The trouble for Foothill High started at 2 p.m. on a Tuesday afternoon last month.
That鈥檚 when a stream of profane and offensive messages started appearing on the official Twitter account of the 2,600-student school near Las Vegas.
Among them: taunts about the school鈥檚 鈥渨eak weak security system,鈥 a photo of a school administrator altered in a vulgar way, and anarchist images and messages.
Back in June, hackers took control of the official Twitter account of Florida鈥檚 40,000-student St. Lucie school district. Among the posts that went out to St. Lucie鈥檚 2,700 followers: a graphic photo of lynched African-Americans, as well as a racist message that said, 鈥淎fter Heavy Consideration, Our District Has Decided To Ban All African Americans From Our School District. Thank You!鈥
Both incidents represent a convergence of issues that are increasingly bedeviling K-12 systems: inappropriate uses of social media, and a wide range of cybersecurity threats.
And while they so far appear to be unusual, the Twitter-account hackings in Florida and Nevada raise important questions for school officials and tech companies alike, said Douglas A. Levin, the president of consulting group EdTech Strategies.
What security steps should schools be taking to better secure their social-media accounts? What should happen to students who share offensive content posted by hackers? And how can companies like Twitter respond more quickly to such instances after they occur?
1. Use a long, complex password for each platform and update it regularly.
2. Do not use the same password for multiple services.
3. Create 鈥渢wo-factor authentication,鈥 which basically means that after entering a password, a user completes a second step鈥攐ften entering a code that is sent by text message鈥攊n order to access an account.
4. Make intentional choices about limiting access to certain websites. One administrator, or a small group of people, should be the sole operator of a third-party hosted account.
5. Set up a crisis management plan in advance to ensure district or school officials are prepared to run damage control in the event of a breach. Those officials will have to reset passwords and contact companies.
6. Train teachers and administrators to identify phishing scams. Hackers use these email scams to trick recipients into giving away their login information for email accounts and websites.
Sources: C. Blohm & Associates, CoSN, EdTech Strategies
In St. Lucie, for example, the racist posts remained public for nearly 12 hours, sparking outrage from the district superintendent.
And in Nevada, it took almost two days to get the offensive messages removed.
That鈥檚 a big problem, Levin said.
鈥淭here鈥檚 not any gray area here,鈥 he said. 鈥淭he accounts were compromised, and what was published was clearly inappropriate and clearly not something the districts did themselves.鈥
Foothill High鈥檚 principal declined a request to be interviewed.
A spokeswoman for St. Lucie schools likewise declined to comment or provide an update on the hacking incident there, citing the ongoing challenges the district faces as it responds to flooding caused by Hurricane Irma earlier this month.
It does not appear that any arrests have been made in either case. Investigations appear to be ongoing in both locations.
One big question that remains unanswered: How were the school and district Twitter accounts compromised in the first place?
In the case of St. Lucie, the hackers offered some pretty big clues.
During an interview with local television station CBS12, a representative of a group calling itself Cryo Squad said it had targeted the district 鈥渂ecause it was extremely vulnerable and they have little to no security.鈥
Levin of EdTech Strategies said it would be no surprise if poor security practices played a role in the breaches.
Preventing Breaches
There are two big, basic steps that Levin and other experts recommend schools take to prevent social media accounts from being compromised.
鈥淗aving a strong password and keeping it confidential is important,鈥 Levin said. 鈥淚t鈥檚 also important to enable the advanced security features that most platforms offer, especially two-factor authentication.鈥
On passwords, Levin advised schools to make sure they鈥檙e long and complicated; to not reuse the same passwords for multiple services; and to consider using password-management software.
Two-factor authentication basically means that after entering a password, a user must complete a second step鈥攐ften entering a code that is sent by text message鈥攊n order to access an account. That way, even if a password is compromised, hackers still won鈥檛 have all the information they need to take control of an account. Most platforms allow users to opt into such features by adjusting their settings.
With all the other cybersecurity challenges districts are facing, it can be easy to overlook such steps, Levin said. And while losing control of a school Twitter account is a major nuisance, it鈥檚 different than having confidential employee or student information stolen from other software systems.
But given how difficult it can be to restore order after a social-media account has already been hacked, he said, an ounce of prevention is clearly worth the effort.
Back in Nevada, one of the challenges faced by district administrators and leaders at Foothill High was how to respond if students shared the inappropriate content hackers posted on the school鈥檚 Twitter account.
After the hacking took place, the district released a statement saying 鈥渁ny student found to be involved in sharing or retweeting this content could face disciplinary action.鈥
In an email, a district spokesman said Clark County鈥檚 cyberbullying policy was the basis for that stance. The spokesman added that 鈥減arents were contacted directly by school administrators if there were concerns with their child regarding this incident.鈥
But Bradley Shear, a Maryland-based lawyer who focuses on privacy and social-media law, said any such punishment meted out for sharing social-media content would likely be illegal and would almost certainly open a can of worms.
鈥淧ublic schools have no legal basis whatsoever to discipline students based on sharing digital content from the school district鈥檚 own accounts, regardless of the situation,鈥 Shear said.
Besides, he asked, how could the district know for sure that it was actually the student, and not someone else using their account, who shared the content? Under what other circumstances would schools presume to monitor and regulate students鈥 outside-of-school social media postings?
鈥淭he bottom line is that [Clark County鈥檚] threat is not only very troubling, but also hollow,鈥 Shear said. 鈥淚f they do discipline a student for sharing the content, they will lose any lawsuit arising out of the matter.鈥
And then there鈥檚 the matter of getting the offensive content taken down after it appears.
Trouble Reaching Twitter
The Clark County spokesman declined to specify exactly how long Foothill鈥檚 account was compromised, but it appeared to be under external control for well over three days.
And in remarks at a news conference that were reported by local station WPTV, St. Lucie superintendent Wayne Gent fumed at how long it took Twitter to remove the racist messages posted from his district鈥檚 account.
鈥淚 was mad as hell,鈥 Gent said during the news conference. 鈥淭here鈥檚 not a hotline that you can contact or a hotline that you can call. It鈥檚 done through emails, it鈥檚 done through texting and we could not get a response from [Twitter.]鈥
Levin of EdTech Strategies said that鈥檚 unfortunate, but not surprising. Platforms such as Twitter are awash in offensive, abusive, and otherwise problematic content, and they are even getting called to testify before Congress for their roles in enabling foreign governments to spread misinformation and meddle in elections. And their strategy of relying on algorithms and technology to respond to problems doesn鈥檛 appear to be working very well, he added.
鈥淚 think one lesson for schools is that if you鈥檙e going to use free, cloud-based services, it may be very challenging to reach someone who can help you in a timely manner,鈥 he said. 鈥淵ou鈥檙e really at their mercy.鈥
Twitter officials did not respond to requests for comments sent via their platform.