Security Analyst Arrested For Disclosing Security Flaw In Florida County's Election Systems
from the life-lessons dept
A Florida man has been charged with felony criminal hacking charges after disclosing vulnerabilities in the voting systems used in Lee County, Florida. Security analyst David Levin was arrested 3 months after reporting un-patched SQL injection vulnerabilities in the county's election systems. Levin was charged with three counts of unauthorized access to a computer, network, or electronic device and released on $15,000 bond. Levin's first and biggest mistake was to post a video of himself on YouTube logging into the Lee County Elections Office network using the credentials of Sharon Harrington, the Lee County Supervisor of Elections.That gave prosecutors the ammo they needed to arrest Levin, even if he believed he was doing locals a favor:
"Based on the evidence obtained regarding the SQL injections attack Levin performed against the Lee County Office of Elections on December 19, 2015, probable cause does exist to charge Levin with unauthorized access of any computer, computer system, computer network, or electronic device, a violation of Florida Statute 815.06(2)(a), a third degree felony."But at least a portion of Levin's crime may be of the political variety. In the video posted to YouTube Levin detailed the SQL injection alongside a man by the name of Dan Sinclair, who just so happens to be running against Harrington for the Elections Supervisor position. In the video, Levin details the relatively simple method of using a SQL injection attack to obtain login names and plain-text passwords belonging to Harrington and at least 10 other account holders:
"The server that was vulnerable to Levin's SQL injection attack, they said, had been retired in October. At the time of Levin's attack, at least two months later, it no longer stored sensitive data and had been replaced by a new server that wasn't vulnerable to the attack, they said. Similarly, the CMS Levin logged into had also been retired and replaced with one that ran WordPress. While the older CMS was allowed to continue running during a transition period, its functionality was limited to storing only historical data, the officials said. People logging into it didn't have the ability to post new pages to the site or to access voter data or tabulation systems, they said."Granted it's not clear if the data, usernames and passwords used in the attack were also potentially useful in compromising any of the county's other systems, and Levin's currently too busy in the court system to offer additional insight.
At the end of the day there's plenty of fault and lessons to go around. The county obviously shouldn't keep systems with easily-exploitable vulnerabilities online, as such lower-level systems could open the door for attacks on higher-level operations. Levin meanwhile could have taken any number of steps to reveal the flaws without risking prosecution, and step one to not getting arrested for computer crimes usually involves you avoiding posting videos of you breaking the law on YouTube. Following Dan Kaminsky's guide on how to disclose vulnerabilities without getting arrested is a good starting point for anybody that may someday find themselves in Levin's shoes.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: cybersecurity, dan sinclair, david levin, disclosure, florida, lee county, voting, vulnerability
Reader Comments
Subscribe: RSS
View by: Time | Thread
Run for Cover
[ link to this | view in thread ]
Re: Run for Cover
I think maybe he put their jobs at risk and thats why he needed to be arrested.
[ link to this | view in thread ]
"replaced with one that ran WordPress."
[ link to this | view in thread ]
I bet I know why he was arrested...
Wanna place a bet that those exact same login names and passwords obtained from the old server, will still work on the new "locked down, upgraded, not vulnerable to the old SQL injection attack, but I didn't change my password, because it's too hard to remember a new one, so I am still screwed" server?
[ link to this | view in thread ]
Re: I bet I know why he was arrested...
[ link to this | view in thread ]
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
And this is why you shouldn't do white-hat security probes...
In for the sheep, in for the flock.
[ link to this | view in thread ]
Re: I don't have any sympathy for David Levin
[ link to this | view in thread ]
Re: Re: Run for Cover
Yep, is the company that bought out Diebold, and was owned by the same guys, whose security saved votes in cleartext, and could be hacked from afar, with literally zero contact with the machine itself.
[ link to this | view in thread ]
[ link to this | view in thread ]
Anyone HERE know programming??
There are better ways to program computers so as NOT to use any advanced abilities of remote/local access..
Why is it so hard to use Hardware/software to protect remote systems??
This is BASIC stuff from YEARS ago..
Banks used to use Wireless and Modems...and shortwave..
[ link to this | view in thread ]
Re:
i have no sympathy for authoritarian suckups who have no common sense, AND DONT WANT ANY...
they want Big Daddy to make a brightline distinction for EVERYTHING, for all time ! !
in short, you do not want to think, you do not want subtle distinctions, you do not want extenuating circumstances, you simply want Big Daddy to tell you who to hate...
[ link to this | view in thread ]
[ link to this | view in thread ]
Re: Re: something better to read
I used this search term: (bev harris florida election scam finds code on old voting machines).
This is Bev Harris website: http://blackboxvoting.org/
This is why David Levin deserves to be falated, not feloized. The assholes that are in charge of this country have election fraud down to an art. Moreover, these guys have such huge balls, they didn't even try that hard to hide it.
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: And this is why you shouldn't do white-hat security probes...
One of the results returned was all of a tenant's personal information needed to rent a suite as a plain text file. Everything needed for identity theft. It was coming from a web site trying to be the go-to place for folks looking for apartments.
I changed the record number in the URL and got someone else's information.
I notified the site owner, the 3rd party web development company and the tenant - *without* mentioning calling the 2nd URL. I've seen too many stories of people being arrested after reporting problems like these.
The tenant went to the press.
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
A problem for some, an opportunity for others
I predict the winner of the next election in Florida: Votey McVoteface (I).
[ link to this | view in thread ]
Reminds me of Clint Curtis
Block chaining may eventually fix voting machine corruption, but that still doesn't change the fact that the UI can still be corrupted before the record is created.
Which was basically what < HREF="https://en.wikipedia.org/wiki/Clint_Curtis">Clint was hired to do.
Ho hum. So much graft, intimidation, poll taxing, etc. So little time.
[ link to this | view in thread ]
Re: Anyone HERE know programming??
And I am a little perturbed (though not surprised) at such a system using SQL at all. Possibly more correct would be define a protocol, and write records in straight binary to a write only media like a cdrom burner, preferably with block chaining. It should be a ONE WAY irrevocable transaction as much as possible.
Using SQL for this job is like using a 5 axis industrial robot to jerk off. There are certain inherent hazards.
[ link to this | view in thread ]
Life lessons
2. The answer to the above question is "Yes."
[ link to this | view in thread ]
Re: Re: Anyone HERE know programming??
The only problem I see, is HOW MUCH money someone is willing to PAY to corrupt it..
1. DONT need a high end computer..
2. Dont need fancy programming..
3. BASIC 1...could get this done..bag graphics, but it would be DONE..
4, STORE data on a RO CD/DVD/whatever...and pop it into a Machine to send ALL DATA...
I see broken machines, I see EASY to hack machines, I see every reason under the sun..for WHY they dont want this to work..
EVEN in the old days, they have shown that ANY system was corruptible...as long as you had people on the inside..
[ link to this | view in thread ]
Re: "replaced with one that ran WordPress."
[ link to this | view in thread ]
I believe in democracy, but
[ link to this | view in thread ]
Re: Re: Re: something better to read
[ link to this | view in thread ]
Re: Re: Anyone HERE know programming??
Uh, [hey], [do you have a line on those 5 axis thing a ma jig robots?] I'm mostly bionic and that is absolutely prohibited in my programming.. ;o)
[ link to this | view in thread ]
Re: Re: "replaced with one that ran WordPress."
[ link to this | view in thread ]
Re: Re: Re:
[ link to this | view in thread ]
He was NOT hired by Lee County to hack them, nor had he ever been granted access to the systems, not did he have permission to use that users credentials.
Totally illegal.
Also, why does he keep calling SQL "Search Query Language"?
[ link to this | view in thread ]