Security pros work to undo teacher's conviction
'This machine should not have been on the Internet'
Researchers led by the head of a Florida anti-spyware firm aim to recreate what caused a Connecticut school's classroom computer to start displaying pornographic pop-ups in October 2004, an incident that recently led to four felony convictions for the substitute teacher involved.
This was a Windows 98 SE machine with IE 5 and an expired antivirus subscription. It hadn't been update since August, and there was no anti-spyware, no pop-up protection, no firewall and no content filters. Regardless of whatever happened, this machine was a machine that should not have been on the Internet.
On January 5, a six-person jury found former Kelly Middle School substitute teacher Julie Amero guilty of four counts of risk of injury to a minor. The charges stem from an October 19, 2004 incident when the computer in the classroom in which Amero was teaching started displaying pornographic pop-up advertisements. Prosecutors argued that Amero surfed porn sites while in class, causing the pop-up advertisements, while the former teacher's defense attorney argued that spyware installed from a hairstyling Web site caused the deluge of digital smut.
The case has attracted an enormous amount of interest, because the reported details of the trial appear to indicated that a lack of understanding of the technology involved and not solid digital evidence, led the jury to convict the teacher.
Alex Eckelberry, president of anti-spyware firm Sunbelt Software, hopes to put the case to rest. Armed with an image of the disk from the Windows 98 SE computer, the technology expert put out a call to interested security researchers and assigned his own workers to the case.
"We have had huge offerings of support from the security community," Eckelberry said this week. "Other experts in the forensics community--and these are not small players--have come to us and offered to help."
The criminal conviction would not be the first case of misunderstood technology leading to a guilty verdict. In 2002, a 29-year-old network adminstrator was convicted under the Computer Fraud and Abuse Act for sending 5,600 e-mail messages to customers of his former employer--the now-defunct e-mail provider Tornado Development--warning about a security hole in Tornado's service that left private messages vulnerable to unauthorized access. The prosecutors in the case argued, and the judge agreed, that McDanel was guilty of unauthorized access and abused Tornado's e-mail servers to send the messages. The prosecutors have since admitted their mistake and the case was overturned on appeal, but not before McDanel served 16 months in prison.
"In technologically complicated cases, expert testimony is really important--more so then in your normal prosecutions," said Jennifer Granick, executive director of the Center for Internet and Society at Stanford University's School of Law and the attorney that defended McDanel in his appeal. "It is complicated for a normal person--the idea that the computer does something without your agency is not something that they understand."
In the latest case, a regular teacher logged into the classroom computer, because Amero did not have credentials. The substitute teacher was told not to log out or turn off the computer, according to media reports.
Sponsored: Network DDoS protection