The confidential documents stolen from schools and dumped online by ransomware gangs are raw, intimate and graphic. They describe student sexual assaults, psychiatric hospitalizations, abusive parents, truancy — even suicide attempts.
“Please do something,” a student begged in one leaked file, recalling the trauma of continually bumping into an ex-abuser at a school in Minneapolis.
Other victims talked about wetting the bed or crying themselves to sleep.
Complete sexual assault case folios containing these details were among more than 300,000 files dumped online in March after the 36,000-student Minneapolis Public Schools refused to pay a US$1 million ransom. Other exposed data included medical records, discrimination complaints, Social Security numbers and contact information of district employees.
Rich in digitized data, the nation’s schools are prime targets for far-flung criminal hackers, who are assiduously locating and scooping up sensitive files that not long ago were committed to paper in locked cabinets.
“In this case, everybody has a key,” said cybersecurity expert Ian Coldwater, whose son attends a Minneapolis high school.
Often strapped for cash, districts are grossly ill-equipped not just to defend themselves, but to respond diligently and transparently when attacked, especially as they struggle to help children catch up from the COVID-19 pandemic and grapple with shrinking budgets. Months after the Minneapolis attack, administrators have not delivered on their promise to inform individual victims. Unlike hospitals, no federal law exists to require this notification from schools.
The Associated Press reached families of six students whose sexual assault case files were exposed. The message from a reporter was the first time anyone had alerted them.
“Truth is, they didn’t notify us about anything,” said a mother whose son’s case file has 80 documents.
Even when schools catch a ransomware attack in progress, the data are typically already gone. That was what Los Angeles Unified School District did last Labor Day weekend, only to see the private paperwork of more than 1,900 former students — including psychological evaluations and medical records — leaked online. Not until February did district officials disclose the breach’s full dimensions, noting the complexity of notifying victims with exposed files up to three decades old.
The lasting legacy of school ransomware attacks, it turns out, is not in school closures, recovery costs or even soaring cyberinsurance premiums. It is the trauma for staff, students and parents from the online exposure of private records — which the AP found on the open Internet and dark Web.
“A massive amount of information is being posted online, and nobody is looking to see just how bad it all is. Or, if somebody is looking, they’re not making the results public,” said Brett Callow, an analyst at cybersecurity firm Emsisoft.
Other big districts recently stung by data theft include San Diego, Des Moines and Tucson, Arizona. While the severity of those hacks remains unclear, all have been criticized either for being slow to admit to being hit by ransomware, dragging their feet on notifying victims — or both.
SCHOOLS SLOW TO REACT
While other ransomware targets have fortified and segmented networks, encrypting data and mandating multifactor authentication, school systems have been slower to react.
Ransomware likely has affected more than 5 million US students by now, with district attacks on track to rise this year, said Allan Liska, an analyst at cybersecurity firm Recorded Future.
Nearly one in three US districts had been breached by the end of 2021, according to a survey by the Center for Internet Security, a federally funded nonprofit.
“Everyone wants schools to be more secure, but very few want to see their taxes raised to do it,” Liska said.
Parents have instead pushed to use limited funds on things like bilingual teachers and new football helmets, said Albuquerque schools superintendent Scott Elder, whose district suffered a ransomware attack in January last year.
Just three years ago, criminals did not routinely grab data in ransomware attacks, said TJ Sayers, cyberthreat intelligence manager at the Center for Internet Security. Now, it is common, he said, with much of it sold on the dark Web.
The criminals in the Minneapolis theft were especially aggressive. They shared links to the stolen data on Facebook, Twitter, Telegram and the dark Web, which standard browsers cannot access. A handwritten note naming three students involved in one of the sexual abuse complaints was featured for a time on YouTube competitor Vimeo, which promptly took down the video.
The cybercrime syndicate behind the Los Angeles United attack was less brazen. However, the 500 gigabytes it dumped on its dark Web “leak site” remained freely available for download last month. They include financial records and personnel files with scanned Social Security cards and passports.
The public disclosure of psychological records or sexual assault case files, complete with students’ names, can fray psyches and thwart careers, psychologists say. One file stolen from Los Angeles United described how a middle-schooler had attempted suicide and been in and out of the psychiatric hospital a dozen times in a year.
The mother of a 16-year-old with autism recently got a letter from the San Diego Unified School District saying her daughter’s medical records might have been leaked online in an Oct. 25 breach.
“What if she doesn’t want the world to know that she has autism?” Barbara Voit asked.
LACK OF TRANSPARENCY
The Minneapolis parents informed by the AP of the leaked sexual assault complaints feel doubly victimized. Their children have battled post-traumatic stress disorder, and some even left their schools. Now this.
“The family is beyond horrified to learn that this highly sensitive information is now available in perpetuity on the Internet for the child’s future friends, romantic interests, employers and others to discover,” said Jeff Storms, an attorney for one of the families.
It is AP policy not to identify sexual abuse victims.
Teachers, meanwhile, want to know why they have to call the district and report problems to receive the promised free credit monitoring and identity theft protection after their Social Security numbers were leaked.
“Everything they’ve learned about this is from the news,” said Greta Callahan, of the Minneapolis Federation of Teachers.
Minneapolis Schools spokeswoman Crystina Lugo-Beach would not say how many people have been contacted so far or answer any other AP questions about the attack.
School nurse Angie McCracken had by early April already received 10 alerts through her credit card that her Social Security number and birth date were circulating on the dark Web. She wondered about her graduating 18-year-old.
“If their identity is stolen, just how hard is that going to make my kid’s life?” she asked.
Despite parents’ and teachers’ frustration, schools are routinely advised by incident response teams concerned about legal liability issues and ransom negotiations against being more transparent, Callow said.
Minneapolis school officials apparently followed that playbook, initially describing the Feb. 17 attack cryptically as a “system incident,” then as “technical difficulties” and later an “encryption event.”
The extent of the breach became clear though when a ransomware group posted video of stolen data more than two weeks later, giving the district 10 days to pay the ransom before leaking files.
The district declined to pay, following the standing advice of the FBI, which says ransoms encourage criminals to target more victims.
NO BUDGET FOR SECURITY
During the COVID-19 pandemic, districts prioritized spending on Internet connectivity and remote learning. Security got short shrift as IT departments invested in software to track student engagement and performance, often at the expense of privacy and safety, University of Chicago and New York University researchers found.
In a survey this year, the Consortium for School Networking, a tech-oriented nonprofit, found just 16 percent of districts had full-time network security staff, with nearly half devoting 2 percent or less of their IT budgets to security.
With a deficit in private sector cybersecurity talent, districts struggle to hang onto it. Districts who do hire someone often see them snatched away by businesses that can double their salaries, said Keith Krueger, CEO of the consortium.
Cybersecurity money for public schools is limited. As it stands, districts can only expect slivers of the US$1 billion in cybersecurity grants that the federal government is distributing over four years.
Minnesota chief information security officer John Israel said his state received US$18 million of it this year to divvy among 3,600 different entities, including cities and tribal governments. State legislators provided an additional US$22.5 million in grants for cyber and physical security in schools.
Schools also want to tap a federal program called E-Rate that is designed to improve broadband connections to schools and libraries. More than 1,100 wrote the US Federal Communications Commission after the Los Angeles Unified breach asking that E-Rate be modified to free up funds for cybersecurity.
The commission is still considering the request.
It is already too late for the mother of one of the Minneapolis students whose confidential sexual assault complaint was released online. She almost feels “violated again.”
“All the stuff we kept private, it’s out there. And it’s been out there for a very long time,” she said.
US President Donald Trump and Chinese President Xi Jinping (習近平) were born under the sign of Gemini. Geminis are known for their intelligence, creativity, adaptability and flexibility. It is unlikely, then, that the trade conflict between the US and China would escalate into a catastrophic collision. It is more probable that both sides would seek a way to de-escalate, paving the way for a Trump-Xi summit that allows the global economy some breathing room. Practically speaking, China and the US have vulnerabilities, and a prolonged trade war would be damaging for both. In the US, the electoral system means that public opinion
In their recent op-ed “Trump Should Rein In Taiwan” in Foreign Policy magazine, Christopher Chivvis and Stephen Wertheim argued that the US should pressure President William Lai (賴清德) to “tone it down” to de-escalate tensions in the Taiwan Strait — as if Taiwan’s words are more of a threat to peace than Beijing’s actions. It is an old argument dressed up in new concern: that Washington must rein in Taipei to avoid war. However, this narrative gets it backward. Taiwan is not the problem; China is. Calls for a so-called “grand bargain” with Beijing — where the US pressures Taiwan into concessions
The term “assassin’s mace” originates from Chinese folklore, describing a concealed weapon used by a weaker hero to defeat a stronger adversary with an unexpected strike. In more general military parlance, the concept refers to an asymmetric capability that targets a critical vulnerability of an adversary. China has found its modern equivalent of the assassin’s mace with its high-altitude electromagnetic pulse (HEMP) weapons, which are nuclear warheads detonated at a high altitude, emitting intense electromagnetic radiation capable of disabling and destroying electronics. An assassin’s mace weapon possesses two essential characteristics: strategic surprise and the ability to neutralize a core dependency.
Chinese President and Chinese Communist Party (CCP) Chairman Xi Jinping (習近平) said in a politburo speech late last month that his party must protect the “bottom line” to prevent systemic threats. The tone of his address was grave, revealing deep anxieties about China’s current state of affairs. Essentially, what he worries most about is systemic threats to China’s normal development as a country. The US-China trade war has turned white hot: China’s export orders have plummeted, Chinese firms and enterprises are shutting up shop, and local debt risks are mounting daily, causing China’s economy to flag externally and hemorrhage internally. China’s