Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Programming Security

Arkansas Governor Frames Programmer Who Discovered PUA Data Breach As Acting Illegally (arktimes.com) 158

theodp writes: Arkansas Governor Asa Hutchinson had an odd way of showing his appreciation for the unemployed computer programmer who pointed out a vulnerability in Arkansas's Pandemic Unemployment Assistance website, framing the programmer's actions as illegal.

The Arkansas Times' Lindsey Millar explains: "Beginning on Saturday at a news conference and continuing Monday, Hutchinson has framed the applicant who sounded the alarm as acting illegally. He announced Monday that the FBI was investigating the matter. He said he understood personal information had been 'exploited.' 'We don't believe that the data was manipulated,' Hutchinson said. 'In other words, where someone would go in and change a bank account number, which is what criminals would do. When you say 'exploited,' I believe that is a technical term of art that includes visual seeing of someone else's data. That is a concern to us and that is what constitutes a breach.' Asked about his rationale for framing the programmer's actions as illegal, the governor said, 'When you go in and manipulate a system in order to gain an access that you're not allowed to have permission to access, that is a violation of the security that we want to have in place in these systems, and it would be a violation of the law as well, I would think (video).'"

Hutchinson is a member of Governors for CS (and a founding co-chair), who "share best practices for computer science and advocate for federal policies to expand computer science instruction" in partnership with tech-backed Code.org.
Andrew Morris, a cybersecurity expert with more than a decade of experience and the founder of GreyNoise Intelligence in Washington, D.C., said the governor's framing of the programmer as acting illegally was "the wrongest way" to handle the situation.

"They're shooting the messenger," he said. "There are so many reasons why that is bad. It creates a culture where they're punishing people for doing the right thing and trying to report the vulnerabilities and get them fixed. This person didn't have to say anything."
This discussion has been archived. No new comments can be posted.

Arkansas Governor Frames Programmer Who Discovered PUA Data Breach As Acting Illegally

Comments Filter:
  • by Anonymous Coward

    At first I thought this was related to a data breach at a pick up artists website or something...I'm so disappointed now that I realize that this is just taxpayer dollars at work?

  • who refused to cook the numbers so their governor could re-open more even though it's clearly not safe.

    Which raises the question, Florida has a scientist?!

    Seriously though, the 1% don't want to pay our unemployment benefits while we shelter in place, and this disease is only gonna kill about 2-3% of the population anyway. Maybe 10% if things really get out of hand. Acceptable loses. And they're safe on private islands.

    My favorite example of this was a Fox News Segment of 8 or so talking heads all
    • Re: (Score:2, Informative)

      by Train0987 ( 1059246 )

      It's actually the opposite - you really should stop just swallowing whatever your masters tell you. She was caught changing numbers in the system to fit her opinion instead of the data that was collected by the states medical professionals. It also turns out that she was already under criminal investigation following felony arrests for sex crimes and shouldn't have been in that position in the first place. The media jumped on a story told by a disgruntled former employee because it fit a pre-constructed

      • Re: (Score:2, Informative)

        by Anonymous Coward

        No, she was accurately correcting data her superiors wanted to disregard to show statistics improving. It doesn't take more than a 2 minute search to find this. The criminal investigation shows the incompetence of the administration as it was from over a year ago and would have shown-up in any background search.

        • That's her version, told to the reporter after falsely claiming to be a PhD and before falsely claiming to have built the site. All of those things were reported with zero fact-checking. Her degree is in Communications too, not anything science-related as was also implied in all the coverage.

          According to the state epidemiologist she was asked to pause the dashboard while a data error was being corrected. She refused and entered her own interpretation of false data instead.

    • who refused to cook the numbers so their governor could re-open more even though it's clearly not safe.

      Wait, what?

      The non-scientist "Communications Officer" was fired for ignoring the epidemiologist and falsely entering her own data.

      In brief, the scientist wasn't fired, the data-entry clerk was.

      Do you even read the news? Or only the headlines?

      • by jbengt ( 874751 )
        She is a GIS scientist.
        The data portal she helped create was praised by many including VP Pence and Dr Brix.
        She did not enter her own data.
        She complied with the direction to remove data about when symptoms first appeared and when positive tests were taken and leave only the data of when the results were announced, but complained about it.
        She was let go the next day.
        Florida has been making changes to the data presented since she was fired.
        • She is a GIS scientist.

          So, not the epidemiologist then? The map person? As far as anyone can tell, she was basically the data entry clerk, her field of study did not prepare her to use or understand epidemiology data. I've no doubt that if you needed to perform a survey of rock formations she'd be your girl, but that's not what they were doing.

          The data portal she helped create was praised by many including VP Pence and Dr Brix.

          That's meaningless. It was a reskin of COTS software. Everyone is using it, there's nothing that special about setting it up.

          She did not enter her own data. She complied with the direction to remove data about when symptoms first appeared and when positive tests were taken and leave only the data of when the results were announced, but complained about it.

          "Complied with the direction"? You make it sound like she was be

          • by cusco ( 717999 )

            They're "scientists" working for the state of Florida, competence is not actually part of the hiring criteria there. I have my doubts about the reliability of anyone's story on this one.

  • by Sebby ( 238625 ) on Wednesday May 20, 2020 @08:59PM (#60084864)

    This is beyond stupid - now anything Arkansas related will be a target for hackers, which will gleefully attack in retaliation - oh, and those guys won't be as nice and let them know what vulnerabilities they found.

    • No, I have a hunch that they'll let the world know what they found. Not necessary the vulnerabilities, more along the "data wants to be free" lines.

      I'm fairly confident we'll see a lot of dirty Arkansas laundry being aired pretty soon.

      • ...more along the "data wants to be free" lines.

        I'm thinking it's going to be more along the, "data wants to be unencrypted for a fee" lines.

  • by fredrated ( 639554 ) on Wednesday May 20, 2020 @09:09PM (#60084880) Journal

    and rip his head off. Figuratively speaking.

  • by t4eXanadu ( 143668 ) on Wednesday May 20, 2020 @09:27PM (#60084900)

    Didn't see this coming... not. Completely unsurprised by this. To say otherwise is to acknowledge they screwed up and take responsibility. Better to blame it on the security researcher and take no responsibility.

  • by RitchCraft ( 6454710 ) on Wednesday May 20, 2020 @09:35PM (#60084918)
    I would point out that Arkansas' system put his information at risk. By allowing that system to be insecure his and any other user's privacy were vulnerable. His service should be rewarded by the state of Arkansas by employing this programmer now to fix their back-woods systems.
    • Obviously responsible disclosure is not the way Arkansas government wants it handled. Maybe the programmer's mistake was to let them know, rather than sue them (maybe a class action) for potentially exposing his and other people's data.

  • by Krishnoid ( 984597 ) on Wednesday May 20, 2020 @09:43PM (#60084936) Journal

    "You dropped your wallet."
    "Thief!"

    • by bobby ( 109046 ) on Wednesday May 20, 2020 @09:48PM (#60084948)

      Yup. Or "hey, you left your door unlocked" "Thief!" "Trespasser!" "Voyeur!"

    • It was more "I found your wallet on your living room floor, you really should be more careful as you have your credit card and I can see you had this piece of paper that has your password on it and your families contact details,,,, What the Fuck! why are you pissed at me?"

      finding a vulnerability and reporting it is very different to exploiting it and seeing how deep the hole goes.
      • by jbengt ( 874751 )
        House and home analogies are way off base.
        It's more like, you're in a public building and you walk around a corner and notice an open door. So you walk in to see, then realize they have a bunch of private information laying around on the tables. You realize this is a bad situation, so you try to contact the manager of the building. You don't get a response, so you call the police. They say they'll get back to you, but don't. So you call a reporter, knowing they will know who to contact, which they do.
      • by orlanz ( 882574 )

        Yeah... that's not what most of these things are like AT ALL. Its like finding a wallet at the end of the driveway, checking the driver's license to find who to return it to. Most of the time, it is more work finding the right house. And when you do, the owner is pissed at you for looking into his wallet and trespassing on their property and touching their door bell.

        Recent "exploits" have been equivalent to putting a file icon on the google homepage. And then getting pissed at the guy telling you it con

  • one must always reflect on how the sharing of information is seen. History shows us that more often than not the bearer of message gets shot.

    Just my 2 cents ;)
  • by Rick Schumann ( 4662797 ) on Wednesday May 20, 2020 @09:44PM (#60084942) Journal
    That's what this amounts to: massively butthurt public officials who have been revealed to their constituents as being incompetent and employing incompetents.
    • by orlanz ( 882574 )

      In all seriousness, the people involved from the development company to the approvers should be tried for gross negligence and barred from ever touching any IT system with personal information. This is one of those "can't fix stupid" items. I mean, effectively, not only did you leave the admin console open to everyone, but also left a bread crumb trail to get to it. You could have created a sharepoint list in 5 min to achieve the same.

    • That reminds me when CentOS "hacked" the city of Tuttle, Oklahoma’s web site [theregister.co.uk]. And by hack, they had nothing to with the city’s web host not properly configuring the city’s Apache web server after a rebuild. But it was the fault of CentOS for not resolving the problem earlier that they didn’t create despite early on telling the city what they should do to fix their problem.
  • If I drive by an injured person on the road then I don't call 911. It isn't my problem. I hate to be charged with a crime or face a civil lawsuit. This is what my dad taught me when I was young and I don't get involved in anything. You are on your own.
    • by cusco ( 717999 ) <brian.bixby@gmail . c om> on Wednesday May 20, 2020 @11:51PM (#60085302)

      Seriously? Holy crap, your dad sounds like an asshole, it's too bad you follow in his footsteps.

      • Show some respect -- that's "it's too bad you follow in his footsteps, Mr. President."

      • Seriously? Holy crap, your dad sounds like an asshole, it's too bad you follow in his footsteps.

        Or maybe his dad has been pulled over for DWB enough times to know it doesn't pay for certain people to interact with the police any more than necessary.

    • Re: (Score:2, Insightful)

      by Anonymous Coward
      well actually in many places it is a crime. You might want to check your local state laws before you decide to do that. To top it off judges tend to hold a very low opinion of scum like you so they aren't likely to be particularly lenient either.
    • by jbengt ( 874751 )
      Your dad was an asshole for teaching you that.
  • by Patent Lover ( 779809 ) on Wednesday May 20, 2020 @10:11PM (#60085036)
    They have internet in Arkansas?
  • Someone called it (Score:5, Insightful)

    by phantomfive ( 622387 ) on Wednesday May 20, 2020 @10:13PM (#60085040) Journal
    In the original story, it was predicted this might happen [slashdot.org]. Why? Because it happens a lot.
  • by The Evil Atheist ( 2484676 ) on Wednesday May 20, 2020 @10:20PM (#60085070)

    When you go in and manipulate a system in order to gain an access that you're not allowed to have permission to access, that is a violation of the security that we want to have in place in these systems

    So basically, the security they want to have in place is "you weren't supposed to <shakes finger>". No wonder arseholes like him thinks there can be backdoors for the good guys. Because the bad guys aren't allowed to hack into things for the good guys.

    • So basically, the security they want to have in place is "you weren't supposed to ". No wonder arseholes like him thinks there can be backdoors for the good guys. Because the bad guys aren't allowed to hack into things for the good guys.

      They're politicians. That's how they think you stop bad people doing bad things. First you make a rule/law and then when bad people do bad things, even inadvertently, you send the police and call them criminals. Legislative solutions cost less and make more money from fines in the long run.

      It's not hard to see why this particular shit stain just kept doing what he always does. Nobody's going to vote him out for pointing out that he was responsible for punishing an "evil criminal" and keeping everyone's data

      • He'll back flip as soon as the retaliation hits his Swiss cheese security and suddenly a lot of very unpleasant information about him becomes available on Pastebin. You think that this is going to sit well with certain people?

        • I don't think you can look at the state of politics in America and think any politician are going to "back flip". Your president and his party has made an entire political career based on pissing "libtards" off - and not acknowledging any faults or issuing any apologies and definitely not taking any corrective action. And the kicker is anything that anyone complains about a Republican politician is taken as a "libtard" complaint.

          This is what you get when democracy overrides meritocracy, and it's funny ho
  • by nehumanuscrede ( 624750 ) on Wednesday May 20, 2020 @11:31PM (#60085274)

    This sort of bullshit is used the world over to deflect focus from the fact that X screwed up and all the blame is pushed onto Y or Z instead.
    If the programmer truly had nefarious intentions in mind, he wouldn't have said anything and simply offered what he found up for sale to the highest bidder.

    If I've learned nothing else about this dumpster fire called life, I've learned this:

    Doing the right thing rarely turns out well at all for those who try.

    • My advice is, if you find yourself in this position, just delete it all. Tell no one and leave no traces. It won't teach them the lesson they so desperately need to learn but at least it will actually protect the people you were trying to protect in the first place.

      • It won't teach them the lesson they so desperately need to learn but at least it will actually protect the people you were trying to protect in the first place.

        No, it won't. Because if isn't fixed, it will be found and used by someone with not-so-innocent motives; they won't need you pointing the way. What can be found once can and will be found again.

  • The Governor needs to just say "thank you"

    Or does he want the "Did not inhale" [time.com] excuse to spread to the non-politician class as well?

    "While accessing data, I had my eyes tightly closed. I can touch type you see!"

  • by jaa101 ( 627731 ) on Thursday May 21, 2020 @05:32AM (#60085878)

    The governor is just highlighting the real issue here. Many jurisdictions have laws that make unauthorised access to computer systems illegal and a total lack of security on those systems is no excuse. That's what needs to change; you don't want the governor's attitude to your actions to be the only thing protecting you from being convicted when all you did was expose lax or broken IT security.

    • The governor is just highlighting the real issue here. Many jurisdictions have laws that make unauthorised access to computer systems illegal ...

      The governor is only highlighting his stupidity. He is too dumb or too lazy to interpret the law within the context. He is deliberately ignoring the circumstances. With such a simple mindset can one make killing in self-defence into murder, make witnesses into associates, etc..

      Then let's not forget who the governor's boss is... In times where idiots rules will some people try to walk in the footsteps of those idiots.

  • ... official database in the State of Arkansas. ...
    Oh. Errm, nevermind.

  • Civil War 2.0 here we come!
  • The governor should be talking about criminal negligence on the part of his administration's website management. Hire some competent security consultants and pin testers to keep the citizens data secure.
  • ... system qualify as "entrapment"?

    I mean, if you release a system to the public where, without doing any hacking at all, a person can mentally create a conjecture about how it might be vulnerable and THEN if that conjecture is followed, it would turn out to be exactly right, it honestly looks to me like trying to charge the person who reported this vulnerability with hacking would really be running afoul of entrapment laws.

    I think a fair argument can be made that they had created a situation where all it was going to take was the right kind of observant person to notice something wrong and be curious enough to poke at it. The fact that they are pressing charges against a person who happened to be unlucky enough to be in that position really incriminates them quite heavily in this regard, if you ask me.

  • This reminds me of the disgruntled lover, who accuses their ex-partner of rape only to get even after a breakup...

    Some people are just plain wicked and in a governor's case one has to wonder who else he screwed over throughout his political career. It's probably everyone...

  • Shouldn't the company that charged $3 million to the State of AR be liable?? ProTech Solutions? https://www.linkedin.com/compa... [linkedin.com]
  • Laws setup to deter hackers from sneaking in. Unauthorized access warnings posted. But if a vulnerability exists safety should allow someone to check and report. Kind of like knocking on a door that opens and peaking inside. More inadvertently then brute force with bad intentions. The site admin company and government embarrassment the problem. An IT Good Samaritan law should exist. This incident a good example worth following.
  • 'In other words, where someone would go in and change a bank account number, which is what criminals would do.

    Why would a criminal CHANGE a bank account number in a record? Wouldn't they COPY the bank account number and use it for criminal purposes?

This file will self-destruct in five minutes.

Working...