Montreal Student's Academic Future is "Ruined" by Responsible Disclosure
January 21, 2013 2:47 PM
comment(s) - last by
Over 250,000 user records could have been compromised due to the negligent security
When people wonder why some hackers
opt for the relatively destructive route
, one only needs to look at the numerous troubling stories of hackers who went on what is supposedly a more responsible route of discrete disclosure, only to be punished.
I. Student Goes From Hero to Harassed Over Discrete Disclosure, Testing
The latest such unfortunate victim of incompetent and belligerent staff is Ahmed Al-Khabaz, a student at
, an institution in Montreal, Quebec, Canada.
As part of a school project, Mr. Al-Khabaz was recruited to create a mobile app that would allow students to access their student accounts on a system called "Omnivox" used by most of Quebec's CEGEPs (General and Vocational Colleges). But he and a colleague discovered a serious security flaw that would put nearly 250,000 students' personal information at risk.
Dawson College is located in Montreal, Quebec. [Image Source: Dawson College]
Looking to do the right thing, he scheduled a meeting with Dawson College's Director of Information Services and Technology, François Paradis. Mr. Al-Khabaz recalls, "I saw a flaw which left the personal information of thousands of students, including myself, vulnerable. I felt I had a moral duty to bring it to the attention of the college and help to fix it, which I did. I could have easily hidden my identity behind a proxy. I chose not to because I didn’t think I was doing anything wrong."
Ahmed Al-Khabaz, a star computer science student was initially praised for finding a serious security flaw, but was subsequently condemned for checking if it had been fixed.
[Image Source: National Post]
Mr. Paradis commended him for his work, as was his colleague, Ovidiu Mija. Mr. Paradis promised that the university and the third-party software partner who produced the software, Skytech, would immediately fix the gaping hole.
But that praise soon turned to condemnation. Days later Mr. Al-Khabaz looked to test if the flaw had been indeed fixed, by probing the system with a vulnerability toolkit, Acunetix.
At that point he received an angry call from Skytech. He recalls in
, "It was Edouard Taza, the president of Skytech. He said that this was the second time they had seen me in their logs, and what I was doing was a cyber attack. I apologized, repeatedly, and explained that I was one of the people who discovered the vulnerability earlier that week and was just testing to make sure it was fixed. He told me that I could go to jail for six to twelve months for what I had just done and if I didn’t agree to meet with him and sign a non-disclosure agreement he was going to call the RCMP and have me arrested. So I signed the agreement."
The non-disclosure agreement (NDA) both forbid Mr. Al-Khabaz from future access of the company's servers, and forbid him from revealing the security flaw he found to the public.
Mr. Taza disputes Mr. Al-Khabaz's account, commenting, "All software companies, even Google or Microsoft, have bugs in their software. These two students discovered a very clever security flaw, which could be exploited. We acted immediately to fix the problem, and were able to do so before anyone could use it to access private information."
He expresses frustration at Mr. Al-Khabaz's decision to probe Skytech's network, but even he dismisses the action as harmless, commenting, "This type of software should never be used without prior permission of the system administrator, because it can cause a system to crash. He [Al-Khabaz] should have known better than to use it without permission, but it is very clear to me that there was no malicious intent. He simply made a mistake.
II. University Expels One of Its Brightest
But here comes the truly disturbing twist -- while Skytech at worst threatened Mr. Al-Khabaz into signing an NDA, his college did far worse. They called his actions in probing Skytech a "serious professional conduct issue", proceeding to expel him.
He recalls a meeting, commenting, "I was called into a meeting with the co–ordinator of my program, Ken Fogel, and the dean, Dianne Gauvin. They asked a lot of questions, mostly about who knew about the problems and who I had told. I got the sense that their primary concern was covering up the problem."
The final decision to vote on the expulsion was put before a panel of computer science professors. 14 voted to expel the student for check if the flaw had been fixed, while 1 voted against it. Mr. Al-Khabaz was expelled, and university managers twice denied his appeals.
Only one computer science professor out of 15 voted not to suspend Mr. Al-Khabaz for discrete disclosure and vulnerability testing. [Image Source: National Post]
A distraught Mr. Al-Khabaz comments, "I was acing all of my classes, but now I have zeros across the board. I can’t get into any other college because of these grades, and my permanent record shows that I was expelled for unprofessional conduct. I really want this degree, and now I won’t be able to get it. My academic career is completely ruined. In the wrong hands, this breach could have caused a disaster. Students could have been stalked, had their identities stolen, their lockers opened and who knows what else. I found a serious problem, and tried to help fix it. For that I was expelled."
The university has generally refused to discuss the case, though it did release a brief statement to the
, saying it stands behind its decision and calling Mr. Al-Khabaz's actions inappropriate. It says its typical procedure is to send a warning about conduct-related issues. It did not specifically state whether Mr. Al-Khabaz had received such a warning or whether they were aware of his sanctioned work on the Omnivox app, which triggered the discrete disclosure and testing of the flaw in question.
III. Appeal is Pending, But Mr. Al-Khabaz's Future Remains in Jeopardy
Morgan Crockett, director of internal affairs and advocacy for the Dawson Student Union, calls the action atrocious. He remarks, "Dawson has betrayed a brilliant student to protect Skytech management. It’s a travesty that Ahmad’s academic future has been compromised just so that Dawson and Skytech could save face. If they had any sense of decency, they would reinstate Ahmad into [the] computer science [program], refund the financial aid debt he has incurred as a result of his expulsion and offer him a full public apology."
A copy of the expulsion letter is seen below:
The Dawson Student Union is actively appealing the decision.
No one is advocating that hackers take illegal or destructive routes in "encouraging" businesses or academic institutions to fix their flaws. But when responsible individuals are punished and anonymous destructive disclosures often result in no action against the perpetrators, one must wonder whether the wrong message is being sent.
If Mr. Al-Khabaz's account is accurate one must wonder why any student in their right mind would want to attend such an abusive institution.
: Dawson College's webpage is currently inaccessible, although it is unclear whether it pertains to the story.
This article is over a month old, voting and posting comments is disabled
RE: Not the whole story
1/22/2013 1:01:37 PM
Read the article then read the letter.
The article is based on one persons accounts of the facts. The letter is just the facts. You don't have the College's accounts of the facts. It is simple for someone to distort the facts during their account and we don't have all the information. The truth of what happened could be significantly different.
It would be more likely that he downloaded Acunetix to determine how to make the connection to his app and the College system which is how he found the security hole. Based on the facts, the day after his account was suspended the first time, he admitted in writing to having broken the IT Policy. The second time should never have happened since whatever was submitted in writing after the first suspension should have outlined that the next breach would be grounds for expulsion.
BTW. has anyone confirmed that the SQL injection issue has not been fixed or is this ex-student's account enough?
"I'd be pissed too, but you didn't have to go all Minority Report on his ass!" -- Jon Stewart on police raiding Gizmodo editor Jason Chen's home
Goatse Security iPad Hacker Found Guilty, Faces up to Five Years in Prison
November 21, 2012, 2:42 PM
NSA Chief to Pitch "Common Core Values" to Hackers at DEFCON 20
July 24, 2012, 3:25 PM
Quick Note: Former Googler Becomes Director of U.S. Patent and Trademark Office
December 12, 2013, 10:42 AM
AT&T Launches U-verse with GigaPower Network in Austin, Texas
December 11, 2013, 5:14 PM
Harlem to Receive U.S.' Largest Free Wi-Fi Network
December 11, 2013, 11:48 AM
Google's First Asian Data Centers Now Operational
December 11, 2013, 8:50 AM
Seattle's High-Speed Internet Rollout Delayed Due to Financial Issues
December 10, 2013, 12:14 PM
Report: Spotify Working on Free, Ad-Supported Mobile Service
December 6, 2013, 9:52 AM
Most Popular Articles
Experts: Masturbation Prevents Cancer, Diabetes, Insomnia, and Depression
December 6, 2013, 2:01 PM
Hackers Nab 2 Million Login Credentials from Facebook, Gmail, Twitter
December 5, 2013, 1:00 PM
Thieves Steal Truck with Cobalt-60 Onboard in Mexico, Will Die "Without a Doubt" from Exposure
December 5, 2013, 12:04 PM
Report: Windows 8.2 Revives Start Menu, Runs Metro Apps in Desktop Mode
December 10, 2013, 2:56 PM
U.S. Navy Fires "XFC" Drone from Underwater Submarine
December 6, 2013, 2:35 PM
Latest Blog Posts
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
Is The Period Becoming an Expression of Anger?
Nov 26, 2013, 2:02 PM
NSA and Congress -- You Will Never Kill the Constitution, It's an Idea
Nov 10, 2013, 2:00 PM
AT&T Explores $100B+ USD Deal to Acquire Vodafone's European Operations
Nov 4, 2013, 7:34 AM
More Blog Posts
Copyright 2013 DailyTech LLC. -
Terms, Conditions & Privacy Information