Justice Apologizes For Iowa Court System Authorizing Security Vulnerability Testing That Led To Break-Ins

Justice Apologizes For Iowa Court System Authorizing Security Vulnerability Testing That Led To Break-Ins

At a legislative hearing Friday, court administrators answered questions about their decision to hire “penetration testers” who were arrested for burglary last month.

The chief justice of the Iowa Supreme Court publicly apologized Friday for the court system’s authorization of security vulnerability tests that led to the arrests of two Coalfire employees for courthouse break-ins. 

The state senate’s Government Oversight Committee held a hearing to hear testimony about the break-ins at the Dallas and Polk County courthouses in September. According to reporting from The Des Moines Register, the Coalfire employees were following through on a contract signed by Iowa court system officials hiring them to test the “adequacy and effectiveness” of security at government buildings. 

"In our efforts to fulfill our duty to protect confidential information of Iowans from cyberattacks, mistakes were made," Chief Justice Mark Cady said during the hearing. "We are doing everything possible to correct those mistakes, be accountable for the mistakes and to make sure they never, ever occur again." 

Now, information technology officials with the state court system say that the employees, who were able to gain access to two courthouses over the course of two nights, acted outside of the scope of the contract. 

The Iowa court administration hired the company to test for cybersecurity vulnerabilities and "did not intend, or anticipate, those efforts to include the forced entry into a building," according to a statement given to the Register last month. 

In turn, local law enforcement were not warned about the break-ins and responded to an alarm at the Dallas County courthouse as if it were a real burglary. While the two employees arrested for third-degree burglary are free and there are no proceedings scheduled for their cases, legislators and local police say that the situation was dangerous for all involved. 

Legislators will continue their investigation until more facts are gathered, according to Sen. Amy Sinclair, the chair of the committee.  

"It is outside the scope of the judicial branch to authorize individuals to illegally break into facilities that they neither own nor provide security for," she told the Register. 

Todd Nuccio, the state court administrator, said that the contract had not been reviewed by a legal team and that oversight steps will be considered in the future, according to the Register. Sen. Claire Celsi told the Register that the court’s shrinking budget may have played a role, leading to them signing the contract and take the most “efficient” route. 

"It’s faintly disturbing that a contract of this magnitude was allowed to move forward without further review from someone higher up the food chain maybe," Celsi said. 

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities