DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

IA: Dallas County to pay $600,000 to security testers arrested in 2019

Posted on February 2, 2026 by Dissent

Phillip Sitter and William Morris report and update on a case in Iowa where security researchers were arrested — for doing what they had been hired to do. Add this to any list of legal threats researchers face.

Dallas County is paying $600,000 to two men who sued after they were arrested in 2019 while testing courthouse security for Iowa’s Judicial Branch, their lawyer says.

Gary DeMercurio and Justin Wynn were arrested Sept. 11, 2019, after breaking into the Dallas County Courthouse. They spent about 20 hours in jail and were charged with burglary and possession of burglary tools, though the charges were later dropped.

The men were employees of Colorado-based cybersecurity firm Coalfire Labs, with whom state judicial officials had contracted to perform an analysis of the state court system’s security. Judicial officials apologized and faced legislative scrutiny for how they had conducted the security test.

Read more at Des Moines Register.  Dan Goodin also reports on the case and settlement at Ars Technica.

In October 2019, DataBreaches had reported on the criminal charges, commenting at the time:

If Iowa doesn’t get its act together, businesses and government will have trouble getting security firms to analyze and test their security. Even after law enforcement was told that Justin Wynn and Gary DeMercurio were Coalfire employees just doing what Coalfire had been hired to do by the judicial branch, the men are still facing criminal charges. The charges were reduced from third-degree burglary (a felony) to trespass (a misdemeanor), but even that is totally absurd.

DeMercurio and Wynn filed their lawsuit in 2021, and the parties agreed to settle on January 23, just three days before the civil suit trial was to begin.

$600,000 for two men’s 6+ years of dealing with having been arrested, stress, and trouble finding work because of the criminal case and reputation damage? The arrests were disgraceful enough. Why didn’t the defendants settle this sooner? If the Sheriff and the Judicial Branch had a dispute over what the Judicial Branch did without consulting with or even notifying the Sheriff first, don’t take it out on the people who were doing what they were hired to do — and who had shown law enforcement the work order at the time they were arrested.

This never should have happened, but when it did, it shouldn’t have taken so many years to compensate the men help restore their reputation.

h/t, Risky Biz Newsletter


Related:

  • Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists
  • Kept in the Dark -- Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
  • It's "completely ridiculous" that pentesters are still facing criminal charges in Iowa for doing what they were hired to do.
  • Three men associated with Anonymous Australia facing jail time: Part 1
  • The Secret IRS Files: Trove of Never-Before-Seen Records Reveal How the Wealthiest Avoid Income Tax
Category: Commentaries and AnalysesThreatsU.S.

Post navigation

← Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists
Ransomware attack compromised 377,000 people’s Social Security and driver’s license numbers from Texas gas station and convenience store chain →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 45,000 malicious IP addresses taken down in international cyber operation
  • The Broken Records: tracing the human cost of the 2022 British MoD leak
  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life
  • Viral ‘Quittr’ Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • New data shows increase in FBI searches of Americans’ data last year
  • CalPrivacy Fines PlayOn Sports $1.1 Million for CCPA Violations Involving Student Privacy
  • 17 States Sues Trump Administration Over Unlawful Data Demands Targeting Colleges
  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.