91制片厂视频

Law & Courts

Student Hackings Highlight Weak K-12 Cybersecurity

By Benjamin Herold 鈥 June 12, 2018 6 min read
  • Save to favorites
  • Print
Email Copy URL

A spate of incidents involving students hacking their schools鈥 networks and software programs is again highlighting the weak cybersecurity practices in K-12 education.

From California to New Jersey, teenagers have allegedly improperly accessed student-information systems, online learning programs, and college-counseling software in at least 10 states this school year. Often, their motivation was to change grades. And, typically, the hacks were technically unsophisticated, involving little more than students finding a teacher鈥檚 password or login credentials.

K-12 information-technology experts say the scope of the problem reflects an ongoing failure by schools and districts to take even the most basic measures to protect their networks.

鈥淭he biggest challenge to maintaining cybersecurity is not technology but people,鈥 said Marie Bjerede, the principal for leadership initiatives at the Consortium for School Networking, a professional association for school technology officials.

The problem of students using computers to alter school records is nothing new. Consider, for example, the popular 1983 movie 鈥War Games,鈥 in which a young hacker played by Matthew Broderick nearly starts World War III鈥攂ut not before breaking into his school鈥檚 network to change his and his girlfriend鈥檚 grades.

Thirty-five years later, similar incidents are still presenting challenges for K-12 leaders. Bolstering cybersecurity is one big issue. But figuring out how to appropriately discipline the students responsible has also proved vexing.

Hacker Prevention

K-12 cybersecurity experts suggest that schools take such basic measures to prevent against hacks as:

Train staff on good password practices: No sticky notes. Use long, complex passwords. Don鈥檛 repeat passwords across platforms. Consider password-management software.

Require two-factor authentication: Even if a hacker inappropriately obtains a password, he or she won鈥檛 be able to access a network without a second piece of information, such as a code sent to the legitimate user鈥檚 mobile device.

Be vigilant about ensuring role-based access to information: No one associated with a school should have access to more information than he needs to do his job.

Patch software regularly. Some more sophisticated hackers seek to exploit vulnerabilities in software. That can often be prevented by making sure programs are updated and patched regularly.

In some cases, districts have launched aggressive criminal investigations that have led to felony charges. Often, such prosecutions have occurred under state laws modeled after the federal Computer Fraud and Abuse Act, which makes it a crime to access certain computers or computing systems without authorization, said Tor Ekeland, a New York City-based defense lawyer who specializes in representing hackers and white-collar defendants.

That approach is often 鈥渙verzealous鈥 and often motivated by a desire to save face after weak cybersecurity practices are revealed, Ekeland and other experts say. For all but the most serious breaches involving K-12 students, the experts argue, school-based discipline is likely more appropriate.

鈥淭hese are just kids,鈥 Ekeland said. 鈥淚f we prosecuted computer crimes in the 1970s like we do now, Steve Jobs and Bill Gates would have gone to jail, and we wouldn鈥檛 have Apple and Microsoft.鈥

Four student-hacking incidents from this school year represent similar problems across the country.

East Brewton, Ala.

Last month, Alabama Attorney General Steve Marshall announced the arrests of a student and teacher in the 4,500-student Escambia County district, charging them with the felony of computer tampering for allegedly altering grades at W.S. Neal High School.

Local news reports alleged that senior Matthew Hutchins had improperly accessed a school computer system (later identified as INow, a student-information and data-management system.) Special education teacher Lisa Odom was also arrested and charged with a felony in connection with the incident.

According to WEARTV.com, school officials noticed discrepancies in the grades of a number of students, prompting the district to delay its announcement of top student performers.

In an interview last month with AL.com, Escambia County Superintendent John Knott said that multiple students were involved and that a full review was underway. AL.com has also reported that an assistant principal鈥檚 login credentials were used to change grades over a six-month period.

The Escambia County board of education,the Alabama attorney general鈥檚 office, and lawyers for Hutchins and Odom did not respond to requests for comment from 91制片厂视频 Week.

Both Hutchins and Odom face up to 10 years in prison if convicted.

In general, Ekeland, who is not directly involved in the Hutchins鈥 case, said K-12 administrators should think twice about why they鈥檙e pursuing such severe measures.

鈥淭he hacker bears some responsibility,鈥 Ekeland said. 鈥淏ut a felony will follow a student for the rest of his life.鈥

Concord, Calif.

Sixteen-year old David Rotaro told California鈥檚 ABC13 Eyewitness News that a grade-changing scheme he executed was 鈥渓ike stealing candy from a baby.鈥

According to local television station KTVU, Rotaro, a sophomore at Ygnacio Valley High in the 32,000-student Mount Diablo district, executed a relatively sophisticated hack. Rotaro reportedly created a fake website that mirrored his district鈥檚 actual website, then sent a 鈥減hishing鈥 email out to teachers in the hope that someone would use his or her actual login and password to access his site.

Mount Diablo staff are 鈥渞outinely advised against opening suspected phishing or spam messages,鈥 a district spokeswoman told 91制片厂视频 Week. Still, a teacher bit on one of Rotaro鈥檚 messages, allowing the student to access the school鈥檚 computer system in order to change the grades of roughly a dozen students.

Rotaro, who told local news outlets he hopes to work in IT as a professional, has been charged with 14 felony counts, according to multiple media reports.

91制片厂视频 Week did not receive a response to messages left on a phone number believed to be associated with the student鈥檚 family.

Doug Levin, who tracks K-12 cybersecurity breaches through his consulting firm, Edtech Strategies, said the incident highlights the mixed messages schools are giving students.

鈥淲e鈥檙e telling kids that tech is the future and learning to code is where all the good jobs are,鈥 Levin said. 鈥淚t鈥檚 not surprising that they would use these tools to test limits, including with the school IT systems they know best.鈥

Tenafly, N.J.

A senior at high-performing Tenafly High allegedly breached the school鈥檚 student-information-management system and a software program used to submit college applications and transcripts, apparently because he felt pressure to improve his profile for Ivy League universities.

The school launched an investigation after a guidance counselor noticed the student鈥檚 grades had been altered, according to NorthJersey.com. The student was suspended, and his college applications were rescinded.

The local board of education filed two criminal charges against the student, according to the news outlet. An official said the Tenafly police department could not comment on the incident because it involved a juvenile. The Tenafly district did not respond to a request for comment.

In general, K-12 chief technology officers often underestimate the cybersecurity threats they face and fail to take basic precautions, according to a 2017 survey of school IT leaders administered by CoSN and the 91制片厂视频 Week Research Center.

One-third of those surveyed said they hadn鈥檛 encouraged district staff to upgrade passwords, for example. Just 11 percent said they required two-factor authentication for district accounts.

But thanks to a steady drumbeat of hacking-related headlines, that could be changing, said Bjerede of CoSN.

鈥淚 think that awareness of cybersecurity issues has grown dramatically,鈥 she said.

Gadsden, N.M.

Officials in the 14,000-student Gadsden school district notified parents that 55 students allegedly took part in a grade-changing scheme involving an online course.

The students apparently logged into a teacher account on Edgenuity, an online-course provider and grading platform, and changed a total of 456 grades, according to a statement provided by the district.

Five students were suspended, and the remainder will have to redo their work in the courses in which grades were changed in order to receive credit. Twenty-nine seniors were not eligible to graduate on time as a result of the incident.

The hack came to light because Edgenuity logs and time stamps all activities undertaken on each account on its software. But the issue at hand in Gadsden was poor password practices, a spokesperson for the company said.

Good password security ultimately 鈥渃omes down to the individual entrusted with the password,鈥 an Edgenuity spokesperson said in a statement.

Recurring problems on that front speak to a larger problem in the K-12 sector, said Levin of EdTech Strategies.

鈥淭he adults have to take responsibility, too,鈥 Levin said. 鈥淚f a 14-year old can penetrate your system this easily, you鈥檙e not locking the windows and doors like you should be.鈥

Research Librarian Holly Peele and Staff Writer Sarah Schwartz contributed to this story.
A version of this article appeared in the June 13, 2018 edition of 91制片厂视频 Week as K-12 Schools Get Hit Hard By Hacking

Events

Recruitment & Retention Webinar Keep Talented Teachers and Improve Student Outcomes
Keep talented teachers and unlock student success with strategic planning based on insights from Apple 91制片厂视频 and educational leaders.鈥
This content is provided by our sponsor. It is not written by and does not necessarily reflect the views of 91制片厂视频 Week's editorial staff.
Sponsor
Families & the Community Webinar
Family Engagement: The Foundation for a Strong School Year
Learn how family engagement promotes student success with insights from National PTA, AASA鈥痑nd leading districts and schools.鈥
This content is provided by our sponsor. It is not written by and does not necessarily reflect the views of 91制片厂视频 Week's editorial staff.
Sponsor
Special 91制片厂视频 Webinar
How Early Adopters of Remote Therapy are Improving IEPs
Learn how schools are using remote therapy to improve IEP compliance & scalability while delivering outcomes comparable to onsite providers.
Content provided by 

EdWeek Top School Jobs

Teacher Jobs
Search over ten thousand teaching jobs nationwide 鈥 elementary, middle, high school and more.
Principal Jobs
Find hundreds of jobs for principals, assistant principals, and other school leadership roles.
Administrator Jobs
Over a thousand district-level jobs: superintendents, directors, more.
Support Staff Jobs
Search thousands of jobs, from paraprofessionals to counselors and more.

Read Next

Law & Courts The New Title IX Regulation and Legal Battles Over It, Explained
The Biden administration's regulation that interprets Title IX to protect LGBTQ+ students faces multiple legal challenges.
5 min read
Claudia Carranza, of Harlingen, hugs her son, Laur Kaufman, 13, at a rally against House Bill 25, a bill that would ban transgender girls from participating in girls school sports, outside the Capitol in Austin, Texas, on Wednesday, Oct. 6, 2021.
Claudia Carranza, of Harlingen, Texas, hugs her son, Laur Kaufman, 13, at a rally for transgender rights in Austin on Oct. 6, 2021. The U.S. Department of 91制片厂视频's new Title IX regulation, which adds gender identity and sexual orientation to the definition of sex discrimination, has been challenged in multiple lawsuits and blocked in 26 states and at individual schools in other states.
Jay Janner/Austin American-Statesman via AP
Law & Courts Court Upholds Injunction on Arizona Transgender Sports Ban for Young Athletes
A federal appeals court upholds an injunction against an Arizona law, allowing two transgender girls to compete on female teams.
3 min read
Arizona State Superintendent of Public Instruction Tom Horne, left, a Republican, takes the ceremonial oath of office from Arizona Supreme Court Chief Justice Robert Brutinel, right, as wife Carmen Horne, middle, holds the bible in the public inauguration ceremony at the state Capitol in Phoenix, Thursday, Jan. 5, 2023.
Arizona schools chief Tom Horne, left, takes the ceremonial oath of office at the state Capitol in Phoenix in January 2023. The Republican is the lead defendant in a lawsuit filed by two transgender girls challenging the Save Women's Sports Act, which bars transgender women and girls from female sports.
Ross D. Franklin/AP
Law & Courts How Moms for Liberty's Legal Strategy Has Upended Title IX Rules for Schools
The grassroots group's tactic is confounding schools across the country trying to keep up with which Title IX rules apply to them.
7 min read
Moms for Liberty co-founder Tina Descovich speaks before Republican presidential nominee former President Donald Trump at the Moms for Liberty annual convention in Washington, Friday, Aug. 30, 2024.
Moms for Liberty co-founder Tina Descovich speaks before Republican presidential nominee former President Donald Trump addressed the group's annual convention in Washington on Aug. 30. One popular session was about Moms for Liberty's lawsuit challenging the Biden administration's Title IX regulation.
Mark Schiefelbein/AP
Law & Courts Supreme Court Leaves Biden's Title IX Rule Fully Blocked in 26 States
The court's action effectively leaves in place broad injunctions blocking the entire regulation in 26 states and at schools in other states.
5 min read
The Supreme Court building is seen on Thursday, June 13, 2024, in Washington.
The Supreme Court building is seen on Thursday, June 13, 2024, in Washington.
Mark Schiefelbein/AP