• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

San Fransisco Officials Locked Out of Their Own Network

July 21, 2008

Views: 6,389

[ad]

Another disgruntled IT worked causing mayhem, remember the guy that destroyed all the medical records?

He got a pretty hefty sentence, now we have another who has locked everyone out of the new ‘state of the art’ computer network in San Fransisco – he’s on a $5 million dollar bail so I’d say he’s in big trouble too.

A disgruntled city computer engineer has virtually commandeered San Francisco’s new multimillion-dollar computer network, altering it to deny access to top administrators even as he sits in jail on $5 million bail, authorities said Monday.

Terry Childs, a 43-year-old computer network administrator who lives in Pittsburg, has been charged with four counts of computer tampering and is scheduled to be arraigned today.

Prosecutors say Childs, who works in the Department of Technology at a base salary of just over $126,000, tampered with the city’s new FiberWAN (Wide Area Network), where records such as officials’ e-mails, city payroll files, confidential law enforcement documents and jail inmates’ bookings are stored.

He was pretty well paid it seems and he must have had top level access to the entire WAN infrastructure as he has managed to lock everyone out. Thankfully the system is still running and there appears to have been no damage so far but that doesn’t mean he doesn’t have some backdoor or logic bomb that can wipe out all the records and data.

I think the Government and the law enforcement guys need to handle this very carefully.

Childs created a password that granted him exclusive access to the system, authorities said. He initially gave pass codes to police, but they didn’t work. When pressed, Childs refused to divulge the real code even when threatened with arrest, they said.

He was taken into custody Sunday. City officials said late Monday that they had made some headway into cracking his pass codes and regaining access to the system.

Childs has worked for the city for about five years. One official with knowledge of the case said he had been disciplined on the job in recent months for poor performance and that his supervisors had tried to fire him.

“They weren’t able to do it – this was kind of his insurance policy,” said the official, speaking on condition of anonymity because the attempted firing was a personnel matter.

Seems like he was trying to play the get out of jail free card…I’m not sure it’ll work though. I’d say he’s heading for big trouble…and however secure it is if they have physical access to the systems it’s only a matter of time before they crack his passwords and regain control of the system.

Then Mr. Childs your power play is finished and you are looking at a few years of having your backdoor cracked..

Source: SFGate

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Legal Issues, Networking Hacking Tools Tagged With: illegal, jail, prison



Reader Interactions

Comments

  1. Shall0w says

    July 21, 2008 at 9:47 am

    There’s an interesting take on this story over here:

    http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/08/07/18/30FE-sf-network-lockout_1.html

    While he’s definitely in the wrong, if whats wriiten is true it shows a totally different side to the argument.

  2. Bogwitch says

    July 21, 2008 at 11:43 am

    I’m a little confused by this – there must be more to this story.

    It sounds as though he was still working for the SF authority at the time of his arrest, therefore any ‘tampering’ must be related to something outside of his remit. After all, he cannot be accused of tampering with what was his job.
    As for the failure to release access details, that’s just stupid. It sounds as though he’ll be out of a job anyway so he might as well release the information. That way, any subsequent wrongful dismissal litigation or counter action would have a greater chance of success. By refusing to disclose the information requested he isportraying himself in a bad light where disclosure would present the ‘nothing to hide’ standpoint, unless he was hiding paedo porn in the config files!

  3. zupakomputer says

    July 21, 2008 at 2:49 pm

    Wasn’t something similar in the latter part of the Terminator TV series (esp. after reading the article linked in the first reply).

    And yet, in real life again, the City charges ahead to automate everything. It probably includes the traffic lights too, just like in the TV series…good plan! Put all the important required services in in such a way that any old terrorist can take them over.
    Good thing that Belgium Doesn’t Exist! then managerial types – cause that’s where skynet the website is registered to.

    I’m looking forward to when one of these stories comes up – but instead the machines have AI and they also agree with who put them together, and we can watch the idiots buiding a world that depends upon them get “assimilated into the borg”.

    Funny, I seem to remember some conspiracy literature saying exactly the same kind of thing happens when manager-types want secret stargates and time machines built for them too. Quick! get the intructions off who built it so you can use it for evil!

    How to leave your HAARP in San FranCisco……..

  4. gmckee says

    July 21, 2008 at 3:16 pm

    This is certainly an interesting situation. I believe that the article that Shallow referenced helps to expand on what we know about the situation but it almost sounds like it (the article) was trying to justify Childs

  5. Navin says

    July 22, 2008 at 2:29 pm

    $5 mil?? I’m just wondering if he actually complied with the cops the first time they interrogated him, by around how much would his sentence be reduced?

    I do understand that perhaps he had a “proper reason” for his actions but I still would want to know. As bogwitch pointed out, he

  6. gmckee says

    July 22, 2008 at 3:52 pm

    The $5 Million is actually a bond. A bond is money that a defendant is required to deposit with the court in order to get out of jail while they await trial. Some make the distinction at this point and it is called being out on bail but I

  7. razta says

    July 22, 2008 at 7:58 pm

    @gmckee
    Very informative post! I do agree that he is inocent until proven guilty, however from what ive read id say hes more likely to be guilty.

    As for the ultra stong password being stored in a safe, I think this would be a good idea. You, the company owner, would have to be the only person to have access to the safe. Another point is, wouldnt (Childs) need that password from time to time to take care of the network? If not, and he had a seperate admin account on the network, couldnt he just change/crack the password of the companys backdoor admin account?

  8. zupakomputer says

    July 22, 2008 at 8:41 pm

    For the record I got more that the article wasn’t saying what he did was ok at all – it does state on more than one occaision it’s not trying to do that. It’s saying how common it is for people that set up networks and the like, especially if they are the only one doing so as was the case here (according to the info), to feel personally caring about them – like it is their child. And also that they do not trust non-technical managerial types to know what they are doing when it comes to their having passwords that can alter the network.

    It could effectively mean – there’s no point in your setting up security etc, if someone that has never studied or worked in the area then has the ability to alter what you have done; what if something goes wrong thereafter – who gets the blame? Probably the guy that designed it? even if he took what care he could to ensure that nobody changed or altered anything.

    It’s no big secret that in every area, especially politics and so forth, there’s always people in charge of things that they have no actual comprehension of. They make decisions based on figures on paper – not actual reality, not how things work for real.

    Also I could be being too sharp here – but my initial reaction to reading this bit:

    ”

  9. grav says

    July 23, 2008 at 1:00 am

    It’s cases like this in which hacking tools come into use. If another case like this occurs and the authorities aren’t able to get back in and he is unwilling to divulge the password, would black hats be hired to get in?

  10. razta says

    July 23, 2008 at 7:44 am

    @grav
    I suppose if they dident have some one “in the know” already working for them, then yes, they would have to hire outside help, maybe not black hats. I bet theres loads of InfoSec compnays on the phone to them trying to sell their services, big money for the company that gets in.

  11. Navin says

    July 23, 2008 at 2:44 pm

    I totally agree wid razta

    There are loads of security companies (who sometimes employ black hatters) who are generally employed to get the job done. And as razta has pointed out, they charge by the second $$$$!!

  12. gmckee says

    July 23, 2008 at 3:48 pm

    Razta, The point I was trying to make with the admin account info locked into a safe was that there would be more than one account with the appropriate access. Useful in case of emergencies but as you rightly pointed out it wouldn

  13. zupakomputer says

    July 23, 2008 at 6:24 pm

    Another guy that just showed up and thinks I am another poster here?! looks more to me that ratza thought he was guilty.

    I think it’s me you should be directing that at – your issue with the ‘buts’, since it was me who replied about what you wrote about that.

    While I do think most anything is 0 or 1, the problem with everything is that you never have the whole picture other than with your own life to be able to fully make that call – 0 or 1. You have to know what people’s real motivations are before you know if they are right or wrong. And that’s one main reason I’d never go into law enforcement or anything of the kind – maybe if I was so super-psychic I knew why anyone really did what they did and how they came to be born on Earth in the first place, then I’d consider it. Some things you know are wrong but those rarely have much to do with any laws; unless it your lucky day.

  14. zupakomputer says

    July 23, 2008 at 6:35 pm

    sorry about the typo! razta I meant. i honestly got that wrong and wasn’t being one of those c***s that pretends to get something wrong on purpose.

  15. gmckee says

    July 23, 2008 at 7:10 pm

    @zupakomputer
    Sorry, I saw my last post as a continuation of a thought concerning the article Shallow cited rather than a response to you specifically. Since Razta had asked a direct question I thought I should answer that first and perhaps that is what caused the confusion.

    For the most part I don

  16. zupakomputer says

    July 24, 2008 at 2:28 pm

    Mea culpa – someone I worked with many years ago (in an IBM offshoot factory, when there used to be computer jobs here) told me the priest would say that phrase as part of mass, and they’d always do the reply as: “me a cowboy, me a cowboy, me a Mexican cowboy”.

  17. Navin says

    July 24, 2008 at 4:34 pm

    @ zupakomp
    en.wikipedia.org/wiki/Mea_culpa

    http://www.phrases.org.uk/meanings/mea-culpa.html

    Meaning

    I’m to blame. The literal translation from the Latin is ‘through my own fault’. Even those who don’t speak Latin could probably make a guess that this phrase means ‘I am culpable’, or words to that effect.

    It orignates in the Confiteor (part of the catholic mass) where sinners acknowledge their failings before God.

    me a cowboy??

  18. Morgan Storey says

    July 31, 2008 at 2:24 pm

    We see this time and time again. Unfortunately there are people even in infosec who can’t be trusted. The biggest threat as Schneir said is IT departments. It is the ultimate insider threat, and they are given major power. I think you will see in years to come IT people in each department, then they simply get assistance on high level tech from the main IT department, sure this one person could go bad, but all they can do is take down the one department.
    This was just a simple network ownage, get in a handful of decent network eng guys and wipe it and rebuild. I think we will soon see some admin really putting the data to ransom, bulk erase the backups or just encrypt them, then encrypt the file and email servers file systems, set the encrypted partitions or folders to simply dismount after 24hours if the admin’s usb key isn’t present in one of the servers.
    Then as he is leaving he takes his usb key, goes home and wipes it.
    GAME OVER. He doesn’t give them the passphrase or whatever and all hope is lost.
    IT managers must realize they can’t put this kind of company destroying power into one persons hands.

  19. Navin says

    July 31, 2008 at 3:43 pm

    ++1 Morgan

    But its sad that even with such stuff happening right round the block, companies still trust their Infosec employees with admin access to the entire dataserver

    Why get robbed? Why don’t you just hand over your money to the thugs? thats all i can say

  20. gmckee says

    July 31, 2008 at 4:39 pm

    @Navin

    What you say is sad but true. What other choice do companies have though?

    Companies can take some actions to try to mitigate the risk associated with having an insider turn on the company but there are never any guarentees. At some point you must simply trust the people you have working for you. I guess that is what offended me so much about this situation. It was a complete violation of trust.

  21. zupakomputer says

    July 31, 2008 at 5:14 pm

    Yeah I know – I’ve been to a whole heap of Catholic masses in my time, but in this country they weren’t doing Latin masses anymore by the time I was at school. So I was just saying, what this guy I worked with used to do in reply, with his mates, cause ‘mea culpa’ phonetically sounds like ‘me a cowboy’. I don’t know – maybe you have to be Scottish to hear it with that inflection.

    The best one for me was being in a Genova cathedral and the priest came out and sang in Italian, “we’re closing” to get people to leave.

    Morgan: that would be the sensible way to do it though, have it decentralised like the internet itself. But if it’s not done right, then it’s still open to being poisoned.

  22. Morgan Storey says

    August 1, 2008 at 10:03 am

    @zukakomputer: very true, a chain is only as strong as it’s weakest link. I guess it would limit damage, but is also limits knowledge, and limits the work that one of these people has to do, which would also limit experience. There is no answer I can think of, short of very granular control and an IT literate upper manager. This is where CIO/CSO’s who are IT literate enough to control the admin passwords would be useful; they could simply be very granular in the control they give to one person, and have backup accounts.
    It still doesn’t stop my attack vector, the only thing that could do that is the same upper manager monitoring key systems, and they don’t really have time for that.
    I don’t know. Maybe having a code of ethics, and or Psych-reviews like the armed services. I myself believe I have a high level of ethics, I have had access to a corporate bank account user/pass that had access to a few million dollars (unlimited transfer too), I did nothing but my job and used these details to setup, test and deploy the system. I then encouraged the user to change their password, and went on about my day. That didn’t stop the jokes from colleagues; “cmon just hit transfer and next week we can both be on a beach in spain drinking margaritas”.

    @navin & Darknet: I spoke too soon, I tried to post the above and got the WP error again.

  23. zupakomputer says

    August 1, 2008 at 2:02 pm

    But realistically though if you’d transfered that money to yourself they’d have known it was you, and you’d have been easily caught anyway (unless – you happen to be a master of disguise and hold an array of fake passports?! private planes, etc; in which case you wouldn’t have been working a job!).

  24. gmckee says

    August 1, 2008 at 7:41 pm

    :) ‘me a cowboy’ I did get it. Perhaps it was my Scottish half speaking to me down the ages. Of course the Irish side was slowing things down a bit…

  25. Navin says

    August 2, 2008 at 10:55 am

    Oh yeah….. morgan’d prolly be surrounded by a battalion of the FBI before he could even collect his passport….but perhaps if he did this from lets say Yugoslavia and got the cash tranferred to some bank account in China using proxies in Nigeria, India, Iran, Turkey, Vietnam, Canada and Venezuela, maybe it’d be some time before the FBI tracked him down…..hmmmm….I got a great idea….honey, pack up your bags!!

  26. Morgan Storey says

    August 3, 2008 at 1:12 am

    @Zukakomputer and Navin: I was doing the work on a Friday before a long weekend, that was the point, we could have hopped a plane Saturday and no one would have known until Tuesday. Fortunately though we don’t have FBI here, only Federal Police. I reacon I could have got away with it, but I couldn’t do that, I think how many people may have lost their job if I had, or the damage done to the consulting firm I was working with at the time.
    It was funny to joke about though.
    Maybe internal attack vectors will be more subtle in the future, it isn’t that hard to write/buy some custom piece of malware, roll it into an update or into the soe and push it out to the company. Years later it is still sending data your way, and you can use it for what you will. I am sure this is being done, and it is rather hard to defend against.

  27. Navin says

    August 3, 2008 at 1:25 pm

    Ya, there was this article I’d read a long time back about how malware was recognised as legitimate Windows updates and got installed on PC’s of guys who’d stumbled onto malware infected sites and had automatic windows updates turned on!! Since tht day, my Windows Update (automatic) has been turned off :)

  28. Morgan Storey says

    August 4, 2008 at 1:36 am

    @Navin: I can’t believe there hasn’t been a MITM attack yet with windows update. How hard would it be, as there is no ssl. Simply just redirect the domain, and mirrors, and publish a few security updates malformed via a wsus server or own custom build.

  29. Morgan Storey says

    August 4, 2008 at 5:44 am

    @Darknet: see some spammers get through. Suprisingly few though. COUGH Nagios….
    Ahhh irony, the WP spam blocker blocked this message several times.

  30. Navin says

    August 4, 2008 at 2:09 pm

    @ morgan hehehehehe (tht’s for the last comment)

    For the one before tht, yeah, it’d be comparably easy to even pair up rootkits with Windows updates and get thousands/millions of users affected. That was was many had expected had happened when one of the MS sites was hacked a few yrs ago (MS-Europe if I remember right)…but of course tht was a hoax.

  31. Morgan Storey says

    August 6, 2008 at 11:12 am

    @Navin: I read an article about a guy who using the playstation3’s FPU managed to on the fly, inject data in to bittorrent chunk, using the PS3 to manipulate the packet so that its MD5 would match and therefore the reciever and their software would be none the wiser. This is another similar vector for attack. Imagine downloading the latest copy of some linux distro, power it up and it installs some unknown binary that phones home and pops open a port.
    There is no single solution, security is a process not a product (to quote Schnier).

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Views: 168

As threat surfaces grow and attack sophistication increases, many security teams face the same … ...More about Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 431

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 475

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 393

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 598

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 560

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (234)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,294,559)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,088)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,623)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,683)
  • Password List Download Best Word List – Most Common Passwords (933,489)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,146)
  • Hack Tools/Exploits (673,293)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,158)

Search

Recent Posts

  • Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance May 16, 2025
  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy