Language Selection

English French German Italian Portuguese Spanish

Students Charged With Computer Trespass

Filed under
Legal

They're being called the Kutztown 13 - a group of high schoolers charged with felonies for bypassing security with school-issued laptops, downloading forbidden Internet goodies and using monitoring software to spy on district administrators.

The students, their families and outraged supporters say authorities are overreacting, punishing the kids not for any heinous behavior - no malicious acts are alleged - but rather because they outsmarted the district's technology workers.

The Kutztown Area School District begs to differ. It says it reported the students to police only after detentions, suspensions and other punishments failed to deter them from breaking school rules governing computer usage.

In Pennsylvania alone, more than a dozen school districts have reported student misuse of computers to police, and in some cases students have been expelled, according to Jeffrey Tucker, a lawyer for the district.

The students "fully knew it was wrong and they kept doing it," Tucker said. "Parents thought we should reward them for being creative. We don't accept that."

A hearing is set for Aug. 24 in Berks County juvenile court, where the 13 have been charged with computer trespass, an offense state law defines as altering computer data, programs or software without permission.

The youths could face a wide range of sanctions, including juvenile detention, probation and community service.

As school districts across the nation struggle to keep networks secure from mischievous students who are often more adept at computers than their elders, technology professionals say the case offers multiple lessons.

School districts often don't secure their computer networks well and students need to be better taught right from wrong on such networks, said Internet expert Jean Armour Polly, author of "Net-mom's Internet Kids & Family Yellow Pages."

"The kids basically stumbled through an open rabbit hole and found Wonderland," Polly, a library technology administrator, said of the Kutztown 13.

The trouble began last fall after the district issued some 600 Apple iBook laptops to every student at the high school about 50 miles northwest of Philadelphia. The computers were loaded with a filtering program that limited Internet access. They also had software that let administrators see what students were viewing on their screens.

But those barriers proved easily surmountable: The administrative password that allowed students to reconfigure computers and obtain unrestricted Internet access was easy to obtain. A shortened version of the school's street address, the password was taped to the backs of the computers.

The password got passed around and students began downloading such forbidden programs as the popular iChat instant-messaging tool.

At least one student viewed pornography. Some students also turned off the remote monitoring function and turned the tables on their elders_ using it to view administrators' own computer screens.

The administrative password on some laptops was subsequently changed but some students got hold of that one, too, and decrypted it with a password-cracking program they found on the Internet.

"This does not surprise me at all," said Pradeep Khosla, dean of Carnegie Mellon University's engineering department and director of the school's cybersecurity program.

IT staff at schools are often poorly trained, making it easy for students with even modest computer skills to get around security, he said.

Fifteen-year-old John Shrawder, one of the Kutztown 13, complained that the charges don't fit the offense. He fears a felony conviction could hurt his college and job prospects.

"There are a lot of adults who go 10 miles over the speed limit or don't come to a complete stop at a stop sign. They know it's not right, but they expect a fine" not a felony offense, he said.

Shrawder's uncle, James Shrawder, has set up a Web site that tells the students' side of the story.

"As parents, we don't want our kid breaking in to the Defense Department or stealing credit card numbers," said the elder Shrawder, a businessman. "But downloading iChat and chatting with their friends? They are not hurting anybody. They're just curious."

The site, http://www.cutusabreak.org, has been visited tens of thousands of times and sells T-shirts and bumper stickers, including one that says: "Arrest me, I know the password!"

The district isn't backing down, however.

It points out that students and parents were required to sign a code of conduct and acceptable use policy, which contained warnings of legal action.

The 13 students charged violated that policy, said Kutztown Police Chief Theodore Cole, insisting the school district had exhausted all options short of expulsion before seeking the charges. Cole said, however, that there is no evidence the students attacked or disabled the school's computer network, altered grades or did anything else that could be deemed malicious.

An association of professional computer educators, The International Society for Technology in Education, believes in a less restrictive approach to computer usage. The more security barriers a district puts in place, the more students will be tempted to break them down, it believes.

"No matter how many ways you can think to protect something, the truth is that someone can hack their way around it," said Leslie Conery, the society's deputy CEO. "The gauntlet is thrown down if you have tighter control."

By MICHAEL RUBINKAM
Associated Press

More in Tux Machines

Oracle Adds Initial Support for Linux Kernel 4.14 LTS to VirtualBox

Oracle recently updated their VirtualBox open-source and cross-platform virtualization software with initial support for the latest Linux 4.14 LTS kernel series. VirtualBox 5.2.2 is the first maintenance update to the latest VirtualBox 5.2 stable series of the application, and it looks like it can be compiled and used on GNU/Linux distribution running the recently released Linux 4.14 LTS kernel. It also makes it possible to run distros powered by Linux kernel 4.14 inside VirtualBox VMs. Read more

Today in Techrights

today's leftovers

  • How a Linux stronghold turned back to Windows: Key dates in Munich's LiMux project [Ed: This explains the progression of Microsoft's war on GNU/Linux, typically using proxies]
    The project is temporarily put on hold while a study investigates whether it could be derailed by software patents.
  • End of an open source era: Linux pioneer Munich confirms switch to Windows 10 [Ed: Microsoft paid (bribed) all the right people, got a Microsoft fan -- by his own admission -- in power, gifted him for this]
    Mayor Dieter Reiter said there's never been a unified Linux landscape in the city. "We always had mixed systems and what we have here is the possibility of going over to a single system. Having two operating systems is completely uneconomic.
  • Ubuntu Podcast: S10E38 – Soft Knowledgeable Burn
    This week we refactor a home network, discuss how gaming on Linux has evolved and grown in recent years, bring you a blend of love and go over your feedback.
  • Live ISOs for Slackware-current 20171122
    I have released an update of the ‘liveslak‘ scripts. I needed the tag for a batch of new ISO images for the Slackware Live Edition. These are based on the latest Slackware-current dated “Wed Nov 22 05:27:06 UTC 2017“) i.e. yesterday and that means, the ISOs are going to boot into the new 4.14.1 kernel.
  • Am I willing to pay the price to support ethical hardware?
    The planned obsolescence is even worse with tablets and smartphones, whose components are all soldered down. The last tablet with a removable battery was the Dell Venue 11 Pro (Haswell version) announced in October 2013, but it was an expensive Windows device that cost as much as a mid-range laptop. The last Android tablet with a removable battery was the Samsung Galaxy Note 10.1 (GT-N8000 series), released in August 2012. It is still possible to find mid-range smartphones with removable batteries. Last year the only high end phones with removable batteries were the LG G5 and V20, but even LG has given up on the idea of making phones that will last longer than 2 years once the battery starts to degrade after roughly 500 full charge and discharge cycles. Every flagship phone introduced in 2017 now has its battery sealed in the case. According to the gmsarena.com database, the number of new smartphone models with non-replaceable batteries grew from 1.9% in 2011 to 26.7% in 2014, and now to 90.3% in 2017. It is highly likely that not a single model of smartphone introduced next year will have a replaceable battery.

More Coverage of New Lumina Release

  • Lumina 1.4 Desktop Environment Released
    The TrueOS BSD folks working on their Qt5-powered Lumina Desktop Environment have issued a new feature update of their open-source desktop.
  • Lumina Desktop 1.4.0 Released
    Lumina 1.4.0 carries a number of changes, optimisations, and feature improvements. Lumina is the default desktop of TrueOS, a BSD-based operating system. The desktop itself is lightweight, modular, built using Qt, and uses Fluxbox for window management. Although Lumina is mostly aimed at BSD users it also runs on Linux, including Fedora, Arch and — *mario coin sfx* — Ubuntu.