Language Selection

English French German Italian Portuguese Spanish

Students Charged With Computer Trespass

Filed under
Legal

They're being called the Kutztown 13 - a group of high schoolers charged with felonies for bypassing security with school-issued laptops, downloading forbidden Internet goodies and using monitoring software to spy on district administrators.

The students, their families and outraged supporters say authorities are overreacting, punishing the kids not for any heinous behavior - no malicious acts are alleged - but rather because they outsmarted the district's technology workers.

The Kutztown Area School District begs to differ. It says it reported the students to police only after detentions, suspensions and other punishments failed to deter them from breaking school rules governing computer usage.

In Pennsylvania alone, more than a dozen school districts have reported student misuse of computers to police, and in some cases students have been expelled, according to Jeffrey Tucker, a lawyer for the district.

The students "fully knew it was wrong and they kept doing it," Tucker said. "Parents thought we should reward them for being creative. We don't accept that."

A hearing is set for Aug. 24 in Berks County juvenile court, where the 13 have been charged with computer trespass, an offense state law defines as altering computer data, programs or software without permission.

The youths could face a wide range of sanctions, including juvenile detention, probation and community service.

As school districts across the nation struggle to keep networks secure from mischievous students who are often more adept at computers than their elders, technology professionals say the case offers multiple lessons.

School districts often don't secure their computer networks well and students need to be better taught right from wrong on such networks, said Internet expert Jean Armour Polly, author of "Net-mom's Internet Kids & Family Yellow Pages."

"The kids basically stumbled through an open rabbit hole and found Wonderland," Polly, a library technology administrator, said of the Kutztown 13.

The trouble began last fall after the district issued some 600 Apple iBook laptops to every student at the high school about 50 miles northwest of Philadelphia. The computers were loaded with a filtering program that limited Internet access. They also had software that let administrators see what students were viewing on their screens.

But those barriers proved easily surmountable: The administrative password that allowed students to reconfigure computers and obtain unrestricted Internet access was easy to obtain. A shortened version of the school's street address, the password was taped to the backs of the computers.

The password got passed around and students began downloading such forbidden programs as the popular iChat instant-messaging tool.

At least one student viewed pornography. Some students also turned off the remote monitoring function and turned the tables on their elders_ using it to view administrators' own computer screens.

The administrative password on some laptops was subsequently changed but some students got hold of that one, too, and decrypted it with a password-cracking program they found on the Internet.

"This does not surprise me at all," said Pradeep Khosla, dean of Carnegie Mellon University's engineering department and director of the school's cybersecurity program.

IT staff at schools are often poorly trained, making it easy for students with even modest computer skills to get around security, he said.

Fifteen-year-old John Shrawder, one of the Kutztown 13, complained that the charges don't fit the offense. He fears a felony conviction could hurt his college and job prospects.

"There are a lot of adults who go 10 miles over the speed limit or don't come to a complete stop at a stop sign. They know it's not right, but they expect a fine" not a felony offense, he said.

Shrawder's uncle, James Shrawder, has set up a Web site that tells the students' side of the story.

"As parents, we don't want our kid breaking in to the Defense Department or stealing credit card numbers," said the elder Shrawder, a businessman. "But downloading iChat and chatting with their friends? They are not hurting anybody. They're just curious."

The site, http://www.cutusabreak.org, has been visited tens of thousands of times and sells T-shirts and bumper stickers, including one that says: "Arrest me, I know the password!"

The district isn't backing down, however.

It points out that students and parents were required to sign a code of conduct and acceptable use policy, which contained warnings of legal action.

The 13 students charged violated that policy, said Kutztown Police Chief Theodore Cole, insisting the school district had exhausted all options short of expulsion before seeking the charges. Cole said, however, that there is no evidence the students attacked or disabled the school's computer network, altered grades or did anything else that could be deemed malicious.

An association of professional computer educators, The International Society for Technology in Education, believes in a less restrictive approach to computer usage. The more security barriers a district puts in place, the more students will be tempted to break them down, it believes.

"No matter how many ways you can think to protect something, the truth is that someone can hack their way around it," said Leslie Conery, the society's deputy CEO. "The gauntlet is thrown down if you have tighter control."

By MICHAEL RUBINKAM
Associated Press

More in Tux Machines

OnePlus 2: A Big Android Phone for Relatively Little Money

The new model looks to be an improvement over its predecessor in nearly every way. “We started this company because we didn’t think any Android phones on the market were good enough,” OnePlus director and co-founder Carl Pei said. “We still think that’s the case, and we learned a lot from the OnePlus 1. The OnePlus 2 not only flagship worthy, but something that will remain cutting edge next year as well.” Read more

Mozilla and Linux

  • How is Firefox OS Different from Android, iOS, Windows Phone and Ubuntu Touch
    firefox-os-phone-firefox-os-phone-While choosing a new mobile phone to buy, you must consider all different available options. Earlier I’ve written about the differences between Ubuntu Touch, Android OS, and Windows Phone. Today I’m going to add another contender in the list – the Firefox OS – and I’ll discuss how is Firefox OS different from others.
  • Firefox 42 Nightly Is Now Built In GTK+3
    Firefox Nightly for Linux has been compiled with GTK+3 and the stable version of Firefox 42 may be the first one to be released with GTK+3.
  • Mozilla Toys with Crowdsourcing Ideas for its Browser and Tools
    Can your ideas make one of the most popular Internet browsers better? Mozilla is considering the possibility. The company is launching a testing initiative next month that will let Firefox users try out possible changes to the browser. The project is called "Idea Town" and basically seeks to crowdsource ideas for browser- and web-centric new concepts.

KDE and Akademy

  • KWallet5 can be auto-unlocked during login again
    I've just pushed a patch to KWallet5 allowing you to have your wallet unlocked automagically during login. This patch was originally done by Alex Fiestas for KWallet4, so all credits and free beers go to him; I've merely just forward-ported it.
  • Major update in cauldron
    Now that cauldron is open, the kde team has updated KF5 to 5.12.0, Plasma to 5.3.2 and Kde Applications to 15.04.3.
  • KDE's Plasma Mobile Not Giving Proper Credit to Ubuntu Touch, Says Developer
    KDE developers have announced that they are working on a new project called Plasma Mobile. From what the developers are saying, it's running on Wayland, and it's capable on running Ubuntu apps. One of the problems is that at least one of the Ubuntu developers has noticed that even if the project is based on Ubuntu for phones, credit is not given.
  • Plasma Mobile SDK
    When approaching this issue I had been thinking about the issue for a while. I had mainly 2 problems: I was rather frustrated with previous Linux-based systems so far and the one I liked didn’t really scale for us.
  • KDE Applications Versioning
    A common problem for many applications contained in the KDE Applications releases are non-incremented version numbers. Often the maintainer forgets to update the version number of the application, like I did it for Kate since the first KF5 based release.
  • Licensing of KDE Code
    Akademy, the yearly KDE conference is alive and kicking. During the last days we were discussing again about potential KDE licensing issues (for instance code that is licensed under GPLv2, but not GPLv3). That’s why KDE is maintaining a relicense checker script, that every KDE contributor should enter herself/himself.
  • Akademy Day 1
  • Akademy Day 2
    The second day at Akademy started off with 10 or so hours of sleep!, which was much needed for basic functions (really happy I don’t have to drive here). The hotel (Rialta) had great breakfast with coffee, OJ, bread with meat and cheeses, yogurt, cereal all the basics that makeup a great day!
  • Akademy Talks Day 2
  • Akademy Day 3 the start of BoFs, meetings and workshops

Mr. Robot TV Show Now Uses BackTrack Linux's Successor, Kali Linux for Hacking

I wrote an interesting editorial a while ago related to the Mr. Robot TV show that runs on the USA Network channel every Wednesday, starring Rami Malek as a computer hacker that goes by the name of Elliot. Read more