companies have made some seriously bad decisions, and dumb decisions by committee are even worse, but this makes no sense.
    • by Doug Otto ( 2821601 ) on Monday May 20, 2013 @06:07PM (#43776951)
      It's deflection.

      If they were "hacked" then the folks who's data was leaked blame the wily hackers. If they let it stand that the data was just freely available on the web, it's a liability to the telecoms involved; i.e. "it's not our fault, it's THOSE guys."
    • I suspect that it's a mixture of technical cluelessness and PR. The people who actually made the mistake that led to the records being exposed probably realize(now, I'm sure it was either an oversight or 'just temporary' at the time) that they fucked up; but they have little to gain by pointing that out.

      People higher up the food chain probably have only the haziest distinction between 'something I didn't want happening' and 'something that you circumvented an access control to achieve' and, again, not much

    • by Anonymous Coward

      Reminds me of: http://www.despair.com/meetings.html

  • by eldavojohn ( 898314 ) * <eldavojohn@noSpAM.gmail.com> on Monday May 20, 2013 @05:49PM (#43776841) Journal

    Lee added that the Scripps Hackers eventually used Wget to find and download "the Companies' confidential files." (Wget was the same tool used by Facebook's Mark Zuckerberg in the film The Social Network to collect student photos from various Harvard University directories.) The rest of the letter pretty much blamed the "Scripps Hackers" for the cost of breach notifications, demanded Scripps hand over all evidence as well as the identity and intentions of the hackers, before warning that Scripps will be sued.

    Folks, there was a big bad security breach [yourtelamerica.com]. Now, *adjusts his massive belt buckle* we're investigating this like we would any other serious crime. And right now we're just trying to identify weapons used in this heinous attack. Now, we've discovered that the hackers were using [documentcloud.org] a very vicious mechanism in this attack. In a murder, you might find a revolver used to put two bullets into the back of a poor old defenseless lady's skull in order to get all her coupons and a couple of Indian head pennies out of her purse. Or perhaps in a pedophile case, you'll find the "secret candy" that was used to lure the children into a white panel van with painted over windows.

    *expels a long tortured sigh*

    Well, I gotta say, in my thirty years on the force, I wish we were only dealing with something like that today, honest to God Almighty I really do. Instead this artifact was discovered at the scene of the crime [huji.ac.il]. Now, I'm not asking you to understand that -- hell, I'd warn you against even openin' up your browser to the devil's toolbox. But let me, a trained law enforcement professional, take the time to explain the gruesome evidence just one HTTP request away from you and your chillun'. The page is black. Black as a moonless night sky when raptors swoop from the murky inky nothing to take your kids and livestock back up with them silently. On it is a bunch of white text that makes no sense to any God fearun' man on this here Earth. That's what they call a "man page" probably because it is the ultimate culmination of man's sin and lo and behold it displays a guide to exact torture on innocent web servers across this great and holy internet.

    Even if you want to use this "man page" for WGET to learn how to use Satan's server scythe, you would have to read through almost twenty pages of incomprehensible technobabble like what that kraut over in Cali -- the one who took his wife's life -- spoke. And if you want to just see an example, it's not at the top! No, why, it's all the way down at the bottom. For this one, they don't even have examples. Just enough options to kill a man. Probably gave Steve Jobs cancer, they never proved all these options in these pages didn't. Buried in the mud of a thousand evils lie more evils.

    And why, oh why are we even wasting taxpayer money on these Scripps Journos? Who needs a trial when the evidence is in the tools they used? Folks, I think it's time we WGET one last thing, I'll WGET a rope and you WGET your pitchforks and torches ... let's go down to Scripps and put all this computer business behind us. Okay?

    • by zlives ( 2009072 )

      the nerve of those... terrorists?

    • I read this in the voice of Sheriff J.W. Pepper (see The Man with the Golden Gun and Live and Let Die)
    • Is this a screenplay? CIS:Tennessee?

    • And here is me, with no mod points for the day.
    • by webmistressrachel ( 903577 ) on Monday May 20, 2013 @06:17PM (#43777023) Journal

      Wow, I'm scared to fire up my console now. GUIs only from now on for me - I had no idea that I was invoking the devil with my black backround and myriad switches and parameters passed!

      Having been a "builder" from a very young age, I can identify with being considered "heathen" for being able connect things that other people had no idea could work together (yet obviously could work together - for example I've used a decent amp and speakers with whatever source was playing since I left home, but using the AUX input with my NICAM video recorder was blasphemy to my parents - and connecting the computer (Amstrad CPC464) to the speakers must have been like summoning demons - because they put a stop to that quickly - and no, it wasn't loud either.)

      This perception of me as "hacker" carried on through school and college. Despite me having more integrity than anyone else around me at the time, and an innate sense of "right" and "wrong" and natural justice, I found myself distrusted because people couldn't understand how I did the things I did with so little (and such a crap background. Computer books were NOT on any shopping lists. I had the CPC464 manual, and POKE.)

  • by intermodal ( 534361 ) on Monday May 20, 2013 @05:53PM (#43776869) Homepage Journal

    Call 'em hackers enough time, and people will be distracted by their alleged malice to the point where they forget or don't even believe anymore that the files were literally just out there for anyone to see. It's like leaving a $100 bill on the sidewalk and waiting to see who turns it in at the lost and found so you can call 'em a thief to distract from your own leaving it lying around.

  • The management of First & Only Bank would like to let everyone know that all the money has been piled on the front lawn, and also that they're very upset that it has been disappearing.

    So if you are a robber, please don't the take the money. It's very rude.

    The money has been placed on the front lawn to get it out of the way while the vault is being repaired.

  • by Moppusan ( 2837753 ) on Monday May 20, 2013 @06:04PM (#43776933)
    ...should be a course in Computer and Internet Obviousness (naughty words omitted to make it sound more official, fucking god dammit). And certified as passing this course should be a requirement to be a judge or lawyer in the US with a 6 month renewal term. Any lawyer not holding a certificate should be disbarred post haste and any judge should be removed from his/her seat post haste. Post haste. Haste.
  • by Anonymous Coward
    While the threats are over the top people need to get it right. They didn't just report a security hole, they EXPLOITED the hole after discovering it and downloaded the data, that is where they crossed the line. It is like the difference between pointing out to a bank that their bank vault was left unlocked and walking in and taking all the money and saying "look guys I can walk in and take everything because your door was open". One will get embaresment from them the other will invoke rage and you in handc
    • So you would prefer they'd taken all the data and kept quiet about it?

      No. Full disclosure is warranted because full access was granted. It's not like just a few details were available. Fuck them for allowing this to happen. Fuck them serially and severally.

  • by Jah-Wren Ryel ( 80510 ) on Monday May 20, 2013 @06:17PM (#43777027)

    First they came for Weev.
    Then they came for the reporters. ...

    • by PRMan ( 959735 )
      First they came for Weev, and most reporters called him a malicious hacker...
      Then they came for the reporters. ...
  • This is good news (Score:5, Interesting)

    by gr8_phk ( 621180 ) on Monday May 20, 2013 @06:20PM (#43777037)
    Usually reporters tell stories of "hackers" finding such things and we wonder weather the reporters understand how "non-hacking" the activity really was. Well in this case it's abundantly clear to them since it was they who discovered the data in plain sight. No question the reporters see the absurdity of the "hacker" label in this case.
    • by PRMan ( 959735 )
      This is good. I still don't understand how weev could have been found guilty, other than that he's a complete sociopath...
  • by AndyKron ( 937105 )
    In my opinion, attorney Jonathon Lee is a fucking asshole.
  • No good deed goes unpunished

  • "...attorney Jonathon Lee for both telecoms threatened the 'Scripps Hackers' with violating the Computer Fraud and Abuse Act (CFAA)." Good fucking luck with the subterfuge assholes. You shit the bed and now you are trying to say it was the guy from the next town over. So typical of companies now days. I agree that the more anonymous you can stay the better. We seldom if ever give our info to anyone unless it can't be helped. Most of the time it can be and so we don't. I worry more about these shit ba
  • by Anonymous Coward

    Use google to find information, use that information to exploit certain weaknesses in a system. Isn't that exactly what hackers do? How are they not hackers? Because they also wear the hat of news reporters? Maybe that's what current hackers have been doing wrong. They need to get jobs as reporters.

  • The Streisand Effect will be in place here. Cue Anonymous hacking these companies upside down in 3...2...1......
  • I worked for an outsourcing IT company, and one of the guys I work with filed invoices for the customer. The application he was using (SAP if I recall), also was used by payroll. At some point he got access to view quite a few peoples payroll records. He called the customers SAP support and they denied that he could possibly have access to those records. So he told them, well, why don't we ask some of the people in this list if this is what they make and see if it is accurate. They declined, and the re

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...