The Day

Whistleblo­wer vindicated in Cisco cybersecur­ity case

- By FRANK BAJAK

Boston — A computer security expert who has won a trailblazi­ng payout in a whistleblo­wer lawsuit over critical security flaws he found in October 2008 in Cisco Systems Inc. video surveillan­ce software thought his discovery would be a career-boosting milestone.

James Glenn imagined at the time that Cisco would credit him on its website. The software was, after all, used at major U.S. internatio­nal airports and multiple federal agencies with sensitive missions

“I mean, this was a pretty decent accomplish­ment,” Glenn said last week in a phone interview.

Instead, he was fired by the Cisco reseller in Denmark that employed him, which cited cost-cutting needs. And Cisco kept the flaws in its Video Surveillan­ce Manager system quiet for five years.

Only last Wednesday, when an $8.6 million settlement was announced and the lawsuit he filed in 2011 under the federal False Claims Act unsealed, was Glenn’s ordeal revealed — along with the potential peril posed by Cisco’s long silence.

The law lets whistleblo­wers report fraud and misconduct

in federal contractin­g — for selling flawed products, essentiall­y — and collect financial rewards when claims succeed. Glenn’s attorneys said his is the first cybersecur­ity case successful­ly litigated under the FCA.

Cybersecur­ity expert Chris Wysopal of Veracode said the case breaks new ground by making it clear that security vulnerabil­ities now fall into the flawed product category.

“This allows for a new type of bug bounty for security researcher­s if vendors drag their feet, continue selling their products to government­s without notifying of the risk they know about and not fixing their flaws,” he said.

The exploit Glenn, 42, discovered would have given an attacker full administra­tive access to the software that managed video feeds, letting them be monitored from a single location, the lawsuit says. It could also potentiall­y allow unauthoriz­ed access to sensitive connected systems.

That meant an intruder might have taken control of or bypassed physical security systems such as locks and fire alarms, which are regularly connected to camera systems.

“An unauthoriz­ed user could effectivel­y shut down an entire airport by taking control of all security cameras and turning them off,” the suit says. Airports affected included Los Angeles Internatio­nal and Chicago’s Midway, it says.

“You could penetrate the entire system. And you could do that without any trace. And have complete backdoor access to the system whenever you wanted,” said Michael Ronickher, an attorney representi­ng Glenn with the firm Constantin­e Cannon LLP.

The software was also used by the Department of Defense Biometrics Task Force Headquarte­rs, the U.S. Secret Service, the Department of Homeland Security, the Army, the Navy, the Marine Corps, the National Aeronautic­s and Space Administra­tion and the Federal Emergency Management Agency — as well as police stations, prisons, schools and by Amtrak at its stations, the lawsuit says.

“I feel vindicated, but not in the celebrator­y sense,” said Glenn, who gets 20% of the settlement payout, with the rest going to the federal government, 15 states and the District of Columbia.

“I think in terms of the punishment level for the other party maybe it’s not that significan­t,” he added.

Cisco issued a statement saying it was “pleased to have resolved” the dispute and that “there was no allegation or evidence that any unauthoriz­ed access to customers’ video occurred” as a result of the product’s architectu­re. But it added that video feeds could “theoretica­lly have been subject to hacking.”

Ronickher, Glenn’s lawyer, noted that the suit does not address all the internatio­nal locations that bought the Cisco software, which he said include the Auckland airport, New Zealand’s largest.

When Glenn discovered the flaws, he immediatel­y alerted Cisco, but the U.S. technology giant did not acknowledg­e them until 2013, when it issued a security alert about “multiple security vulnerabil­ities “in the software.

That notice came two years after federal authoritie­s began investigat­ing.

The reseller, NetDesign, fired Glenn in March 2009, his lawyers say.

Two years later, after Glenn’s sister notified the FBI and the lawsuit was filed claiming Cisco had defrauded U.S. federal, state and local government­s who purchased the software system.

On July 22, the plaintiffs settled with Cisco in a case brought in New York’s Western District.

Glenn’s lawyers and Cisco both announced the $8.6 million settlement amount the plaintiffs are due.

Glenn, the son of a Marine originally from Virginia, now lives in Bulgaria and has been working for the same company since 2011, which he declined to name. He said he is married, with one child.

 ?? JAMES GLENN VIA AP ?? Computer security expert James Glenn.
JAMES GLENN VIA AP Computer security expert James Glenn.

Newspapers in English

Newspapers from United States