back to article Brit student locked up for Facebook source code hack

A British computer science student was jailed for eight months on Friday for hacking into the internal network at Facebook. Glenn Mangham, 26, previously pleaded guilty to hacking into the social networking site between April and May last year. The incident created a flap at Facebook amid fears that hackers were attempting to …

COMMENTS

This topic is closed for new posts.

Page:

  1. Bumpy Cat
    FAIL

    Proxies

    People never learn ... proxy several times or don't try at all.

    1. Anonymous Coward
      Anonymous Coward

      Re: Proxies

      I believe that the correct method has always been NEVER to hack from home...

      1. Peter2 Silver badge

        Re: Re: Proxies

        I beleive that the correct method has always been NEVER to hack a network that you aren't being paid to do penetration testing on, with signed paperwork attesting that from their network manager.

        Unless your willing to do some jail time if and when entire teams of people just as good or better than you are decide to track you down and pass your info to the police.

        1. Anonymous Coward
          Anonymous Coward

          Re: Re: Re: Proxies

          How many police in the world are able to track someone who is borrowing someone elses wireless internet service?

          1. Daniel 4

            Re: Re: Re: Re: Proxies

            "How many police in the world are able to track someone who is borrowing someone elses wireless internet service?"

            We know of at least one company that built a huge wifi database that included MAC and physical address correlations, even if they did get slapped down for it (Google, I'm looking at you). It's not a big stretch to see police using such information in high profile cases.

            -d

      2. Anonymous Coward
        Anonymous Coward

        Re: Re: Proxies

        Hack from someone Else's wireless connection. Works for me.

    2. Anonymous Coward
      Anonymous Coward

      Re: Proxies

      He should have been behind at least 7 proxies.

    3. Anonymous Coward
      Anonymous Coward

      Re: Proxies

      Proxy as many times as you like, I bet every single one has logs about who is connecting and from where. Unless its in a country relatively unfriendly to the US they will give them up when the Feds come knocking.

      1. Wize

        Re: Re: Proxies

        Or, better still, don't use your own connection at all.

        So many unlocked wifi points out there to choose from.

        1. Anonymous Coward
          Anonymous Coward

          Re: Re: Re: Proxies

          So many unlocked wifi points out there to choose from.

          Don't forget to spoof your mac address

    4. Lockwood

      Re: Proxies

      "People never learn ... proxy several times or don't try at all."

      And make InterNIC your first hop?

  2. Andrew Moore
    Thumb Down

    Really?!?!?

    "software blueprints"????

    Surely you mean"source code".

    1. dotdavid
      Thumb Up

      Re: Really?!?!?

      Unless Facebook keep their source code on blueprints? That would be awesome.

      Hopefully in a bunker tastefully lit with concealed blue lighting. Oh, and some of those laser beam tripwires. And a tank full of sharks.

    2. Anonymous Coward
      Anonymous Coward

      Re: Really?!?!?

      I suspect "software blueprints" really means process flowcharts, specification documentation etc.

      You may have the sourcecode, but it it's going to take a hell of a lot more work to interpret it, without the documentation that says how it hangs together and why.

      1. Anonymous Coward
        Happy

        Re: Re: Really?!?!?

        Actually if Facebook is like every other software company, what they have is sparse documentation that vaguely says how it was intended to hang together before they started coding it.

  3. Anonymous Coward
    Anonymous Coward

    Someone give this guy a job, $200,000 on the case, what a waste of money. The MET are useless when it comes to cyber crime and digital forensics, take it from someone who has experience with them.

    1. Peter2 Silver badge
      Thumb Down

      No. You don't give criminals a job just because they broke the law. In fact, it's a reason not to give them a job. The very fact a person has illegally hacked a computer shows that they are not suitable for working in IT because it demonstrates a lack of integrity and moral fibre. It also demonstrates that you can't trust them, a not insubstantial point when working in any non sandboxed position of trust in operations, security, or any job where you work with sensitive material.

      Secondly, giving criminals jobs because they are criminals is stupid. It's encouraging people to break the law for their own gain. Not only is it stupid for that reason, but it would be disadvantageous and insulting to the law abiding (and more competent) people to hire a incompetent "hacker" who firstly broke the law and secondly got caught doing it.

      1. Anonymous Coward
        Anonymous Coward

        @Peter2

        Oh really? What about Frank Abagnale Jr then?

        I know of one person who was given a choice of being charged or working as a security consultant. He's now a very respected member of the security world and gives many lectures and talks on the subject of network security. He did it because "he could" and because he had nothing better to do. There wasn't any malicious intent and he's one of the most trustworthy people I know.

        As he put it: "would you rather your security was designed by someone who knew the theory of security or the practice?" Using people who've been caught in the act is more common than you'd imagine and has to be the ultimate definition of rehabilitation.

        1. Alfred

          Known crims working for me? No thanks.

          The majority of criminals who work somewhere do not use their expertise to prevent crime - if they use it, they use it to carry out crime. Far more people help themselves from the till than turn in their workmates for doing so.

        2. JDX Gold badge

          Re: @Peter2

          >>As he put it: "would you rather your security was designed by someone who knew the theory of security or the practice?" Using people who've been caught in the act is more common than you'd imagine and has to be the ultimate definition of rehabilitation.

          Hiring someone who was once a criminal is one thing. Hiring a current criminal is another.

      2. Jedit Silver badge
        FAIL

        "You don't give criminals a job just because they broke the law"

        Setting a thief to catch a thief is more common than you know. I was going to provide anecdotal evidence of my local police using a guy with a B&E conviction as an official locksmith, but decided against it because it's just anecdotal. Then, with perfect timing, this appeared:

        http://www.bbc.co.uk/news/uk-england-leeds-17075027

        For those who can't be bothered clicking, West Yorkshire Police employ an ex-burglar as a consultant on crime prevention tactics.

        1. Anonymous Coward
          Anonymous Coward

          Re: "You don't give criminals a job just because they broke the law"

          I strongly suspect he had done his time and had a spent conviction - this is rather different to employing someone who is known to have committed crimes and not been convicted, or who has not spent their conviction.

        2. Jan 0 Silver badge
          Thumb Up

          @Jedit

          Thank you. You are a true gentleman. The first poster I've seen (anywhere/anywhen) to actually summarise what their link is pointing at.

  4. Anonymous Coward
    Anonymous Coward

    Pfft

    Should just release their crappy code now seeing as they were such pricks about it. Surely if he wasn't above board and wanted "money or who knows what could happen" we'd have heard about it.

  5. Joseph Haig

    Facebook would do well to employ this guy instead of prosecuting him. He clearly knows better than any of their current security team what needs to be tightened up.

    1. JDX Gold badge

      >>Facebook would do well to employ this guy instead of prosecuting him. He clearly knows better than any of their current security team what needs to be tightened up.

      That their security team not only detected his intrusion but tracked him back to his bedroom suggests they're not exactly useless.

      1. Anonymous Coward
        Anonymous Coward

        Indeed

        The fact that a target as big as Facebook isn't lying in a big heap of 0wned code is probably something of a testiment to their I should imagine daily and un-ending work.

  6. Ottman001
    WTF?

    I'm not trying to question the outcome of this trial (his attempts to cover his tracks was always going to go down badly in a court of law) BUT... have a look at these words of Judge McCreath quoted on the BBC site:

    "The creation of that risk, the extent of that risk and the cost of putting it right mean at the end of it all I'm afraid a prison sentence is inevitable."

    Doesn't this suggest that Judge McCreath doesn't know what he is talking about? The security flaw existed before Mangham found it and it is the responsibility of Facebook to put it right regardless of if it has been exploited or not. If Mr Manghams actions cost Facebook anything, it'll be the legal costs they incurred in order to shoot the messenger. Facebook surely have all liability for the consequences of any insecurities in their own system?

    1. Anonymous Coward
      Anonymous Coward

      I sort of agree, but...

      Whilst I agree that the flaw in facebook's security is their problem, this is not the correct way to bring it to their attention.

      For instance, you go to bed at night, and you forget to shut your back door.

      1) Your neighbour wakes you up by calling your phone or ringing the doorbell, you get up, thank them and shut and lock the door.

      2) Someone else enters your house, takes photos of you and your family asleep and later emails them to you with a note saying "by the way, you forgot to lock your door"

      Clearly 1 is legal and 2 is not. This gentleman's actions, whilst (probably) good intentioned are more like 2 than they are like 1.

      IMO.

      1. Mystic Megabyte
        Unhappy

        Re: I sort of agree, but...

        It's too late, the law has been subverted so that if I even take a photograph of your open back door I will be done for copyright theft. No puns intended.

        Facebook have joined my ever increasing list of companies that I will have nothing to do with.

      2. Ottman001

        Re: I sort of agree, but...

        I agree.

        As I said, I'm not questioning the outcome of the trial because 1) I'm not exactly legally qualified 2) I don't believe that I know all of the facts about the case.

        I merely take exception to the judge justifying the sentence with a load of made up nonsense.

        1. Anonymous Coward
          Anonymous Coward

          Re: Re: I sort of agree, but... (from original AC)

          Ah, I see what you're saying here. Yes indeed the cost of putting the security flaw right should fall on facebook, however, there is the cost of the investigation by various agencies plus any time facebook had to spend on it. None of which would apply had the individual contacted Facebook immediately saying "here is a flaw in your security, it would allow access to source code if I wanted it, I used this flaw at (list of dates / times) in order to confirm this."

          Still not really legal, but would at least give him significantly more mileage in his "I was going to tell them, honest" defence.

          Also, as has been said by others, definitely NOT the way to get someone to want to give you a job.

          1. Ottman001

            Re: Re: Re: I sort of agree, but... (from original AC)

            "however, there is the cost of the investigation by various agencies"

            Very good point. I hadn't considered that.

            Yes, obviously he absolutely should have let them know of the vulnerability immediately, especially considering he went on to use the "I was going to tell them, honest" defence.

            At least he didn't (by which I mean that I haven't read) dump the code into pastebin or make it easily and readily available in some other way. If he'd of done that, the judge would be absolutely correct in that he created new risk. We don't know how he did store the source code so the judge may still be correct in this point.

            I'll just shut up now then :)

            1. Anonymous Coward
              Anonymous Coward

              Re: Re: Re: Re: I sort of agree, but... (from original AC)

              Well, I'll have the last word (as if!). The way you tell them depends on how willing they are to listen. I'm sure it still happens that of these various online businesses in which security is critical, there are plenty who ignore you, ignore your report, until you force them to take notice in one imaginative way or other. Unlike the dodos who get taken by email scams and you suspect anyone that stupid won't learn any other way, said businesses who just ignore security are - whether legally, or only morally - themselves committing a crime. You know, like the various government departments who just repeatedly spunk our private data into the public domain and, because the taxpayer gets penalized for it, never learn. I certainly won't assume Facebook is blameless any more than I do that this guy was acting benevolently.

      3. Jason Bloomberg Silver badge
        Headmaster

        Re: I sort of agree, but...

        "Clearly 1 is legal and 2 is not."

        Except 2 is not necessarily illegal of itself. There might be a case for 'protection of privacy' in your example but that's debatable and we can take that out of the equation if you replace the analogy with someone sitting in your unlocked car taking their photos of its equipment and then emailing them to you.

        The up-votes suggest a lot of people think it would be illegal. Being greatly shocked by what has transpired doesn't necessarily make for a crime.

        1. Anonymous Coward
          Anonymous Coward

          Re: Re: I sort of agree, but... @Jason

          If it is not illegal to wander around someone else's house without permission regardless of whether the door was left open / unlocked, then it bloody well should be!

          1. Anonymous Coward
            Anonymous Coward

            Re: Re: Re: I sort of agree, but... @Jason

            You mean an unlocked door isn't an open invitation? 'snot exactly "breaking and entering" now, is it if the door's already open? And while it might be trespass, that's "only" a civil offence... (I think)

            So what are you views on open wifi? If that's not an open invitation (quite literally, it is being broadcast after all) then I don't know what is. I suspect that some individuals may still try the house analogy though.

            1. JimC

              Re: Re: Re: Re: I sort of agree, but... @Jason

              No, of course an unlocked door isn't an open invitation. An Open invitation is where there's a bloody great sign saying "please come in". The only way an open wifi would be an open invitation would be if it said so in the damn network name.

              Some of you people really badly need to go to ethics classes...

              1. APA
                Mushroom

                Re: Re: Re: Re: Re: I sort of agree, but... @Jason

                I was trying to highlight fallacy of comparing break in and entering/burglary/trespass against anything in the digital realm - the two just don't correlate and the overly simplistic analogies are quite misleading. Though I do believe the above discussion was really to do with poacher-turned-gamekeeper scenarios and how effective they can be. In this case, I'm not sure that applies for the very simple reason HE GOT CAUGHT! That rules you out of "cyber mastermind" in my book and so you certainly shouldn't be offered jobs, leaniency (you know what you were doing) etc. Give the hypothetical job to a cracker with a clean record because that means either he's A) trustworthy or B) really good. You won't see it coming in either case...

                In Britain there are two laws that cover this general area, the Computer Misuse Act which concerns the access and use of machines without permission but there's also the Data Protection Act which addresses companies' responsibility to look after their collected data, i.e. personal information about US and how they're accountable; register with the ICO and report any breaches (Sadly they don't seem to have any teeth and IMO there should be associated penalties, see the ICO's own FAQ http://goo.gl/M5I6X). Nevertheless, Facebook should treat their user information with the utmost respect. Sure, in this case no data was actually taken but next time they might not be so lucky. The next infraction might be not be so well intentioned, consequently they should take advice from where ever they can get it (unpaid - see first paragraph) or else face charges of negligence/incompetence (now if that isn't illeagal, it should be).

                Just putting up a sign saying "do not enter" is not security, systems actually do have to be, well... secure. To the point of openly challenging the white hats to take their best shot. Only then can the general public be confident that their details are being looked after properly.

                Go on. Flame me.

                1. JimC

                  > Just putting up a sign saying "do not enter" is not security

                  Well, yes it is. Because it deliniates the point at which you become one of the bad guys. Anyone who goes past that sign has crossed the line at which they become of concern to the security infrastructure. Of course in almost all cases a greater level of security is required, but ultimately you almost certainly can't keep a bad guy with sufficient resources* out, so its a question of achieving an appropriate balance. Anyone who believes in absolute security is rather charmingly naive.

                  -----------------------

                  *

                  "You and whose army?"

                  "My army. This one, with the guns, and tanks, and helicopters, and missiles, and nuclear submarines"

                  "Oh, that army. In that case I can't stop you from gaining physical access to the server."

                  1. This post has been deleted by its author

                  2. APA

                    Re: > Just putting up a sign saying "do not enter" is not security

                    "Well, yes it is. Because it deliniates the point at which you become one of the bad guys. Anyone who goes past that sign has crossed the line at which they become of concern to the security infrastructure."

                    Yes, it proves that a line has been crossed, that you've knowingly done something that you shouldn't have.

                    No, its irresponsible if you're holding sensitive information on behalf of someone else and rely on people's good will not to cross a line, especially once you've told them it's there.

                    Isn't relying on the legal position to follow up an attack a case of "shutting the stable door after the horse has bolted"? The damage has already been done and that data is now in the wild regardless as to whether the perpetrator is banged up or not. I'd rather it wasn't leaked in the first place.

        2. Charles Manning

          Re: Re: I sort of agree, but...

          It has nothing to do with privacy. Just entering a building without reasonable cause is a crime.

          In all the countries I have lived, there are laws against breaking and entry, these being separate crimes.

          Defined approximately as follows:

          "Breaking" means gaining access to a building via any use of force, even the slightest amount. If a door is open but ajar and the door is pushed wider open, then that is considered use of force and constitutes "breaking".

          "Entering" means entering without reasonable cause.

          I'm pretty sure UK uses these definitions too.

          Entering a building and taking pictures of people while they sleep would certainly fail the "reasonable cause" test.

    2. Anonymous Coward
      Anonymous Coward

      Yes indeed. But this is merely the latest example of cluster fuckwittery between an Internet company and an ignorant, lazy judicial system. Once again the contestant with the deepest pocket wins all.

      Really Facebook deserves to have its shitty source spread about for all to see. (Assuming of course they didn't just cobble the whole thing out of open source projects in the first place and the only secret bit is some Perl script.)

    3. Blofeld's Cat

      "The security flaw existed before Mangham found it..."

      Yes the security flaw that allowed Mangham in, already existed.

      It appears however that the judge was referring to the additional risk Mangham created by downloading the source code from the secure Facebook network.

      1. This post has been deleted by its author

      2. Anonymous Coward
        Anonymous Coward

        @Blofeld's Cat

        The quoted BBC article doesn't suggest that.

        1. friedegg03
          Facepalm

          Re: @Blofeld's Cat

          It does:

          Ex-burglar Peter Findlay said snapping the lock was "simpler and quicker".

          Mr Findlay, who now works with police to help them with crime prevention tactics

    4. Martyns
      Trollface

      What has Facebook got to hide?

      Indeed, and no one has asked why Facebook are so determined to hide their code. There's little doubt that Facebook trample privacy, could it be the beast has more to hide? I bet if the judge wanted a proper investigation into this affair it would have been blocked.

  7. Hans Upp
    Black Helicopters

    Well, surely the FBI would immediately demand his extradition to Gitmo , to which the UK govt would be only too happily fawning to do?

    I mean, hacking facebook must pose a huge threat to world peace.

    No wait, who ever said the yanks were interested in world peace, there's money to be made. Pah!

Page:

This topic is closed for new posts.

Other stories you might like